Cyber Threat Report: 'CACTUS Ransomware: Prickly New Variant Evades Detection'

Report Author Kroll
Publication Date 2023-05-10
Original Reporting Source
Related Intrusion Sets CACTUS Ransomware Group

This report by Kroll outlines TTPs and IoCs associated with CACTUS ransomware actors.

Cyber Threat Graph Context

Explore how this report relates to the wider threat graph

Mitigations to defend against the techniques in this report

Identified MITRE ATT&CK Techniques

ATT&CK ID Title Associated Tactics
T1486 Data Encrypted for Impact Impact
T1090 Proxy Command and Control
T1219 Remote Access Software Command and Control
T1567.002 Exfiltration to Cloud Storage Exfiltration
T1119 Automated Collection Collection
T1570 Lateral Tool Transfer Lateral Movement
T1021.001 Remote Desktop Protocol Lateral Movement
T1018 Remote System Discovery Discovery
T1087 Account Discovery Discovery
T1087.002 Domain Account Discovery
T1049 System Network Connections Discovery Discovery
T1003 OS Credential Dumping Credential Access
T1555.003 Credentials from Web Browsers Credential Access
T1027 Obfuscated Files or Information Defense Evasion
T1027.002 Software Packing Defense Evasion
T1562.001 Disable or Modify Tools Defense Evasion
T1136 Create Account Persistence
T1072 Software Deployment Tools Execution, Lateral Movement
T1053.005 Scheduled Task Execution, Persistence, Privilege Escalation
T1059 Command and Scripting Interpreter Execution
T1190 Exploit Public-Facing Application Initial Access