Answers
Only blue teamers will use the ATT&CK Matrix? (Yay/Nay) Nay
What is the ID for this technique? T1566
Based on this technique, what mitigation covers identifying social engineering techniques? User Training
There are other possible areas for detection for this technique, which occurs after what other technique? User Execution
What group has used spear phishing in their campaigns? Dragonfly
Based on the information for this group, what are their associated groups? TG-4192,Crouching Yeti,IRON LIBERTY,Energetic Bear
What tool is attributed to this group to transfer tools or files from one host to another within a compromised environment? PsExec
Based on the information about this tool, what group used a customized version of it? FIN5
This group has been active since what year? 2008
Instead of Mimikatz, what OS Credential Dumping tool is does this group use? Windows Credential Editor
Last updated
Was this helpful?