Winnti Group is a threat group with Chinese origins that has been active since at least 2010. The group has heavily targeted the gaming industry, but it has also expanded the scope of its targeting.[1][2][3] Some reporting suggests a number of other groups, including Axiom, APT17, and Ke3chang, are closely linked to Winnti Group.[4]
| Name | Description |
|---|---|
| Blackfly |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1014 | Rootkit |
Winnti Group used a rootkit to modify typical server functionality.[1] |
|
| Enterprise | T1083 | 文件和目录发现 |
Winnti Group has used a program named ff.exe to search for specific documents on compromised hosts.[1] |
|
| Enterprise | T1583 | .001 | 获取基础设施: Domains |
Winnti Group has registered domains for C2 that mimicked sites of their intended targets.[1] |
| Enterprise | T1105 | 输入工具传输 |
Winnti Group has downloaded an auxiliary program named ff.exe to infected machines.[1] |
|
| Enterprise | T1057 | 进程发现 |
Winnti Group looked for a specific process running on infected servers.[1] |
|
| Enterprise | T1553 | .002 | 颠覆信任控制: Code Signing |
Winnti Group used stolen certificates to sign its malware.[1] |