Confucius is a cyber espionage group that has primarily targeted military personnel, high-profile personalities, business persons, and government organizations in South Asia since at least 2013. Security researchers have noted similarities between Confucius and Patchwork, particularly in their respective custom malware code and targets.[1][2][3]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
Confucius has dropped malicious files into the startup folder |
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
Confucius has used PowerShell to execute malicious files and payloads.[2] |
| .005 | 命令与脚本解释器: Visual Basic | |||
| Enterprise | T1203 | 客户端执行漏洞利用 |
Confucius has exploited Microsoft Office vulnerabilities, including CVE-2015-1641, CVE-2017-11882, and CVE-2018-0802.[3][1] |
|
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols | |
| Enterprise | T1083 | 文件和目录发现 |
Confucius has used a file stealer that checks the Document, Downloads, Desktop, and Picture folders for documents and images with specific extensions.[2] |
|
| Enterprise | T1221 | 模板注入 |
Confucius has used a weaponized Microsoft Word document with an embedded RTF exploit.[3] |
|
| Enterprise | T1204 | .001 | 用户执行: Malicious Link |
Confucius has lured victims into clicking on a malicious link sent through spearphishing.[2] |
| .002 | 用户执行: Malicious File |
Confucius has lured victims to execute malicious attachments included in crafted spearphishing emails related to current topics.[3] |
||
| Enterprise | T1218 | .005 | 系统二进制代理执行: Mshta |
Confucius has used mshta.exe to execute malicious VBScript.[1] |
| Enterprise | T1082 | 系统信息发现 |
Confucius has used a file stealer that can examine system drives, including those other than the C drive.[2] |
|
| Enterprise | T1119 | 自动化收集 |
Confucius has used a file stealer to steal documents and images with the following extensions: txt, pdf, png, jpg, doc, xls, xlm, odp, ods, odt, rtf, ppt, xlsx, xlsm, docx, pptx, and jpeg.[2] |
|
| Enterprise | T1583 | .006 | 获取基础设施: Web Services |
Confucius has obtained cloud storage service accounts to host stolen data.[1] |
| Enterprise | T1105 | 输入工具传输 |
Confucius has downloaded additional files and payloads onto a compromised host following initial access.[3][2] |
|
| Enterprise | T1041 | 通过C2信道渗出 | ||
| Enterprise | T1567 | .002 | 通过网络服务渗出: Exfiltration to Cloud Storage |
Confucius has exfiltrated victim data to cloud storage service accounts.[1] |
| Enterprise | T1566 | .001 | 钓鱼: Spearphishing Attachment |
Confucius has crafted and sent victims malicious attachments to gain initial access.[3] |
| .002 | 钓鱼: Spearphishing Link |
Confucius has sent malicious links to victims through email campaigns.[2] |
||
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
Confucius has created scheduled tasks to maintain persistence on a compromised host.[2] |