From: Foundations and applications of artificial Intelligence for zero-day and multi-step attack detection
APT campaign/group | Initial compromise | Lateral movement | C2 | Report | |||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Spear-phishing | Watering-hole attacks | Server attacks | Storage media | Standard OS tools | Hash and password dumping | Exploit vulnerabilities | HTTP/HTTPS | Others | Custom protocols | ||
HeartBeat | ✓ | ✓ | [93] | ||||||||
Icefog | ✓ | ✓ | ✓ | ✓ | [94] | ||||||
Darkhotel | ✓ | ✓ | ✓ | [95] | |||||||
Operation Cleaver | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | [96] | ||||
Shell Crew | ✓ | ✓ | ✓ | ✓ | [97] | ||||||
Regin | ✓ | ✓ | [98] | ||||||||
APT28 | ✓ | ✓ | ✓ | [99] | |||||||
Anunak | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | [100] | |||
Deep Panda | ✓ | ✓ | ✓ | ✓ | [101] | ||||||
Cozy Duke | ✓ | ✓ | [102] | ||||||||
Hellsing | ✓ | [103] | |||||||||
MsnMM (Naikon Group) | ✓ | ✓ | ✓ | [104] | |||||||
Carbanak | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | [105] | ||||
Duqu 2.0 | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | [106] | |||
Thamar Reservoir | ✓ | [107] | |||||||||
Naikon APT | ✓ | ✓ | ✓ | [108] | |||||||
APT30 | ✓ | ✓ | ✓ | [109] | |||||||
Woolen-Goldfish | ✓ | ✓ | ✓ | [110] | |||||||
EquationDrug (Equation Group) | ✓ | ✓ | ✓ | [111] | |||||||
Animal Farm | ✓ | [112] | |||||||||
Waterbug Group | ✓ | ✓ | ✓ | ✓ | [113] | ||||||
Desert Falcons | ✓ | ✓ | [114] |