Subtechnique ID
stringlengths
9
9
technique
stringlengths
3
43
subtech
stringlengths
3
58
Value
stringlengths
2
483
T1595.002
Active Scanning
Vulnerability Scanning
First, this threat group would engage in vulnerability reconnaissance via application-specific vulnerability discovery and identifying vulnerable content management systems (CMS) and CMS components.
T1595.002
Active Scanning
Vulnerability Scanning
Adversaries scan victims for vulnerabilities that can be used during targeting.
T1595.002
Active Scanning
Vulnerability Scanning
These scans may also include more broad attempts to Gather Victim Host Information that can be used to identify more commonly known, exploitable vulnerabilities.
T1595.002
Active Scanning
Vulnerability Scanning
Vulnerability scans typically harvest running software and version numbers via server banners, listening ports, or other network artifacts.
T1595.002
Active Scanning
Vulnerability Scanning
Vulnerability scans typically check if the configuration of a target host/application (ex: software and version) potentially aligns with the target of a specific exploit the adversary may seek to use.
T1595.001
Active Scanning
Scanning Ip Blocks
The adversaries were scanning victim IP blocks to gather information that can be used during targeting.
T1595.001
Active Scanning
Scanning Ip Blocks
After finding victimASNs, attackers continued by scanning these net ranges to detect active IP addresses and open ports.
T1595.001
Active Scanning
Scanning Ip Blocks
One member of Anonymous was sharing victimIP addresses, another“ was scanning them to reveal host software versions.
T1595.001
Active Scanning
Scanning Ip Blocks
This attacker was scanning companyIP space for any artifact he could find.
T1595.001
Active Scanning
Scanning Ip Blocks
First, the attacker was using simple pings (ICMP requests and responses) to detect which targetIP addresses are actively in use.
T1588.006
Obtain Capabilities
Vulnerabilities
In 2017 Sandworm Team conducted technical research related to vulnerabilities associated with websites used by the Korean Sport and Olympic Committee a Korean power company and a Korean airport.
T1588.006
Obtain Capabilities
Vulnerabilities
Multiple threat actors obtained Log4Shell vulnerability simply by studying the public vulnerability disclosures from Apache, watching POC presentations, and analyzing reports of the zero-day exploitation.
T1588.006
Obtain Capabilities
Vulnerabilities
Israeli spyware companies were purchasing vulnerabilities from undisclosed researchers, often using specialized vulnerability brokers.
T1588.006
Obtain Capabilities
Vulnerabilities
Soon after the patch was released, the attackers were able to reverse-engineer the changes, understand the fix, and weaponize the vulnerability that patch was addressing.
T1588.006
Obtain Capabilities
Vulnerabilities
The botnet handlers were monitoring new vulnerability disclosures to add new vulnerabilities to their list.
T1588.002
Obtain Capabilities
Tool
GALLIUM has used a variety of widely-available tools which in some cases they modified to add functionality and/or subvert antimalware solutions.
T1588.002
Obtain Capabilities
Tool
MuddyWater has made use of legitimate tools ConnectWise and RemoteUtilities for access to target environments.
T1588.002
Obtain Capabilities
Tool
Sandworm Team has acquired open-source tools for some of it's operations; for example it acquired Invoke-PSImage to establish an encrypted channel from a compromised host to Sandworm Team's C2 server as part of its preparation for the 2018 Winter Olympics attack.
T1588.002
Obtain Capabilities
Tool
Silent Librarian has obtained free and publicly available tools including SingleFile and HTTrack to copy login pages of targeted organizations.
T1588.002
Obtain Capabilities
Tool
Cozy Bear stole Cobalt Strike Beacon code and modified the tool to their liking.
T1588.001
Obtain Capabilities
Malware
APT1 used publicly available malware for privilege escalation.
T1588.001
Obtain Capabilities
Malware
Turla has used malware obtained after compromising other threat actors such as OilRig.
T1588.001
Obtain Capabilities
Malware
Ransomware-as-a-Service (RaaS) model allowed even unskilled hackers to obtain this malware and use it for a relatively small affiliate fee.
T1588.001
Obtain Capabilities
Malware
New IoT botnet actors obtained leaked Mirai botnet code and slightly modified it.
T1588.001
Obtain Capabilities
Malware
Citadel Trojan developers Vartanyan and Belorossov initially obtained Zeus Trojan code that they planned to use as a base for their own Trojan.
T1588.005
Obtain Capabilities
Exploits
DarkHotel APT group is known for stealing exploits from Hacking Team and use them for attacks on corporate executives staying in luxury hotels.
T1588.005
Obtain Capabilities
Exploits
Uzbek intelligence officers bought exploits from German subsidiary of the Gamma Group that specializes in surveillance.
T1588.005
Obtain Capabilities
Exploits
The attackers leveraged RIG exploit kit that they purchased on a criminal marketplace.
T1588.005
Obtain Capabilities
Exploits
UAE purchased NSO GroupiPhone zero-day exploits.
T1588.005
Obtain Capabilities
Exploits
These hacktivists were relying on exploits that they found online on various cybersecurity and hacker forums.
T1555.004
Credentials from Password Stores
Windows Credential Manager
KGH_SPY can collect credentials from the Windows Credential Manager.
T1555.004
Credentials from Password Stores
Windows Credential Manager
LaZagne can obtain credentials from Vault files.
T1555.004
Credentials from Password Stores
Windows Credential Manager
Mimikatz contains functionality to acquire credentials from the Windows Credential Manager.
T1555.004
Credentials from Password Stores
Windows Credential Manager
OilRig has used credential dumping tool named VALUEVAULT to steal credentials from the Windows Credential Manager.
T1555.004
Credentials from Password Stores
Windows Credential Manager
PowerSploit contains a collection of Exfiltration modules that can harvest credentials from Windows vault credential objects.
T1555.004
Credentials from Password Stores
Windows Credential Manager
ROKRAT steals credentials by leveraging the Windows Vault mechanism.
T1555.004
Credentials from Password Stores
Windows Credential Manager
Stealth Falcon malware gathers passwords from the Windows Credential Vault.
T1555.004
Credentials from Password Stores
Windows Credential Manager
Turla has gathered credentials from the Windows Credential Manager tool.
T1555.004
Credentials from Password Stores
Windows Credential Manager
Valak can use a .NET compiled module named exchgrabber to enumerate credentials from the Credential Manager.
T1574.004
Hijack Execution Flow
Dylib Hijacking
Empire has a dylib hijacker module that generates a malicious dylib given the path to a legitimate dylib of a vulnerable application.
T1574.004
Hijack Execution Flow
Dylib Hijacking
Abusing Dynamic Loader/Linker (dyld) logic allowed attackers to perform dylib hijacking.
T1574.004
Hijack Execution Flow
Dylib Hijacking
Attackers ran Dylib Hijack Scanner tool and attacked identified vulnerable apps.
T1574.004
Hijack Execution Flow
Dylib Hijacking
Developers should replace weak linking with version check to mitigate dylib hijacking attacks from these threat actors.
T1574.004
Hijack Execution Flow
Dylib Hijacking
After the initial access to the Apple device, attackers were escalating their privileges by placing malicious dylib files with expected names to hijack the normal execution flow.
T1037.004
Boot or Logon Initialization Scripts
Rc Scripts
HiddenWasp installs reboot persistence by adding itself to /etc/rc.local.
T1037.004
Boot or Logon Initialization Scripts
Rc Scripts
iKitten adds an entry to the rc.common file for persistence.
T1037.004
Boot or Logon Initialization Scripts
Rc Scripts
Install persistence through rc.d services: rc.d (/etc/rc.d/init.d/linux_kill).
T1037.004
Boot or Logon Initialization Scripts
Rc Scripts
Backwards compatibility on Ubuntu allowed attackers to achieve persistence via RC scripts.
T1037.004
Boot or Logon Initialization Scripts
Rc Scripts
As the malware tries to achieve persistence, Hatching Triage analysis reports suspicious behavior:Modifies rc script.
T1574.006
Hijack Execution Flow
Dynamic Linker Hijacking
APT41 has configured payloads to load via LD_PRELOAD.
T1574.006
Hijack Execution Flow
Dynamic Linker Hijacking
Ebury has injected its dynamic library into descendent processes of sshd via LD_PRELOAD.
T1574.006
Hijack Execution Flow
Dynamic Linker Hijacking
HiddenWasp adds itself as a shared object to the LD_PRELOAD environment variable.
T1574.006
Hijack Execution Flow
Dynamic Linker Hijacking
Hildegard has modified /etc/ld.so.preload to intercept shared library import functions.
T1574.006
Hijack Execution Flow
Dynamic Linker Hijacking
Rocke has modified /etc/ld.so.preload to hook libc functions in order to hide the installed dropper and mining software in process lists.
T1059.007
Command and Scripting Interpreter
Javascript
APT32 has used JavaScript for drive-by downloads and C2 communications.
T1059.007
Command and Scripting Interpreter
Javascript
Astaroth uses JavaScript to perform its core functionalities.
T1059.007
Command and Scripting Interpreter
Javascript
Bundlore can execute JavaScript by injecting it into the victim's browser.
T1059.007
Command and Scripting Interpreter
Javascript
Cobalt Group has executed JavaScript scriptlets on the victim's machine.
T1059.007
Command and Scripting Interpreter
Javascript
The Cobalt Strike System Profiler can use JavaScript to perform reconnaissance actions.
T1059.007
Command and Scripting Interpreter
Javascript
Evilnum has used malicious JavaScript files on the victim's machine.
T1059.007
Command and Scripting Interpreter
Javascript
FIN6 has used malicious JavaScript to steal payment card data from e-commerce sites.
T1059.007
Command and Scripting Interpreter
Javascript
FIN7 used JavaScript scripts to help perform tasks on the victim's machine.
T1059.007
Command and Scripting Interpreter
Javascript
GRIFFON is written in and executed as JavaScript.
T1059.007
Command and Scripting Interpreter
Javascript
Higaisa used JavaScript to execute additional files.
T1059.007
Command and Scripting Interpreter
Javascript
InvisiMole can use a JavaScript file as part of its execution chain.
T1059.007
Command and Scripting Interpreter
Javascript
jRAT has been distributed as HTA files with JScript.
T1059.007
Command and Scripting Interpreter
Javascript
Kimsuky has used JScript for logging and downloading additional tools.
T1059.007
Command and Scripting Interpreter
Javascript
Leafminer infected victims using JavaScript code.
T1059.007
Command and Scripting Interpreter
Javascript
Metamorfo includes payloads written in JavaScript.
T1059.007
Command and Scripting Interpreter
Javascript
Molerats used various implants including those built with JS on target machines.
T1059.007
Command and Scripting Interpreter
Javascript
MuddyWater has used JavaScript files to execute its POWERSTATS payload.
T1059.007
Command and Scripting Interpreter
Javascript
NanHaiShu executes additional Jscript code on the victim's machine.
T1059.007
Command and Scripting Interpreter
Javascript
POWERSTATS can use JavaScript code for execution.
T1059.007
Command and Scripting Interpreter
Javascript
Sidewinder has used JavaScript to drop and execute malware loaders.
T1059.007
Command and Scripting Interpreter
Javascript
Silence has used JS scripts.
T1059.007
Command and Scripting Interpreter
Javascript
TA505 has used JavaScript for code execution.
T1059.007
Command and Scripting Interpreter
Javascript
Turla has used various JavaScript-based backdoors.
T1059.007
Command and Scripting Interpreter
Javascript
Valak can execute JavaScript containing configuration data for establishing persistence.
T1059.007
Command and Scripting Interpreter
Javascript
Xbash can execute malicious JavaScript payloads on the victimmachine.
T1608.005
Stage Capabilities
Link Target
Silent Librarian has cloned victim organization login pages and staged them for later use in credential harvesting campaigns. Silent Librarian has also made use of a variety of URL shorteners for these staged websites.
T1608.005
Stage Capabilities
Link Target
The attackers prepared over 39,000 phishing pages mimicking the four platforms' login pages.
T1608.005
Stage Capabilities
Link Target
They used Ngrokpaid option to acquire customized phishing URLs displaying Metatrademarks (such as hxxp://facebook[.]in[.]ngrok[.]io/).
T1608.005
Stage Capabilities
Link Target
Prior to the attack, they registered typosquatted domains, set up phishing pages and employed URL shortener service.
T1608.005
Stage Capabilities
Link Target
The attacker placed archived malicious Office Documents at the link target.
T1608.004
Stage Capabilities
Drive
APT32 has stood up websites containing numerous articles and content scraped from the Internet to make them appear legitimate but some of these pages include malicious JavaScript to profile the potential victim or infect them via a fake software update.
T1608.004
Stage Capabilities
Drive
Threat Group-3390 has embedded malicious code into websites to screen a potential victim's IP address and then exploit their browser if they are of interest.
T1608.004
Stage Capabilities
Drive
The attackers prepared an malvertizing: an ad combined of image and a JavaScript, which contained malicious code, and pushed it to legitimate websites via ad networks.
T1608.004
Stage Capabilities
Drive
Second stage of the Magecart attack included injecting malicious Javascript on the vulnerable checkout pages.
T1608.004
Stage Capabilities
Drive
This APT group was looking to compromise industryonline publications to prepare for watering whole attacks.
T1608.003
Stage Capabilities
Install Digital Certificate
Adversaries created self-signed certificates and installed them on their web servers.
T1608.003
Stage Capabilities
Install Digital Certificate
Attackers installed LetEncrypt certificates on their phishing servers to gain additional trust from the visitors.
T1608.003
Stage Capabilities
Install Digital Certificate
They prepare phishing pages with valid SSL/TLS certificates installed.
T1608.003
Stage Capabilities
Install Digital Certificate
According to PhishLabs, in the last quarter of 2019, 74% of reported phishing websites were 'secure,' being both HTTPS and with the lock symbol, meaning cybercriminals installed SSL certificates and circumvented so-called verification processes.
T1608.003
Stage Capabilities
Install Digital Certificate
Actors installed SSL certificates they made using OpenSSL (where you can even be your own Certificate Authority).
T1608.002
Stage Capabilities
Upload Tool
Threat Group-3390 has staged tools including gsecdump and WCE on previously compromised websites.
T1608.002
Stage Capabilities
Upload Tool
Prior to the attack, the adversaries uploaded remote administration tools to compromised websites they controlled.
T1608.002
Stage Capabilities
Upload Tool
Threat actor placed several double-purpose tools on his GitHub repository.
T1608.002
Stage Capabilities
Upload Tool
The attackers uploaded Remote Utilities RAT tool to a third-party compromised website to be used if the victim environment wont have a remote administration tool installed.
T1608.002
Stage Capabilities
Upload Tool
FIN5 staged a customized version of PsExec.
T1608.001
Stage Capabilities
Upload Malware
APT32 has hosted malicious payloads in Dropbox Amazon S3 and Google Drive for use during targeting.