MARCH'S THREAT: HAFNIUM THREAT GROUP |
The Rise of State-Sponsored Threat GroupsHAFNIUM is a state-sponsored group that primarily targets entities in the United States across many industry sectors, including infectious disease researchers, law firms, higher education institutions, defense contractors, policy think tanks, and NGOs.
You can test the effectiveness of your security controls against the HAFNIUM threat group with '719575 HAFNIUM Threat Group Exchange Server Post-Exploitation Scenario" in Picus Threat Library. You can also validate your defenses against malware samples used by HAFNIUM with Picus ThreatID 3719270 and webshell samples with Picus ThreatIDs 510920 and 349535 in Picus Threat Library.
In this article, we analyzed Tactics, Techniques, and Procedures (TTPs) utilized by the HAFNIUM threat actor to understand their attack methods and the impact of this breach. |
MARCH'S THREAT ACTORS |
HAFNIUM
MuddyWater
Mustang Panda
Our world-class red team analyzed 500.000 TTPs to identify the top 10 most common ATT&CK techniques. Download Now: The Red Report: Your Handbook to Utilize MITRE ATT&CK Framework |
ATTACK SCENARIOS |
Atomic AttacksWindows Kernel Win32k Elevation of Privilege Scenario
Shellcode Execution via EnumChildWindows Callback Function
Watch our webinar, we dig down into T1055 Process Injection as the no. 1 technique in the Picus 10 Critical MITRE ATT&CK Techniques list.
Credential Dumping via RtlReportSilentProcessExit API Call
For more information on MITRE ATT&CK T1003 Credential Dumping, here is the blog post you can read:
|
MALICIOUS CODE |
HAFNIUM
HelloKitty Ransomware
DEWMODE Dropper used by UNC2546 Threat Group
|
WEB APPLICATION ATTACKS |
Microsoft Exchange Server Unauthorized SSRF Vulnerability Variant-1
VMware View Planner Remote Code Execution Vulnerability Variant-1
GitLab Path Traversal Vulnerability
|
VULNERABILITY EXPLOITATIONS |
Microsoft Appx Deployment Service Elevation of Privilege Vulnerability
Win32k Denial of Service Vulnerability .EXE File Download Variant-5
Windows Installer Service Privilege Escalation Vulnerability
![]() |
SIGMA RULES |
Credential Dumping From Keepass Database
Data Collection with 7z.exe via Commandline
Credential Dumping via Procdump
|
PICUS LABS MONTHLY #March 2021

Emerging Threat
Palo Alto CVE-2024-0012 and CVE-2024-9474 Vulnerabilities Explained

Emerging Threat
Understanding and Mitigating Midnight Blizzard's RDP-Based Spear Phishing Campaign

Emerging Threat
CVE-2024-47575: FortiManager Missing Authentication Zero-Day Vulnerability Explained

Emerging Threat
Iranian Cyber Actors’ Brute Force and Credential Access Attacks: CISA Alert AA24-290A

Emerging Threat
CISA Alert AA24-249A: Russian GRU Unit 29155 Targeting U.S. and Global Critical Infrastructure

Emerging Threat
CVE-2024-38063: Remote Kernel Exploitation via IPv6 in Windows

Emerging Threat
RansomHub Ransomware Analysis, Simulation, and Mitigation - CISA Alert AA24-242A

Emerging Threat
Pioneer Kitten: Iranian Threat Actors Facilitate Ransomware Attacks Against U.S. Organizations

Emerging Threat
Andariel: North Korean APT Group Targets Military and Nuclear Programs