Gallium

Description

(Microsoft) To compromise targeted networks, GALLIUM target unpatched internet-facing services using publicly available exploits and have been known to target vulnerabilities in WildFly/JBoss. Once persistence is established in a network, GALLIUM uses common techniques and tools like Mimikatz to obtain credentials that allows for lateral movement across the target network. Within compromised networks, GALLIUM makes no attempt to obfuscate their intent and are known to use common versions of malware and publicly available toolkits with small modifications. The operators rely on low cost and easy to replace infrastructure that consists of dynamic-DNS domains and regularly reused hop points.

This activity from GALLIUM has been identified predominantly through 2018 to mid-2019. GALLIUM is still active; however, activity levels have dropped when compared to what was previously observed.

Names

NameName-Giver
GalliumMicrosoft
Phantom PandaCrowdStrike
Granite TyphoonMicrosoft
Alloy TaurusPalo Alto

Country

Motivation

  • Information theft and espionage

First Seen

2018

Observed Sectors

Tools

Operations

Information

Mitre Attack

Other Information

Uuid

8dd3c489-96f1-412f-9eec-60f96a674571

Last Card Change

2023-10-12