prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
|---|---|
Exploitation of Remote Services
|
It has used tools to exploit the ZeroLogon vulnerability (CVE-2020-1472).
|
Exploitation of Remote Services
|
It has exploited the Microsoft Netlogon vulnerability (CVE-2020-1472).
|
Exploitation of Remote Services
|
NotPetya can use two exploits in SMBv1, EternalBlue and EternalRomance, to spread itself to other remote systems on the network.
|
Exploitation of Remote Services
|
PoshC2 contains a module for exploiting SMB via EternalBlue.
|
Exploitation of Remote Services
|
QakBot can move laterally using worm-like functionality through exploitation of SMB.
|
Exploitation of Remote Services
|
Stuxnet propagates using the MS10-061 Print Spooler and MS08-067 Windows Server Service vulnerabilities.
|
Exploitation of Remote Services
|
It has exploited MS17-010 to move laterally to other systems on the network.
|
Exploitation of Remote Services
|
It has used EternalBlue exploits for lateral movement.
|
Exploitation of Remote Services
|
TrickBot utilizes EternalBlue and EternalRomance exploits for lateral movement in the modules wormwinDll, wormDll, mwormDll, nwormDll, tabDll.
|
Exploitation of Remote Services
|
WannaCry uses an exploit in SMBv1 to spread itself to other remote systems on a network.
|
Exploitation of Remote Services
|
It has exploited or attempted to exploit Zerologon (CVE-2020-1472) and EternalBlue (MS17-010) vulnerabilities.
|
Internal Spearphishing
|
It has used an Outlook VBA module on infected systems to send phishing emails with malicious attachments to other employees within the organization.
|
Internal Spearphishing
|
It has conducted internal spearphishing attacks against executives, HR, and IT personnel to gain information and access.
|
Internal Spearphishing
|
It has sent internal spearphishing emails for lateral movement after stealing victim information.
|
Internal Spearphishing
|
It has conducted internal spearphishing within the victim's environment for lateral movement.
|
Internal Spearphishing
|
During Operation Dream Job, It conducted internal spearphishing from within a compromised organization.
|
Lateral Tool Transfer
|
During the 2015 Ukraine Electric Power Attack, It moved their tools laterally within the corporate network and between the ICS and corporate network.
|
Lateral Tool Transfer
|
During the 2016 Ukraine Electric Power Attack, It used move to transfer files to a network share.
|
Lateral Tool Transfer
|
It has spread malware in target networks by copying modules to folders masquerading as removable devices.
|
Lateral Tool Transfer
|
It has deployed tools after moving laterally using administrative accounts.
|
Lateral Tool Transfer
|
BITSAdmin can be used to create BITS Jobs to upload and/or download files from SMB file servers.
|
Lateral Tool Transfer
|
BlackCat can replicate itself across connected servers via psexec.
|
Lateral Tool Transfer
|
During C0015, the threat actors used WMI to load Cobalt Strike onto additional hosts within a compromised network.
|
Lateral Tool Transfer
|
During C0018, the threat actors transferred the SoftPerfect Network Scanner and other tools to machines in the network using AnyDesk and PDQ Deploy.
|
Lateral Tool Transfer
|
It has copied tools between compromised hosts using SMB.
|
Lateral Tool Transfer
|
cmd can be used to copy files to/from a remotely connected internal system.
|
Lateral Tool Transfer
|
DustySky searches for network drives and removable media and duplicates itself onto them.
|
Lateral Tool Transfer
|
Emotet has copied itself to remote systems using the service.exe filename.
|
Lateral Tool Transfer
|
esentutl can be used to copy files to/from a remote share.
|
Lateral Tool Transfer
|
Expand can be used to download or upload a file over a network share.
|
Lateral Tool Transfer
|
It has deployed Meterpreter stagers and SplinterRAT instances in the victim network after moving laterally.
|
Lateral Tool Transfer
|
ftp may be abused by adversaries to transfer tools or files between systems within a compromised environment.
|
Lateral Tool Transfer
|
It has used PsExec to move laterally between hosts in the target network.
|
Lateral Tool Transfer
|
HermeticWizard can copy files to other machines on a compromised network.
|
Lateral Tool Transfer
|
LockerGoga has been observed moving around the victim network via SMB, indicating the actors behind this ransomware are manually copying files form computer to computer instead of self-propagating.
|
Lateral Tool Transfer
|
Lucifer can use certutil for propagation on Windows hosts within intranets.
|
Lateral Tool Transfer
|
It has copied tools within a compromised network using RDP.
|
Lateral Tool Transfer
|
Operators deploying Netwalker have used psexec to copy the Netwalker payload across accessible systems.
|
Lateral Tool Transfer
|
Olympic Destroyer attempts to copy itself to remote machines on the network.
|
Lateral Tool Transfer
|
During Operation Wocao, threat actors used SMB to copy files to and from target systems.
|
Lateral Tool Transfer
|
PsExec can be used to download or upload a file over a network share.
|
Lateral Tool Transfer
|
It has used move to transfer files to a network share and has copied payloads--such as Prestige ransomware--to an Active Directory Domain Controller and distributed via the Default Domain Group Policy Object.
|
Lateral Tool Transfer
|
Shamoon attempts to copy itself to remote machines on the network.
|
Lateral Tool Transfer
|
Stuxnet uses an RPC server that contains a file dropping routine and support for payload version updates for P2P communications within a victim network.
|
Lateral Tool Transfer
|
It RPC backdoors can be used to transfer files to/from victim machines on the local network.
|
Lateral Tool Transfer
|
It has copied web shells between servers in targeted environments.
|
Lateral Tool Transfer
|
WannaCry attempts to copy itself to remote computers after gaining access via an SMB exploit.
|
Lateral Tool Transfer
|
It has used stolen credentials to copy tools into the %TEMP% directory of domain controllers.
|
Remote Service Session Hijacking:RDP Hijacking
|
It has targeted victims with remote administration tools including RDP.
|
Remote Service Session Hijacking:RDP Hijacking
|
WannaCry enumerates current remote desktop sessions and tries to execute the malware on each session.
|
Remote Services
|
Brute Ratel C4 has the ability to use RPC for lateral movement.
|
Remote Services
|
Kivars has the ability to remotely trigger keyboard input and mouse clicks.
|
Remote Services
|
MacMa can manage remote screen sessions.
|
Remote Services
|
Stuxnet can propagate via peer-to-peer communication and updates using RPC.
|
Remote Services
|
It has used the WebDAV protocol to execute Ryuk payloads hosted on network file shares.
|
Remote Services:Remote Desktop Protocol
|
The It group is known to have used RDP during operations.
|
Remote Services:Remote Desktop Protocol
|
It enables the Remote Desktop Protocol for persistence. It has also interacted with compromised systems to browse and copy files through RDP sessions.
|
Remote Services:Remote Desktop Protocol
|
It has been seen using RDP for lateral movement and persistence, in some cases employing the rdpwinst tool for mangement of multiple sessions.
|
Remote Services:Remote Desktop Protocol
|
It used RDP for lateral movement.
|
Remote Services:Remote Desktop Protocol
|
It has used RDP during operations.
|
Remote Services:Remote Desktop Protocol
|
It has used Remote Desktop to log on to servers interactively and manually copy files to remote hosts.
|
Remote Services:Remote Desktop Protocol
|
During C0015, the threat actors used RDP to access specific network hosts of interest.
|
Remote Services:Remote Desktop Protocol
|
During C0018, the threat actors opened a variety of ports to establish RDP connections, including ports 28035, 32467, 41578, and 46892.
|
Remote Services:Remote Desktop Protocol
|
It enables concurrent Remote Desktop Protocol (RDP) sessions.
|
Remote Services:Remote Desktop Protocol
|
It has used RDP to access targeted systems.
|
Remote Services:Remote Desktop Protocol
|
It has used Remote Desktop Protocol to conduct lateral movement.
|
Remote Services:Remote Desktop Protocol
|
Cobalt Strike can start a VNC-based remote desktop server and tunnel the connection through the already established C2 channel.
|
Remote Services:Remote Desktop Protocol
|
DarkComet can open an active screen of the victim’s machine and take control of the mouse and keyboard.
|
Remote Services:Remote Desktop Protocol
|
It has moved laterally via RDP.
|
Remote Services:Remote Desktop Protocol
|
It has used RDP to move laterally to systems in the victim environment.
|
Remote Services:Remote Desktop Protocol
|
It has remotely accessed compromised environments via Remote Desktop Services (RDS) for lateral movement.
|
Remote Services:Remote Desktop Protocol
|
It used RDP to move laterally in victim networks.
|
Remote Services:Remote Desktop Protocol
|
It has used RDP to move laterally in victim environments.
|
Remote Services:Remote Desktop Protocol
|
It has used RDP for lateral movement.
|
Remote Services:Remote Desktop Protocol
|
It has used RDP to log in and move laterally in the target environment.
|
Remote Services:Remote Desktop Protocol
|
It has used remote desktop sessions for lateral movement.
|
Remote Services:Remote Desktop Protocol
|
Imminent Monitor has a module for performing remote desktop access.
|
Remote Services:Remote Desktop Protocol
|
jRAT can support RDP control.
|
Remote Services:Remote Desktop Protocol
|
It has used RDP for direct remote point-and-click access.
|
Remote Services:Remote Desktop Protocol
|
Koadic can enable remote desktop on the victim's machine.
|
Remote Services:Remote Desktop Protocol
|
It malware SierraCharlie uses RDP for propagation.
|
Remote Services:Remote Desktop Protocol
|
It has targeted RDP credentials and used it to move through the victim environment.
|
Remote Services:Remote Desktop Protocol
|
It has used Remote Desktop Services to copy tools on targeted systems.
|
Remote Services:Remote Desktop Protocol
|
It has used RDP connections to move across the victim network.
|
Remote Services:Remote Desktop Protocol
|
njRAT has a module for performing remote desktop access.
|
Remote Services:Remote Desktop Protocol
|
It has used Remote Desktop Protocol for lateral movement. The group has also used tunneling tools to tunnel RDP into the environment.
|
Remote Services:Remote Desktop Protocol
|
It attempted to use RDP to move laterally.
|
Remote Services:Remote Desktop Protocol
|
Pupy can enable/disable RDP connection and can start a remote desktop session using a browser web socket client.
|
Remote Services:Remote Desktop Protocol
|
Pysa has laterally moved using RDP connections.
|
Remote Services:Remote Desktop Protocol
|
QuasarRAT has a module for performing remote desktop access.
|
Remote Services:Remote Desktop Protocol
|
Revenge RAT has a plugin to perform RDP access.
|
Remote Services:Remote Desktop Protocol
|
SDBbot has the ability to use RDP to connect to victim's machines.
|
Remote Services:Remote Desktop Protocol
|
ServHelper has commands for adding a remote desktop user and sending RDP traffic to the attacker through a reverse SSH tunnel.
|
Remote Services:Remote Desktop Protocol
|
It has used RDP for lateral movement.
|
Remote Services:Remote Desktop Protocol
|
During the SolarWinds Compromise, It used RDP sessions from public-facing systems to internal servers.
|
Remote Services:Remote Desktop Protocol
|
It utilized RDP throughout an operation.
|
Remote Services:Remote Desktop Protocol
|
WarzoneRAT has the ability to control an infected PC using RDP.
|
Remote Services:Remote Desktop Protocol
|
It has used RDP for lateral movement and to deploy ransomware interactively.
|
Remote Services:Remote Desktop Protocol
|
zwShell has used RDP for lateral movement.
|
Remote Services:Remote Desktop Protocol
|
ZxShell has remote desktop functionality.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.