id
stringlengths 5
9
| technique
stringlengths 3
43
| subtechniqueid
stringlengths 3
60
⌀ | sentences
stringlengths 1
871
|
---|---|---|---|
t1588 | obtain capabilities | null | in some cases it may be possible to pivot on known pieces of certificate information to uncover other adversary infrastructure |
t1588 | obtain capabilities | null | malware repositories can also be used to identify additional samples associated with the developers and the adversary utilizing their services |
t1588 | obtain capabilities | null | malware repository malware metadata malware repository malware content certificate certificate registration internet scan response content |
t1588 | obtain capabilities | null | rather than developing their own capabilities in house adversaries may purchase freely download or steal them |
t1588.001 | obtain capabilities | malware | apt1 used publicly available malware for privilege escalation. |
t1588.001 | obtain capabilities | malware | turla has used malware obtained after compromising other threat actors such as oilrig. |
t1588.001 | obtain capabilities | malware | ransomware-as-a-service raas model allowed even unskilled hackers to obtain this malware and use it for a relatively small affiliate fee. |
t1588.001 | obtain capabilities | malware | new iot botnet actors obtained leaked mirai botnet code and slightly modified it. |
t1588.001 | obtain capabilities | malware | citadel trojan developers vartanyan and belorossov initially obtained zeus trojan code that they planned to use as a base for their own trojan. |
t1588.002 | obtain capabilities | tool | gallium has used a variety of widely-available tools which in some cases they modified to add functionality andor subvert antimalware solutions. |
t1588.002 | obtain capabilities | tool | muddy water has made use of legitimate tools connectwise and remote utilities for access to target environments. |
t1588.002 | obtain capabilities | tool | sandworm team has acquired open-source tools for some of it's operations for example it acquired invoke-psimage to establish an encrypted channel from a compromised host to sandworm team's c2 server as part of its preparation for the 2018 winter olympics attack. |
t1588.002 | obtain capabilities | tool | silent librarian has obtained free and publicly available tools including singlefile and httrack to copy login pages of targeted organizations. |
t1588.002 | obtain capabilities | tool | cozy bear stole cobalt strike beacon code and modified the tool to their liking. |
t1588.003 | obtain capabilities | codeTechniquesigningTechniquecertificates | megacortex has used code signing certificates issued to fake companies to bypass security controls. |
t1588.003 | obtain capabilities | codeTechniquesigningTechniquecertificates | wizard spider obtained a code signing certificate signed by digicert for some of its malware. |
t1588.003 | obtain capabilities | codeTechniquesigningTechniquecertificates | adversaries may buy code signing certificates to use during targeting. |
t1588.003 | obtain capabilities | codeTechniquesigningTechniquecertificates | certificates for fake companies provide legitimacy to run arbitrary code on targeted systems. |
t1588.003 | obtain capabilities | codeTechniquesigningTechniquecertificates | adversaries may also steal code signing materials directly from a compromised third-party. |
t1588.004 | obtain capabilities | digitalTechniquecertificates | lazarus group has obtained ssl certificates for their c2 domains. |
t1588.004 | obtain capabilities | digitalTechniquecertificates | silent librarian has obtained free let's encrypt ssl certificates for use on their phishing pages. |
t1588.004 | obtain capabilities | digitalTechniquecertificates | adversaries may buy andor steal ssltls certificates that can be used during targeting. |
t1588.004 | obtain capabilities | digitalTechniquecertificates | certificate authorities exist that allow adversaries to acquire ssltls certificates, such as domain validation certificates, for free. |
t1588.004 | obtain capabilities | digitalTechniquecertificates | adversaries may register or hijack domains that they will later purchase an ssltls certificate for.. |
t1588.005 | obtain capabilities | exploits | darkhotel apt group is known for stealing exploits from hacking team and use them for attacks on corporate executives staying in luxury hotels. |
t1588.005 | obtain capabilities | exploits | uzbek intelligence officers bought exploits from german subsidiary of the gamma group that specializes in surveillance. |
t1588.005 | obtain capabilities | exploits | the attackers leveraged rig exploit kit that they purchased on a criminal marketplace. |
t1588.005 | obtain capabilities | exploits | uae purchased nso groups iphone zero-day exploits. |
t1588.005 | obtain capabilities | exploits | these hacktivists were relying on exploits that they found online on various cybersecurity and hacker forums. |
t1588.006 | obtain capabilities | vulnerabilities | in 2017 sandworm team conducted technical research related to vulnerabilities associated with websites used by the korean sport and olympic committee a korean power company and a korean airport. |
t1588.006 | obtain capabilities | vulnerabilities | multiple threat actors obtained log4 shell vulnerability simply by studying the public vulnerability disclosures from apache, watching poc presentations, and analyzing reports of the zero-day exploitation. |
t1588.006 | obtain capabilities | vulnerabilities | israeli spyware companies were purchasing vulnerabilities from undisclosed researchers, often using specialized vulnerability brokers. |
t1588.006 | obtain capabilities | vulnerabilities | soon after the patch was released, the attackers were able to reverse-engineer the changes, understand the fix, and weaponize the vulnerability that patch was addressing. |
t1588.006 | obtain capabilities | vulnerabilities | the botnet handlers were monitoring new vulnerability disclosures to add new vulnerabilities to their list. |
t1589.001 | gather victim identity information | credentials | apt28 has harvested user's login credentials. |
t1589.001 | gather victim identity information | credentials | chimera has collected credentials for the target organization from previous breaches for use in brute force attacks. |
t1589.001 | gather victim identity information | credentials | magic hound gathered credentials from two victims that they then attempted to validate across 75 different websites. |
t1589.001 | gather victim identity information | credentials | strontium is launching campaigns to harvest peoples log-in credentials or compromise their accounts, presumably to aid in intelligence gathering or disruption operations. |
t1589.001 | gather victim identity information | credentials | attackers appear to have purchased credential information from an underground forum for use in this attack. |
t1589.002 | gather victim identity information | emailTechniqueaddresses | apt32 has collected e-mail addresses for activists and bloggers in order to target them with spyware. |
t1589.002 | gather victim identity information | emailTechniqueaddresses | hafnium has collected email addresses for users they intended to target. |
t1589.002 | gather victim identity information | emailTechniqueaddresses | muddy water has specifically targeted government agency employees with spear phishing emails. |
t1589.002 | gather victim identity information | emailTechniqueaddresses | sandworm team has obtained valid emails addresses while conducting research against target organizations that were subsequently used in spear phishing campaigns. |
t1589.002 | gather victim identity information | emailTechniqueaddresses | silent librarian has collected email addresses from targeted organizations from open internet searches. |
t1589.002 | gather victim identity information | emailTechniqueaddresses | ta551 has used spoofed company emails that were acquired from email clients on previously infected hosts to target other individuals. |
t1589.003 | gather victim identity information | employeeTechniquenames | sandworm team's research of potential victim organizations included the identification and collection of employee information. |
t1589.003 | gather victim identity information | employeeTechniquenames | silent librarian has collected lists of names for individuals from targeted organizations. |
t1589.003 | gather victim identity information | employeeTechniquenames | collecting victim organizations employee list allowed the attacker to generate actual email addresses due to conservative alias naming convention. |
t1589.003 | gather victim identity information | employeeTechniquenames | social media such as linkedin and facebook allow threat actors to identify employee names for the organizations they plan to target. |
t1589.003 | gather victim identity information | employeeTechniquenames | this threat group collects employee names from the organizations website and use them for impersonation in spear phishing attacks. |
t1590.001 | gather victim network information | domainTechniqueproperties | sandworm team conducted technical reconnaissance of the parliament of georgia's official internet domain prior to its 2019 attack. |
t1590.001 | gather victim network information | domainTechniqueproperties | there is an active campaign targeting domain owners via email addresses that were derived by actors in the domain registration data. |
t1590.001 | gather victim network information | domainTechniqueproperties | attackers were able to leverage domain registration data to find additional domains belonging to the same victim organization. |
t1590.001 | gather victim network information | domainTechniqueproperties | domain administrator was targeted with a tailored spear phishing after the attackers determined the domain registrar and impersonated it. |
t1590.001 | gather victim network information | domainTechniqueproperties | many victims avoided using domain registration anonymization services and their domain properties were leveraged by the hackers. |
t1590.001 | gather victim network information | domainTechniqueproperties | this ddos service offered tdos and email bombing to target domain administrator contacts if those were available from the gathered domain properties. |
t1590.002 | gather victim network information | dns | during the reconnaissance phase, this group paid special attention to collect and analyze dns information. |
t1590.002 | gather victim network information | dns | gathering dns information allowed the attackers to identify victims subdomains that were supposed to remain private. |
t1590.002 | gather victim network information | dns | targeting of mail servers were starting by gathering mail server records from the victims dns. |
t1590.002 | gather victim network information | dns | some of the information on targets were gathered free of charge such as from dns records. |
t1590.002 | gather victim network information | dns | passive dns information helped the attackers to map the victims hosts and plan the intrusion. |
t1590.003 | gather victim network information | networkTechniquetrustTechniquedependencies | attackers are looking for it service providers that have privileged access to their clients networks. |
t1590.003 | gather victim network information | networkTechniquetrustTechniquedependencies | nation-state sponsored hackers are targeting it service providers and discovering network trust relationships with their client organizations from government and military sectors. |
t1590.003 | gather victim network information | networkTechniquetrustTechniquedependencies | the threat actors were looking for msps and mssps managing it and security within the target organization. |
t1590.003 | gather victim network information | networkTechniquetrustTechniquedependencies | in all of the cases, attackers enumerated network trust relationships, hijacked the managed service providers internal management tools to distribute sodinokibi ransomware to their customers. |
t1590.003 | gather victim network information | networkTechniquetrustTechniquedependencies | a hacker can make one strategic breach into an msp, discover network access to their clients, and gain access to multiple customers information across multiple industries. |
t1590.004 | gather victim network information | networkTechniquetopology | the group utilizes active scanning to collect information on the victim network. |
t1590.004 | gather victim network information | networkTechniquetopology | after the initial foothold the actors were scanning to map the local network devices and plan the lateral movement. |
t1590.004 | gather victim network information | networkTechniquetopology | during the exfiltration stage, attackers were identifying documents related to local accounts, network security and topology. |
t1590.004 | gather victim network information | networkTechniquetopology | requirement to publish procurement documents made it possible for the attackers to access specifics regarding network devices used by the organization gateways, routers, etc. |
t1590.004 | gather victim network information | networkTechniquetopology | all the graphs, mind maps, presentations including the physical and or logical arrangement of both external-facing and internal network environments should be treated as sensitive information. |
t1590.005 | gather victim network information | ipTechniqueaddresses | hafnium has obtained ip addresses for publicly-accessible exchange servers. |
t1590.005 | gather victim network information | ipTechniqueaddresses | andariel has limited its watering hole attacks to specific ip address ranges. |
t1590.005 | gather victim network information | ipTechniqueaddresses | initially the attackers research the victims ip ranges and scan them for open ports and opportunities for the initial access. |
t1590.005 | gather victim network information | ipTechniqueaddresses | anonymous opisrael campaign published a pastebin post listing ip addresses of organizations that hacktivists plan to target. |
t1590.005 | gather victim network information | ipTechniqueaddresses | actor obtains list of the victim ip blocks and proceeds to run a shodan or zoomeye scan of the ranges. |
t1590.005 | gather victim network information | ipTechniqueaddresses | keyword search on hurricane electric allows attackers to find ip addresses of a certain company they want to target. |
t1590.006 | gather victim network information | networkTechniquesecurityTechniqueappliances | this firewall company had a few large customers listed on their website thus providing the attackers with convenient targets. |
t1590.006 | gather victim network information | networkTechniquesecurityTechniqueappliances | requirement to publish procurement documents made it possible for the attackers to access specifics regarding network security appliances used by the organization firewalls, content filters, nids, etc. |
t1590.006 | gather victim network information | networkTechniquesecurityTechniqueappliances | following the intrusion, actors were scanning to identify firewalls and other deployed security appliances. |
t1590.006 | gather victim network information | networkTechniquesecurityTechniqueappliances | this group phishes for information trying to identify deployed security appliances and leverage it for initial access. |
t1590.006 | gather victim network information | networkTechniquesecurityTechniqueappliances | this apt group was identifying the use of proxies and company vpn and then utilizing these security appliances for stealthy lateral movement. |
t1591 | gather victim org information | null | adversaries may gather information about the victims organization that can be used during targeting |
t1591 | gather victim org information | null | detection efforts may be focused on related stages of the adversary lifecycle such as during initial access |
t1591 | gather victim org information | null | information about an organization may include a variety of details including the names of divisionsdepartments specifics of business operations as well as the roles and responsibilities of key employees |
t1591 | gather victim org information | null | much of this activity may have a very high occurrence and associated false positive rate as well as potentially taking place outside the visibility of the target organization making detection difficult for defenders |
t1591.001 | gather victim org information | determineTechniquephysicalTechniquelocations | the majority of the actors behind the ransomware are likely based outside of the cis, for example, ransomware fonix wont run if ip geolocation is iranian. |
t1591.001 | gather victim org information | determineTechniquephysicalTechniquelocations | darkside, like a great many other malware strains, has a hard-coded do-not-install list of countries which are the principal members of the commonwealth of independent states cis ” former soviet satellites that mostly have favorable relations with the kremlin. |
t1591.001 | gather victim org information | determineTechniquephysicalTechniquelocations | revil was previously known as gandcrab, and one of the many things gandcrab had in common with revil was that both programs barred affiliates from infecting victims in syria. |
t1591.001 | gather victim org information | determineTechniquephysicalTechniquelocations | as we can see from the chart above, syria is also exempted from infections by darkside ransomware. |
t1591.001 | gather victim org information | determineTechniquephysicalTechniquelocations | however, upon closer inspection, it turns out this is actually a clever language check to ensure that the payload will not be downloaded outside of france. |
t1591.002 | gather victim org information | businessTechniquerelationships | in preparation for its attack against the 2018 winter olympics sandworm team conducted online research of partner organizations listed on an official pyeongchang olympics partnership site. |
t1591.002 | gather victim org information | businessTechniquerelationships | generally, supply chain attacks on information systems begin with an advanced persistent threat apt that determines a member of the supply network with the weakest cyber security in order to affect the target organization. |
t1591.002 | gather victim org information | businessTechniquerelationships | it also found that hackers can steal sensitive data, including information about partners. |
t1591.002 | gather victim org information | businessTechniquerelationships | the attackers were after facebooks information about partners. |
t1591.002 | gather victim org information | businessTechniquerelationships | clues about business partners can provide a hacker with other potential avenues of attack. |
t1591.002 | gather victim org information | businessTechniquerelationships | attackers identified and impersonated the companys foreign supplier in a bogus invoice scheme attack. |
t1591.003 | gather victim org information | identifyTechniquebusinessTechniquetempo | threat actors identified that long holiday weekend in the us will be the best time to launch a cyber attack against this company. |
t1591.003 | gather victim org information | identifyTechniquebusinessTechniquetempo | the federal advisory makes note of recent holiday targeting, stating that cyber actors have conducted increasingly impactful attacks against u.s. entities on or around holiday weekends. neither fbi nor cisa has information about a cyberattack coinciding with upcoming holidays and weekends, per the advisory, but the document says cyber criminals may see holidays and weekends as as attractive timeframes to target potential victims. |
t1591.003 | gather victim org information | identifyTechniquebusinessTechniquetempo | whether you celebrate christmas, hanukkah, or thanksgiving, your chances of being the victim of a cyber attack increase. the vacation season is yet another perfect period for cyber attacks. if a hacker had a choice between attacking your organization when your it security team is fully staffed or when it isn't- what do you think they will choose? |