PoseidonCrew Inactive
Ransomware group first observed in 2016. Uses WinSCP for deployment.0
Total Victims
2016-03-01
First Seen
2017-08-16
Last Seen
15
Known TTPs
29.8d
Avg Delay
0
Negotiations
ONION URLS
inkt4d5aixt6tnczayqlzy4wi6fy6zsfiwx27upbz5bflggpafwrkcq5.onion
TOOLS
WinSCP
PowerTool
7-Zip
MegaSync
ngrok
FILE EXTENSIONS
.locked
ACTIVITY TIMELINE
TOP SECTORS
TOP COUNTRIES
ACTIVITY HEATMAP
| Date | Victim Name | Country | Sector | Status |
|---|---|---|---|---|
| No victims recorded | ||||
| Technique ID | Technique Name | Tactic |
|---|---|---|
| T1074.001 | Local Data Staging | Collection |
| T1219 | Remote Access Software | Command and Control |
| T1572 | Protocol Tunneling | Command and Control |
| T1218.011 | Rundll32 | Defense Evasion |
| T1562.009 | Safe Mode Boot | Defense Evasion |
| T1082 | System Information Discovery | Discovery |
| T1059.001 | PowerShell | Execution |
| T1059.003 | Windows Command Shell | Execution |
| T1041 | Exfiltration Over C2 Channel | Exfiltration |
| T1567.002 | Exfiltration to Cloud Storage | Exfiltration |
| T1133 | External Remote Services | Initial Access |
| T1190 | Exploit Public-Facing Application | Initial Access |
| T1566.002 | Spearphishing Link | Initial Access |
| T1021.004 | SSH | Lateral Movement |
| T1570 | Lateral Tool Transfer | Lateral Movement |
No YARA rules
No ransom notes