ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool Depriz

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: Depriz

NamesDepriz
CategoryMalware
TypeWorm, Wiper
Description(Microsoft) The initial infection vector TERBIUM uses is unknown. As credentials have been hard-coded in the malware TERBIUM uses, it is suspected that TERBIUM has harvested credentials or infiltrated the target organization previously.
Step 1: Writing to disk
Step 2: Propagation and persistence through the target network
Step 3: Wiping the machine
Step 4: Rendering the machine unusable
Information<https://www.microsoft.com/security/blog/2016/12/09/windows-10-protection-detection-and-response-against-recent-attacks/>

Last change to this tool card: 20 April 2020

Download this tool card in JSON format

Previous: DEPLOYLOG
Next: DeputyDog

All groups using tool Depriz

ChangedNameCountryObserved

APT groups

 Terbium[Unknown]2012 

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]