Threat Actor Characterization
You’re viewing the read-only version.
Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
Lapsus$
ID: 15af095288f8cee571ae8f73e9a340e849031
Crimeware
Spyware/Stealer
Threat types: Intrusion, Social Engineering, Recruitment, Extortion, Phishing, Swapping
Progress: 84%
Completeness: 82%
Freshness: 90%
Operation zone: Brazil, France, Portugal, United Kingdom, United States
Aliases
Limited alias preview
| DEV-0537 | Strawberry Tempest | — | — |
Actor Network Graph
Open Network GraphMITRE ATT&CK®
confidence: medium-high
Lapsus$ is an extortion-focused cybercrime actor best characterized by identity- and workflow-centered intrusion paths. Public reporting emphasizes credential theft, helpdesk and contractor social engineering, telecom number takeovers that undermine SMS-based MFA, and rapid abuse of password reset and MFA enrollment processes. Once privileged access is obtained, the actor moves quickly to steal source code and sensitive documentation for extortion leverage, and in some cases destructive actions have been reported. Defensive priority is phishing-resistant MFA, hardened recovery and helpdesk processes, and detection of identity anomalies leading to mass repository access.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1566.002 | Spearphishing Link | TA0001 |
|
| T1078 | Valid Accounts | TA0001 TA0003 TA0004 TA0005 |
|
| T1110.003 | Password Spraying | TA0006 |
|
| T1621 | Multi-Factor Authentication Request Generation | TA0006 |
|
| T1556.006 | Multi-Factor Authentication | TA0003 TA0005 TA0006 |
|
| T1098 | Account Manipulation | TA0003 TA0004 |
|
| T1567.002 | Exfiltration to Cloud Storage | TA0010 |
|
| T1485 | Data Destruction | TA0040 |
|
Executive brief
now
Saved successfully.
Hunting Playbook
now
Saved successfully.
IOC Appendix
now
Saved successfully.
OSINT Library
now
Saved successfully.