text
stringlengths
100
9.93M
category
stringclasses
11 values
ATT&CK ID:S0589 ATT&CK Technique Name:Sibot Sibot will delete an associated registry key if a certain server response is received.[19]
secon
ATT&CK ID:M1047 ATT&CK Technique Name:Audit Scan images before deployment, and block those that are not in compliance with security policies. In Kubernetes environments, the admission controller can be used to validate images after a container deployment request is authenticated but before the container is deployed.[11...
secon
ATT&CK ID:G0114 ATT&CK Technique Name:Chimera Chimera has used WMIC to execute remote commands.[27][28]
secon
ATT&CK ID:T1213 ATT&CK Technique Name:Data from Information Repositories Adversaries may leverage information repositories to mine valuable information. Information repositories are tools that allow for storage of information, typically to facilitate collaboration or information sharing between users, and can store a w...
secon
ATT&CK ID:S0695 ATT&CK Technique Name:Donut Donut can download and execute previously staged shellcode payloads.[149]
secon
ATT&CK ID:S0461 ATT&CK Technique Name:SDBbot SDBbot has the ability to communicate with C2 with TCP over port 443.[63]
secon
ATT&CK ID:S0267 ATT&CK Technique Name:FELIXROOT FELIXROOT deletes the .LNK file from the startup directory as well as the dropper components.[69]
secon
titleblackhat:us-22 AAD Joined Machines - The New Lateral Movement With the evolvement of Azure and Pass-Through authentication, many organizations are connecting devices to Azure AD, making authentication and management easier. Azure AD devices can be connected only to Azure AD and no longer to On-Prem AD. Which makes...
secon
ATT&CK ID:S0398 ATT&CK Technique Name:HyperBro HyperBro has the ability to run an application (CreateProcessW) or script/file (ShellExecuteW) via API.[96]
secon
title:blackhat:asia-22 SMS PVA Services Fueled by Compromised Supply-Chain Mobile Botnets During our investigation of an SMS PVA service provider, we uncovered a mobile botnet that was used to provide SMS reception services. Whilst examining it, the botnet has active devices in dozens of countries with tens of thousand...
secon
ATT&CK ID:T1649 ATT&CK Technique Name:Steal or Forge Authentication Certificates Adversaries may steal or forge certificates used for authentication to access remote systems or resources. Digital certificates are often used to sign and encrypt messages and/or files. Certificates are also used as authentication material...
secon
ATT&CK ID:S0536 ATT&CK Technique Name:GPlayed GPlayed can collect a list of installed applications.[16]
secon
ATT&CK ID:S0337 ATT&CK Technique Name:BadPatch BadPatch establishes a foothold by adding a link to the malware executable in the startup folder.[41]
secon
ATT&CK ID:G0010 ATT&CK Technique Name:Turla Turla RPC backdoors can upload files from victim machines.[187]
secon
ATT&CK ID:S0603 ATT&CK Technique Name:Stuxnet Stuxnet copies the input area of an I/O image into data blocks with a one second interval between copies, forming a 21 second recording of the input area. The input area contains information being passed to the PLC from a peripheral. For example, the current state of a valv...
secon
ATT&CK ID:S0458 ATT&CK Technique Name:Ramsay Ramsay can scan for network drives which may contain documents for collection.[48][49]
secon
ATT&CK ID:S0083 ATT&CK Technique Name:Misdat Misdat has created registry keys for persistence, including HKCU\Software\dnimtsoleht\StubPath, HKCU\Software\snimtsOleht\StubPath, HKCU\Software\Backtsaleht\StubPath, HKLM\SOFTWARE\Microsoft\Active Setup\Installed. Components\{3bf41072-b2b1-21c8-b5c1-bd56d32fbda7}, and HKLM...
secon
ATT&CK ID:C0007 ATT&CK Technique Name:FunnyDream During FunnyDream, the threat actors used several tools and batch files to map victims' internal networks.[44]
secon
ATT&CK ID:G0004 ATT&CK Technique Name:Ke3chang Ke3chang has used compromised credentials to sign into victims’ Microsoft 365 accounts.[7]
secon
ATT&CK ID:G0126 ATT&CK Technique Name:Higaisa Higaisa used Base64 encoded compressed payloads.[158][159]
secon
ATT&CK ID:G0032 ATT&CK Technique Name:Lazarus Group Lazarus Group has replaced win_fw.dll, an internal component that is executed during IDA Pro installation, with a malicious DLL to download and execute a payload.[32]
secon
title:blackhat:asia-20 Redback: Advanced Static Binary Injection Static binary injection is a technique to permanently insert external code to an executable file, in order to observe or modify target behavior at run-time. From an attacker's perspective, this is helpful to enable persistent infection. For the defense si...
secon
ATT&CK ID:M1018 ATT&CK Technique Name:User Account Management Limit permissions for who can create symbolic links in Windows to appropriate groups such as Administrators and necessary groups for virtualization. This can be done through GPO: Computer Configuration > [Policies] > Windows Settings > Security Settings > Lo...
secon
ATT&CK ID:S0352 ATT&CK Technique Name:OSX_OCEANLOTUS.D OSX_OCEANLOTUS.D uses the command xattr -d com.apple.quarantine to remove the quarantine file attribute used by Gatekeeper.[12][4]
secon
ATT&CK ID:T1053 ATT&CK Technique Name:Scheduled Task/Job Adversaries may abuse task scheduling functionality to facilitate initial or recurring execution of malicious code. Utilities exist within all major operating systems to schedule programs or scripts to be executed at a specified date and time. A task can also be ...
secon
ATT&CK ID:G0012 ATT&CK Technique Name:Darkhotel Darkhotel has decrypted strings and imports using RC4 during execution.[68][69]
secon
ATT&CK ID:S0666 ATT&CK Technique Name:Gelsemium Gelsemium has the ability to use TCP and UDP in C2 communications.[27]
secon
ATT&CK ID:G0065 ATT&CK Technique Name:Leviathan Leviathan has received C2 instructions from user profiles created on legitimate websites such as Github and TechNet.[3]
secon
ATT&CK ID:S0625 ATT&CK Technique Name:Cuba Cuba can check if Russian language is installed on the infected machine by using the function GetKeyboardLayoutList.[9]
secon
ATT&CK ID:M1047 ATT&CK Technique Name:Audit Consider periodic review of accounts and privileges for critical and sensitive Confluence repositories.
secon
title:blackhat:asia-23 The Various Shades of Supply Chain: SBOM, N-Days and Zero Trust Over the past two years, attacks on multiple targets in the semiconductor industry have consistently led to leaks of firmware source code. A compromised developer device could potentially give an attacker access to the source code re...
secon
ATT&CK ID:S0583 ATT&CK Technique Name:Pysa Pysa has used PsExec to copy and execute the ransomware.[49]
secon
ATT&CK ID:S0659 ATT&CK Technique Name:Diavol After encryption, Diavol will capture the desktop background window, set the background color to black, and change the desktop wallpaper to a newly created bitmap image with the text "All your files are encrypted! For more information see "README-FOR-DECRYPT.txt".[14]
secon
ATT&CK ID:S1016 ATT&CK Technique Name:MacMa MacMa can use Core Graphics Event Taps to intercept user keystrokes from any text input field and saves them to text files. Text input fields include Spotlight, Finder, Safari, Mail, Messages, and other apps that have text fields for passwords.[105][106]
secon
ATT&CK ID:M1026 ATT&CK Technique Name:Privileged Account Management Prevent adversary access to privileged accounts or access necessary to perform this technique.
secon
ATT&CK ID:S0367 ATT&CK Technique Name:Emotet Emotet has been seen exfiltrating system information stored within cookies sent within an HTTP GET request back to its C2 servers. [40]
secon
ATT&CK ID:S1029 ATT&CK Technique Name:AuTo Stealer AuTo Stealer can place malicious executables in a victim's AutoRun registry key or StartUp directory, depending on the AV product installed, to maintain persistence.[32]
secon
ATT&CK ID:C0005 ATT&CK Technique Name:Operation Spalax For Operation Spalax, the threat actors used XOR-encrypted payloads.[244]
secon
ATT&CK ID:G0059 ATT&CK Technique Name:Magic Hound Magic Hound has used domain administrator accounts after dumping LSASS process memory.[10]
secon
ATT&CK ID:S0461 ATT&CK Technique Name:SDBbot SDBbot has the ability to use image file execution options for persistence if it detects it is running with admin privileges on a Windows version newer than Windows 7.[9]
secon
ATT&CK ID:S0612 ATT&CK Technique Name:WastedLocker WastedLocker's custom cryptor, CryptOne, used an XOR based algorithm to decrypt the payload.[248]
secon
ATT&CK ID:G0083 ATT&CK Technique Name:SilverTerrier SilverTerrier uses SMTP for C2 communications.[21]
secon
titleblackhat:us-22 The Open Threat Hunting Framework: Enabling Organizations to Build, Operationalize, and Scale Threat Hunting "Ask 10 infosec professionals to define threat hunting and you'll get 11 different answers." Threat hunting is one of those interesting components of cybersecurity where everyone knows they s...
secon
ATT&CK ID:S0079 ATT&CK Technique Name:MobileOrder MobileOrder has a command to upload to its C2 server victim mobile device information, including IMEI, IMSI, SIM card serial number, phone number, Android version, and other information.[233]
secon
ATT&CK ID:G0004 ATT&CK Technique Name:Ke3chang Ke3chang used a SharePoint enumeration and data dumping tool known as spwebmember.[3]
secon
ATT&CK ID:S0154 ATT&CK Technique Name:Cobalt Strike Cobalt Strike can collect data from a local system.[45][46]
secon
ATT&CK ID:C0022 ATT&CK Technique Name:Operation Dream Job During Operation Dream Job, Lazarus Group used a remote XSL script to download a Base64-encoded DLL custom downloader.[10]
secon
ATT&CK ID:S0279 ATT&CK Technique Name:Proton Proton captures the content of the desktop with the screencapture binary.[65]
secon
ATT&CK ID:S0203 ATT&CK Technique Name:Hydraq Hydraq creates a backdoor through which remote attackers can read data from files.[85][86]
secon
ATT&CK ID:S0480 ATT&CK Technique Name:Cerberus Cerberus hides its icon from the application drawer after being launched for the first time.[9]
secon
ATT&CK ID:S0428 ATT&CK Technique Name:PoetRAT PoetRAT has executed a Lua script through a Lua interpreter for Windows.[40]
secon
ATT&CK ID:S0094 ATT&CK Technique Name:Trojan.Karagany Trojan.Karagany can capture keystrokes on a compromised host.[177]
secon
ATT&CK ID:S0689 ATT&CK Technique Name:WhisperGate WhisperGate can use PowerShell to support multiple actions including execution and defense evasion.[240][241][242]
secon
ATT&CK ID:C0014 ATT&CK Technique Name:Operation Wocao During Operation Wocao, threat actors collected clipboard data in plaintext.[37]
secon
title:blackhat:us-21 ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication TLS is widely used to add confidentiality, authenticity, and integrity to application layer protocols such as HTTP, SMTP, IMAP, POP3, and FTP. However, TLS does not bind a TCP connection to the inte...
secon
ATT&CK ID:S0396 ATT&CK Technique Name:EvilBunny EvilBunny has used time measurements from 3 different APIs before and after performing sleep operations to check and abort if the malware is running in a sandbox.[22]
secon
ATT&CK ID:G0139 ATT&CK Technique Name:TeamTNT TeamTNT has enumerated the host machine’s IP address.[229]
secon
titleblackhat:us-18 For the Love of Money: Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems These days it's hard to find a business that doesn't accept faster payments. Mobile Point of Sales (mPOS) terminals have propelled this growth lowering the barriers for small and micro-sized businesses to ...
secon
ATT&CK ID:S0194 ATT&CK Technique Name:PowerSploit PowerSploit contains a collection of ScriptModification modules that compress and encode scripts and payloads.[68][69]
secon
title:blackhat:us-18 For the Love of Money: Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems These days it's hard to find a business that doesn't accept faster payments. Mobile Point of Sales (mPOS) terminals have propelled this growth lowering the barriers for small and micro-sized businesses to...
secon
titleblackhat:us-19 Playing Offense and Defense with Deepfakes This presentation seeks to demonstrate how deepfaking can be leveraged for offensive and defensive purposes. Specifically, deepfake internals are presented including a fine grained, step-by-step breakdown of creation, including the details of all deep learn...
secon
ATT&CK ID:S0170 ATT&CK Technique Name:Helminth Helminth establishes persistence by creating a shortcut in the Start Menu folder.[114]
secon
ATT&CK ID:S0533 ATT&CK Technique Name:SLOTHFULMEDIA SLOTHFULMEDIA has uploaded files and information from victim machines.[170]
secon
ATT&CK ID:S0129 ATT&CK Technique Name:AutoIt backdoor AutoIt backdoor has sent a C2 response that was base64-encoded.[7]
secon
ATT&CK ID:G0108 ATT&CK Technique Name:Blue Mockingbird Blue Mockingbird has executed custom-compiled XMRIG miner DLLs by configuring them to execute via the "wercplsupport" service.[13]
secon
ATT&CK ID:S0475 ATT&CK Technique Name:BackConfig BackConfig has the ability to use hidden columns in Excel spreadsheets to store executable files or commands for VBA macros.[6]
secon
ATT&CK ID:C0020 ATT&CK Technique Name:Maroochy Water Breach In the Maroochy Water Breach, the adversary suppressed alarm reporting to the central computer.[2]
secon
ATT&CK ID:S0658 ATT&CK Technique Name:XCSSET Using the machine's local time, XCSSET waits 43200 seconds (12 hours) from the initial creation timestamp of a specific file, .report. After the elapsed time, XCSSET executes additional modules.[46]
secon
ATT&CK ID:S0558 ATT&CK Technique Name:Tiktok Pro Tiktok Pro can delete attacker-specified files.[11]
secon
ATT&CK ID:S0670 ATT&CK Technique Name:WarzoneRAT WarzoneRAT can use sdclt.exe to bypass UAC in Windows 10 to escalate privileges; for older Windows versions WarzoneRAT can use the IFileOperation exploit to bypass the UAC module.[61][62]
secon
ATT&CK ID:G0010 ATT&CK Technique Name:Turla Turla has used WMI event filters and consumers to establish persistence.[22]
secon
ATT&CK ID:S0035 ATT&CK Technique Name:SPACESHIP SPACESHIP achieves persistence by creating a shortcut in the current user's Startup folder.[5]
secon
ATT&CK ID:M0937 ATT&CK Technique Name:Filter Network Traffic Traffic to known anonymity networks and C2 infrastructure can be blocked through the use of network allow and block lists. It should be noted that this kind of blocking may be circumvented by other techniques likeDomain Fronting.
secon
ATT&CK ID:M1049 ATT&CK Technique Name:Antivirus/Antimalware Anti-virus can automatically quarantine suspicious files.
secon
ATT&CK ID:S0089 ATT&CK Technique Name:BlackEnergy BlackEnergy has gathered information about network IP configurations using ipconfig.exe and about routing tables using route.exe.[37][38]
secon
ATT&CK ID:S0147 ATT&CK Technique Name:Pteranodon Pteranodon copies itself to the Startup folder to establish persistence.[206]
secon
ATT&CK ID:S0366 ATT&CK Technique Name:WannaCry WannaCry creates the service "mssecsvc2.0" with the display name "Microsoft Security Center (2.0) Service."[133][134]
secon
ATT&CK ID:S0223 ATT&CK Technique Name:POWERSTATS POWERSTATS can deobfuscate the main backdoor code.[155]
secon
title:blackhat:us-20 When TLS Hacks You Lots of people try to attack the security of TLS. But, what if we use TLS to attack other things? It's a huge standard, and it turns out that features intended to make TLS fast have also made it useful as an attack vector.Among other things, these features provide a lot of flexib...
secon
ATT&CK ID:M0948 ATT&CK Technique Name:Application Isolation and Sandboxing Make it difficult for adversaries to advance their operation through exploitation of undiscovered or unpatched vulnerabilities by using sandboxing. Other types of virtualization and application microsegmentation may also mitigate the impact of s...
secon
ATT&CK ID:S1039 ATT&CK Technique Name:Bumblebee Bumblebee can achieve persistence by copying its DLL to a subdirectory of %APPDATA% and creating a Visual Basic Script that will load the DLL via a scheduled task.[33][34]
secon
ATT&CK ID:S0458 ATT&CK Technique Name:Ramsay Ramsay has included embedded Visual Basic scripts in malicious documents.[130][131]
secon
ATT&CK ID:G0045 ATT&CK Technique Name:menuPass menuPass has registered malicious domains for use in intrusion campaigns.[46][47]
secon
ATT&CK ID:S0379 ATT&CK Technique Name:Revenge RAT Revenge RAT used blogpost.com as its primary command and control server during a campaign.[40]
secon
ATT&CK ID:T1547.006 ATT&CK Technique Name:Kernel Modules and Extensions Adversaries may modify the kernel to automatically execute programs on system boot. Loadable Kernel Modules (LKMs) are pieces of code that can be loaded and unloaded into the kernel upon demand. They extend the functionality of the kernel without t...
secon
ATT&CK ID:M1056 ATT&CK Technique Name:Pre-compromise This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.
secon
ATT&CK ID:S1039 ATT&CK Technique Name:Bumblebee Bumblebee can compress data stolen from the Registry and volume shadow copies prior to exfiltration.[12]
secon
ATT&CK ID:G0032 ATT&CK Technique Name:Lazarus Group Lazarus Group has restored malicious KernelCallbackTable code to its original state after the process execution flow has been hijacked.[11]
secon
ATT&CK ID:S0455 ATT&CK Technique Name:Metamorfo Metamorfo had used AutoIt to load and execute the DLL payload.[14]
secon
ATT&CK ID:M1004 ATT&CK Technique Name:System Partition Integrity System partition integrity mechanisms, such as Verified Boot, can detect the unauthorized modification of system files.
secon
ATT&CK ID:G0094 ATT&CK Technique Name:Kimsuky Kimsuky has purchased hosting servers with virtual currency and prepaid cards.[4]
secon
ATT&CK ID:S0426 ATT&CK Technique Name:Concipit1248 Concipit1248 requests permissions to use the device camera.[3]
secon
ATT&CK ID:S0270 ATT&CK Technique Name:RogueRobin RogueRobin has used Google Drive as a Command and Control channel. [41]
secon
ATT&CK ID:T1027.010 ATT&CK Technique Name:Command Obfuscation Adversaries may obfuscate content during command execution to impede detection. Command-line obfuscation is a method of making strings and patterns within commands and scripts more difficult to signature and analyze. This type of obfuscation can be included ...
secon
titleblackhat:us-18 Playback: A TLS 1.3 Story TLS 1.3 is the new secure communication protocol that should be already with us. One of its new features is 0-RTT (Zero Round Trip Time Resumption) that could potentially allow replay attacks. This is a known issue acknowledged by the TLS 1.3 specification, as the protocol ...
secon
ATT&CK ID:S0266 ATT&CK Technique Name:TrickBot TrickBot can gather information about domain trusts by utilizing Nltest.[21][31]
secon
ATT&CK ID:C0010 ATT&CK Technique Name:C0010 During C0010, UNC3890 actors likely compromised the domain of a legitimate Israeli shipping company.[6]
secon
ATT&CK ID:S0677 ATT&CK Technique Name:AADInternals The AADInternals Set-AADIntUserMFA command can be used to disable MFA for a specified user.
secon
ATT&CK ID:S0264 ATT&CK Technique Name:OopsIE OopsIE performs several anti-VM and sandbox checks on the victim's machine. One technique the group has used was to perform a WMI query SELECT * FROM MSAcpi_ThermalZoneTemperature to check the temperature to see if it’s running in a virtual environment.[3]
secon
ATT&CK ID:S0650 ATT&CK Technique Name:QakBot QakBot can store its configuration information in a randomly named subkey under HKCU\Software\Microsoft.[18][19]
secon