text stringlengths 129 642 |
|---|
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1595.001 / Active Scanning:Scanning IP Blocks###Assistance: TeamTNT has scanned specific lists of target IP addresses.[2] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1595.002 / Active Scanning:Vulnerability Scanning###Assistance: APT28 has performed large-scale scans in an attempt to find vulnerable servers.[2] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1595.002 / Active Scanning:Vulnerability Scanning###Assistance: APT29 has conducted widespread scanning of target environments to identify vulnerabilities for exploit.[3] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1595.002 / Active Scanning:Vulnerability Scanning###Assistance: Aquatic Panda has used publicly accessible DNS logging services to identify servers vulnerable to Log4j (CVE 2021-44228).[4] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1595.002 / Active Scanning:Vulnerability Scanning###Assistance: Dragonfly has scanned targeted systems for vulnerable Citrix and Microsoft Exchange services.[5] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1595.002 / Active Scanning:Vulnerability Scanning###Assistance: Earth Lusca has scanned for vulnerabilities in the public-facing servers of their targets.[6] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1595.002 / Active Scanning:Vulnerability Scanning###Assistance: Magic Hound has conducted widespread scanning to identify public-facing systems vulnerable to CVE-2021-44228 in Log4j and ProxyShell vulnerabilities; CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065 in on-premises MS Exchange Servers; and CVE-2018-13379 in Fortinet FortiOS SSL VPNs.[7][8] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1595.002 / Active Scanning:Vulnerability Scanning###Assistance: Sandworm Team has scanned network infrastructure for vulnerabilities as part of its operational planning.[9] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1595.002 / Active Scanning:Vulnerability Scanning###Assistance: TeamTNT has scanned for vulnerabilities in IoT devices and other related resources such as the Docker API.[10] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1595.002 / Active Scanning:Vulnerability Scanning###Assistance: Volatile Cedar has performed vulnerability scans of the target server.[11][12] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1595.003 / Active Scanning:Wordlist Scanning###Assistance: Volatile Cedar has used DirBuster and GoBuster to brute force web directories and DNS subdomains.[1] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1592.002 / Gather Victim Host Information:Software###Assistance: Andariel has inserted a malicious script within compromised websites to collect potential victim information such as browser type, system language, Flash Player version, and other data.[2] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1592.002 / Gather Victim Host Information:Software###Assistance: Magic Hound has captured the user-agent strings from visitors to their phishing sites.[3] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1592.002 / Gather Victim Host Information:Software###Assistance: Sandworm Team has researched software code to enable supply-chain operations, most notably for the 2017 NotPetya attack. Sandworm Team also collected a list of computers using specific software as part of its targeting efforts.[4] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1592.004 / Gather Victim Host Information:Client Configurations###Assistance: HAFNIUM has interacted with Office 365 tenants to gather details regarding target's environments.[2] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1589 / Gather Victim Identity Information###Assistance: APT32 has conducted targeted surveillance against activists and bloggers.[10] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1589 / Gather Victim Identity Information###Assistance: FIN13 has researched employees to target for social engineering attacks.[11] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1589 / Gather Victim Identity Information###Assistance: HEXANE has identified specific potential victims at targeted organizations.[12] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1589 / Gather Victim Identity Information###Assistance: LAPSUS$ has gathered detailed information of target employees to enhance their social engineering lures.[13] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1589 / Gather Victim Identity Information###Assistance: Magic Hound has acquired mobile phone numbers of potential targets, possibly for mobile malware or additional phishing operations.[14] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1589 / Gather Victim Identity Information###Assistance: For Operation Dream Job, Lazarus Group conducted extensive reconnaissance research on potential targets.[15] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1589 / Gather Victim Identity Information###Assistance: During Operation Wocao, threat actors targeted people based on their organizational roles and privileges.[16] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1589.001 / Gather Victim Identity Information:Credentials###Assistance: APT28 has harvested user's login credentials.[10] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1589.001 / Gather Victim Identity Information:Credentials###Assistance: During C0027, Scattered Spider sent phishing messages via SMS to steal credentials.[11] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1589.001 / Gather Victim Identity Information:Credentials###Assistance: Chimera has collected credentials for the target organization from previous breaches for use in brute force attacks.[12] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1589.001 / Gather Victim Identity Information:Credentials###Assistance: LAPSUS$ has gathered user identities and credentials to gain initial access to a victim's organization; the group has also called an organization's help desk to reset a target's credentials.[13][14] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1589.001 / Gather Victim Identity Information:Credentials###Assistance: Leviathan has collected compromised credentials to use for targeting efforts.[15] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1589.001 / Gather Victim Identity Information:Credentials###Assistance: Magic Hound gathered credentials from two victims that they then attempted to validate across 75 different websites. Magic Hound has also collected credentials from over 900 Fortinet VPN servers in the US, Europe, and Israel.[16][17] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1589.001 / Gather Victim Identity Information:Credentials###Assistance: For the SolarWinds Compromise, APT29 conducted credential theft operations to obtain credentials to be used for access to victim environments.[18] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1589.002 / Gather Victim Identity Information:Email Addresses###Assistance: AADInternals can check for the existence of user email addresses using public Microsoft APIs.[6][7] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1589.002 / Gather Victim Identity Information:Email Addresses###Assistance: APT32 has collected e-mail addresses for activists and bloggers in order to target them with spyware.[8] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1589.002 / Gather Victim Identity Information:Email Addresses###Assistance: EXOTIC LILY has gathered targeted individuals' e-mail addresses through open source research and website contact forms.[9] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1589.002 / Gather Victim Identity Information:Email Addresses###Assistance: HAFNIUM has collected e-mail addresses for users they intended to target.[10] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1589.002 / Gather Victim Identity Information:Email Addresses###Assistance: HEXANE has targeted executives, human resources staff, and IT personnel for spearphishing.[11][12] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1589.002 / Gather Victim Identity Information:Email Addresses###Assistance: Kimsuky has collected valid email addresses that were subsequently used in spearphishing campaigns.[13] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1589.002 / Gather Victim Identity Information:Email Addresses###Assistance: LAPSUS$ has gathered employee email addresses, including personal accounts, for social engineering and initial access efforts.[14] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1589.002 / Gather Victim Identity Information:Email Addresses###Assistance: Lazarus Group collected email addresses belonging to various departments of a targeted organization which were used in follow-on phishing campaigns.[15] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1589.002 / Gather Victim Identity Information:Email Addresses###Assistance: Magic Hound has identified high-value email accounts in academia, journalism, NGO's, foreign policy, and national security for targeting.[16][17] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1589.002 / Gather Victim Identity Information:Email Addresses###Assistance: MuddyWater has specifically targeted government agency employees with spearphishing e-mails.[18] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1589.002 / Gather Victim Identity Information:Email Addresses###Assistance: Sandworm Team has obtained valid emails addresses while conducting research against target organizations that were subsequently used in spearphishing campaigns.[19] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1589.002 / Gather Victim Identity Information:Email Addresses###Assistance: Silent Librarian has collected e-mail addresses from targeted organizations from open Internet searches.[20] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1589.002 / Gather Victim Identity Information:Email Addresses###Assistance: TA551 has used spoofed company emails that were acquired from email clients on previously infected hosts to target other individuals.[21] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1589.003 / Gather Victim Identity Information:Employee Names###Assistance: Kimsuky has collected victim employee name information.[2] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1589.003 / Gather Victim Identity Information:Employee Names###Assistance: Sandworm Team's research of potential victim organizations included the identification and collection of employee information.[3] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1589.003 / Gather Victim Identity Information:Employee Names###Assistance: Silent Librarian has collected lists of names for individuals from targeted organizations.[4] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1590 / Gather Victim Network Information###Assistance: HAFNIUM gathered the fully qualified domain names (FQDNs) for targeted Exchange servers in the victim's environment.[4] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1590.001 / Gather Victim Network Information:Domain Properties###Assistance: AADInternals can gather information about a tenant’s domains using public Microsoft APIs.[6][7] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1590.001 / Gather Victim Network Information:Domain Properties###Assistance: Sandworm Team conducted technical reconnaissance of the Parliament of Georgia's official internet domain prior to its 2019 attack.[8] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1590.004 / Gather Victim Network Information:Network Topology###Assistance: FIN13 has searched for infrastructure that can provide remote access to an environment for targeting efforts.[2] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1590.005 / Gather Victim Network Information:IP Addresses###Assistance: Andariel has limited its watering hole attacks to specific IP address ranges.[4] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1590.005 / Gather Victim Network Information:IP Addresses###Assistance: HAFNIUM has obtained IP addresses for publicly-accessible Exchange servers.[5] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1590.005 / Gather Victim Network Information:IP Addresses###Assistance: Magic Hound has captured the IP addresses of visitors to their phishing sites.[6] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1591 / Gather Victim Org Information###Assistance: Kimsuky has collected victim organization information including but not limited to organization hierarchy, functions, press releases, and others.[3] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1591 / Gather Victim Org Information###Assistance: Lazarus Group has studied publicly available information about a targeted organization to tailor spearphishing efforts against specific departments and/or individuals.[4] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1591 / Gather Victim Org Information###Assistance: For Operation Dream Job, Lazarus Group gathered victim organization information to identify specific targets.[5] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1591.001 / Gather Victim Org Information:Determine Physical Locations###Assistance: Magic Hound has collected location information from visitors to their phishing sites.[3] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1591.002 / Gather Victim Org Information:Business Relationships###Assistance: Dragonfly has collected open source information to identify relationships between organizations for targeting purposes.[2] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1591.002 / Gather Victim Org Information:Business Relationships###Assistance: LAPSUS$ has gathered detailed knowledge of an organization's supply chain relationships.[3] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1591.002 / Gather Victim Org Information:Business Relationships###Assistance: In preparation for its attack against the 2018 Winter Olympics, Sandworm Team conducted online research of partner organizations listed on an official PyeongChang Olympics partnership site.[4] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1591.004 / Gather Victim Org Information:Identify Roles###Assistance: HEXANE has identified executives, HR, and IT staff at victim organizations for further targeting.[2][3] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1591.004 / Gather Victim Org Information:Identify Roles###Assistance: LAPSUS$ has gathered detailed knowledge of team structures within a target organization.[4] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1591.004 / Gather Victim Org Information:Identify Roles###Assistance: During Operation Dream Job, Lazarus Group targeted specific individuals within an organization with tailored job vacancy announcements.[5][6] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1598 / Phishing for Information###Assistance: APT28 has used spearphishing to compromise credentials.[11][12] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1598 / Phishing for Information###Assistance: Scattered Spider has used a combination of credential phishing and social engineering to capture one-time-password (OTP) codes.[13] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1598 / Phishing for Information###Assistance: ZIRCONIUM targeted presidential campaign staffers with credential phishing e-mails.[14] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1598.001 / Phishing for Information:Spearphishing Service###Assistance: During C0027, Scattered Spider sent Telegram messages impersonating IT personnel to harvest credentials.[2] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1598.002 / Phishing for Information:Spearphishing Attachment###Assistance: Dragonfly has used spearphishing with Microsoft Office attachments to enable harvesting of user credentials.[3] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1598.002 / Phishing for Information:Spearphishing Attachment###Assistance: SideCopy has crafted generic lures for spam campaigns to collect emails and credentials for targeting efforts.[4] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1598.002 / Phishing for Information:Spearphishing Attachment###Assistance: Sidewinder has sent e-mails with malicious attachments that lead victims to credential harvesting websites.[5][6][7] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1598.003 / Phishing for Information:Spearphishing Link###Assistance: AADInternals can send phishing emails containing malicious links designed to collect users’ credentials.[8] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1598.003 / Phishing for Information:Spearphishing Link###Assistance: APT28 has conducted credential phishing campaigns with embedded links to attacker-controlled domains.[9] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1598.003 / Phishing for Information:Spearphishing Link###Assistance: APT32 has used malicious links to direct users to web pages designed to harvest credentials.[10] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1598.003 / Phishing for Information:Spearphishing Link###Assistance: Dragonfly has used spearphishing with PDF attachments containing malicious links that redirected to credential harvesting websites.[11] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1598.003 / Phishing for Information:Spearphishing Link###Assistance: Kimsuky has used links in e-mail to steal account information.[12][13][14] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1598.003 / Phishing for Information:Spearphishing Link###Assistance: Magic Hound has used SMS and email messages with links designed to steal credentials or track victims.[15][16][17][18][19][20] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1598.003 / Phishing for Information:Spearphishing Link###Assistance: Mustang Panda has delivered web bugs to profile their intended targets.[21] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1598.003 / Phishing for Information:Spearphishing Link###Assistance: Patchwork has used embedded image tags (known as web bugs) with unique, per-recipient tracking links in their emails for the purpose of identifying which recipients opened messages.[22] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1598.003 / Phishing for Information:Spearphishing Link###Assistance: Sandworm Team has crafted spearphishing emails with hyperlinks designed to trick unwitting recipients into revealing their account credentials.[23] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1598.003 / Phishing for Information:Spearphishing Link###Assistance: Sidewinder has sent e-mails with malicious links to credential harvesting websites.[24] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1598.003 / Phishing for Information:Spearphishing Link###Assistance: Silent Librarian has used links in e-mails to direct victims to credential harvesting websites designed to appear like the targeted organization's login page.[25][26][27][28][29][30] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1598.003 / Phishing for Information:Spearphishing Link###Assistance: SMOKEDHAM has been delivered via malicious links in phishing emails.[31] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1598.003 / Phishing for Information:Spearphishing Link###Assistance: ZIRCONIUM has used web beacons in e-mails to track hits to attacker-controlled URL's.[32] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1598.004 / Phishing for Information:Spearphishing Voice###Assistance: During C0027, Scattered Spider used phone calls to instruct victims to navigate to credential-harvesting websites.[3] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1598.004 / Phishing for Information:Spearphishing Voice###Assistance: LAPSUS$ has called victims' help desk to convince the support personnel to reset a privileged account’s credentials.[4] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1597 / Search Closed Sources###Assistance: EXOTIC LILY has searched for information on targeted individuals on business databases including RocketReach and CrunchBase.[3] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1597.002 / Search Closed Sources:Purchase Technical Data###Assistance: LAPSUS$ has purchased credentials and session tokens from criminal underground forums.[2] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1593 / Search Open Websites/Domains###Assistance: Sandworm Team researched Ukraine's unique legal entity identifier (called an "EDRPOU" number), including running queries on the EDRPOU website, in preparation for the NotPetya attack. Sandworm Team has also researched third-party websites to help it craft credible spearphishing emails.[4] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1593.001 / Search Open Websites/Domains:Social Media###Assistance: EXOTIC LILY has copied data from social media sites to impersonate targeted individuals.[2] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1593.001 / Search Open Websites/Domains:Social Media###Assistance: Kimsuky has used Twitter to monitor potential victims and to prepare targeted phishing e-mails.[3] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1593.001 / Search Open Websites/Domains:Social Media###Assistance: For Operation Dream Job, Lazarus Group used LinkedIn to identify and target employees within a chosen organization.[4] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1593.002 / Search Open Websites/Domains:Search Engines###Assistance: Kimsuky has searched for vulnerabilities, tools, and geopolitical trends on Google to target victims.[3] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1593.003 / Search Open Websites/Domains:Code Repositories###Assistance: LAPSUS$ has searched public code repositories for exposed credentials.[2] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1594 / Search Victim-Owned Websites###Assistance: EXOTIC LILY has used contact forms on victim websites to generate phishing e-mails.[2] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1594 / Search Victim-Owned Websites###Assistance: Kimsuky has searched for information on the target company's website.[3] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1594 / Search Victim-Owned Websites###Assistance: Sandworm Team has conducted research against potential victim websites as part of its operational planning.[4] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1594 / Search Victim-Owned Websites###Assistance: Silent Librarian has searched victim's websites to identify the interests and academic areas of targeted individuals and to scrape source code, branding, and organizational contact information for phishing pages.[5][6][7] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1583.001 / Acquire Infrastructure:Domains###Assistance: APT1 has registered hundreds of domains for use in operations.[13] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1583.001 / Acquire Infrastructure:Domains###Assistance: APT28 registered domains imitating NATO, OSCE security websites, Caucasus information resources, and other organizations.[2][14][15] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1583.001 / Acquire Infrastructure:Domains###Assistance: APT32 has set up and operated websites to gather information and deliver malware.[16] |
### Human: Give me a procedure of MITRE ATT&CK Technique ID: T1583.001 / Acquire Infrastructure:Domains###Assistance: BITTER has registered a variety of domains to host malicious payloads and for C2.[17] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.