text stringlengths 0 3.15k |
|---|
Name: Office Application Startup: Outlook Forms |
Description: Adversaries may abuse Microsoft Outlook forms to obtain persistence on a compromised system. Outlook forms are used as templates for presentation and functionality in Outlook messages. Custom Outlook forms can be created that will execute code when a specifically crafted email is sent by an adversary utili... |
Tactics: Persistence |
Platforms Affected: Office 365, Windows |
Detection Strategies: Microsoft has released a PowerShell script to safely gather mail forwarding rules and custom forms in your mail environment as well as steps to interpret the output. SensePost, whose tool Ruler can be used to carry out malicious rules, forms, and Home Page attacks, has released a tool to detect Ru... |
More Information: https://attack.mitre.org/techniques/T1137/003 |
Technique ID: T1137.004 |
Name: Office Application Startup: Outlook Home Page |
Description: Adversaries may abuse Microsoft Outlook's Home Page feature to obtain persistence on a compromised system. Outlook Home Page is a legacy feature used to customize the presentation of Outlook folders. This feature allows for an internal or external URL to be loaded and presented whenever a folder is opened.... |
Tactics: Persistence |
Platforms Affected: Office 365, Windows |
Detection Strategies: Microsoft has released a PowerShell script to safely gather mail forwarding rules and custom forms in your mail environment as well as steps to interpret the output. SensePost, whose tool Ruler can be used to carry out malicious rules, forms, and Home Page attacks, has released a tool to detect Ru... |
More Information: https://attack.mitre.org/techniques/T1137/004 |
Technique ID: T1137.005 |
Name: Office Application Startup: Outlook Rules |
Description: Adversaries may abuse Microsoft Outlook rules to obtain persistence on a compromised system. Outlook rules allow a user to define automated behavior to manage email messages. A benign rule might, for example, automatically move an email to a particular folder in Outlook if it contains specific words from a... |
Tactics: Persistence |
Platforms Affected: Office 365, Windows |
Detection Strategies: Microsoft has released a PowerShell script to safely gather mail forwarding rules and custom forms in your mail environment as well as steps to interpret the output. This PowerShell script is ineffective in gathering rules with modified `PRPRMSGRULEPROVIDER` properties caused by adversaries using ... |
More Information: https://attack.mitre.org/techniques/T1137/005 |
Technique ID: T1548 |
Name: Abuse Elevation Control Mechanism |
Description: Adversaries may circumvent mechanisms designed to control elevate privileges to gain higher-level permissions. Most modern systems contain native elevation control mechanisms that are intended to limit privileges that a user can perform on a machine. Authorization has to be granted to specific users in ord... |
Tactics: Defense Evasion, Privilege Escalation |
Platforms Affected: Azure AD, Google Workspace, IaaS, Linux, Office 365, Windows, macOS |
Detection Strategies: Monitor the file system for files that have the setuid or setgid bits set. Also look for any process API calls for behavior that may be indicative of Process Injection and unusual loaded DLLs through DLL Search Order Hijacking, which indicate attempts to gain access to higher privileged processes.... |
More Information: https://attack.mitre.org/techniques/T1548 |
Technique ID: T1548.005 |
Name: Abuse Elevation Control Mechanism: Temporary Elevated Cloud Access |
Description: Adversaries may abuse permission configurations that allow them to gain temporarily elevated access to cloud resources. Many cloud environments allow administrators to grant user or service accounts permission to request just-in-time access to roles, impersonate other accounts, pass roles onto resources an... |
Tactics: Defense Evasion, Privilege Escalation |
Platforms Affected: Azure AD, IaaS, Office 365 |
Detection Strategies: No detection description provided. |
More Information: https://attack.mitre.org/techniques/T1548/005 |
Technique ID: T1484 |
Name: Domain Policy Modification |
Description: Adversaries may modify the configuration settings of a domain to evade defenses and/or escalate privileges in domain environments. Domains provide a centralized means of managing how computer resources (ex: computers, user accounts) can act, and interact with each other, on a network. The policy of the dom... |
Tactics: Defense Evasion, Privilege Escalation |
Platforms Affected: Azure AD, Windows |
Detection Strategies: It may be possible to detect domain policy modifications using Windows event logs. Group policy modifications, for example, may be logged under a variety of Windows event IDs for modifying, creating, undeleting, moving, and deleting directory service objects (Event ID 5136, 5137, 5138, 5139, 5141 ... |
More Information: https://attack.mitre.org/techniques/T1484 |
Technique ID: T1484.002 |
Name: Domain Policy Modification: Domain Trust Modification |
Description: Adversaries may add new domain trusts or modify the properties of existing domain trusts to evade defenses and/or elevate privileges. Domain trust details, such as whether or not a domain is federated, allow authentication and authorization properties to apply between domains for the purpose of accessing s... |
Tactics: Defense Evasion, Privilege Escalation |
Platforms Affected: Azure AD, Windows |
Detection Strategies: Monitor for modifications to domain trust settings, such as when a user or application modifies the federation settings on the domain or updates domain authentication from Managed to Federated via ActionTypes Set federation settings on domain and Set domain authentication. This may also include mo... |
More Information: https://attack.mitre.org/techniques/T1484/002 |
Technique ID: T1211 |
Name: Exploitation for Defense Evasion |
Description: Adversaries may exploit a system or application vulnerability to bypass security features. Exploitation of a vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. Vu... |
Tactics: Defense Evasion |
Platforms Affected: IaaS, Linux, SaaS, Windows, macOS |
Detection Strategies: Exploitation for defense evasion may happen shortly after the system has been compromised to prevent detection during later actions for for additional tools that may be brought in and used. Detecting software exploitation may be difficult depending on the tools available. Software exploits may not... |
More Information: https://attack.mitre.org/techniques/T1211 |
Technique ID: T1564 |
Name: Hide Artifacts |
Description: Adversaries may attempt to hide artifacts associated with their behaviors to evade detection. Operating systems may have features to hide various artifacts, such as important system files and administrative task execution, to avoid disrupting user work environments and prevent users from changing files or ... |
Tactics: Defense Evasion |
Platforms Affected: Linux, Office 365, Windows, macOS |
Detection Strategies: Monitor files, processes, and command-line arguments for actions indicative of hidden artifacts. Monitor event and authentication logs for records of hidden artifacts being used. Monitor the file system and shell commands for hidden attribute usage. |
More Information: https://attack.mitre.org/techniques/T1564 |
Technique ID: T1564.008 |
Name: Hide Artifacts: Email Hiding Rules |
Description: Adversaries may use email rules to hide inbound emails in a compromised user's mailbox. Many email clients allow users to create inbox rules for various email functions, including moving emails to other folders, marking emails as read, or deleting emails. Rules may be created or modified within email clien... |
Tactics: Defense Evasion |
Platforms Affected: Google Workspace, Linux, Office 365, Windows, macOS |
Detection Strategies: Monitor email clients and applications for suspicious activity, such as missing messages or abnormal configuration and/or log entries. On Windows systems, monitor for creation of suspicious inbox rules through the use of the New-InboxRule and Set-InboxRule PowerShell cmdlets. On MacOS systems, mon... |
More Information: https://attack.mitre.org/techniques/T1564/008 |
Technique ID: T1562 |
Name: Impair Defenses |
Description: Adversaries may maliciously modify components of a victim environment in order to hinder or disable defensive mechanisms. This not only involves impairing preventative defenses, such as firewalls and anti-virus, but also detection capabilities that defenders can use to audit activity and identify malicious... |
Tactics: Defense Evasion |
Platforms Affected: Containers, IaaS, Linux, Network, Office 365, Windows, macOS |
Detection Strategies: Monitor processes and command-line arguments to see if security tools or logging services are killed or stop running. Monitor Registry edits for modifications to services and startup programs that correspond to security tools. Lack of log events may be suspicious. Monitor environment variables and... |
More Information: https://attack.mitre.org/techniques/T1562 |
Technique ID: T1562.007 |
Name: Impair Defenses: Disable or Modify Cloud Firewall |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.