id
stringlengths
5
9
technique
stringlengths
3
43
subtechniqueid
stringlengths
3
60
sentences
stringlengths
1
871
t1596.005
search open technical databases
scanTechniquedatabases
revil has performed recon against victims by scanning for vulnerable services and open ports.
t1596.005
search open technical databases
scanTechniquedatabases
attackers can use passive and active methods to obtain active port services.
t1596.005
search open technical databases
scanTechniquedatabases
threat actors can use shodan to search for internet-facing hosts and ip addresses.
t1597
search closed sources
null
adversaries may search and gather information about victims from closed sources that can be used during targeting
t1597
search closed sources
null
detection efforts may be focused on related stages of the adversary lifecycle such as during initial access
t1597
search closed sources
null
information about victims may be available for purchase from reputable private sources and databases such as paid subscriptions to feeds of technicalthreat intelligence data
t1597
search closed sources
null
much of this activity may have a very high occurrence and associated false positive rate as well as potentially taking place outside the visibility of the target organization making detection difficult for defenders
t1597.001
search closed sources
threatTechniqueintelTechniquevendors
threat actors can use threat intel feeds for valuable information.
t1597.001
search closed sources
threatTechniqueintelTechniquevendors
threat actors can use paid platforms to monitor what intelligence is being provided to potential targets.
t1597.001
search closed sources
threatTechniqueintelTechniquevendors
adversaries can monitor what iocs are being discovered about their campaign to change tactics.
t1597.001
search closed sources
threatTechniqueintelTechniquevendors
threat actors can determine what other groups are targeting through intel platforms.
t1597.001
search closed sources
threatTechniqueintelTechniquevendors
threat actors can use intelligence feeds to target new victims.
t1597.002
search closed sources
purchaseTechniquetechnicalTechniquedata
adversaries may purchase technical information about victims that can be used during targeting.
t1597.002
search closed sources
purchaseTechniquetechnicalTechniquedata
threat actors may purchase information from dark web or black markets.
t1597.002
search closed sources
purchaseTechniquetechnicalTechniquedata
reputable private resources have scan database subscriptions.
t1597.002
search closed sources
purchaseTechniquetechnicalTechniquedata
attackers can use known or unknown repositories of data from tor sites.
t1597.002
search closed sources
purchaseTechniquetechnicalTechniquedata
threat actors can gain network and login information purchased from other attacker groups.
t1598
phishing for information
null
adversaries may send phishing messages to elicit sensitive information that can be used during targeting
t1598
phishing for information
null
application log application log content network traffic network traffic flow network traffic network traffic content
t1598
phishing for information
null
citation microsoft anti spoofingcitation acsc email spoofing when it comes to following links monitor for references to uncategorized or known bad sites
t1598
phishing for information
null
depending on the specific method of phishing the detections can vary
t1598
phishing for information
null
filtering based on dkim+spf or header analysis can help detect when the email sender is spoofed
t1598
phishing for information
null
monitor for suspicious email activity such as numerous accounts receiving messages from a single unusualunknown sender
t1598
phishing for information
null
monitor social media traffic for suspicious activity including messages requesting information as well as abnormal file or data transfers especially those involving unknown or otherwise suspicious accounts
t1598
phishing for information
null
phishing for information is an attempt to trick targets into divulging information frequently credentials or other actionable information
t1598
phishing for information
null
url inspection within email including expanding shortened links can also help detect links leading to known malicious sites
t1598.001
phishing for information
spearphishingTechniqueservice
attackers will use spearphishing messages to elicit sensative information from targets.
t1598.001
phishing for information
spearphishingTechniqueservice
spearphishing uses social engineering techniques to get credentials or other information.
t1598.001
phishing for information
spearphishingTechniqueservice
emails or social media messaging spearphishing is generally aimed at it departments, c-suite executives, or non-tech related departments.
t1598.001
phishing for information
spearphishingTechniqueservice
threat actors use spearphishing against non-enterprise controlled services as they have less protections.
t1598.001
phishing for information
spearphishingTechniqueservice
adversaries may pose as recruiters to garner interest and communication.
t1598.002
phishing for information
spearTechniquephishingTechniqueattachment
astaroth has been delivered via malicious email attachments.
t1598.002
phishing for information
spearTechniquephishingTechniqueattachment
sidewinder has sent emails with malicious attachments that lead victims to credential harvesting websites.
t1598.002
phishing for information
spearTechniquephishingTechniqueattachment
a phishing campaign has been observed by researchers from trend micro that contain a macro-enabled document that exploits the legitimate script engine, œautohotkey.
t1598.002
phishing for information
spearTechniquephishingTechniqueattachment
researchers have discovered a wave of emails with malicious attachments orchestrated by russian advanced persistent threat apt group apt29.
t1598.002
phishing for information
spearTechniquephishingTechniqueattachment
using attached html files containing javascript, the email will write an iso file to disk this contains a cobalt strike beacon that will activate on completion.
t1598.002
phishing for information
spearTechniquephishingTechniqueattachment
strat, a java-based malware, is currently being delivered as an attached pdf document via a phishing campaign using compromised email accounts.
t1598.002
phishing for information
spearTechniquephishingTechniqueattachment
although the email may look official and legitimate, if you have no reason to receive such an email or if the content is questionable, you should not open any attached files.
t1598.003
phishing for information
spearphishingTechniquelink
apt32 has used malicious links to direct users to web pages designed to harvest credentials.
t1598.003
phishing for information
spearphishingTechniquelink
kimsuky has used links in e-mail to steal account information.
t1598.003
phishing for information
spearphishingTechniquelink
sandworm team has crafted spearphishing emails with hyperlinks designed to trick unwitting recipients into revealing their account credentials.
t1598.003
phishing for information
spearphishingTechniquelink
sidewinder has sent e-mails with malicious links to credential harvesting websites.
t1598.003
phishing for information
spearphishingTechniquelink
silent librarian has used links in e-mails to direct victims to credential harvesting websites designed to appear like the targeted organization's login page.
t1599
network boundary bridging
null
adversaries may bridge network boundaries by compromising perimeter network devices
t1599
network boundary bridging
null
breaching these devices may enable an adversary to bypass restrictions on traffic routing that otherwise separate trusted and untrusted networks
t1599
network boundary bridging
null
consider monitoring network traffic on both interfaces of border network devices with out of band packet capture or network flow data using a different device than the one in question
t1599
network boundary bridging
null
look for rules that are less restrictive or that allow specific traffic types that were not previously authorized
t1599
network boundary bridging
null
look for traffic that should be prohibited by the intended network traffic policy enforcement for the border network device
t1599
network boundary bridging
null
monitor the border network device configuration to validate that the policy enforcement sections are what was intended
t1599
network boundary bridging
null
network traffic network traffic flow network traffic network traffic content
t1600
weaken encryption
null
adversaries may compromise a network devices encryption capability in order to bypass encryption that would otherwise protect data communications
t1600
weaken encryption
null
citation cisco synful knock evolution encryption can be used to protect transmitted network traffic to maintain its confidentiality protect against unauthorized disclosure and integrity protect against unauthorized changes
t1600
weaken encryption
null
detection efforts may be focused on closely related adversary behaviors such as modify system imaget1601
t1600
weaken encryption
null
file file modification
t1600
weaken encryption
null
some detection methods require vendor support to aid in investigation
t1600
weaken encryption
null
there is no documented method for defenders to directly identify behaviors that weaken encryption
t1601
modify system image
null
001 it may be appropriate to also verify the integrity of the vendor provided operating system image file
t1601
modify system image
null
adversaries may make changes to the operating system of embedded network devices to weaken defenses and provide new capabilities for themselves
t1601
modify system image
null
because this method may be used in conjunction with patch system imaget1601
t1601
modify system image
null
citation cisco ios software integrity assurance image file verification many vendors of embedded network devices can provide advanced debugging support that will allow them to work with device owners to validate the integrity of the operating system running in memory
t1601
modify system image
null
citation cisco ios software integrity assurance run time memory verification
t1601
modify system image
null
compare the checksum of the operating system file with the checksum of a known good copy from a trusted source
t1601
modify system image
null
even for those platforms that have the capability it is recommended to download a copy of the file to a trusted computer to calculate the checksum with software that is not compromised
t1601
modify system image
null
file file modification
t1601
modify system image
null
if a compromise of the operating system is suspected contact the vendor technical support and seek such services for a more thorough inspection of the current running system
t1601
modify system image
null
most embedded network devices provide a command to print the version of the currently running operating system
t1601
modify system image
null
on such devices the operating systems are typically monolithic and most of the device functionality and capabilities are contained within a single file
t1601
modify system image
null
some embedded network device platforms may have the capability to calculate the checksum of the file while others may not
t1601
modify system image
null
use this command to query the operating system for its version number and compare it to what is expected for the device in question
t1602
data from configuration repository
null
adversaries may collect data related to managed devices from configuration repositories
t1602
data from configuration repository
null
citation cisco advisory snmp v3 authentication vulnerabilities
t1602
data from configuration repository
null
configuration repositories are used by management systems in order to configure manage and control data on remote systems
t1602
data from configuration repository
null
identify network traffic sent or received by untrusted hosts or networks that solicits and obtains the configuration information of the queried device
t1602
data from configuration repository
null
network traffic network connection creation network traffic network traffic content
t1606
forge web credentials
null
adversaries may forge credential materials that can be used to gain access to web applications or internet services
t1606
forge web credentials
null
logon session logon session creation web credential web credential creation web credential web credential usage
t1606
forge web credentials
null
monitor for anomalous authentication activity such as logons or other user session activity associated with unknown accounts
t1606
forge web credentials
null
monitor for unexpected and abnormal access to resources including access of websites and cloud based applications by the same user in different locations or by different systems that do not match expected configurations
t1606
forge web credentials
null
web applications and services hosted in cloud saas environments or on premise servers often use session cookies tokens or other materials to authenticate and authorize user access
t1608
stage capabilities
null
adversaries may upload install or otherwise set up capabilities that can be used during targeting
t1608
stage capabilities
null
detection efforts may be focused on related stages of the adversary lifecycle such as initial access and post compromise behaviors
t1608
stage capabilities
null
if infrastructure or patterns in malware tooling certificates or malicious web content have been previously identified internet scanning may uncover when an adversary has staged their capabilities
t1608
stage capabilities
null
internet scan response content
t1608
stage capabilities
null
much of this activity will take place outside the visibility of the target organization making detection of this behavior difficult
t1608
stage capabilities
null
to support their operations an adversary may need to take capabilities they developed develop capabilitiest1587 or obtained obtain capabilitiest1588 and stage them on infrastructure under their control
t1608.001
stage capabilities
uploadTechniquemalware
apt32 has hosted malicious payloads in dropbox amazon s3 and google drive for use during targeting.
t1608.001
stage capabilities
uploadTechniquemalware
they were posting obfuscated malicious payloads on pastebin to be used later during the attack.
t1608.001
stage capabilities
uploadTechniquemalware
some of the compromised websites were used to stage post-compromise malware such as keyloggers.
t1608.001
stage capabilities
uploadTechniquemalware
these government hackers staged malicious java scripts on the microsoft typosquatting domains they registered earlier.
t1608.001
stage capabilities
uploadTechniquemalware
gamaredon stage malicious vba scripts on various compromised websites.
t1608.002
stage capabilities
uploadTechniquetool
threat group-3390 has staged tools including gsecdump and wce on previously compromised websites.
t1608.002
stage capabilities
uploadTechniquetool
prior to the attack, the adversaries uploaded remote administration tools to compromised websites they controlled.
t1608.002
stage capabilities
uploadTechniquetool
threat actor placed several double-purpose tools on his github repository.
t1608.002
stage capabilities
uploadTechniquetool
the attackers uploaded remote utilities rat tool to a third-party compromised website to be used if the victim environment wont have a remote administration tool installed.
t1608.002
stage capabilities
uploadTechniquetool
fin5 staged a customized version of psexec.
t1608.003
stage capabilities
installTechniquedigitalTechniquecertificate
adversaries created self-signed certificates and installed them on their web servers.
t1608.003
stage capabilities
installTechniquedigitalTechniquecertificate
attackers installed lets encrypt certificates on their phishing servers to gain additional trust from the visitors.
t1608.003
stage capabilities
installTechniquedigitalTechniquecertificate
they prepare phishing pages with valid ssl tls certificates installed.
t1608.003
stage capabilities
installTechniquedigitalTechniquecertificate
according to phishlabs, in the last quarter of 2019, 74 of reported phishing websites were 'secure,' being both https and with the lock symbol, meaning cybercriminals installed ssl certificates and circumvented so-called verification processes.
t1608.003
stage capabilities
installTechniquedigitalTechniquecertificate
actors installed ssl certificates they made using openssl where you can even be your own certificate authority.