

Attribution | Classification |
|---|---|
Threat Type | Criminal Group (High Confidence Attribution) |
State Affiliation | None Confirmed |
Primary Sectors Targeted | Financial Services Information Technology Healthcare |
Core Techniques | 54 Attack Techniques 25 Tool Relationships |
Geographic Reach | Global with a Focus on Developemed Economies |
Strategic Evolution | Cloud-First → Critical Infrastructure Targeting |
CVE ID | Vendor/Product | Risk Index | Initial Access Technique Name | Exploitation Complexity |
|---|---|---|---|---|
CVE-2021-35464 | ForgeRock AM | Critical | Exploit Public-Facing Application | Low |
CVE-2022-41328 | Fortinet FortiOS | High | Exploit Public-Facing Application | Medium |
CVE-2024-37085 | VMware ESXi | High | External Remote Services | Medium |
Technique ID | Technique Name |
|---|---|
T1190 | Exploit Public-Facing Application |
T1133 | External Remote Services |
T1566.002 | Phishing: Spearphishing Link |
T1566.004 | Phishing: Spearphishing Voice |
T1598.001 | Phishing for Information: Spearphishing Service |
T1598.004 | Phishing for Information: Spearphishing Voice |

Vulnerability Type | CVE Count | Risk Level | Primary Impact | Exploitation Frequency |
|---|---|---|---|---|
Deserialization Flaws | 1 | Critical | Remote Code Execution | High |
Path Traversal | 1 | High | File System Access | Medium |
Authentication Bypass | 1 | High | Privilege Escalation | High |
Memory Corruption | 1 | High | Code Execution | Medium |
Privilege Escalation | 1 | High | System Compromise | High |

CWE ID | CWE Name | Associated CVEs | Risk Impact |
|---|---|---|---|
CWE-502 | Deserialization of Untrusted Data | CVE-2021-35464 | Critical |
CWE-20 | Improper Input Validation | CVE-2015-2291 | High |
CWE-22 | Improper Limitation of a Pathname to a Restricted Directory | CVE-2022-41328 | High |
CWE-119 | Improper Restriction of Operations within the Bounds of a Memory Buffer | CVE-2015-2291 | High |
CWE-787 | Out-of-bounds Write | CVE-2022-21882 | High |
CWE-287 | Improper Authentication | CVE-2024-37085 | High |
CWE-305 | Authentication Bypass by Primary Weakness | CVE-2024-37085 | High |
Tool Category | Primary Tools | Operational Role | Frequency |
|---|---|---|---|
Credential Access | Mimikatz, Lazagne | Credential Dumping | High |
Remote Access | Ngrok, Warzonerat | Persistence/C2 | High |
Ransomware | BlackCat, RansomHub, Qilin | Impact/Extortion | High |
Social Engineering | SMS Phishing, Phishing Websites | Initial Access | Critical |
Network Tools | Impacket | Lateral Movement | Medium |
Living Off Land | Windows Native Tools | Stealth Operations | High |
Technique ID | Technique Name | Number of Sub-techniques | Purpose |
|---|---|---|---|
T1087 | Account Discovery | 4 sub-techniques | Reconnaissance |
T1018 | Remote System Discovery | 0 sub-techniques | Reconnaissance |
T1046 | Network Service Discovery | 0 sub-techniques | Reconnaissance |
T1069 | Permission Groups Discovery | 1 sub-technique | Reconnaissance |
T1083 | File and Directory Discovery | 0 sub-techniques | Reconnaissance |
T1217 | Browser Information Discovery | 0 sub-techniques | Reconnaissance |
T1538 | Cloud Service Dashboard | 0 sub-techniques | Reconnaissance |
T1580 | Cloud Infrastructure Discovery | 0 sub-techniques | Reconnaissance |
T1589 | Gather Victim Identity Information | 1 sub-technique | Reconnaissance |
T1593 | Search Open Websites/Domains: Social Media | 1 sub-techniques | Reconnaissance |
T1594 | Search Victim-Owned Websites | 0 sub-techniques | Reconnaissance |
T1597 | Search Closed Sources: Purchase Technical Data | 1 sub-techniques | Reconnaissance |
T1583 | Acquire Infrastructure: Domains | 1 sub-techniques | Resource Development |
T1585 | Establish Accounts: Social Media Accounts | 1 sub-techniques | Resource Development |
T1588 | Obtain Capabilities | 1 sub-technique | Resource Development |
T1566 | Phishing | 3 sub-techniques | Initial Access |
T1190 | Exploit Public-Facing Application | 0 sub-techniques | Initial Access |
T1204 | User Execution | 1 sub-technique | Initial Access |
T1656 | Impersonation | 0 sub-techniques | Initial Access |
T1660 | Phishing | 1 sub-technique | Initial Access |
T1199 | Trusted Relationship | 0 sub-techniques | Initial Access |
T1078 | Valid Accounts: Domain Accounts | 0 sub-techniques | Initial Access |
T1648 | Serverless Execution | 0 sub-techniques | Execution |
T1098 | Account Manipulation | 3 sub-techniques | Persistence |
T1133 | External Remote Services | 0 sub-techniques | Persistence |
T1136 | Create Account | 1 sub-technique | Persistence |
T1451 | SIM Card Swap | 0 sub-techniques | Persistence |
T1068 | Exploitation for Privilege Escalation | 0 sub-techniques | Privilege Escalation |
T1598 | Phishing for Information | 4 sub-techniques | Credential Harvesting |
T1003 | OS Credential Dumping | 2 sub-techniques | Credential Access |
T1552 | Unsecured Credentials | 2 sub-techniques | Credential Access |
T1006 | Direct Volume Access | 0 sub-techniques | Credential Access |
T1539 | Steal Web Session Cookie | 0 sub-techniques | Credential Access |
T1621 | Multi-Factor Authentication Request Generation | 0 sub-techniques | Credential Access |
T1021 | Remote Services | 1 sub-technique | Lateral Movement |
T1047 | Windows Management Instrumentation | 0 sub-techniques | Lateral Movement |
T1556 | Modify Authentication Process | 4 sub-techniques | Defense Evasion |
T1078 | Valid Accounts | 2 sub-techniques | Defense Evasion |
T1484 | Domain Policy Modification | 2 sub-techniques | Defense Evasion |
T1553 | Subvert Trust Controls | 1 sub-technique | Defense Evasion |
T1564 | Hide Artifacts | 1 sub-technique | Defense Evasion |
T1578 | Modify Cloud Compute Infrastructure | 2 sub-techniques | Defense Evasion |
T1213 | Data from Information Repositories | 4 sub-techniques | Data Collection |
T1074 | Data Staged | 0 sub-techniques | Data Collection |
T1114 | Email Collection | 0 sub-techniques | Data Collection |
T1530 | Data from Cloud Storage | 0 sub-techniques | Data Collection |
T1567 | Exfiltration Over Web Service | 1 sub-technique | Exfiltration |
T1090 | Proxy | 0 sub-techniques | Command and Control |
T1102 | Web Service | 0 sub-techniques | Command and Control |
T1105 | Ingress Tool Transfer | 0 sub-techniques | Command and Control |
T1219 | Remote Access Software | 0 sub-techniques | Command and Control |
T1572 | Protocol Tunneling | 0 sub-techniques | Command and Control |
T1486 | Data Encrypted for Impact | 0 sub-techniques | Impact |
T1657 | Financial Theft | 0 sub-techniques | Impact |

Region | Target Countries | Strategic Rationale |
|---|---|---|
Global | Worldwide Operations | Financial gain maximization across developed economies |
Primary Focus | United States, United Kingdom | High-value targets with advanced financial infrastructure |
Secondary | Canada, Australia | English-speaking targets with similar business practices |
Capability Category | Assessment Level | Evidence/Indicators |
|---|---|---|
Social Engineering | Advanced | Sophisticated SMS/voice phishing, SIM swapping |
Technical Exploitation | High | 5 CVEs across multiple vendors, complex attack chains |
Operational Security | High | Successful evasion of law enforcement until recent arrests |
Tool Development | Medium | Primarily uses existing tools with custom configurations |
Intelligence Gathering | Advanced | Detailed target reconnaissance, insider knowledge |
Persistence Mechanisms | High | Cloud infrastructure abuse, legitimate tool exploitation |
Campaign | Target Sectors | Primary TTPs | Vulnerabilities Exploited | Timeline |
|---|---|---|---|---|
Post-Arrest Operations | Airlines, Critical Infrastructure | Social Engineering, DragonForce Ransomware | CVE-2024-37085 | 2024-Present |
Copycat Proliferation | Financial Services, Healthcare | SMS Phishing, Backup System Targeting | Legacy CVEs | 2024-Present |
Cloud Infrastructure Attacks | IT Services, SaaS Providers | Valid Account Abuse, Cloud Service Dashboard | Authentication Bypass | Ongoing |
Risk Category | Mitigation Strategy | Implementation Priority | Expected Impact |
|---|---|---|---|
Social Engineering | Employee training, verification procedures | Critical | High |
Vulnerability Exploitation | Patch management, vulnerability scanning | High | High |
Credential Compromise | MFA, privileged access management | Critical | High |
Ransomware Deployment | Backup security, network segmentation | High | Medium |
Cloud Infrastructure Abuse | Cloud security posture management | High | Medium |