Dragonfly is a cyber espionage group that has been active since at least 2011. They initially targeted defense and aviation companies but shifted to focus to include the energy sector in early 2013. They have also targeted companies related to industrial control systems. [1][2]
A similar group emerged in 2015 and was identified by Symantec as Dragonfly 2.0. There is debate over the extent of the overlap between Dragonfly and Dragonfly 2.0, but there is sufficient evidence to lead to these being tracked as two separate groups. [3][4][5]
Name | Description |
---|---|
TG-4192 | |
Crouching Yeti | |
IRON LIBERTY | |
Energetic Bear |
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1189 | Drive-by Compromise |
Dragonfly has compromised targets via strategic web compromise (SWC) utilizing a custom exploit kit.[2] |
|
Enterprise | T1588 | .002 | Obtain Capabilities: Tool |
Dragonfly has obtained and used tools such as Mimikatz, CrackMapExec, and PsExec.[2] |
Enterprise | T1566 | Phishing |
Dragonfly has used spearphising campaigns to gain access to victims.[2] |
|
Enterprise | T1195 | .002 | Supply Chain Compromise: Compromise Software Supply Chain |
Dragonfly has placed trojanized installers on legitimate vendor app stores.[2] |