Threat Actor Characterization
You’re viewing the read-only version.
Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
Repellent Scorpius
ID: 9eaee6864d7b12fb70aac239d2ce625931690
Cybercrime
Cybercriminal
Threat types: Ransomware
Progress: 64%
Completeness: 61%
Freshness: 70%
Operation zone: —
Aliases
Limited alias preview
No aliases registered.
Actor Network Graph
Open Network GraphMITRE ATT&CK®
confidence: medium
Repellent Scorpius is publicly described as a ransomware-as-a-service (RaaS) distributor that deploys the Cicada3301 ransomware in a double-extortion model. Incident-response reporting documents initial access via RDP with stolen credentials, batch-script orchestration, PsExec-based remote execution, Rclone-based data exfiltration, pre-impact service/VM stopping behaviors, and encryption for impact. Infrastructure indicators are time-bounded and may overlap with other ransomware ecosystems.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1021.001 | Remote Desktop Protocol | TA0008 |
|
| T1078 | Valid Accounts | TA0001 TA0003 TA0004 TA0005 |
|
| T1059.001 | PowerShell | TA0002 |
|
| T1569.002 | Service Execution | TA0002 |
|
| T1041 | Exfiltration Over C2 Channel | TA0010 |
|
| T1105 | Ingress Tool Transfer | TA0011 |
|
| T1489 | Service Stop | TA0040 |
|
| T1486 | Data Encrypted for Impact | TA0040 |
|
| T1490 | Inhibit System Recovery | TA0040 |
|
Executive brief
now
Saved successfully.
Hunting Playbook
now
Saved successfully.
IOC Appendix
now
Saved successfully.
OSINT Library
now
Saved successfully.