Threat actors known for targeting the technology industry in ireland.

TA2541
Main techniques used
  • Acquire Infrastructure
  • Boot or Logon Autostart Execution
  • Command and Scripting Interpreter
  • Dynamic Resolution
  • Encrypted Channel
  • Impair Defenses
  • Ingress Tool Transfer
  • Masquerading
  • Obfuscated Files or Information
  • Obtain Capabilities
  • Phishing
  • Process Injection
  • Scheduled Task/Job
  • Software Discovery
  • Stage Capabilities
  • System Binary Proxy Execution
  • System Information Discovery
  • System Network Configuration Discovery
  • User Execution
  • Windows Management Instrumentation
Suckfly
Main techniques used
  • Command and Scripting Interpreter
  • Network Service Discovery
  • OS Credential Dumping
  • Subvert Trust Controls
  • Valid Accounts
TA505
Main techniques used
  • Account Discovery
  • Acquire Infrastructure
  • Application Layer Protocol
  • Command and Scripting Interpreter
  • Credentials from Password Stores
  • Data Encrypted for Impact
  • Deobfuscate/Decode Files or Information
  • Dynamic Resolution
  • Impair Defenses
  • Ingress Tool Transfer
  • Inter-Process Communication
  • Modify Registry
  • Native API
  • Obfuscated Files or Information
  • Obtain Capabilities
  • Permission Groups Discovery
  • Phishing
  • Process Injection
  • Stage Capabilities
  • Subvert Trust Controls
  • System Binary Proxy Execution
  • Unsecured Credentials
  • User Execution
  • Valid Accounts

Stay Informed, Protected, Ahead

Monitoring your threat landscape is essential for anticipating cyber events before they occur. By identifying emerging risks early, your organization can allocate resources more effectively and take proactive measures before it's too late.

Contact our team to set up a customized threat analysis and monitoring solution that aligns with your security needs.


Contact Us