enterprise |
T1583 |
Acquire Infrastructure |
- |
enterprise |
T1583.001 |
Domains |
EXOTIC LILY has registered domains to spoof targeted organizations by changing the top-level domain (TLD) to “.us”, “.co” or “.biz”. |
enterprise |
T1585 |
Establish Accounts |
- |
enterprise |
T1585.001 |
Social Media Accounts |
EXOTIC LILY has established social media profiles to mimic employees of targeted companies. |
enterprise |
T1585.002 |
Email Accounts |
EXOTIC LILY has created e-mail accounts to spoof targeted organizations. |
enterprise |
T1203 |
Exploitation for Client Execution |
EXOTIC LILY has used malicious documents containing exploits for CVE-2021-40444 affecting Microsoft MSHTML. |
enterprise |
T1589 |
Gather Victim Identity Information |
- |
enterprise |
T1589.002 |
Email Addresses |
EXOTIC LILY has gathered targeted individuals’ e-mail addresses through open source research and website contact forms. |
enterprise |
T1566 |
Phishing |
- |
enterprise |
T1566.001 |
Spearphishing Attachment |
EXOTIC LILY conducted an e-mail thread-hijacking campaign with malicious ISO attachments. |
enterprise |
T1566.002 |
Spearphishing Link |
EXOTIC LILY has relied on victims to open malicious links in e-mails for execution. |
enterprise |
T1566.003 |
Spearphishing via Service |
EXOTIC LILY has used the e-mail notification features of legitimate file sharing services for spearphishing. |
enterprise |
T1597 |
Search Closed Sources |
EXOTIC LILY has searched for information on targeted individuals on business databases including RocketReach and CrunchBase. |
enterprise |
T1593 |
Search Open Websites/Domains |
- |
enterprise |
T1593.001 |
Social Media |
EXOTIC LILY has copied data from social media sites to impersonate targeted individuals. |
enterprise |
T1594 |
Search Victim-Owned Websites |
EXOTIC LILY has used contact forms on victim websites to generate phishing e-mails. |
enterprise |
T1608 |
Stage Capabilities |
- |
enterprise |
T1608.001 |
Upload Malware |
EXOTIC LILY has uploaded malicious payloads to file-sharing services including TransferNow, TransferXL, WeTransfer, and OneDrive. |
enterprise |
T1204 |
User Execution |
- |
enterprise |
T1204.001 |
Malicious Link |
EXOTIC LILY has used malicious links to lure users into executing malicious payloads. |
enterprise |
T1204.002 |
Malicious File |
EXOTIC LILY has gained execution through victims clicking on malicious LNK files contained within ISO files, which can execute hidden DLLs within the ISO. |
enterprise |
T1102 |
Web Service |
EXOTIC LILY has used file-sharing services including WeTransfer, TransferNow, and OneDrive to deliver payloads. |