text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
ATT&CK ID:S0387
ATT&CK Technique Name:KeyBoy
KeyBoy installs a keylogger for intercepting credentials and keystrokes.[89] | secon |
ATT&CK ID:T1078.002
ATT&CK Technique Name:Domain Accounts
Adversaries may obtain and abuse credentials of a domain account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Domain accounts are those managed by Active Directory Domain Services where access and permissions are c... | secon |
ATT&CK ID:S0250
ATT&CK Technique Name:Koadic
Koadic can enable remote desktop on the victim's machine.[32] | secon |
ATT&CK ID:G0026
ATT&CK Technique Name:APT18
APT18 actors leverage legitimate credentials to log into external remote services.[5] | secon |
ATT&CK ID:S0500
ATT&CK Technique Name:MCMD
MCMD can modify processes to prevent them from being visible on the desktop.[29] | secon |
title:blackhat:us-20 Industrial Protocol Gateways Under Analysis
With the development of the Industry 4.0, legacy devices like serial control servers or PLCs are often needed to be interconnected to modern IT networks, or to the Internet (e.g. cloud providers). To address this need, protocol gateways enable the convers... | secon |
ATT&CK ID:S0338
ATT&CK Technique Name:Cobian RAT
Cobian RAT has a feature to perform keylogging on the victim’s machine.[43] | secon |
ATT&CK ID:T1047
ATT&CK Technique Name:Windows Management Instrumentation
Adversaries may abuse Windows Management Instrumentation (WMI) to execute malicious commands and payloads. WMI is an administration feature that provides a uniform environment to access Windows system components. The WMI service enables both local... | secon |
ATT&CK ID:S0363
ATT&CK Technique Name:Empire
Empire can timestomp any files or payloads placed on a target machine to help them blend in.[23] | secon |
ATT&CK ID:T1546.007
ATT&CK Technique Name:Netsh Helper DLL
Adversaries may establish persistence by executing malicious content triggered by Netsh Helper DLLs. Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system. It contains functional... | secon |
title:blackhat:us-21 President's Cup Cyber Competition: Finding the Best Cyber Talent in the US Government
In 2019, the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) held the first cybersecurity competition for the Federal workforce. Dubbed the President's Cup Cybersecurity C... | secon |
ATT&CK ID:S0559
ATT&CK Technique Name:SUNBURST
SUNBURST used VBScripts to initiate the execution of payloads.[151] | secon |
ATT&CK ID:S0128
ATT&CK Technique Name:BADNEWS
BADNEWS has a command to download an .exe and execute it via CreateProcess API. It can also run with ShellExecute.[29][30] | secon |
ATT&CK ID:T1550.003
ATT&CK Technique Name:Pass the Ticket
Adversaries may "pass the ticket" using stolen Kerberos tickets to move laterally within an environment, bypassing normal system access controls. Pass the ticket (PtT) is a method of authenticating to a system using Kerberos tickets without having access to an a... | secon |
ATT&CK ID:S0317
ATT&CK Technique Name:Marcher
Marcher attempts to overlay itself on top of legitimate banking apps in an effort to capture user credentials. Marcher also attempts to overlay itself on top of legitimate apps such as the Google Play Store in an effort to capture user credit card information.[22] | secon |
ATT&CK ID:S0019
ATT&CK Technique Name:Regin
Regin appears to have functionality to sniff for credentials passed over HTTP, SMTP, and SMB.[25] | secon |
ATT&CK ID:G0046
ATT&CK Technique Name:FIN7
FIN7 has signed Carbanak payloads with legally purchased code signing certificates. FIN7 has also digitally signed their phishing documents, backdoors and other staging tools to bypass security controls.[32][33] | secon |
ATT&CK ID:S0485
ATT&CK Technique Name:Mandrake
Mandrake can collect all accounts stored on the device.[8] | secon |
ATT&CK ID:S0434
ATT&CK Technique Name:Imminent Monitor
Imminent Monitor has a remote webcam monitoring capability.[18][19] | secon |
ATT&CK ID:M1042
ATT&CK Technique Name:Disable or Remove Feature or Program
Disable Autorun if it is unnecessary. [9] Disallow or restrict removable media at an organizational policy level if they are not required for business operations. [10] | secon |
ATT&CK ID:S0699
ATT&CK Technique Name:Mythic
Mythic can leverage a modified SOCKS5 proxy to tunnel egress C2 traffic.[18] | secon |
ATT&CK ID:T1566
ATT&CK Technique Name:Phishing
Adversaries may send phishing messages to gain access to victim systems. All forms of phishing are electronically delivered social engineering. Phishing can be targeted, known as spearphishing. In spearphishing, a specific individual, company, or industry will be targeted ... | secon |
ATT&CK ID:M1038
ATT&CK Technique Name:Execution Prevention
Adversaries will likely need to place new binaries in locations to be executed through this weakness. Identify and block potentially malicious software executed path interception by using application control tools, like Windows Defender Application Control, App... | secon |
ATT&CK ID:G1009
ATT&CK Technique Name:Moses Staff
Moses Staff collected information about the infected host, including the machine names and OS architecture.[237] | secon |
ATT&CK ID:T1070.002
ATT&CK Technique Name:Clear Linux or Mac System Logs
Adversaries may clear system logs to hide evidence of an intrusion. macOS and Linux both keep track of system or user-initiated actions via system logs. The majority of native system logging is stored under the /var/log/ directory. Subfolders in t... | secon |
ATT&CK ID:M1026
ATT&CK Technique Name:Privileged Account Management
Restrict administrator accounts to as few individuals as possible, following least privilege principles. Prevent credential overlap across systems of administrator and privileged accounts, particularly between network and non-network platforms, such a... | secon |
ATT&CK ID:S0461
ATT&CK Technique Name:SDBbot
SDBbot has the ability to inject a downloaded DLL into a newly created rundll32.exe process.[33] | secon |
ATT&CK ID:S0606
ATT&CK Technique Name:Bad Rabbit
Bad Rabbit spread through watering holes on popular sites by injecting JavaScript into the HTML body or a .js file.[15][16] | secon |
ATT&CK ID:S0113
ATT&CK Technique Name:Prikormka
A module in Prikormka collects passwords stored in applications installed on the victim.[33] | secon |
ATT&CK ID:S0212
ATT&CK Technique Name:CORALDECK
CORALDECK has created password-protected RAR, WinImage, and zip archives to be exfiltrated.[23] | secon |
ATT&CK ID:T0878
ATT&CK Technique Name:Alarm Suppression
Adversaries may target protection function alarms to prevent them from notifying operators of critical conditions. Alarm messages may be a part of an overall reporting system and of particular interest for adversaries. Disruption of the alarm system does not imply... | secon |
title:blackhat:us-18 Pestilential Protocol: How Unsecure HL7 Messages Threaten Patient Lives
Healthcare infosec is in critical condition- too few bodies, underfunded to a fault, and limping along on legacy systems stuffed with vulnerabilities. From exploited insulin/medication pumps to broken pacemakers, no implantable... | secon |
ATT&CK ID:M1042
ATT&CK Technique Name:Disable or Remove Feature or Program
Disable Hyper-V if not necessary within a given environment. | secon |
ATT&CK ID:S0060
ATT&CK Technique Name:Sys10
Sys10 collects the group name of the logged-in user and sends it to the C2.[27] | secon |
ATT&CK ID:M0937
ATT&CK Technique Name:Filter Network Traffic
Allow/denylists can be used to block access when excessive I/O connections are detected from a system or device during a specified time period. | secon |
title:blackhat:eu-18 Eternal War in XNU Kernel Objects
Jailbreaking, in general, means breaking the device out of its "jail'." Apple devices (e.g., iPhone, iPad, Apple Watch) are the most famous "jail'' devices among the world. iOS, macOS, watchOS, and tvOS are operating systems developed by Apple Inc. and used in Appl... | secon |
ATT&CK ID:G1004
ATT&CK Technique Name:LAPSUS$
LAPSUS$ has gathered detailed knowledge of team structures within a target organization.[4] | secon |
ATT&CK ID:S0381
ATT&CK Technique Name:FlawedAmmyy
FlawedAmmyy has been installed via msiexec.exe.[10] | secon |
title:blackhat:us-18 Hardening Hyper-V through Offensive Security Research
Virtualization technology is fast becoming the backbone of the security strategy for modern computing platforms. Hyper-V, Microsoft's virtualization stack, is no exception and is therefore held to a high security standard, as is demonstrated by ... | secon |
ATT&CK ID:S0168
ATT&CK Technique Name:Gazer
Gazer can establish persistence through the system screensaver by configuring it to execute the malware.[2] | secon |
ATT&CK ID:M1043
ATT&CK Technique Name:Credential Access Protection
Some embedded network devices are capable of storing passwords for local accounts in either plain-text or encrypted formats. Ensure that, where available, local passwords are always encrypted, per vendor recommendations.[2] | secon |
titleblackhat:us-19 Behind the Scenes: The Industry of Social Media Manipulation Driven by Malware
This talk is the 'grand finale' of a four-year long investigation that started with analyzing an IoT botnet, and led to discovering the structured industry that exists behind social media manipulation (SMM). SMM is the de... | secon |
ATT&CK ID:S0039
ATT&CK Technique Name:Net
Commands under net user can be used in Net to gather information about and manipulate user accounts.[27] | secon |
ATT&CK ID:G0044
ATT&CK Technique Name:Winnti Group
Winnti Group used stolen certificates to sign its malware.[72] | secon |
ATT&CK ID:S0458
ATT&CK Technique Name:Ramsay
Ramsay can scan for removable media which may contain documents for collection.[38][39] | secon |
ATT&CK ID:C0006
ATT&CK Technique Name:Operation Honeybee
During Operation Honeybee, threat actors registered domains for C2.[54] | secon |
ATT&CK ID:S0388
ATT&CK Technique Name:YAHOYAH
YAHOYAH uses HTTP GET requests to download other files that are executed in memory.[486] | secon |
ATT&CK ID:T1137.001
ATT&CK Technique Name:Office Template Macros
Adversaries may abuse Microsoft Office templates to obtain persistence on a compromised system. Microsoft Office contains templates that are part of common Office applications and are used to customize styles. The base templates within the application are... | secon |
ATT&CK ID:T0836
ATT&CK Technique Name:Modify Parameter
Adversaries may modify parameters used to instruct industrial control system devices. These devices operate via programs that dictate how and when to perform actions based on such parameters. Such parameters can determine the extent to which an action is performed ... | secon |
ATT&CK ID:S0455
ATT&CK Technique Name:Metamorfo
Metamorfo has configured persistence to the Registry ket HKCU\Software\Microsoft\Windows\CurrentVersion\Run, Spotify =% APPDATA%\Spotify\Spotify.exe and used .LNK files in the startup folder to achieve persistence.[159][160][161][162] | secon |
titleblackhat:us-21 CnCHunter: An MITM-Approach to Identify Live CnC Servers
How can we identify active CnC servers? Answering this question is critical for containing and combating botnets. Finding CnC servers is not trivial because: CnC servers can change locations expressly to avoid detection, use proprietary commun... | secon |
ATT&CK ID:G1009
ATT&CK Technique Name:Moses Staff
Moses Staff has collected the domain name of a compromised network.[146] | secon |
ATT&CK ID:TA0011
ATT&CK Technique Name:Command and Control
The adversary is trying to communicate with compromised systems to control them. | secon |
ATT&CK ID:G0032
ATT&CK Technique Name:Lazarus Group
Lazarus Group has created new Twitter accounts to conduct social engineering against potential victims.[10] | secon |
ATT&CK ID:S0180
ATT&CK Technique Name:Volgmer
Volgmer can gather information about TCP connection state.[92] | secon |
ATT&CK ID:S0115
ATT&CK Technique Name:Crimson
Crimson contains a command to collect and exfiltrate emails from Outlook.[7] | secon |
ATT&CK ID:S0363
ATT&CK Technique Name:Empire
Empire can conduct command and control over protocols like HTTP and HTTPS.[113] | secon |
ATT&CK ID:C0002
ATT&CK Technique Name:Night Dragon
During Night Dragon, threat actors obtained and used tools such as gsecdump.[77] | secon |
ATT&CK ID:S1058
ATT&CK Technique Name:Prestige
Prestige has been executed on a target system through a scheduled task created by Sandworm Team using Impacket.[133] | secon |
ATT&CK ID:G0032
ATT&CK Technique Name:Lazarus Group
Lazarus Group has compromised servers to stage malicious tools.[5] | secon |
ATT&CK ID:S0662
ATT&CK Technique Name:RCSession
RCSession has the ability to capture keystrokes on a compromised host.[38][148] | secon |
ATT&CK ID:S0531
ATT&CK Technique Name:Grandoreiro
Grandoreiro can decrypt its encrypted internal strings.[101] | secon |
ATT&CK ID:G1006
ATT&CK Technique Name:Earth Lusca
Earth Lusca used the command schtasks /Create /SC ONLOgon /TN WindowsUpdateCheck /TR "[file path]" /ru system for persistence.[4] | secon |
ATT&CK ID:T1596.005
ATT&CK Technique Name:Scan Databases
Adversaries may search within public scan databases for information about victims that can be used during targeting. Various online services continuously publish the results of Internet scans/surveys, often harvesting information such as active IP addresses, host... | secon |
ATT&CK ID:M1017
ATT&CK Technique Name:User Training
Train users to be suspicious about certificate errors. Adversaries may use their own certificates in an attempt to intercept HTTPS traffic. Certificate errors may arise when the application’s certificate does not match the one expected by the host. | secon |
ATT&CK ID:S0154
ATT&CK Technique Name:Cobalt Strike
Cobalt Strike can use rundll32.exe to load DLL from the command line.[31][27][32] | secon |
ATT&CK ID:S0154
ATT&CK Technique Name:Cobalt Strike
Cobalt Strike can use a number of known techniques to bypass Windows UAC.[24][25] | secon |
ATT&CK ID:S0246
ATT&CK Technique Name:HARDRAIN
HARDRAIN uses FakeTLS to communicate with its C2 server.[7] | secon |
ATT&CK ID:S1024
ATT&CK Technique Name:CreepySnail
CreepySnail can use stolen credentials to authenticate on target networks.[8] | secon |
ATT&CK ID:G0040
ATT&CK Technique Name:Patchwork
Patchwork uses malicious documents to deliver remote execution exploits as part of. The group has previously exploited CVE-2017-8570, CVE-2012-1856, CVE-2014-4114, CVE-2017-0199, CVE-2017-11882, and CVE-2015-1641.[64][65][66][67][68][69][70] | secon |
ATT&CK ID:T0866
ATT&CK Technique Name:Exploitation of Remote Services
Adversaries may exploit a software vulnerability to take advantage of a programming error in a program, service, or within the operating system software or kernel itself to enable remote service abuse. A common goal for post-compromise exploitation o... | secon |
ATT&CK ID:S0650
ATT&CK Technique Name:QakBot
QakBot has the ability to capture web session cookies.[13][14] | secon |
ATT&CK ID:S0390
ATT&CK Technique Name:SQLRat
SQLRat can make a direct SQL connection to a Microsoft database controlled by the attackers, retrieve an item from the bindata table, then write and execute the file on disk.[425] | secon |
ATT&CK ID:S0446
ATT&CK Technique Name:Ryuk
Ryuk can use stolen domain admin accounts to move laterally within a victim domain.[16] | secon |
ATT&CK ID:S0476
ATT&CK Technique Name:Valak
Valak has the ability to take screenshots on a compromised host.[176] | secon |
ATT&CK ID:G0035
ATT&CK Technique Name:Dragonfly
Dragonfly has exploited CVE-2011-0611 in Adobe Flash Player to gain execution on a targeted system.[44] | secon |
title:botconf2020 NanoCore hunter: tracking NanoCore servers and watching behavior of RAT operators for 180 days
NanoCore RAT, which first appeared in 2013, is still actively used in 2020 for its highly functional and user-friendly interace. Around Feburary to March in 2020, NanoCore RAT was used in the malspam campaig... | secon |
ATT&CK ID:S0161
ATT&CK Technique Name:XAgentOSX
XAgentOSX contains the readFiles function to return a detailed listing (sometimes recursive) of a specified directory.[331] XAgentOSX contains the showBackupIosFolder function to check for IOS device backups by running ls -la ~/Library/Application\ Support/MobileSync/Back... | secon |
ATT&CK ID:G0047
ATT&CK Technique Name:Gamaredon Group
Gamaredon Group has incorporated dynamic DNS domains in its infrastructure.[6] | secon |
ATT&CK ID:M1051
ATT&CK Technique Name:Update Software
Update password managers regularly by employing patch management for internal enterprise endpoints and servers. | secon |
ATT&CK ID:T1055.002
ATT&CK Technique Name:Portable Executable Injection
Adversaries may inject portable executables (PE) into processes in order to evade process-based defenses as well as possibly elevate privileges. PE injection is a method of executing arbitrary code in the address space of a separate live process. | secon |
ATT&CK ID:S0176
ATT&CK Technique Name:Wingbird
Wingbird performs multiple process injections to hijack system processes and execute malicious code.[69] | secon |
ATT&CK ID:G0034
ATT&CK Technique Name:Sandworm Team
In 2017, Sandworm Team conducted technical research related to vulnerabilities associated with websites used by the Korean Sport and Olympic Committee, a Korean power company, and a Korean airport.[2] | secon |
ATT&CK ID:M0814
ATT&CK Technique Name:Static Network Configuration
Unauthorized connections can be prevented by statically defining the hosts and ports used for automation protocol connections. | secon |
ATT&CK ID:S0184
ATT&CK Technique Name:POWRUNER
POWRUNER may collect user account information by running net user /domain or a series of other commands on a victim.[40] | secon |
ATT&CK ID:S0699
ATT&CK Technique Name:Mythic
Mythic supports scripting of file downloads from agents.[28] | secon |
titleblackhat:us-22 Is WebAssembly Really Safe? --Wasm VM Escape and RCE Vulnerabilities Have Been Found in New Way
WebAssembly (Wasm) supports binary format which provides languages such as C/C++, C# and Rust with a compilation target on the web. It is a web standard with active participation from all major browser ve... | secon |
ATT&CK ID:S0145
ATT&CK Technique Name:POWERSOURCE
POWERSOURCE queries Registry keys in preparation for setting Run keys to achieve persistence.[69] | secon |
ATT&CK ID:S0462
ATT&CK Technique Name:CARROTBAT
CARROTBAT has the ability to determine the operating system of the compromised host and whether Windows is being run with x86 or x64 architecture.[81][82] | secon |
ATT&CK ID:M1052
ATT&CK Technique Name:User Account Control
Although UAC bypass techniques exist, it is still prudent to use the highest enforcement level for UAC when possible and mitigate bypass opportunities that exist with techniques such as DLL Search Order Hijacking. | secon |
ATT&CK ID:G0080
ATT&CK Technique Name:Cobalt Group
Cobalt Group used a JavaScript backdoor that is capable of collecting a list of the security solutions installed on the victim's machine.[21] | secon |
ATT&CK ID:G0067
ATT&CK Technique Name:APT37
APT37 has a function in the initial dropper to bypass Windows UAC in order to execute the next payload with higher privileges.[11] | secon |
titleblackhat:us-22 Talent Need Not Apply: Tradecraft and Objectives of Job-themed APT Social Engineering
When a job offer looks too good to be true… it probably is. As the COVID-19 pandemic has led workers to rethink their careers and long-term goals, threat actors have exploited it as an opportunity to fulfill strate... | secon |
ATT&CK ID:M1042
ATT&CK Technique Name:Disable or Remove Feature or Program
Disable Autorun if it is unnecessary. [32] Disallow or restrict removable media at an organizational policy level if it is not required for business operations. [33] | secon |
ATT&CK ID:G0007
ATT&CK Technique Name:APT28
APT28 has used compromised Office 365 service accounts with Global Administrator privileges to collect email from user inboxes.[4] | secon |
ATT&CK ID:S0197
ATT&CK Technique Name:PUNCHTRACK
PUNCHTRACK aggregates collected data in a tmp file.[80] | secon |
ATT&CK ID:T1496
ATT&CK Technique Name:Resource Hijacking
Adversaries may leverage the resources of co-opted systems in order to solve resource intensive problems, which may impact system and/or hosted service availability. | secon |
ATT&CK ID:S1066
ATT&CK Technique Name:DarkTortilla
DarkTortilla can enumerate a list of running processes on a compromised system.[74] | secon |
ATT&CK ID:M1011
ATT&CK Technique Name:User Guidance
Users should be wary of granting applications dangerous or privacy-intrusive permissions, such as access to location information. Users should also protect their account credentials and enable multi-factor authentication options when available. | secon |
ATT&CK ID:S1062
ATT&CK Technique Name:S.O.V.A.
S.O.V.A. can search for installed applications that match a list of targets.[26] | secon |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.