G0076 Thrip
Thrip is an espionage group that has targeted satellite communications, telecoms, and defense contractor companies in the U.S. and Southeast Asia. The group uses custom malware as well as “living off the land” techniques. 1
Item | Value |
---|---|
ID | G0076 |
Associated Names | |
Version | 1.2 |
Created | 17 October 2018 |
Last Modified | 12 October 2021 |
Navigation Layer | View In ATT&CK® Navigator |
Techniques Used
Domain | ID | Name | Use |
---|---|---|---|
enterprise | T1059 | Command and Scripting Interpreter | - |
enterprise | T1059.001 | PowerShell | Thrip leveraged PowerShell to run commands to download payloads, traverse the compromised networks, and carry out reconnaissance.1 |
enterprise | T1048 | Exfiltration Over Alternative Protocol | - |
enterprise | T1048.003 | Exfiltration Over Unencrypted Non-C2 Protocol | Thrip has used WinSCP to exfiltrate data from a targeted organization over FTP.1 |
enterprise | T1588 | Obtain Capabilities | - |
enterprise | T1588.002 | Tool | Thrip has obtained and used tools such as Mimikatz and PsExec.1 |
enterprise | T1219 | Remote Access Software | Thrip used a cloud-based remote access software called LogMeIn for their attacks.1 |