Magic Hound

Iran's Magic Hound (APT35) poses a significant threat to organizations across various industries and geographic regions by stealing intellectual property, email accounts and the exfiltration of sensitive data from targeted organizations.

Actors
IRGC Iran State-Sponsored
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Campaign Outline

Threat Actor Campaigns are comprised of multiple MITRE ATT&CK aligned courses. Click on a course below to learn more.

Overview

This course covers various aspects of the Search Open Technical Databases: Scan Databases TTP, including its components, associated risks, and detection techniques. Participants will learn how to detect and mitigate the risks associated with this TTP (T1596.005) and techniques for validating alerts and conducting pre and post-alert preparations.

Overview

This course covers the MITRE technique T1190: Exploit Public-Facing Application. This technique involves an adversary exploiting a vulnerability in a public-facing application to gain unauthorized access to a target network. Students will learn about the types of public-facing applications and common vulnerabilities that attackers may target.

Overview

This course gives cybersecurity professionals an in-depth understanding of the MITRE TTP T1105 technique. This involves using legitimate tools to transfer malicious files onto a target network and the techniques used to evade detection. The course will also cover prevention strategies for this type of attack.

Overview

This course covers the Mitre TTP T1041- Exfiltration Over C2 channel, which involves exfiltrating data over a command and control (C2) channel. This technique is commonly used by threat actors to evade detection and exfiltrate sensitive information from compromised networks.