id
stringlengths
5
9
technique
stringlengths
3
43
subtechniqueid
stringlengths
3
60
sentences
stringlengths
1
871
t1588
obtain capabilities
null
in some cases it may be possible to pivot on known pieces of certificate information to uncover other adversary infrastructure
t1588
obtain capabilities
null
malware repositories can also be used to identify additional samples associated with the developers and the adversary utilizing their services
t1588
obtain capabilities
null
malware repository malware metadata malware repository malware content certificate certificate registration internet scan response content
t1588
obtain capabilities
null
rather than developing their own capabilities in house adversaries may purchase freely download or steal them
t1588.001
obtain capabilities
malware
apt1 used publicly available malware for privilege escalation.
t1588.001
obtain capabilities
malware
turla has used malware obtained after compromising other threat actors such as oilrig.
t1588.001
obtain capabilities
malware
ransomware-as-a-service raas model allowed even unskilled hackers to obtain this malware and use it for a relatively small affiliate fee.
t1588.001
obtain capabilities
malware
new iot botnet actors obtained leaked mirai botnet code and slightly modified it.
t1588.001
obtain capabilities
malware
citadel trojan developers vartanyan and belorossov initially obtained zeus trojan code that they planned to use as a base for their own trojan.
t1588.002
obtain capabilities
tool
gallium has used a variety of widely-available tools which in some cases they modified to add functionality andor subvert antimalware solutions.
t1588.002
obtain capabilities
tool
muddy water has made use of legitimate tools connectwise and remote utilities for access to target environments.
t1588.002
obtain capabilities
tool
sandworm team has acquired open-source tools for some of it's operations for example it acquired invoke-psimage to establish an encrypted channel from a compromised host to sandworm team's c2 server as part of its preparation for the 2018 winter olympics attack.
t1588.002
obtain capabilities
tool
silent librarian has obtained free and publicly available tools including singlefile and httrack to copy login pages of targeted organizations.
t1588.002
obtain capabilities
tool
cozy bear stole cobalt strike beacon code and modified the tool to their liking.
t1588.003
obtain capabilities
codeTechniquesigningTechniquecertificates
megacortex has used code signing certificates issued to fake companies to bypass security controls.
t1588.003
obtain capabilities
codeTechniquesigningTechniquecertificates
wizard spider obtained a code signing certificate signed by digicert for some of its malware.
t1588.003
obtain capabilities
codeTechniquesigningTechniquecertificates
adversaries may buy code signing certificates to use during targeting.
t1588.003
obtain capabilities
codeTechniquesigningTechniquecertificates
certificates for fake companies provide legitimacy to run arbitrary code on targeted systems.
t1588.003
obtain capabilities
codeTechniquesigningTechniquecertificates
adversaries may also steal code signing materials directly from a compromised third-party.
t1588.004
obtain capabilities
digitalTechniquecertificates
lazarus group has obtained ssl certificates for their c2 domains.
t1588.004
obtain capabilities
digitalTechniquecertificates
silent librarian has obtained free let's encrypt ssl certificates for use on their phishing pages.
t1588.004
obtain capabilities
digitalTechniquecertificates
adversaries may buy andor steal ssltls certificates that can be used during targeting.
t1588.004
obtain capabilities
digitalTechniquecertificates
certificate authorities exist that allow adversaries to acquire ssltls certificates, such as domain validation certificates, for free.
t1588.004
obtain capabilities
digitalTechniquecertificates
adversaries may register or hijack domains that they will later purchase an ssltls certificate for..
t1588.005
obtain capabilities
exploits
darkhotel apt group is known for stealing exploits from hacking team and use them for attacks on corporate executives staying in luxury hotels.
t1588.005
obtain capabilities
exploits
uzbek intelligence officers bought exploits from german subsidiary of the gamma group that specializes in surveillance.
t1588.005
obtain capabilities
exploits
the attackers leveraged rig exploit kit that they purchased on a criminal marketplace.
t1588.005
obtain capabilities
exploits
uae purchased nso groups iphone zero-day exploits.
t1588.005
obtain capabilities
exploits
these hacktivists were relying on exploits that they found online on various cybersecurity and hacker forums.
t1588.006
obtain capabilities
vulnerabilities
in 2017 sandworm team conducted technical research related to vulnerabilities associated with websites used by the korean sport and olympic committee a korean power company and a korean airport.
t1588.006
obtain capabilities
vulnerabilities
multiple threat actors obtained log4 shell vulnerability simply by studying the public vulnerability disclosures from apache, watching poc presentations, and analyzing reports of the zero-day exploitation.
t1588.006
obtain capabilities
vulnerabilities
israeli spyware companies were purchasing vulnerabilities from undisclosed researchers, often using specialized vulnerability brokers.
t1588.006
obtain capabilities
vulnerabilities
soon after the patch was released, the attackers were able to reverse-engineer the changes, understand the fix, and weaponize the vulnerability that patch was addressing.
t1588.006
obtain capabilities
vulnerabilities
the botnet handlers were monitoring new vulnerability disclosures to add new vulnerabilities to their list.
t1589.001
gather victim identity information
credentials
apt28 has harvested user's login credentials.
t1589.001
gather victim identity information
credentials
chimera has collected credentials for the target organization from previous breaches for use in brute force attacks.
t1589.001
gather victim identity information
credentials
magic hound gathered credentials from two victims that they then attempted to validate across 75 different websites.
t1589.001
gather victim identity information
credentials
strontium is launching campaigns to harvest peoples log-in credentials or compromise their accounts, presumably to aid in intelligence gathering or disruption operations.
t1589.001
gather victim identity information
credentials
attackers appear to have purchased credential information from an underground forum for use in this attack.
t1589.002
gather victim identity information
emailTechniqueaddresses
apt32 has collected e-mail addresses for activists and bloggers in order to target them with spyware.
t1589.002
gather victim identity information
emailTechniqueaddresses
hafnium has collected email addresses for users they intended to target.
t1589.002
gather victim identity information
emailTechniqueaddresses
muddy water has specifically targeted government agency employees with spear phishing emails.
t1589.002
gather victim identity information
emailTechniqueaddresses
sandworm team has obtained valid emails addresses while conducting research against target organizations that were subsequently used in spear phishing campaigns.
t1589.002
gather victim identity information
emailTechniqueaddresses
silent librarian has collected email addresses from targeted organizations from open internet searches.
t1589.002
gather victim identity information
emailTechniqueaddresses
ta551 has used spoofed company emails that were acquired from email clients on previously infected hosts to target other individuals.
t1589.003
gather victim identity information
employeeTechniquenames
sandworm team's research of potential victim organizations included the identification and collection of employee information.
t1589.003
gather victim identity information
employeeTechniquenames
silent librarian has collected lists of names for individuals from targeted organizations.
t1589.003
gather victim identity information
employeeTechniquenames
collecting victim organizations employee list allowed the attacker to generate actual email addresses due to conservative alias naming convention.
t1589.003
gather victim identity information
employeeTechniquenames
social media such as linkedin and facebook allow threat actors to identify employee names for the organizations they plan to target.
t1589.003
gather victim identity information
employeeTechniquenames
this threat group collects employee names from the organizations website and use them for impersonation in spear phishing attacks.
t1590.001
gather victim network information
domainTechniqueproperties
sandworm team conducted technical reconnaissance of the parliament of georgia's official internet domain prior to its 2019 attack.
t1590.001
gather victim network information
domainTechniqueproperties
there is an active campaign targeting domain owners via email addresses that were derived by actors in the domain registration data.
t1590.001
gather victim network information
domainTechniqueproperties
attackers were able to leverage domain registration data to find additional domains belonging to the same victim organization.
t1590.001
gather victim network information
domainTechniqueproperties
domain administrator was targeted with a tailored spear phishing after the attackers determined the domain registrar and impersonated it.
t1590.001
gather victim network information
domainTechniqueproperties
many victims avoided using domain registration anonymization services and their domain properties were leveraged by the hackers.
t1590.001
gather victim network information
domainTechniqueproperties
this ddos service offered tdos and email bombing to target domain administrator contacts if those were available from the gathered domain properties.
t1590.002
gather victim network information
dns
during the reconnaissance phase, this group paid special attention to collect and analyze dns information.
t1590.002
gather victim network information
dns
gathering dns information allowed the attackers to identify victims subdomains that were supposed to remain private.
t1590.002
gather victim network information
dns
targeting of mail servers were starting by gathering mail server records from the victims dns.
t1590.002
gather victim network information
dns
some of the information on targets were gathered free of charge such as from dns records.
t1590.002
gather victim network information
dns
passive dns information helped the attackers to map the victims hosts and plan the intrusion.
t1590.003
gather victim network information
networkTechniquetrustTechniquedependencies
attackers are looking for it service providers that have privileged access to their clients networks.
t1590.003
gather victim network information
networkTechniquetrustTechniquedependencies
nation-state sponsored hackers are targeting it service providers and discovering network trust relationships with their client organizations from government and military sectors.
t1590.003
gather victim network information
networkTechniquetrustTechniquedependencies
the threat actors were looking for msps and mssps managing it and security within the target organization.
t1590.003
gather victim network information
networkTechniquetrustTechniquedependencies
in all of the cases, attackers enumerated network trust relationships, hijacked the managed service providers internal management tools to distribute sodinokibi ransomware to their customers.
t1590.003
gather victim network information
networkTechniquetrustTechniquedependencies
a hacker can make one strategic breach into an msp, discover network access to their clients, and gain access to multiple customers information across multiple industries.
t1590.004
gather victim network information
networkTechniquetopology
the group utilizes active scanning to collect information on the victim network.
t1590.004
gather victim network information
networkTechniquetopology
after the initial foothold the actors were scanning to map the local network devices and plan the lateral movement.
t1590.004
gather victim network information
networkTechniquetopology
during the exfiltration stage, attackers were identifying documents related to local accounts, network security and topology.
t1590.004
gather victim network information
networkTechniquetopology
requirement to publish procurement documents made it possible for the attackers to access specifics regarding network devices used by the organization gateways, routers, etc.
t1590.004
gather victim network information
networkTechniquetopology
all the graphs, mind maps, presentations including the physical and or logical arrangement of both external-facing and internal network environments should be treated as sensitive information.
t1590.005
gather victim network information
ipTechniqueaddresses
hafnium has obtained ip addresses for publicly-accessible exchange servers.
t1590.005
gather victim network information
ipTechniqueaddresses
andariel has limited its watering hole attacks to specific ip address ranges.
t1590.005
gather victim network information
ipTechniqueaddresses
initially the attackers research the victims ip ranges and scan them for open ports and opportunities for the initial access.
t1590.005
gather victim network information
ipTechniqueaddresses
anonymous opisrael campaign published a pastebin post listing ip addresses of organizations that hacktivists plan to target.
t1590.005
gather victim network information
ipTechniqueaddresses
actor obtains list of the victim ip blocks and proceeds to run a shodan or zoomeye scan of the ranges.
t1590.005
gather victim network information
ipTechniqueaddresses
keyword search on hurricane electric allows attackers to find ip addresses of a certain company they want to target.
t1590.006
gather victim network information
networkTechniquesecurityTechniqueappliances
this firewall company had a few large customers listed on their website thus providing the attackers with convenient targets.
t1590.006
gather victim network information
networkTechniquesecurityTechniqueappliances
requirement to publish procurement documents made it possible for the attackers to access specifics regarding network security appliances used by the organization firewalls, content filters, nids, etc.
t1590.006
gather victim network information
networkTechniquesecurityTechniqueappliances
following the intrusion, actors were scanning to identify firewalls and other deployed security appliances.
t1590.006
gather victim network information
networkTechniquesecurityTechniqueappliances
this group phishes for information trying to identify deployed security appliances and leverage it for initial access.
t1590.006
gather victim network information
networkTechniquesecurityTechniqueappliances
this apt group was identifying the use of proxies and company vpn and then utilizing these security appliances for stealthy lateral movement.
t1591
gather victim org information
null
adversaries may gather information about the victims organization that can be used during targeting
t1591
gather victim org information
null
detection efforts may be focused on related stages of the adversary lifecycle such as during initial access
t1591
gather victim org information
null
information about an organization may include a variety of details including the names of divisionsdepartments specifics of business operations as well as the roles and responsibilities of key employees
t1591
gather victim org information
null
much of this activity may have a very high occurrence and associated false positive rate as well as potentially taking place outside the visibility of the target organization making detection difficult for defenders
t1591.001
gather victim org information
determineTechniquephysicalTechniquelocations
the majority of the actors behind the ransomware are likely based outside of the cis, for example, ransomware fonix wont run if ip geolocation is iranian.
t1591.001
gather victim org information
determineTechniquephysicalTechniquelocations
darkside, like a great many other malware strains, has a hard-coded do-not-install list of countries which are the principal members of the commonwealth of independent states cis ” former soviet satellites that mostly have favorable relations with the kremlin.
t1591.001
gather victim org information
determineTechniquephysicalTechniquelocations
revil was previously known as gandcrab, and one of the many things gandcrab had in common with revil was that both programs barred affiliates from infecting victims in syria.
t1591.001
gather victim org information
determineTechniquephysicalTechniquelocations
as we can see from the chart above, syria is also exempted from infections by darkside ransomware.
t1591.001
gather victim org information
determineTechniquephysicalTechniquelocations
however, upon closer inspection, it turns out this is actually a clever language check to ensure that the payload will not be downloaded outside of france.
t1591.002
gather victim org information
businessTechniquerelationships
in preparation for its attack against the 2018 winter olympics sandworm team conducted online research of partner organizations listed on an official pyeongchang olympics partnership site.
t1591.002
gather victim org information
businessTechniquerelationships
generally, supply chain attacks on information systems begin with an advanced persistent threat apt that determines a member of the supply network with the weakest cyber security in order to affect the target organization.
t1591.002
gather victim org information
businessTechniquerelationships
it also found that hackers can steal sensitive data, including information about partners.
t1591.002
gather victim org information
businessTechniquerelationships
the attackers were after facebooks information about partners.
t1591.002
gather victim org information
businessTechniquerelationships
clues about business partners can provide a hacker with other potential avenues of attack.
t1591.002
gather victim org information
businessTechniquerelationships
attackers identified and impersonated the companys foreign supplier in a bogus invoice scheme attack.
t1591.003
gather victim org information
identifyTechniquebusinessTechniquetempo
threat actors identified that long holiday weekend in the us will be the best time to launch a cyber attack against this company.
t1591.003
gather victim org information
identifyTechniquebusinessTechniquetempo
the federal advisory makes note of recent holiday targeting, stating that cyber actors have conducted increasingly impactful attacks against u.s. entities on or around holiday weekends. neither fbi nor cisa has information about a cyberattack coinciding with upcoming holidays and weekends, per the advisory, but the document says cyber criminals may see holidays and weekends as as attractive timeframes to target potential victims.
t1591.003
gather victim org information
identifyTechniquebusinessTechniquetempo
whether you celebrate christmas, hanukkah, or thanksgiving, your chances of being the victim of a cyber attack increase. the vacation season is yet another perfect period for cyber attacks. if a hacker had a choice between attacking your organization when your it security team is fully staffed or when it isn't- what do you think they will choose?