ramimac / aws-customer-security-incidents

A repository of breaches of AWS customers
GNU General Public License v3.0
687 stars 40 forks source link

UNC3944 #125

Closed christophetd closed 6 months ago

christophetd commented 1 year ago

https://www.mandiant.com/resources/blog/unc3944-sms-phishing-sim-swapping-ransomware

We have observed evidence suggesting that UNC3944 may use various infostealers to support their operations. For example, the threat actors used a PowerShell script to download the ULTRAKNOT credential stealer (aka Meduza stealer) staged on the victim's AWS bucket. We have also observed the threat actors download or stage data miners such as VIDAR and ATOMIC.