Encryption
Threat actors may utilize encryption to thwart security controls from reading/interpreting the data in transit.
Common types
Malware/Threat actors
Name | Type | Years | Source |
---|---|---|---|
ETSO | threat actor | 2011-2013 | ETSO_APT_Attacks_Analysis.pdf
|
Wild Neutron | threat actor | 2013-2015 | WildNeutron_Economic_espionage.pdf
ICIT-Brief-Know-Your-Enemies-2.0.pdf |
Energetic Bear | threat actor | 2010-2014 | EB-YetiJuly2014-Public.pdf
|
Jaku | malware | 2015-2016 | report_jaku_analysis_of_botnet_campaign_en_0.pdf
|
Dukes | ThreatActor | 2008-2015 | dukes_whitepaper.pdf
|
Preventions
<Mitigation techniques>
Detections
<Detection techniques>
Toolkit
<Toolkit instructions, if applicable>
Similar techniques
References
[<Source name>](<Source link>)