G0003 Cleaver
Cleaver is a threat group that has been attributed to Iranian actors and is responsible for activity tracked as Operation Cleaver. Strong circumstantial evidence suggests Cleaver is linked to Threat Group 2889 (TG-2889).
Item |
Value |
ID |
G0003 |
Associated Names |
Threat Group 2889, TG-2889 |
Version |
1.3 |
Created |
31 May 2017 |
Last Modified |
22 July 2022 |
Navigation Layer |
View In ATT&CK® Navigator |
Associated Group Descriptions
Name |
Description |
Threat Group 2889 |
|
TG-2889 |
|
Techniques Used
Domain |
ID |
Name |
Use |
enterprise |
T1557 |
Adversary-in-the-Middle |
- |
enterprise |
T1557.002 |
ARP Cache Poisoning |
Cleaver has used custom tools to facilitate ARP cache poisoning. |
enterprise |
T1587 |
Develop Capabilities |
- |
enterprise |
T1587.001 |
Malware |
Cleaver has created customized tools and payloads for functions including ARP poisoning, encryption, credential dumping, ASP.NET shells, web backdoors, process enumeration, WMI querying, HTTP and SMB communications, network interface sniffing, and keystroke logging. |
enterprise |
T1585 |
Establish Accounts |
- |
enterprise |
T1585.001 |
Social Media Accounts |
Cleaver has created fake LinkedIn profiles that included profile photos, details, and connections. |
enterprise |
T1588 |
Obtain Capabilities |
- |
enterprise |
T1588.002 |
Tool |
Cleaver has obtained and used open-source tools such as PsExec, Windows Credential Editor, and Mimikatz. |
enterprise |
T1003 |
OS Credential Dumping |
- |
enterprise |
T1003.001 |
LSASS Memory |
Cleaver has been known to dump credentials using Mimikatz and Windows Credential Editor. |
Software
References