text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
ATT&CK ID:G1003
ATT&CK Technique Name:Ember Bear
Ember Bear had used cmd.exe and Windows Script Host (wscript) to execute malicious code.[112] | secon |
ATT&CK ID:G0001
ATT&CK Technique Name:Axiom
Axiom has used large groups of compromised machines for use as proxy nodes.[4] | secon |
ATT&CK ID:T1557.001
ATT&CK Technique Name:LLMNR/NBT-NS Poisoning and SMB Relay
By responding to LLMNR/NBT-NS network traffic, adversaries may spoof an authoritative source for name resolution to force communication with an adversary controlled system. This activity may be used to collect or relay authentication materia... | secon |
ATT&CK ID:S0475
ATT&CK Technique Name:BackConfig
BackConfig has the ability to use scheduled tasks to repeatedly execute malicious payloads on a compromised host.[24] | secon |
ATT&CK ID:G0060
ATT&CK Technique Name:BRONZE BUTLER
BRONZE BUTLER has used RC4 encryption (for Datper malware) and AES (for xxmm malware) to obfuscate HTTP traffic. BRONZE BUTLER has also used a tool called RarStar that encodes data with a custom XOR algorithm when posting it to a C2 server.[20] | secon |
ATT&CK ID:G0006
ATT&CK Technique Name:APT1
APT1 has used the Windows command shell to execute commands, and batch scripting to automate execution.[11] | secon |
title:blackhat:us-20 Reversing the Root: Identifying the Exploited Vulnerability in 0-days Used In-The-Wild
Over the past 12 months, Project Zero has analyzed eleven 0-day vulnerabilities that were exploited in the wild. One of the very important parts of these analyses is to do a root cause analysis on the vulnerabili... | secon |
ATT&CK ID:S0386
ATT&CK Technique Name:Ursnif
Ursnif droppers execute base64 encoded PowerShell commands.[86] | secon |
ATT&CK ID:S0677
ATT&CK Technique Name:AADInternals
AADInternals can create a backdoor by converting a domain to a federated domain which will be able to authenticate any user across the tenant. AADInternals can also modify DesktopSSO information.[3][4] | secon |
ATT&CK ID:G0062
ATT&CK Technique Name:TA459
TA459 has used PowerShell for execution of a payload.[220] | secon |
ATT&CK ID:S0363
ATT&CK Technique Name:Empire
Empire can persist by modifying a .LNK file to include a backdoor.[10] | secon |
title:blackhat:asia-19 The Cost of Learning from the Best: How Prior Knowledge Weakens the Security of Deep Neural Networks
Deep Neural Networks (DNNs) have been found vulnerable to adversarial examples – inputs that an attacker has intentionally designed to cause the model to make mistakes. Fortunately, generating adv... | secon |
ATT&CK ID:S0265
ATT&CK Technique Name:Kazuar
Kazuar adds a .lnk file to the Windows startup folder.[18] | secon |
ATT&CK ID:S0271
ATT&CK Technique Name:KEYMARBLE
KEYMARBLE can capture screenshots of the victim’s machine.[87] | secon |
ATT&CK ID:S0046
ATT&CK Technique Name:CozyCar
One persistence mechanism used by CozyCar is to set itself to be executed at system startup by adding a Registry value under one of the following Registry keys: HKLM\Software\Microsoft\Windows\CurrentVersion\Run\ HKCU\Software\Microsoft\Windows\CurrentVersion\Run\ HKLM\Soft... | secon |
ATT&CK ID:T1404
ATT&CK Technique Name:Exploitation for Privilege Escalation
Adversaries may exploit software vulnerabilities in order to to elevate privileges. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in an application, service, within the operating system... | secon |
ATT&CK ID:G0059
ATT&CK Technique Name:Magic Hound
Magic Hound has deleted and overwrote files to cover tracks.[139][140][141] | secon |
ATT&CK ID:S0603
ATT&CK Technique Name:Stuxnet
Stuxnet encodes the payload of system information sent to the command and control servers using a one byte 0xFF XOR key. Stuxnet also uses a 31-byte long static byte string to XOR data sent to command and control servers. The servers use a different static key to encrypt re... | secon |
titleblackhat:us-22 Trace Me if You Can: Bypassing Linux Syscall Tracing
In this talk, we will present novel vulnerabilities and exploitation techniques that reliably bypass Linux syscall tracing. A user mode program does not need any special privileges or capabilities to reliably avoid system call tracing detections b... | secon |
ATT&CK ID:M1022
ATT&CK Technique Name:Restrict File and Directory Permissions
Protect generated event files that are stored locally with proper permissions and authentication and limit opportunities for adversaries to increase privileges by preventing Privilege Escalation opportunities. | secon |
ATT&CK ID:M1024
ATT&CK Technique Name:Restrict Registry Permissions
Ensure proper permissions are set for Registry hives to prevent users from modifying keys for system components that may lead to privilege escalation. | secon |
titleblackhat:us-19 Rogue7: Rogue Engineering-Station Attacks on S7 Simatic PLCs
The Siemens industrial control systems architecture consists of Simatic S7 PLCs which communicate with a TIA engineering station and SCADA HMI on one side, and control industrial systems on the other side. The newer versions of the archite... | secon |
ATT&CK ID:M1018
ATT&CK Technique Name:User Account Management
Limit permissions for who can create symbolic links in Windows to appropriate groups such as Administrators and necessary groups for virtualization. This can be done through GPO: Computer Configuration > [Policies] > Windows Settings > Security Settings > Lo... | secon |
ATT&CK ID:S0655
ATT&CK Technique Name:BusyGasper
BusyGasper can collect every user screen tap and compare the input to a hardcoded list of coordinates to translate the input to a character.[3] | secon |
ATT&CK ID:S1030
ATT&CK Technique Name:Squirrelwaffle
Squirrelwaffle has exfiltrated victim data using HTTP POST requests to its C2 servers.[120] | secon |
ATT&CK ID:G0087
ATT&CK Technique Name:APT39
APT39 has used various tools to proxy C2 communications.[6] | secon |
ATT&CK ID:G0090
ATT&CK Technique Name:WIRTE
WIRTE has used Base64 to decode malicious VBS script.[259] | secon |
ATT&CK ID:G0027
ATT&CK Technique Name:Threat Group-3390
Threat Group-3390 actors have split RAR files for exfiltration into parts.[16] | secon |
ATT&CK ID:M0806
ATT&CK Technique Name:Minimize Wireless Signal Propagation
Reduce the range of RF communications to their intended operating range when possible. Propagation reduction methods may include (i) reducing transmission power on wireless signals, (ii) adjusting antenna gain to prevent extensions beyond organi... | secon |
ATT&CK ID:S1048
ATT&CK Technique Name:macOS.OSAMiner
macOS.OSAMiner has used osascript to call itself via the do shell script command in the Launch Agent .plist file.[7] | secon |
ATT&CK ID:S0192
ATT&CK Technique Name:Pupy
Pupy uses PsExec to execute a payload or commands on a remote host.[48] | secon |
ATT&CK ID:S0456
ATT&CK Technique Name:Aria-body
Aria-body has the ability to use a DGA for C2 communications.[9] | secon |
ATT&CK ID:S1009
ATT&CK Technique Name:Triton
Triton uses TriStations default UDP port, 1502, to communicate with devices. [2] | secon |
ATT&CK ID:S0098
ATT&CK Technique Name:T9000
T9000 gathers and beacons the MAC and IP addresses during installation.[225] | secon |
ATT&CK ID:T1546.003
ATT&CK Technique Name:Windows Management Instrumentation Event Subscription
Adversaries may establish persistence and elevate privileges by executing malicious content triggered by a Windows Management Instrumentation (WMI) event subscription. WMI can be used to install event filters, providers, con... | secon |
ATT&CK ID:C0024
ATT&CK Technique Name:SolarWinds Compromise
For the SolarWinds Compromise, APT29 conducted credential theft operations to obtain credentials to be used for access to victim environments.[16] | secon |
ATT&CK ID:S0378
ATT&CK Technique Name:PoshC2
PoshC2 contains multiple modules for injecting into processes, such as Invoke-PSInject.[45] | secon |
ATT&CK ID:S0013
ATT&CK Technique Name:PlugX
PlugX checks if VMware tools is running in the background by searching for any process named "vmtoolsd".[40] | secon |
ATT&CK ID:S0582
ATT&CK Technique Name:LookBack
LookBack has a function that decrypts malicious data.[137] | secon |
ATT&CK ID:G0008
ATT&CK Technique Name:Carbanak
Carbanak installs VNC server software that executes through rundll32.[30] | secon |
ATT&CK ID:G0131
ATT&CK Technique Name:Tonto Team
Tonto Team abuses a legitimate and signed Microsoft executable to launch a malicious DLL.[36] | secon |
ATT&CK ID:S0488
ATT&CK Technique Name:CrackMapExec
CrackMapExec can pass the hash to authenticate via SMB.[7] | secon |
title:blackhat:eu-19 Reverse Engineering and Exploiting Builds in the Cloud
Continuous Integration, Delivery, and Deployment (CI/CD) and Containers are common terms in today’s IT landscapes and core approaches for modern software development and operation. We will give a short, to-the-point introduction of CI/CD with r... | secon |
ATT&CK ID:G0034
ATT&CK Technique Name:Sandworm Team
Sandworm Team has tricked unwitting recipients into clicking on spearphishing attachments and enabling malicious macros embedded within files.[209][210] | secon |
ATT&CK ID:S0268
ATT&CK Technique Name:Bisonal
Bisonal has launched cmd.exe and used the ShellExecuteW() API function to execute commands on the system.[44][45][46] | secon |
titleblackhat:eu-22 Breaking Kerberos' RC4 Cipher and Spoofing Windows PACs
While the Active Directory implementation of Kerberos prefers to use cryptography based on AES, the deprecated Kerberos encryption type is still supported by default and widely used in practice. The property that RC4 derives its cryptograph... | secon |
ATT&CK ID:S0554
ATT&CK Technique Name:Egregor
Egregor has used an encoded PowerShell command by a service created by Cobalt Strike for lateral movement.[80] | secon |
ATT&CK ID:S0336
ATT&CK Technique Name:NanoCore
NanoCore can open a remote command-line interface and execute commands.[230] NanoCore uses JavaScript files.[231] | secon |
ATT&CK ID:S0559
ATT&CK Technique Name:SUNBURST
SUNBURST checked for a variety of antivirus/endpoint detection agents prior to execution.[99][100] | secon |
ATT&CK ID:S0531
ATT&CK Technique Name:Grandoreiro
Grandoreiro can capture clipboard data from a compromised host.[24] | secon |
ATT&CK ID:M0818
ATT&CK Technique Name:Validate Program Inputs
Devices and programs that receive command messages from remote systems (e.g., control servers) should verify those commands before taking any actions on them. | secon |
ATT&CK ID:G0081
ATT&CK Technique Name:Tropic Trooper
Tropic Trooper sent spearphishing emails that contained malicious Microsoft Office and fake installer file attachments.[234][235][236][237][238] | secon |
ATT&CK ID:M1012
ATT&CK Technique Name:Enterprise Policy
Enterprises can provision policies to mobile devices that require a minimum complexity (length, character requirements, etc.) for the device passcode, and cause the device to wipe all data if an incorrect passcode is entered too many times. Both policies would mit... | secon |
ATT&CK ID:S0434
ATT&CK Technique Name:Imminent Monitor
Imminent Monitor has decoded malware components that are then dropped to the system.[115] | secon |
ATT&CK ID:S1020
ATT&CK Technique Name:Kevin
Kevin can hide the current window from the targeted user via the ShowWindow API function.[23] | secon |
ATT&CK ID:S0132
ATT&CK Technique Name:H1N1
H1N1 kills and disables services for Windows Security Center, and Windows Defender.[40] | secon |
ATT&CK ID:G0084
ATT&CK Technique Name:Gallmaker
Gallmaker used PowerShell to download additional payloads and for execution.[105] | secon |
ATT&CK ID:M1018
ATT&CK Technique Name:User Account Management
Ensure that any accounts used by third-party providers to access these systems are traceable to the third-party and are not used throughout the network or used by other third-party providers in the same environment. Ensure there are regular reviews of accoun... | secon |
ATT&CK ID:S0488
ATT&CK Technique Name:CrackMapExec
CrackMapExec can execute remote commands using Windows Management Instrumentation.[31] | secon |
ATT&CK ID:S0526
ATT&CK Technique Name:KGH_SPY
KGH_SPY can decrypt encrypted strings and write them to a newly created folder.[124] | secon |
ATT&CK ID:S0567
ATT&CK Technique Name:Dtrack
Dtrack contains a function that calls LoadLibrary and GetProcAddress.[8] | secon |
ATT&CK ID:S0662
ATT&CK Technique Name:RCSession
RCSession can launch itself from a hollowed svchost.exe process.[32][15][33] | secon |
titleblackhat:eu-19 Exploiting Windows Hello for Business
In Windows 10 and Windows Server 2016, Microsoft has introduced a new feature called Windows Hello for Business (WHfB), that allows password-less authentication in Active Directory-based environments and thus aims to reduce the risk of password theft. It is buil... | secon |
ATT&CK ID:G0092
ATT&CK Technique Name:TA505
TA505 has been seen injecting a DLL into winword.exe.[67] | secon |
ATT&CK ID:S0650
ATT&CK Technique Name:QakBot
QakBot can remotely create a temporary service on a target host.[99] | secon |
ATT&CK ID:G0093
ATT&CK Technique Name:GALLIUM
GALLIUM collected data from the victim's local system, including password hashes from the SAM hive in the Registry.[79] | secon |
ATT&CK ID:G0069
ATT&CK Technique Name:MuddyWater
MuddyWater has used AES to encrypt C2 responses.[94] | secon |
ATT&CK ID:S0002
ATT&CK Technique Name:Mimikatz
Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways, including from DPAPI.[49][50][5... | secon |
ATT&CK ID:T1521.001
ATT&CK Technique Name:Symmetric Cryptography
Adversaries may employ a known symmetric encryption algorithm to conceal command and control traffic, rather than relying on any inherent protections provided by a communication protocol. Symmetric encryption algorithms use the same key for plaintext encr... | secon |
ATT&CK ID:T1016.001
ATT&CK Technique Name:Internet Connection Discovery
Adversaries may check for Internet connectivity on compromised systems. This may be performed during automated discovery and can be accomplished in numerous ways such as using Ping, tracert, and GET requests to websites. | secon |
title:blackhat:us-21 Cloudy with a Chance of APT: Novel Microsoft 365 Attacks in the Wild
This past year has proved the point that advanced nation-state backed threat actors are increasingly investing their time and money to develop novel ways to access the cloud. These actors are especially interested in Microsoft 365... | secon |
ATT&CK ID:S0257
ATT&CK Technique Name:VERMIN
VERMIN collects keystrokes from the victim machine.[178] | secon |
title:blackhat:us-21 Symbexcel: Bringing the Power of Symbolic Execution to the Fight Against Malicious Excel 4 Macros
Excel 4.0 (XL4) macros are a popular attack vector for threat actors, as security vendors struggle to play catchup and detect malicious macros properly. These macros provide attackers with a simple and... | secon |
ATT&CK ID:S0272
ATT&CK Technique Name:NDiskMonitor
NDiskMonitor obtains the victim computer name and encrypts the information to send over its C2 channel.[248] | secon |
ATT&CK ID:M1032
ATT&CK Technique Name:Multi-factor Authentication
Use multi-factor authentication for cloud accounts, especially privileged accounts. This can be implemented in a variety of forms (e.g. hardware, virtual, SMS), and can also be audited using administrative reporting features.[13] | secon |
ATT&CK ID:M1024
ATT&CK Technique Name:Restrict Registry Permissions
Ensure proper permissions are set for Registry hives to prevent users from modifying keys for system components that may lead to privilege escalation. | secon |
ATT&CK ID:G0130
ATT&CK Technique Name:Ajax Security Team
Ajax Security Team has used Wrapper/Gholee, custom-developed malware, which downloaded additional malware to the infected system.[8] | secon |
ATT&CK ID:S0316
ATT&CK Technique Name:Pegasus for Android
Pegasus for Android uses SMS for command and control.[7] | secon |
ATT&CK ID:M1037
ATT&CK Technique Name:Filter Network Traffic
Apply extended ACLs to block unauthorized protocols outside the trusted network.[3] | secon |
ATT&CK ID:S0198
ATT&CK Technique Name:NETWIRE
NETWIRE can perform keylogging.[122][123][124][125][126] | secon |
ATT&CK ID:S0664
ATT&CK Technique Name:Pandora
Pandora can write an encrypted token to the Registry to enable processing of remote commands.[111] | secon |
ATT&CK ID:G0142
ATT&CK Technique Name:Confucius
Confucius has crafted and sent victims malicious attachments to gain initial access.[66] | secon |
ATT&CK ID:S0347
ATT&CK Technique Name:AuditCred
AuditCred can inject code from files to other running processes.[7] | secon |
ATT&CK ID:S0536
ATT&CK Technique Name:GPlayed
GPlayed has the capability to remotely load plugins and download and compile new .NET code.[17] | secon |
ATT&CK ID:G0107
ATT&CK Technique Name:Whitefly
Whitefly has used a simple remote shell tool that will call back to the C2 server and wait for commands.[43] | secon |
titleblackhat:asia-21 Racing the Dark: A New TOCTTOU Story From Apple's Core
When developing operating system kernels and drivers, functions related to user data mapping, accessing and parsing are often found vulnerable. In order to solve this type of problem, almost every system defines standard operating rules wh... | secon |
title:blackhat:us-19 Hacking Ten Million Useful Idiots: Online Propaganda as a Socio-Technical Security Project
Online propaganda and election influence have received much attention recently. Defense leaders and the general public are aware of the risks, but have little understanding of the techniques involved, nor rel... | secon |
ATT&CK ID:G0065
ATT&CK Technique Name:Leviathan
Leviathan has used publicly available tools to dump password hashes, including HOMEFRY.[10] | secon |
ATT&CK ID:S0493
ATT&CK Technique Name:GoldenSpy
GoldenSpy has exfiltrated host environment information to an external C2 domain via port 9006.[50] | secon |
ATT&CK ID:S0176
ATT&CK Technique Name:Wingbird
Wingbird checks for the presence of Bitdefender security software.[115] | secon |
ATT&CK ID:S0126
ATT&CK Technique Name:ComRAT
ComRAT has used unique per machine passwords to decrypt the orchestrator payload and a hardcoded XOR key to decrypt its communications module. ComRAT has also used a unique password to decrypt the file used for its hidden file system.[59][60] | secon |
ATT&CK ID:S0373
ATT&CK Technique Name:Astaroth
Astaroth can launch itself via DLL Search Order Hijacking.[11] | secon |
title:blackhat:asia-19 ACSploit: Exploit Algorithmic Complexity Vulnerabilities
Algorithmic Complexity (AC) vulnerabilities arise when a program uses an algorithm with a particularly inefficient worst-case computational complexity, and allows a user to provide input that will trigger it. Determining whether a program i... | secon |
ATT&CK ID:S0412
ATT&CK Technique Name:ZxShell
ZxShell can create a new service using the service parser function ProcessScCommand.[143] | secon |
ATT&CK ID:G0032
ATT&CK Technique Name:Lazarus Group
Lazarus Group malware SierraAlfa accesses the ADMIN$ share via SMB to conduct lateral movement.[33][34] | secon |
ATT&CK ID:G0139
ATT&CK Technique Name:TeamTNT
TeamTNT has used a script that decodes a Base64-encoded version of WeaveWorks Scope.[227] | secon |
ATT&CK ID:M0812
ATT&CK Technique Name:Safety Instrumented Systems
Ensure that all SIS are segmented from operational networks to prevent them from being targeted by additional adversarial behavior. | secon |
title:blackhat:us-20 Hacking the Voter: Lessons from a Decade of Russian Military Operations
Election security faces a persistent problem: defenders are often thinking tactically, while the most capable, deliberate adversaries are thinking strategically. Getting ahead of ever evolving election interference operations w... | secon |
ATT&CK ID:S0262
ATT&CK Technique Name:QuasarRAT
QuasarRAT can generate a UAC pop-up Window to prompt the target user to run a command as the administrator.[50] | secon |
ATT&CK ID:S0128
ATT&CK Technique Name:BADNEWS
BADNEWS copies files with certain extensions from USB devices toa predefined directory.[5] | secon |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.