Skip to content

Hide Navigation Hide TOC

Volatile Cedar - G0123 (b2e34388-6938-4c59-a702-80dc219e15e3)

Volatile Cedar is a Lebanese threat group that has targeted individuals, companies, and institutions worldwide. Volatile Cedar has been operating since 2012 and is motivated by political and ideological interests.(Citation: CheckPoint Volatile Cedar March 2015)(Citation: ClearSky Lebanese Cedar Jan 2021)

Cluster A Galaxy A Cluster B Galaxy B Level
Web Shell - T1505.003 (5d0d3609-d06d-49e1-b9c9-b544e0c618cb) Attack Pattern Volatile Cedar - G0123 (b2e34388-6938-4c59-a702-80dc219e15e3) Intrusion Set 1
Volatile Cedar - G0123 (b2e34388-6938-4c59-a702-80dc219e15e3) Intrusion Set Caterpillar WebShell - S0572 (751b77e6-af1f-483b-93fe-eddf17f92a64) Malware 1
Volatile Cedar - G0123 (b2e34388-6938-4c59-a702-80dc219e15e3) Intrusion Set Exploit Public-Facing Application - T1190 (3f886f2a-874f-4333-b794-aa6075009b1c) Attack Pattern 1
Volatile Cedar - G0123 (b2e34388-6938-4c59-a702-80dc219e15e3) Intrusion Set Explosive - S0569 (6a21e3a4-5ffe-4581-af9a-6a54c7536f44) Malware 1
Volatile Cedar - G0123 (b2e34388-6938-4c59-a702-80dc219e15e3) Intrusion Set Wordlist Scanning - T1595.003 (bed04f7d-e48a-4e76-bd0f-4c57fe31fc46) Attack Pattern 1
Volatile Cedar - G0123 (b2e34388-6938-4c59-a702-80dc219e15e3) Intrusion Set Ingress Tool Transfer - T1105 (e6919abc-99f9-4c6c-95a5-14761e7b2add) Attack Pattern 1
Vulnerability Scanning - T1595.002 (5502c4e9-24ef-4d5f-8ee9-9e906c2f82c4) Attack Pattern Volatile Cedar - G0123 (b2e34388-6938-4c59-a702-80dc219e15e3) Intrusion Set 1
Web Shell - T1505.003 (5d0d3609-d06d-49e1-b9c9-b544e0c618cb) Attack Pattern Server Software Component - T1505 (d456de47-a16f-4e46-8980-e67478a12dcb) Attack Pattern 2
System Owner/User Discovery - T1033 (03d7999c-1f4c-42cc-8373-e7690d318104) Attack Pattern Caterpillar WebShell - S0572 (751b77e6-af1f-483b-93fe-eddf17f92a64) Malware 2
System Information Discovery - T1082 (354a7f88-63fb-41b5-a801-ce3b377b36f1) Attack Pattern Caterpillar WebShell - S0572 (751b77e6-af1f-483b-93fe-eddf17f92a64) Malware 2
System Network Configuration Discovery - T1016 (707399d6-ab3e-4963-9315-d9d3818cd6a0) Attack Pattern Caterpillar WebShell - S0572 (751b77e6-af1f-483b-93fe-eddf17f92a64) Malware 2
Caterpillar WebShell - S0572 (751b77e6-af1f-483b-93fe-eddf17f92a64) Malware Rootkit - T1014 (0f20e3cb-245b-4a61-8a91-2d93f7cb0e9b) Attack Pattern 2
Caterpillar WebShell - S0572 (751b77e6-af1f-483b-93fe-eddf17f92a64) Malware Modify Registry - T1112 (57340c81-c025-4189-8fa0-fc7ede51bae4) Attack Pattern 2
Caterpillar WebShell - S0572 (751b77e6-af1f-483b-93fe-eddf17f92a64) Malware File and Directory Discovery - T1083 (7bc57495-ea59-4380-be31-a64af124ef18) Attack Pattern 2
Network Service Discovery - T1046 (e3a12395-188d-4051-9a16-ea8e14d07b88) Attack Pattern Caterpillar WebShell - S0572 (751b77e6-af1f-483b-93fe-eddf17f92a64) Malware 2
Caterpillar WebShell - S0572 (751b77e6-af1f-483b-93fe-eddf17f92a64) Malware Local Groups - T1069.001 (a01bf75f-00b2-4568-a58f-565ff9bf202b) Attack Pattern 2
Brute Force - T1110 (a93494bb-4b80-4ea1-8695-3236a49916fd) Attack Pattern Caterpillar WebShell - S0572 (751b77e6-af1f-483b-93fe-eddf17f92a64) Malware 2
Caterpillar WebShell - S0572 (751b77e6-af1f-483b-93fe-eddf17f92a64) Malware Windows Command Shell - T1059.003 (d1fcf083-a721-4223-aedf-bf8960798d62) Attack Pattern 2
Caterpillar WebShell - S0572 (751b77e6-af1f-483b-93fe-eddf17f92a64) Malware System Service Discovery - T1007 (322bad5a-1c49-4d23-ab79-76d641794afa) Attack Pattern 2
Caterpillar WebShell - S0572 (751b77e6-af1f-483b-93fe-eddf17f92a64) Malware Ingress Tool Transfer - T1105 (e6919abc-99f9-4c6c-95a5-14761e7b2add) Attack Pattern 2
Data from Local System - T1005 (3c4a2599-71ee-4405-ba1e-0e28414b4bc5) Attack Pattern Caterpillar WebShell - S0572 (751b77e6-af1f-483b-93fe-eddf17f92a64) Malware 2
Caterpillar WebShell - S0572 (751b77e6-af1f-483b-93fe-eddf17f92a64) Malware Process Discovery - T1057 (8f4a33ec-8b1f-4b80-a2f6-642b2e479580) Attack Pattern 2
Caterpillar WebShell - S0572 (751b77e6-af1f-483b-93fe-eddf17f92a64) Malware Exfiltration Over C2 Channel - T1041 (92d7da27-2d91-488e-a00c-059dc162766d) Attack Pattern 2
System Owner/User Discovery - T1033 (03d7999c-1f4c-42cc-8373-e7690d318104) Attack Pattern Explosive - S0569 (6a21e3a4-5ffe-4581-af9a-6a54c7536f44) Malware 2
Clipboard Data - T1115 (30973a08-aed9-4edf-8604-9084ce1b5c4f) Attack Pattern Explosive - S0569 (6a21e3a4-5ffe-4581-af9a-6a54c7536f44) Malware 2
System Information Discovery - T1082 (354a7f88-63fb-41b5-a801-ce3b377b36f1) Attack Pattern Explosive - S0569 (6a21e3a4-5ffe-4581-af9a-6a54c7536f44) Malware 2
System Network Configuration Discovery - T1016 (707399d6-ab3e-4963-9315-d9d3818cd6a0) Attack Pattern Explosive - S0569 (6a21e3a4-5ffe-4581-af9a-6a54c7536f44) Malware 2
Symmetric Cryptography - T1573.001 (24bfaeba-cb0d-4525-b3dc-507c77ecec41) Attack Pattern Explosive - S0569 (6a21e3a4-5ffe-4581-af9a-6a54c7536f44) Malware 2
Keylogging - T1056.001 (09a60ea3-a8d1-4ae5-976e-5783248b72a4) Attack Pattern Explosive - S0569 (6a21e3a4-5ffe-4581-af9a-6a54c7536f44) Malware 2
Modify Registry - T1112 (57340c81-c025-4189-8fa0-fc7ede51bae4) Attack Pattern Explosive - S0569 (6a21e3a4-5ffe-4581-af9a-6a54c7536f44) Malware 2
Ingress Tool Transfer - T1105 (e6919abc-99f9-4c6c-95a5-14761e7b2add) Attack Pattern Explosive - S0569 (6a21e3a4-5ffe-4581-af9a-6a54c7536f44) Malware 2
Data from Removable Media - T1025 (1b7ba276-eedc-4951-a762-0ceea2c030ec) Attack Pattern Explosive - S0569 (6a21e3a4-5ffe-4581-af9a-6a54c7536f44) Malware 2
Native API - T1106 (391d824f-0ef1-47a0-b0ee-c59a75e27670) Attack Pattern Explosive - S0569 (6a21e3a4-5ffe-4581-af9a-6a54c7536f44) Malware 2
Web Protocols - T1071.001 (df8b2a25-8bdf-4856-953c-a04372b1c161) Attack Pattern Explosive - S0569 (6a21e3a4-5ffe-4581-af9a-6a54c7536f44) Malware 2
Hidden Files and Directories - T1564.001 (ec8fc7e2-b356-455c-8db5-2e37be158e7d) Attack Pattern Explosive - S0569 (6a21e3a4-5ffe-4581-af9a-6a54c7536f44) Malware 2
Active Scanning - T1595 (67073dde-d720-45ae-83da-b12d5e73ca3b) Attack Pattern Wordlist Scanning - T1595.003 (bed04f7d-e48a-4e76-bd0f-4c57fe31fc46) Attack Pattern 2
Vulnerability Scanning - T1595.002 (5502c4e9-24ef-4d5f-8ee9-9e906c2f82c4) Attack Pattern Active Scanning - T1595 (67073dde-d720-45ae-83da-b12d5e73ca3b) Attack Pattern 2
Permission Groups Discovery - T1069 (15dbf668-795c-41e6-8219-f0447c0e64ce) Attack Pattern Local Groups - T1069.001 (a01bf75f-00b2-4568-a58f-565ff9bf202b) Attack Pattern 3
Command and Scripting Interpreter - T1059 (7385dfaf-6886-4229-9ecd-6fd678040830) Attack Pattern Windows Command Shell - T1059.003 (d1fcf083-a721-4223-aedf-bf8960798d62) Attack Pattern 3
Symmetric Cryptography - T1573.001 (24bfaeba-cb0d-4525-b3dc-507c77ecec41) Attack Pattern Encrypted Channel - T1573 (b8902400-e6c5-4ba2-95aa-2d35b442b118) Attack Pattern 3
Input Capture - T1056 (bb5a00de-e086-4859-a231-fa793f6797e2) Attack Pattern Keylogging - T1056.001 (09a60ea3-a8d1-4ae5-976e-5783248b72a4) Attack Pattern 3
Web Protocols - T1071.001 (df8b2a25-8bdf-4856-953c-a04372b1c161) Attack Pattern Application Layer Protocol - T1071 (355be19c-ffc9-46d5-8d50-d6a036c675b6) Attack Pattern 3
Hide Artifacts - T1564 (22905430-4901-4c2a-84f6-98243cb173f8) Attack Pattern Hidden Files and Directories - T1564.001 (ec8fc7e2-b356-455c-8db5-2e37be158e7d) Attack Pattern 3