prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Acquire Infrastructure:Domains | It has registered fraudulent domains such as "mail-newyorker.com" and "news12.com.recover-session-service.site" to target specific victims with phishing attacks. |
Acquire Infrastructure:Domains | It has registered malicious domains for use in intrusion campaigns. |
Acquire Infrastructure:Domains | It have acquired C2 domains prior to operations. |
Acquire Infrastructure:Domains | During Operation Dream Job, It registered a domain name identical to that of a compromised company as part of their BEC effort. |
Acquire Infrastructure:Domains | For Operation Dust Storm, the threat actors established domains as part of their operational infrastructure. |
Acquire Infrastructure:Domains | For Operation Ghost, It registered domains for use in C2 including some crafted to appear as existing legitimate domains. |
Acquire Infrastructure:Domains | During Operation Honeybee, threat actors registered domains for C2. |
Acquire Infrastructure:Domains | For Operation Spalax, the threat actors registered hundreds of domains using Duck DNS and DNS Exit. |
Acquire Infrastructure:Domains | It has registered domain names and created URLs that are often designed to mimic or spoof legitimate websites, such as email login pages, online file sharing and storage websites, and password reset pages. |
Acquire Infrastructure:Domains | It has acquired domains to establish credential harvesting pages, often spoofing the target organization and using free top level domains .TK, .ML, .GA, .CF, and .GQ. |
Acquire Infrastructure:Domains | For the SolarWinds Compromise, It acquired C2 domains, sometimes through resellers. |
Acquire Infrastructure:Domains | It has registered domains often containing the keywords "kimjoy," "h0pe," and "grace," using domain registrars including Netdorm and No-IP DDNS, and hosting providers including xTom GmbH and Danilenko, Artyom. |
Acquire Infrastructure:Domains | It has registered domains to impersonate services such as Dropbox to distribute malware. |
Acquire Infrastructure:Domains | It has obtained domains to host their payloads. |
Acquire Infrastructure:Domains | It has registered domains for C2. |
Acquire Infrastructure:Domains | It has registered domains to mimic file sharing, government, defense, and research websites for use in targeted campaigns. |
Acquire Infrastructure:Domains | It has registered domains for C2 that mimicked sites of their intended targets. |
Acquire Infrastructure:Domains | ItM has purchased domains for use in targeted campaigns. |
Acquire Infrastructure:DNS Server | It has acquired dynamic DNS services for use in the targeting of intended victims. |
Acquire Infrastructure:DNS Server | It has set up custom DNS servers to send commands to compromised hosts via TXT records. |
Acquire Infrastructure:Virtual Private Server | It has used VPS hosting providers in targeting of intended victims. |
Acquire Infrastructure:Virtual Private Server | It has acquired VPS infrastructure for use in malicious campaigns. |
Acquire Infrastructure:Virtual Private Server | It has operated from leased virtual private servers (VPS) in the United States. |
Acquire Infrastructure:Virtual Private Server | It has used VPS hosting providers for infrastructure. |
Acquire Infrastructure:Virtual Private Server | It has used Virtual Private Server (VPS) infrastructure. |
Acquire Infrastructure:Server | It has acquired multiple servers for some of their operations, using each server for a different role. |
Acquire Infrastructure:Server | It has used Taiwan-based servers that appear to be exclusive to It. |
Acquire Infrastructure:Server | It has purchased hosting servers with virtual currency and prepaid cards. |
Acquire Infrastructure:Server | During Night Dragon, threat actors purchased hosted services to use for C2. |
Acquire Infrastructure:Server | During Operation Dream Job, It acquired servers to host their malicious tools. |
Acquire Infrastructure:Server | For Operation Honeybee, at least one identified persona was used to register for a free account for a control server. |
Acquire Infrastructure:Server | For Operation Wocao, the threat actors purchased servers with Bitcoin to use during the operation. |
Acquire Infrastructure:Server | It has leased servers from resellers instead of leasing infrastructure directly from hosting companies to enable its operations. |
Acquire Infrastructure:Web Services | It has created profile pages in Microsoft TechNet that were used as C2 infrastructure. |
Acquire Infrastructure:Web Services | It has used newly-created Blogspot pages for credential harvesting operations. |
Acquire Infrastructure:Web Services | It has registered algorithmically generated Twitter handles that are used for C2 by malware, such as HAMMERTOSS. It has also used legitimate web services such as Dropbox and Constant Contact in their operations. |
Acquire Infrastructure:Web Services | It has set up Dropbox, Amazon S3, and Google Drive to host malicious downloads. |
Acquire Infrastructure:Web Services | It has obtained cloud storage service accounts to host stolen data. |
Acquire Infrastructure:Web Services | It has established GitHub accounts to host their malware. |
Acquire Infrastructure:Web Services | It has set up Amazon S3 buckets to host trojanized digital products. |
Acquire Infrastructure:Web Services | It has acquired web services for use in C2 and exfiltration. |
Acquire Infrastructure:Web Services | It created Dropbox accounts for their operations. |
Acquire Infrastructure:Web Services | It has hosted content used for targeting efforts via web services such as Blogspot. |
Acquire Infrastructure:Web Services | It has hosted malicious downloads on Github. |
Acquire Infrastructure:Web Services | It has established GitHub accounts to host its toolsets. |
Acquire Infrastructure:Web Services | It has acquired Amazon S3 buckets to use in C2. |
Acquire Infrastructure:Web Services | It has used file sharing services including OneHub to distribute tools. |
Acquire Infrastructure:Web Services | During Operation Dream Job, It used file hosting services like DropBox and OneDrive. |
Acquire Infrastructure:Web Services | For Operation Sharpshooter, the threat actors used Dropbox to host lure documents and their first-stage downloader. |
Acquire Infrastructure:Web Services | It has created and used legitimate Microsoft OneDrive accounts for their operations. |
Acquire Infrastructure:Web Services | It has hosted malicious files on various platforms including Google Drive, OneDrive, Discord, PasteText, ShareText, and GitHub. |
Acquire Infrastructure:Web Services | It has created web accounts including Dropbox and GitHub for C2 and document exfiltration. |
Acquire Infrastructure:Web Services | ItM has used GitHub to host malware linked in spearphishing e-mails. |
Compromise Accounts:Social Media Accounts | It has compromised social media accounts to conduct social engineering attacks. |
Compromise Accounts:Email Accounts | It has used compromised email accounts to send credential phishing emails. |
Compromise Accounts:Email Accounts | It has compromised email accounts to further enable phishing campaigns and taken control of dormant accounts. |
Compromise Accounts:Email Accounts | It has used compromised accounts to send spearphishing emails. |
Compromise Accounts:Email Accounts | It has compromised legitimate email accounts to use in their spearphishing operations. |
Compromise Accounts:Email Accounts | It has compromised email accounts to send spearphishing e-mails. |
Compromise Accounts:Email Accounts | It has payed employees, suppliers, and business partners of target organizations for credentials. |
Compromise Accounts:Email Accounts | It has compromised email accounts to conduct social engineering attacks. |
Compromise Accounts:Email Accounts | It has compromised personal email accounts through the use of legitimate credentials and gathered additional victim information. |
Compromise Accounts:Cloud Accounts | It has used residential proxies, including Azure Virtual Machines, to obfuscate their access to victim environments. |
Compromise Infrastructure:Domains | It hijacked FQDNs associated with legitimate websites hosted by hop points. |
Compromise Infrastructure:Domains | During C0010, UNC3890 actors likely compromised the domain of a legitimate Israeli shipping company. |
Compromise Infrastructure:Domains | For C0021, the threat actors used legitimate but compromised domains to host malicious payloads. |
Compromise Infrastructure:Domains | It has compromised legitimate sites and used them to distribute malware. |
Compromise Infrastructure:Domains | It has used compromised domains to host links targeted to specific phishing victims. |
Compromise Infrastructure:Domains | For Operation Dream Job, It compromised domains in Italy and other countries for their C2 infrastructure. |
Compromise Infrastructure:Domains | It has compromised domains for some of their infrastructure, including for C2 and staging malware. |
Compromise Infrastructure:Domains | For the SolarWinds Compromise, It compromised domains to use for C2. |
Compromise Infrastructure:Domains | It has compromised domains for use in targeted malicious campaigns. |
Compromise Infrastructure:DNS Server | It has reconfigured a victim's DNS records to actor-controlled domains and websites. |
Compromise Infrastructure:Virtual Private Server | It has used the VPS infrastructure of compromised Iranian threat actors. |
Compromise Infrastructure:Server | It has compromised otherwise legitimate sites as staging servers for second-stage payloads. |
Compromise Infrastructure:Server | It has compromised legitimate websites to host C2 and malware modules. |
Compromise Infrastructure:Server | It has used compromised web servers as part of their operational infrastructure. |
Compromise Infrastructure:Server | It has served fake updates via legitimate websites that have been compromised. |
Compromise Infrastructure:Server | It has compromised servers to stage malicious tools. |
Compromise Infrastructure:Server | During Night Dragon, threat actors compromised web servers to use for C2. |
Compromise Infrastructure:Server | For Operation Dream Job, It compromised servers to host their malicious tools. |
Compromise Infrastructure:Server | For Operation Sharpshooter, the threat actors compromised a server they used as part of the campaign's infrastructure. |
Compromise Infrastructure:Server | It has used compromised servers as infrastructure. |
Compromise Infrastructure:Server | It has used compromised PRTG servers from other organizations for C2. |
Compromise Infrastructure:Botnet | It has used large groups of compromised machines for use as proxy nodes. |
Compromise Infrastructure:Botnet | It has used a large-scale botnet to target Small Office/Home Office (SOHO) network devices. |
Compromise Infrastructure:Botnet | It has routed traffic through compromised small office and home office (SOHO) network equipment, many of which were located in the same geographic area as the victim. |
Compromise Infrastructure:Web Services | It has compromised Google Drive repositories. |
Compromise Infrastructure:Web Services | It has frequently used compromised WordPress sites for C2 infrastructure. |
Develop Capabilities | It created and used a mailing toolkit to use in spearphishing attacks. |
Develop Capabilities:Malware | It has used custom malware, including Mongall and Heyoka Backdoor, in their operations. |
Develop Capabilities:Malware | It has used unique malware in many of their operations. |
Develop Capabilities:Malware | For C0010, UNC3890 actors used unique malware, including SUGARUSH and SUGARDUMP. |
Develop Capabilities:Malware | It has created customized tools and payloads for functions including ARP poisoning, encryption, credential dumping, ASP.NET shells, web backdoors, process enumeration, WMI querying, HTTP and SMB communications, network interface sniffing, and keystroke logging. |
Develop Capabilities:Malware | For CostaRicto, the threat actors used custom malware, including PS1, CostaBricks, and SombRAT. |
Develop Capabilities:Malware | It has utilized custom malware to maintain persistence in a compromised environment. |
Develop Capabilities:Malware | It has developed malware for use in operations, including the creation of infected removable media. |
Develop Capabilities:Malware | It has developed malware for their operations, including ransomware such as BitPaymer and WastedLocker. |
Develop Capabilities:Malware | It has developed custom malware that allowed them to maintain persistence on victim networks. |
Develop Capabilities:Malware | It has developed its own unique malware such as MailFetch.py for use in operations. |