HAFNIUM is a likely state-sponsored cyber espionage group operating out of China that has been active since at least January 2021. HAFNIUM primarily targets entities in the US across a number of industry sectors, including infectious disease researchers, law firms, higher education institutions, defense contractors, policy think tanks, and NGOs.[1][2]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1005 | 从本地系统获取数据 |
HAFNIUM has collected data and files from a compromised machine.[4] |
|
| Enterprise | T1136 | .002 | 创建账户: Domain Account | |
| Enterprise | T1190 | 利用公开应用程序漏洞 |
HAFNIUM has exploited CVE-2021-44228 in Log4j and CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065 to compromise on-premises versions of Microsoft Exchange Server.[1][2][5][6][7] |
|
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
HAFNIUM has used the Exchange Power Shell module |
| .003 | 命令与脚本解释器: Windows Command Shell |
HAFNIUM has used |
||
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
HAFNIUM has used open-source C2 frameworks, including Covenant.[1] |
| Enterprise | T1560 | .001 | 归档收集数据: Archive via Utility |
HAFNIUM has used 7-Zip and WinRAR to compress stolen files for exfiltration.[1][2] |
| Enterprise | T1003 | .001 | 操作系统凭证转储: LSASS Memory |
HAFNIUM has used |
| .003 | 操作系统凭证转储: NTDS |
HAFNIUM has stolen copies of the Active Directory database (NTDS.DIT).[2] |
||
| Enterprise | T1592 | .004 | 收集受害者主机信息: Client Configurations |
HAFNIUM has interacted with Office 365 tenants to gather details regarding target's environments.[1] |
| Enterprise | T1590 | 收集受害者网络信息 |
HAFNIUM gathered the fully qualified domain names (FQDNs) for targeted Exchange servers in the victim's environment.[2] |
|
| .005 | IP Addresses |
HAFNIUM has obtained IP addresses for publicly-accessible Exchange servers.[2] |
||
| Enterprise | T1589 | .002 | 收集受害者身份信息: Email Addresses |
HAFNIUM has collected e-mail addresses for users they intended to target.[2] |
| Enterprise | T1132 | .001 | 数据编码: Standard Encoding | |
| Enterprise | T1083 | 文件和目录发现 |
HAFNIUM has searched file contents on a compromised host.[4] |
|
| Enterprise | T1078 | .003 | 有效账户: Local Accounts |
HAFNIUM has used the NT AUTHORITY\SYSTEM account to create files on Exchange servers.[5] |
| Enterprise | T1505 | .003 | 服务器软件组件: Web Shell |
HAFNIUM has deployed multiple web shells on compromised servers including SIMPLESEESHARP, SPORTSBALL, China Chopper, and ASPXSpy.[1][2][5][6][4] |
| Enterprise | T1114 | .002 | 电子邮件收集: Remote Email Collection | |
| Enterprise | T1218 | .011 | 系统二进制代理执行: Rundll32 | |
| Enterprise | T1033 | 系统所有者/用户发现 | ||
| Enterprise | T1016 | 系统网络配置发现 | ||
| .001 | Internet Connection Discovery |
HAFNIUM has checked for network connectivity from a compromised host using |
||
| Enterprise | T1583 | .003 | 获取基础设施: Virtual Private Server |
HAFNIUM has operated from leased virtual private servers (VPS) in the United States.[1] |
| .006 | 获取基础设施: Web Services |
HAFNIUM has acquired web services for use in C2 and exfiltration.[1] |
||
| Enterprise | T1098 | 账号操控 | ||
| Enterprise | T1105 | 输入工具传输 |
HAFNIUM has downloaded malware and tools--including Nishang and PowerCat--onto a compromised host.[1][4] |
|
| Enterprise | T1057 | 进程发现 | ||
| Enterprise | T1018 | 远程系统发现 |
HAFNIUM has enumerated domain controllers using |
|
| Enterprise | T1567 | .002 | 通过网络服务渗出: Exfiltration to Cloud Storage |
HAFNIUM has exfiltrated data to file sharing sites, including MEGA.[1] |
| Enterprise | T1564 | .001 | 隐藏伪装: Hidden Files and Directories | |
| Enterprise | T1095 | 非应用层协议 | ||