value stringlengths 25 18k ⌀ | subtecnique int64 0 1 | answer stringclasses 2
values | id stringlengths 5 9 | name stringlengths 3 102 |
|---|---|---|---|---|
GALLIUM used dumped hashes to authenticate to other machines via pass the hash. ;; HOPLIGHT has been observed loading several APIs associated with Pass the Hash. ;; Kimsuky has used pass the hash for authentication to remote access software used in C2. ;; Mimikatz's SEKURLSA::Pth module can impersonate a user with onl... | 1 | accept | T1550.002 | Use Alternate Authentication Material: Pass The Hash |
Threat actors may try to collect cloud log data and subsequently disable the logs to hide their activity. | 1 | accept | T1562.008 | Impair Defenses: Disable Cloud Logs |
Malware or actors may disable cloud logs in Amazon Web Services (AWS) with commands like ‘StopLogging’ and ‘DeleteTrail’. | 1 | accept | T1562.008 | Impair Defenses: Disable Cloud Logs |
Disabling logs in cloud environments can allow actors or malware to conceal their malicious activity. | 1 | accept | T1562.008 | Impair Defenses: Disable Cloud Logs |
In efforts to conceal their actions, adversaries may disable cloud logs in GCP while deploying other apps or containers. | 1 | accept | T1562.008 | Impair Defenses: Disable Cloud Logs |
Adversaries may disable event logging in Kubernetes to hide their deployment applications or containers on a target environment. | 1 | accept | T1562.008 | Impair Defenses: Disable Cloud Logs |
Linux Rabbit maintains persistence on an infected machine through rc.local and .bashrc files. | 1 | accept | T1546.004 | Event Triggered Execution: Unix Shell Configuration Modification |
Some malware will maintain persistence via rc.local and .bashrc files. | 1 | accept | T1546.004 | Event Triggered Execution: Unix Shell Configuration Modification |
On Linux and Unix systems, malware may try to maintain persistence by using bash scripts. | 1 | accept | T1546.004 | Event Triggered Execution: Unix Shell Configuration Modification |
Login environments, such as .bash or ZSH, can be used by malware to create events that are launched on every boot or login. | 1 | accept | T1546.004 | Event Triggered Execution: Unix Shell Configuration Modification |
Using shell commands contained in files, actors can instruct infected hosts to launch specific events at pre-determined times. | 1 | accept | T1546.004 | Event Triggered Execution: Unix Shell Configuration Modification |
Many actors and malware will use login environments to force an infected machine to execute scripts at any specified time. | 1 | accept | T1546.004 | Event Triggered Execution: Unix Shell Configuration Modification |
Adversaries may attempt to modify cloud firewall settings to allow connections for further downloads or uploads. | 1 | accept | T1562.007 | Impair Defenses: Disable Or Modify Cloud Firewall |
Some actors and malware will disable cloud firewall settings for short periods of time to allow connections, and then restore restrictions to avoid detection. | 1 | accept | T1562.007 | Impair Defenses: Disable Or Modify Cloud Firewall |
Malware that manipulates cloud firewall settings can allow threat actors to steal data and resources. | 1 | accept | T1562.007 | Impair Defenses: Disable Or Modify Cloud Firewall |
If actors get control of a cloud firewall, they will be able to change settings to allow further malicious activity. | 1 | accept | T1562.007 | Impair Defenses: Disable Or Modify Cloud Firewall |
Modifying or disabling a cloud firewall may enable adversary C2 communications, lateral movement, and/or data exfiltration that would otherwise not be allowed. | 1 | accept | T1562.007 | Impair Defenses: Disable Or Modify Cloud Firewall |
Reverting cloud infrastructure instances allows malware and actors to conduct malicious activities, and then revert to a clean state to hide their actions. | 1 | accept | T1578.004 | Modify Cloud Compute Infrastructure: Revert Cloud Instance |
Actors can hide their malicious activity while in cloud instances by restoring the virtual machine to a previous state. | 1 | accept | T1578.004 | Modify Cloud Compute Infrastructure: Revert Cloud Instance |
Restoring a virtual machine to its original state after malicious activity has been completed is a good technique to conceal malicious activity. | 1 | accept | T1578.004 | Modify Cloud Compute Infrastructure: Revert Cloud Instance |
Adversaries may restore cloud environments to previous snapshots once cybercriminal activity has been completed. | 1 | accept | T1578.004 | Modify Cloud Compute Infrastructure: Revert Cloud Instance |
Actors and malware can take advantage of ephemeral storage types because they often restart/reset once the VM is stopped or rebooted. | 1 | accept | T1578.004 | Modify Cloud Compute Infrastructure: Revert Cloud Instance |
Threat actors may delete a cloud instance or virtual machine to hide their malicious activity. | 1 | accept | T1578.003 | Modify Cloud Compute Infrastructure: Delete Cloud Instance |
CloudTrail logs, in Amazon Web Services (AWS), can capture cloud instance deletion in the ‘TerminateInstaces’ event. | 1 | accept | T1578.003 | Modify Cloud Compute Infrastructure: Delete Cloud Instance |
Within Google’s Admin Activity audit logs, the Cloud Audit logs can detect when instances or virtual machines (VMs) are deleted via the gcloud ‘compute instances delete’ command. | 1 | accept | T1578.003 | Modify Cloud Compute Infrastructure: Delete Cloud Instance |
In Kubernetes, malware or threat actors may attempt to remove finalizers (finalizer key) prior to deleting a cloud instance. | 1 | accept | T1578.003 | Modify Cloud Compute Infrastructure: Delete Cloud Instance |
Deleting evidence of malicious operations, such as manipulating or removing cloud instances or VMs, may be done by actors or malware to conceal their operations. | 1 | accept | T1578.003 | Modify Cloud Compute Infrastructure: Delete Cloud Instance |
Malware may attempt to modify existing cloud infrastructure by creating new snapshots to steal resources or data. | 1 | accept | T1578.001 | Modify Cloud Compute Infrastructure: Create Snapshot |
Cybercriminals may create snapshots on cloud systems and grant only themselves access to it establish or maintain persistence. | 1 | accept | T1578.001 | Modify Cloud Compute Infrastructure: Create Snapshot |
Creating a snapshot with firewall-restricted access in a cloud instance can give adversaries concealed access and persistence on a target system. | 1 | accept | T1578.001 | Modify Cloud Compute Infrastructure: Create Snapshot |
Actors may create a snapshot on a virtual hard drive or volume from which to maintain access onto a target’s system. | 1 | accept | T1578.001 | Modify Cloud Compute Infrastructure: Create Snapshot |
Actors can create snapshots on cloud systems to launch attacks from. | 1 | accept | T1578.001 | Modify Cloud Compute Infrastructure: Create Snapshot |
On Google Admin Activity audit logs, actors can use the command ‘gcloud compute instances create’ to create a new cloud instance. | 1 | accept | T1578.002 | Modify Cloud Compute Infrastructure: Create Cloud Instance |
Adversaries may a new virtual machine to launch attacks from and evade defenses. | 1 | accept | T1578.002 | Modify Cloud Compute Infrastructure: Create Cloud Instance |
Threat actors can create a new cloud instance to bypass firewall rules and permissions that may exist in an account. | 1 | accept | T1578.002 | Modify Cloud Compute Infrastructure: Create Cloud Instance |
Cybercriminals can utilize cloud systems by creating new instances that are hidden from view and do not affect the targets operations. | 1 | accept | T1578.002 | Modify Cloud Compute Infrastructure: Create Cloud Instance |
Actors may setup their own infrastructure in a target network by creating cloud instances with custom security settings to avoid detection. | 1 | accept | T1578.002 | Modify Cloud Compute Infrastructure: Create Cloud Instance |
APT29 staged data and files in password-protected archives on a victim's OWA server. | 1 | accept | T1074.002 | Data Staged: Remote Data Staging |
Chimera has staged stolen data on designated servers in the target environment. | 1 | accept | T1074.002 | Data Staged: Remote Data Staging |
FIN6 actors have compressed data from remote systems and moved it to another staging system before exfiltration. | 1 | accept | T1074.002 | Data Staged: Remote Data Staging |
FIN8 aggregates staged data from a network into a single location. | 1 | accept | T1074.002 | Data Staged: Remote Data Staging |
menuPass has staged data on remote MSP systems or other victim networks prior to exfiltration. | 1 | accept | T1074.002 | Data Staged: Remote Data Staging |
Night Dragon has copied files to company web servers and subsequently downloaded them. | 1 | accept | T1074.002 | Data Staged: Remote Data Staging |
Threat Group-3390 has moved staged encrypted archives to Internet-facing servers that had previously been compromised with China Chopper prior to exfiltration. | 1 | accept | T1074.002 | Data Staged: Remote Data Staging |
UNC2452 staged data and files in password-protected archives on a victim's OWA server. | 1 | accept | T1074.002 | Data Staged: Remote Data Staging |
Sandworm Team defaced approximately 15 000 websites belonging to Georgian government non-government and private sector organizations in 2019. | 1 | accept | T1491.002 | Defacement: External Defacement |
Threat actors who want to make a socioeconomical point or deliver a message may deface well-known websites to ensure their point is seen. | 1 | accept | T1491.002 | Defacement: External Defacement |
Some websites are defaced by hacktivists or malware in attempts to gather support from other adversaries to accomplish an objective. | 1 | accept | T1491.002 | Defacement: External Defacement |
Cybercriminals of lower sophisticated are typically the ones that deface websites, however, advanced groups such as Sandworm Team have defaced thousands of websites. | 1 | accept | T1491.002 | Defacement: External Defacement |
Some state-sponsored groups may use website defacement as a diversionary tactic to distract from their true objectives. | 1 | accept | T1491.002 | Defacement: External Defacement |
Website defacements may be used to setup future attacks as an initial access point. | 1 | accept | T1491.002 | Defacement: External Defacement |
APT29 has added credentials to OAuth Applications and Service Principals. | 1 | accept | T1098.001 | Account Manipulation: Additional Cloud Credentials |
UNC2452 added credentials to OAuth Applications and Service Principals. | 1 | accept | T1098.001 | Account Manipulation: Additional Cloud Credentials |
Threat actors may add their own credentials into a created or compromised cloud service account to setup legitimate services on a system under their control. | 1 | accept | T1098.001 | Account Manipulation: Additional Cloud Credentials |
Some malware and actors will gain illicit access to an account that inside a cloud environment, such as AWS, GCP, or Kubernetes, and credentials for own accounts. | 1 | accept | T1098.001 | Account Manipulation: Additional Cloud Credentials |
If an actor can breach cloud accounts with the correct privileges, there are numerous ways the adversary could add their own credentials into a target system. | 1 | accept | T1098.001 | Account Manipulation: Additional Cloud Credentials |
PoisonIvy creates a Registry key in the Active Setup pointing to a malicious executable. | 1 | accept | T1547.014 | Boot or Logon Autostart Execution: Active Setup |
Cybercriminals may manipulate Active Setup by adding a registry key so that the malicious key will be executed when a user logs in. | 1 | accept | T1547.014 | Boot or Logon Autostart Execution: Active Setup |
Threat actors can maintain persistence on a machine by adding a registry to the Active Setup on Windows operating systems. | 1 | accept | T1547.014 | Boot or Logon Autostart Execution: Active Setup |
An actor can add registry keys to Windows Active Setup to execute programs from a user’s account every time he/she/them logs in. | 1 | accept | T1547.014 | Boot or Logon Autostart Execution: Active Setup |
Malware may attempt to use Active Setup components on Windows systems to execute specific actions upon every login. | 1 | accept | T1547.014 | Boot or Logon Autostart Execution: Active Setup |
Active Setup components can be utilized by adversaries to force breached or compromised accounts to conduct malicious activity while disguised as a legitimate user. | 1 | accept | T1547.014 | Boot or Logon Autostart Execution: Active Setup |
Empire can use built-in modules to abuse trusted utilities like MSBuild.exe. | 1 | accept | T1127.001 | Trusted Developer Utilities Proxy Execution: Msbuild |
Frankenstein has used MSbuild to execute an actor-created file. | 1 | accept | T1127.001 | Trusted Developer Utilities Proxy Execution: Msbuild |
A version of PlugX loads as shellcode within a .NET Framework project using msbuild.exe presumably to bypass application control techniques. | 1 | accept | T1127.001 | Trusted Developer Utilities Proxy Execution: Msbuild |
Adversaries may use MSBuild to proxy execution of code through a trusted Windows utility. | 1 | accept | T1127.001 | Trusted Developer Utilities Proxy Execution: Msbuild |
Legitimate software, such as Windows’ Microsoft Build Engine (MSBuild.exe), can be abused by threat actors to execute malware under the guise of a trusted utility. | 1 | accept | T1127.001 | Trusted Developer Utilities Proxy Execution: Msbuild |
Malware or actors can bypass security features by using MSBuild to execute files that will be allowed by security controls because it is a trusted program. | 1 | accept | T1127.001 | Trusted Developer Utilities Proxy Execution: Msbuild |
Adversaries may tamper with SIP and trust provider components to mislead the operating system and application control tools when conducting signature validation checks. | 1 | accept | T1553.003 | Subvert Trust Controls: Sip And Trust Provider Hijacking |
Subject Interface Packages (SIPs) can be manipulated by threat actors to trick operating systems into executing code that could otherwise blocked by security features. | 1 | accept | T1553.003 | Subvert Trust Controls: Sip And Trust Provider Hijacking |
Cybercriminals or malware may try to change trust controls that only allow code execution from software with valid digital certificates to conduct malicious activity. | 1 | accept | T1553.003 | Subvert Trust Controls: Sip And Trust Provider Hijacking |
Actors may try to subvert operating system (OS) trust controls to hide from security solutions when executing malware. | 1 | accept | T1553.003 | Subvert Trust Controls: Sip And Trust Provider Hijacking |
Threat actors or groups are known to try to hijack OS trust provider architecture to allow execution of code that does not have a valid digital certificate. | 1 | accept | T1553.003 | Subvert Trust Controls: Sip And Trust Provider Hijacking |
Egregor can modify the GPO to evade detection. | 1 | accept | T1484.001 | Domain Policy Modification: Group Policy Modification |
Empire can use New-GPOImmediateTask to modify a GPO that will install and execute a malicious Scheduled Task/Job. | 1 | accept | T1484.001 | Domain Policy Modification: Group Policy Modification |
Indrik Spider has used Group Policy Objects to deploy batch scripts. | 1 | accept | T1484.001 | Domain Policy Modification: Group Policy Modification |
Adversaries may modify group policy objects (GPOs) to subvert the intended discretionary access controls for a domain, usually with the intention of escalating privileges on the domain. | 1 | accept | T1484.001 | Domain Policy Modification: Group Policy Modification |
Threat actors can use GPOs (virtual collection of policy settings) to force infect machines to connect to command and control (C2) IPs, domains, or servers for further malicious activity. | 1 | accept | T1484.001 | Domain Policy Modification: Group Policy Modification |
Policy settings for groups on Windows operating systems (OSs) can be used to created scheduled tasks for persistence, download payloads, modify settings, and steal data. | 1 | accept | T1484.001 | Domain Policy Modification: Group Policy Modification |
Group policy objects can be modified by cybercriminals to disable tools, elevate privileges, establish persistence, and execute code, among numerous other malicious activities. | 1 | accept | T1484.001 | Domain Policy Modification: Group Policy Modification |
Malicious GPO modifications can be used to implement many other malicious behaviors such as Scheduled Task/Job, Disable or Modify Tools, Ingress Tool Transfer, Create Account, Service Execution, and more. | 1 | accept | T1484.001 | Domain Policy Modification: Group Policy Modification |
Empire can add a SID-History to a user if on a domain controller. | 1 | accept | T1134.005 | Access Token Manipulation: Sid |
Mimikatz's MISC::AddSid module can appended any SID or user/group account to a user's SID-History. Mimikatz also utilizes SID-History Injection to expand the scope of other components such as generated Kerberos Golden Tickets and DCSync beyond a single domain. | 1 | accept | T1134.005 | Access Token Manipulation: Sid |
Adversaries may use SID-History Injection to escalate privileges and bypass access controls. | 1 | accept | T1134.005 | Access Token Manipulation: Sid |
Cybercriminals can manipulate the Windows security identifier (SID) to gather user account history and identifiers to impersonate other users or groups to conduct malicious activity. | 1 | accept | T1134.005 | Access Token Manipulation: Sid |
User account and group information stored in Sid-history can be stolen by threat actors to masquerade as legitimate users while launching attacks. | 1 | accept | T1134.005 | Access Token Manipulation: Sid |
Bazar can inject into a target process using process doppelgänging. | 1 | accept | T1055.013 | Process Injection: Process Doppelgänging |
Leafminer has used Process Doppelgänging to evade security software while deploying tools on compromised systems. | 1 | accept | T1055.013 | Process Injection: Process Doppelgänging |
SynAck abuses NTFS transactions to launch and conceal malicious processes. | 1 | accept | T1055.013 | Process Injection: Process Doppelgänging |
Adversaries may inject malicious code into process via process doppelgänging to evade process-based defenses as well as possibly elevate privileges. | 1 | accept | T1055.013 | Process Injection: Process Doppelgänging |
Process doppelgänging is a method of executing arbitrary code in the address space of a separate live process. | 1 | accept | T1055.013 | Process Injection: Process Doppelgänging |
Cobalt Strike can spawn processes with alternate PPIDs. | 1 | accept | T1134.004 | Access Token Manipulation: Parent Pid Spoofing |
PipeMon can use parent PID spoofing to elevate privileges. | 1 | accept | T1134.004 | Access Token Manipulation: Parent Pid Spoofing |
Adversaries may spoof the parent process identifier (PPID) of a new process to evade process-monitoring defenses or to elevate privileges. | 1 | accept | T1134.004 | Access Token Manipulation: Parent Pid Spoofing |
Cybercriminals can create fake PPIDs for their malicious activity to elevate privileges or evade security defenses. | 1 | accept | T1134.004 | Access Token Manipulation: Parent Pid Spoofing |
Parent process identifiers can be spoofed by actors or malware to allow and conceal execution of malicious processes. | 1 | accept | T1134.004 | Access Token Manipulation: Parent Pid Spoofing |
InvisiMole can disconnect previously connected remote drives. | 1 | accept | T1070.005 | Indicator Removal on Host: Network Share Connection Removal |
The net use \system\share /delete command can be used in Net to remove an established connection to a network share. | 1 | accept | T1070.005 | Indicator Removal on Host: Network Share Connection Removal |
RobbinHood disconnects all network shares from the computer with the command net use * /DELETE /Y. | 1 | accept | T1070.005 | Indicator Removal on Host: Network Share Connection Removal |
Threat Group-3390 has detached network shares after exfiltrating files likely to evade detection. | 1 | accept | T1070.005 | Indicator Removal on Host: Network Share Connection Removal |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.