Depriz

Description

(Microsoft) The initial infection vector TERBIUM uses is unknown. As credentials have been hard-coded in the malware TERBIUM uses, it is suspected that TERBIUM has harvested credentials or infiltrated the target organization previously. Step 1: Writing to disk Step 2: Propagation and persistence through the target network Step 3: Wiping the machine Step 4: Rendering the machine unusable

Names

Name
Depriz

Category

Malware

Type

  • Worm
  • Wiper

Information

Other Information

Uuid

acc9f26d-4b82-495d-bc0d-299fbfbd3e48

Last Card Change

2020-04-20