ThreatZone GCC 2024
ThreatZone GCC 2024
Contents
Introduction 3
About BI.ZONE 39
2 www.bi.zone
Threat Zone GCC 2024
Introduction
■ hacktivism: Hyenas
■ financial gain: Wolves
■ espionage: Werewolves
3 www.bi.zone
Threat Zone GCC 2024
Part 1
Explores initial access techniques and examples of how
adversaries find their way into the victim’s infrastructure.
Part 2
Reveals how malicious actors establish a foothold in the target
system and what routines they utilize to achieve this goal.
Part 3
Includes our findings of how adversaries discover
a compromised infrastructure.
Part 4
Describes common techniques used by threat actors to move
laterally and further impact the infrastructure.
4 www.bi.zone
Threat Zone GCC 2024
Key takeaways
10
Financial Arthro Wolf Use stolen credentials
motivation to infiltrate
Static Wolf the infrastructure. activity clusters
reviewed in
Actively deploy the report
ransomware in their
attacks
Cyber
espionage
Golden Werewolf Exploit vulnerabilities
and deploy web shells
8 in 10
clusters focus
Noble Werewolf to gain initial access.
on espionage
Iron Werewolf Leverage custom and
commercial malware,
Wonder Werewolf as well as full-featured
post-exploitation
Dancing Werewolf frameworks
Winged Werewolf
Dissent Werewolf
Targets a variety
of industries:
government, telecom,
insurance, retail,
education, media,
healthcare, finance
5 www.bi.zone
Threat Zone GCC 2024
6 www.bi.zone
Threat Zone GCC 2024
MITRE ATT&CK matrix with a heat map Used by 5 and more groups Used by 4 groups Used by 3 groups or less
Tactic Technique
Command Exploitation for Native API Scheduled System Services User Execution Windows
Execution and Scripting Client Execution Task/Job Management
Interpreter Instrumentation
Boot or Logon Create Account Create or Modify Event External Remote Hijack Execution Modify Scheduled Server Software Valid Accounts
Persistence Autostart Execution System Process Triggered Execution Services Flow Authentication Task/Job Component
Process
Abuse Elevation Exploitation for Hijack Execution Process Valid Accounts Access Token
Privilege Escalation Control Mechanism Privilege Escalation Flow Injection Manipulation
Abuse Elevation Deobfuscate/ Domain Hide Hijack Impair Impersonation Indicator Indirect Masquerading
Defense Evasion Control Decode Files or Tenant Policy Artifacts Execution Flow Defenses Removal Command
Mechanism or Information Modification Execution
Brute Force Credentials from Forge Web Input Modify OS Credential Steal or Forge Unsecured
Credential Access Password Stores Credentials Capture Authentication Dumping Kerberos Tickets Credentials
Process
Account Discovery Domain Trust File and Directory Group Policy Network Share Permission Groups Process Discovery Remote System Software Discovery System Information
Discovery Discovery Discovery Discovery Discovery Discovery Discovery Discovery
Archive Collected Automated Clipboard Data Data from Data from Local Data from Network Data Staged Email Collection Input Capture Screen Capture
Collection Data Collection Information System Shared Drive
Repositories
Application Layer Data Encoding Encrypted Channel Ingress Tool Protocol Tunneling Proxy Remote Access Web Service
Command and Control Protocol Transfer Software
Account Access Data Destruction Data Encrypted Inhibit System Service Stop
Impact Removal for Impact Recovery
7 www.bi.zone
Threat Zone GCC 2024
Part 1
Initial Access
Wonder Werewolf
8 www.bi.zone
Threat Zone GCC 2024
External Remote
Services (T1133)
Noble Werewolf
9 www.bi.zone
Threat Zone GCC 2024
Noble Werewolf
It uses a wide range of initial access techniques,
including the ones that abuse external remote services,
phishing, and strategic web compromise. The adversary Target countries:
uses both off-the-shelf and custom malware like Latin America, Middle East,
MAPLoader. UK, USA
Arthro Wolf
10 www.bi.zone
Threat Zone GCC 2024
Exploit Public-Facing
Application (T1190)
Many clusters active in the region still use quite old vulnerabilities
in Internet-facing systems to obtain initial access.
Golden Werewolf
11 www.bi.zone
Threat Zone GCC 2024
Golden Werewolf
Iron Werewolf
12 www.bi.zone
Threat Zone GCC 2024
Phishing
(T1566)
Storm Hyena
13 www.bi.zone
Threat Zone GCC 2024
Storm Hyena
Wonder Werewolf
Aliases: WIP26
14 www.bi.zone
Threat Zone GCC 2024
Dancing Werewolf
Drive-by
Compromise (T1189)
15 www.bi.zone
Threat Zone GCC 2024
Dancing Werewolf
16 www.bi.zone
Threat Zone GCC 2024
Winged Werewolf
17 www.bi.zone
Threat Zone GCC 2024
Part 2
Establishing a Foothold
Winged Werewolf
18 www.bi.zone
Threat Zone GCC 2024
Windows Management
Instrumentation (T1047)
19 www.bi.zone
Threat Zone GCC 2024
Dissent Werewolf
Event Triggered
Execution (T1546.003)
20 www.bi.zone
Threat Zone GCC 2024
Server Software
Component (T1505)
Since many threat actors, which are active in the region, focus
on exploiting public-facing applications, especially, Microsoft
Exchange servers, they often deploy web shells (T1505.003)
to enable post-exploitation.
Access Token
Manipulation (T1134)
21 www.bi.zone
Threat Zone GCC 2024
rundll32 C:\Windows\System32\pbrtl.dll,#1
Process Injection
(T1055)
22 www.bi.zone
Threat Zone GCC 2024
OS Credential Dumping
(T1003)
23 www.bi.zone
Threat Zone GCC 2024
Modify Authentication
Process (T1556)
Application Layer
Protocol (T1071)
24 www.bi.zone
Threat Zone GCC 2024
Protocol Tunneling
(T1572)
25 www.bi.zone
Threat Zone GCC 2024
Remote Access
Software (T1219)
Dissent Werewolf
26 www.bi.zone
Threat Zone GCC 2024
Part 3
Infrastructure Discovery
In this part of the report, we will look at how various threat actors
perform compromised infrastructure discovery.
Iron Werewolf
27 www.bi.zone
Threat Zone GCC 2024
Static Wolf
28 www.bi.zone
Threat Zone GCC 2024
Account Discovery
(T1087)
Static Wolf
The threat actors use leaked LockBit builder to execute Target countries: France,
ransomware attacks worldwide. The group is known Hong Kong, Malaysia, UAE,
to obtain initial access through compromised valid USA
accounts.
Target industries: various
Active since: April 2024
Aliases: EstateRansomware
29 www.bi.zone
Threat Zone GCC 2024
System Information
Discovery (T1082)
Permission Groups
Discovery (T1069)
30 www.bi.zone
Threat Zone GCC 2024
Software Discovery
(T1518)
Remote System
Discovery (T1018)
31 www.bi.zone
Threat Zone GCC 2024
Part 4
Lateral Movement
and Impact
Desert Wolf
32 www.bi.zone
Threat Zone GCC 2024
PsExec.exe -i -s powershell.exe
33 www.bi.zone
Threat Zone GCC 2024
OS Credential Dumping
(T1003)
34 www.bi.zone
Threat Zone GCC 2024
35 www.bi.zone
Threat Zone GCC 2024
36 www.bi.zone
Threat Zone GCC 2024
Exfiltration Over C2
Channel (T1041)
37 www.bi.zone
Threat Zone GCC 2024
Data Encrypted
for Impact (T1486)
Arthro Wolf
38 www.bi.zone
About BI.ZONE
600+
protected clients
800+
investigated incidents
1,200+
completed projects
1,000+
cybersecurity experts
Contact us:
info@bi.zone