value
stringlengths 25
18k
⌀ | subtecnique
int64 0
1
| answer
stringclasses 2
values | id
stringlengths 5
9
| name
stringlengths 3
102
|
---|---|---|---|---|
Attackers will use spearphishing messages to elicit sensative information from targets. | 1 | accept | T1598.001 | Phishing for Information: Spearphishing Service |
Spearphishing uses social engineering techniques to get credentials or other information. | 1 | accept | T1598.001 | Phishing for Information: Spearphishing Service |
Emails or social media messaging spearphishing is generally aimed at IT departments, C-suite executives, or non-tech related departments. | 1 | accept | T1598.001 | Phishing for Information: Spearphishing Service |
Threat actors use spearphishing against non-enterprise controlled services as they have less protections. | 1 | accept | T1598.001 | Phishing for Information: Spearphishing Service |
Adversaries may pose as recruiters to garner interest and communication. | 1 | accept | T1598.001 | Phishing for Information: Spearphishing Service |
APT32 has used malicious links to direct users to web pages designed to harvest credentials. | 1 | accept | T1598.003 | Phishing for Information: Spearphishing Link |
Kimsuky has used links in e-mail to steal account information. | 1 | accept | T1598.003 | Phishing for Information: Spearphishing Link |
Sandworm Team has crafted spearphishing emails with hyperlinks designed to trick unwitting recipients into revealing their account credentials. | 1 | accept | T1598.003 | Phishing for Information: Spearphishing Link |
Sidewinder has sent e-mails with malicious links to credential harvesting websites. | 1 | accept | T1598.003 | Phishing for Information: Spearphishing Link |
Silent Librarian has used links in e-mails to direct victims to credential harvesting websites designed to appear like the targeted organization's login page. | 1 | accept | T1598.003 | Phishing for Information: Spearphishing Link |
MegaCortex has used code signing certificates issued to fake companies to bypass security controls. | 1 | accept | T1588.003 | Obtain Capabilities: Code Signing Certificates |
Wizard Spider obtained a code signing certificate signed by Digicert for some of its malware. | 1 | accept | T1588.003 | Obtain Capabilities: Code Signing Certificates |
Adversaries may buy code signing certificates to use during targeting. | 1 | accept | T1588.003 | Obtain Capabilities: Code Signing Certificates |
Certificates for fake companies provide legitimacy to run arbitrary code on targeted systems. | 1 | accept | T1588.003 | Obtain Capabilities: Code Signing Certificates |
Adversaries may also steal code signing materials directly from a compromised third-party. | 1 | accept | T1588.003 | Obtain Capabilities: Code Signing Certificates |
APT32 has set up Facebook pages in tandem with fake websites. | 1 | accept | T1585.001 | Establish Accounts: Social Media Accounts |
Cleaver has created fake LinkedIn profiles that included profile photos details and connections. | 1 | accept | T1585.001 | Establish Accounts: Social Media Accounts |
Fox Kitten has used a Twitter account to communicate with ransomware victims. | 1 | accept | T1585.001 | Establish Accounts: Social Media Accounts |
Sandworm Team has established social media accounts to disseminate victim internal-only documents and other sensitive data. | 1 | accept | T1585.001 | Establish Accounts: Social Media Accounts |
Leviathan has created new social media accounts for targeting efforts. | 1 | accept | T1585.001 | Establish Accounts: Social Media Accounts |
APT1 has created email accounts for later use in social engineering phishing and when registering domains. | 1 | accept | T1585.002 | Establish Accounts: Email Accounts |
Magic Hound has established email accounts using fake personas for spear-phishing operations. | 1 | accept | T1585.002 | Establish Accounts: Email Accounts |
Sandworm Team has created email accounts that mimic legitimate organizations for its spearphishing operations. | 1 | accept | T1585.002 | Establish Accounts: Email Accounts |
Silent Librarian has established e-mail accounts to receive e-mails forwarded from compromised accounts. | 1 | accept | T1585.002 | Establish Accounts: Email Accounts |
Leviathan has created new email accounts for targeting efforts. | 1 | accept | T1585.002 | Establish Accounts: Email Accounts |
APT29 developed SUNSPOT SUNBURST TEARDROP and Raindrop; SUNSPOT and SUNBURST were tailored to be incorporated into SolarWind's Orion software library. | 1 | accept | T1587.001 | Develop Capabilities: Malware |
Cleaver has created customized tools and payloads for functions including ARP poisoning encryption credential dumping ASP.NET shells web backdoors process enumeration WMI querying HTTP and SMB communications network interface sniffing and keystroke logging. | 1 | accept | T1587.001 | Develop Capabilities: Malware |
FIN7 has developed malware for use in operations including the creation of infected removable media. | 1 | accept | T1587.001 | Develop Capabilities: Malware |
Lazarus Group has developed several custom malware for use in operations. | 1 | accept | T1587.001 | Develop Capabilities: Malware |
Night Dragon used privately developed and customized remote access tools. | 1 | accept | T1587.001 | Develop Capabilities: Malware |
Sandworm Team has developed malware for its operations including malicious mobile applications and destructive malware such as NotPetya and Olympic Destroyer. | 1 | accept | T1587.001 | Develop Capabilities: Malware |
Turla has developed its own unique malware for use in operations. | 1 | accept | T1587.001 | Develop Capabilities: Malware |
UNC2452 developed SUNSPOT SUNBURST TEARDROP and Raindrop; SUNSPOT and SUNBURST were tailored to be incorporated into SolarWind's Orion software library. | 1 | accept | T1587.001 | Develop Capabilities: Malware |
Phosphorous has been deploying ransomware using a Log4J exploit. | 1 | accept | T1587.004 | Develop Capabilities: Exploits |
Wizard Spider developed an exploit targeting CVE-2021-40444. | 1 | accept | T1587.004 | Develop Capabilities: Exploits |
Adversaries may develop exploits that can be used during targeting. | 1 | accept | T1587.004 | Develop Capabilities: Exploits |
DEV-0322 created exploits for ZOHO ManageEngine ADSelfService Plus software. | 1 | accept | T1587.004 | Develop Capabilities: Exploits |
TG1021 uses a custom-made malware framework, built around a common core, tailor-made for IIS servers. | 1 | accept | T1587.004 | Develop Capabilities: Exploits |
Patchwork has created self-signed certificates from fictitious and spoofed legitimate software companies that were later used to sign malware. | 1 | accept | T1587.002 | Develop Capabilities: Code Signing Certificates |
PROMETHIUM has created self-signed certificates to sign malicious installers. | 1 | accept | T1587.002 | Develop Capabilities: Code Signing Certificates |
Adversaries may create self-signed code signing certificates that can be used during targeting. | 1 | accept | T1587.002 | Develop Capabilities: Code Signing Certificates |
Users are more likely to run signed code certificates, which can be attached to malware. | 1 | accept | T1587.002 | Develop Capabilities: Code Signing Certificates |
Malware actors can spoof legitimate certificates. | 1 | accept | T1587.002 | Develop Capabilities: Code Signing Certificates |
Turla has frequently used compromised WordPress sites for C2 infrastructure. | 1 | accept | T1584.006 | Compromise Infrastructure: Web Services |
Adversaries may compromise access to third-party web services that can be used during targeting. | 1 | accept | T1584.006 | Compromise Infrastructure: Web Services |
Adversaries may try to take ownership of a legitimate user's access to a
web service and use that web service as infrastructure in support of
cyber operations. | 1 | accept | T1584.006 | Compromise Infrastructure: Web Services |
Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. | 1 | accept | T1584.006 | Compromise Infrastructure: Web Services |
NotPetya, it is suspected that attackers compromised a vulnerable server used to distribute the software and replaced the legitimate code with their compromised version. | 1 | accept | T1584.006 | Compromise Infrastructure: Web Services |
Turla has used the VPS infrastructure of compromised Iranian threat actors. | 1 | accept | T1584.003 | Compromise Infrastructure: Virtual Private Server |
By compromising a VPS to use as infrastructure, adversaries can make it difficult to physically tie back operations to themselves. | 1 | accept | T1584.003 | Compromise Infrastructure: Virtual Private Server |
NOBELLIUM compromised a Microsoft Azure AD account within a Cloud Service Provider’s (CSP) tenant. | 1 | accept | T1584.003 | Compromise Infrastructure: Virtual Private Server |
UNC2452 provisioned a system within Microsoft Azure that was within close proximity to a legitimate Azure-hosted system belonging to the CSP that they used to access their customer’s environment. | 1 | accept | T1584.003 | Compromise Infrastructure: Virtual Private Server |
A threat actor performed initial reconnaissance via a VPS provider located in the same region as the victim. | 1 | accept | T1584.003 | Compromise Infrastructure: Virtual Private Server |
APT16 has compromised otherwise legitimate sites as staging servers for second-stage payloads. | 1 | accept | T1584.004 | Compromise Infrastructure: Server |
Indrik Spider has served fake updates via legitimate websites that have been compromised. | 1 | accept | T1584.004 | Compromise Infrastructure: Server |
Turla has used compromised servers as infrastructure. | 1 | accept | T1584.004 | Compromise Infrastructure: Server |
Malicious emails sent to targets contain links to a compromised server that redirects to the download of Janeleiro. | 1 | accept | T1584.004 | Compromise Infrastructure: Server |
Candiru operators compromised several high-profile websites. | 1 | accept | T1584.004 | Compromise Infrastructure: Server |
APT1 hijacked FQDNs associated with legitimate websites hosted by hop points. | 1 | accept | T1584.001 | Compromise Infrastructure: Domains |
APT29 has compromised domains to use for C2. | 1 | accept | T1584.001 | Compromise Infrastructure: Domains |
UNC2452 has compromised domains to use for C2. | 1 | accept | T1584.001 | Compromise Infrastructure: Domains |
Magic Hound has used compromised domains to host links targeted to specific phishing victims. | 1 | accept | T1584.001 | Compromise Infrastructure: Domains |
Transparent Tribe has compromised domains for use in targeted malicious campaigns. | 1 | accept | T1584.001 | Compromise Infrastructure: Domains |
Adversaries may utilize DNS traffic for various tasks, including for Command and Control. | 1 | accept | T1584.002 | Compromise Infrastructure: Dns Server |
Adversaries may compromise third-party DNS servers that can be used during targeting. | 1 | accept | T1584.002 | Compromise Infrastructure: Dns Server |
Threat actors can alter DNS records. | 1 | accept | T1584.002 | Compromise Infrastructure: Dns Server |
DNS control can allow for redirection of an organization's traffic, facilitating Collection and Credential Access efforts for the adversary. | 1 | accept | T1584.002 | Compromise Infrastructure: Dns Server |
Adversaries may also be able to silently create subdomains pointed at malicious servers without tipping off the actual owner of the DNS server. | 1 | accept | T1584.002 | Compromise Infrastructure: Dns Server |
Adversaries may compromise numerous third-party systems to form a botnet that can be used during targeting. | 1 | accept | T1584.005 | Compromise Infrastructure: Botnet |
Attackers may conduct a takeover of an existing botnet, such as redirecting bots to adversary-controlled C2 servers. | 1 | accept | T1584.005 | Compromise Infrastructure: Botnet |
FreakOut attacked POS systems in order to use them as a botnet infrastructure. | 1 | accept | T1584.005 | Compromise Infrastructure: Botnet |
Mirai malware created a botnet used by multiple threat actor groups. | 1 | accept | T1584.005 | Compromise Infrastructure: Botnet |
Meris attacked Yandex with DDOS using botnets. | 1 | accept | T1584.005 | Compromise Infrastructure: Botnet |
Leviathan has compromised social media accounts to conduct social engineering attacks. | 1 | accept | T1586.001 | Compromise Accounts: Social Media Accounts |
Adversaries may compromise social media accounts that can be used during targeting. | 1 | accept | T1586.001 | Compromise Accounts: Social Media Accounts |
Utilizing an existing persona may engender a level of trust in a potential victim if they have a relationship, or knowledge of, the compromised persona. | 1 | accept | T1586.001 | Compromise Accounts: Social Media Accounts |
Attackers can gather credentials via Phishing for Information, purchasing credentials from third-party sites, or by brute forcing credentials. | 1 | accept | T1586.001 | Compromise Accounts: Social Media Accounts |
Attacker personas may exist on a single site or across multiple sites. | 1 | accept | T1586.001 | Compromise Accounts: Social Media Accounts |
Kimsuky has compromised web portal email accounts to send spearphishing e-mails. | 1 | accept | T1586.002 | Compromise Accounts: Email Accounts |
Magic Hound has compromised personal email accounts through the use of legitimate credentials and gathered additional victim information. | 1 | accept | T1586.002 | Compromise Accounts: Email Accounts |
IndigoZebra has compromised legitimate email accounts to use in their spearphishing operations. | 1 | accept | T1586.002 | Compromise Accounts: Email Accounts |
Leviathan has compromised email accounts to conduct social engineering attacks. | 1 | accept | T1586.002 | Compromise Accounts: Email Accounts |
Emotet compromised email systems to spread the trojan. | 1 | accept | T1586.002 | Compromise Accounts: Email Accounts |
APT17 has created profile pages in Microsoft TechNet that were used as C2 infrastructure. | 1 | accept | T1583.006 | Acquire Infrastructure: Web Services |
APT29 has registered algorithmically generated Twitter handles that are used for C2 by malware such as HAMMERTOSS. | 1 | accept | T1583.006 | Acquire Infrastructure: Web Services |
APT32 has set up Dropbox Amazon S3 and Google Drive to host malicious downloads. | 1 | accept | T1583.006 | Acquire Infrastructure: Web Services |
HAFNIUM has acquired web services for use in C2 and exfiltration. | 1 | accept | T1583.006 | Acquire Infrastructure: Web Services |
Lazarus Group has hosted malicious downloads on Github. | 1 | accept | T1583.006 | Acquire Infrastructure: Web Services |
MuddyWater has used file sharing services including OneHub to distribute tools. | 1 | accept | T1583.006 | Acquire Infrastructure: Web Services |
Turla has created web accounts including Dropbox and GitHub for C2 and document exfiltration. | 1 | accept | T1583.006 | Acquire Infrastructure: Web Services |
ZIRCONIUM has used GitHub to host malware linked in spearphishing e-mails. | 1 | accept | T1583.006 | Acquire Infrastructure: Web Services |
HAFNIUM has operated from leased virtual private servers (VPS) in the United States. | 1 | accept | T1583.003 | Acquire Infrastructure: Virtual Private Server |
TEMP.Veles has used Virtual Private Server (VPS) infrastructure. | 1 | accept | T1583.003 | Acquire Infrastructure: Virtual Private Server |
Adversaries may rent Virtual Private Servers (VPSs) that can be used during targeting. | 1 | accept | T1583.003 | Acquire Infrastructure: Virtual Private Server |
Attackers can make it difficult to physically tie back operations to them using a VPS. | 1 | accept | T1583.003 | Acquire Infrastructure: Virtual Private Server |
Adversaries may also acquire infrastructure from VPS service providers that are known for renting VPSs with minimal registration information. | 1 | accept | T1583.003 | Acquire Infrastructure: Virtual Private Server |
GALLIUM has used Taiwan-based servers that appear to be exclusive to GALLIUM. | 1 | accept | T1583.004 | Acquire Infrastructure: Server |
Sandworm Team has leased servers from resellers instead of leasing infrastructure directly from hosting companies to enable its operations. | 1 | accept | T1583.004 | Acquire Infrastructure: Server |
Adversaries may buy, lease, or rent physical servers that can be used during targeting. | 1 | accept | T1583.004 | Acquire Infrastructure: Server |
FamousSparrow rented servers at Shanghai Ruisu Network Technology and DAOU TECHNOLOGY. | 1 | accept | T1583.004 | Acquire Infrastructure: Server |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.