value
stringlengths
25
18k
subtecnique
int64
0
1
answer
stringclasses
2 values
id
stringlengths
5
9
name
stringlengths
3
102
Install persistence through rc.d services: rc.d (/etc/rc.d/init.d/linux_kill).
1
accept
T1037.004
Boot or Logon Initialization Scripts: Rc Scripts
Backwards compatibility on Ubuntu allowed attackers to achieve persistence via RC scripts.
1
accept
T1037.004
Boot or Logon Initialization Scripts: Rc Scripts
As the malware tries to achieve persistence, Hatching Triage analysis reports suspicious behavior: “Modifies rc script.”
1
accept
T1037.004
Boot or Logon Initialization Scripts: Rc Scripts
APT41 has configured payloads to load via LD_PRELOAD.
1
accept
T1574.006
Hijack Execution Flow: Dynamic Linker Hijacking
Ebury has injected its dynamic library into descendent processes of sshd via LD_PRELOAD.
1
accept
T1574.006
Hijack Execution Flow: Dynamic Linker Hijacking
HiddenWasp adds itself as a shared object to the LD_PRELOAD environment variable.
1
accept
T1574.006
Hijack Execution Flow: Dynamic Linker Hijacking
Hildegard has modified /etc/ld.so.preload to intercept shared library import functions.
1
accept
T1574.006
Hijack Execution Flow: Dynamic Linker Hijacking
Rocke has modified /etc/ld.so.preload to hook libc functions in order to hide the installed dropper and mining software in process lists.
1
accept
T1574.006
Hijack Execution Flow: Dynamic Linker Hijacking
APT32 has used JavaScript for drive-by downloads and C2 communications.
1
accept
T1059.007
Command and Scripting Interpreter: Javascript
Astaroth uses JavaScript to perform its core functionalities.
1
accept
T1059.007
Command and Scripting Interpreter: Javascript
Bundlore can execute JavaScript by injecting it into the victim's browser.
1
accept
T1059.007
Command and Scripting Interpreter: Javascript
Cobalt Group has executed JavaScript scriptlets on the victim's machine.
1
accept
T1059.007
Command and Scripting Interpreter: Javascript
The Cobalt Strike System Profiler can use JavaScript to perform reconnaissance actions.
1
accept
T1059.007
Command and Scripting Interpreter: Javascript
Evilnum has used malicious JavaScript files on the victim's machine.
1
accept
T1059.007
Command and Scripting Interpreter: Javascript
FIN6 has used malicious JavaScript to steal payment card data from e-commerce sites.
1
accept
T1059.007
Command and Scripting Interpreter: Javascript
FIN7 used JavaScript scripts to help perform tasks on the victim's machine. ;; GRIFFON is written in and executed as JavaScript. ;; Higaisa used JavaScript to execute additional files. ;; InvisiMole can use a JavaScript file as part of its execution chain. ;; jRAT has been distributed as HTA files with JScript. ;; Kim...
1
accept
T1059.007
Command and Scripting Interpreter: Javascript
Silent Librarian has cloned victim organization login pages and staged them for later use in credential harvesting campaigns. Silent Librarian has also made use of a variety of URL shorteners for these staged websites.
1
accept
T1608.005
Stage Capabilities: Link Target
The attackers prepared over 39,000 phishing pages mimicking the four platforms' login pages.
1
accept
T1608.005
Stage Capabilities: Link Target
They used Ngrok’s paid option to acquire customized phishing URLs displaying Meta’s trademarks (such as hxxp://facebook[.]in[.]ngrok[.]io/).
1
accept
T1608.005
Stage Capabilities: Link Target
Prior to the attack, they registered typosquatted domains, set up phishing pages and employed URL shortener service.
1
accept
T1608.005
Stage Capabilities: Link Target
The attacker placed archived malicious Office Documents at the link target.
1
accept
T1608.005
Stage Capabilities: Link Target
APT32 has stood up websites containing numerous articles and content scraped from the Internet to make them appear legitimate but some of these pages include malicious JavaScript to profile the potential victim or infect them via a fake software update.
1
accept
T1608.004
Stage Capabilities: Drive
Threat Group-3390 has embedded malicious code into websites to screen a potential victim's IP address and then exploit their browser if they are of interest.
1
accept
T1608.004
Stage Capabilities: Drive
The attackers prepared an malvertizing: an ad combined of image and a JavaScript, which contained malicious code, and pushed it to legitimate websites via ad networks.
1
accept
T1608.004
Stage Capabilities: Drive
Second stage of the Magecart attack included injecting malicious Javascript on the vulnerable checkout pages.
1
accept
T1608.004
Stage Capabilities: Drive
This APT group was looking to compromise industry’s online publications to prepare for watering whole attacks.
1
accept
T1608.004
Stage Capabilities: Drive
Adversaries created self-signed certificates and installed them on their web servers.
1
accept
T1608.003
Stage Capabilities: Install Digital Certificate
Attackers installed Let’s Encrypt certificates on their phishing servers to gain additional trust from the visitors.
1
accept
T1608.003
Stage Capabilities: Install Digital Certificate
They prepare phishing pages with valid SSL/TLS certificates installed.
1
accept
T1608.003
Stage Capabilities: Install Digital Certificate
According to PhishLabs, in the last quarter of 2019, 74% of reported phishing websites were 'secure,' being both HTTPS and with the lock symbol, meaning cybercriminals installed SSL certificates and circumvented so-called verification processes.
1
accept
T1608.003
Stage Capabilities: Install Digital Certificate
Actors installed SSL certificates they made using OpenSSL (where you can even be your own Certificate Authority).
1
accept
T1608.003
Stage Capabilities: Install Digital Certificate
Threat Group-3390 has staged tools including gsecdump and WCE on previously compromised websites.
1
accept
T1608.002
Stage Capabilities: Upload Tool
Prior to the attack, the adversaries uploaded remote administration tools to compromised websites they controlled.
1
accept
T1608.002
Stage Capabilities: Upload Tool
Threat actor placed several double-purpose tools on his GitHub repository.
1
accept
T1608.002
Stage Capabilities: Upload Tool
The attackers uploaded Remote Utilities RAT tool to a third-party compromised website to be used if the victim environment won’t have a remote administration tool installed.
1
accept
T1608.002
Stage Capabilities: Upload Tool
FIN5 staged a customized version of PsExec.
1
accept
T1608.002
Stage Capabilities: Upload Tool
APT32 has hosted malicious payloads in Dropbox Amazon S3 and Google Drive for use during targeting.
1
accept
T1608.001
Stage Capabilities: Upload Malware
They were posting obfuscated malicious payloads on Pastebin to be used later during the attack.
1
accept
T1608.001
Stage Capabilities: Upload Malware
Some of the compromised websites were used to stage post-compromise malware such as keyloggers.
1
accept
T1608.001
Stage Capabilities: Upload Malware
These government hackers staged malicious Java scripts on the Microsoft typosquatted domains they registered earlier.
1
accept
T1608.001
Stage Capabilities: Upload Malware
Gamaredon stage malicious VBA scripts on various compromised websites.
1
accept
T1608.001
Stage Capabilities: Upload Malware
APT41 has used search order hijacking to execute malicious payloads such as Winnti RAT.
1
accept
T1574.001
Hijack Execution Flow: Dll Search Order Hijacking
Astaroth can launch itself via DLL Search Order Hijacking.
1
accept
T1574.001
Hijack Execution Flow: Dll Search Order Hijacking
BOOSTWRITE has exploited the loading of the legitimate Dwrite.dll file by actually loading the gdi library which then loads the gdiplus library and ultimately loads the local Dwrite dll.
1
accept
T1574.001
Hijack Execution Flow: Dll Search Order Hijacking
Crutch can persist via DLL search order hijacking on Google Chrome Mozilla Firefox or Microsoft OneDrive.
1
accept
T1574.001
Hijack Execution Flow: Dll Search Order Hijacking
Downdelph uses search order hijacking of the Windows executable sysprep.exe to escalate privileges.
1
accept
T1574.001
Hijack Execution Flow: Dll Search Order Hijacking
Empire contains modules that can discover and exploit various DLL hijacking opportunities.
1
accept
T1574.001
Hijack Execution Flow: Dll Search Order Hijacking
Evilnum has used the malware variant TerraTV to load a malicious DLL placed in the TeamViewer directory instead of the original Windows DLL located in a system folder.
1
accept
T1574.001
Hijack Execution Flow: Dll Search Order Hijacking
A FinFisher variant uses DLL search order hijacking. ;; Hikit has used DLL Search Order Hijacking to load oci.dll as a persistence mechanism. ;; HTTPBrowser abuses the Windows DLL load order by using a legitimate Symantec anti-virus binary VPDN_LU.exe to load a malicious DLL that mimics a legitimate Symantec DLL navlu...
1
accept
T1574.001
Hijack Execution Flow: Dll Search Order Hijacking
APT19 launched an HTTP malware variant and a Port 22 malware variant using a legitimate executable that loaded the malicious DLL.
1
accept
T1574.002
Hijack Execution Flow: Dll Side
APT3 has been known to side load DLLs with a valid version of Chrome with one of their tools.
1
accept
T1574.002
Hijack Execution Flow: Dll Side
APT32 ran legitimately-signed executables from Symantec and McAfee which load a malicious DLL. The group also side-loads its backdoor by dropping a library and a legitimate signed executable (AcroTranscoder).
1
accept
T1574.002
Hijack Execution Flow: Dll Side
APT41 used legitimate executables to perform DLL side-loading of their malware.
1
accept
T1574.002
Hijack Execution Flow: Dll Side
BADNEWS typically loads its DLL file into a legitimate signed Java or VMware executable.
1
accept
T1574.002
Hijack Execution Flow: Dll Side
DLL side-loading has been used to execute BBSRAT through a legitimate Citrix executable ssonsvr.exe. The Citrix executable was dropped along with BBSRAT by the dropper.
1
accept
T1574.002
Hijack Execution Flow: Dll Side
BlackTech has used DLL side loading by giving DLLs hardcoded names and placing them in searched directories.
1
accept
T1574.002
Hijack Execution Flow: Dll Side
BRONZE BUTLER has used legitimate applications to side-load malicious DLLs. ;; Chimera has used side loading to place malicious DLLs in memory. ;; Denis exploits a security vulnerability to load a fake DLL and execute its code. ;; Egregor has used DLL side-loading to execute its payload. ;; FinFisher uses DLL side-loa...
1
accept
T1574.002
Hijack Execution Flow: Dll Side
APT39 has used malware to turn off the RequireSigned feature which ensures only signed DLLs can be run on Windows.
1
accept
T1553.006
Subvert Trust Controls: Code Signing Policy Modification
BlackEnergy has enabled the TESTSIGNING boot configuration option to facilitate loading of a driver component.
1
accept
T1553.006
Subvert Trust Controls: Code Signing Policy Modification
Hikit has attempted to disable driver signing verification by tampering with several Registry keys prior to the loading of a rootkit driver component.
1
accept
T1553.006
Subvert Trust Controls: Code Signing Policy Modification
Turla has modified variables in kernel memory to turn off Driver Signature Enforcement after exploiting vulnerabilities that obtained kernel mode privileges.
1
accept
T1553.006
Subvert Trust Controls: Code Signing Policy Modification
ESPecter patches Windows kernel function SepInitializeCodeIntegrity directly in memory to disable Driver Signature Enforcement (DSE).
1
accept
T1553.006
Subvert Trust Controls: Code Signing Policy Modification
APT38 has prepended a space to all of their terminal commands to operate without leaving traces in the HISTCONTROL environment.
1
accept
T1562.003
Impair Defenses: Impair Command History Logging
Attackers set SaveNothing option for PSReadLine to turn off logging PowerShell command history.
1
accept
T1562.003
Impair Defenses: Impair Command History Logging
Threat actors set the command history size to zero (export HISTFILESIZE=0) to prevent logging of commands.
1
accept
T1562.003
Impair Defenses: Impair Command History Logging
Prior to executing PowerShell commands, attackers meddled with PSReadLine module to disable logging.
1
accept
T1562.003
Impair Defenses: Impair Command History Logging
After getting the initial access to the Windows Server, hackers changed PSReadLine logging destination to confuse incident responders.
1
accept
T1562.003
Impair Defenses: Impair Command History Logging
APT-C-36 has disguised its scheduled tasks as those used by Google.
1
accept
T1036.004
Masquerading: Masquerade Task Or Service
APT29 named tasks \Microsoft\Windows\SoftwareProtectionPlatform\EventCacheManager in order to appear legitimate.
1
accept
T1036.004
Masquerading: Masquerade Task Or Service
APT32 has used hidden or non-printing characters to help masquerade service names such as appending a Unicode no-break space character to a legitimate service name. APT32 has also impersonated the legitimate Flash installer file name install_flashplayer.exe".
1
accept
T1036.004
Masquerading: Masquerade Task Or Service
Attor's dispatcher disguises itself as a legitimate task (i.e. the task name and description appear legitimate).
1
accept
T1036.004
Masquerading: Masquerade Task Or Service
Bazar can create a task named to appear benign.
1
accept
T1036.004
Masquerading: Masquerade Task Or Service
build_downer has added itself to the Registry Run key as "NVIDIA" to appear legitimate.
1
accept
T1036.004
Masquerading: Masquerade Task Or Service
Carbanak has copied legitimate service names to use for malicious services.
1
accept
T1036.004
Masquerading: Masquerade Task Or Service
Catchamas adds a new service named NetAdapter in an apparent attempt to masquerade as a legitimate service. ;; ComRAT has used a task name associated with Windows SQM Consolidator. ;; Crutch has established persistence with a scheduled task impersonating the Outlook item finder. ;; CSPY Downloader has attempted to app...
1
accept
T1036.004
Masquerading: Masquerade Task Or Service
APT29 leveraged privileged accounts to replicate directory service data with domain controllers.
1
accept
T1003.006
OS Credential Dumping: Dcsync
Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways including from DCSync/NetSync.
1
accept
T1003.006
OS Credential Dumping: Dcsync
Operation Wocao has used Mimikatz's DCSync to dump credentials from the memory of the targeted system.
1
accept
T1003.006
OS Credential Dumping: Dcsync
UNC2452 leveraged privileged accounts to replicate directory service data with domain controllers.
1
accept
T1003.006
OS Credential Dumping: Dcsync
The attacker discovered domain controllers (DCs) and submitted a replication request. This prompted the primary DC to replicate the credentials of other DCs back to the compromised domain administrator, using the Directory Replication Service (DRS) remote protocol.
1
accept
T1003.006
OS Credential Dumping: Dcsync
APT33 has used a variety of publicly available tools like LaZagne to gather credentials.
1
accept
T1003.004
OS Credential Dumping: Lsa Secrets
CosmicDuke collects LSA secrets.
1
accept
T1003.004
OS Credential Dumping: Lsa Secrets
CrackMapExec can dump hashed passwords from LSA secrets for the targeted system.
1
accept
T1003.004
OS Credential Dumping: Lsa Secrets
Dragonfly 2.0 dropped and executed SecretsDump to dump password hashes.
1
accept
T1003.004
OS Credential Dumping: Lsa Secrets
gsecdump can dump LSA secrets.
1
accept
T1003.004
OS Credential Dumping: Lsa Secrets
SecretsDump and Mimikatz modules within Impacket can perform credential dumping to obtain account and password information.
1
accept
T1003.004
OS Credential Dumping: Lsa Secrets
Ke3chang has dumped credentials including by using gsecdump.
1
accept
T1003.004
OS Credential Dumping: Lsa Secrets
LaZagne can perform credential dumping from LSA secrets to obtain account and password information. ;; Leafminer used several tools for retrieving login and password information including LaZagne. ;; menuPass has used a modified version of pentesting tools wmiexec.vbs and secretsdump.py to dump credentials. ;; Mimikat...
1
accept
T1003.004
OS Credential Dumping: Lsa Secrets
APT28 has used a brute-force/password-spray tooling that operated in two modes: in brute-force mode it typically sent over 300 authentication attempts per hour per targeted account over the course of several hours or days.
1
accept
T1110.001
Brute Force: Password Guessing
China Chopper's server component can perform brute force password guessing against authentication portals.
1
accept
T1110.001
Brute Force: Password Guessing
CrackMapExec can brute force passwords for a specified user on a single target system or across an entire network.
1
accept
T1110.001
Brute Force: Password Guessing
Emotet has been observed using a hard coded list of passwords to brute force user accounts.
1
accept
T1110.001
Brute Force: Password Guessing
Lucifer has attempted to brute force TCP ports 135 (RPC) and 1433 (MSSQL) with the default username or list of usernames and passwords.
1
accept
T1110.001
Brute Force: Password Guessing
P.A.S. Webshell can use predefined users and passwords to execute brute force attacks against SSH FTP POP3 MySQL MSSQL and PostgreSQL services.
1
accept
T1110.001
Brute Force: Password Guessing
Pony has used a small dictionary of common passwords against a collected list of local accounts.
1
accept
T1110.001
Brute Force: Password Guessing
SpeakUp can perform brute forcing using a pre-defined list of usernames and passwords in an attempt to log in to administrative panels. ;; Xbash can obtain a list of weak passwords from the C2 server to use for brute forcing as well as attempt to brute force services with open ports.
1
accept
T1110.001
Brute Force: Password Guessing
Cleaver has used custom tools to facilitate ARP cache poisoning.
1
accept
T1557.002
Man
Iran’s cyber hacking skills have evolved to include customized private tools with ARP poisoning function.
1
accept
T1557.002
Man
Alireza’s C++ tools include the following techniques: • ARP poisoning
1
accept
T1557.002
Man
Jasus is an ARP cache poisoner developed by the Operation Cleaver team.
1
accept
T1557.002
Man