Skip to content
Detecteam
  • CompanyExpand
    • Founders Story
    • The Team
  • ProductExpand
    • About Us
  • SolutionsExpand
    • Use Cases
  • ResourcesExpand
    • Detecteam Blogs
    • Contact Us
Twitter Linkedin
Detecteam
Blog · Scenario

GhostEmperor

Avatar photoByDetecteam 2023-11-292023-11-29

TLP

TLP CLEAR

Author

David Deflache, Sebastien Tricaud

Summary

This week, we share data from another attack being exploited.

In August 2022, analysts uncovered a cyber attack on a government-run Indonesian company by the APT group GhostEmperor. Known since 2021, GhostEmperor specializes in cyberespionage across sectors, employing tactics such as phishing, software exploits, and network interception. Their targets span government, financial, energy, and technology entities in Southeast Asia, with potential broader impact. While the initial infection vector remains unknown, the attackers, employing Hijack Execution Flow: DLL Side-Loading T1574.002, maintained persistence in the system. GhostEmperor’s primary goals include data theft and espionage, reflecting their persistent and sophisticated threat profile.

TIMELINE

DATA

We are providing data for attacks weekly hoping to contribute raising awareness to threats as we believe threats are best understood with their data footprint.

windows_sysmon.xmlDownload

CATEGORY

Malware

references

  • https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2023/11/09055246/Modern-Asian-APT-groups-TTPs_report_eng.pdf

TAGS

Post Tags: #T1003.001 - OS Credential Dumping: LSASS Memory#T1016 - System Network Configuration Discovery#T1016.001 - Internet Connection Discovery#T1033 - System Owner/User Discovery#T1049 - System Network Connections Discovery#T1057 - Process Discovery#T1069 - Permission Groups Discovery#T1082 - System Information Discovery#T1083 - File and Directory Discovery#T1105 - Ingress Tool Transfer#T1105 – Ingress Tool Transfer#T1124 - System Time Discovery#T1197 - BITS Jobs#T1518.001 - Security Software Discovery#T1543.003 - Create or Modify System Process: Windows Service#T1552.006 - Group Policy Preferences#T1567.002 - Exfiltration to Cloud Storage#T1574.002 - DLL Side-Loading#T1615 - Group Policy Discovery
Avatar photo
Detecteam
X

Detecteam is transforming cybersecurity detection from static rule-writing to autonomous, continuous validation. Our REFLEX platform automates the detection lifecycle—building, testing, validating and deploying detections in minutes, not months. We help enterprises maximize ROI on existing tools, close high-risk detection gaps faster, and scale security outcomes without scaling headcount. This is the future of detection-as-code, and we’re leading it.

CONTACT US

Detecteam Inc.
300 Lenora Street PMB 659
Seattle, WA 98121 USA
+1 (650) 542-0831
sales@detecteam.com

  • Privacy Policy

SOCIAL MEDIA

Twitter Linkedin
OUR NEWSLETTER

Check your inbox or spam to confirm your subscription.

© 2025 Detecteam Inc. All Rights Reserved.

  • Company
    • Founders Story
    • The Team
  • Product
    • About Us
  • Solutions
    • Use Cases
  • Resources
    • Detecteam Blogs
    • Contact Us
Search