Adversary Threat Emulation Plan

Threat Actor: APT29

Desired Impact: Data Exfiltration

Emulation Plan

Creating an adversary emulation plan for the threat actor APT29 with a focus on Data Exfiltration involves understanding their tactics and tools while focusing on mitigations. Here’s a detailed plan that incorporates known techniques:

Scenario Overview

APT29 is known to engage in complex cyber espionage operations, often targeting financial institutions and government agencies. They are highly skilled at exfiltrating sensitive data using various methods.

Desired Impact: Data Exfiltration

The goal is to capture or steal data from the target systems.

Known Techniques for Data Exfiltration

  1. Multi-Factor Authentication Request Generation
  2. Security Account Manager (SAM)
  3. Tool, Domain Fronting
  4. Steal Application Access Token
  5. Dynamic Resolution
  6. Exploitation for Privilege Escalation
  7. Windows Management Instrumentation Event Subscription
  8. Registry Run Keys / Startup Folder
  9. Cloud Account
  10. Device Registration