value
stringlengths 25
18k
⌀ | subtecnique
int64 0
1
| answer
stringclasses 2
values | id
stringlengths 5
9
| name
stringlengths 3
102
|
---|---|---|---|---|
Anonymous OpIsrael campaign published a Pastebin post listing IP addresses of organizations that hacktivists plan to target.
| 1 | accept | T1590.005 | Gather Victim Network Information: Ip Addresses |
Actor obtains list of the victim IP blocks and proceeds to run a Shodan or Zoomeye scan of the ranges.
| 1 | accept | T1590.005 | Gather Victim Network Information: Ip Addresses |
Keyword search on Hurricane Electric allows attackers to find IP addresses of a certain company they want to target. | 1 | accept | T1590.005 | Gather Victim Network Information: Ip Addresses |
Sandworm Team conducted technical reconnaissance of the Parliament of Georgia's official internet domain prior to its 2019 attack. | 1 | accept | T1590.001 | Gather Victim Network Information: Domain Properties |
There is an active campaign targeting domain owners via email addresses that were derived by actors in the domain registration data.
| 1 | accept | T1590.001 | Gather Victim Network Information: Domain Properties |
Attackers were able to leverage domain registration data to find additional domains belonging to the same victim organization.
| 1 | accept | T1590.001 | Gather Victim Network Information: Domain Properties |
Domain administrator was targeted with a tailored spear phishing after the attackers determined the domain registrar and impersonated it.
| 1 | accept | T1590.001 | Gather Victim Network Information: Domain Properties |
Many victims avoided using domain registration anonymization services and their domain properties were leveraged by the hackers.
| 1 | accept | T1590.001 | Gather Victim Network Information: Domain Properties |
This DDoS service offered TDoS and email bombing to target domain administrator contacts if those were available from the gathered domain properties. | 1 | accept | T1590.001 | Gather Victim Network Information: Domain Properties |
During the reconnaissance phase, this group paid special attention to collect and analyze DNS information.
| 1 | accept | T1590.002 | Gather Victim Network Information: Dns |
Gathering DNS information allowed the attackers to identify victim’s subdomains that were supposed to remain private.
| 1 | accept | T1590.002 | Gather Victim Network Information: Dns |
Targeting of mail servers were starting by gathering mail server records from the victim’s DNS.
| 1 | accept | T1590.002 | Gather Victim Network Information: Dns |
Some of the information on targets were gathered free of charge such as from DNS records.
| 1 | accept | T1590.002 | Gather Victim Network Information: Dns |
Passive DNS information helped the attackers to map the victim’s hosts and plan the intrusion. | 1 | accept | T1590.002 | Gather Victim Network Information: Dns |
Sandworm Team's research of potential victim organizations included the identification and collection of employee information. | 1 | accept | T1589.003 | Gather Victim Identity Information: Employee Names |
Silent Librarian has collected lists of names for individuals from targeted organizations. | 1 | accept | T1589.003 | Gather Victim Identity Information: Employee Names |
Collecting victim organization’s employee list allowed the attacker to generate actual email addresses due to conservative alias naming convention.
| 1 | accept | T1589.003 | Gather Victim Identity Information: Employee Names |
Social media such as LinkedIn and Facebook allow threat actors to identify employee names for the organizations they plan to target.
| 1 | accept | T1589.003 | Gather Victim Identity Information: Employee Names |
This threat group collects employee names from the organization’s website and use them for impersonation in spear phishing attacks. | 1 | accept | T1589.003 | Gather Victim Identity Information: Employee Names |
APT32 has collected e-mail addresses for activists and bloggers in order to target them with spyware. | 1 | accept | T1589.002 | Gather Victim Identity Information: Email Addresses |
HAFNIUM has collected e-mail addresses for users they intended to target. | 1 | accept | T1589.002 | Gather Victim Identity Information: Email Addresses |
MuddyWater has specifically targeted government agency employees with spearphishing e-mails. | 1 | accept | T1589.002 | Gather Victim Identity Information: Email Addresses |
Sandworm Team has obtained valid emails addresses while conducting research against target organizations that were subsequently used in spearphishing campaigns. | 1 | accept | T1589.002 | Gather Victim Identity Information: Email Addresses |
Silent Librarian has collected e-mail addresses from targeted organizations from open Internet searches. | 1 | accept | T1589.002 | Gather Victim Identity Information: Email Addresses |
TA551 has used spoofed company emails that were acquired from email clients on previously infected hosts to target other individuals. | 1 | accept | T1589.002 | Gather Victim Identity Information: Email Addresses |
Silent Librarian has collected e-mail addresses from targeted organizations from open Internet searches. ;; TA551 has used spoofed company emails that were acquired from email clients on previously infected hosts to target other individuals. | 1 | accept | T1589.002 | Gather Victim Identity Information: Email Addresses |
APT28 has harvested user's login credentials. | 1 | accept | T1589.001 | Gather Victim Identity Information: Credentials |
Chimera has collected credentials for the target organization from previous breaches for use in brute force attacks. | 1 | accept | T1589.001 | Gather Victim Identity Information: Credentials |
Magic Hound gathered credentials from two victims that they then attempted to validate across 75 different websites. | 1 | accept | T1589.001 | Gather Victim Identity Information: Credentials |
Strontium is launching campaigns to harvest people’s log-in credentials or compromise their accounts, presumably to aid in intelligence gathering or disruption operations. | 1 | accept | T1589.001 | Gather Victim Identity Information: Credentials |
Attackers appear to have purchased credential and other information from an underground forum for use in this attack. | 1 | accept | T1589.001 | Gather Victim Identity Information: Credentials |
Sandworm Team has researched software code to enable supply-chain operations most notably for the 2017 NotPetya attack. Sandworm Team also collected a list of computers using specific software as part of its targeting efforts. | 1 | accept | T1592.002 | Gather Victim Host Information: Software |
Public procurement data such as purchase invoices for software allowed attackers to plan their exploitation for the initial access.
| 1 | accept | T1592.002 | Gather Victim Host Information: Software |
Andariel has inserted a malicious script within compromised websites to collect potential victim information such as browser type, system language, Flash Player version, and other data.
| 1 | accept | T1592.002 | Gather Victim Host Information: Software |
Some threat groups use supply chain compromise as an opportunistic attack on whomever is a client, others – specifically research software suppliers for a given target.
| 1 | accept | T1592.002 | Gather Victim Host Information: Software |
Gathering information from server banners allows attackers to use known vulnerabilities for certain kinds of server software. | 1 | accept | T1592.002 | Gather Victim Host Information: Software |
Actors targeting poor countries pay attention to learn victim’s hardware, as it is often so old that doesn’t support newer more secure operation systems.
| 1 | accept | T1592.001 | Gather Victim Host Information: Hardware |
Another door in for initial access are IoT devices, and hackers are trying to learn the used hardware versions, as it is often produced to never be fully updated or secured.
| 1 | accept | T1592.001 | Gather Victim Host Information: Hardware |
This group was using job postings, resumes, and public purchase invoices to determine the hardware used by the victim organization.
| 1 | accept | T1592.001 | Gather Victim Host Information: Hardware |
After the attacker gathered information about the hardware used in the organization, they proceeded to register typosquatted domains mimicking these hardware manufactures.
| 1 | accept | T1592.001 | Gather Victim Host Information: Hardware |
This Russian APT gathered information on the specific type of industrial controllers used by some Ukrainian power transmission stations. | 1 | accept | T1592.001 | Gather Victim Host Information: Hardware |
Intruders impersonated the CEO and demanded information on the age and patch level of the network appliances.
| 1 | accept | T1592.003 | Gather Victim Host Information: Firmware |
While the problem with the firmware update level was outlined in the previous assessment report, the company failed to act on it, moreover the very assessment ended up in the hands of the threat actors.
| 1 | accept | T1592.003 | Gather Victim Host Information: Firmware |
Slow implementation of the firmware patch for this vulnerability became apparent to the attackers who started directing their botnets to target it.
| 1 | accept | T1592.003 | Gather Victim Host Information: Firmware |
Attackers did research on the backdoor in the standard router firmware in that country.
| 1 | accept | T1592.003 | Gather Victim Host Information: Firmware |
This botnet handers gather information on the dominating types of IoT firmware with known vulnerabilities. | 1 | accept | T1592.003 | Gather Victim Host Information: Firmware |
HAFNIUM has interacted with Office 365 tenants to gather details regarding target's environments. | 1 | accept | T1592.004 | Gather Victim Host Information: Client Configurations |
Attackers’ website was checking visitors’ host information and serving the malicious content only to those with certain language settings.
| 1 | accept | T1592.004 | Gather Victim Host Information: Client Configurations |
This group was studying organization’s purchase invoices to learn what operating systems are in use, their versions and architecture.
| 1 | accept | T1592.004 | Gather Victim Host Information: Client Configurations |
The Scanbox framework first configures the remote C&C server that it will use and collects a small amount of information about the victim that is visiting the compromised website including:
Referer
User-Agent
Location
Cookie
Title (To identify specific content that the victim is visiting)
Domain
Charset
Screen width and height
Operating System
Language
| 1 | accept | T1592.004 | Gather Victim Host Information: Client Configurations |
The attackers were able to compromise the website and include code that loaded a malicious Javascript file from a remote server that records visitors’ User-Agent, Location, Charset, Operating System, and Language.
| 1 | accept | T1592.004 | Gather Victim Host Information: Client Configurations |
Hackers were checking client configuration virtualization status and generally were trying to avoid targeting virtual machines. | 1 | accept | T1592.004 | Gather Victim Host Information: Client Configurations |
APT28 has performed large-scale scans in an attempt to find vulnerable servers. | 1 | accept | T1595.002 | Active Scanning: Vulnerability Scanning |
Sandworm Team has scanned network infrastructure for vulnerabilities as part of its operational planning. | 1 | accept | T1595.002 | Active Scanning: Vulnerability Scanning |
Volatile Cedar has performed vulnerability scans of the target server. | 1 | accept | T1595.002 | Active Scanning: Vulnerability Scanning |
First, this threat group would engage in vulnerability reconnaissance via application-specific vulnerability discovery and identifying vulnerable content management systems (CMS) and CMS components.
| 1 | accept | T1595.002 | Active Scanning: Vulnerability Scanning |
Adversaries scan victims for vulnerabilities that can be used during targeting.
| 1 | accept | T1595.002 | Active Scanning: Vulnerability Scanning |
These scans may also include more broad attempts to Gather Victim Host Information that can be used to identify more commonly known, exploitable vulnerabilities.
| 1 | accept | T1595.002 | Active Scanning: Vulnerability Scanning |
Vulnerability scans typically harvest running software and version numbers via server banners, listening ports, or other network artifacts.
| 1 | accept | T1595.002 | Active Scanning: Vulnerability Scanning |
Vulnerability scans typically check if the configuration of a target host/application (ex: software and version) potentially aligns with the target of a specific exploit the adversary may seek to use. | 1 | accept | T1595.002 | Active Scanning: Vulnerability Scanning |
The adversaries were scanning victim IP blocks to gather information that can be used during targeting.
| 1 | accept | T1595.001 | Active Scanning: Scanning Ip Blocks |
After finding victim’s ASNs, attackers continued by scanning these net ranges to detect active IP addresses and open ports.
| 1 | accept | T1595.001 | Active Scanning: Scanning Ip Blocks |
One member of Anonymous was sharing victim’s IP addresses, another – was scanning them to reveal host software versions.
| 1 | accept | T1595.001 | Active Scanning: Scanning Ip Blocks |
This attacker was scanning company’s IP space for any artifact he could find.
| 1 | accept | T1595.001 | Active Scanning: Scanning Ip Blocks |
First, the attacker was using simple pings (ICMP requests and responses) to detect which target’s IP addresses are actively in use. | 1 | accept | T1595.001 | Active Scanning: Scanning Ip Blocks |
In 2017 Sandworm Team conducted technical research related to vulnerabilities associated with websites used by the Korean Sport and Olympic Committee a Korean power company and a Korean airport. | 1 | accept | T1588.006 | Obtain Capabilities: Vulnerabilities |
Multiple threat actors obtained Log4Shell vulnerability simply by studying the public vulnerability disclosures from Apache, watching POC presentations, and analyzing reports of the zero-day exploitation.
| 1 | accept | T1588.006 | Obtain Capabilities: Vulnerabilities |
Israeli spyware companies were purchasing vulnerabilities from undisclosed researchers, often using specialized vulnerability brokers.
| 1 | accept | T1588.006 | Obtain Capabilities: Vulnerabilities |
Soon after the patch was released, the attackers were able to reverse-engineer the changes, understand the fix, and weaponize the vulnerability that patch was addressing.
| 1 | accept | T1588.006 | Obtain Capabilities: Vulnerabilities |
The botnet handlers were monitoring new vulnerability disclosures to add new vulnerabilities to their list. | 1 | accept | T1588.006 | Obtain Capabilities: Vulnerabilities |
GALLIUM has used a variety of widely-available tools which in some cases they modified to add functionality and/or subvert antimalware solutions. | 1 | accept | T1588.002 | Obtain Capabilities: Tool |
MuddyWater has made use of legitimate tools ConnectWise and RemoteUtilities for access to target environments. | 1 | accept | T1588.002 | Obtain Capabilities: Tool |
Sandworm Team has acquired open-source tools for some of it's operations; for example it acquired Invoke-PSImage to establish an encrypted channel from a compromised host to Sandworm Team's C2 server as part of its preparation for the 2018 Winter Olympics attack. | 1 | accept | T1588.002 | Obtain Capabilities: Tool |
Silent Librarian has obtained free and publicly available tools including SingleFile and HTTrack to copy login pages of targeted organizations. | 1 | accept | T1588.002 | Obtain Capabilities: Tool |
Cozy Bear stole Cobalt Strike Beacon code and modified the tool to their liking. | 1 | accept | T1588.002 | Obtain Capabilities: Tool |
APT1 used publicly available malware for privilege escalation. | 1 | accept | T1588.001 | Obtain Capabilities: Malware |
Turla has used malware obtained after compromising other threat actors such as OilRig. | 1 | accept | T1588.001 | Obtain Capabilities: Malware |
Ransomware-as-a-Service (RaaS) model allowed even unskilled hackers to obtain this malware and use it for a relatively small affiliate fee.
| 1 | accept | T1588.001 | Obtain Capabilities: Malware |
New IoT botnet actors obtained leaked Mirai botnet code and slightly modified it.
| 1 | accept | T1588.001 | Obtain Capabilities: Malware |
Citadel Trojan developers Vartanyan and Belorossov initially obtained Zeus Trojan code that they planned to use as a base for their own Trojan. | 1 | accept | T1588.001 | Obtain Capabilities: Malware |
DarkHotel APT group is known for stealing exploits from Hacking Team and use them for attacks on corporate executives staying in luxury hotels.
| 1 | accept | T1588.005 | Obtain Capabilities: Exploits |
Uzbek intelligence officers bought exploits from German subsidiary of the Gamma Group that specializes in surveillance.
| 1 | accept | T1588.005 | Obtain Capabilities: Exploits |
The attackers leveraged RIG exploit kit that they purchased on a criminal marketplace.
| 1 | accept | T1588.005 | Obtain Capabilities: Exploits |
UAE purchased NSO Group’s iPhone zero-day exploits.
| 1 | accept | T1588.005 | Obtain Capabilities: Exploits |
These hacktivists were relying on exploits that they found online on various cybersecurity and hacker forums. | 1 | accept | T1588.005 | Obtain Capabilities: Exploits |
KGH_SPY can collect credentials from the Windows Credential Manager. | 1 | accept | T1555.004 | Credentials from Password Stores: Windows Credential Manager |
LaZagne can obtain credentials from Vault files. | 1 | accept | T1555.004 | Credentials from Password Stores: Windows Credential Manager |
Mimikatz contains functionality to acquire credentials from the Windows Credential Manager. | 1 | accept | T1555.004 | Credentials from Password Stores: Windows Credential Manager |
OilRig has used credential dumping tool named VALUEVAULT to steal credentials from the Windows Credential Manager. | 1 | accept | T1555.004 | Credentials from Password Stores: Windows Credential Manager |
PowerSploit contains a collection of Exfiltration modules that can harvest credentials from Windows vault credential objects. | 1 | accept | T1555.004 | Credentials from Password Stores: Windows Credential Manager |
ROKRAT steals credentials by leveraging the Windows Vault mechanism. | 1 | accept | T1555.004 | Credentials from Password Stores: Windows Credential Manager |
Stealth Falcon malware gathers passwords from the Windows Credential Vault. | 1 | accept | T1555.004 | Credentials from Password Stores: Windows Credential Manager |
Turla has gathered credentials from the Windows Credential Manager tool. ;; Valak can use a .NET compiled module named exchgrabber to enumerate credentials from the Credential Manager. | 1 | accept | T1555.004 | Credentials from Password Stores: Windows Credential Manager |
Empire has a dylib hijacker module that generates a malicious dylib given the path to a legitimate dylib of a vulnerable application. | 1 | accept | T1574.004 | Hijack Execution Flow: Dylib Hijacking |
Abusing Dynamic Loader/Linker (dyld) logic allowed attackers to perform dylib hijacking.
| 1 | accept | T1574.004 | Hijack Execution Flow: Dylib Hijacking |
Attackers ran Dylib Hijack Scanner tool and attacked identified vulnerable apps.
| 1 | accept | T1574.004 | Hijack Execution Flow: Dylib Hijacking |
Developers should replace weak linking with version check to mitigate dylib hijacking attacks from these threat actors.
| 1 | accept | T1574.004 | Hijack Execution Flow: Dylib Hijacking |
After the initial access to the Apple device, attackers were escalating their privileges by placing malicious dylib files with expected names to hijack the normal execution flow. | 1 | accept | T1574.004 | Hijack Execution Flow: Dylib Hijacking |
HiddenWasp installs reboot persistence by adding itself to /etc/rc.local. | 1 | accept | T1037.004 | Boot or Logon Initialization Scripts: Rc Scripts |
iKitten adds an entry to the rc.common file for persistence. | 1 | accept | T1037.004 | Boot or Logon Initialization Scripts: Rc Scripts |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.