Threat Actor Characterization
You’re viewing the read-only version.
Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
Axiom
ID: 2c5d94dd609855f43c21c46744afec3d82642
Cybercrime
State-Sponsored
Threat types: Intrusion, Espionage, Malware
Progress: 38%
Completeness: 33%
Freshness: 50%
Operation zone: UNKNOWN
Aliases
Limited alias preview
| Group 72 | — | — | — |
Actor Network Graph
Open Network GraphMITRE ATT&CK®
confidence: medium
Axiom is a suspected Chinese cyber espionage group that has targeted the aerospace, defense, government, manufacturing, and media sectors since at least 2008. Some reporting suggests a degree of overlap between Axiom and Winnti Group but the two groups appear to be distinct based on differences in reporting on TTPs and targeting. Ref: https://attack.mitre.org/groups/G0001/
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1001.002 | Steganography | TA0011 |
|
| T1021.001 | Remote Desktop Protocol | TA0008 |
|
| T1546.008 | Accessibility Features | TA0003 TA0004 |
|
| T1563.002 | RDP Hijacking | TA0008 |
|
| T1583.002 | DNS Server | TA0042 |
|
| T1583.003 | Virtual Private Server | TA0042 |
|
| T1584.005 | Botnet | TA0042 |
|
Executive brief
now
Saved successfully.
Hunting Playbook
now
Saved successfully.
IOC Appendix
now
Saved successfully.
OSINT Library
now
Saved successfully.