Threat Actor Characterization
You’re viewing the read-only version.
Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
Higaisa
ID: 79d7fbc6ef93162410575461edf91a2675141
Cybercrime
State-Sponsored
Threat types: Intrusion, Espionage, Malware
Progress: 35%
Completeness: 28%
Freshness: 50%
Operation zone: UNKNOWN
Aliases
Limited alias preview
No aliases registered.
Actor Network Graph
Open Network GraphMITRE ATT&CK®
confidence: medium
Higaisa is a threat group suspected to have South Korean origins. Higaisa has targeted government, public, and trade organizations in North Korea; however, they have also carried out attacks in China, Japan, Russia, Poland, and other nations. Higaisa was first disclosed in early 2019 but is assessed to have operated as early as 2009. Ref: https://attack.mitre.org/groups/G0126/
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1001.003 | Protocol or Service Impersonation | TA0011 |
|
| T1027.001 | Binary Padding | TA0005 |
|
| T1027.013 | Encrypted/Encoded File | TA0005 |
|
| T1027.015 | Compression | TA0005 |
|
| T1036.004 | Masquerade Task or Service | TA0005 |
|
| T1053.005 | Scheduled Task | TA0002 TA0003 TA0004 |
|
| T1059.003 | Windows Command Shell | TA0002 |
|
| T1059.005 | Visual Basic | TA0002 |
|
| T1059.007 | JavaScript | TA0002 |
|
| T1071.001 | Web Protocols | TA0011 |
|
| T1090.001 | Internal Proxy | TA0011 |
|
| T1204.002 | Malicious File | TA0002 |
|
| T1547.001 | Registry Run Keys / Startup Folder | TA0003 TA0004 |
|
| T1564.003 | Hidden Window | TA0005 |
|
| T1566.001 | Spearphishing Attachment | TA0001 |
|
| T1573.001 | Symmetric Cryptography | TA0011 |
|
| T1574.001 | DLL | TA0003 TA0004 TA0005 |
|
Executive brief
now
Saved successfully.
Hunting Playbook
now
Saved successfully.
IOC Appendix
now
Saved successfully.
OSINT Library
now
Saved successfully.