prompt
stringclasses
508 values
procedure
stringlengths
20
478
Exfiltration Over Web Service:Exfiltration to Cloud Storage
Empire can use Dropbox for data exfiltration.
Exfiltration Over Web Service:Exfiltration to Cloud Storage
It has exfiltrated stolen data to the MEGA file sharing site.
Exfiltration Over Web Service:Exfiltration to Cloud Storage
It has exfiltrated data to file sharing sites, including MEGA.
Exfiltration Over Web Service:Exfiltration to Cloud Storage
HAMMERTOSS exfiltrates data by uploading it to accounts created by the actors on Web cloud storage providers for the adversaries to retrieve later.
Exfiltration Over Web Service:Exfiltration to Cloud Storage
It has used cloud services, including OneDrive, for data exfiltration.
Exfiltration Over Web Service:Exfiltration to Cloud Storage
It has exfiltrated stolen files and data to actor-controlled Blogspot accounts.
Exfiltration Over Web Service:Exfiltration to Cloud Storage
It has used an uploader known as LUNCHMONEY that can exfiltrate files to Dropbox.
Exfiltration Over Web Service:Exfiltration to Cloud Storage
It has exfiltrated data to Google Drive.
Exfiltration Over Web Service:Exfiltration to Cloud Storage
Octopus has exfiltrated data to file sharing sites.
Exfiltration Over Web Service:Exfiltration to Cloud Storage
During Operation Dream Job, It used a custom build of open-source command-line dbxcli to exfiltrate stolen data to Dropbox.
Exfiltration Over Web Service:Exfiltration to Cloud Storage
It has exfiltrated stolen data to It-owned OneDrive and Dropbox accounts.
Exfiltration Over Web Service:Exfiltration to Cloud Storage
RainyDay can use a file exfiltration tool to upload specific files to Dropbox.
Exfiltration Over Web Service:Exfiltration to Cloud Storage
Rclone can exfiltrate data to cloud storage services such as Dropbox, Google Drive, Amazon S3, and MEGA.
Exfiltration Over Web Service:Exfiltration to Cloud Storage
ROKRAT can send collected data to cloud storage services such as PCloud.
Exfiltration Over Web Service:Exfiltration to Cloud Storage
It has exfiltrated stolen data to Dropbox.
Exfiltration Over Web Service:Exfiltration to Cloud Storage
It has used WebDAV to upload stolen USB files to a cloud drive. It has also exfiltrated stolen files to OneDrive and 4shared.
Exfiltration Over Web Service:Exfiltration to Cloud Storage
It has exfiltrated stolen victim data to various cloud storage providers.
Exfiltration Over Web Service:Exfiltration to Cloud Storage
ItM has exfiltrated stolen data to Dropbox.
Scheduled Transfer
ADVSTORESHELL collects, compresses, encrypts, and exfiltrates data to the C2 server every 10 minutes.
Scheduled Transfer
Chrommme can set itself to sleep before requesting a new command from C2.
Scheduled Transfer
Cobalt Strike can set its Beacon payload to reach out to the C2 server on an arbitrary and random interval.
Scheduled Transfer
ComRAT has been programmed to sleep outside local business hours (9 to 5, Monday to Friday).
Scheduled Transfer
Dipsind can be configured to only run during normal working hours, which would make its communications harder to distinguish from normal traffic.
Scheduled Transfer
Flagpro has the ability to wait for a specified time interval between communicating with and executing commands from C2.
Scheduled Transfer
It sent the victim computer identifier in a User-Agent string back to the C2 server every 10 minutes.
Scheduled Transfer
jRAT can be configured to reconnect at certain intervals.
Scheduled Transfer
Kazuar can sleep for a specific time and be set to communicate at specific intervals.
Scheduled Transfer
LightNeuron can be configured to exfiltrate data during nighttime or working hours.
Scheduled Transfer
Linfo creates a backdoor through which remote attackers can change the frequency at which compromised hosts contact remote C2 infrastructure.
Scheduled Transfer
It sends stolen data to the C2 server every 10 minutes.
Scheduled Transfer
POWERSTATS can sleep for a given number of seconds.
Scheduled Transfer
ShadowPad has sent data back to C2 every 8 hours.
Scheduled Transfer
Shark can pause C2 communications for a specified time.
Scheduled Transfer
ShimRat can sleep when instructed to do so by the C2.
Scheduled Transfer
TinyIt contacts its C2 based on a scheduled timing set in its configuration.
Account Access Removal
It has removed a targeted organization's global admin accounts to lock the organization out of all access.
Account Access Removal
LockerGoga has been observed changing account passwords and logging off current users.
Account Access Removal
MegaCortex has changed user account passwords and logged users off the system.
Account Access Removal
Meteor has the ability to change the password of local users on compromised hosts and can log off users.
Data Destruction
It has used a custom secure delete function to make deleted files unrecoverable.
Data Destruction
BlackEnergy 2 contains a "Destroy" plug-in that destroys data stored on victim hard drives by overwriting file contents.
Data Destruction
CaddyWiper can work alphabetically through drives on a compromised system to take ownership of and overwrite all files.
Data Destruction
Diavol can delete specified files from a targeted system.
Data Destruction
It has used tools to delete files and folders from victims' desktops and profiles.
Data Destruction
HermeticWiper can recursively wipe folders and files in Windows, Program Files, Program Files(x86), PerfLogs, Boot, System, Volume Information, and AppData folders using FSCTL_MOVE_FILE. HermeticWiper can also overwrite symbolic links and big files in My Documents and on the Desktop with random bytes.
Data Destruction
Industroyer’s data wiper module clears registry keys and overwrites both ICS configuration and Windows files.
Data Destruction
Kazuar can overwrite files with random data before deleting them.
Data Destruction
KillDisk deletes system files to make the OS unbootable. KillDisk also targets and deletes files with 35 different file extensions.
Data Destruction
It has deleted the target's systems and resources both on-premises and in the cloud.
Data Destruction
It has used a custom secure delete function to overwrite file contents with data from heap memory.
Data Destruction
Meteor can fill a victim's files and directories with zero-bytes in replacement of real content before deleting them.
Data Destruction
Olympic Destroyer overwrites files locally and on remote shares.
Data Destruction
PowerDuke has a command to write random data across a file and delete it.
Data Destruction
Proxysvc can overwrite files indicated by the attacker before deleting them.
Data Destruction
RawDisk was used in Shamoon to write to protected system locations such as the MBR and disk partitions in an effort to destroy data.
Data Destruction
REvil has the capability to destroy files and folders.
Data Destruction
It has used the BlackEnergy KillDisk component to overwrite files on Windows-based Human-Machine Interfaces.
Data Destruction
SDelete deletes data in a way that makes it unrecoverable.
Data Destruction
Shamoon attempts to overwrite operating system files and disk structures with image files. In a later variant, randomly generated data was used for data overwrites.
Data Destruction
StoneDrill has a disk wiper module that targets files other than those in the Windows directory.
Data Destruction
WhisperGate can corrupt files by overwriting the first 1 MB with 0xcc and appending random extensions.
Data Destruction
Xbash has destroyed Linux-based databases as part of its ransomware capabilities.
Data Encrypted for Impact
It has used Hermes ransomware to encrypt files with AES256.
Data Encrypted for Impact
It used a ransomware called Encryptor RaaS to encrypt files on the targeted systems and provide a ransom note to the user.
Data Encrypted for Impact
Avaddon encrypts the victim system using a combination of AES256 and RSA encryption schemes.
Data Encrypted for Impact
AvosLocker has encrypted files and network resources using AES-256 and added an .avos, .avos2, or .AvosLinux extension to filenames.
Data Encrypted for Impact
Babuk can use ChaCha8 and ECDH to encrypt data.
Data Encrypted for Impact
Bad Rabbit has encrypted files and disks using AES-128-CBC and RSA-2048.
Data Encrypted for Impact
BitPaymer can import a hard-coded RSA 1024-bit public key, generate a 128-bit RC4 key for each file, and encrypt the file in place, appending .locked to the filename.
Data Encrypted for Impact
Black Basta can encrypt files with the ChaCha20 cypher and using a multithreaded process to increase speed.
Data Encrypted for Impact
BlackCat has the ability to encrypt Windows devices, Linux devices, and VMWare instances.
Data Encrypted for Impact
During C0015, the threat actors used Conti ransomware to encrypt a compromised network.
Data Encrypted for Impact
During C0018, the threat actors used AvosLocker ransomware to encrypt files on the compromised network.
Data Encrypted for Impact
Clop can encrypt files using AES, RSA, and RC4 and will add the ".clop" extension to encrypted files.
Data Encrypted for Impact
Conti can use CreateIoCompletionPort(), PostQueuedCompletionStatus(), and GetQueuedCompletionPort() to rapidly encrypt files, excluding those with the extensions of .exe, .dll, and .lnk. It has used a different AES-256 encryption key per file with a bundled RAS-4096 public encryption key that is unique for each victim. Conti can use "Windows Restart Manager" to ensure files are unlocked and open for encryption.
Data Encrypted for Impact
Cuba has the ability to encrypt system data and add the ".cuba" extension to encrypted files.
Data Encrypted for Impact
DCSrv has encrypted drives using the core encryption mechanism from DiskCryptor.
Data Encrypted for Impact
DEATHRANSOM can use public and private key pair encryption to encrypt files for ransom payment.
Data Encrypted for Impact
Diavol has encrypted files using an RSA key though the CryptEncrypt API and has appended filenames with ".lock64".
Data Encrypted for Impact
Egregor can encrypt all non-system files using a hybrid AES-RSA algorithm prior to displaying a ransom note.
Data Encrypted for Impact
EKANS uses standard encryption library functions to encrypt files.
Data Encrypted for Impact
It has encrypted virtual disk volumes on ESXi servers using a version of Darkside ransomware.
Data Encrypted for Impact
It has deployed ransomware such as Ragnar Locker, White Rabbit, and attempted to execute Noberus on compromised networks.
Data Encrypted for Impact
FIVEHANDS can use an embedded NTRU public key to encrypt data for ransom.
Data Encrypted for Impact
HELLOKITTY can use an embedded RSA-2048 public key to encrypt victim data for ransom.
Data Encrypted for Impact
It has encrypted domain-controlled systems using BitPaymer.
Data Encrypted for Impact
JCry has encrypted files and demanded Bitcoin to decrypt those files.
Data Encrypted for Impact
KillDisk has a ransomware component that encrypts files with an AES key that is also RSA-1028 encrypted.
Data Encrypted for Impact
LockerGoga has encrypted files, including core Windows OS files, using RSA-OAEP MGF1 and then demanded Bitcoin be paid for the decryption key.
Data Encrypted for Impact
It has used BitLocker and DiskCryptor to encrypt targeted workstations.
Data Encrypted for Impact
Maze has disrupted systems by encrypting files on targeted machines, claiming to decrypt files if a ransom payment is made. Maze has used the ChaCha algorithm, based on Salsa20, and an RSA algorithm to encrypt files.
Data Encrypted for Impact
MegaCortex has used the open-source library, Mbed Crypto, and generated AES keys to carry out the file encryption process.
Data Encrypted for Impact
Netwalker can encrypt files on infected machines to extort victims.
Data Encrypted for Impact
NotPetya encrypts user files and disk structures like the MBR with 2048-bit RSA.
Data Encrypted for Impact
Pay2Key can encrypt data on victim's machines using RSA and AES algorithms in order to extort a ransom payment for decryption.
Data Encrypted for Impact
Prestige has leveraged the CryptoPP C++ library to encrypt files on target systems using AES and appended filenames with .enc.
Data Encrypted for Impact
ProLock can encrypt files on a compromised host with RC6, and encrypts the key with RSA-1024.
Data Encrypted for Impact
Pysa has used RSA and AES-CBC encryption algorithm to encrypt a list of targeted file extensions.
Data Encrypted for Impact
Ragnar Locker encrypts files on the local machine and mapped drives prior to displaying a note demanding a ransom.
Data Encrypted for Impact
REvil can encrypt files on victim systems and demands a ransom to decrypt the files.