Back to Resources

SentinelOne Detects Pteranodon, by Gamaredon Group

Gamaredon Group is a threat group that has been active since at least 2013 and has targeted individuals likely involved in the Ukrainian government.
Tools used by Gamaredon Group:
– Remote File Copy – Capable of downloading and executing additional payloads
– Scripting – Various batch scripts to establish C2, download additional files, and conduct other functions.
– Peripheral Device Discovery – Gamaredon Group tools contained an application to check the performance of USB flash drives.
– Data from Removable Media – File stealer, can steal data from newly connected logical volumes on a system, including USB drives.
– Exfiltration Over Command and Control Channel – A Gamaredon Group file stealer transfers collected files to a hardcoded C2 server.
– Standard Application Layer Protocol – A file stealer can communicate over HTTP for C2.
– System Information Discovery – A file stealer can gather the victim’s computer name and drive serial numbers to send to a C2 server.
– System Owner/User Discovery – A file stealer can gather the victim’s username to submit to a C2 server.
For more info on SentinelOne, visit https://www.sentinelone.com/platform/

-~-

지금 읽기

세계에서 가장 앞선 사이버 보안 플랫폼 경험하기

지능적인 자율형 사이버 보안 플랫폼이 현재와 미래의 조직을 어떻게 보호할 수 있는지 알아보세요.