G0035 Dragonfly
Dragonfly is a cyber espionage group that has been attributed to Russia’s Federal Security Service (FSB) Center 16.213 Active since at least 2010, Dragonfly has targeted defense and aviation companies, government entities, companies related to industrial control systems, and critical infrastructure sectors worldwide through supply chain, spearphishing, and drive-by compromise attacks.1171049112
Item | Value |
---|---|
ID | G0035 |
Associated Names | TEMP.Isotope, DYMALLOY, Berserk Bear, TG-4192, Crouching Yeti, IRON LIBERTY, Energetic Bear |
Version | 3.1 |
Created | 31 May 2017 |
Last Modified | 08 March 2023 |
Navigation Layer | View In ATT&CK® Navigator |
Associated Group Descriptions
Name | Description |
---|---|
TEMP.Isotope | 59 |
DYMALLOY | 313 |
Berserk Bear | 9213 |
TG-4192 | 713 |
Crouching Yeti | 79213 |
IRON LIBERTY | 76813 |
Energetic Bear | 117689213 |
Techniques Used
Domain | ID | Name | Use |
---|---|---|---|
enterprise | T1087 | Account Discovery | - |
enterprise | T1087.002 | Domain Account | Dragonfly has used batch scripts to enumerate users on a victim domain controller.14 |
enterprise | T1098 | Account Manipulation | Dragonfly has added newly created accounts to the administrators group to maintain elevated access.14 |
enterprise | T1583 | Acquire Infrastructure | - |
enterprise | T1583.001 | Domains | Dragonfly has registered domains for targeting intended victims.1 |
enterprise | T1583.003 | Virtual Private Server | Dragonfly has acquired VPS infrastructure for use in malicious campaigns.9 |
enterprise | T1595 | Active Scanning | - |
enterprise | T1595.002 | Vulnerability Scanning | Dragonfly has scanned targeted systems for vulnerable Citrix and Microsoft Exchange services.1 |
enterprise | T1071 | Application Layer Protocol | Dragonfly has used SMB for C2.14 |
enterprise | T1560 | Archive Collected Data | Dragonfly has compressed data into .zip files prior to exfiltration.14 |
enterprise | T1547 | Boot or Logon Autostart Execution | - |
enterprise | T1547.001 | Registry Run Keys / Startup Folder | Dragonfly has added the registry value ntdll to the Registry Run key to establish persistence.14 |
enterprise | T1110 | Brute Force | Dragonfly has attempted to brute force credentials to gain access.1 |
enterprise | T1110.002 | Password Cracking | Dragonfly has dropped and executed tools used for password cracking, including Hydra and CrackMapExec.1416 |
enterprise | T1059 | Command and Scripting Interpreter | Dragonfly has used the command line for execution.14 |
enterprise | T1059.001 | PowerShell | Dragonfly has used PowerShell scripts for execution.1410 |
enterprise | T1059.003 | Windows Command Shell | Dragonfly has used various types of scripting to perform operations, including batch scripts.14 |
enterprise | T1059.006 | Python | Dragonfly has used various types of scripting to perform operations, including Python scripts. The group was observed installing Python 2.7 on a victim.14 |
enterprise | T1584 | Compromise Infrastructure | - |
enterprise | T1584.004 | Server | Dragonfly has compromised legitimate websites to host C2 and malware modules.9 |
enterprise | T1136 | Create Account | - |
enterprise | T1136.001 | Local Account | Dragonfly has created accounts on victims, including administrator accounts, some of which appeared to be tailored to each individual staging target.14 |
enterprise | T1005 | Data from Local System | Dragonfly has collected data from local victim systems.14 |
enterprise | T1074 | Data Staged | - |
enterprise | T1074.001 | Local Data Staging | Dragonfly has created a directory named “out” in the user’s %AppData% folder and copied files to it.14 |
enterprise | T1189 | Drive-by Compromise | Dragonfly has compromised targets via strategic web compromise (SWC) utilizing a custom exploit kit.7149 |
enterprise | T1114 | Email Collection | - |
enterprise | T1114.002 | Remote Email Collection | Dragonfly has accessed email accounts using Outlook Web Access.14 |
enterprise | T1190 | Exploit Public-Facing Application | Dragonfly has conducted SQL injection attacks, exploited vulnerabilities CVE-2019-19781 and CVE-2020-0688 for Citrix and MS Exchange, and CVE-2018-13379 for Fortinet VPNs.1 |
enterprise | T1203 | Exploitation for Client Execution | Dragonfly has exploited CVE-2011-0611 in Adobe Flash Player to gain execution on a targeted system.9 |
enterprise | T1210 | Exploitation of Remote Services | Dragonfly has exploited a Windows Netlogon vulnerability (CVE-2020-1472) to obtain access to Windows Active Directory servers.1 |
enterprise | T1133 | External Remote Services | Dragonfly has used VPNs and Outlook Web Access (OWA) to maintain access to victim networks.141 |
enterprise | T1083 | File and Directory Discovery | Dragonfly has used a batch script to gather folder and file names from victim hosts.1491 |
enterprise | T1187 | Forced Authentication | Dragonfly has gathered hashed user credentials over SMB using spearphishing attachments with external resource links and by modifying .LNK file icon resources to collect credentials from virtualized systems.149 |
enterprise | T1591 | Gather Victim Org Information | - |
enterprise | T1591.002 | Business Relationships | Dragonfly has collected open source information to identify relationships between organizations for targeting purposes.9 |
enterprise | T1564 | Hide Artifacts | - |
enterprise | T1564.002 | Hidden Users | Dragonfly has modified the Registry to hide created user accounts.14 |
enterprise | T1562 | Impair Defenses | - |
enterprise | T1562.004 | Disable or Modify System Firewall | Dragonfly has disabled host-based firewalls. The group has also globally opened port 3389.14 |
enterprise | T1070 | Indicator Removal | - |
enterprise | T1070.001 | Clear Windows Event Logs | Dragonfly has cleared Windows event logs and other logs produced by tools they used, including system, security, terminal services, remote services, and audit logs. The actors also deleted specific Registry keys.14 |
enterprise | T1070.004 | File Deletion | Dragonfly has deleted many of its files used during operations as part of cleanup, including removing applications and deleting screenshots.14 |
enterprise | T1105 | Ingress Tool Transfer | Dragonfly has copied and installed tools for operations once in the victim environment.14 |
enterprise | T1036 | Masquerading | Dragonfly has created accounts disguised as legitimate backup and service accounts as well as an email administration account.14 |
enterprise | T1112 | Modify Registry | Dragonfly has modified the Registry to perform multiple techniques through the use of Reg.14 |
enterprise | T1135 | Network Share Discovery | Dragonfly has identified and browsed file servers in the victim network, sometimes , viewing files pertaining to ICS or Supervisory Control and Data Acquisition (SCADA) systems.14 |
enterprise | T1588 | Obtain Capabilities | - |
enterprise | T1588.002 | Tool | Dragonfly has obtained and used tools such as Mimikatz, CrackMapExec, and PsExec.7 |
enterprise | T1003 | OS Credential Dumping | - |
enterprise | T1003.002 | Security Account Manager | Dragonfly has dropped and executed SecretsDump to dump password hashes.14 |
enterprise | T1003.003 | NTDS | Dragonfly has dropped and executed SecretsDump to dump password hashes. They also obtained ntds.dit from domain controllers.1415 |
enterprise | T1003.004 | LSA Secrets | Dragonfly has dropped and executed SecretsDump to dump password hashes.1415 |
enterprise | T1069 | Permission Groups Discovery | - |
enterprise | T1069.002 | Domain Groups | Dragonfly has used batch scripts to enumerate administrators and users in the domain.14 |
enterprise | T1566 | Phishing | - |
enterprise | T1566.001 | Spearphishing Attachment | Dragonfly has sent emails with malicious attachments to gain initial access.9 |
enterprise | T1598 | Phishing for Information | - |
enterprise | T1598.002 | Spearphishing Attachment | Dragonfly has used spearphishing with Microsoft Office attachments to enable harvesting of user credentials.14 |
enterprise | T1598.003 | Spearphishing Link | Dragonfly has used spearphishing with PDF attachments containing malicious links that redirected to credential harvesting websites.14 |
enterprise | T1012 | Query Registry | Dragonfly has queried the Registry to identify victim information.14 |
enterprise | T1021 | Remote Services | - |
enterprise | T1021.001 | Remote Desktop Protocol | Dragonfly has moved laterally via RDP.14 |
enterprise | T1018 | Remote System Discovery | Dragonfly has likely obtained a list of hosts in the victim environment.14 |
enterprise | T1053 | Scheduled Task/Job | - |
enterprise | T1053.005 | Scheduled Task | Dragonfly has used scheduled tasks to automatically log out of created accounts every 8 hours as well as to execute malicious files.14 |
enterprise | T1113 | Screen Capture | Dragonfly has performed screen captures of victims, including by using a tool, scr.exe (which matched the hash of ScreenUtil).14109 |
enterprise | T1505 | Server Software Component | - |
enterprise | T1505.003 | Web Shell | Dragonfly has commonly created Web shells on victims’ publicly accessible email and web servers, which they used to maintain access to a victim network and download additional malicious files.14 |
enterprise | T1608 | Stage Capabilities | - |
enterprise | T1608.004 | Drive-by Target | Dragonfly has compromised websites to redirect traffic and to host exploit kits.9 |
enterprise | T1195 | Supply Chain Compromise | - |
enterprise | T1195.002 | Compromise Software Supply Chain | Dragonfly has placed trojanized installers for control system software on legitimate vendor app stores.79 |
enterprise | T1016 | System Network Configuration Discovery | Dragonfly has used batch scripts to enumerate network information, including information about trusts, zones, and the domain.14 |
enterprise | T1033 | System Owner/User Discovery | Dragonfly used the command query user on victim hosts.14 |
enterprise | T1221 | Template Injection | Dragonfly has injected SMB URLs into malicious Word spearphishing attachments to initiate Forced Authentication.14 |
enterprise | T1204 | User Execution | - |
enterprise | T1204.002 | Malicious File | Dragonfly has used various forms of spearphishing in attempts to get users to open malicious attachments.9 |
enterprise | T1078 | Valid Accounts | Dragonfly has compromised user credentials and used valid accounts for operations.1491 |
ics | T0817 | Drive-by Compromise | Dragonfly utilized watering hole attacks on energy sector websites by injecting a redirect iframe to deliver Backdoor.Oldrea or Trojan.Karagany. 17 |
ics | T0862 | Supply Chain Compromise | Dragonfly trojanized legitimate ICS equipment providers software packages available for download on their websites.17 |
Software
References
-
CISA. (2020, December 1). Russian State-Sponsored Advanced Persistent Threat Actor Compromises U.S. Government Targets. Retrieved December 9, 2021. ↩↩↩↩↩↩↩↩↩
-
Department of Justice. (2022, March 24). Four Russian Government Employees Charged in Two Historical Hacking Campaigns Targeting Critical Infrastructure Worldwide. Retrieved April 5, 2022. ↩↩↩↩
-
Hackett, R. (2017, September 6). Hackers Have Penetrated Energy Grid, Symantec Warns. Retrieved June 6, 2018. ↩
-
Hultquist, J. (2022, January 20). Anticipating Cyber Threats as the Ukraine Crisis Escalates. Retrieved January 24, 2022. ↩
-
Secureworks. (2019, July 24). MCMD Malware Analysis. Retrieved August 13, 2020. ↩↩↩
-
Secureworks. (2019, July 24). Resurgent Iron Liberty Targeting Energy Sector. Retrieved August 12, 2020. ↩↩↩↩↩↩↩↩↩↩↩
-
Secureworks. (2019, July 24). Updated Karagany Malware Targets Energy Sector. Retrieved August 12, 2020. ↩↩↩
-
Slowik, J. (2021, October). THE BAFFLING BERSERK BEAR: A DECADE’S ACTIVITY TARGETING CRITICAL INFRASTRUCTURE. Retrieved December 6, 2021. ↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩
-
Symantec Security Response. (2014, July 7). Dragonfly: Western energy sector targeted by sophisticated attack group. Retrieved September 9, 2017. ↩↩↩↩
-
Symantec Security Response. (2014, June 30). Dragonfly: Cyberespionage Attacks Against Energy Suppliers. Retrieved April 8, 2016. ↩↩↩↩
-
Symantec. (2017, October 7). Dragonfly: Western energy sector targeted by sophisticated attack group. Retrieved April 19, 2022. ↩
-
UK Gov. (2022, April 5). Russia’s FSB malign activity: factsheet. Retrieved April 5, 2022. ↩↩↩↩↩↩↩
-
US-CERT. (2018, March 16). Alert (TA18-074A): Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors. Retrieved June 6, 2018. ↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩
-
Core Security. (n.d.). Impacket. Retrieved November 2, 2017. ↩↩↩
-
Kali. (2014, February 18). THC-Hydra. Retrieved November 2, 2017. ↩
-
Symantec Security Response 2014, July 7 Dragonfly: Cyberespionage Attacks Against Energy Suppliers Retrieved. 2016/04/08 ↩↩