Group5 is a threat group with a suspected Iranian nexus, though this attribution is not definite. The group has targeted individuals connected to the Syrian opposition via spearphishing and watering holes, normally using Syrian and Iranian themes. Group5 has used two commonly available remote access tools (RATs), njRAT and NanoCore, as well as an Android RAT, DroidJack.
Disclaimer: We present this mapping to stimulate thinking about active defense options to combat this adversary, not to present all possibilities. We invite you to use this as a guide and add your own use cases for applying Shield techniques to counter each adversary action.
Note: All ATT&CK Group sub-technique mappings have been remapped to their parent technique and were derived from Group Technique mappings in ATT&CK v8.
|ATT&CK Technique||Opportunity Space||AD Technique||Use Case|
|T1027 - Obfuscated Files or Information||In an adversary engagement scenario, there is an opportunity to introduce decoy systems that can influence an adversary's behavior or allow you to observe how they perform a specific task.||DTE0017 - Decoy System||A defender could implement a decoy system to study how and when an adversary obfuscate files and hides information.|
|T1056 - Input Capture||There is an opportunity to feed content to an adversary to influence their behaviors, test their interest in specific topics, or add legitimacy to a system or environment.||DTE0011 - Decoy Content||A defender can feed decoy data to an adversary that is using a key-logger or other tool, so as to shape the encounter.|
|T1070 - Indicator Removal on Host||In an adversary engagement scenario, there is an opportunity to allow or restrict admin access to support your defensive objectives.||DTE0001 - Admin Access||A defender can restrict admin access to force an adversary to escalate privileges in order to delete logs and captured artifacts from a system.|
|T1070 - Indicator Removal on Host||There is an opportunity to detect the presence of an adversary by identifying and alerting on anomalous behaviors.||DTE0007 - Behavioral Analytics||A defender can look for anomalies in how commands are being executed on a system. This can expose potentially malicious activity.|
|T1113 - Screen Capture||There is an opportunity to feed content to an adversary to influence their behaviors, test their interest in specific topics, or add legitimacy to a system or environment.||DTE0011 - Decoy Content||A defender can display decoy content on the screen which may be of interest to an adversary in an attempt to elicit further engagement.|