Mustard Tempest is an initial access broker that has operated the SocGholish distribution network since at least 2017. Mustard Tempest has partnered with Indrik Spider to provide access for the download of additional malware including LockBit, WastedLocker, and remote access tools.[1][2][3][4]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1036 | .005 | 伪装: Match Legitimate Name or Location |
Mustard Tempest has used the filename |
| Enterprise | T1584 | .001 | 基础设施妥协: Domains |
Mustard Tempest operates a global network of compromised websites that redirect into a traffic distribution system (TDS) to select victims for a fake browser update page.[3][4][6][5] |
| Enterprise | T1608 | .001 | 暂存能力: Upload Malware |
Mustard Tempest has hosted payloads on acquired second-stage servers for periods of either days, weeks, or months.[6] |
| .004 | 暂存能力: Drive-by Target |
Mustard Tempest has injected malicious JavaScript into compromised websites to infect victims via drive-by download.[4][6][5][3] |
||
| .006 | 暂存能力: SEO Poisoning |
Mustard Tempest has poisoned search engine results to return fake software updates in order to distribute malware.[1][4] |
||
| Enterprise | T1189 | 浏览器攻击 |
Mustard Tempest has used drive-by downloads for initial infection, often using fake browser updates as a lure.[4][6][5][3] |
|
| Enterprise | T1204 | .001 | 用户执行: Malicious Link |
Mustard Tempest has lured users into downloading malware through malicious links in fake advertisements and spearphishing emails.[1][4] |
| Enterprise | T1082 | 系统信息发现 |
Mustard Tempest has used implants to perform system reconnaissance on targeted systems.[1] |
|
| Enterprise | T1583 | .004 | 获取基础设施: Server |
Mustard Tempest has acquired servers to host second-stage payloads that remain active for a period of either days, weeks, or months.[6] |
| .008 | 获取基础设施: Malvertising |
Mustard Tempest has posted false advertisements including for software packages and browser updates in order to distribute malware.[1] |
||
| Enterprise | T1105 | 输入工具传输 |
Mustard Tempest has deployed secondary payloads and third stage implants to compromised hosts.[1] |
|
| Enterprise | T1566 | .002 | 钓鱼: Spearphishing Link |
Mustard Tempest has sent victims emails containing links to compromised websites.[4] |