text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
ATT&CK ID:S0589
ATT&CK Technique Name:Sibot
Sibot will delete an associated registry key if a certain server response is received.[19] | secon |
ATT&CK ID:M1047
ATT&CK Technique Name:Audit
Scan images before deployment, and block those that are not in compliance with security policies. In Kubernetes environments, the admission controller can be used to validate images after a container deployment request is authenticated but before the container is deployed.[11... | secon |
ATT&CK ID:G0114
ATT&CK Technique Name:Chimera
Chimera has used WMIC to execute remote commands.[27][28] | secon |
ATT&CK ID:T1213
ATT&CK Technique Name:Data from Information Repositories
Adversaries may leverage information repositories to mine valuable information. Information repositories are tools that allow for storage of information, typically to facilitate collaboration or information sharing between users, and can store a w... | secon |
ATT&CK ID:S0695
ATT&CK Technique Name:Donut
Donut can download and execute previously staged shellcode payloads.[149] | secon |
ATT&CK ID:S0461
ATT&CK Technique Name:SDBbot
SDBbot has the ability to communicate with C2 with TCP over port 443.[63] | secon |
ATT&CK ID:S0267
ATT&CK Technique Name:FELIXROOT
FELIXROOT deletes the .LNK file from the startup directory as well as the dropper components.[69] | secon |
titleblackhat:us-22 AAD Joined Machines - The New Lateral Movement
With the evolvement of Azure and Pass-Through authentication, many organizations are connecting devices to Azure AD, making authentication and management easier. Azure AD devices can be connected only to Azure AD and no longer to On-Prem AD. Which makes... | secon |
ATT&CK ID:S0398
ATT&CK Technique Name:HyperBro
HyperBro has the ability to run an application (CreateProcessW) or script/file (ShellExecuteW) via API.[96] | secon |
title:blackhat:asia-22 SMS PVA Services Fueled by Compromised Supply-Chain Mobile Botnets
During our investigation of an SMS PVA service provider, we uncovered a mobile botnet that was used to provide SMS reception services. Whilst examining it, the botnet has active devices in dozens of countries with tens of thousand... | secon |
ATT&CK ID:T1649
ATT&CK Technique Name:Steal or Forge Authentication Certificates
Adversaries may steal or forge certificates used for authentication to access remote systems or resources. Digital certificates are often used to sign and encrypt messages and/or files. Certificates are also used as authentication material... | secon |
ATT&CK ID:S0536
ATT&CK Technique Name:GPlayed
GPlayed can collect a list of installed applications.[16] | secon |
ATT&CK ID:S0337
ATT&CK Technique Name:BadPatch
BadPatch establishes a foothold by adding a link to the malware executable in the startup folder.[41] | secon |
ATT&CK ID:G0010
ATT&CK Technique Name:Turla
Turla RPC backdoors can upload files from victim machines.[187] | secon |
ATT&CK ID:S0603
ATT&CK Technique Name:Stuxnet
Stuxnet copies the input area of an I/O image into data blocks with a one second interval between copies, forming a 21 second recording of the input area. The input area contains information being passed to the PLC from a peripheral. For example, the current state of a valv... | secon |
ATT&CK ID:S0458
ATT&CK Technique Name:Ramsay
Ramsay can scan for network drives which may contain documents for collection.[48][49] | secon |
ATT&CK ID:S0083
ATT&CK Technique Name:Misdat
Misdat has created registry keys for persistence, including HKCU\Software\dnimtsoleht\StubPath, HKCU\Software\snimtsOleht\StubPath, HKCU\Software\Backtsaleht\StubPath, HKLM\SOFTWARE\Microsoft\Active Setup\Installed. Components\{3bf41072-b2b1-21c8-b5c1-bd56d32fbda7}, and HKLM... | secon |
ATT&CK ID:C0007
ATT&CK Technique Name:FunnyDream
During FunnyDream, the threat actors used several tools and batch files to map victims' internal networks.[44] | secon |
ATT&CK ID:G0004
ATT&CK Technique Name:Ke3chang
Ke3chang has used compromised credentials to sign into victims’ Microsoft 365 accounts.[7] | secon |
ATT&CK ID:G0126
ATT&CK Technique Name:Higaisa
Higaisa used Base64 encoded compressed payloads.[158][159] | secon |
ATT&CK ID:G0032
ATT&CK Technique Name:Lazarus Group
Lazarus Group has replaced win_fw.dll, an internal component that is executed during IDA Pro installation, with a malicious DLL to download and execute a payload.[32] | secon |
title:blackhat:asia-20 Redback: Advanced Static Binary Injection
Static binary injection is a technique to permanently insert external code to an executable file, in order to observe or modify target behavior at run-time. From an attacker's perspective, this is helpful to enable persistent infection. For the defense si... | secon |
ATT&CK ID:M1018
ATT&CK Technique Name:User Account Management
Limit permissions for who can create symbolic links in Windows to appropriate groups such as Administrators and necessary groups for virtualization. This can be done through GPO: Computer Configuration > [Policies] > Windows Settings > Security Settings > Lo... | secon |
ATT&CK ID:S0352
ATT&CK Technique Name:OSX_OCEANLOTUS.D
OSX_OCEANLOTUS.D uses the command xattr -d com.apple.quarantine to remove the quarantine file attribute used by Gatekeeper.[12][4] | secon |
ATT&CK ID:T1053
ATT&CK Technique Name:Scheduled Task/Job
Adversaries may abuse task scheduling functionality to facilitate initial or recurring execution of malicious code. Utilities exist within all major operating systems to schedule programs or scripts to be executed at a specified date and time. A task can also be ... | secon |
ATT&CK ID:G0012
ATT&CK Technique Name:Darkhotel
Darkhotel has decrypted strings and imports using RC4 during execution.[68][69] | secon |
ATT&CK ID:S0666
ATT&CK Technique Name:Gelsemium
Gelsemium has the ability to use TCP and UDP in C2 communications.[27] | secon |
ATT&CK ID:G0065
ATT&CK Technique Name:Leviathan
Leviathan has received C2 instructions from user profiles created on legitimate websites such as Github and TechNet.[3] | secon |
ATT&CK ID:S0625
ATT&CK Technique Name:Cuba
Cuba can check if Russian language is installed on the infected machine by using the function GetKeyboardLayoutList.[9] | secon |
ATT&CK ID:M1047
ATT&CK Technique Name:Audit
Consider periodic review of accounts and privileges for critical and sensitive Confluence repositories. | secon |
title:blackhat:asia-23 The Various Shades of Supply Chain: SBOM, N-Days and Zero Trust
Over the past two years, attacks on multiple targets in the semiconductor industry have consistently led to leaks of firmware source code. A compromised developer device could potentially give an attacker access to the source code re... | secon |
ATT&CK ID:S0583
ATT&CK Technique Name:Pysa
Pysa has used PsExec to copy and execute the ransomware.[49] | secon |
ATT&CK ID:S0659
ATT&CK Technique Name:Diavol
After encryption, Diavol will capture the desktop background window, set the background color to black, and change the desktop wallpaper to a newly created bitmap image with the text "All your files are encrypted! For more information see "README-FOR-DECRYPT.txt".[14] | secon |
ATT&CK ID:S1016
ATT&CK Technique Name:MacMa
MacMa can use Core Graphics Event Taps to intercept user keystrokes from any text input field and saves them to text files. Text input fields include Spotlight, Finder, Safari, Mail, Messages, and other apps that have text fields for passwords.[105][106] | secon |
ATT&CK ID:M1026
ATT&CK Technique Name:Privileged Account Management
Prevent adversary access to privileged accounts or access necessary to perform this technique. | secon |
ATT&CK ID:S0367
ATT&CK Technique Name:Emotet
Emotet has been seen exfiltrating system information stored within cookies sent within an HTTP GET request back to its C2 servers. [40] | secon |
ATT&CK ID:S1029
ATT&CK Technique Name:AuTo Stealer
AuTo Stealer can place malicious executables in a victim's AutoRun registry key or StartUp directory, depending on the AV product installed, to maintain persistence.[32] | secon |
ATT&CK ID:C0005
ATT&CK Technique Name:Operation Spalax
For Operation Spalax, the threat actors used XOR-encrypted payloads.[244] | secon |
ATT&CK ID:G0059
ATT&CK Technique Name:Magic Hound
Magic Hound has used domain administrator accounts after dumping LSASS process memory.[10] | secon |
ATT&CK ID:S0461
ATT&CK Technique Name:SDBbot
SDBbot has the ability to use image file execution options for persistence if it detects it is running with admin privileges on a Windows version newer than Windows 7.[9] | secon |
ATT&CK ID:S0612
ATT&CK Technique Name:WastedLocker
WastedLocker's custom cryptor, CryptOne, used an XOR based algorithm to decrypt the payload.[248] | secon |
ATT&CK ID:G0083
ATT&CK Technique Name:SilverTerrier
SilverTerrier uses SMTP for C2 communications.[21] | secon |
titleblackhat:us-22 The Open Threat Hunting Framework: Enabling Organizations to Build, Operationalize, and Scale Threat Hunting
"Ask 10 infosec professionals to define threat hunting and you'll get 11 different answers." Threat hunting is one of those interesting components of cybersecurity where everyone knows they s... | secon |
ATT&CK ID:S0079
ATT&CK Technique Name:MobileOrder
MobileOrder has a command to upload to its C2 server victim mobile device information, including IMEI, IMSI, SIM card serial number, phone number, Android version, and other information.[233] | secon |
ATT&CK ID:G0004
ATT&CK Technique Name:Ke3chang
Ke3chang used a SharePoint enumeration and data dumping tool known as spwebmember.[3] | secon |
ATT&CK ID:S0154
ATT&CK Technique Name:Cobalt Strike
Cobalt Strike can collect data from a local system.[45][46] | secon |
ATT&CK ID:C0022
ATT&CK Technique Name:Operation Dream Job
During Operation Dream Job, Lazarus Group used a remote XSL script to download a Base64-encoded DLL custom downloader.[10] | secon |
ATT&CK ID:S0279
ATT&CK Technique Name:Proton
Proton captures the content of the desktop with the screencapture binary.[65] | secon |
ATT&CK ID:S0203
ATT&CK Technique Name:Hydraq
Hydraq creates a backdoor through which remote attackers can read data from files.[85][86] | secon |
ATT&CK ID:S0480
ATT&CK Technique Name:Cerberus
Cerberus hides its icon from the application drawer after being launched for the first time.[9] | secon |
ATT&CK ID:S0428
ATT&CK Technique Name:PoetRAT
PoetRAT has executed a Lua script through a Lua interpreter for Windows.[40] | secon |
ATT&CK ID:S0094
ATT&CK Technique Name:Trojan.Karagany
Trojan.Karagany can capture keystrokes on a compromised host.[177] | secon |
ATT&CK ID:S0689
ATT&CK Technique Name:WhisperGate
WhisperGate can use PowerShell to support multiple actions including execution and defense evasion.[240][241][242] | secon |
ATT&CK ID:C0014
ATT&CK Technique Name:Operation Wocao
During Operation Wocao, threat actors collected clipboard data in plaintext.[37] | secon |
title:blackhat:us-21 ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication
TLS is widely used to add confidentiality, authenticity, and integrity to application layer protocols such as HTTP, SMTP, IMAP, POP3, and FTP. However, TLS does not bind a TCP connection to the inte... | secon |
ATT&CK ID:S0396
ATT&CK Technique Name:EvilBunny
EvilBunny has used time measurements from 3 different APIs before and after performing sleep operations to check and abort if the malware is running in a sandbox.[22] | secon |
ATT&CK ID:G0139
ATT&CK Technique Name:TeamTNT
TeamTNT has enumerated the host machine’s IP address.[229] | secon |
titleblackhat:us-18 For the Love of Money: Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems
These days it's hard to find a business that doesn't accept faster payments. Mobile Point of Sales (mPOS) terminals have propelled this growth lowering the barriers for small and micro-sized businesses to ... | secon |
ATT&CK ID:S0194
ATT&CK Technique Name:PowerSploit
PowerSploit contains a collection of ScriptModification modules that compress and encode scripts and payloads.[68][69] | secon |
title:blackhat:us-18 For the Love of Money: Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems
These days it's hard to find a business that doesn't accept faster payments. Mobile Point of Sales (mPOS) terminals have propelled this growth lowering the barriers for small and micro-sized businesses to... | secon |
titleblackhat:us-19 Playing Offense and Defense with Deepfakes
This presentation seeks to demonstrate how deepfaking can be leveraged for offensive and defensive purposes. Specifically, deepfake internals are presented including a fine grained, step-by-step breakdown of creation, including the details of all deep learn... | secon |
ATT&CK ID:S0170
ATT&CK Technique Name:Helminth
Helminth establishes persistence by creating a shortcut in the Start Menu folder.[114] | secon |
ATT&CK ID:S0533
ATT&CK Technique Name:SLOTHFULMEDIA
SLOTHFULMEDIA has uploaded files and information from victim machines.[170] | secon |
ATT&CK ID:S0129
ATT&CK Technique Name:AutoIt backdoor
AutoIt backdoor has sent a C2 response that was base64-encoded.[7] | secon |
ATT&CK ID:G0108
ATT&CK Technique Name:Blue Mockingbird
Blue Mockingbird has executed custom-compiled XMRIG miner DLLs by configuring them to execute via the "wercplsupport" service.[13] | secon |
ATT&CK ID:S0475
ATT&CK Technique Name:BackConfig
BackConfig has the ability to use hidden columns in Excel spreadsheets to store executable files or commands for VBA macros.[6] | secon |
ATT&CK ID:C0020
ATT&CK Technique Name:Maroochy Water Breach
In the Maroochy Water Breach, the adversary suppressed alarm reporting to the central computer.[2] | secon |
ATT&CK ID:S0658
ATT&CK Technique Name:XCSSET
Using the machine's local time, XCSSET waits 43200 seconds (12 hours) from the initial creation timestamp of a specific file, .report. After the elapsed time, XCSSET executes additional modules.[46] | secon |
ATT&CK ID:S0558
ATT&CK Technique Name:Tiktok Pro
Tiktok Pro can delete attacker-specified files.[11] | secon |
ATT&CK ID:S0670
ATT&CK Technique Name:WarzoneRAT
WarzoneRAT can use sdclt.exe to bypass UAC in Windows 10 to escalate privileges; for older Windows versions WarzoneRAT can use the IFileOperation exploit to bypass the UAC module.[61][62] | secon |
ATT&CK ID:G0010
ATT&CK Technique Name:Turla
Turla has used WMI event filters and consumers to establish persistence.[22] | secon |
ATT&CK ID:S0035
ATT&CK Technique Name:SPACESHIP
SPACESHIP achieves persistence by creating a shortcut in the current user's Startup folder.[5] | secon |
ATT&CK ID:M0937
ATT&CK Technique Name:Filter Network Traffic
Traffic to known anonymity networks and C2 infrastructure can be blocked through the use of network allow and block lists. It should be noted that this kind of blocking may be circumvented by other techniques likeDomain Fronting. | secon |
ATT&CK ID:M1049
ATT&CK Technique Name:Antivirus/Antimalware
Anti-virus can automatically quarantine suspicious files. | secon |
ATT&CK ID:S0089
ATT&CK Technique Name:BlackEnergy
BlackEnergy has gathered information about network IP configurations using ipconfig.exe and about routing tables using route.exe.[37][38] | secon |
ATT&CK ID:S0147
ATT&CK Technique Name:Pteranodon
Pteranodon copies itself to the Startup folder to establish persistence.[206] | secon |
ATT&CK ID:S0366
ATT&CK Technique Name:WannaCry
WannaCry creates the service "mssecsvc2.0" with the display name "Microsoft Security Center (2.0) Service."[133][134] | secon |
ATT&CK ID:S0223
ATT&CK Technique Name:POWERSTATS
POWERSTATS can deobfuscate the main backdoor code.[155] | secon |
title:blackhat:us-20 When TLS Hacks You
Lots of people try to attack the security of TLS. But, what if we use TLS to attack other things? It's a huge standard, and it turns out that features intended to make TLS fast have also made it useful as an attack vector.Among other things, these features provide a lot of flexib... | secon |
ATT&CK ID:M0948
ATT&CK Technique Name:Application Isolation and Sandboxing
Make it difficult for adversaries to advance their operation through exploitation of undiscovered or unpatched vulnerabilities by using sandboxing. Other types of virtualization and application microsegmentation may also mitigate the impact of s... | secon |
ATT&CK ID:S1039
ATT&CK Technique Name:Bumblebee
Bumblebee can achieve persistence by copying its DLL to a subdirectory of %APPDATA% and creating a Visual Basic Script that will load the DLL via a scheduled task.[33][34] | secon |
ATT&CK ID:S0458
ATT&CK Technique Name:Ramsay
Ramsay has included embedded Visual Basic scripts in malicious documents.[130][131] | secon |
ATT&CK ID:G0045
ATT&CK Technique Name:menuPass
menuPass has registered malicious domains for use in intrusion campaigns.[46][47] | secon |
ATT&CK ID:S0379
ATT&CK Technique Name:Revenge RAT
Revenge RAT used blogpost.com as its primary command and control server during a campaign.[40] | secon |
ATT&CK ID:T1547.006
ATT&CK Technique Name:Kernel Modules and Extensions
Adversaries may modify the kernel to automatically execute programs on system boot. Loadable Kernel Modules (LKMs) are pieces of code that can be loaded and unloaded into the kernel upon demand. They extend the functionality of the kernel without t... | secon |
ATT&CK ID:M1056
ATT&CK Technique Name:Pre-compromise
This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties. | secon |
ATT&CK ID:S1039
ATT&CK Technique Name:Bumblebee
Bumblebee can compress data stolen from the Registry and volume shadow copies prior to exfiltration.[12] | secon |
ATT&CK ID:G0032
ATT&CK Technique Name:Lazarus Group
Lazarus Group has restored malicious KernelCallbackTable code to its original state after the process execution flow has been hijacked.[11] | secon |
ATT&CK ID:S0455
ATT&CK Technique Name:Metamorfo
Metamorfo had used AutoIt to load and execute the DLL payload.[14] | secon |
ATT&CK ID:M1004
ATT&CK Technique Name:System Partition Integrity
System partition integrity mechanisms, such as Verified Boot, can detect the unauthorized modification of system files. | secon |
ATT&CK ID:G0094
ATT&CK Technique Name:Kimsuky
Kimsuky has purchased hosting servers with virtual currency and prepaid cards.[4] | secon |
ATT&CK ID:S0426
ATT&CK Technique Name:Concipit1248
Concipit1248 requests permissions to use the device camera.[3] | secon |
ATT&CK ID:S0270
ATT&CK Technique Name:RogueRobin
RogueRobin has used Google Drive as a Command and Control channel. [41] | secon |
ATT&CK ID:T1027.010
ATT&CK Technique Name:Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection. Command-line obfuscation is a method of making strings and patterns within commands and scripts more difficult to signature and analyze. This type of obfuscation can be included ... | secon |
titleblackhat:us-18 Playback: A TLS 1.3 Story
TLS 1.3 is the new secure communication protocol that should be already with us. One of its new features is 0-RTT (Zero Round Trip Time Resumption) that could potentially allow replay attacks. This is a known issue acknowledged by the TLS 1.3 specification, as the protocol ... | secon |
ATT&CK ID:S0266
ATT&CK Technique Name:TrickBot
TrickBot can gather information about domain trusts by utilizing Nltest.[21][31] | secon |
ATT&CK ID:C0010
ATT&CK Technique Name:C0010
During C0010, UNC3890 actors likely compromised the domain of a legitimate Israeli shipping company.[6] | secon |
ATT&CK ID:S0677
ATT&CK Technique Name:AADInternals
The AADInternals Set-AADIntUserMFA command can be used to disable MFA for a specified user. | secon |
ATT&CK ID:S0264
ATT&CK Technique Name:OopsIE
OopsIE performs several anti-VM and sandbox checks on the victim's machine. One technique the group has used was to perform a WMI query SELECT * FROM MSAcpi_ThermalZoneTemperature to check the temperature to see if it’s running in a virtual environment.[3] | secon |
ATT&CK ID:S0650
ATT&CK Technique Name:QakBot
QakBot can store its configuration information in a randomly named subkey under HKCU\Software\Microsoft.[18][19] | secon |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.