Depriz
Description
(Microsoft) The initial infection vector TERBIUM uses is unknown. As credentials have been hard-coded in the malware TERBIUM uses, it is suspected that TERBIUM has harvested credentials or infiltrated the target organization previously. Step 1: Writing to disk Step 2: Propagation and persistence through the target network Step 3: Wiping the machine Step 4: Rendering the machine unusable
Names
Name |
---|
Depriz |
Category
Malware
Type
- Worm
- Wiper
Information
Other Information
Uuid
acc9f26d-4b82-495d-bc0d-299fbfbd3e48
Last Card Change
2020-04-20