Silence is a financially motivated threat actor targeting financial institutions in different countries. The group was first seen in June 2016. Their main targets reside in Russia, Ukraine, Belarus, Azerbaijan, Poland and Kazakhstan. They compromised various banking systems, including the Russian Central Bank's Automated Workstation Client, ATMs, and card processing.[1][2]
| Name | Description |
|---|---|
| Whisper Spider |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1090 | .002 | 代理: External Proxy |
Silence has used ProxyBot, which allows the attacker to redirect traffic from the current node to the backconnect server via Sock4\Socks5.[4] |
| Enterprise | T1036 | .005 | 伪装: Match Legitimate Name or Location | |
| Enterprise | T1112 | 修改注册表 |
Silence can create, delete, or modify a specified Registry key or value.[4] |
|
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
Silence has used |
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
Silence has used PowerShell to download and execute payloads.[1][4] |
| .003 | 命令与脚本解释器: Windows Command Shell |
Silence has used Windows command-line to run commands.[1][2][4] |
||
| .005 | 命令与脚本解释器: Visual Basic | |||
| .007 | 命令与脚本解释器: JavaScript | |||
| Enterprise | T1113 | 屏幕捕获 | ||
| Enterprise | T1003 | .001 | 操作系统凭证转储: LSASS Memory |
Silence has used the Farse6.1 utility (based on Mimikatz) to extract credentials from lsass.exe.[4] |
| Enterprise | T1078 | 有效账户 |
Silence has used compromised credentials to log on to other systems and escalate privileges.[4] |
|
| Enterprise | T1106 | 本机API |
Silence has leveraged the Windows API, including using CreateProcess() or ShellExecute(), to perform a variety of tasks.[2][4] |
|
| Enterprise | T1027 | .010 | 混淆文件或信息: Command Obfuscation |
Silence has used environment variable string substitution for obfuscation.[1] |
| Enterprise | T1204 | .002 | 用户执行: Malicious File |
Silence attempts to get users to launch malicious attachments delivered via spearphishing emails.[1][2][4] |
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
Silence has deleted artifacts, including scheduled tasks, communicates files from the C2 and other logs.[1][4] |
| Enterprise | T1218 | .001 | 系统二进制代理执行: Compiled HTML File |
Silence has weaponized CHM files in their phishing campaigns.[1][2][5][4] |
| Enterprise | T1569 | .002 | 系统服务: Service Execution |
Silence has used Winexe to install a service on the remote system.[2][4] |
| Enterprise | T1588 | .002 | 获取能力: Tool |
Silence has obtained and modified versions of publicly-available tools like Empire and PsExec.[5] [2] |
| Enterprise | T1125 | 视频捕获 |
Silence has been observed making videos of victims to observe bank employees day to day activities.[2][4] |
|
| Enterprise | T1072 | 软件部署工具 |
Silence has used RAdmin, a remote software tool used to remotely control workstations and ATMs.[4] |
|
| Enterprise | T1105 | 输入工具传输 |
Silence has downloaded additional modules and malware to victim’s machines.[4] |
|
| Enterprise | T1055 | 进程注入 |
Silence has injected a DLL library containing a Trojan into the fwmain32.exe process.[4] |
|
| Enterprise | T1021 | .001 | 远程服务: Remote Desktop Protocol | |
| Enterprise | T1018 | 远程系统发现 |
Silence has used Nmap to scan the corporate network, build a network topology, and identify vulnerable hosts.[4] |
|
| Enterprise | T1566 | .001 | 钓鱼: Spearphishing Attachment |
Silence has sent emails with malicious DOCX, CHM, LNK and ZIP attachments. [1][2][4] |
| Enterprise | T1571 | 非标准端口 |
Silence has used port 444 when sending data about the system from the client to the server.[4] |
|
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task | |
| Enterprise | T1553 | .002 | 颠覆信任控制: Code Signing |
Silence has used a valid certificate to sign their primary loader Silence.Downloader (aka TrueBot).[5] |