Elderwood

Elderwood is a suspected Chinese cyber espionage group that was reportedly responsible for the 2009 Google intrusion known as Operation Aurora. [1] The group has targeted defense organizations, supply chain manufacturers, human rights and nongovernmental organizations (NGOs), and IT service providers. [2] [3]

ID: G0066
Associated Groups: Elderwood Gang, Beijing Group, Sneaky Panda
Contributors: Valerii Marchuk, Cybersecurity Help s.r.o.
Version: 1.3
Created: 18 April 2018
Last Modified: 11 April 2024

Associated Group Descriptions

Name Description
Elderwood Gang

[2] [3]

Beijing Group

[3]

Sneaky Panda

[3]

Techniques Used

Domain ID Name Use
Enterprise T1203 客户端执行漏洞利用

Elderwood has used exploitation of endpoint software, including Microsoft Internet Explorer Adobe Flash vulnerabilities, to gain execution. They have also used zero-day exploits.[2]

Enterprise T1189 浏览器攻击

Elderwood has delivered zero-day exploits and malware to victims by injecting malicious code into specific public Web pages visited by targets within a particular sector.[2][3][1]

Enterprise T1027 .002 混淆文件或信息: Software Packing

Elderwood has packed malware payloads before delivery to victims.[2]

.013 混淆文件或信息: Encrypted/Encoded File

Elderwood has encrypted documents and malicious executables.[2]

Enterprise T1204 .001 用户执行: Malicious Link

Elderwood has leveraged multiple types of spearphishing in order to attempt to get a user to open links.[2][3]

.002 用户执行: Malicious File

Elderwood has leveraged multiple types of spearphishing in order to attempt to get a user to open attachments.[2][3]

Enterprise T1105 输入工具传输

The Ritsol backdoor trojan used by Elderwood can download files onto a compromised host from a remote location.[4]

Enterprise T1566 .001 钓鱼: Spearphishing Attachment

Elderwood has delivered zero-day exploits and malware to victims via targeted emails containing malicious attachments.[2][3]

.002 钓鱼: Spearphishing Link

Elderwood has delivered zero-day exploits and malware to victims via targeted emails containing a link to malicious content hosted on an uncommon Web server.[2][3]

Software

ID Name References Techniques
S0204 Briba [2] 创建或修改系统进程: Windows Service, 启动或登录自动启动执行: Registry Run Keys / Startup Folder, 系统二进制代理执行: Rundll32, 输入工具传输
S0203 Hydraq [2] 从本地系统获取数据, 修改注册表, 共享模块, 创建或修改系统进程: Windows Service, 加密通道: Symmetric Cryptography, 屏幕捕获, 文件和目录发现, 替代协议渗出, 查询注册表, 混淆文件或信息, 移除指标: File Deletion, 移除指标: Clear Windows Event Logs, 系统信息发现, 系统服务: Service Execution, 系统服务发现, 系统网络配置发现, 访问令牌操控, 输入工具传输, 进程发现
S0211 Linfo [2] 从本地系统获取数据, 命令与脚本解释器: Windows Command Shell, 回退信道, 文件和目录发现, 移除指标: File Deletion, 系统信息发现, 输入工具传输, 进程发现, 预定传输
S0205 Naid [2] 修改注册表, 创建或修改系统进程: Windows Service, 系统信息发现, 系统网络配置发现
S0210 Nerex [2] 修改注册表, 创建或修改系统进程: Windows Service, 输入工具传输, 颠覆信任控制: Code Signing
S0208 Pasam [2] 从本地系统获取数据, 启动或登录自动启动执行: LSASS Driver, 文件和目录发现, 移除指标: File Deletion, 系统信息发现, 输入工具传输, 进程发现
S0012 PoisonIvy [2] Rootkit, 从本地系统获取数据, 修改注册表, 创建或修改系统进程: Windows Service, 加密通道: Symmetric Cryptography, 启动或登录自动启动执行: Registry Run Keys / Startup Folder, 启动或登录自动启动执行: Active Setup, 命令与脚本解释器: Windows Command Shell, 应用窗口发现, 执行保护: Mutual Exclusion, 数据分段: Local Data Staging, 混淆文件或信息, 输入工具传输, 输入捕获: Keylogging, 进程注入: Dynamic-link Library Injection
S0207 Vasport [2] 代理, 启动或登录自动启动执行: Registry Run Keys / Startup Folder, 应用层协议: Web Protocols, 输入工具传输
S0206 Wiarp [2] 创建或修改系统进程: Windows Service, 命令与脚本解释器: Windows Command Shell, 输入工具传输, 进程注入

References