value
stringlengths
25
18k
subtecnique
int64
0
1
answer
stringclasses
2 values
id
stringlengths
5
9
name
stringlengths
3
102
Anonymous OpIsrael campaign published a Pastebin post listing IP addresses of organizations that hacktivists plan to target.
1
accept
T1590.005
Gather Victim Network Information: Ip Addresses
Actor obtains list of the victim IP blocks and proceeds to run a Shodan or Zoomeye scan of the ranges.
1
accept
T1590.005
Gather Victim Network Information: Ip Addresses
Keyword search on Hurricane Electric allows attackers to find IP addresses of a certain company they want to target.
1
accept
T1590.005
Gather Victim Network Information: Ip Addresses
Sandworm Team conducted technical reconnaissance of the Parliament of Georgia's official internet domain prior to its 2019 attack.
1
accept
T1590.001
Gather Victim Network Information: Domain Properties
There is an active campaign targeting domain owners via email addresses that were derived by actors in the domain registration data.
1
accept
T1590.001
Gather Victim Network Information: Domain Properties
Attackers were able to leverage domain registration data to find additional domains belonging to the same victim organization.
1
accept
T1590.001
Gather Victim Network Information: Domain Properties
Domain administrator was targeted with a tailored spear phishing after the attackers determined the domain registrar and impersonated it.
1
accept
T1590.001
Gather Victim Network Information: Domain Properties
Many victims avoided using domain registration anonymization services and their domain properties were leveraged by the hackers.
1
accept
T1590.001
Gather Victim Network Information: Domain Properties
This DDoS service offered TDoS and email bombing to target domain administrator contacts if those were available from the gathered domain properties.
1
accept
T1590.001
Gather Victim Network Information: Domain Properties
During the reconnaissance phase, this group paid special attention to collect and analyze DNS information.
1
accept
T1590.002
Gather Victim Network Information: Dns
Gathering DNS information allowed the attackers to identify victim’s subdomains that were supposed to remain private.
1
accept
T1590.002
Gather Victim Network Information: Dns
Targeting of mail servers were starting by gathering mail server records from the victim’s DNS.
1
accept
T1590.002
Gather Victim Network Information: Dns
Some of the information on targets were gathered free of charge such as from DNS records.
1
accept
T1590.002
Gather Victim Network Information: Dns
Passive DNS information helped the attackers to map the victim’s hosts and plan the intrusion.
1
accept
T1590.002
Gather Victim Network Information: Dns
Sandworm Team's research of potential victim organizations included the identification and collection of employee information.
1
accept
T1589.003
Gather Victim Identity Information: Employee Names
Silent Librarian has collected lists of names for individuals from targeted organizations.
1
accept
T1589.003
Gather Victim Identity Information: Employee Names
Collecting victim organization’s employee list allowed the attacker to generate actual email addresses due to conservative alias naming convention.
1
accept
T1589.003
Gather Victim Identity Information: Employee Names
Social media such as LinkedIn and Facebook allow threat actors to identify employee names for the organizations they plan to target.
1
accept
T1589.003
Gather Victim Identity Information: Employee Names
This threat group collects employee names from the organization’s website and use them for impersonation in spear phishing attacks.
1
accept
T1589.003
Gather Victim Identity Information: Employee Names
APT32 has collected e-mail addresses for activists and bloggers in order to target them with spyware.
1
accept
T1589.002
Gather Victim Identity Information: Email Addresses
HAFNIUM has collected e-mail addresses for users they intended to target.
1
accept
T1589.002
Gather Victim Identity Information: Email Addresses
MuddyWater has specifically targeted government agency employees with spearphishing e-mails.
1
accept
T1589.002
Gather Victim Identity Information: Email Addresses
Sandworm Team has obtained valid emails addresses while conducting research against target organizations that were subsequently used in spearphishing campaigns.
1
accept
T1589.002
Gather Victim Identity Information: Email Addresses
Silent Librarian has collected e-mail addresses from targeted organizations from open Internet searches.
1
accept
T1589.002
Gather Victim Identity Information: Email Addresses
TA551 has used spoofed company emails that were acquired from email clients on previously infected hosts to target other individuals.
1
accept
T1589.002
Gather Victim Identity Information: Email Addresses
Silent Librarian has collected e-mail addresses from targeted organizations from open Internet searches. ;; TA551 has used spoofed company emails that were acquired from email clients on previously infected hosts to target other individuals.
1
accept
T1589.002
Gather Victim Identity Information: Email Addresses
APT28 has harvested user's login credentials.
1
accept
T1589.001
Gather Victim Identity Information: Credentials
Chimera has collected credentials for the target organization from previous breaches for use in brute force attacks.
1
accept
T1589.001
Gather Victim Identity Information: Credentials
Magic Hound gathered credentials from two victims that they then attempted to validate across 75 different websites.
1
accept
T1589.001
Gather Victim Identity Information: Credentials
Strontium is launching campaigns to harvest people’s log-in credentials or compromise their accounts, presumably to aid in intelligence gathering or disruption operations.
1
accept
T1589.001
Gather Victim Identity Information: Credentials
Attackers appear to have purchased credential and other information from an underground forum for use in this attack.
1
accept
T1589.001
Gather Victim Identity Information: Credentials
Sandworm Team has researched software code to enable supply-chain operations most notably for the 2017 NotPetya attack. Sandworm Team also collected a list of computers using specific software as part of its targeting efforts.
1
accept
T1592.002
Gather Victim Host Information: Software
Public procurement data such as purchase invoices for software allowed attackers to plan their exploitation for the initial access.
1
accept
T1592.002
Gather Victim Host Information: Software
Andariel has inserted a malicious script within compromised websites to collect potential victim information such as browser type, system language, Flash Player version, and other data.
1
accept
T1592.002
Gather Victim Host Information: Software
Some threat groups use supply chain compromise as an opportunistic attack on whomever is a client, others – specifically research software suppliers for a given target.
1
accept
T1592.002
Gather Victim Host Information: Software
Gathering information from server banners allows attackers to use known vulnerabilities for certain kinds of server software.
1
accept
T1592.002
Gather Victim Host Information: Software
Actors targeting poor countries pay attention to learn victim’s hardware, as it is often so old that doesn’t support newer more secure operation systems.
1
accept
T1592.001
Gather Victim Host Information: Hardware
Another door in for initial access are IoT devices, and hackers are trying to learn the used hardware versions, as it is often produced to never be fully updated or secured.
1
accept
T1592.001
Gather Victim Host Information: Hardware
This group was using job postings, resumes, and public purchase invoices to determine the hardware used by the victim organization.
1
accept
T1592.001
Gather Victim Host Information: Hardware
After the attacker gathered information about the hardware used in the organization, they proceeded to register typosquatted domains mimicking these hardware manufactures.
1
accept
T1592.001
Gather Victim Host Information: Hardware
This Russian APT gathered information on the specific type of industrial controllers used by some Ukrainian power transmission stations.
1
accept
T1592.001
Gather Victim Host Information: Hardware
Intruders impersonated the CEO and demanded information on the age and patch level of the network appliances.
1
accept
T1592.003
Gather Victim Host Information: Firmware
While the problem with the firmware update level was outlined in the previous assessment report, the company failed to act on it, moreover the very assessment ended up in the hands of the threat actors.
1
accept
T1592.003
Gather Victim Host Information: Firmware
Slow implementation of the firmware patch for this vulnerability became apparent to the attackers who started directing their botnets to target it.
1
accept
T1592.003
Gather Victim Host Information: Firmware
Attackers did research on the backdoor in the standard router firmware in that country.
1
accept
T1592.003
Gather Victim Host Information: Firmware
This botnet handers gather information on the dominating types of IoT firmware with known vulnerabilities.
1
accept
T1592.003
Gather Victim Host Information: Firmware
HAFNIUM has interacted with Office 365 tenants to gather details regarding target's environments.
1
accept
T1592.004
Gather Victim Host Information: Client Configurations
Attackers’ website was checking visitors’ host information and serving the malicious content only to those with certain language settings.
1
accept
T1592.004
Gather Victim Host Information: Client Configurations
This group was studying organization’s purchase invoices to learn what operating systems are in use, their versions and architecture.
1
accept
T1592.004
Gather Victim Host Information: Client Configurations
The Scanbox framework first configures the remote C&C server that it will use and collects a small amount of information about the victim that is visiting the compromised website including: Referer User-Agent Location Cookie Title (To identify specific content that the victim is visiting) Domain Charset Screen width and height Operating System Language
1
accept
T1592.004
Gather Victim Host Information: Client Configurations
The attackers were able to compromise the website and include code that loaded a malicious Javascript file from a remote server that records visitors’ User-Agent, Location, Charset, Operating System, and Language.
1
accept
T1592.004
Gather Victim Host Information: Client Configurations
Hackers were checking client configuration virtualization status and generally were trying to avoid targeting virtual machines.
1
accept
T1592.004
Gather Victim Host Information: Client Configurations
APT28 has performed large-scale scans in an attempt to find vulnerable servers.
1
accept
T1595.002
Active Scanning: Vulnerability Scanning
Sandworm Team has scanned network infrastructure for vulnerabilities as part of its operational planning.
1
accept
T1595.002
Active Scanning: Vulnerability Scanning
Volatile Cedar has performed vulnerability scans of the target server.
1
accept
T1595.002
Active Scanning: Vulnerability Scanning
First, this threat group would engage in vulnerability reconnaissance via application-specific vulnerability discovery and identifying vulnerable content management systems (CMS) and CMS components.
1
accept
T1595.002
Active Scanning: Vulnerability Scanning
Adversaries scan victims for vulnerabilities that can be used during targeting.
1
accept
T1595.002
Active Scanning: Vulnerability Scanning
These scans may also include more broad attempts to Gather Victim Host Information that can be used to identify more commonly known, exploitable vulnerabilities.
1
accept
T1595.002
Active Scanning: Vulnerability Scanning
Vulnerability scans typically harvest running software and version numbers via server banners, listening ports, or other network artifacts.
1
accept
T1595.002
Active Scanning: Vulnerability Scanning
Vulnerability scans typically check if the configuration of a target host/application (ex: software and version) potentially aligns with the target of a specific exploit the adversary may seek to use.
1
accept
T1595.002
Active Scanning: Vulnerability Scanning
The adversaries were scanning victim IP blocks to gather information that can be used during targeting.
1
accept
T1595.001
Active Scanning: Scanning Ip Blocks
After finding victim’s ASNs, attackers continued by scanning these net ranges to detect active IP addresses and open ports.
1
accept
T1595.001
Active Scanning: Scanning Ip Blocks
One member of Anonymous was sharing victim’s IP addresses, another – was scanning them to reveal host software versions.
1
accept
T1595.001
Active Scanning: Scanning Ip Blocks
This attacker was scanning company’s IP space for any artifact he could find.
1
accept
T1595.001
Active Scanning: Scanning Ip Blocks
First, the attacker was using simple pings (ICMP requests and responses) to detect which target’s IP addresses are actively in use.
1
accept
T1595.001
Active Scanning: Scanning Ip Blocks
In 2017 Sandworm Team conducted technical research related to vulnerabilities associated with websites used by the Korean Sport and Olympic Committee a Korean power company and a Korean airport.
1
accept
T1588.006
Obtain Capabilities: Vulnerabilities
Multiple threat actors obtained Log4Shell vulnerability simply by studying the public vulnerability disclosures from Apache, watching POC presentations, and analyzing reports of the zero-day exploitation.
1
accept
T1588.006
Obtain Capabilities: Vulnerabilities
Israeli spyware companies were purchasing vulnerabilities from undisclosed researchers, often using specialized vulnerability brokers.
1
accept
T1588.006
Obtain Capabilities: Vulnerabilities
Soon after the patch was released, the attackers were able to reverse-engineer the changes, understand the fix, and weaponize the vulnerability that patch was addressing.
1
accept
T1588.006
Obtain Capabilities: Vulnerabilities
The botnet handlers were monitoring new vulnerability disclosures to add new vulnerabilities to their list.
1
accept
T1588.006
Obtain Capabilities: Vulnerabilities
GALLIUM has used a variety of widely-available tools which in some cases they modified to add functionality and/or subvert antimalware solutions.
1
accept
T1588.002
Obtain Capabilities: Tool
MuddyWater has made use of legitimate tools ConnectWise and RemoteUtilities for access to target environments.
1
accept
T1588.002
Obtain Capabilities: Tool
Sandworm Team has acquired open-source tools for some of it's operations; for example it acquired Invoke-PSImage to establish an encrypted channel from a compromised host to Sandworm Team's C2 server as part of its preparation for the 2018 Winter Olympics attack.
1
accept
T1588.002
Obtain Capabilities: Tool
Silent Librarian has obtained free and publicly available tools including SingleFile and HTTrack to copy login pages of targeted organizations.
1
accept
T1588.002
Obtain Capabilities: Tool
Cozy Bear stole Cobalt Strike Beacon code and modified the tool to their liking.
1
accept
T1588.002
Obtain Capabilities: Tool
APT1 used publicly available malware for privilege escalation.
1
accept
T1588.001
Obtain Capabilities: Malware
Turla has used malware obtained after compromising other threat actors such as OilRig.
1
accept
T1588.001
Obtain Capabilities: Malware
Ransomware-as-a-Service (RaaS) model allowed even unskilled hackers to obtain this malware and use it for a relatively small affiliate fee.
1
accept
T1588.001
Obtain Capabilities: Malware
New IoT botnet actors obtained leaked Mirai botnet code and slightly modified it.
1
accept
T1588.001
Obtain Capabilities: Malware
Citadel Trojan developers Vartanyan and Belorossov initially obtained Zeus Trojan code that they planned to use as a base for their own Trojan.
1
accept
T1588.001
Obtain Capabilities: Malware
DarkHotel APT group is known for stealing exploits from Hacking Team and use them for attacks on corporate executives staying in luxury hotels.
1
accept
T1588.005
Obtain Capabilities: Exploits
Uzbek intelligence officers bought exploits from German subsidiary of the Gamma Group that specializes in surveillance.
1
accept
T1588.005
Obtain Capabilities: Exploits
The attackers leveraged RIG exploit kit that they purchased on a criminal marketplace.
1
accept
T1588.005
Obtain Capabilities: Exploits
UAE purchased NSO Group’s iPhone zero-day exploits.
1
accept
T1588.005
Obtain Capabilities: Exploits
These hacktivists were relying on exploits that they found online on various cybersecurity and hacker forums.
1
accept
T1588.005
Obtain Capabilities: Exploits
KGH_SPY can collect credentials from the Windows Credential Manager.
1
accept
T1555.004
Credentials from Password Stores: Windows Credential Manager
LaZagne can obtain credentials from Vault files.
1
accept
T1555.004
Credentials from Password Stores: Windows Credential Manager
Mimikatz contains functionality to acquire credentials from the Windows Credential Manager.
1
accept
T1555.004
Credentials from Password Stores: Windows Credential Manager
OilRig has used credential dumping tool named VALUEVAULT to steal credentials from the Windows Credential Manager.
1
accept
T1555.004
Credentials from Password Stores: Windows Credential Manager
PowerSploit contains a collection of Exfiltration modules that can harvest credentials from Windows vault credential objects.
1
accept
T1555.004
Credentials from Password Stores: Windows Credential Manager
ROKRAT steals credentials by leveraging the Windows Vault mechanism.
1
accept
T1555.004
Credentials from Password Stores: Windows Credential Manager
Stealth Falcon malware gathers passwords from the Windows Credential Vault.
1
accept
T1555.004
Credentials from Password Stores: Windows Credential Manager
Turla has gathered credentials from the Windows Credential Manager tool. ;; Valak can use a .NET compiled module named exchgrabber to enumerate credentials from the Credential Manager.
1
accept
T1555.004
Credentials from Password Stores: Windows Credential Manager
Empire has a dylib hijacker module that generates a malicious dylib given the path to a legitimate dylib of a vulnerable application.
1
accept
T1574.004
Hijack Execution Flow: Dylib Hijacking
Abusing Dynamic Loader/Linker (dyld) logic allowed attackers to perform dylib hijacking.
1
accept
T1574.004
Hijack Execution Flow: Dylib Hijacking
Attackers ran Dylib Hijack Scanner tool and attacked identified vulnerable apps.
1
accept
T1574.004
Hijack Execution Flow: Dylib Hijacking
Developers should replace weak linking with version check to mitigate dylib hijacking attacks from these threat actors.
1
accept
T1574.004
Hijack Execution Flow: Dylib Hijacking
After the initial access to the Apple device, attackers were escalating their privileges by placing malicious dylib files with expected names to hijack the normal execution flow.
1
accept
T1574.004
Hijack Execution Flow: Dylib Hijacking
HiddenWasp installs reboot persistence by adding itself to /etc/rc.local.
1
accept
T1037.004
Boot or Logon Initialization Scripts: Rc Scripts
iKitten adds an entry to the rc.common file for persistence.
1
accept
T1037.004
Boot or Logon Initialization Scripts: Rc Scripts