G0089 The White Company
The White Company is a likely state-sponsored threat actor with advanced capabilities. From 2017 through 2018, the group led an espionage campaign called Operation Shaheen targeting government and military organizations in Pakistan.1
Item | Value |
---|---|
ID | G0089 |
Associated Names | |
Version | 1.1 |
Created | 02 May 2019 |
Last Modified | 30 March 2020 |
Navigation Layer | View In ATT&CK® Navigator |
Techniques Used
Domain | ID | Name | Use |
---|---|---|---|
enterprise | T1203 | Exploitation for Client Execution | The White Company has taken advantage of a known vulnerability in Microsoft Word (CVE 2012-0158) to execute code.1 |
enterprise | T1070 | Indicator Removal | - |
enterprise | T1070.004 | File Deletion | The White Company has the ability to delete its malware entirely from the target system.1 |
enterprise | T1027 | Obfuscated Files or Information | - |
enterprise | T1027.002 | Software Packing | The White Company has obfuscated their payloads through packing.1 |
enterprise | T1566 | Phishing | - |
enterprise | T1566.001 | Spearphishing Attachment | The White Company has sent phishing emails with malicious Microsoft Word attachments to victims.1 |
enterprise | T1518 | Software Discovery | - |
enterprise | T1518.001 | Security Software Discovery | The White Company has checked for specific antivirus products on the target’s computer, including Kaspersky, Quick Heal, AVG, BitDefender, Avira, Sophos, Avast!, and ESET.1 |
enterprise | T1124 | System Time Discovery | The White Company has checked the current date on the victim system.1 |
enterprise | T1204 | User Execution | - |
enterprise | T1204.002 | Malicious File | The White Company has used phishing lure documents that trick users into opening them and infecting their computers.1 |