threat actor campaign

Magic Hound

Magic Hound (APT35) is an Iranian state-sponsored threat group that primarily targets organizations across various industries and geographic regions through cyber espionage. Launch this campaign to start detecting the sophisticated techniques leveraged by this threat group.

Enroll Now
Need to train your team?  
Learn More

4

H

20

m

Time

Intermediate

i
Designed for learners with a solid grasp of foundational IT and cybersecurity concepts who are interested in pursuing an entry-level security role.
Experience Level

2420

XP

4

i

Earn qualifying credits for certification renewal with completion certificates provided for submission.
CEU's

161

Enrollees

Campaign Outline

Threat Actor Campaigns are comprised of multiple MITRE ATT&CK aligned courses. Click on a course below to learn more.

Overview

In this brief course, you will be introduced to the Magic Hound Threat Actor Campaign.

Overview

This course covers various aspects of the Search Open Technical Databases: Scan Databases TTP, including its components, associated risks, and detection techniques. Participants will learn how to detect and mitigate the risks associated with this TTP (T1596.005) and techniques for validating alerts and conducting pre and post-alert preparations.

Overview

This hands-on lab covers the MITRE technique T1068 - Exploitation for Privilege Escalation. This technique involves an adversary exploiting a vulnerability with the objective of gaining higher privileges. Learners will practice simulating privilege escalation and using a SIEM to detect this attack.

Overview

This hands-on lab provides a brief survey of the MITRE TTP T1105 technique. This technique involves using tools to transfer malicious files onto a target network and the techniques used to evade detection.

Overview

This hands-on lab covers the Mitre TTP T1041- Exfiltration Over C2 channel, which involves exfiltrating data over a command and control (C2) channel. This technique is commonly used by threat actors to evade detection and exfiltrate sensitive information from compromised networks.