value
stringlengths
25
18k
subtecnique
int64
0
1
answer
stringclasses
2 values
id
stringlengths
5
9
name
stringlengths
3
102
Attackers will use spearphishing messages to elicit sensative information from targets.
1
accept
T1598.001
Phishing for Information: Spearphishing Service
Spearphishing uses social engineering techniques to get credentials or other information.
1
accept
T1598.001
Phishing for Information: Spearphishing Service
Emails or social media messaging spearphishing is generally aimed at IT departments, C-suite executives, or non-tech related departments.
1
accept
T1598.001
Phishing for Information: Spearphishing Service
Threat actors use spearphishing against non-enterprise controlled services as they have less protections.
1
accept
T1598.001
Phishing for Information: Spearphishing Service
Adversaries may pose as recruiters to garner interest and communication.
1
accept
T1598.001
Phishing for Information: Spearphishing Service
APT32 has used malicious links to direct users to web pages designed to harvest credentials.
1
accept
T1598.003
Phishing for Information: Spearphishing Link
Kimsuky has used links in e-mail to steal account information.
1
accept
T1598.003
Phishing for Information: Spearphishing Link
Sandworm Team has crafted spearphishing emails with hyperlinks designed to trick unwitting recipients into revealing their account credentials.
1
accept
T1598.003
Phishing for Information: Spearphishing Link
Sidewinder has sent e-mails with malicious links to credential harvesting websites.
1
accept
T1598.003
Phishing for Information: Spearphishing Link
Silent Librarian has used links in e-mails to direct victims to credential harvesting websites designed to appear like the targeted organization's login page.
1
accept
T1598.003
Phishing for Information: Spearphishing Link
MegaCortex has used code signing certificates issued to fake companies to bypass security controls.
1
accept
T1588.003
Obtain Capabilities: Code Signing Certificates
Wizard Spider obtained a code signing certificate signed by Digicert for some of its malware.
1
accept
T1588.003
Obtain Capabilities: Code Signing Certificates
Adversaries may buy code signing certificates to use during targeting.
1
accept
T1588.003
Obtain Capabilities: Code Signing Certificates
Certificates for fake companies provide legitimacy to run arbitrary code on targeted systems.
1
accept
T1588.003
Obtain Capabilities: Code Signing Certificates
Adversaries may also steal code signing materials directly from a compromised third-party.
1
accept
T1588.003
Obtain Capabilities: Code Signing Certificates
APT32 has set up Facebook pages in tandem with fake websites.
1
accept
T1585.001
Establish Accounts: Social Media Accounts
Cleaver has created fake LinkedIn profiles that included profile photos details and connections.
1
accept
T1585.001
Establish Accounts: Social Media Accounts
Fox Kitten has used a Twitter account to communicate with ransomware victims.
1
accept
T1585.001
Establish Accounts: Social Media Accounts
Sandworm Team has established social media accounts to disseminate victim internal-only documents and other sensitive data.
1
accept
T1585.001
Establish Accounts: Social Media Accounts
Leviathan has created new social media accounts for targeting efforts.
1
accept
T1585.001
Establish Accounts: Social Media Accounts
APT1 has created email accounts for later use in social engineering phishing and when registering domains.
1
accept
T1585.002
Establish Accounts: Email Accounts
Magic Hound has established email accounts using fake personas for spear-phishing operations.
1
accept
T1585.002
Establish Accounts: Email Accounts
Sandworm Team has created email accounts that mimic legitimate organizations for its spearphishing operations.
1
accept
T1585.002
Establish Accounts: Email Accounts
Silent Librarian has established e-mail accounts to receive e-mails forwarded from compromised accounts.
1
accept
T1585.002
Establish Accounts: Email Accounts
Leviathan has created new email accounts for targeting efforts.
1
accept
T1585.002
Establish Accounts: Email Accounts
APT29 developed SUNSPOT SUNBURST TEARDROP and Raindrop; SUNSPOT and SUNBURST were tailored to be incorporated into SolarWind's Orion software library.
1
accept
T1587.001
Develop Capabilities: Malware
Cleaver has created customized tools and payloads for functions including ARP poisoning encryption credential dumping ASP.NET shells web backdoors process enumeration WMI querying HTTP and SMB communications network interface sniffing and keystroke logging.
1
accept
T1587.001
Develop Capabilities: Malware
FIN7 has developed malware for use in operations including the creation of infected removable media.
1
accept
T1587.001
Develop Capabilities: Malware
Lazarus Group has developed several custom malware for use in operations.
1
accept
T1587.001
Develop Capabilities: Malware
Night Dragon used privately developed and customized remote access tools.
1
accept
T1587.001
Develop Capabilities: Malware
Sandworm Team has developed malware for its operations including malicious mobile applications and destructive malware such as NotPetya and Olympic Destroyer.
1
accept
T1587.001
Develop Capabilities: Malware
Turla has developed its own unique malware for use in operations.
1
accept
T1587.001
Develop Capabilities: Malware
UNC2452 developed SUNSPOT SUNBURST TEARDROP and Raindrop; SUNSPOT and SUNBURST were tailored to be incorporated into SolarWind's Orion software library.
1
accept
T1587.001
Develop Capabilities: Malware
Phosphorous has been deploying ransomware using a Log4J exploit.
1
accept
T1587.004
Develop Capabilities: Exploits
Wizard Spider developed an exploit targeting CVE-2021-40444.
1
accept
T1587.004
Develop Capabilities: Exploits
Adversaries may develop exploits that can be used during targeting.
1
accept
T1587.004
Develop Capabilities: Exploits
DEV-0322 created exploits for ZOHO ManageEngine ADSelfService Plus software.
1
accept
T1587.004
Develop Capabilities: Exploits
TG1021 uses a custom-made malware framework, built around a common core, tailor-made for IIS servers.
1
accept
T1587.004
Develop Capabilities: Exploits
Patchwork has created self-signed certificates from fictitious and spoofed legitimate software companies that were later used to sign malware.
1
accept
T1587.002
Develop Capabilities: Code Signing Certificates
PROMETHIUM has created self-signed certificates to sign malicious installers.
1
accept
T1587.002
Develop Capabilities: Code Signing Certificates
Adversaries may create self-signed code signing certificates that can be used during targeting.
1
accept
T1587.002
Develop Capabilities: Code Signing Certificates
Users are more likely to run signed code certificates, which can be attached to malware.
1
accept
T1587.002
Develop Capabilities: Code Signing Certificates
Malware actors can spoof legitimate certificates.
1
accept
T1587.002
Develop Capabilities: Code Signing Certificates
Turla has frequently used compromised WordPress sites for C2 infrastructure.
1
accept
T1584.006
Compromise Infrastructure: Web Services
Adversaries may compromise access to third-party web services that can be used during targeting.
1
accept
T1584.006
Compromise Infrastructure: Web Services
Adversaries may try to take ownership of a legitimate user's access to a web service and use that web service as infrastructure in support of cyber operations.
1
accept
T1584.006
Compromise Infrastructure: Web Services
Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise.
1
accept
T1584.006
Compromise Infrastructure: Web Services
NotPetya, it is suspected that attackers compromised a vulnerable server used to distribute the software and replaced the legitimate code with their compromised version.
1
accept
T1584.006
Compromise Infrastructure: Web Services
Turla has used the VPS infrastructure of compromised Iranian threat actors.
1
accept
T1584.003
Compromise Infrastructure: Virtual Private Server
By compromising a VPS to use as infrastructure, adversaries can make it difficult to physically tie back operations to themselves.
1
accept
T1584.003
Compromise Infrastructure: Virtual Private Server
NOBELLIUM compromised a Microsoft Azure AD account within a Cloud Service Provider’s (CSP) tenant.
1
accept
T1584.003
Compromise Infrastructure: Virtual Private Server
UNC2452 provisioned a system within Microsoft Azure that was within close proximity to a legitimate Azure-hosted system belonging to the CSP that they used to access their customer’s environment.
1
accept
T1584.003
Compromise Infrastructure: Virtual Private Server
A threat actor performed initial reconnaissance via a VPS provider located in the same region as the victim.
1
accept
T1584.003
Compromise Infrastructure: Virtual Private Server
APT16 has compromised otherwise legitimate sites as staging servers for second-stage payloads.
1
accept
T1584.004
Compromise Infrastructure: Server
Indrik Spider has served fake updates via legitimate websites that have been compromised.
1
accept
T1584.004
Compromise Infrastructure: Server
Turla has used compromised servers as infrastructure.
1
accept
T1584.004
Compromise Infrastructure: Server
Malicious emails sent to targets contain links to a compromised server that redirects to the download of Janeleiro.
1
accept
T1584.004
Compromise Infrastructure: Server
Candiru operators compromised several high-profile websites.
1
accept
T1584.004
Compromise Infrastructure: Server
APT1 hijacked FQDNs associated with legitimate websites hosted by hop points.
1
accept
T1584.001
Compromise Infrastructure: Domains
APT29 has compromised domains to use for C2.
1
accept
T1584.001
Compromise Infrastructure: Domains
UNC2452 has compromised domains to use for C2.
1
accept
T1584.001
Compromise Infrastructure: Domains
Magic Hound has used compromised domains to host links targeted to specific phishing victims.
1
accept
T1584.001
Compromise Infrastructure: Domains
Transparent Tribe has compromised domains for use in targeted malicious campaigns.
1
accept
T1584.001
Compromise Infrastructure: Domains
Adversaries may utilize DNS traffic for various tasks, including for Command and Control.
1
accept
T1584.002
Compromise Infrastructure: Dns Server
Adversaries may compromise third-party DNS servers that can be used during targeting.
1
accept
T1584.002
Compromise Infrastructure: Dns Server
Threat actors can alter DNS records.
1
accept
T1584.002
Compromise Infrastructure: Dns Server
DNS control can allow for redirection of an organization's traffic, facilitating Collection and Credential Access efforts for the adversary.
1
accept
T1584.002
Compromise Infrastructure: Dns Server
Adversaries may also be able to silently create subdomains pointed at malicious servers without tipping off the actual owner of the DNS server.
1
accept
T1584.002
Compromise Infrastructure: Dns Server
Adversaries may compromise numerous third-party systems to form a botnet that can be used during targeting.
1
accept
T1584.005
Compromise Infrastructure: Botnet
Attackers may conduct a takeover of an existing botnet, such as redirecting bots to adversary-controlled C2 servers.
1
accept
T1584.005
Compromise Infrastructure: Botnet
FreakOut attacked POS systems in order to use them as a botnet infrastructure.
1
accept
T1584.005
Compromise Infrastructure: Botnet
Mirai malware created a botnet used by multiple threat actor groups.
1
accept
T1584.005
Compromise Infrastructure: Botnet
Meris attacked Yandex with DDOS using botnets.
1
accept
T1584.005
Compromise Infrastructure: Botnet
Leviathan has compromised social media accounts to conduct social engineering attacks.
1
accept
T1586.001
Compromise Accounts: Social Media Accounts
Adversaries may compromise social media accounts that can be used during targeting.
1
accept
T1586.001
Compromise Accounts: Social Media Accounts
Utilizing an existing persona may engender a level of trust in a potential victim if they have a relationship, or knowledge of, the compromised persona.
1
accept
T1586.001
Compromise Accounts: Social Media Accounts
Attackers can gather credentials via Phishing for Information, purchasing credentials from third-party sites, or by brute forcing credentials.
1
accept
T1586.001
Compromise Accounts: Social Media Accounts
Attacker personas may exist on a single site or across multiple sites.
1
accept
T1586.001
Compromise Accounts: Social Media Accounts
Kimsuky has compromised web portal email accounts to send spearphishing e-mails.
1
accept
T1586.002
Compromise Accounts: Email Accounts
Magic Hound has compromised personal email accounts through the use of legitimate credentials and gathered additional victim information.
1
accept
T1586.002
Compromise Accounts: Email Accounts
IndigoZebra has compromised legitimate email accounts to use in their spearphishing operations.
1
accept
T1586.002
Compromise Accounts: Email Accounts
Leviathan has compromised email accounts to conduct social engineering attacks.
1
accept
T1586.002
Compromise Accounts: Email Accounts
Emotet compromised email systems to spread the trojan.
1
accept
T1586.002
Compromise Accounts: Email Accounts
APT17 has created profile pages in Microsoft TechNet that were used as C2 infrastructure.
1
accept
T1583.006
Acquire Infrastructure: Web Services
APT29 has registered algorithmically generated Twitter handles that are used for C2 by malware such as HAMMERTOSS.
1
accept
T1583.006
Acquire Infrastructure: Web Services
APT32 has set up Dropbox Amazon S3 and Google Drive to host malicious downloads.
1
accept
T1583.006
Acquire Infrastructure: Web Services
HAFNIUM has acquired web services for use in C2 and exfiltration.
1
accept
T1583.006
Acquire Infrastructure: Web Services
Lazarus Group has hosted malicious downloads on Github.
1
accept
T1583.006
Acquire Infrastructure: Web Services
MuddyWater has used file sharing services including OneHub to distribute tools.
1
accept
T1583.006
Acquire Infrastructure: Web Services
Turla has created web accounts including Dropbox and GitHub for C2 and document exfiltration.
1
accept
T1583.006
Acquire Infrastructure: Web Services
ZIRCONIUM has used GitHub to host malware linked in spearphishing e-mails.
1
accept
T1583.006
Acquire Infrastructure: Web Services
HAFNIUM has operated from leased virtual private servers (VPS) in the United States.
1
accept
T1583.003
Acquire Infrastructure: Virtual Private Server
TEMP.Veles has used Virtual Private Server (VPS) infrastructure.
1
accept
T1583.003
Acquire Infrastructure: Virtual Private Server
Adversaries may rent Virtual Private Servers (VPSs) that can be used during targeting.
1
accept
T1583.003
Acquire Infrastructure: Virtual Private Server
Attackers can make it difficult to physically tie back operations to them using a VPS.
1
accept
T1583.003
Acquire Infrastructure: Virtual Private Server
Adversaries may also acquire infrastructure from VPS service providers that are known for renting VPSs with minimal registration information.
1
accept
T1583.003
Acquire Infrastructure: Virtual Private Server
GALLIUM has used Taiwan-based servers that appear to be exclusive to GALLIUM.
1
accept
T1583.004
Acquire Infrastructure: Server
Sandworm Team has leased servers from resellers instead of leasing infrastructure directly from hosting companies to enable its operations.
1
accept
T1583.004
Acquire Infrastructure: Server
Adversaries may buy, lease, or rent physical servers that can be used during targeting.
1
accept
T1583.004
Acquire Infrastructure: Server
FamousSparrow rented servers at Shanghai Ruisu Network Technology and DAOU TECHNOLOGY.
1
accept
T1583.004
Acquire Infrastructure: Server