Cinnamon Tempest is a China-based threat group that has been active since at least 2021 deploying multiple strains of ransomware based on the leaked Babuk source code. Cinnamon Tempest does not operate their ransomware on an affiliate model or purchase access but appears to act independently in all stages of the attack lifecycle. Based on victimology, the short lifespan of each ransomware variant, and use of malware attributed to government-sponsored threat groups, Cinnamon Tempest may be motivated by intellectual property theft or cyberespionage rather than financial gain.[1][2][3][4]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1047 | Windows管理规范 |
Cinnamon Tempest has used Impacket for lateral movement via WMI.[1][5] |
|
| Enterprise | T1090 | 代理 |
Cinnamon Tempest has used a customized version of the Iox port-forwarding and proxy tool.[5] |
|
| Enterprise | T1543 | .003 | 创建或修改系统进程: Windows Service |
Cinnamon Tempest has created system services to establish persistence for deployed tooling.[5] |
| Enterprise | T1190 | 利用公开应用程序漏洞 |
Cinnamon Tempest has exploited multiple unpatched vulnerabilities for initial access including vulnerabilities in Microsoft Exchange, Manage Engine AdSelfService Plus, Confluence, and Log4j.[1][7][5][4] |
|
| Enterprise | T1574 | .001 | 劫持执行流: DLL Search Order Hijacking |
Cinnamon Tempest has used search order hijacking to launch Cobalt Strike Beacons.[1][4] |
| .002 | 劫持执行流: DLL Side-Loading |
Cinnamon Tempest has abused legitimate executables to side-load weaponized DLLs.[5] |
||
| Enterprise | T1572 | 协议隧道 |
Cinnamon Tempest has used the Iox and NPS proxy and tunneling tools in combination create multiple connections through a single tunnel.[5] |
|
| Enterprise | T1140 | 反混淆/解码文件或信息 |
Cinnamon Tempest has used weaponized DLLs to load and decrypt payloads.[5] |
|
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
Cinnamon Tempest has used PowerShell to communicate with C2, download files, and execute reconnaissance commands.[5] |
| .003 | 命令与脚本解释器: Windows Command Shell |
Cinnamon Tempest has executed ransomware using batch scripts deployed via GPO.[1] |
||
| .006 | 命令与脚本解释器: Python |
Cinnamon Tempest has used a customized version of the Impacket wmiexec.py module to create renamed output files.[1] |
||
| Enterprise | T1484 | .001 | 域或租户策略修改: Group Policy Modification |
Cinnamon Tempest has used Group Policy to deploy batch scripts for ransomware deployment.[1] |
| Enterprise | T1078 | 有效账户 |
Cinnamon Tempest has used compromised user accounts to deploy payloads and create system services.[5] |
|
| .002 | Domain Accounts |
Cinnamon Tempest has obtained highly privileged credentials such as domain administrator in order to deploy malware.[1] |
||
| Enterprise | T1080 | 污染共享内容 |
Cinnamon Tempest has deployed ransomware from a batch file in a network share.[1] |
|
| Enterprise | T1588 | .002 | 获取能力: Tool |
Cinnamon Tempest has used open-source tools including customized versions of the Iox proxy tool, NPS tunneling tool, Meterpreter, and a keylogger that uploads data to Alibaba cloud storage.[5][4] |
| Enterprise | T1657 | 财务窃取 |
Cinnamon Tempest has maintained leak sites for exfiltrated data in attempt to extort victims into paying a ransom.[1] |
|
| Enterprise | T1105 | 输入工具传输 |
Cinnamon Tempest has downloaded files, including Cobalt Strike, to compromised hosts.[5] |
|
| Enterprise | T1021 | .002 | 远程服务: SMB/Windows Admin Shares |
Cinnamon Tempest has used SMBexec for lateral movement.[5] |
| Enterprise | T1567 | .002 | 通过网络服务渗出: Exfiltration to Cloud Storage |
Cinnamon Tempest has uploaded captured keystroke logs to the Alibaba Cloud Object Storage Service, Aliyun OSS.[5] |