Trellix Insights: UNC2891 performing unauthorized cash withdrawals
Last Modified: 2022-08-26 12:20:00 Etc/GMT
Trellix CEO, Bryan Palma, explains the critical need for security that’s always learning.
As per Gartner, "XDR is an emerging technology that can offer improved threat prevention, detection and response."
Trellix announced the establishment of the Trellix Advanced Research Center to advance global threat intelligence.
Trellix Advanced Research Center analyzes threat data on ransomware, nation-states, sectors, vectors, LotL, MITRE ATT&CK techniques, and emails.
After December 1, 2024, please log in to the Thrive Portal for support, knowledge articles, tools, and downloads. For information about using the Thrive Portal, view the Trellix Thrive Portal User Guide.
Trellix Insights: UNC2891 performing unauthorized cash withdrawals
Technical Articles ID:
KB95587
Last Modified: 2022-08-26 12:20:00 Etc/GMT Environment
IMPORTANT: This Knowledge Base article discusses a specific threat that is being automatically tracked by Trellix Insights technology. The content is intended for use by Trellix Insights users, but is provided for general knowledge to all customers. Contact us for more information about Trellix Insights.
Summary
Description of Campaign The UNC2891 threat group was discovered using private malware, utilities, and scripts to carry out attacks against the financial sector. The actor uses the CAKETAP rootkit to breach a victim's Automatic Teller Machine switching network and perform unauthorized cash withdrawals. UNC2891 also makes extensive use of multiple backdoors to maintain persistence and steal credentials. Our ATR Team gathers and analyzes information from multiple open and closed sources before disseminating intelligence reports. This campaign was researched by Mandiant and shared publicly. How to use this article:
This Knowledge Base article discusses a specific threat that's being tracked. The list of IOCs will change over time; check Trellix Insights for the latest IOCs. Campaign IOC
Minimum Content Versions
Detection Summary
Affected Products |
|