Group description: Naikon

attack.mitre.org · MITRE ATT&CK · 8 years ago · news
quality 2/10 · low quality
0 net
Tags
Naikon, Group G0019 | MITRE ATT&CK® ATT&CK v19 will be released April 28th! Check out this blog post for information on the planned deprecation of Enterprise's Defense Evasion tactic in the upcoming release. Home Groups Naikon Naikon Naikon is assessed to be a state-sponsored cyber espionage group attributed to the Chinese People’s Liberation Army’s (PLA) Chengdu Military Region Second Technical Reconnaissance Bureau (Military Unit Cover Designator 78020). [1] Active since at least 2010, Naikon has primarily conducted operations against government, military, and civil organizations in Southeast Asia, as well as against international bodies such as the United Nations Development Programme (UNDP) and the Association of Southeast Asian Nations (ASEAN). [1] [2] While Naikon shares some characteristics with APT30 , the two groups do not appear to be exact matches. [3] ID:  G0019 Contributors : Kyaw Pyiyt Htet, @KyawPyiytHtet Version : 2.0 Created:  31 May 2017 Last Modified:  25 April 2025 Version Permalink Live Version ATT&CK ® Navigator Layers Enterprise Layer download view Techniques Used Domain ID Name Use Enterprise T1547 .001 Boot or Logon Autostart Execution : Registry Run Keys / Startup Folder Naikon has modified a victim's Windows Run registry to establish persistence. [4] Enterprise T1574 .001 Hijack Execution Flow : DLL Naikon has used DLL side-loading to load malicious DLL's into legitimate executables. [5] Enterprise T1036 .004 Masquerading : Masquerade Task or Service Naikon renamed a malicious service taskmgr to appear to be a legitimate version of Task Manager. [4] .005 Masquerading : Match Legitimate Resource Name or Location Naikon has disguised malicious programs as Google Chrome, Adobe, and VMware executables. [4] Enterprise T1046 Network Service Discovery Naikon has used the LadonGo scanner to scan target networks. [4] Enterprise T1137 .006 Office Application Startup : Add-ins Naikon has used the RoyalRoad exploit builder to drop a second stage loader, intel.wll, into the Word Startup folder on the compromised host. [5] Enterprise T1566 .001 Phishing : Spearphishing Attachment Naikon has used malicious e-mail attachments to deliver malware. [5] Enterprise T1018 Remote System Discovery Naikon has used a netbios scanner for remote machine identification. [4] Enterprise T1053 .005 Scheduled Task/Job : Scheduled Task Naikon has used schtasks.exe for lateral movement in compromised networks. [4] Enterprise T1518 .001 Software Discovery : Security Software Discovery Naikon uses commands such as netsh advfirewall firewall to discover local firewall settings. [2] Enterprise T1016 System Network Configuration Discovery Naikon uses commands such as netsh interface show to discover network interface settings. [2] Enterprise T1204 .002 User Execution : Malicious File Naikon has convinced victims to open malicious attachments to execute malware. [5] Enterprise T1078 .002 Valid Accounts : Domain Accounts Naikon has used administrator credentials for lateral movement in compromised networks. [4] Enterprise T1047 Windows Management Instrumentation Naikon has used WMIC.exe for lateral movement. [4] Software ID Name References Techniques S0456 Aria-body [5] [4] Access Token Manipulation : Create Process with Token , Access Token Manipulation : Token Impersonation/Theft , Application Layer Protocol : Web Protocols , Application Window Discovery , Archive Collected Data , Boot or Logon Autostart Execution : Registry Run Keys / Startup Folder , Data from Removable Media , Deobfuscate/Decode Files or Information , Dynamic Resolution : Domain Generation Algorithms , File and Directory Discovery , Indicator Removal : File Deletion , Ingress Tool Transfer , Local Storage Discovery , Native API , Non-Application Layer Protocol , Obfuscated Files or Information : Encrypted/Encoded File , Process Discovery , Process Injection : Dynamic-link Library Injection , Proxy , Screen Capture , System Information Discovery , System Network Configuration Discovery , System Network Connections Discovery , System Owner/User Discovery S0095 ftp [2] Exfiltration Over Alternative Protocol : Exfiltration Over Unencrypted Non-C2 Protocol , Ingress Tool Transfer , Lateral Tool Transfer S0061 HDoor [2] Impair Defenses : Disable or Modify Tools , Network Service Discovery S0630 Nebulae [4] Boot or Logon Autostart Execution : Registry Run Keys / Startup Folder , Command and Scripting Interpreter : Windows Command Shell , Create or Modify System Process : Windows Service , Data from Local System , Encrypted Channel : Symmetric Cryptography , File and Directory Discovery , Hijack Execution Flow : DLL , Indicator Removal : File Deletion , Ingress Tool Transfer , Local Storage Discovery , Masquerading : Masquerade Task or Service , Masquerading : Match Legitimate Resource Name or Location , Native API , Non-Application Layer Protocol , Process Discovery S0039 Net [2] [4] Account Discovery : Domain Account , Account Discovery : Local Account , Account Manipulation : Additional Local or Domain Groups , Create Account : Local Account , Create Account : Domain Account , Indicator Removal : Network Share Connection Removal , Network Share Discovery , Password Policy Discovery , Permission Groups Discovery : Domain Groups , Permission Groups Discovery : Local Groups , Remote Services : SMB/Windows Admin Shares , Remote System Discovery , System Network Connections Discovery , System Service Discovery , System Services : Service Execution , System Time Discovery S0108 netsh [2] Event Triggered Execution : Netsh Helper DLL , Impair Defenses : Disable or Modify System Firewall , Proxy , Software Discovery : Security Software Discovery S0097 Ping [2] [4] Remote System Discovery S0029 PsExec [2] Create Account : Domain Account , Create or Modify System Process : Windows Service , Lateral Tool Transfer , Remote Services : SMB/Windows Admin Shares , System Services : Service Execution S0629 RainyDay [4] Application Layer Protocol : Web Protocols , Command and Scripting Interpreter : Windows Command Shell , Create or Modify System Process : Windows Service , Credentials from Password Stores : Credentials from Web Browsers , Credentials from Password Stores : Windows Credential Manager , Data from Local System , Data Staged : Local Data Staging , Deobfuscate/Decode Files or Information , Encrypted Channel : Symmetric Cryptography , Exfiltration Over Web Service : Exfiltration to Cloud Storage , Fallback Channels , File and Directory Discovery , Hijack Execution Flow : DLL , Indicator Removal : File Deletion , Ingress Tool Transfer , Masquerading : Match Legitimate Resource Name or Location , Masquerading : Masquerade Task or Service , Native API , Non-Application Layer Protocol , Obfuscated Files or Information : Encrypted/Encoded File , Process Discovery , Proxy , Scheduled Task/Job : Scheduled Task , Screen Capture , System Service Discovery S0055 RARSTONE [2] [1] File and Directory Discovery , Ingress Tool Transfer , Non-Application Layer Protocol , Process Injection : Dynamic-link Library Injection S0058 SslMM [2] [1] Access Token Manipulation , Boot or Logon Autostart Execution : Shortcut Modification , Boot or Logon Autostart Execution : Registry Run Keys / Startup Folder , Fallback Channels , Impair Defenses : Disable or Modify Tools , Input Capture : Keylogging , Masquerading : Match Legitimate Resource Name or Location , System Information Discovery , System Owner/User Discovery S0060 Sys10 [2] Application Layer Protocol : Web Protocols , Encrypted Channel : Symmetric Cryptography , Permission Groups Discovery : Local Groups , System Information Discovery , System Network Configuration Discovery , System Owner/User Discovery S0096 Systeminfo [2] System Information Discovery S0057 Tasklist [2] Process Discovery , Software Discovery : Security Software Discovery , System Service Discovery S0059 WinMM [2] [1] Application Layer Protocol : Web Protocols , Fallback Channels , File and Directory Discovery , Process Discovery , System Information Discovery , System Owner/User Discovery References ThreatConnect Inc. and Defense Group Inc. (DGI). (2015, September 23). Project CameraShy: Closing the Aperture on China's Unit 78020. Retrieved December 17, 2015. Baumgartner, K., Golovkin, M.. (2015, May). The MsnMM Campaigns: The Earliest Naikon APT Campaigns. Retrieved April 10, 2019. Baumgartner, K., Golovkin, M.. (2015, May 14). The Naikon APT. Retrieved January 14, 2015. Vrabie, V. (2021, April 23). NAIKON – Traces from a Military Cyber-Espionage Operation. Retrieved June 29, 2021. CheckPoint. (2020, May 7). Naikon APT: Cyber Espionage Reloaded. Retrieved May 26, 2020. × load more results