G0052 CopyKittens
CopyKittens is an Iranian cyber espionage group that has been operating since at least 2013. It has targeted countries including Israel, Saudi Arabia, Turkey, the U.S., Jordan, and Germany. The group is responsible for the campaign known as Operation Wilted Tulip.213
Item | Value |
---|---|
ID | G0052 |
Associated Names | |
Version | 1.6 |
Created | 16 January 2018 |
Last Modified | 08 August 2022 |
Navigation Layer | View In ATT&CK® Navigator |
Techniques Used
Domain | ID | Name | Use |
---|---|---|---|
enterprise | T1560 | Archive Collected Data | - |
enterprise | T1560.001 | Archive via Utility | CopyKittens uses ZPP, a .NET console program, to compress files with ZIP.1 |
enterprise | T1560.003 | Archive via Custom Method | CopyKittens encrypts data with a substitute cipher prior to exfiltration.3 |
enterprise | T1059 | Command and Scripting Interpreter | - |
enterprise | T1059.001 | PowerShell | CopyKittens has used PowerShell Empire.1 |
enterprise | T1564 | Hide Artifacts | - |
enterprise | T1564.003 | Hidden Window | CopyKittens has used -w hidden and -windowstyle hidden to conceal PowerShell windows. 1 |
enterprise | T1588 | Obtain Capabilities | - |
enterprise | T1588.002 | Tool | CopyKittens has used Metasploit, Empire, and AirVPN for post-exploitation activities.45 |
enterprise | T1090 | Proxy | CopyKittens has used the AirVPN service for operational activity.5 |
enterprise | T1553 | Subvert Trust Controls | - |
enterprise | T1553.002 | Code Signing | CopyKittens digitally signed an executable with a stolen certificate from legitimate company AI Squared.1 |
enterprise | T1218 | System Binary Proxy Execution | - |
enterprise | T1218.011 | Rundll32 | CopyKittens uses rundll32 to load various tools on victims, including a lateral movement tool named Vminst, Cobalt Strike, and shellcode.1 |
Software
References
-
ClearSky Cyber Security and Trend Micro. (2017, July). Operation Wilted Tulip: Exposing a cyber espionage apparatus. Retrieved August 21, 2017. ↩↩↩↩↩↩↩↩↩↩
-
ClearSky Cyber Security. (2017, March 30). Jerusalem Post and other Israeli websites compromised by Iranian threat agent CopyKitten. Retrieved August 21, 2017. ↩
-
Minerva Labs LTD and ClearSky Cyber Security. (2015, November 23). CopyKittens Attack Group. Retrieved September 11, 2017. ↩↩
-
ClearSky and Trend Micro. (2017, July). Operation Wilted Tulip - Exposing a cyber espionage apparatus. Retrieved May 17, 2021. ↩
-
Microsoft. (2022, June 2). Exposing POLONIUM activity and infrastructure targeting Israeli organizations. Retrieved July 1, 2022. ↩↩