Subtechnique ID
stringlengths 9
9
| technique
stringlengths 3
43
| subtech
stringlengths 3
58
⌀ | Value
stringlengths 2
483
|
---|---|---|---|
T1595.002 | Active Scanning | Vulnerability Scanning | First, this threat group would engage in vulnerability reconnaissance via application-specific vulnerability discovery and identifying vulnerable content management systems (CMS) and CMS components.
|
T1595.002 | Active Scanning | Vulnerability Scanning | Adversaries scan victims for vulnerabilities that can be used during targeting.
|
T1595.002 | Active Scanning | Vulnerability Scanning | These scans may also include more broad attempts to Gather Victim Host Information that can be used to identify more commonly known, exploitable vulnerabilities.
|
T1595.002 | Active Scanning | Vulnerability Scanning | Vulnerability scans typically harvest running software and version numbers via server banners, listening ports, or other network artifacts.
|
T1595.002 | Active Scanning | Vulnerability Scanning | Vulnerability scans typically check if the configuration of a target host/application (ex: software and version) potentially aligns with the target of a specific exploit the adversary may seek to use. |
T1595.001 | Active Scanning | Scanning Ip Blocks | The adversaries were scanning victim IP blocks to gather information that can be used during targeting.
|
T1595.001 | Active Scanning | Scanning Ip Blocks | After finding victimASNs, attackers continued by scanning these net ranges to detect active IP addresses and open ports.
|
T1595.001 | Active Scanning | Scanning Ip Blocks | One member of Anonymous was sharing victimIP addresses, another“ was scanning them to reveal host software versions.
|
T1595.001 | Active Scanning | Scanning Ip Blocks | This attacker was scanning companyIP space for any artifact he could find.
|
T1595.001 | Active Scanning | Scanning Ip Blocks | First, the attacker was using simple pings (ICMP requests and responses) to detect which targetIP addresses are actively in use. |
T1588.006 | Obtain Capabilities | Vulnerabilities | In 2017 Sandworm Team conducted technical research related to vulnerabilities associated with websites used by the Korean Sport and Olympic Committee a Korean power company and a Korean airport. |
T1588.006 | Obtain Capabilities | Vulnerabilities | Multiple threat actors obtained Log4Shell vulnerability simply by studying the public vulnerability disclosures from Apache, watching POC presentations, and analyzing reports of the zero-day exploitation.
|
T1588.006 | Obtain Capabilities | Vulnerabilities | Israeli spyware companies were purchasing vulnerabilities from undisclosed researchers, often using specialized vulnerability brokers.
|
T1588.006 | Obtain Capabilities | Vulnerabilities | Soon after the patch was released, the attackers were able to reverse-engineer the changes, understand the fix, and weaponize the vulnerability that patch was addressing.
|
T1588.006 | Obtain Capabilities | Vulnerabilities | The botnet handlers were monitoring new vulnerability disclosures to add new vulnerabilities to their list. |
T1588.002 | Obtain Capabilities | Tool | GALLIUM has used a variety of widely-available tools which in some cases they modified to add functionality and/or subvert antimalware solutions. |
T1588.002 | Obtain Capabilities | Tool | MuddyWater has made use of legitimate tools ConnectWise and RemoteUtilities for access to target environments. |
T1588.002 | Obtain Capabilities | Tool | Sandworm Team has acquired open-source tools for some of it's operations; for example it acquired Invoke-PSImage to establish an encrypted channel from a compromised host to Sandworm Team's C2 server as part of its preparation for the 2018 Winter Olympics attack. |
T1588.002 | Obtain Capabilities | Tool | Silent Librarian has obtained free and publicly available tools including SingleFile and HTTrack to copy login pages of targeted organizations. |
T1588.002 | Obtain Capabilities | Tool | Cozy Bear stole Cobalt Strike Beacon code and modified the tool to their liking. |
T1588.001 | Obtain Capabilities | Malware | APT1 used publicly available malware for privilege escalation. |
T1588.001 | Obtain Capabilities | Malware | Turla has used malware obtained after compromising other threat actors such as OilRig. |
T1588.001 | Obtain Capabilities | Malware | Ransomware-as-a-Service (RaaS) model allowed even unskilled hackers to obtain this malware and use it for a relatively small affiliate fee.
|
T1588.001 | Obtain Capabilities | Malware | New IoT botnet actors obtained leaked Mirai botnet code and slightly modified it.
|
T1588.001 | Obtain Capabilities | Malware | Citadel Trojan developers Vartanyan and Belorossov initially obtained Zeus Trojan code that they planned to use as a base for their own Trojan. |
T1588.005 | Obtain Capabilities | Exploits | DarkHotel APT group is known for stealing exploits from Hacking Team and use them for attacks on corporate executives staying in luxury hotels.
|
T1588.005 | Obtain Capabilities | Exploits | Uzbek intelligence officers bought exploits from German subsidiary of the Gamma Group that specializes in surveillance.
|
T1588.005 | Obtain Capabilities | Exploits | The attackers leveraged RIG exploit kit that they purchased on a criminal marketplace.
|
T1588.005 | Obtain Capabilities | Exploits | UAE purchased NSO GroupiPhone zero-day exploits.
|
T1588.005 | Obtain Capabilities | Exploits | These hacktivists were relying on exploits that they found online on various cybersecurity and hacker forums. |
T1555.004 | Credentials from Password Stores | Windows Credential Manager | KGH_SPY can collect credentials from the Windows Credential Manager. |
T1555.004 | Credentials from Password Stores | Windows Credential Manager | LaZagne can obtain credentials from Vault files. |
T1555.004 | Credentials from Password Stores | Windows Credential Manager | Mimikatz contains functionality to acquire credentials from the Windows Credential Manager. |
T1555.004 | Credentials from Password Stores | Windows Credential Manager | OilRig has used credential dumping tool named VALUEVAULT to steal credentials from the Windows Credential Manager. |
T1555.004 | Credentials from Password Stores | Windows Credential Manager | PowerSploit contains a collection of Exfiltration modules that can harvest credentials from Windows vault credential objects. |
T1555.004 | Credentials from Password Stores | Windows Credential Manager | ROKRAT steals credentials by leveraging the Windows Vault mechanism. |
T1555.004 | Credentials from Password Stores | Windows Credential Manager | Stealth Falcon malware gathers passwords from the Windows Credential Vault. |
T1555.004 | Credentials from Password Stores | Windows Credential Manager | Turla has gathered credentials from the Windows Credential Manager tool. |
T1555.004 | Credentials from Password Stores | Windows Credential Manager | Valak can use a .NET compiled module named exchgrabber to enumerate credentials from the Credential Manager. |
T1574.004 | Hijack Execution Flow | Dylib Hijacking | Empire has a dylib hijacker module that generates a malicious dylib given the path to a legitimate dylib of a vulnerable application. |
T1574.004 | Hijack Execution Flow | Dylib Hijacking | Abusing Dynamic Loader/Linker (dyld) logic allowed attackers to perform dylib hijacking.
|
T1574.004 | Hijack Execution Flow | Dylib Hijacking | Attackers ran Dylib Hijack Scanner tool and attacked identified vulnerable apps.
|
T1574.004 | Hijack Execution Flow | Dylib Hijacking | Developers should replace weak linking with version check to mitigate dylib hijacking attacks from these threat actors.
|
T1574.004 | Hijack Execution Flow | Dylib Hijacking | After the initial access to the Apple device, attackers were escalating their privileges by placing malicious dylib files with expected names to hijack the normal execution flow. |
T1037.004 | Boot or Logon Initialization Scripts | Rc Scripts | HiddenWasp installs reboot persistence by adding itself to /etc/rc.local. |
T1037.004 | Boot or Logon Initialization Scripts | Rc Scripts | iKitten adds an entry to the rc.common file for persistence. |
T1037.004 | Boot or Logon Initialization Scripts | Rc Scripts | Install persistence through rc.d services: rc.d (/etc/rc.d/init.d/linux_kill).
|
T1037.004 | Boot or Logon Initialization Scripts | Rc Scripts | Backwards compatibility on Ubuntu allowed attackers to achieve persistence via RC scripts.
|
T1037.004 | Boot or Logon Initialization Scripts | Rc Scripts | As the malware tries to achieve persistence, Hatching Triage analysis reports suspicious behavior:Modifies rc script. |
T1574.006 | Hijack Execution Flow | Dynamic Linker Hijacking | APT41 has configured payloads to load via LD_PRELOAD. |
T1574.006 | Hijack Execution Flow | Dynamic Linker Hijacking | Ebury has injected its dynamic library into descendent processes of sshd via LD_PRELOAD. |
T1574.006 | Hijack Execution Flow | Dynamic Linker Hijacking | HiddenWasp adds itself as a shared object to the LD_PRELOAD environment variable. |
T1574.006 | Hijack Execution Flow | Dynamic Linker Hijacking | Hildegard has modified /etc/ld.so.preload to intercept shared library import functions. |
T1574.006 | Hijack Execution Flow | Dynamic Linker Hijacking | Rocke has modified /etc/ld.so.preload to hook libc functions in order to hide the installed dropper and mining software in process lists. |
T1059.007 | Command and Scripting Interpreter | Javascript | APT32 has used JavaScript for drive-by downloads and C2 communications. |
T1059.007 | Command and Scripting Interpreter | Javascript | Astaroth uses JavaScript to perform its core functionalities. |
T1059.007 | Command and Scripting Interpreter | Javascript | Bundlore can execute JavaScript by injecting it into the victim's browser. |
T1059.007 | Command and Scripting Interpreter | Javascript | Cobalt Group has executed JavaScript scriptlets on the victim's machine. |
T1059.007 | Command and Scripting Interpreter | Javascript | The Cobalt Strike System Profiler can use JavaScript to perform reconnaissance actions. |
T1059.007 | Command and Scripting Interpreter | Javascript | Evilnum has used malicious JavaScript files on the victim's machine. |
T1059.007 | Command and Scripting Interpreter | Javascript | FIN6 has used malicious JavaScript to steal payment card data from e-commerce sites. |
T1059.007 | Command and Scripting Interpreter | Javascript | FIN7 used JavaScript scripts to help perform tasks on the victim's machine. |
T1059.007 | Command and Scripting Interpreter | Javascript | GRIFFON is written in and executed as JavaScript. |
T1059.007 | Command and Scripting Interpreter | Javascript | Higaisa used JavaScript to execute additional files. |
T1059.007 | Command and Scripting Interpreter | Javascript | InvisiMole can use a JavaScript file as part of its execution chain. |
T1059.007 | Command and Scripting Interpreter | Javascript | jRAT has been distributed as HTA files with JScript. |
T1059.007 | Command and Scripting Interpreter | Javascript | Kimsuky has used JScript for logging and downloading additional tools. |
T1059.007 | Command and Scripting Interpreter | Javascript | Leafminer infected victims using JavaScript code. |
T1059.007 | Command and Scripting Interpreter | Javascript | Metamorfo includes payloads written in JavaScript. |
T1059.007 | Command and Scripting Interpreter | Javascript | Molerats used various implants including those built with JS on target machines. |
T1059.007 | Command and Scripting Interpreter | Javascript | MuddyWater has used JavaScript files to execute its POWERSTATS payload. |
T1059.007 | Command and Scripting Interpreter | Javascript | NanHaiShu executes additional Jscript code on the victim's machine. |
T1059.007 | Command and Scripting Interpreter | Javascript | POWERSTATS can use JavaScript code for execution. |
T1059.007 | Command and Scripting Interpreter | Javascript | Sidewinder has used JavaScript to drop and execute malware loaders. |
T1059.007 | Command and Scripting Interpreter | Javascript | Silence has used JS scripts. |
T1059.007 | Command and Scripting Interpreter | Javascript | TA505 has used JavaScript for code execution. |
T1059.007 | Command and Scripting Interpreter | Javascript | Turla has used various JavaScript-based backdoors. |
T1059.007 | Command and Scripting Interpreter | Javascript | Valak can execute JavaScript containing configuration data for establishing persistence. |
T1059.007 | Command and Scripting Interpreter | Javascript | Xbash can execute malicious JavaScript payloads on the victimmachine. |
T1608.005 | Stage Capabilities | Link Target | Silent Librarian has cloned victim organization login pages and staged them for later use in credential harvesting campaigns. Silent Librarian has also made use of a variety of URL shorteners for these staged websites. |
T1608.005 | Stage Capabilities | Link Target | The attackers prepared over 39,000 phishing pages mimicking the four platforms' login pages.
|
T1608.005 | Stage Capabilities | Link Target | They used Ngrokpaid option to acquire customized phishing URLs displaying Metatrademarks (such as hxxp://facebook[.]in[.]ngrok[.]io/).
|
T1608.005 | Stage Capabilities | Link Target | Prior to the attack, they registered typosquatted domains, set up phishing pages and employed URL shortener service.
|
T1608.005 | Stage Capabilities | Link Target | The attacker placed archived malicious Office Documents at the link target. |
T1608.004 | Stage Capabilities | Drive | APT32 has stood up websites containing numerous articles and content scraped from the Internet to make them appear legitimate but some of these pages include malicious JavaScript to profile the potential victim or infect them via a fake software update. |
T1608.004 | Stage Capabilities | Drive | Threat Group-3390 has embedded malicious code into websites to screen a potential victim's IP address and then exploit their browser if they are of interest. |
T1608.004 | Stage Capabilities | Drive | The attackers prepared an malvertizing: an ad combined of image and a JavaScript, which contained malicious code, and pushed it to legitimate websites via ad networks.
|
T1608.004 | Stage Capabilities | Drive | Second stage of the Magecart attack included injecting malicious Javascript on the vulnerable checkout pages.
|
T1608.004 | Stage Capabilities | Drive | This APT group was looking to compromise industryonline publications to prepare for watering whole attacks. |
T1608.003 | Stage Capabilities | Install Digital Certificate | Adversaries created self-signed certificates and installed them on their web servers.
|
T1608.003 | Stage Capabilities | Install Digital Certificate | Attackers installed LetEncrypt certificates on their phishing servers to gain additional trust from the visitors.
|
T1608.003 | Stage Capabilities | Install Digital Certificate | They prepare phishing pages with valid SSL/TLS certificates installed.
|
T1608.003 | Stage Capabilities | Install Digital Certificate | According to PhishLabs, in the last quarter of 2019, 74% of reported phishing websites were 'secure,' being both HTTPS and with the lock symbol, meaning cybercriminals installed SSL certificates and circumvented so-called verification processes.
|
T1608.003 | Stage Capabilities | Install Digital Certificate | Actors installed SSL certificates they made using OpenSSL (where you can even be your own Certificate Authority). |
T1608.002 | Stage Capabilities | Upload Tool | Threat Group-3390 has staged tools including gsecdump and WCE on previously compromised websites. |
T1608.002 | Stage Capabilities | Upload Tool | Prior to the attack, the adversaries uploaded remote administration tools to compromised websites they controlled.
|
T1608.002 | Stage Capabilities | Upload Tool | Threat actor placed several double-purpose tools on his GitHub repository.
|
T1608.002 | Stage Capabilities | Upload Tool | The attackers uploaded Remote Utilities RAT tool to a third-party compromised website to be used if the victim environment wont have a remote administration tool installed.
|
T1608.002 | Stage Capabilities | Upload Tool | FIN5 staged a customized version of PsExec. |
T1608.001 | Stage Capabilities | Upload Malware | APT32 has hosted malicious payloads in Dropbox Amazon S3 and Google Drive for use during targeting. |