Cleaver

Cleaver is a threat group that has been attributed to Iranian actors and is responsible for activity tracked as Operation Cleaver. [1] Strong circumstantial evidence suggests Cleaver is linked to Threat Group 2889 (TG-2889). [2]

ID: G0003
Associated Groups: Threat Group 2889, TG-2889
Version: 1.3
Created: 31 May 2017
Last Modified: 22 July 2022

Associated Group Descriptions

Name Description
Threat Group 2889

[2]

TG-2889

[2]

Techniques Used

Domain ID Name Use
Enterprise T1557 .002 中间人攻击: ARP Cache Poisoning

Cleaver has used custom tools to facilitate ARP cache poisoning.[1]

Enterprise T1585 .001 建立账户: Social Media Accounts

Cleaver has created fake LinkedIn profiles that included profile photos, details, and connections.[2]

Enterprise T1587 .001 开发能力: Malware

Cleaver has created customized tools and payloads for functions including ARP poisoning, encryption, credential dumping, ASP.NET shells, web backdoors, process enumeration, WMI querying, HTTP and SMB communications, network interface sniffing, and keystroke logging.[1]

Enterprise T1003 .001 操作系统凭证转储: LSASS Memory

Cleaver has been known to dump credentials using Mimikatz and Windows Credential Editor.[1]

Enterprise T1588 .002 获取能力: Tool

Cleaver has obtained and used open-source tools such as PsExec, Windows Credential Editor, and Mimikatz.[1]

Software

References