text
stringlengths
100
9.93M
category
stringclasses
11 values
ATT&CK ID:G1003 ATT&CK Technique Name:Ember Bear Ember Bear had used cmd.exe and Windows Script Host (wscript) to execute malicious code.[112]
secon
ATT&CK ID:G0001 ATT&CK Technique Name:Axiom Axiom has used large groups of compromised machines for use as proxy nodes.[4]
secon
ATT&CK ID:T1557.001 ATT&CK Technique Name:LLMNR/NBT-NS Poisoning and SMB Relay By responding to LLMNR/NBT-NS network traffic, adversaries may spoof an authoritative source for name resolution to force communication with an adversary controlled system. This activity may be used to collect or relay authentication materia...
secon
ATT&CK ID:S0475 ATT&CK Technique Name:BackConfig BackConfig has the ability to use scheduled tasks to repeatedly execute malicious payloads on a compromised host.[24]
secon
ATT&CK ID:G0060 ATT&CK Technique Name:BRONZE BUTLER BRONZE BUTLER has used RC4 encryption (for Datper malware) and AES (for xxmm malware) to obfuscate HTTP traffic. BRONZE BUTLER has also used a tool called RarStar that encodes data with a custom XOR algorithm when posting it to a C2 server.[20]
secon
ATT&CK ID:G0006 ATT&CK Technique Name:APT1 APT1 has used the Windows command shell to execute commands, and batch scripting to automate execution.[11]
secon
title:blackhat:us-20 Reversing the Root: Identifying the Exploited Vulnerability in 0-days Used In-The-Wild Over the past 12 months, Project Zero has analyzed eleven 0-day vulnerabilities that were exploited in the wild. One of the very important parts of these analyses is to do a root cause analysis on the vulnerabili...
secon
ATT&CK ID:S0386 ATT&CK Technique Name:Ursnif Ursnif droppers execute base64 encoded PowerShell commands.[86]
secon
ATT&CK ID:S0677 ATT&CK Technique Name:AADInternals AADInternals can create a backdoor by converting a domain to a federated domain which will be able to authenticate any user across the tenant. AADInternals can also modify DesktopSSO information.[3][4]
secon
ATT&CK ID:G0062 ATT&CK Technique Name:TA459 TA459 has used PowerShell for execution of a payload.[220]
secon
ATT&CK ID:S0363 ATT&CK Technique Name:Empire Empire can persist by modifying a .LNK file to include a backdoor.[10]
secon
title:blackhat:asia-19 The Cost of Learning from the Best: How Prior Knowledge Weakens the Security of Deep Neural Networks Deep Neural Networks (DNNs) have been found vulnerable to adversarial examples – inputs that an attacker has intentionally designed to cause the model to make mistakes. Fortunately, generating adv...
secon
ATT&CK ID:S0265 ATT&CK Technique Name:Kazuar Kazuar adds a .lnk file to the Windows startup folder.[18]
secon
ATT&CK ID:S0271 ATT&CK Technique Name:KEYMARBLE KEYMARBLE can capture screenshots of the victim’s machine.[87]
secon
ATT&CK ID:S0046 ATT&CK Technique Name:CozyCar One persistence mechanism used by CozyCar is to set itself to be executed at system startup by adding a Registry value under one of the following Registry keys: HKLM\Software\Microsoft\Windows\CurrentVersion\Run\ HKCU\Software\Microsoft\Windows\CurrentVersion\Run\ HKLM\Soft...
secon
ATT&CK ID:T1404 ATT&CK Technique Name:Exploitation for Privilege Escalation Adversaries may exploit software vulnerabilities in order to to elevate privileges. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in an application, service, within the operating system...
secon
ATT&CK ID:G0059 ATT&CK Technique Name:Magic Hound Magic Hound has deleted and overwrote files to cover tracks.[139][140][141]
secon
ATT&CK ID:S0603 ATT&CK Technique Name:Stuxnet Stuxnet encodes the payload of system information sent to the command and control servers using a one byte 0xFF XOR key. Stuxnet also uses a 31-byte long static byte string to XOR data sent to command and control servers. The servers use a different static key to encrypt re...
secon
titleblackhat:us-22 Trace Me if You Can: Bypassing Linux Syscall Tracing In this talk, we will present novel vulnerabilities and exploitation techniques that reliably bypass Linux syscall tracing. A user mode program does not need any special privileges or capabilities to reliably avoid system call tracing detections b...
secon
ATT&CK ID:M1022 ATT&CK Technique Name:Restrict File and Directory Permissions Protect generated event files that are stored locally with proper permissions and authentication and limit opportunities for adversaries to increase privileges by preventing Privilege Escalation opportunities.
secon
ATT&CK ID:M1024 ATT&CK Technique Name:Restrict Registry Permissions Ensure proper permissions are set for Registry hives to prevent users from modifying keys for system components that may lead to privilege escalation.
secon
titleblackhat:us-19 Rogue7: Rogue Engineering-Station Attacks on S7 Simatic PLCs The Siemens industrial control systems architecture consists of Simatic S7 PLCs which communicate with a TIA engineering station and SCADA HMI on one side, and control industrial systems on the other side. The newer versions of the archite...
secon
ATT&CK ID:M1018 ATT&CK Technique Name:User Account Management Limit permissions for who can create symbolic links in Windows to appropriate groups such as Administrators and necessary groups for virtualization. This can be done through GPO: Computer Configuration > [Policies] > Windows Settings > Security Settings > Lo...
secon
ATT&CK ID:S0655 ATT&CK Technique Name:BusyGasper BusyGasper can collect every user screen tap and compare the input to a hardcoded list of coordinates to translate the input to a character.[3]
secon
ATT&CK ID:S1030 ATT&CK Technique Name:Squirrelwaffle Squirrelwaffle has exfiltrated victim data using HTTP POST requests to its C2 servers.[120]
secon
ATT&CK ID:G0087 ATT&CK Technique Name:APT39 APT39 has used various tools to proxy C2 communications.[6]
secon
ATT&CK ID:G0090 ATT&CK Technique Name:WIRTE WIRTE has used Base64 to decode malicious VBS script.[259]
secon
ATT&CK ID:G0027 ATT&CK Technique Name:Threat Group-3390 Threat Group-3390 actors have split RAR files for exfiltration into parts.[16]
secon
ATT&CK ID:M0806 ATT&CK Technique Name:Minimize Wireless Signal Propagation Reduce the range of RF communications to their intended operating range when possible. Propagation reduction methods may include (i) reducing transmission power on wireless signals, (ii) adjusting antenna gain to prevent extensions beyond organi...
secon
ATT&CK ID:S1048 ATT&CK Technique Name:macOS.OSAMiner macOS.OSAMiner has used osascript to call itself via the do shell script command in the Launch Agent .plist file.[7]
secon
ATT&CK ID:S0192 ATT&CK Technique Name:Pupy Pupy uses PsExec to execute a payload or commands on a remote host.[48]
secon
ATT&CK ID:S0456 ATT&CK Technique Name:Aria-body Aria-body has the ability to use a DGA for C2 communications.[9]
secon
ATT&CK ID:S1009 ATT&CK Technique Name:Triton Triton uses TriStations default UDP port, 1502, to communicate with devices. [2]
secon
ATT&CK ID:S0098 ATT&CK Technique Name:T9000 T9000 gathers and beacons the MAC and IP addresses during installation.[225]
secon
ATT&CK ID:T1546.003 ATT&CK Technique Name:Windows Management Instrumentation Event Subscription Adversaries may establish persistence and elevate privileges by executing malicious content triggered by a Windows Management Instrumentation (WMI) event subscription. WMI can be used to install event filters, providers, con...
secon
ATT&CK ID:C0024 ATT&CK Technique Name:SolarWinds Compromise For the SolarWinds Compromise, APT29 conducted credential theft operations to obtain credentials to be used for access to victim environments.[16]
secon
ATT&CK ID:S0378 ATT&CK Technique Name:PoshC2 PoshC2 contains multiple modules for injecting into processes, such as Invoke-PSInject.[45]
secon
ATT&CK ID:S0013 ATT&CK Technique Name:PlugX PlugX checks if VMware tools is running in the background by searching for any process named "vmtoolsd".[40]
secon
ATT&CK ID:S0582 ATT&CK Technique Name:LookBack LookBack has a function that decrypts malicious data.[137]
secon
ATT&CK ID:G0008 ATT&CK Technique Name:Carbanak Carbanak installs VNC server software that executes through rundll32.[30]
secon
ATT&CK ID:G0131 ATT&CK Technique Name:Tonto Team Tonto Team abuses a legitimate and signed Microsoft executable to launch a malicious DLL.[36]
secon
ATT&CK ID:S0488 ATT&CK Technique Name:CrackMapExec CrackMapExec can pass the hash to authenticate via SMB.[7]
secon
title:blackhat:eu-19 Reverse Engineering and Exploiting Builds in the Cloud Continuous Integration, Delivery, and Deployment (CI/CD) and Containers are common terms in today’s IT landscapes and core approaches for modern software development and operation. We will give a short, to-the-point introduction of CI/CD with r...
secon
ATT&CK ID:G0034 ATT&CK Technique Name:Sandworm Team Sandworm Team has tricked unwitting recipients into clicking on spearphishing attachments and enabling malicious macros embedded within files.[209][210]
secon
ATT&CK ID:S0268 ATT&CK Technique Name:Bisonal Bisonal has launched cmd.exe and used the ShellExecuteW() API function to execute commands on the system.[44][45][46]
secon
titleblackhat:eu-22 Breaking Kerberos' RC4 Cipher and Spoofing Windows PACs While the Active Directory implementation of Kerberos prefers to use cryptography based on AES, the deprecated Kerberos encryption type is still supported by default and widely used in practice. The property that RC4 derives its cryptograph...
secon
ATT&CK ID:S0554 ATT&CK Technique Name:Egregor Egregor has used an encoded PowerShell command by a service created by Cobalt Strike for lateral movement.[80]
secon
ATT&CK ID:S0336 ATT&CK Technique Name:NanoCore NanoCore can open a remote command-line interface and execute commands.[230] NanoCore uses JavaScript files.[231]
secon
ATT&CK ID:S0559 ATT&CK Technique Name:SUNBURST SUNBURST checked for a variety of antivirus/endpoint detection agents prior to execution.[99][100]
secon
ATT&CK ID:S0531 ATT&CK Technique Name:Grandoreiro Grandoreiro can capture clipboard data from a compromised host.[24]
secon
ATT&CK ID:M0818 ATT&CK Technique Name:Validate Program Inputs Devices and programs that receive command messages from remote systems (e.g., control servers) should verify those commands before taking any actions on them.
secon
ATT&CK ID:G0081 ATT&CK Technique Name:Tropic Trooper Tropic Trooper sent spearphishing emails that contained malicious Microsoft Office and fake installer file attachments.[234][235][236][237][238]
secon
ATT&CK ID:M1012 ATT&CK Technique Name:Enterprise Policy Enterprises can provision policies to mobile devices that require a minimum complexity (length, character requirements, etc.) for the device passcode, and cause the device to wipe all data if an incorrect passcode is entered too many times. Both policies would mit...
secon
ATT&CK ID:S0434 ATT&CK Technique Name:Imminent Monitor Imminent Monitor has decoded malware components that are then dropped to the system.[115]
secon
ATT&CK ID:S1020 ATT&CK Technique Name:Kevin Kevin can hide the current window from the targeted user via the ShowWindow API function.[23]
secon
ATT&CK ID:S0132 ATT&CK Technique Name:H1N1 H1N1 kills and disables services for Windows Security Center, and Windows Defender.[40]
secon
ATT&CK ID:G0084 ATT&CK Technique Name:Gallmaker Gallmaker used PowerShell to download additional payloads and for execution.[105]
secon
ATT&CK ID:M1018 ATT&CK Technique Name:User Account Management Ensure that any accounts used by third-party providers to access these systems are traceable to the third-party and are not used throughout the network or used by other third-party providers in the same environment. Ensure there are regular reviews of accoun...
secon
ATT&CK ID:S0488 ATT&CK Technique Name:CrackMapExec CrackMapExec can execute remote commands using Windows Management Instrumentation.[31]
secon
ATT&CK ID:S0526 ATT&CK Technique Name:KGH_SPY KGH_SPY can decrypt encrypted strings and write them to a newly created folder.[124]
secon
ATT&CK ID:S0567 ATT&CK Technique Name:Dtrack Dtrack contains a function that calls LoadLibrary and GetProcAddress.[8]
secon
ATT&CK ID:S0662 ATT&CK Technique Name:RCSession RCSession can launch itself from a hollowed svchost.exe process.[32][15][33]
secon
titleblackhat:eu-19 Exploiting Windows Hello for Business In Windows 10 and Windows Server 2016, Microsoft has introduced a new feature called Windows Hello for Business (WHfB), that allows password-less authentication in Active Directory-based environments and thus aims to reduce the risk of password theft. It is buil...
secon
ATT&CK ID:G0092 ATT&CK Technique Name:TA505 TA505 has been seen injecting a DLL into winword.exe.[67]
secon
ATT&CK ID:S0650 ATT&CK Technique Name:QakBot QakBot can remotely create a temporary service on a target host.[99]
secon
ATT&CK ID:G0093 ATT&CK Technique Name:GALLIUM GALLIUM collected data from the victim's local system, including password hashes from the SAM hive in the Registry.[79]
secon
ATT&CK ID:G0069 ATT&CK Technique Name:MuddyWater MuddyWater has used AES to encrypt C2 responses.[94]
secon
ATT&CK ID:S0002 ATT&CK Technique Name:Mimikatz Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways, including from DPAPI.[49][50][5...
secon
ATT&CK ID:T1521.001 ATT&CK Technique Name:Symmetric Cryptography Adversaries may employ a known symmetric encryption algorithm to conceal command and control traffic, rather than relying on any inherent protections provided by a communication protocol. Symmetric encryption algorithms use the same key for plaintext encr...
secon
ATT&CK ID:T1016.001 ATT&CK Technique Name:Internet Connection Discovery Adversaries may check for Internet connectivity on compromised systems. This may be performed during automated discovery and can be accomplished in numerous ways such as using Ping, tracert, and GET requests to websites.
secon
title:blackhat:us-21 Cloudy with a Chance of APT: Novel Microsoft 365 Attacks in the Wild This past year has proved the point that advanced nation-state backed threat actors are increasingly investing their time and money to develop novel ways to access the cloud. These actors are especially interested in Microsoft 365...
secon
ATT&CK ID:S0257 ATT&CK Technique Name:VERMIN VERMIN collects keystrokes from the victim machine.[178]
secon
title:blackhat:us-21 Symbexcel: Bringing the Power of Symbolic Execution to the Fight Against Malicious Excel 4 Macros Excel 4.0 (XL4) macros are a popular attack vector for threat actors, as security vendors struggle to play catchup and detect malicious macros properly. These macros provide attackers with a simple and...
secon
ATT&CK ID:S0272 ATT&CK Technique Name:NDiskMonitor NDiskMonitor obtains the victim computer name and encrypts the information to send over its C2 channel.[248]
secon
ATT&CK ID:M1032 ATT&CK Technique Name:Multi-factor Authentication Use multi-factor authentication for cloud accounts, especially privileged accounts. This can be implemented in a variety of forms (e.g. hardware, virtual, SMS), and can also be audited using administrative reporting features.[13]
secon
ATT&CK ID:M1024 ATT&CK Technique Name:Restrict Registry Permissions Ensure proper permissions are set for Registry hives to prevent users from modifying keys for system components that may lead to privilege escalation.
secon
ATT&CK ID:G0130 ATT&CK Technique Name:Ajax Security Team Ajax Security Team has used Wrapper/Gholee, custom-developed malware, which downloaded additional malware to the infected system.[8]
secon
ATT&CK ID:S0316 ATT&CK Technique Name:Pegasus for Android Pegasus for Android uses SMS for command and control.[7]
secon
ATT&CK ID:M1037 ATT&CK Technique Name:Filter Network Traffic Apply extended ACLs to block unauthorized protocols outside the trusted network.[3]
secon
ATT&CK ID:S0198 ATT&CK Technique Name:NETWIRE NETWIRE can perform keylogging.[122][123][124][125][126]
secon
ATT&CK ID:S0664 ATT&CK Technique Name:Pandora Pandora can write an encrypted token to the Registry to enable processing of remote commands.[111]
secon
ATT&CK ID:G0142 ATT&CK Technique Name:Confucius Confucius has crafted and sent victims malicious attachments to gain initial access.[66]
secon
ATT&CK ID:S0347 ATT&CK Technique Name:AuditCred AuditCred can inject code from files to other running processes.[7]
secon
ATT&CK ID:S0536 ATT&CK Technique Name:GPlayed GPlayed has the capability to remotely load plugins and download and compile new .NET code.[17]
secon
ATT&CK ID:G0107 ATT&CK Technique Name:Whitefly Whitefly has used a simple remote shell tool that will call back to the C2 server and wait for commands.[43]
secon
titleblackhat:asia-21 Racing the Dark: A New TOCTTOU Story From Apple's Core When developing operating system kernels and drivers, functions related to user data mapping, accessing and parsing are often found vulnerable. In order to solve this type of problem, almost every system defines standard operating rules wh...
secon
title:blackhat:us-19 Hacking Ten Million Useful Idiots: Online Propaganda as a Socio-Technical Security Project Online propaganda and election influence have received much attention recently. Defense leaders and the general public are aware of the risks, but have little understanding of the techniques involved, nor rel...
secon
ATT&CK ID:G0065 ATT&CK Technique Name:Leviathan Leviathan has used publicly available tools to dump password hashes, including HOMEFRY.[10]
secon
ATT&CK ID:S0493 ATT&CK Technique Name:GoldenSpy GoldenSpy has exfiltrated host environment information to an external C2 domain via port 9006.[50]
secon
ATT&CK ID:S0176 ATT&CK Technique Name:Wingbird Wingbird checks for the presence of Bitdefender security software.[115]
secon
ATT&CK ID:S0126 ATT&CK Technique Name:ComRAT ComRAT has used unique per machine passwords to decrypt the orchestrator payload and a hardcoded XOR key to decrypt its communications module. ComRAT has also used a unique password to decrypt the file used for its hidden file system.[59][60]
secon
ATT&CK ID:S0373 ATT&CK Technique Name:Astaroth Astaroth can launch itself via DLL Search Order Hijacking.[11]
secon
title:blackhat:asia-19 ACSploit: Exploit Algorithmic Complexity Vulnerabilities Algorithmic Complexity (AC) vulnerabilities arise when a program uses an algorithm with a particularly inefficient worst-case computational complexity, and allows a user to provide input that will trigger it. Determining whether a program i...
secon
ATT&CK ID:S0412 ATT&CK Technique Name:ZxShell ZxShell can create a new service using the service parser function ProcessScCommand.[143]
secon
ATT&CK ID:G0032 ATT&CK Technique Name:Lazarus Group Lazarus Group malware SierraAlfa accesses the ADMIN$ share via SMB to conduct lateral movement.[33][34]
secon
ATT&CK ID:G0139 ATT&CK Technique Name:TeamTNT TeamTNT has used a script that decodes a Base64-encoded version of WeaveWorks Scope.[227]
secon
ATT&CK ID:M0812 ATT&CK Technique Name:Safety Instrumented Systems Ensure that all SIS are segmented from operational networks to prevent them from being targeted by additional adversarial behavior.
secon
title:blackhat:us-20 Hacking the Voter: Lessons from a Decade of Russian Military Operations Election security faces a persistent problem: defenders are often thinking tactically, while the most capable, deliberate adversaries are thinking strategically. Getting ahead of ever evolving election interference operations w...
secon
ATT&CK ID:S0262 ATT&CK Technique Name:QuasarRAT QuasarRAT can generate a UAC pop-up Window to prompt the target user to run a command as the administrator.[50]
secon
ATT&CK ID:S0128 ATT&CK Technique Name:BADNEWS BADNEWS copies files with certain extensions from USB devices toa predefined directory.[5]
secon