See Technical Details section
Table 1 provides a summary of the MITRE ATT&CK techniques observed.
Table 1: MITRE ATT&CK techniques observed
Technique Title
| Technique ID
—|—
Process Injection: Dynamic-link Library Injection
|
Ingress Tool Transfer
|
User Execution: Malicious Link
|
Phishing: Spearphishing Link
|
May 28, 2021
attack.mitre.org/versions/v9/techniques/T1055/001/
attack.mitre.org/versions/v9/techniques/T1105/
attack.mitre.org/versions/v9/techniques/T1204/001/
attack.mitre.org/versions/v9/techniques/T1566/002/
public.govdelivery.com/accounts/USDHSCISA/subscriber/new?topic_id=USDHSCISA_138
twitter.com/CISAgov
twitter.com/intent/tweet?text=ATT%26CK%20Table%20for%20Sophisticated%20Spearphishing%20Campaign%20CSA+https://www.cisa.gov/news-events/cybersecurity-advisories/aa21-0000a
www.dhs.gov
www.dhs.gov/foia
www.dhs.gov/performance-financial-reports
www.facebook.com/CISA
www.facebook.com/sharer/sharer.php?u=https://www.cisa.gov/news-events/cybersecurity-advisories/aa21-0000a&title=ATT%26CK%20Table%20for%20Sophisticated%20Spearphishing%20Campaign%20CSA
www.instagram.com/cisagov
www.linkedin.com/company/cybersecurity-and-infrastructure-security-agency
www.linkedin.com/sharing/share-offsite/?url=https://www.cisa.gov/news-events/cybersecurity-advisories/aa21-0000a
www.oig.dhs.gov/
www.surveymonkey.com/r/CISA-cyber-survey?product=https://www.cisa.gov/news-events/cybersecurity-advisories/aa21-0000a
www.usa.gov/
www.whitehouse.gov/
www.youtube.com/@cisagov
mailto:?subject=ATT%26CK%20Table%20for%20Sophisticated%20Spearphishing%20Campaign%20CSA&body=www.cisa.gov/news-events/cybersecurity-advisories/aa21-0000a