Winnti Group is a threat group with Chinese origins that has been active since at least 2010. The group has heavily targeted the gaming industry, but it has also expanded the scope of its targeting.[1][2][3] Some reporting suggests a number of other groups, including Axiom, APT17, and Ke3chang, are closely linked to Winnti Group.[4]
Name | Description |
---|---|
Blackfly |
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1583 | .001 | Acquire Infrastructure: Domains |
Winnti Group has registered domains for C2 that mimicked sites of their intended targets.[1] |
Enterprise | T1083 | File and Directory Discovery |
Winnti Group has used a program named ff.exe to search for specific documents on compromised hosts.[1] |
|
Enterprise | T1105 | Ingress Tool Transfer |
Winnti Group has downloaded an auxiliary program named ff.exe to infected machines.[1] |
|
Enterprise | T1057 | Process Discovery |
Winnti Group looked for a specific process running on infected servers.[1] |
|
Enterprise | T1014 | Rootkit |
Winnti Group used a rootkit to modify typical server functionality.[1] |
|
Enterprise | T1553 | .002 | Subvert Trust Controls: Code Signing |
Winnti Group used stolen certificates to sign its malware.[1] |