Center for Threat-Informed Defense

Version 14.1 15.0

Campaigns : Mobile ATT&CK Changelog

Added Campaigns

Description

C0033 was a PROMETHIUM campaign during which they used StrongPity to target Android users. C0033 was the first publicly documented mobile campaign for PROMETHIUM, who previously used Windows-based techniques.[1]

References:

  1. Stefanko, L. (2023, January 10). StrongPity espionage campaign targeting Android users. Retrieved January 31, 2023.

Modified Campaigns

Description

Operation Dust Storm was a long-standing persistent cyber espionage campaign that targeted multiple industries in Japan, South Korea, the United States, Europe, and several Southeast Asian countries. By 2015, the Operation Dust Storm threat actors shifted from government and defense-related intelligence targets to Japanese companies or Japanese subdivisions of larger foreign organizations supporting Japan's critical infrastructure, including electricity generation, oil and natural gas, finance, transportation, and construction.[1]

Operation Dust Storm threat actors also began to use Android backdoors in their operations by 2015, with all identified victims at the time residing in Japan or South Korea.[1]

References:

  1. Gross, J. (2016, February 23). Operation Dust Storm. Retrieved December 22, 2021.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-09-30 21:05:22.490000+00:00 2024-04-11 00:30:42.003000+00:00
x_mitre_attack_spec_version 3.0.0 3.2.0
x_mitre_version 1.0 1.1