Threat actors may utilize encryption to thwart security controls from reading/interpreting the data in transit.

Common types

Malware/Threat actors

Name Type Years Source
ETSO threat actor 2011-2013 ETSO_APT_Attacks_Analysis.pdf

Wild Neutron threat actor 2013-2015 WildNeutron_Economic_espionage.pdf

ICIT-Brief-Know-Your-Enemies-2.0.pdf

Energetic Bear threat actor 2010-2014 EB-YetiJuly2014-Public.pdf

Jaku malware 2015-2016 report_jaku_analysis_of_botnet_campaign_en_0.pdf

Dukes ThreatActor 2008-2015 dukes_whitepaper.pdf

Preventions

<Mitigation techniques>

Detections

<Detection techniques>

Toolkit

<Toolkit instructions, if applicable>

Similar techniques

References

  • [<Source name>](<Source link>)