Threat Actor Characterization
You’re viewing the read-only version.
Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
Machete
ID: 883e080d18d9f405b9bd7c70d5f5fa2368920
Cybercrime
State-Sponsored
Threat types: Intrusion, Espionage, Data Theft
Progress: 38%
Completeness: 33%
Freshness: 50%
Operation zone: UNKNOWN
Aliases
Limited alias preview
| APT-C-43 | El Machete | — | — |
Actor Network Graph
Open Network GraphMITRE ATT&CK®
confidence: medium
Machete is a suspected Spanish-speaking cyber espionage group that has been active since at least 2010. It has primarily focused its operations within Latin America, with a particular emphasis on Venezuela, but also in the US, Europe, Russia, and parts of Asia. Machete generally targets high-profile organizations such as government institutions, intelligence services, and military units, as well as telecommunications and power companies. Ref: https://attack.mitre.org/groups/G0095/
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1036.005 | Match Legitimate Resource Name or Location | TA0005 |
|
| T1053.005 | Scheduled Task | TA0002 TA0003 TA0004 |
|
| T1059.003 | Windows Command Shell | TA0002 |
|
| T1059.005 | Visual Basic | TA0002 |
|
| T1059.006 | Python | TA0002 |
|
| T1204.001 | Malicious Link | TA0002 |
|
| T1204.002 | Malicious File | TA0002 |
|
| T1218.007 | Msiexec | TA0005 |
|
| T1566.001 | Spearphishing Attachment | TA0001 |
|
| T1566.002 | Spearphishing Link | TA0001 |
|
Executive brief
now
Saved successfully.
Hunting Playbook
now
Saved successfully.
IOC Appendix
now
Saved successfully.
OSINT Library
now
Saved successfully.