Answers

Only blue teamers will use the ATT&CK Matrix? (Yay/Nay) Nay

What is the ID for this technique? T1566

Based on this technique, what mitigation covers identifying social engineering techniques? User Training

There are other possible areas for detection for this technique, which occurs after what other technique? User Execution

What group has used spear phishing in their campaigns? Dragonfly

Based on the information for this group, what are their associated groups? TG-4192,Crouching Yeti,IRON LIBERTY,Energetic Bear

What tool is attributed to this group to transfer tools or files from one host to another within a compromised environment? PsExec

Based on the information about this tool, what group used a customized version of it? FIN5

This group has been active since what year? 2008

Instead of Mimikatz, what OS Credential Dumping tool is does this group use? Windows Credential Editor

Last updated

Was this helpful?