text
stringlengths
100
9.93M
category
stringclasses
11 values
ATT&CK ID:S0387 ATT&CK Technique Name:KeyBoy KeyBoy installs a keylogger for intercepting credentials and keystrokes.[89]
secon
ATT&CK ID:T1078.002 ATT&CK Technique Name:Domain Accounts Adversaries may obtain and abuse credentials of a domain account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Domain accounts are those managed by Active Directory Domain Services where access and permissions are c...
secon
ATT&CK ID:S0250 ATT&CK Technique Name:Koadic Koadic can enable remote desktop on the victim's machine.[32]
secon
ATT&CK ID:G0026 ATT&CK Technique Name:APT18 APT18 actors leverage legitimate credentials to log into external remote services.[5]
secon
ATT&CK ID:S0500 ATT&CK Technique Name:MCMD MCMD can modify processes to prevent them from being visible on the desktop.[29]
secon
title:blackhat:us-20 Industrial Protocol Gateways Under Analysis With the development of the Industry 4.0, legacy devices like serial control servers or PLCs are often needed to be interconnected to modern IT networks, or to the Internet (e.g. cloud providers). To address this need, protocol gateways enable the convers...
secon
ATT&CK ID:S0338 ATT&CK Technique Name:Cobian RAT Cobian RAT has a feature to perform keylogging on the victim’s machine.[43]
secon
ATT&CK ID:T1047 ATT&CK Technique Name:Windows Management Instrumentation Adversaries may abuse Windows Management Instrumentation (WMI) to execute malicious commands and payloads. WMI is an administration feature that provides a uniform environment to access Windows system components. The WMI service enables both local...
secon
ATT&CK ID:S0363 ATT&CK Technique Name:Empire Empire can timestomp any files or payloads placed on a target machine to help them blend in.[23]
secon
ATT&CK ID:T1546.007 ATT&CK Technique Name:Netsh Helper DLL Adversaries may establish persistence by executing malicious content triggered by Netsh Helper DLLs. Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system. It contains functional...
secon
title:blackhat:us-21 President's Cup Cyber Competition: Finding the Best Cyber Talent in the US Government In 2019, the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) held the first cybersecurity competition for the Federal workforce. Dubbed the President's Cup Cybersecurity C...
secon
ATT&CK ID:S0559 ATT&CK Technique Name:SUNBURST SUNBURST used VBScripts to initiate the execution of payloads.[151]
secon
ATT&CK ID:S0128 ATT&CK Technique Name:BADNEWS BADNEWS has a command to download an .exe and execute it via CreateProcess API. It can also run with ShellExecute.[29][30]
secon
ATT&CK ID:T1550.003 ATT&CK Technique Name:Pass the Ticket Adversaries may "pass the ticket" using stolen Kerberos tickets to move laterally within an environment, bypassing normal system access controls. Pass the ticket (PtT) is a method of authenticating to a system using Kerberos tickets without having access to an a...
secon
ATT&CK ID:S0317 ATT&CK Technique Name:Marcher Marcher attempts to overlay itself on top of legitimate banking apps in an effort to capture user credentials. Marcher also attempts to overlay itself on top of legitimate apps such as the Google Play Store in an effort to capture user credit card information.[22]
secon
ATT&CK ID:S0019 ATT&CK Technique Name:Regin Regin appears to have functionality to sniff for credentials passed over HTTP, SMTP, and SMB.[25]
secon
ATT&CK ID:G0046 ATT&CK Technique Name:FIN7 FIN7 has signed Carbanak payloads with legally purchased code signing certificates. FIN7 has also digitally signed their phishing documents, backdoors and other staging tools to bypass security controls.[32][33]
secon
ATT&CK ID:S0485 ATT&CK Technique Name:Mandrake Mandrake can collect all accounts stored on the device.[8]
secon
ATT&CK ID:S0434 ATT&CK Technique Name:Imminent Monitor Imminent Monitor has a remote webcam monitoring capability.[18][19]
secon
ATT&CK ID:M1042 ATT&CK Technique Name:Disable or Remove Feature or Program Disable Autorun if it is unnecessary. [9] Disallow or restrict removable media at an organizational policy level if they are not required for business operations. [10]
secon
ATT&CK ID:S0699 ATT&CK Technique Name:Mythic Mythic can leverage a modified SOCKS5 proxy to tunnel egress C2 traffic.[18]
secon
ATT&CK ID:T1566 ATT&CK Technique Name:Phishing Adversaries may send phishing messages to gain access to victim systems. All forms of phishing are electronically delivered social engineering. Phishing can be targeted, known as spearphishing. In spearphishing, a specific individual, company, or industry will be targeted ...
secon
ATT&CK ID:M1038 ATT&CK Technique Name:Execution Prevention Adversaries will likely need to place new binaries in locations to be executed through this weakness. Identify and block potentially malicious software executed path interception by using application control tools, like Windows Defender Application Control, App...
secon
ATT&CK ID:G1009 ATT&CK Technique Name:Moses Staff Moses Staff collected information about the infected host, including the machine names and OS architecture.[237]
secon
ATT&CK ID:T1070.002 ATT&CK Technique Name:Clear Linux or Mac System Logs Adversaries may clear system logs to hide evidence of an intrusion. macOS and Linux both keep track of system or user-initiated actions via system logs. The majority of native system logging is stored under the /var/log/ directory. Subfolders in t...
secon
ATT&CK ID:M1026 ATT&CK Technique Name:Privileged Account Management Restrict administrator accounts to as few individuals as possible, following least privilege principles. Prevent credential overlap across systems of administrator and privileged accounts, particularly between network and non-network platforms, such a...
secon
ATT&CK ID:S0461 ATT&CK Technique Name:SDBbot SDBbot has the ability to inject a downloaded DLL into a newly created rundll32.exe process.[33]
secon
ATT&CK ID:S0606 ATT&CK Technique Name:Bad Rabbit Bad Rabbit spread through watering holes on popular sites by injecting JavaScript into the HTML body or a .js file.[15][16]
secon
ATT&CK ID:S0113 ATT&CK Technique Name:Prikormka A module in Prikormka collects passwords stored in applications installed on the victim.[33]
secon
ATT&CK ID:S0212 ATT&CK Technique Name:CORALDECK CORALDECK has created password-protected RAR, WinImage, and zip archives to be exfiltrated.[23]
secon
ATT&CK ID:T0878 ATT&CK Technique Name:Alarm Suppression Adversaries may target protection function alarms to prevent them from notifying operators of critical conditions. Alarm messages may be a part of an overall reporting system and of particular interest for adversaries. Disruption of the alarm system does not imply...
secon
title:blackhat:us-18 Pestilential Protocol: How Unsecure HL7 Messages Threaten Patient Lives Healthcare infosec is in critical condition- too few bodies, underfunded to a fault, and limping along on legacy systems stuffed with vulnerabilities. From exploited insulin/medication pumps to broken pacemakers, no implantable...
secon
ATT&CK ID:M1042 ATT&CK Technique Name:Disable or Remove Feature or Program Disable Hyper-V if not necessary within a given environment.
secon
ATT&CK ID:S0060 ATT&CK Technique Name:Sys10 Sys10 collects the group name of the logged-in user and sends it to the C2.[27]
secon
ATT&CK ID:M0937 ATT&CK Technique Name:Filter Network Traffic Allow/denylists can be used to block access when excessive I/O connections are detected from a system or device during a specified time period.
secon
title:blackhat:eu-18 Eternal War in XNU Kernel Objects Jailbreaking, in general, means breaking the device out of its "jail'." Apple devices (e.g., iPhone, iPad, Apple Watch) are the most famous "jail'' devices among the world. iOS, macOS, watchOS, and tvOS are operating systems developed by Apple Inc. and used in Appl...
secon
ATT&CK ID:G1004 ATT&CK Technique Name:LAPSUS$ LAPSUS$ has gathered detailed knowledge of team structures within a target organization.[4]
secon
ATT&CK ID:S0381 ATT&CK Technique Name:FlawedAmmyy FlawedAmmyy has been installed via msiexec.exe.[10]
secon
title:blackhat:us-18 Hardening Hyper-V through Offensive Security Research Virtualization technology is fast becoming the backbone of the security strategy for modern computing platforms. Hyper-V, Microsoft's virtualization stack, is no exception and is therefore held to a high security standard, as is demonstrated by ...
secon
ATT&CK ID:S0168 ATT&CK Technique Name:Gazer Gazer can establish persistence through the system screensaver by configuring it to execute the malware.[2]
secon
ATT&CK ID:M1043 ATT&CK Technique Name:Credential Access Protection Some embedded network devices are capable of storing passwords for local accounts in either plain-text or encrypted formats. Ensure that, where available, local passwords are always encrypted, per vendor recommendations.[2]
secon
titleblackhat:us-19 Behind the Scenes: The Industry of Social Media Manipulation Driven by Malware This talk is the 'grand finale' of a four-year long investigation that started with analyzing an IoT botnet, and led to discovering the structured industry that exists behind social media manipulation (SMM). SMM is the de...
secon
ATT&CK ID:S0039 ATT&CK Technique Name:Net Commands under net user can be used in Net to gather information about and manipulate user accounts.[27]
secon
ATT&CK ID:G0044 ATT&CK Technique Name:Winnti Group Winnti Group used stolen certificates to sign its malware.[72]
secon
ATT&CK ID:S0458 ATT&CK Technique Name:Ramsay Ramsay can scan for removable media which may contain documents for collection.[38][39]
secon
ATT&CK ID:C0006 ATT&CK Technique Name:Operation Honeybee During Operation Honeybee, threat actors registered domains for C2.[54]
secon
ATT&CK ID:S0388 ATT&CK Technique Name:YAHOYAH YAHOYAH uses HTTP GET requests to download other files that are executed in memory.[486]
secon
ATT&CK ID:T1137.001 ATT&CK Technique Name:Office Template Macros Adversaries may abuse Microsoft Office templates to obtain persistence on a compromised system. Microsoft Office contains templates that are part of common Office applications and are used to customize styles. The base templates within the application are...
secon
ATT&CK ID:T0836 ATT&CK Technique Name:Modify Parameter Adversaries may modify parameters used to instruct industrial control system devices. These devices operate via programs that dictate how and when to perform actions based on such parameters. Such parameters can determine the extent to which an action is performed ...
secon
ATT&CK ID:S0455 ATT&CK Technique Name:Metamorfo Metamorfo has configured persistence to the Registry ket HKCU\Software\Microsoft\Windows\CurrentVersion\Run, Spotify =% APPDATA%\Spotify\Spotify.exe and used .LNK files in the startup folder to achieve persistence.[159][160][161][162]
secon
titleblackhat:us-21 CnCHunter: An MITM-Approach to Identify Live CnC Servers How can we identify active CnC servers? Answering this question is critical for containing and combating botnets. Finding CnC servers is not trivial because: CnC servers can change locations expressly to avoid detection, use proprietary commun...
secon
ATT&CK ID:G1009 ATT&CK Technique Name:Moses Staff Moses Staff has collected the domain name of a compromised network.[146]
secon
ATT&CK ID:TA0011 ATT&CK Technique Name:Command and Control The adversary is trying to communicate with compromised systems to control them.
secon
ATT&CK ID:G0032 ATT&CK Technique Name:Lazarus Group Lazarus Group has created new Twitter accounts to conduct social engineering against potential victims.[10]
secon
ATT&CK ID:S0180 ATT&CK Technique Name:Volgmer Volgmer can gather information about TCP connection state.[92]
secon
ATT&CK ID:S0115 ATT&CK Technique Name:Crimson Crimson contains a command to collect and exfiltrate emails from Outlook.[7]
secon
ATT&CK ID:S0363 ATT&CK Technique Name:Empire Empire can conduct command and control over protocols like HTTP and HTTPS.[113]
secon
ATT&CK ID:C0002 ATT&CK Technique Name:Night Dragon During Night Dragon, threat actors obtained and used tools such as gsecdump.[77]
secon
ATT&CK ID:S1058 ATT&CK Technique Name:Prestige Prestige has been executed on a target system through a scheduled task created by Sandworm Team using Impacket.[133]
secon
ATT&CK ID:G0032 ATT&CK Technique Name:Lazarus Group Lazarus Group has compromised servers to stage malicious tools.[5]
secon
ATT&CK ID:S0662 ATT&CK Technique Name:RCSession RCSession has the ability to capture keystrokes on a compromised host.[38][148]
secon
ATT&CK ID:S0531 ATT&CK Technique Name:Grandoreiro Grandoreiro can decrypt its encrypted internal strings.[101]
secon
ATT&CK ID:G1006 ATT&CK Technique Name:Earth Lusca Earth Lusca used the command schtasks /Create /SC ONLOgon /TN WindowsUpdateCheck /TR "[file path]" /ru system for persistence.[4]
secon
ATT&CK ID:T1596.005 ATT&CK Technique Name:Scan Databases Adversaries may search within public scan databases for information about victims that can be used during targeting. Various online services continuously publish the results of Internet scans/surveys, often harvesting information such as active IP addresses, host...
secon
ATT&CK ID:M1017 ATT&CK Technique Name:User Training Train users to be suspicious about certificate errors. Adversaries may use their own certificates in an attempt to intercept HTTPS traffic. Certificate errors may arise when the application’s certificate does not match the one expected by the host.
secon
ATT&CK ID:S0154 ATT&CK Technique Name:Cobalt Strike Cobalt Strike can use rundll32.exe to load DLL from the command line.[31][27][32]
secon
ATT&CK ID:S0154 ATT&CK Technique Name:Cobalt Strike Cobalt Strike can use a number of known techniques to bypass Windows UAC.[24][25]
secon
ATT&CK ID:S0246 ATT&CK Technique Name:HARDRAIN HARDRAIN uses FakeTLS to communicate with its C2 server.[7]
secon
ATT&CK ID:S1024 ATT&CK Technique Name:CreepySnail CreepySnail can use stolen credentials to authenticate on target networks.[8]
secon
ATT&CK ID:G0040 ATT&CK Technique Name:Patchwork Patchwork uses malicious documents to deliver remote execution exploits as part of. The group has previously exploited CVE-2017-8570, CVE-2012-1856, CVE-2014-4114, CVE-2017-0199, CVE-2017-11882, and CVE-2015-1641.[64][65][66][67][68][69][70]
secon
ATT&CK ID:T0866 ATT&CK Technique Name:Exploitation of Remote Services Adversaries may exploit a software vulnerability to take advantage of a programming error in a program, service, or within the operating system software or kernel itself to enable remote service abuse. A common goal for post-compromise exploitation o...
secon
ATT&CK ID:S0650 ATT&CK Technique Name:QakBot QakBot has the ability to capture web session cookies.[13][14]
secon
ATT&CK ID:S0390 ATT&CK Technique Name:SQLRat SQLRat can make a direct SQL connection to a Microsoft database controlled by the attackers, retrieve an item from the bindata table, then write and execute the file on disk.[425]
secon
ATT&CK ID:S0446 ATT&CK Technique Name:Ryuk Ryuk can use stolen domain admin accounts to move laterally within a victim domain.[16]
secon
ATT&CK ID:S0476 ATT&CK Technique Name:Valak Valak has the ability to take screenshots on a compromised host.[176]
secon
ATT&CK ID:G0035 ATT&CK Technique Name:Dragonfly Dragonfly has exploited CVE-2011-0611 in Adobe Flash Player to gain execution on a targeted system.[44]
secon
title:botconf2020 NanoCore hunter: tracking NanoCore servers and watching behavior of RAT operators for 180 days NanoCore RAT, which first appeared in 2013, is still actively used in 2020 for its highly functional and user-friendly interace. Around Feburary to March in 2020, NanoCore RAT was used in the malspam campaig...
secon
ATT&CK ID:S0161 ATT&CK Technique Name:XAgentOSX XAgentOSX contains the readFiles function to return a detailed listing (sometimes recursive) of a specified directory.[331] XAgentOSX contains the showBackupIosFolder function to check for IOS device backups by running ls -la ~/Library/Application\ Support/MobileSync/Back...
secon
ATT&CK ID:G0047 ATT&CK Technique Name:Gamaredon Group Gamaredon Group has incorporated dynamic DNS domains in its infrastructure.[6]
secon
ATT&CK ID:M1051 ATT&CK Technique Name:Update Software Update password managers regularly by employing patch management for internal enterprise endpoints and servers.
secon
ATT&CK ID:T1055.002 ATT&CK Technique Name:Portable Executable Injection Adversaries may inject portable executables (PE) into processes in order to evade process-based defenses as well as possibly elevate privileges. PE injection is a method of executing arbitrary code in the address space of a separate live process.
secon
ATT&CK ID:S0176 ATT&CK Technique Name:Wingbird Wingbird performs multiple process injections to hijack system processes and execute malicious code.[69]
secon
ATT&CK ID:G0034 ATT&CK Technique Name:Sandworm Team In 2017, Sandworm Team conducted technical research related to vulnerabilities associated with websites used by the Korean Sport and Olympic Committee, a Korean power company, and a Korean airport.[2]
secon
ATT&CK ID:M0814 ATT&CK Technique Name:Static Network Configuration Unauthorized connections can be prevented by statically defining the hosts and ports used for automation protocol connections.
secon
ATT&CK ID:S0184 ATT&CK Technique Name:POWRUNER POWRUNER may collect user account information by running net user /domain or a series of other commands on a victim.[40]
secon
ATT&CK ID:S0699 ATT&CK Technique Name:Mythic Mythic supports scripting of file downloads from agents.[28]
secon
titleblackhat:us-22 Is WebAssembly Really Safe? --Wasm VM Escape and RCE Vulnerabilities Have Been Found in New Way WebAssembly (Wasm) supports binary format which provides languages such as C/C++, C# and Rust with a compilation target on the web. It is a web standard with active participation from all major browser ve...
secon
ATT&CK ID:S0145 ATT&CK Technique Name:POWERSOURCE POWERSOURCE queries Registry keys in preparation for setting Run keys to achieve persistence.[69]
secon
ATT&CK ID:S0462 ATT&CK Technique Name:CARROTBAT CARROTBAT has the ability to determine the operating system of the compromised host and whether Windows is being run with x86 or x64 architecture.[81][82]
secon
ATT&CK ID:M1052 ATT&CK Technique Name:User Account Control Although UAC bypass techniques exist, it is still prudent to use the highest enforcement level for UAC when possible and mitigate bypass opportunities that exist with techniques such as DLL Search Order Hijacking.
secon
ATT&CK ID:G0080 ATT&CK Technique Name:Cobalt Group Cobalt Group used a JavaScript backdoor that is capable of collecting a list of the security solutions installed on the victim's machine.[21]
secon
ATT&CK ID:G0067 ATT&CK Technique Name:APT37 APT37 has a function in the initial dropper to bypass Windows UAC in order to execute the next payload with higher privileges.[11]
secon
titleblackhat:us-22 Talent Need Not Apply: Tradecraft and Objectives of Job-themed APT Social Engineering When a job offer looks too good to be true… it probably is. As the COVID-19 pandemic has led workers to rethink their careers and long-term goals, threat actors have exploited it as an opportunity to fulfill strate...
secon
ATT&CK ID:M1042 ATT&CK Technique Name:Disable or Remove Feature or Program Disable Autorun if it is unnecessary. [32] Disallow or restrict removable media at an organizational policy level if it is not required for business operations. [33]
secon
ATT&CK ID:G0007 ATT&CK Technique Name:APT28 APT28 has used compromised Office 365 service accounts with Global Administrator privileges to collect email from user inboxes.[4]
secon
ATT&CK ID:S0197 ATT&CK Technique Name:PUNCHTRACK PUNCHTRACK aggregates collected data in a tmp file.[80]
secon
ATT&CK ID:T1496 ATT&CK Technique Name:Resource Hijacking Adversaries may leverage the resources of co-opted systems in order to solve resource intensive problems, which may impact system and/or hosted service availability.
secon
ATT&CK ID:S1066 ATT&CK Technique Name:DarkTortilla DarkTortilla can enumerate a list of running processes on a compromised system.[74]
secon
ATT&CK ID:M1011 ATT&CK Technique Name:User Guidance Users should be wary of granting applications dangerous or privacy-intrusive permissions, such as access to location information. Users should also protect their account credentials and enable multi-factor authentication options when available.
secon
ATT&CK ID:S1062 ATT&CK Technique Name:S.O.V.A. S.O.V.A. can search for installed applications that match a list of targets.[26]
secon