Storm-1811 is a financially-motivated entity linked to Black Basta ransomware deployment. Storm-1811 is notable for unique phishing and social engineering mechanisms for initial access, such as overloading victim email inboxes with non-malicious spam to prompt a fake "help desk" interaction leading to the deployment of adversary tools and capabilities.[1][2][3][4]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1087 | .002 | Account Discovery: Domain Account |
Storm-1811 has performed domain account enumeration during intrusions.[1] |
Enterprise | T1583 | .001 | Acquire Infrastructure: Domains |
Storm-1811 has created domains for use with RMM tools.[2] |
Enterprise | T1547 | .001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
Storm-1811 has created Windows Registry Run keys that execute various batch scripts to establish persistence on victim devices.[2] |
Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell |
Storm-1811 has used PowerShell for multiple purposes, such as using PowerShell scripts executing in an infinite loop to create an SSH connection to a command and control server.[2] |
.003 | Command and Scripting Interpreter: Windows Command Shell |
Storm-1811 has used multiple batch scripts during initial access and subsequent actions on victim machines.[1][2] |
||
Enterprise | T1486 | Data Encrypted for Impact |
Storm-1811 is a financially-motivated entity linked to the deployment of Black Basta ransomware in victim environments.[1] |
|
Enterprise | T1074 | .001 | Data Staged: Local Data Staging |
Storm-1811 has locally staged captured credentials for subsequent manual exfiltration.[2] |
Enterprise | T1140 | Deobfuscate/Decode Files or Information |
Storm-1811 has distributed password-protected archives such as ZIP files during intrusions.[2] |
|
Enterprise | T1482 | Domain Trust Discovery |
Storm-1811 has enumerated domain accounts and access during intrusions.[1] |
|
Enterprise | T1667 | Email Bombing |
Storm-1811 has deployed large volumes of non-malicious email spam to victims in order to prompt follow-on interactions with the threat actor posing as IT support or helpdesk to resolve the problem.[2][3] |
|
Enterprise | T1585 | .003 | Establish Accounts: Cloud Accounts |
Storm-1811 has created malicious accounts to enable activity via Microsoft Teams, typically spoofing various IT support and helpdesk themes.[1] |
Enterprise | T1048 | .002 | Exfiltration Over Alternative Protocol: Exfiltration Over Asymmetric Encrypted Non-C2 Protocol |
Storm-1811 has exfiltrated captured user credentials via Secure Copy Protocol (SCP).[2] |
Enterprise | T1222 | .001 | File and Directory Permissions Modification: Windows File and Directory Permissions Modification |
Storm-1811 has used |
Enterprise | T1574 | .001 | Hijack Execution Flow: DLL |
Storm-1811 has deployed a malicious DLL (7z.DLL) that is sideloaded by a modified, legitimate installer (7zG.exe) when that installer is executed with an additional command line parameter of |
Enterprise | T1656 | Impersonation |
Storm-1811 impersonates help desk and IT support personnel for phishing and social engineering purposes during initial access to victim environments.[1] |
|
Enterprise | T1105 | Ingress Tool Transfer |
Storm-1811 has used scripted |
|
Enterprise | T1056 | Input Capture |
Storm-1811 has used a PowerShell script to capture user credentials after prompting a user to authenticate to run a malicious script masquerading as a legitimate update item.[2] |
|
Enterprise | T1570 | Lateral Tool Transfer |
Storm-1811 has used the Impacket toolset to move and remotely execute payloads to other hosts in victim networks.[2] |
|
Enterprise | T1036 | Masquerading |
Storm-1811 has prompted users to download and execute batch scripts that masquerade as legitimate update files during initial access and social engineering operations.[2] |
|
.005 | Match Legitimate Resource Name or Location |
Storm-1811 has disguised Cobalt Strike installers as a malicious DLL masquerading as part of a legitimate 7zip installation package.[2] |
||
.010 | Masquerade Account Name |
Storm-1811 has created Microsoft Teams accounts that spoof IT support and helpdesk members for use in application and voice phishing.[1] |
||
Enterprise | T1027 | .013 | Obfuscated Files or Information: Encrypted/Encoded File |
Storm-1811 XOR encodes a Cobalt Strike installation payload in a DLL file that is decoded with a hardcoded key when called by a legitimate 7zip installation process.[2] |
Enterprise | T1588 | .002 | Obtain Capabilities: Tool |
Storm-1811 acquired various legitimate and malicious tools, such as RMM software and commodity malware packages, for operations.[1][2] |
Enterprise | T1566 | .002 | Phishing: Spearphishing Link |
Storm-1811 has distributed malicious links to victims that redirect to EvilProxy-based phishing sites to harvest credentials.[1] |
.003 | Phishing: Spearphishing via Service |
Storm-1811 has used Microsoft Teams to send messages and initiate voice calls to victims posing as IT support personnel.[1] |
||
.004 | Phishing: Spearphishing Voice |
Storm-1811 has initiated voice calls with victims posing as IT support to prompt users to download and execute scripts and other tools for initial access.[1][2][3] |
||
Enterprise | T1219 | .002 | Remote Access Tools: Remote Desktop Software |
Storm-1811 has abused multiple types of legitimate remote access software and tools, such as ScreenConnect, NetSupport Manager, and AnyDesk.[1][2] |
Enterprise | T1021 | .002 | Remote Services: SMB/Windows Admin Shares |
Storm-1811 has attempted to move laterally in victim environments via SMB using Impacket.[2] |
.004 | Remote Services: SSH |
Storm-1811 has used OpenSSH to establish an SSH tunnel to victims for persistent access.[1] |
||
Enterprise | T1033 | System Owner/User Discovery |
Storm-1811 has used |
|
Enterprise | T1204 | .002 | User Execution: Malicious File |
Storm-1811 has prompted users to execute downloaded software and payloads as the result of social engineering activity.[1][2][3] |