Description
stringlengths
207
4.68k
Domains
stringclasses
2 values
Name
stringlengths
2
57
References
stringlengths
97
4.83k
Kill Chain
stringclasses
14 values
Platforms
stringclasses
10 values
Adversaries may target user email on local systems to collect sensitive information. Files containing email data can be acquired from a user’s local system, such as Outlook storage or cache files. Outlook stores data locally in offline data files with an extension of .ost. Outlook 2010 and later supports .ost file sizes up to 50GB, while earlier versions of Outlook support up to 20GB.(Citation: Outlook File Sizes) IMAP accounts in Outlook 2013 (and earlier) and POP accounts use Outlook Data Files (.pst) as opposed to .ost, whereas IMAP accounts in Outlook 2016 (and later) use .ost files. Both types of Outlook data files are typically stored in `C:\Users\<username>\Documents\Outlook Files` or `C:\Users\<username>\AppData\Local\Microsoft\Outlook`.(Citation: Microsoft Outlook Files)
enterprise-attack
Local Email Collection
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1114/001 external_id: T1114.001 source_name: Outlook File Sizes description: N. O'Bryan. (2018, May 30). Managing Outlook Cached Mode and OST File Sizes. Retrieved February 19, 2020. url: https://practical365.com/clients/office-365-proplus/outlook-cached-mode-ost-file-sizes/ source_name: Microsoft Outlook Files description: Microsoft. (n.d.). Introduction to Outlook Data Files (.pst and .ost). Retrieved February 19, 2020. url: https://support.office.com/en-us/article/introduction-to-outlook-data-files-pst-and-ost-222eaf92-a995-45d9-bde2-f331f60e2790
kill_chain_name: mitre-attack phase_name: collection
Windows
Adversaries may acquire credentials from Keychain. Keychain (or Keychain Services) is the macOS credential management system that stores account names, passwords, private keys, certificates, sensitive application data, payment data, and secure notes. There are three types of Keychains: Login Keychain, System Keychain, and Local Items (iCloud) Keychain. The default Keychain is the Login Keychain, which stores user passwords and information. The System Keychain stores items accessed by the operating system, such as items shared among users on a host. The Local Items (iCloud) Keychain is used for items synced with Apple’s iCloud service. Keychains can be viewed and edited through the Keychain Access application or using the command-line utility <code>security</code>. Keychain files are located in <code>~/Library/Keychains/</code>, <code>/Library/Keychains/</code>, and <code>/Network/Library/Keychains/</code>.(Citation: Keychain Services Apple)(Citation: Keychain Decryption Passware)(Citation: OSX Keychain Schaumann) Adversaries may gather user credentials from Keychain storage/memory. For example, the command <code>security dump-keychain –d</code> will dump all Login Keychain credentials from <code>~/Library/Keychains/login.keychain-db</code>. Adversaries may also directly read Login Keychain credentials from the <code>~/Library/Keychains/login.keychain</code> file. Both methods require a password, where the default password for the Login Keychain is the current user’s password to login to the macOS host.(Citation: External to DA, the OS X Way)(Citation: Empire Keychain Decrypt)
enterprise-attack
Keychain
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1555/001 external_id: T1555.001 source_name: External to DA, the OS X Way description: Alex Rymdeko-Harvey, Steve Borosh. (2016, May 14). External to DA, the OS X Way. Retrieved July 3, 2017. url: http://www.slideshare.net/StephanBorosh/external-to-da-the-os-x-way source_name: Keychain Services Apple description: Apple. (n.d.). Keychain Services. Retrieved April 11, 2022. url: https://developer.apple.com/documentation/security/keychain_services source_name: Empire Keychain Decrypt description: Empire. (2018, March 8). Empire keychaindump_decrypt Module. Retrieved April 14, 2022. url: https://github.com/EmpireProject/Empire/blob/08cbd274bef78243d7a8ed6443b8364acd1fc48b/lib/modules/python/collection/osx/keychaindump_decrypt.py source_name: OSX Keychain Schaumann description: Jan Schaumann. (2015, November 5). Using the OS X Keychain to store and retrieve passwords. Retrieved March 31, 2022. url: https://www.netmeister.org/blog/keychain-passwords.html source_name: Keychain Decryption Passware description: Yana Gourenko. (n.d.). A Deep Dive into Apple Keychain Decryption. Retrieved April 13, 2022. url: https://support.passware.com/hc/en-us/articles/4573379868567-A-Deep-Dive-into-Apple-Keychain-Decryption
kill_chain_name: mitre-attack phase_name: credential-access
macOS
Adversaries may configure system settings to automatically execute a program during system boot or logon to maintain persistence or gain higher-level privileges on compromised systems. Operating systems may have mechanisms for automatically running a program on system boot or account logon.(Citation: Microsoft Run Key)(Citation: MSDN Authentication Packages)(Citation: Microsoft TimeProvider)(Citation: Cylance Reg Persistence Sept 2013)(Citation: Linux Kernel Programming) These mechanisms may include automatically executing programs that are placed in specially designated directories or are referenced by repositories that store configuration information, such as the Windows Registry. An adversary may achieve the same goal by modifying or extending features of the kernel. Since some boot or logon autostart programs run with higher privileges, an adversary may leverage these to elevate privileges.
enterprise-attack
Boot or Logon Autostart Execution
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1547 external_id: T1547 source_name: Cylance Reg Persistence Sept 2013 description: Langendorf, S. (2013, September 24). Windows Registry Persistence, Part 2: The Run Keys and Search-Order. Retrieved April 11, 2018. url: https://blog.cylance.com/windows-registry-persistence-part-2-the-run-keys-and-search-order source_name: MSDN Authentication Packages description: Microsoft. (n.d.). Authentication Packages. Retrieved March 1, 2017. url: https://msdn.microsoft.com/library/windows/desktop/aa374733.aspx source_name: Microsoft Run Key description: Microsoft. (n.d.). Run and RunOnce Registry Keys. Retrieved November 12, 2014. url: http://msdn.microsoft.com/en-us/library/aa376977 source_name: Microsoft TimeProvider description: Microsoft. (n.d.). Time Provider. Retrieved March 26, 2018. url: https://msdn.microsoft.com/library/windows/desktop/ms725475.aspx source_name: Linux Kernel Programming description: Pomerantz, O., Salzman, P.. (2003, April 4). The Linux Kernel Module Programming Guide. Retrieved April 6, 2018. url: https://www.tldp.org/LDP/lkmpg/2.4/lkmpg.pdf source_name: TechNet Autoruns description: Russinovich, M. (2016, January 4). Autoruns for Windows v13.51. Retrieved June 6, 2016. url: https://technet.microsoft.com/en-us/sysinternals/bb963902
kill_chain_name: mitre-attack phase_name: privilege-escalation
Linux
Adversaries with SYSTEM access to a host may attempt to access Local Security Authority (LSA) secrets, which can contain a variety of different credential materials, such as credentials for service accounts.(Citation: Passcape LSA Secrets)(Citation: Microsoft AD Admin Tier Model)(Citation: Tilbury Windows Credentials) LSA secrets are stored in the registry at <code>HKEY_LOCAL_MACHINE\SECURITY\Policy\Secrets</code>. LSA secrets can also be dumped from memory.(Citation: ired Dumping LSA Secrets) [Reg](https://attack.mitre.org/software/S0075) can be used to extract from the Registry. [Mimikatz](https://attack.mitre.org/software/S0002) can be used to extract secrets from memory.(Citation: ired Dumping LSA Secrets)
enterprise-attack
LSA Secrets
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1003/004 external_id: T1003.004 source_name: Passcape LSA Secrets description: Passcape. (n.d.). Windows LSA secrets. Retrieved February 21, 2020. url: https://www.passcape.com/index.php?section=docsys&cmd=details&id=23 source_name: Microsoft AD Admin Tier Model description: Microsoft. (2019, February 14). Active Directory administrative tier model. Retrieved February 21, 2020. url: https://docs.microsoft.com/en-us/windows-server/identity/securing-privileged-access/securing-privileged-access-reference-material?redirectedfrom=MSDN source_name: Tilbury Windows Credentials description: Chad Tilbury. (2017, August 8). 1Windows Credentials: Attack, Mitigation, Defense. Retrieved February 21, 2020. url: https://www.first.org/resources/papers/conf2017/Windows-Credentials-Attacks-and-Mitigation-Techniques.pdf source_name: ired Dumping LSA Secrets description: Mantvydas Baranauskas. (2019, November 16). Dumping LSA Secrets. Retrieved February 21, 2020. url: https://ired.team/offensive-security/credential-access-and-credential-dumping/dumping-lsa-secrets source_name: Powersploit description: PowerSploit. (n.d.). Retrieved December 4, 2014. url: https://github.com/mattifestation/PowerSploit
kill_chain_name: mitre-attack phase_name: credential-access
Windows
Adversaries may compromise a network device’s encryption capability in order to bypass encryption that would otherwise protect data communications. (Citation: Cisco Synful Knock Evolution) Encryption can be used to protect transmitted network traffic to maintain its confidentiality (protect against unauthorized disclosure) and integrity (protect against unauthorized changes). Encryption ciphers are used to convert a plaintext message to ciphertext and can be computationally intensive to decipher without the associated decryption key. Typically, longer keys increase the cost of cryptanalysis, or decryption without the key. Adversaries can compromise and manipulate devices that perform encryption of network traffic. For example, through behaviors such as [Modify System Image](https://attack.mitre.org/techniques/T1601), [Reduce Key Space](https://attack.mitre.org/techniques/T1600/001), and [Disable Crypto Hardware](https://attack.mitre.org/techniques/T1600/002), an adversary can negatively effect and/or eliminate a device’s ability to securely encrypt network traffic. This poses a greater risk of unauthorized disclosure and may help facilitate data manipulation, Credential Access, or Collection efforts. (Citation: Cisco Blog Legacy Device Attacks)
enterprise-attack
Weaken Encryption
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1600 external_id: T1600 source_name: Cisco Synful Knock Evolution description: Graham Holmes. (2015, October 8). Evolution of attacks on Cisco IOS devices. Retrieved October 19, 2020. url: https://blogs.cisco.com/security/evolution-of-attacks-on-cisco-ios-devices source_name: Cisco Blog Legacy Device Attacks description: Omar Santos. (2020, October 19). Attackers Continue to Target Legacy Devices. Retrieved October 20, 2020. url: https://community.cisco.com/t5/security-blogs/attackers-continue-to-target-legacy-devices/ba-p/4169954
kill_chain_name: mitre-attack phase_name: defense-evasion
Network
An adversary may forge SAML tokens with any permissions claims and lifetimes if they possess a valid SAML token-signing certificate.(Citation: Microsoft SolarWinds Steps) The default lifetime of a SAML token is one hour, but the validity period can be specified in the <code>NotOnOrAfter</code> value of the <code>conditions ...</code> element in a token. This value can be changed using the <code>AccessTokenLifetime</code> in a <code>LifetimeTokenPolicy</code>.(Citation: Microsoft SAML Token Lifetimes) Forged SAML tokens enable adversaries to authenticate across services that use SAML 2.0 as an SSO (single sign-on) mechanism.(Citation: Cyberark Golden SAML) An adversary may utilize [Private Keys](https://attack.mitre.org/techniques/T1552/004) to compromise an organization's token-signing certificate to create forged SAML tokens. If the adversary has sufficient permissions to establish a new federation trust with their own Active Directory Federation Services (AD FS) server, they may instead generate their own trusted token-signing certificate.(Citation: Microsoft SolarWinds Customer Guidance) This differs from [Steal Application Access Token](https://attack.mitre.org/techniques/T1528) and other similar behaviors in that the tokens are new and forged by the adversary, rather than stolen or intercepted from legitimate users. An adversary may gain administrative Azure AD privileges if a SAML token is forged which claims to represent a highly privileged account. This may lead to [Use Alternate Authentication Material](https://attack.mitre.org/techniques/T1550), which may bypass multi-factor and other authentication protection mechanisms.(Citation: Microsoft SolarWinds Customer Guidance)
enterprise-attack
SAML Tokens
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1606/002 external_id: T1606.002 source_name: Microsoft SolarWinds Steps description: Lambert, J. (2020, December 13). Important steps for customers to protect themselves from recent nation-state cyberattacks. Retrieved December 17, 2020. url: https://blogs.microsoft.com/on-the-issues/2020/12/13/customers-protect-nation-state-cyberattacks/ source_name: Microsoft SAML Token Lifetimes description: Microsoft. (2020, December 14). Configurable token lifetimes in Microsoft Identity Platform. Retrieved December 22, 2020. url: https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-configurable-token-lifetimes source_name: Microsoft SolarWinds Customer Guidance description: MSRC. (2020, December 13). Customer Guidance on Recent Nation-State Cyber Attacks. Retrieved December 17, 2020. url: https://msrc-blog.microsoft.com/2020/12/13/customer-guidance-on-recent-nation-state-cyber-attacks/ source_name: Cyberark Golden SAML description: Reiner, S. (2017, November 21). Golden SAML: Newly Discovered Attack Technique Forges Authentication to Cloud Apps. Retrieved December 17, 2020. url: https://www.cyberark.com/resources/threat-research-blog/golden-saml-newly-discovered-attack-technique-forges-authentication-to-cloud-apps source_name: Sygnia Golden SAML description: Sygnia. (2020, December). Detection and Hunting of Golden SAML Attack. Retrieved January 6, 2021. url: https://www.sygnia.co/golden-saml-advisory
kill_chain_name: mitre-attack phase_name: credential-access
Azure AD
Adversaries may masquerade malicious payloads as legitimate files through changes to the payload's formatting, including the file’s signature, extension, and contents. Various file types have a typical standard format, including how they are encoded and organized. For example, a file’s signature (also known as header or magic bytes) is the beginning bytes of a file and is often used to identify the file’s type. For example, the header of a JPEG file, is <code> 0xFF 0xD8</code> and the file extension is either `.JPE`, `.JPEG` or `.JPG`. Adversaries may edit the header’s hex code and/or the file extension of a malicious payload in order to bypass file validation checks and/or input sanitization. This behavior is commonly used when payload files are transferred (e.g., [Ingress Tool Transfer](https://attack.mitre.org/techniques/T1105)) and stored (e.g., [Upload Malware](https://attack.mitre.org/techniques/T1608/001)) so that adversaries may move their malware without triggering detections. Common non-executable file types and extensions, such as text files (`.txt`) and image files (`.jpg`, `.gif`, etc.) may be typically treated as benign. Based on this, adversaries may use a file extension to disguise malware, such as naming a PHP backdoor code with a file name of <code>test.gif</code>. A user may not know that a file is malicious due to the benign appearance and file extension. Polygot files, which are files that have multiple different file types and that function differently based on the application that will execute them, may also be used to disguise malicious malware and capabilities.(Citation: polygot_icedID)
enterprise-attack
Masquerade File Type
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1036/008 external_id: T1036.008 source_name: polygot_icedID description: Lim, M. (2022, September 27). More Than Meets the Eye: Exposing a Polyglot File That Delivers IcedID. Retrieved September 29, 2022. url: https://unit42.paloaltonetworks.com/polyglot-file-icedid-payload
kill_chain_name: mitre-attack phase_name: defense-evasion
Linux
Adversaries may stop or disable services on a system to render those services unavailable to legitimate users. Stopping critical services or processes can inhibit or stop response to an incident or aid in the adversary's overall objectives to cause damage to the environment.(Citation: Talos Olympic Destroyer 2018)(Citation: Novetta Blockbuster) Adversaries may accomplish this by disabling individual services of high importance to an organization, such as <code>MSExchangeIS</code>, which will make Exchange content inaccessible (Citation: Novetta Blockbuster). In some cases, adversaries may stop or disable many or all services to render systems unusable.(Citation: Talos Olympic Destroyer 2018) Services or processes may not allow for modification of their data stores while running. Adversaries may stop services or processes in order to conduct [Data Destruction](https://attack.mitre.org/techniques/T1485) or [Data Encrypted for Impact](https://attack.mitre.org/techniques/T1486) on the data stores of services like Exchange and SQL Server.(Citation: SecureWorks WannaCry Analysis)
enterprise-attack
Service Stop
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1489 external_id: T1489 source_name: SecureWorks WannaCry Analysis description: Counter Threat Unit Research Team. (2017, May 18). WCry Ransomware Analysis. Retrieved March 26, 2019. url: https://www.secureworks.com/research/wcry-ransomware-analysis source_name: Talos Olympic Destroyer 2018 description: Mercer, W. and Rascagneres, P. (2018, February 12). Olympic Destroyer Takes Aim At Winter Olympics. Retrieved March 14, 2019. url: https://blog.talosintelligence.com/2018/02/olympic-destroyer.html source_name: Novetta Blockbuster description: Novetta Threat Research Group. (2016, February 24). Operation Blockbuster: Unraveling the Long Thread of the Sony Attack. Retrieved February 25, 2016. url: https://web.archive.org/web/20160226161828/https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Report.pdf
kill_chain_name: mitre-attack phase_name: impact
Windows
Adversaries may develop malware and malware components that can be used during targeting. Building malicious software can include the development of payloads, droppers, post-compromise tools, backdoors (including backdoored images), packers, C2 protocols, and the creation of infected removable media. Adversaries may develop malware to support their operations, creating a means for maintaining control of remote machines, evading defenses, and executing post-compromise behaviors.(Citation: Mandiant APT1)(Citation: Kaspersky Sofacy)(Citation: ActiveMalwareEnergy)(Citation: FBI Flash FIN7 USB) As with legitimate development efforts, different skill sets may be required for developing malware. The skills needed may be located in-house, or may need to be contracted out. Use of a contractor may be considered an extension of that adversary's malware development capabilities, provided the adversary plays a role in shaping requirements and maintains a degree of exclusivity to the malware. Some aspects of malware development, such as C2 protocol development, may require adversaries to obtain additional infrastructure. For example, malware developed that will communicate with Twitter for C2, may require use of [Web Services](https://attack.mitre.org/techniques/T1583/006).(Citation: FireEye APT29)
enterprise-attack
Malware
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1587/001 external_id: T1587.001 source_name: Mandiant APT1 description: Mandiant. (n.d.). APT1 Exposing One of China’s Cyber Espionage Units. Retrieved July 18, 2016. url: https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf source_name: Kaspersky Sofacy description: Kaspersky Lab's Global Research and Analysis Team. (2015, December 4). Sofacy APT hits high profile targets with updated toolset. Retrieved December 10, 2015. url: https://securelist.com/sofacy-apt-hits-high-profile-targets-with-updated-toolset/72924/ source_name: ActiveMalwareEnergy description: Dan Goodin. (2014, June 30). Active malware operation let attackers sabotage US energy industry. Retrieved March 9, 2017. url: https://arstechnica.com/information-technology/2014/06/active-malware-operation-let-attackers-sabotage-us-energy-industry/ source_name: FBI Flash FIN7 USB description: The Record. (2022, January 7). FBI: FIN7 hackers target US companies with BadUSB devices to install ransomware. Retrieved January 14, 2022. url: https://therecord.media/fbi-fin7-hackers-target-us-companies-with-badusb-devices-to-install-ransomware/ source_name: FireEye APT29 description: FireEye Labs. (2015, July). HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group. Retrieved September 17, 2015. url: https://www2.fireeye.com/rs/848-DID-242/images/rpt-apt29-hammertoss.pdf
kill_chain_name: mitre-attack phase_name: resource-development
PRE
Adversaries may attempt to enumerate local device drivers on a victim host. Information about device drivers may highlight various insights that shape follow-on behaviors, such as the function/purpose of the host, present security tools (i.e. [Security Software Discovery](https://attack.mitre.org/techniques/T1518/001)) or other defenses (e.g., [Virtualization/Sandbox Evasion](https://attack.mitre.org/techniques/T1497)), as well as potential exploitable vulnerabilities (e.g., [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068)). Many OS utilities may provide information about local device drivers, such as `driverquery.exe` and the `EnumDeviceDrivers()` API function on Windows.(Citation: Microsoft Driverquery)(Citation: Microsoft EnumDeviceDrivers) Information about device drivers (as well as associated services, i.e., [System Service Discovery](https://attack.mitre.org/techniques/T1007)) may also be available in the Registry.(Citation: Microsoft Registry Drivers) On Linux/macOS, device drivers (in the form of kernel modules) may be visible within `/dev` or using utilities such as `lsmod` and `modinfo`.(Citation: Linux Kernel Programming)(Citation: lsmod man)(Citation: modinfo man)
enterprise-attack
Device Driver Discovery
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1652 external_id: T1652 source_name: lsmod man description: Kerrisk, M. (2022, December 18). lsmod(8) — Linux manual page. Retrieved March 28, 2023. url: https://man7.org/linux/man-pages/man8/lsmod.8.html source_name: Microsoft Registry Drivers description: Microsoft. (2021, December 14). Registry Trees for Devices and Drivers. Retrieved March 28, 2023. url: https://learn.microsoft.com/windows-hardware/drivers/install/overview-of-registry-trees-and-keys source_name: Microsoft EnumDeviceDrivers description: Microsoft. (2021, October 12). EnumDeviceDrivers function (psapi.h). Retrieved March 28, 2023. url: https://learn.microsoft.com/windows/win32/api/psapi/nf-psapi-enumdevicedrivers source_name: Microsoft Driverquery description: Microsoft. (n.d.). driverquery. Retrieved March 28, 2023. url: https://learn.microsoft.com/windows-server/administration/windows-commands/driverquery source_name: Linux Kernel Programming description: Pomerantz, O., Salzman, P.. (2003, April 4). The Linux Kernel Module Programming Guide. Retrieved April 6, 2018. url: https://www.tldp.org/LDP/lkmpg/2.4/lkmpg.pdf source_name: modinfo man description: Russell, R. (n.d.). modinfo(8) - Linux man page. Retrieved March 28, 2023. url: https://linux.die.net/man/8/modinfo
kill_chain_name: mitre-attack phase_name: discovery
Linux
Adversaries may attempt to get a listing of domain accounts. This information can help adversaries determine which domain accounts exist to aid in follow-on behavior such as targeting specific accounts which possess particular privileges. Commands such as <code>net user /domain</code> and <code>net group /domain</code> of the [Net](https://attack.mitre.org/software/S0039) utility, <code>dscacheutil -q group</code>on macOS, and <code>ldapsearch</code> on Linux can list domain users and groups. [PowerShell](https://attack.mitre.org/techniques/T1059/001) cmdlets including <code>Get-ADUser</code> and <code>Get-ADGroupMember</code> may enumerate members of Active Directory groups.(Citation: CrowdStrike StellarParticle January 2022)
enterprise-attack
Domain Account
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1087/002 external_id: T1087.002 source_name: CrowdStrike StellarParticle January 2022 description: CrowdStrike. (2022, January 27). Early Bird Catches the Wormhole: Observations from the StellarParticle Campaign. Retrieved February 7, 2022. url: https://www.crowdstrike.com/blog/observations-from-the-stellarparticle-campaign/
kill_chain_name: mitre-attack phase_name: discovery
Linux
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine. Active Setup is a Windows mechanism that is used to execute programs when a user logs in. The value stored in the Registry key will be executed after a user logs into the computer.(Citation: Klein Active Setup 2010) These programs will be executed under the context of the user and will have the account's associated permissions level. Adversaries may abuse Active Setup by creating a key under <code> HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\</code> and setting a malicious value for <code>StubPath</code>. This value will serve as the program that will be executed when a user logs into the computer.(Citation: Mandiant Glyer APT 2010)(Citation: Citizenlab Packrat 2015)(Citation: FireEye CFR Watering Hole 2012)(Citation: SECURELIST Bright Star 2015)(Citation: paloalto Tropic Trooper 2016) Adversaries can abuse these components to execute malware, such as remote access tools, to maintain persistence through system reboots. Adversaries may also use [Masquerading](https://attack.mitre.org/techniques/T1036) to make the Registry entries look as if they are associated with legitimate programs.
enterprise-attack
Active Setup
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1547/014 external_id: T1547.014 source_name: SECURELIST Bright Star 2015 description: Baumgartner, K., Guerrero-Saade, J. (2015, March 4). Who’s Really Spreading through the Bright Star?. Retrieved December 18, 2020. url: https://securelist.com/whos-really-spreading-through-the-bright-star/68978/ source_name: Mandiant Glyer APT 2010 description: Glyer, C. (2010). Examples of Recent APT Persistence Mechanism. Retrieved December 18, 2020. url: https://digital-forensics.sans.org/summit-archives/2010/35-glyer-apt-persistence-mechanisms.pdf source_name: FireEye CFR Watering Hole 2012 description: Kindlund, D. (2012, December 30). CFR Watering Hole Attack Details. Retrieved December 18, 2020. url: https://www.fireeye.com/blog/threat-research/2012/12/council-foreign-relations-water-hole-attack-details.html source_name: Klein Active Setup 2010 description: Klein, H. (2010, April 22). Active Setup Explained. Retrieved December 18, 2020. url: https://helgeklein.com/blog/2010/04/active-setup-explained/ source_name: paloalto Tropic Trooper 2016 description: Ray, V., et al. (2016, November 22). Tropic Trooper Targets Taiwanese Government and Fossil Fuel Provider With Poison Ivy. Retrieved December 18, 2020. url: https://unit42.paloaltonetworks.com/unit42-tropic-trooper-targets-taiwanese-government-and-fossil-fuel-provider-with-poison-ivy/ source_name: TechNet Autoruns description: Russinovich, M. (2016, January 4). Autoruns for Windows v13.51. Retrieved June 6, 2016. url: https://technet.microsoft.com/en-us/sysinternals/bb963902 source_name: Citizenlab Packrat 2015 description: Scott-Railton, J., et al. (2015, December 8). Packrat. Retrieved December 18, 2020. url: https://citizenlab.ca/2015/12/packrat-report/
kill_chain_name: mitre-attack phase_name: privilege-escalation
Windows
Adversaries may attempt to hide artifacts associated with their behaviors to evade detection. Operating systems may have features to hide various artifacts, such as important system files and administrative task execution, to avoid disrupting user work environments and prevent users from changing files or features on the system. Adversaries may abuse these features to hide artifacts such as files, directories, user accounts, or other system activity to evade detection.(Citation: Sofacy Komplex Trojan)(Citation: Cybereason OSX Pirrit)(Citation: MalwareBytes ADS July 2015) Adversaries may also attempt to hide artifacts associated with malicious behavior by creating computing regions that are isolated from common security instrumentation, such as through the use of virtualization technology.(Citation: Sophos Ragnar May 2020)
enterprise-attack
Hide Artifacts
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1564 external_id: T1564 source_name: Cybereason OSX Pirrit description: Amit Serper. (2016). Cybereason Lab Analysis OSX.Pirrit. Retrieved December 10, 2021. url: https://cdn2.hubspot.net/hubfs/3354902/Content%20PDFs/Cybereason-Lab-Analysis-OSX-Pirrit-4-6-16.pdf source_name: MalwareBytes ADS July 2015 description: Arntz, P. (2015, July 22). Introduction to Alternate Data Streams. Retrieved March 21, 2018. url: https://blog.malwarebytes.com/101/2015/07/introduction-to-alternate-data-streams/ source_name: Sofacy Komplex Trojan description: Dani Creus, Tyler Halfpop, Robert Falcone. (2016, September 26). Sofacy's 'Komplex' OS X Trojan. Retrieved July 8, 2017. url: https://researchcenter.paloaltonetworks.com/2016/09/unit42-sofacys-komplex-os-x-trojan/ source_name: Sophos Ragnar May 2020 description: SophosLabs. (2020, May 21). Ragnar Locker ransomware deploys virtual machine to dodge security. Retrieved June 29, 2020. url: https://news.sophos.com/en-us/2020/05/21/ragnar-locker-ransomware-deploys-virtual-machine-to-dodge-security/
kill_chain_name: mitre-attack phase_name: defense-evasion
Linux
Adversaries may use Windows Dynamic Data Exchange (DDE) to execute arbitrary commands. DDE is a client-server protocol for one-time and/or continuous inter-process communication (IPC) between applications. Once a link is established, applications can autonomously exchange transactions consisting of strings, warm data links (notifications when a data item changes), hot data links (duplications of changes to a data item), and requests for command execution. Object Linking and Embedding (OLE), or the ability to link data between documents, was originally implemented through DDE. Despite being superseded by [Component Object Model](https://attack.mitre.org/techniques/T1559/001), DDE may be enabled in Windows 10 and most of Microsoft Office 2016 via Registry keys.(Citation: BleepingComputer DDE Disabled in Word Dec 2017)(Citation: Microsoft ADV170021 Dec 2017)(Citation: Microsoft DDE Advisory Nov 2017) Microsoft Office documents can be poisoned with DDE commands, directly or through embedded files, and used to deliver execution via [Phishing](https://attack.mitre.org/techniques/T1566) campaigns or hosted Web content, avoiding the use of Visual Basic for Applications (VBA) macros.(Citation: SensePost PS DDE May 2016)(Citation: Kettle CSV DDE Aug 2014)(Citation: Enigma Reviving DDE Jan 2018)(Citation: SensePost MacroLess DDE Oct 2017) Similarly, adversaries may infect payloads to execute applications and/or commands on a victim device by way of embedding DDE formulas within a CSV file intended to be opened through a Windows spreadsheet program.(Citation: OWASP CSV Injection)(Citation: CSV Excel Macro Injection ) DDE could also be leveraged by an adversary operating on a compromised machine who does not have direct access to a [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059). DDE execution can be invoked remotely via [Remote Services](https://attack.mitre.org/techniques/T1021) such as [Distributed Component Object Model](https://attack.mitre.org/techniques/T1021/003) (DCOM).(Citation: Fireeye Hunting COM June 2019)
enterprise-attack
Dynamic Data Exchange
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1559/002 external_id: T1559.002 source_name: OWASP CSV Injection description: Albinowax Timo Goosen. (n.d.). CSV Injection. Retrieved February 7, 2022. url: https://owasp.org/www-community/attacks/CSV_Injection source_name: CSV Excel Macro Injection description: Ishaq Mohammed . (2021, January 10). Everything about CSV Injection and CSV Excel Macro Injection. Retrieved February 7, 2022. url: https://blog.securelayer7.net/how-to-perform-csv-excel-macro-injection/ source_name: BleepingComputer DDE Disabled in Word Dec 2017 description: Cimpanu, C. (2017, December 15). Microsoft Disables DDE Feature in Word to Prevent Further Malware Attacks. Retrieved December 19, 2017. url: https://www.bleepingcomputer.com/news/microsoft/microsoft-disables-dde-feature-in-word-to-prevent-further-malware-attacks/ source_name: SensePost PS DDE May 2016 description: El-Sherei, S. (2016, May 20). PowerShell, C-Sharp and DDE The Power Within. Retrieved November 22, 2017. url: https://sensepost.com/blog/2016/powershell-c-sharp-and-dde-the-power-within/ source_name: Fireeye Hunting COM June 2019 description: Hamilton, C. (2019, June 4). Hunting COM Objects. Retrieved June 10, 2019. url: https://www.fireeye.com/blog/threat-research/2019/06/hunting-com-objects.html source_name: Kettle CSV DDE Aug 2014 description: Kettle, J. (2014, August 29). Comma Separated Vulnerabilities. Retrieved November 22, 2017. url: https://www.contextis.com/blog/comma-separated-vulnerabilities source_name: Microsoft ADV170021 Dec 2017 description: Microsoft. (2017, December 12). ADV170021 - Microsoft Office Defense in Depth Update. Retrieved February 3, 2018. url: https://portal.msrc.microsoft.com/security-guidance/advisory/ADV170021 source_name: Microsoft DDE Advisory Nov 2017 description: Microsoft. (2017, November 8). Microsoft Security Advisory 4053440 - Securely opening Microsoft Office documents that contain Dynamic Data Exchange (DDE) fields. Retrieved November 21, 2017. url: https://technet.microsoft.com/library/security/4053440 source_name: Enigma Reviving DDE Jan 2018 description: Nelson, M. (2018, January 29). Reviving DDE: Using OneNote and Excel for Code Execution. Retrieved February 3, 2018. url: https://posts.specterops.io/reviving-dde-using-onenote-and-excel-for-code-execution-d7226864caee source_name: NVisio Labs DDE Detection Oct 2017 description: NVISO Labs. (2017, October 11). Detecting DDE in MS Office documents. Retrieved November 21, 2017. url: https://blog.nviso.be/2017/10/11/detecting-dde-in-ms-office-documents/ source_name: SensePost MacroLess DDE Oct 2017 description: Stalmans, E., El-Sherei, S. (2017, October 9). Macro-less Code Exec in MSWord. Retrieved November 21, 2017. url: https://sensepost.com/blog/2017/macro-less-code-exec-in-msword/
kill_chain_name: mitre-attack phase_name: execution
Windows
An adversary may rely upon a user opening a malicious file in order to gain execution. Users may be subjected to social engineering to get them to open a file that will lead to code execution. This user action will typically be observed as follow-on behavior from [Spearphishing Attachment](https://attack.mitre.org/techniques/T1566/001). Adversaries may use several types of files that require a user to execute them, including .doc, .pdf, .xls, .rtf, .scr, .exe, .lnk, .pif, and .cpl. Adversaries may employ various forms of [Masquerading](https://attack.mitre.org/techniques/T1036) and [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1027) to increase the likelihood that a user will open and successfully execute a malicious file. These methods may include using a familiar naming convention and/or password protecting the file and supplying instructions to a user on how to open it.(Citation: Password Protected Word Docs) While [Malicious File](https://attack.mitre.org/techniques/T1204/002) frequently occurs shortly after Initial Access it may occur at other phases of an intrusion, such as when an adversary places a file in a shared directory or on a user's desktop hoping that a user will click on it. This activity may also be seen shortly after [Internal Spearphishing](https://attack.mitre.org/techniques/T1534).
enterprise-attack
Malicious File
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1204/002 external_id: T1204.002 source_name: Password Protected Word Docs description: Lawrence Abrams. (2017, July 12). PSA: Don't Open SPAM Containing Password Protected Word Docs. Retrieved January 5, 2022. url: https://www.bleepingcomputer.com/news/security/psa-dont-open-spam-containing-password-protected-word-docs/
kill_chain_name: mitre-attack phase_name: execution
Linux
Adversaries may gather information about the victim's business tempo that can be used during targeting. Information about an organization’s business tempo may include a variety of details, including operational hours/days of the week. This information may also reveal times/dates of purchases and shipments of the victim’s hardware and software resources. Adversaries may gather this information in various ways, such as direct elicitation via [Phishing for Information](https://attack.mitre.org/techniques/T1598). Information about business tempo may also be exposed to adversaries via online or other accessible data sets (ex: [Social Media](https://attack.mitre.org/techniques/T1593/001) or [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594)).(Citation: ThreatPost Broadvoice Leak) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Phishing for Information](https://attack.mitre.org/techniques/T1598) or [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593)), establishing operational resources (ex: [Establish Accounts](https://attack.mitre.org/techniques/T1585) or [Compromise Accounts](https://attack.mitre.org/techniques/T1586)), and/or initial access (ex: [Supply Chain Compromise](https://attack.mitre.org/techniques/T1195) or [Trusted Relationship](https://attack.mitre.org/techniques/T1199))
enterprise-attack
Identify Business Tempo
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1591/003 external_id: T1591.003 source_name: ThreatPost Broadvoice Leak description: Seals, T. (2020, October 15). Broadvoice Leak Exposes 350M Records, Personal Voicemail Transcripts. Retrieved October 20, 2020. url: https://threatpost.com/broadvoice-leaks-350m-records-voicemail-transcripts/160158/
kill_chain_name: mitre-attack phase_name: reconnaissance
PRE
Adversaries may gather information about the victim's host hardware that can be used during targeting. Information about hardware infrastructure may include a variety of details such as types and versions on specific hosts, as well as the presence of additional components that might be indicative of added defensive protections (ex: card/biometric readers, dedicated encryption hardware, etc.). Adversaries may gather this information in various ways, such as direct collection actions via [Active Scanning](https://attack.mitre.org/techniques/T1595) (ex: hostnames, server banners, user agent strings) or [Phishing for Information](https://attack.mitre.org/techniques/T1598). Adversaries may also compromise sites then include malicious content designed to collect host information from visitors.(Citation: ATT ScanBox) Information about the hardware infrastructure may also be exposed to adversaries via online or other accessible data sets (ex: job postings, network maps, assessment reports, resumes, or purchase invoices). Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)), establishing operational resources (ex: [Develop Capabilities](https://attack.mitre.org/techniques/T1587) or [Obtain Capabilities](https://attack.mitre.org/techniques/T1588)), and/or initial access (ex: [Compromise Hardware Supply Chain](https://attack.mitre.org/techniques/T1195/003) or [Hardware Additions](https://attack.mitre.org/techniques/T1200)).
enterprise-attack
Hardware
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1592/001 external_id: T1592.001 source_name: ATT ScanBox description: Blasco, J. (2014, August 28). Scanbox: A Reconnaissance Framework Used with Watering Hole Attacks. Retrieved October 19, 2020. url: https://cybersecurity.att.com/blogs/labs-research/scanbox-a-reconnaissance-framework-used-on-watering-hole-attacks source_name: ThreatConnect Infrastructure Dec 2020 description: ThreatConnect. (2020, December 15). Infrastructure Research and Hunting: Boiling the Domain Ocean. Retrieved October 12, 2021. url: https://threatconnect.com/blog/infrastructure-research-hunting/
kill_chain_name: mitre-attack phase_name: reconnaissance
PRE
Adversaries may deliver payloads to remote systems by adding content to shared storage locations, such as network drives or internal code repositories. Content stored on network drives or in other shared locations may be tainted by adding malicious programs, scripts, or exploit code to otherwise valid files. Once a user opens the shared tainted content, the malicious portion can be executed to run the adversary's code on a remote system. Adversaries may use tainted shared content to move laterally. A directory share pivot is a variation on this technique that uses several other techniques to propagate malware when users access a shared network directory. It uses [Shortcut Modification](https://attack.mitre.org/techniques/T1547/009) of directory .LNK files that use [Masquerading](https://attack.mitre.org/techniques/T1036) to look like the real directories, which are hidden through [Hidden Files and Directories](https://attack.mitre.org/techniques/T1564/001). The malicious .LNK-based directories have an embedded command that executes the hidden malware file in the directory and then opens the real intended directory so that the user's expected action still occurs. When used with frequently used network directories, the technique may result in frequent reinfections and broad access to systems and potentially to new and higher privileged accounts. (Citation: Retwin Directory Share Pivot) Adversaries may also compromise shared network directories through binary infections by appending or prepending its code to the healthy binary on the shared network directory. The malware may modify the original entry point (OEP) of the healthy binary to ensure that it is executed before the legitimate code. The infection could continue to spread via the newly infected file when it is executed by a remote system. These infections may target both binary and non-binary formats that end with extensions including, but not limited to, .EXE, .DLL, .SCR, .BAT, and/or .VBS.
enterprise-attack
Taint Shared Content
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1080 external_id: T1080 source_name: Retwin Directory Share Pivot description: Routin, D. (2017, November 13). Abusing network shares for efficient lateral movements and privesc (DirSharePivot). Retrieved April 12, 2018. url: https://rewtin.blogspot.ch/2017/11/abusing-user-shares-for-efficient.html
kill_chain_name: mitre-attack phase_name: lateral-movement
Windows
Adversaries may add new domain trusts, modify the properties of existing domain trusts, or otherwise change the configuration of trust relationships between domains and tenants to evade defenses and/or elevate privileges.Trust details, such as whether or not user identities are federated, allow authentication and authorization properties to apply between domains or tenants for the purpose of accessing shared resources.(Citation: Microsoft - Azure AD Federation) These trust objects may include accounts, credentials, and other authentication material applied to servers, tokens, and domains. Manipulating these trusts may allow an adversary to escalate privileges and/or evade defenses by modifying settings to add objects which they control. For example, in Microsoft Active Directory (AD) environments, this may be used to forge [SAML Tokens](https://attack.mitre.org/techniques/T1606/002) without the need to compromise the signing certificate to forge new credentials. Instead, an adversary can manipulate domain trusts to add their own signing certificate. An adversary may also convert an AD domain to a federated domain using Active Directory Federation Services (AD FS), which may enable malicious trust modifications such as altering the claim issuance rules to log in any valid set of credentials as a specified user.(Citation: AADInternals zure AD Federated Domain) An adversary may also add a new federated identity provider to an identity tenant such as Okta, which may enable the adversary to authenticate as any user of the tenant.(Citation: Okta Cross-Tenant Impersonation 2023)
enterprise-attack
Trust Modification
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1484/002 external_id: T1484.002 source_name: CISA SolarWinds Cloud Detection description: CISA. (2021, January 8). Detecting Post-Compromise Threat Activity in Microsoft Cloud Environments. Retrieved January 8, 2021. url: https://us-cert.cisa.gov/ncas/alerts/aa21-008a source_name: AADInternals zure AD Federated Domain description: Dr. Nestori Syynimaa. (2017, November 16). Security vulnerability in Azure AD & Office 365 identity federation. Retrieved September 28, 2022. url: https://o365blog.com/post/federation-vulnerability/ source_name: Microsoft - Azure AD Federation description: Microsoft. (2018, November 28). What is federation with Azure AD?. Retrieved December 30, 2020. url: https://docs.microsoft.com/en-us/azure/active-directory/hybrid/whatis-fed source_name: Microsoft - Azure Sentinel ADFSDomainTrustMods description: Microsoft. (2020, December). Azure Sentinel Detections. Retrieved December 30, 2020. url: https://github.com/Azure/Azure-Sentinel/blob/master/Detections/AuditLogs/ADFSDomainTrustMods.yaml source_name: Microsoft - Update or Repair Federated domain description: Microsoft. (2020, September 14). Update or repair the settings of a federated domain in Office 365, Azure, or Intune. Retrieved December 30, 2020. url: https://docs.microsoft.com/en-us/office365/troubleshoot/active-directory/update-federated-domain-office-365 source_name: Okta Cross-Tenant Impersonation 2023 description: Okta Defensive Cyber Operations. (2023, August 31). Cross-Tenant Impersonation: Prevention and Detection. Retrieved February 15, 2024. url: https://sec.okta.com/articles/2023/08/cross-tenant-impersonation-prevention-and-detection source_name: Sygnia Golden SAML description: Sygnia. (2020, December). Detection and Hunting of Golden SAML Attack. Retrieved January 6, 2021. url: https://www.sygnia.co/golden-saml-advisory
kill_chain_name: mitre-attack phase_name: privilege-escalation
Windows
Adversaries may employ a known symmetric encryption algorithm to conceal command and control traffic rather than relying on any inherent protections provided by a communication protocol. Symmetric encryption algorithms use the same key for plaintext encryption and ciphertext decryption. Common symmetric encryption algorithms include AES, DES, 3DES, Blowfish, and RC4.
enterprise-attack
Symmetric Cryptography
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1573/001 external_id: T1573.001 source_name: University of Birmingham C2 description: Gardiner, J., Cova, M., Nagaraja, S. (2014, February). Command & Control Understanding, Denying and Detecting. Retrieved April 20, 2016. url: https://arxiv.org/ftp/arxiv/papers/1408/1408.1136.pdf
kill_chain_name: mitre-attack phase_name: command-and-control
Linux
Adversaries may attempt to get a listing of local system accounts. This information can help adversaries determine which local accounts exist on a system to aid in follow-on behavior. Commands such as <code>net user</code> and <code>net localgroup</code> of the [Net](https://attack.mitre.org/software/S0039) utility and <code>id</code> and <code>groups</code> on macOS and Linux can list local users and groups.(Citation: Mandiant APT1)(Citation: id man page)(Citation: groups man page) On Linux, local users can also be enumerated through the use of the <code>/etc/passwd</code> file. On macOS the <code>dscl . list /Users</code> command can be used to enumerate local accounts.
enterprise-attack
Local Account
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1087/001 external_id: T1087.001 source_name: id man page description: MacKenzie, D. and Robbins, A. (n.d.). id(1) - Linux man page. Retrieved January 11, 2024. url: https://linux.die.net/man/1/id source_name: groups man page description: MacKenzie, D. and Youngman, J. (n.d.). groups(1) - Linux man page. Retrieved January 11, 2024. url: https://linux.die.net/man/1/groups source_name: Mandiant APT1 description: Mandiant. (n.d.). APT1 Exposing One of China’s Cyber Espionage Units. Retrieved July 18, 2016. url: https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf source_name: Elastic - Koadiac Detection with EQL description: Stepanic, D.. (2020, January 13). Embracing offensive tooling: Building detections against Koadic using EQL. Retrieved November 30, 2020. url: https://www.elastic.co/blog/embracing-offensive-tooling-building-detections-against-koadic-using-eql
kill_chain_name: mitre-attack phase_name: discovery
Linux
Adversaries may compromise social media accounts that can be used during targeting. For operations incorporating social engineering, the utilization of an online persona may be important. Rather than creating and cultivating social media profiles (i.e. [Social Media Accounts](https://attack.mitre.org/techniques/T1585/001)), adversaries may compromise existing social media accounts. Utilizing an existing persona may engender a level of trust in a potential victim if they have a relationship, or knowledge of, the compromised persona. A variety of methods exist for compromising social media accounts, such as gathering credentials via [Phishing for Information](https://attack.mitre.org/techniques/T1598), purchasing credentials from third-party sites, or by brute forcing credentials (ex: password reuse from breach credential dumps).(Citation: AnonHBGary) Prior to compromising social media accounts, adversaries may conduct Reconnaissance to inform decisions about which accounts to compromise to further their operation. Personas may exist on a single site or across multiple sites (ex: Facebook, LinkedIn, Twitter, etc.). Compromised social media accounts may require additional development, this could include filling out or modifying profile information, further developing social networks, or incorporating photos. Adversaries can use a compromised social media profile to create new, or hijack existing, connections to targets of interest. These connections may be direct or may include trying to connect through others.(Citation: NEWSCASTER2014)(Citation: BlackHatRobinSage) Compromised profiles may be leveraged during other phases of the adversary lifecycle, such as during Initial Access (ex: [Spearphishing via Service](https://attack.mitre.org/techniques/T1566/003)).
enterprise-attack
Social Media Accounts
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1586/001 external_id: T1586.001 source_name: AnonHBGary description: Bright, P. (2011, February 15). Anonymous speaks: the inside story of the HBGary hack. Retrieved March 9, 2017. url: https://arstechnica.com/tech-policy/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack/ source_name: NEWSCASTER2014 description: Lennon, M. (2014, May 29). Iranian Hackers Targeted US Officials in Elaborate Social Media Attack Operation. Retrieved March 1, 2017. url: https://www.securityweek.com/iranian-hackers-targeted-us-officials-elaborate-social-media-attack-operation source_name: BlackHatRobinSage description: Ryan, T. (2010). “Getting In Bed with Robin Sage.”. Retrieved March 6, 2017. url: http://media.blackhat.com/bh-us-10/whitepapers/Ryan/BlackHat-USA-2010-Ryan-Getting-In-Bed-With-Robin-Sage-v1.0.pdf
kill_chain_name: mitre-attack phase_name: resource-development
PRE
Adversaries may abuse Windows safe mode to disable endpoint defenses. Safe mode starts up the Windows operating system with a limited set of drivers and services. Third-party security software such as endpoint detection and response (EDR) tools may not start after booting Windows in safe mode. There are two versions of safe mode: Safe Mode and Safe Mode with Networking. It is possible to start additional services after a safe mode boot.(Citation: Microsoft Safe Mode)(Citation: Sophos Snatch Ransomware 2019) Adversaries may abuse safe mode to disable endpoint defenses that may not start with a limited boot. Hosts can be forced into safe mode after the next reboot via modifications to Boot Configuration Data (BCD) stores, which are files that manage boot application settings.(Citation: Microsoft bcdedit 2021) Adversaries may also add their malicious applications to the list of minimal services that start in safe mode by modifying relevant Registry values (i.e. [Modify Registry](https://attack.mitre.org/techniques/T1112)). Malicious [Component Object Model](https://attack.mitre.org/techniques/T1559/001) (COM) objects may also be registered and loaded in safe mode.(Citation: Sophos Snatch Ransomware 2019)(Citation: CyberArk Labs Safe Mode 2016)(Citation: Cybereason Nocturnus MedusaLocker 2020)(Citation: BleepingComputer REvil 2021)
enterprise-attack
Safe Mode Boot
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1562/009 external_id: T1562.009 source_name: Microsoft Safe Mode description: Microsoft. (n.d.). Start your PC in safe mode in Windows 10. Retrieved June 23, 2021. url: https://support.microsoft.com/en-us/windows/start-your-pc-in-safe-mode-in-windows-10-92c27cff-db89-8644-1ce4-b3e5e56fe234 source_name: Sophos Snatch Ransomware 2019 description: Sophos. (2019, December 9). Snatch ransomware reboots PCs into Safe Mode to bypass protection. Retrieved June 23, 2021. url: https://news.sophos.com/en-us/2019/12/09/snatch-ransomware-reboots-pcs-into-safe-mode-to-bypass-protection/ source_name: Microsoft bcdedit 2021 description: Microsoft. (2021, May 27). bcdedit. Retrieved June 23, 2021. url: https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/bcdedit source_name: CyberArk Labs Safe Mode 2016 description: Naim, D.. (2016, September 15). CyberArk Labs: From Safe Mode to Domain Compromise. Retrieved June 23, 2021. url: https://www.cyberark.com/resources/blog/cyberark-labs-from-safe-mode-to-domain-compromise source_name: Cybereason Nocturnus MedusaLocker 2020 description: Cybereason Nocturnus. (2020, November 19). Cybereason vs. MedusaLocker Ransomware. Retrieved June 23, 2021. url: https://www.cybereason.com/blog/medusalocker-ransomware source_name: BleepingComputer REvil 2021 description: Abrams, L. (2021, March 19). REvil ransomware has a new ‘Windows Safe Mode’ encryption mode. Retrieved June 23, 2021. url: https://www.bleepingcomputer.com/news/security/revil-ransomware-has-a-new-windows-safe-mode-encryption-mode/ source_name: Microsoft Bootcfg description: Gerend, J. et al. (2017, October 16). bootcfg. Retrieved August 30, 2021. url: https://docs.microsoft.com/windows-server/administration/windows-commands/bootcfg
kill_chain_name: mitre-attack phase_name: defense-evasion
Windows
Adversaries may abuse netbooting to load an unauthorized network device operating system from a Trivial File Transfer Protocol (TFTP) server. TFTP boot (netbooting) is commonly used by network administrators to load configuration-controlled network device images from a centralized management server. Netbooting is one option in the boot sequence and can be used to centralize, manage, and control device images. Adversaries may manipulate the configuration on the network device specifying use of a malicious TFTP server, which may be used in conjunction with [Modify System Image](https://attack.mitre.org/techniques/T1601) to load a modified image on device startup or reset. The unauthorized image allows adversaries to modify device configuration, add malicious capabilities to the device, and introduce backdoors to maintain control of the network device while minimizing detection through use of a standard functionality. This technique is similar to [ROMMONkit](https://attack.mitre.org/techniques/T1542/004) and may result in the network device running a modified image. (Citation: Cisco Blog Legacy Device Attacks)
enterprise-attack
TFTP Boot
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1542/005 external_id: T1542.005 source_name: Cisco Blog Legacy Device Attacks description: Omar Santos. (2020, October 19). Attackers Continue to Target Legacy Devices. Retrieved October 20, 2020. url: https://community.cisco.com/t5/security-blogs/attackers-continue-to-target-legacy-devices/ba-p/4169954 source_name: Cisco IOS Software Integrity Assurance - Secure Boot description: Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Secure Boot. Retrieved October 19, 2020. url: https://tools.cisco.com/security/center/resources/integrity_assurance.html#35 source_name: Cisco IOS Software Integrity Assurance - Image File Verification description: Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Cisco IOS Image File Verification. Retrieved October 19, 2020. url: https://tools.cisco.com/security/center/resources/integrity_assurance.html#7 source_name: Cisco IOS Software Integrity Assurance - Run-Time Memory Verification description: Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Cisco IOS Run-Time Memory Integrity Verification. Retrieved October 19, 2020. url: https://tools.cisco.com/security/center/resources/integrity_assurance.html#13 source_name: Cisco IOS Software Integrity Assurance - Command History description: Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Command History. Retrieved October 21, 2020. url: https://tools.cisco.com/security/center/resources/integrity_assurance.html#23 source_name: Cisco IOS Software Integrity Assurance - Boot Information description: Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Boot Information. Retrieved October 21, 2020. url: https://tools.cisco.com/security/center/resources/integrity_assurance.html#26
kill_chain_name: mitre-attack phase_name: persistence
Network
Adversaries may create or modify Windows services to repeatedly execute malicious payloads as part of persistence. When Windows boots up, it starts programs or applications called services that perform background system functions.(Citation: TechNet Services) Windows service configuration information, including the file path to the service's executable or recovery programs/commands, is stored in the Windows Registry. Adversaries may install a new service or modify an existing service to execute at startup in order to persist on a system. Service configurations can be set or modified using system utilities (such as sc.exe), by directly modifying the Registry, or by interacting directly with the Windows API. Adversaries may also use services to install and execute malicious drivers. For example, after dropping a driver file (ex: `.sys`) to disk, the payload can be loaded and registered via [Native API](https://attack.mitre.org/techniques/T1106) functions such as `CreateServiceW()` (or manually via functions such as `ZwLoadDriver()` and `ZwSetValueKey()`), by creating the required service Registry values (i.e. [Modify Registry](https://attack.mitre.org/techniques/T1112)), or by using command-line utilities such as `PnPUtil.exe`.(Citation: Symantec W.32 Stuxnet Dossier)(Citation: Crowdstrike DriveSlayer February 2022)(Citation: Unit42 AcidBox June 2020) Adversaries may leverage these drivers as [Rootkit](https://attack.mitre.org/techniques/T1014)s to hide the presence of malicious activity on a system. Adversaries may also load a signed yet vulnerable driver onto a compromised machine (known as "Bring Your Own Vulnerable Driver" (BYOVD)) as part of [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068).(Citation: ESET InvisiMole June 2020)(Citation: Unit42 AcidBox June 2020) Services may be created with administrator privileges but are executed under SYSTEM privileges, so an adversary may also use a service to escalate privileges. Adversaries may also directly start services through [Service Execution](https://attack.mitre.org/techniques/T1569/002). To make detection analysis more challenging, malicious services may also incorporate [Masquerade Task or Service](https://attack.mitre.org/techniques/T1036/004) (ex: using a service and/or payload name related to a legitimate OS or benign software component). Adversaries may also create ‘hidden’ services (i.e., [Hide Artifacts](https://attack.mitre.org/techniques/T1564)), for example by using the `sc sdset` command to set service permissions via the Service Descriptor Definition Language (SDDL). This may hide a Windows service from the view of standard service enumeration methods such as `Get-Service`, `sc query`, and `services.exe`.(Citation: SANS 1)(Citation: SANS 2)
enterprise-attack
Windows Service
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1543/003 external_id: T1543.003 source_name: Microsoft Windows Event Forwarding FEB 2018 description: Hardy, T. & Hall, J. (2018, February 15). Use Windows Event Forwarding to help with intrusion detection. Retrieved August 7, 2018. url: https://docs.microsoft.com/windows/security/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection source_name: ESET InvisiMole June 2020 description: Hromcova, Z. and Cherpanov, A. (2020, June). INVISIMOLE: THE HIDDEN PART OF THE STORY. Retrieved July 16, 2020. url: https://www.welivesecurity.com/wp-content/uploads/2020/06/ESET_InvisiMole.pdf source_name: SANS 1 description: Joshua Wright. (2020, October 13). Retrieved March 22, 2024. url: https://www.sans.org/blog/red-team-tactics-hiding-windows-services/ source_name: SANS 2 description: Joshua Wright. (2020, October 14). Retrieved March 22, 2024. url: https://www.sans.org/blog/defense-spotlight-finding-hidden-windows-services/ source_name: TechNet Services description: Microsoft. (n.d.). Services. Retrieved June 7, 2016. url: https://technet.microsoft.com/en-us/library/cc772408.aspx source_name: Microsoft 4697 APR 2017 description: Miroshnikov, A. & Hall, J. (2017, April 18). 4697(S): A service was installed in the system. Retrieved August 7, 2018. url: https://docs.microsoft.com/windows/security/threat-protection/auditing/event-4697 source_name: Symantec W.32 Stuxnet Dossier description: Nicolas Falliere, Liam O. Murchu, Eric Chien. (2011, February). W32.Stuxnet Dossier. Retrieved December 7, 2020. url: https://www.wired.com/images_blogs/threatlevel/2010/11/w32_stuxnet_dossier.pdf source_name: Unit42 AcidBox June 2020 description: Reichel, D. and Idrizovic, E. (2020, June 17). AcidBox: Rare Malware Repurposing Turla Group Exploit Targeted Russian Organizations. Retrieved March 16, 2021. url: https://unit42.paloaltonetworks.com/acidbox-rare-malware/ source_name: TechNet Autoruns description: Russinovich, M. (2016, January 4). Autoruns for Windows v13.51. Retrieved June 6, 2016. url: https://technet.microsoft.com/en-us/sysinternals/bb963902 source_name: Crowdstrike DriveSlayer February 2022 description: Thomas, W. et al. (2022, February 25). CrowdStrike Falcon Protects from New Wiper Malware Used in Ukraine Cyberattacks. Retrieved March 25, 2022. url: https://www.crowdstrike.com/blog/how-crowdstrike-falcon-protects-against-wiper-malware-used-in-ukraine-attacks/
kill_chain_name: mitre-attack phase_name: privilege-escalation
Windows
Adversaries may use Fast Flux DNS to hide a command and control channel behind an array of rapidly changing IP addresses linked to a single domain resolution. This technique uses a fully qualified domain name, with multiple IP addresses assigned to it which are swapped with high frequency, using a combination of round robin IP addressing and short Time-To-Live (TTL) for a DNS resource record.(Citation: MehtaFastFluxPt1)(Citation: MehtaFastFluxPt2)(Citation: Fast Flux - Welivesecurity) The simplest, "single-flux" method, involves registering and de-registering an addresses as part of the DNS A (address) record list for a single DNS name. These registrations have a five-minute average lifespan, resulting in a constant shuffle of IP address resolution.(Citation: Fast Flux - Welivesecurity) In contrast, the "double-flux" method registers and de-registers an address as part of the DNS Name Server record list for the DNS zone, providing additional resilience for the connection. With double-flux additional hosts can act as a proxy to the C2 host, further insulating the true source of the C2 channel.
enterprise-attack
Fast Flux DNS
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1568/001 external_id: T1568.001 source_name: MehtaFastFluxPt1 description: Mehta, L. (2014, December 17). Fast Flux Networks Working and Detection, Part 1. Retrieved March 6, 2017. url: https://resources.infosecinstitute.com/fast-flux-networks-working-detection-part-1/#gref source_name: MehtaFastFluxPt2 description: Mehta, L. (2014, December 23). Fast Flux Networks Working and Detection, Part 2. Retrieved March 6, 2017. url: https://resources.infosecinstitute.com/fast-flux-networks-working-detection-part-2/#gref source_name: Fast Flux - Welivesecurity description: Albors, Josep. (2017, January 12). Fast Flux networks: What are they and how do they work?. Retrieved March 11, 2020. url: https://www.welivesecurity.com/2017/01/12/fast-flux-networks-work/
kill_chain_name: mitre-attack phase_name: command-and-control
Linux
Adversaries may employ various system checks to detect and avoid virtualization and analysis environments. This may include changing behaviors based on the results of checks for the presence of artifacts indicative of a virtual machine environment (VME) or sandbox. If the adversary detects a VME, they may alter their malware to disengage from the victim or conceal the core functions of the implant. They may also search for VME artifacts before dropping secondary or additional payloads. Adversaries may use the information learned from [Virtualization/Sandbox Evasion](https://attack.mitre.org/techniques/T1497) during automated discovery to shape follow-on behaviors.(Citation: Deloitte Environment Awareness) Specific checks will vary based on the target and/or adversary, but may involve behaviors such as [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047), [PowerShell](https://attack.mitre.org/techniques/T1059/001), [System Information Discovery](https://attack.mitre.org/techniques/T1082), and [Query Registry](https://attack.mitre.org/techniques/T1012) to obtain system information and search for VME artifacts. Adversaries may search for VME artifacts in memory, processes, file system, hardware, and/or the Registry. Adversaries may use scripting to automate these checks into one script and then have the program exit if it determines the system to be a virtual environment. Checks could include generic system properties such as host/domain name and samples of network traffic. Adversaries may also check the network adapters addresses, CPU core count, and available memory/drive size. Once executed, malware may also use [File and Directory Discovery](https://attack.mitre.org/techniques/T1083) to check if it was saved in a folder or file with unexpected or even analysis-related naming artifacts such as `malware`, `sample`, or `hash`. Other common checks may enumerate services running that are unique to these applications, installed programs on the system, manufacturer/product fields for strings relating to virtual machine applications, and VME-specific hardware/processor instructions.(Citation: McAfee Virtual Jan 2017) In applications like VMWare, adversaries can also use a special I/O port to send commands and receive output. Hardware checks, such as the presence of the fan, temperature, and audio devices, could also be used to gather evidence that can be indicative a virtual environment. Adversaries may also query for specific readings from these devices.(Citation: Unit 42 OilRig Sept 2018)
enterprise-attack
System Checks
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1497/001 external_id: T1497.001 source_name: Unit 42 OilRig Sept 2018 description: Falcone, R., et al. (2018, September 04). OilRig Targets a Middle Eastern Government and Adds Evasion Techniques to OopsIE. Retrieved September 24, 2018. url: https://researchcenter.paloaltonetworks.com/2018/09/unit42-oilrig-targets-middle-eastern-government-adds-evasion-techniques-oopsie/ source_name: McAfee Virtual Jan 2017 description: Roccia, T. (2017, January 19). Stopping Malware With a Fake Virtual Machine. Retrieved April 17, 2019. url: https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/stopping-malware-fake-virtual-machine/ source_name: Deloitte Environment Awareness description: Torello, A. & Guibernau, F. (n.d.). Environment Awareness. Retrieved May 18, 2021. url: https://drive.google.com/file/d/1t0jn3xr4ff2fR30oQAUn_RsWSnMpOAQc
kill_chain_name: mitre-attack phase_name: discovery
Linux
Adversaries may abuse the <code>cron</code> utility to perform task scheduling for initial or recurring execution of malicious code.(Citation: 20 macOS Common Tools and Techniques) The <code>cron</code> utility is a time-based job scheduler for Unix-like operating systems. The <code> crontab</code> file contains the schedule of cron entries to be run and the specified times for execution. Any <code>crontab</code> files are stored in operating system-specific file paths. An adversary may use <code>cron</code> in Linux or Unix environments to execute programs at system startup or on a scheduled basis for [Persistence](https://attack.mitre.org/tactics/TA0003).
enterprise-attack
Cron
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1053/003 external_id: T1053.003 source_name: 20 macOS Common Tools and Techniques description: Phil Stokes. (2021, February 16). 20 Common Tools & Techniques Used by macOS Threat Actors & Malware. Retrieved August 23, 2021. url: https://labs.sentinelone.com/20-common-tools-techniques-used-by-macos-threat-actors-malware/
kill_chain_name: mitre-attack phase_name: privilege-escalation
Linux
Adversaries may attempt to find domain-level groups and permission settings. The knowledge of domain-level permission groups can help adversaries determine which groups exist and which users belong to a particular group. Adversaries may use this information to determine which users have elevated permissions, such as domain administrators. Commands such as <code>net group /domain</code> of the [Net](https://attack.mitre.org/software/S0039) utility, <code>dscacheutil -q group</code> on macOS, and <code>ldapsearch</code> on Linux can list domain-level groups.
enterprise-attack
Domain Groups
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1069/002 external_id: T1069.002
kill_chain_name: mitre-attack phase_name: discovery
Linux
Adversaries may acquire information about vulnerabilities that can be used during targeting. A vulnerability is a weakness in computer hardware or software that can, potentially, be exploited by an adversary to cause unintended or unanticipated behavior to occur. Adversaries may find vulnerability information by searching open databases or gaining access to closed vulnerability databases.(Citation: National Vulnerability Database) An adversary may monitor vulnerability disclosures/databases to understand the state of existing, as well as newly discovered, vulnerabilities. There is usually a delay between when a vulnerability is discovered and when it is made public. An adversary may target the systems of those known to conduct vulnerability research (including commercial vendors). Knowledge of a vulnerability may cause an adversary to search for an existing exploit (i.e. [Exploits](https://attack.mitre.org/techniques/T1588/005)) or to attempt to develop one themselves (i.e. [Exploits](https://attack.mitre.org/techniques/T1587/004)).
enterprise-attack
Vulnerabilities
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1588/006 external_id: T1588.006 source_name: National Vulnerability Database description: National Vulnerability Database. (n.d.). National Vulnerability Database. Retrieved October 15, 2020. url: https://nvd.nist.gov/
kill_chain_name: mitre-attack phase_name: resource-development
PRE
Adversaries may send spearphishing emails with a malicious link in an attempt to gain access to victim systems. Spearphishing with a link is a specific variant of spearphishing. It is different from other forms of spearphishing in that it employs the use of links to download malware contained in email, instead of attaching malicious files to the email itself, to avoid defenses that may inspect email attachments. Spearphishing may also involve social engineering techniques, such as posing as a trusted source. All forms of spearphishing are electronically delivered social engineering targeted at a specific individual, company, or industry. In this case, the malicious emails contain links. Generally, the links will be accompanied by social engineering text and require the user to actively click or copy and paste a URL into a browser, leveraging [User Execution](https://attack.mitre.org/techniques/T1204). The visited website may compromise the web browser using an exploit, or the user will be prompted to download applications, documents, zip files, or even executables depending on the pretext for the email in the first place. Adversaries may also include links that are intended to interact directly with an email reader, including embedded images intended to exploit the end system directly. Additionally, adversaries may use seemingly benign links that abuse special characters to mimic legitimate websites (known as an "IDN homograph attack").(Citation: CISA IDN ST05-016) URLs may also be obfuscated by taking advantage of quirks in the URL schema, such as the acceptance of integer- or hexadecimal-based hostname formats and the automatic discarding of text before an “@” symbol: for example, `hxxp://google.com@1157586937`.(Citation: Mandiant URL Obfuscation 2023) Adversaries may also utilize links to perform consent phishing, typically with OAuth 2.0 request URLs that when accepted by the user provide permissions/access for malicious applications, allowing adversaries to [Steal Application Access Token](https://attack.mitre.org/techniques/T1528)s.(Citation: Trend Micro Pawn Storm OAuth 2017) These stolen access tokens allow the adversary to perform various actions on behalf of the user via API calls. (Citation: Microsoft OAuth 2.0 Consent Phishing 2021) Adversaries may also utilize spearphishing links to [Steal Application Access Token](https://attack.mitre.org/techniques/T1528)s that grant immediate access to the victim environment. For example, a user may be lured through “consent phishing” into granting adversaries permissions/access via a malicious OAuth 2.0 request URL .(Citation: Trend Micro Pawn Storm OAuth 2017)(Citation: Microsoft OAuth 2.0 Consent Phishing 2021) Similarly, malicious links may also target device-based authorization, such as OAuth 2.0 device authorization grant flow which is typically used to authenticate devices without UIs/browsers. Known as “device code phishing,” an adversary may send a link that directs the victim to a malicious authorization page where the user is tricked into entering a code/credentials that produces a device token.(Citation: SecureWorks Device Code Phishing 2021)(Citation: Netskope Device Code Phishing 2021)(Citation: Optiv Device Code Phishing 2021)
enterprise-attack
Spearphishing Link
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1566/002 external_id: T1566.002 source_name: ACSC Email Spoofing description: Australian Cyber Security Centre. (2012, December). Mitigating Spoofed Emails Using Sender Policy Framework. Retrieved October 19, 2020. url: https://www.cyber.gov.au/sites/default/files/2019-03/spoof_email_sender_policy_framework.pdf source_name: CISA IDN ST05-016 description: CISA. (2019, September 27). Security Tip (ST05-016): Understanding Internationalized Domain Names. Retrieved October 20, 2020. url: https://us-cert.cisa.gov/ncas/tips/ST05-016 source_name: Trend Micro Pawn Storm OAuth 2017 description: Hacquebord, F.. (2017, April 25). Pawn Storm Abuses Open Authentication in Advanced Social Engineering Attacks. Retrieved October 4, 2019. url: https://blog.trendmicro.com/trendlabs-security-intelligence/pawn-storm-abuses-open-authentication-advanced-social-engineering-attacks source_name: Netskope Device Code Phishing 2021 description: Jenko Hwong. (2021, August 10). New Phishing Attacks Exploiting OAuth Authorization Flows (Part 1). Retrieved March 19, 2024. url: https://www.netskope.com/blog/new-phishing-attacks-exploiting-oauth-authorization-flows-part-1 source_name: Microsoft OAuth 2.0 Consent Phishing 2021 description: Microsoft 365 Defender Threat Intelligence Team. (2021, June 14). Microsoft delivers comprehensive solution to battle rise in consent phishing emails. Retrieved December 13, 2021. url: https://www.microsoft.com/security/blog/2021/07/14/microsoft-delivers-comprehensive-solution-to-battle-rise-in-consent-phishing-emails/ source_name: Microsoft Anti Spoofing description: Microsoft. (2020, October 13). Anti-spoofing protection in EOP. Retrieved October 19, 2020. url: https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/anti-spoofing-protection?view=o365-worldwide source_name: Mandiant URL Obfuscation 2023 description: Nick Simonian. (2023, May 22). Don't @ Me: URL Obfuscation Through Schema Abuse. Retrieved August 4, 2023. url: https://www.mandiant.com/resources/blog/url-obfuscation-schema-abuse source_name: Optiv Device Code Phishing 2021 description: Optiv. (2021, August 17). Microsoft 365 OAuth Device Code Flow and Phishing. Retrieved March 19, 2024. url: https://www.optiv.com/insights/source-zero/blog/microsoft-365-oauth-device-code-flow-and-phishing source_name: SecureWorks Device Code Phishing 2021 description: SecureWorks Counter Threat Unit Research Team. (2021, June 3). OAuth’S Device Code Flow Abused in Phishing Attacks. Retrieved March 19, 2024. url: https://www.secureworks.com/blog/oauths-device-code-flow-abused-in-phishing-attacks
kill_chain_name: mitre-attack phase_name: initial-access
Linux
Adversaries may clear system logs to hide evidence of an intrusion. macOS and Linux both keep track of system or user-initiated actions via system logs. The majority of native system logging is stored under the <code>/var/log/</code> directory. Subfolders in this directory categorize logs by their related functions, such as:(Citation: Linux Logs) * <code>/var/log/messages:</code>: General and system-related messages * <code>/var/log/secure</code> or <code>/var/log/auth.log</code>: Authentication logs * <code>/var/log/utmp</code> or <code>/var/log/wtmp</code>: Login records * <code>/var/log/kern.log</code>: Kernel logs * <code>/var/log/cron.log</code>: Crond logs * <code>/var/log/maillog</code>: Mail server logs * <code>/var/log/httpd/</code>: Web server access and error logs
enterprise-attack
Clear Linux or Mac System Logs
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1070/002 external_id: T1070.002 source_name: Linux Logs description: Marcel. (2018, April 19). 12 Critical Linux Log Files You Must be Monitoring. Retrieved March 29, 2020. url: https://www.eurovps.com/blog/important-linux-log-files-you-must-be-monitoring/
kill_chain_name: mitre-attack phase_name: defense-evasion
Linux
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users. (Citation: Sucuri BIND9 August 2015) Some systems may automatically restart critical applications and services when crashes occur, but they can likely be re-exploited to cause a persistent denial of service (DoS) condition. Adversaries may exploit known or zero-day vulnerabilities to crash applications and/or systems, which may also lead to dependent applications and/or systems to be in a DoS condition. Crashed or restarted applications or systems may also have other effects such as [Data Destruction](https://attack.mitre.org/techniques/T1485), [Firmware Corruption](https://attack.mitre.org/techniques/T1495), [Service Stop](https://attack.mitre.org/techniques/T1489) etc. which may further cause a DoS condition and deny availability to critical information, applications and/or systems.
enterprise-attack
Application or System Exploitation
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1499/004 external_id: T1499.004 source_name: Sucuri BIND9 August 2015 description: Cid, D.. (2015, August 2). BIND9 – Denial of Service Exploit in the Wild. Retrieved April 26, 2019. url: https://blog.sucuri.net/2015/08/bind9-denial-of-service-exploit-in-the-wild.html
kill_chain_name: mitre-attack phase_name: impact
Windows
Adversaries may leverage Microsoft Office-based applications for persistence between startups. Microsoft Office is a fairly common application suite on Windows-based operating systems within an enterprise network. There are multiple mechanisms that can be used with Office for persistence when an Office-based application is started; this can include the use of Office Template Macros and add-ins. A variety of features have been discovered in Outlook that can be abused to obtain persistence, such as Outlook rules, forms, and Home Page.(Citation: SensePost Ruler GitHub) These persistence mechanisms can work within Outlook or be used through Office 365.(Citation: TechNet O365 Outlook Rules)
enterprise-attack
Office Application Startup
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1137 external_id: T1137 source_name: SensePost Ruler GitHub description: SensePost. (2016, August 18). Ruler: A tool to abuse Exchange services. Retrieved February 4, 2019. url: https://github.com/sensepost/ruler source_name: TechNet O365 Outlook Rules description: Koeller, B.. (2018, February 21). Defending Against Rules and Forms Injection. Retrieved November 5, 2019. url: https://blogs.technet.microsoft.com/office365security/defending-against-rules-and-forms-injection/ source_name: CrowdStrike Outlook Forms description: Parisi, T., et al. (2017, July). Using Outlook Forms for Lateral Movement and Persistence. Retrieved February 5, 2019. url: https://malware.news/t/using-outlook-forms-for-lateral-movement-and-persistence/13746 source_name: Outlook Today Home Page description: Soutcast. (2018, September 14). Outlook Today Homepage Persistence. Retrieved February 5, 2019. url: https://medium.com/@bwtech789/outlook-today-homepage-persistence-33ea9b505943 source_name: Microsoft Detect Outlook Forms description: Fox, C., Vangel, D. (2018, April 22). Detect and Remediate Outlook Rules and Custom Forms Injections Attacks in Office 365. Retrieved February 4, 2019. url: https://docs.microsoft.com/en-us/office365/securitycompliance/detect-and-remediate-outlook-rules-forms-attack source_name: SensePost NotRuler description: SensePost. (2017, September 21). NotRuler - The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange. Retrieved February 4, 2019. url: https://github.com/sensepost/notruler
kill_chain_name: mitre-attack phase_name: persistence
Windows
Adversaries may use InstallUtil to proxy execution of code through a trusted Windows utility. InstallUtil is a command-line utility that allows for installation and uninstallation of resources by executing specific installer components specified in .NET binaries. (Citation: MSDN InstallUtil) The InstallUtil binary may also be digitally signed by Microsoft and located in the .NET directories on a Windows system: <code>C:\Windows\Microsoft.NET\Framework\v<version>\InstallUtil.exe</code> and <code>C:\Windows\Microsoft.NET\Framework64\v<version>\InstallUtil.exe</code>. InstallUtil may also be used to bypass application control through use of attributes within the binary that execute the class decorated with the attribute <code>[System.ComponentModel.RunInstaller(true)]</code>. (Citation: LOLBAS Installutil)
enterprise-attack
InstallUtil
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1218/004 external_id: T1218.004 source_name: MSDN InstallUtil description: Microsoft. (n.d.). Installutil.exe (Installer Tool). Retrieved July 1, 2016. url: https://msdn.microsoft.com/en-us/library/50614e95.aspx source_name: LOLBAS Installutil description: LOLBAS. (n.d.). Installutil.exe. Retrieved July 31, 2019. url: https://lolbas-project.github.io/lolbas/Binaries/Installutil/
kill_chain_name: mitre-attack phase_name: defense-evasion
Windows
Adversaries may send spearphishing messages with a malicious link to elicit sensitive information that can be used during targeting. Spearphishing for information is an attempt to trick targets into divulging information, frequently credentials or other actionable information. Spearphishing for information frequently involves social engineering techniques, such as posing as a source with a reason to collect information (ex: [Establish Accounts](https://attack.mitre.org/techniques/T1585) or [Compromise Accounts](https://attack.mitre.org/techniques/T1586)) and/or sending multiple, seemingly urgent messages. All forms of spearphishing are electronically delivered social engineering targeted at a specific individual, company, or industry. In this scenario, the malicious emails contain links generally accompanied by social engineering text to coax the user to actively click or copy and paste a URL into a browser.(Citation: TrendMictro Phishing)(Citation: PCMag FakeLogin) The given website may be a clone of a legitimate site (such as an online or corporate login portal) or may closely resemble a legitimate site in appearance and have a URL containing elements from the real site. URLs may also be obfuscated by taking advantage of quirks in the URL schema, such as the acceptance of integer- or hexadecimal-based hostname formats and the automatic discarding of text before an “@” symbol: for example, `hxxp://google.com@1157586937`.(Citation: Mandiant URL Obfuscation 2023) Adversaries may also embed “tracking pixels”, "web bugs", or "web beacons" within phishing messages to verify the receipt of an email, while also potentially profiling and tracking victim information such as IP address.(Citation: NIST Web Bug) (Citation: Ryte Wiki) These mechanisms often appear as small images (typically one pixel in size) or otherwise obfuscated objects and are typically delivered as HTML code containing a link to a remote server. (Citation: Ryte Wiki)(Citation: IAPP) Adversaries may also be able to spoof a complete website using what is known as a "browser-in-the-browser" (BitB) attack. By generating a fake browser popup window with an HTML-based address bar that appears to contain a legitimate URL (such as an authentication portal), they may be able to prompt users to enter their credentials while bypassing typical URL verification methods.(Citation: ZScaler BitB 2020)(Citation: Mr. D0x BitB 2022) Adversaries can use phishing kits such as `EvilProxy` and `Evilginx2` to perform adversary-in-the-middle phishing by proxying the connection between the victim and the legitimate website. On a successful login, the victim is redirected to the legitimate website, while the adversary captures their session cookie (i.e., [Steal Web Session Cookie](https://attack.mitre.org/techniques/T1539)) in addition to their username and password. This may enable the adversary to then bypass MFA via [Web Session Cookie](https://attack.mitre.org/techniques/T1550/004).(Citation: Proofpoint Human Factor) Adversaries may also send a malicious link in the form of Quick Response (QR) Codes (also known as “quishing”). These links may direct a victim to a credential phishing page.(Citation: QR-campaign-energy-firm) By using a QR code, the URL may not be exposed in the email and may thus go undetected by most automated email security scans.(Citation: qr-phish-agriculture) These QR codes may be scanned by or delivered directly to a user’s mobile device (i.e., [Phishing](https://attack.mitre.org/techniques/T1660)), which may be less secure in several relevant ways.(Citation: qr-phish-agriculture) For example, mobile users may not be able to notice minor differences between genuine and credential harvesting websites due to mobile’s smaller form factor. From the fake website, information is gathered in web forms and sent to the adversary. Adversaries may also use information from previous reconnaissance efforts (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594)) to craft persuasive and believable lures.
enterprise-attack
Spearphishing Link
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1598/003 external_id: T1598.003 source_name: ACSC Email Spoofing description: Australian Cyber Security Centre. (2012, December). Mitigating Spoofed Emails Using Sender Policy Framework. Retrieved October 19, 2020. url: https://www.cyber.gov.au/sites/default/files/2019-03/spoof_email_sender_policy_framework.pdf source_name: TrendMictro Phishing description: Babon, P. (2020, September 3). Tricky 'Forms' of Phishing. Retrieved October 20, 2020. url: https://www.trendmicro.com/en_us/research/20/i/tricky-forms-of-phishing.html source_name: IAPP description: IAPP. (n.d.). Retrieved March 5, 2024. url: https://iapp.org/resources/article/web-beacon/ source_name: QR-campaign-energy-firm description: Jonathan Greig. (2023, August 16). Phishing campaign used QR codes to target large energy company. Retrieved November 27, 2023. url: https://therecord.media/phishing-campaign-used-qr-codes-to-target-energy-firm source_name: PCMag FakeLogin description: Kan, M. (2019, October 24). Hackers Try to Phish United Nations Staffers With Fake Login Pages. Retrieved October 20, 2020. url: https://www.pcmag.com/news/hackers-try-to-phish-united-nations-staffers-with-fake-login-pages source_name: Microsoft Anti Spoofing description: Microsoft. (2020, October 13). Anti-spoofing protection in EOP. Retrieved October 19, 2020. url: https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/anti-spoofing-protection?view=o365-worldwide source_name: Mr. D0x BitB 2022 description: mr.d0x. (2022, March 15). Browser In The Browser (BITB) Attack. Retrieved March 8, 2023. url: https://mrd0x.com/browser-in-the-browser-phishing-attack/ source_name: Mandiant URL Obfuscation 2023 description: Nick Simonian. (2023, May 22). Don't @ Me: URL Obfuscation Through Schema Abuse. Retrieved August 4, 2023. url: https://www.mandiant.com/resources/blog/url-obfuscation-schema-abuse source_name: NIST Web Bug description: NIST Information Technology Laboratory. (n.d.). web bug. Retrieved March 22, 2023. url: https://csrc.nist.gov/glossary/term/web_bug source_name: Proofpoint Human Factor description: Proofpoint. (n.d.). The Human Factor 2023: Analyzing the cyber attack chain. Retrieved July 20, 2023. url: https://www.proofpoint.com/sites/default/files/threat-reports/pfpt-us-tr-human-factor-report.pdf source_name: Ryte Wiki description: Ryte Wiki. (n.d.). Retrieved March 5, 2024. url: https://en.ryte.com/wiki/Tracking_Pixel source_name: qr-phish-agriculture description: Tim Bedard and Tyler Johnson. (2023, October 4). QR Code Scams & Phishing. Retrieved November 27, 2023. url: https://www.proofpoint.com/us/blog/email-and-cloud-threats/cybersecurity-stop-month-qr-code-phishing source_name: ZScaler BitB 2020 description: ZScaler. (2020, February 11). Fake Sites Stealing Steam Credentials. Retrieved March 8, 2023. url: https://www.zscaler.com/blogs/security-research/fake-sites-stealing-steam-credentials
kill_chain_name: mitre-attack phase_name: reconnaissance
PRE
Adversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to log into remote machines using Secure Shell (SSH). The adversary may then perform actions as the logged-on user. SSH is a protocol that allows authorized users to open remote shells on other computers. Many Linux and macOS versions come with SSH installed by default, although typically disabled until the user enables it. The SSH server can be configured to use standard password authentication or public-private keypairs in lieu of or in addition to a password. In this authentication scenario, the user’s public key must be in a special file on the computer running the server that lists which keypairs are allowed to login as that user.
enterprise-attack
SSH
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1021/004 external_id: T1021.004 source_name: Apple Unified Log Analysis Remote Login and Screen Sharing description: Sarah Edwards. (2020, April 30). Analysis of Apple Unified Logs: Quarantine Edition [Entry 6] – Working From Home? Remote Logins. Retrieved August 19, 2021. url: https://sarah-edwards-xzkc.squarespace.com/blog/2020/4/30/analysis-of-apple-unified-logs-quarantine-edition-entry-6-working-from-home-remote-logins
kill_chain_name: mitre-attack phase_name: lateral-movement
Linux
An adversary may add additional roles or permissions to an adversary-controlled cloud account to maintain persistent access to a tenant. For example, adversaries may update IAM policies in cloud-based environments or add a new global administrator in Office 365 environments.(Citation: AWS IAM Policies and Permissions)(Citation: Google Cloud IAM Policies)(Citation: Microsoft Support O365 Add Another Admin, October 2019)(Citation: Microsoft O365 Admin Roles) With sufficient permissions, a compromised account can gain almost unlimited access to data and settings (including the ability to reset the passwords of other admins).(Citation: Expel AWS Attacker) (Citation: Microsoft O365 Admin Roles) This account modification may immediately follow [Create Account](https://attack.mitre.org/techniques/T1136) or other malicious account activity. Adversaries may also modify existing [Valid Accounts](https://attack.mitre.org/techniques/T1078) that they have compromised. This could lead to privilege escalation, particularly if the roles added allow for lateral movement to additional accounts. For example, in AWS environments, an adversary with appropriate permissions may be able to use the <code>CreatePolicyVersion</code> API to define a new version of an IAM policy or the <code>AttachUserPolicy</code> API to attach an IAM policy with additional or distinct permissions to a compromised user account.(Citation: Rhino Security Labs AWS Privilege Escalation) In some cases, adversaries may add roles to adversary-controlled accounts outside the victim cloud tenant. This allows these external accounts to perform actions inside the victim tenant without requiring the adversary to [Create Account](https://attack.mitre.org/techniques/T1136) or modify a victim-owned account.(Citation: Invictus IR DangerDev 2024)
enterprise-attack
Additional Cloud Roles
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1098/003 external_id: T1098.003 source_name: Expel AWS Attacker description: Brian Bahtiarian, David Blanton, Britton Manahan and Kyle Pellett. (2022, April 5). Incident report: From CLI to console, chasing an attacker in AWS. Retrieved April 7, 2022. url: https://expel.com/blog/incident-report-from-cli-to-console-chasing-an-attacker-in-aws/ source_name: Microsoft O365 Admin Roles description: Ako-Adjei, K., Dickhaus, M., Baumgartner, P., Faigel, D., et. al.. (2019, October 8). About admin roles. Retrieved October 18, 2019. url: https://docs.microsoft.com/en-us/office365/admin/add-users/about-admin-roles?view=o365-worldwide source_name: AWS IAM Policies and Permissions description: AWS. (n.d.). Policies and permissions in IAM. Retrieved April 1, 2022. url: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html source_name: Google Cloud IAM Policies description: Google Cloud. (2022, March 31). Understanding policies. Retrieved April 1, 2022. url: https://cloud.google.com/iam/docs/policies source_name: Invictus IR DangerDev 2024 description: Invictus Incident Response. (2024, January 31). The curious case of DangerDev@protonmail.me. Retrieved March 19, 2024. url: https://www.invictus-ir.com/news/the-curious-case-of-dangerdev-protonmail-me source_name: Microsoft Support O365 Add Another Admin, October 2019 description: Microsoft. (n.d.). Add Another Admin. Retrieved October 18, 2019. url: https://support.office.com/en-us/article/add-another-admin-f693489f-9f55-4bd0-a637-a81ce93de22d source_name: Rhino Security Labs AWS Privilege Escalation description: Spencer Gietzen. (n.d.). AWS IAM Privilege Escalation – Methods and Mitigation. Retrieved May 27, 2022. url: https://rhinosecuritylabs.com/aws/aws-privilege-escalation-methods-mitigation/
kill_chain_name: mitre-attack phase_name: privilege-escalation
Office 365
Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation. Print processors are DLLs that are loaded by the print spooler service, `spoolsv.exe`, during boot.(Citation: Microsoft Intro Print Processors) Adversaries may abuse the print spooler service by adding print processors that load malicious DLLs at startup. A print processor can be installed through the <code>AddPrintProcessor</code> API call with an account that has <code>SeLoadDriverPrivilege</code> enabled. Alternatively, a print processor can be registered to the print spooler service by adding the <code>HKLM\SYSTEM\\[CurrentControlSet or ControlSet001]\Control\Print\Environments\\[Windows architecture: e.g., Windows x64]\Print Processors\\[user defined]\Driver</code> Registry key that points to the DLL. For the malicious print processor to be correctly installed, the payload must be located in the dedicated system print-processor directory, that can be found with the <code>GetPrintProcessorDirectory</code> API call, or referenced via a relative path from this directory.(Citation: Microsoft AddPrintProcessor May 2018) After the print processors are installed, the print spooler service, which starts during boot, must be restarted in order for them to run.(Citation: ESET PipeMon May 2020) The print spooler service runs under SYSTEM level permissions, therefore print processors installed by an adversary may run under elevated privileges.
enterprise-attack
Print Processors
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1547/012 external_id: T1547.012 source_name: Microsoft AddPrintProcessor May 2018 description: Microsoft. (2018, May 31). AddPrintProcessor function. Retrieved October 5, 2020. url: https://docs.microsoft.com/en-us/windows/win32/printdocs/addprintprocessor source_name: Microsoft Intro Print Processors description: Microsoft. (2023, June 26). Introduction to print processors. Retrieved September 27, 2023. url: https://learn.microsoft.com/windows-hardware/drivers/print/introduction-to-print-processors source_name: ESET PipeMon May 2020 description: Tartare, M. et al. (2020, May 21). No “Game over” for the Winnti Group. Retrieved August 24, 2020. url: https://www.welivesecurity.com/2020/05/21/no-game-over-winnti-group/
kill_chain_name: mitre-attack phase_name: privilege-escalation
Windows
Adversaries may send spearphishing emails with a malicious attachment in an attempt to gain access to victim systems. Spearphishing attachment is a specific variant of spearphishing. Spearphishing attachment is different from other forms of spearphishing in that it employs the use of malware attached to an email. All forms of spearphishing are electronically delivered social engineering targeted at a specific individual, company, or industry. In this scenario, adversaries attach a file to the spearphishing email and usually rely upon [User Execution](https://attack.mitre.org/techniques/T1204) to gain execution.(Citation: Unit 42 DarkHydrus July 2018) Spearphishing may also involve social engineering techniques, such as posing as a trusted source. There are many options for the attachment such as Microsoft Office documents, executables, PDFs, or archived files. Upon opening the attachment (and potentially clicking past protections), the adversary's payload exploits a vulnerability or directly executes on the user's system. The text of the spearphishing email usually tries to give a plausible reason why the file should be opened, and may explain how to bypass system protections in order to do so. The email may also contain instructions on how to decrypt an attachment, such as a zip file password, in order to evade email boundary defenses. Adversaries frequently manipulate file extensions and icons in order to make attached executables appear to be document files, or files exploiting one application appear to be a file for a different one.
enterprise-attack
Spearphishing Attachment
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1566/001 external_id: T1566.001 source_name: ACSC Email Spoofing description: Australian Cyber Security Centre. (2012, December). Mitigating Spoofed Emails Using Sender Policy Framework. Retrieved October 19, 2020. url: https://www.cyber.gov.au/sites/default/files/2019-03/spoof_email_sender_policy_framework.pdf source_name: Unit 42 DarkHydrus July 2018 description: Falcone, R., et al. (2018, July 27). New Threat Actor Group DarkHydrus Targets Middle East Government. Retrieved August 2, 2018. url: https://researchcenter.paloaltonetworks.com/2018/07/unit42-new-threat-actor-group-darkhydrus-targets-middle-east-government/ source_name: Microsoft Anti Spoofing description: Microsoft. (2020, October 13). Anti-spoofing protection in EOP. Retrieved October 19, 2020. url: https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/anti-spoofing-protection?view=o365-worldwide source_name: Elastic - Koadiac Detection with EQL description: Stepanic, D.. (2020, January 13). Embracing offensive tooling: Building detections against Koadic using EQL. Retrieved November 30, 2020. url: https://www.elastic.co/blog/embracing-offensive-tooling-building-detections-against-koadic-using-eql
kill_chain_name: mitre-attack phase_name: initial-access
macOS
Adversaries may attempt to make a payload difficult to analyze by removing symbols, strings, and other human readable information. Scripts and executables may contain variables names and other strings that help developers document code functionality. Symbols are often created by an operating system’s `linker` when executable payloads are compiled. Reverse engineers use these symbols and strings to analyze code and to identify functionality in payloads.(Citation: Mandiant golang stripped binaries explanation)(Citation: intezer stripped binaries elf files 2018) Adversaries may use stripped payloads in order to make malware analysis more difficult. For example, compilers and other tools may provide features to remove or obfuscate strings and symbols. Adversaries have also used stripped payload formats, such as run-only AppleScripts, a compiled and stripped version of [AppleScript](https://attack.mitre.org/techniques/T1059/002), to evade detection and analysis. The lack of human-readable information may directly hinder detection and analysis of payloads.(Citation: SentinelLabs reversing run-only applescripts 2021)
enterprise-attack
Stripped Payloads
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1027/008 external_id: T1027.008 source_name: intezer stripped binaries elf files 2018 description: Ignacio Sanmillan. (2018, February 7). Executable and Linkable Format 101. Part 2: Symbols. Retrieved September 29, 2022. url: https://www.intezer.com/blog/malware-analysis/executable-linkable-format-101-part-2-symbols/ source_name: SentinelLabs reversing run-only applescripts 2021 description: Phil Stokes. (2021, January 11). FADE DEAD | Adventures in Reversing Malicious Run-Only AppleScripts. Retrieved September 29, 2022. url: https://www.sentinelone.com/labs/fade-dead-adventures-in-reversing-malicious-run-only-applescripts/ source_name: Mandiant golang stripped binaries explanation description: STEPHEN ECKELS. (2022, February 28). Ready, Set, Go — Golang Internals and Symbol Recovery. Retrieved September 29, 2022. url: https://www.mandiant.com/resources/blog/golang-internals-symbol-recovery
kill_chain_name: mitre-attack phase_name: defense-evasion
macOS
Adversaries may use the Windows Component Object Model (COM) for local code execution. COM is an inter-process communication (IPC) component of the native Windows application programming interface (API) that enables interaction between software objects, or executable code that implements one or more interfaces.(Citation: Fireeye Hunting COM June 2019) Through COM, a client object can call methods of server objects, which are typically binary Dynamic Link Libraries (DLL) or executables (EXE).(Citation: Microsoft COM) Remote COM execution is facilitated by [Remote Services](https://attack.mitre.org/techniques/T1021) such as [Distributed Component Object Model](https://attack.mitre.org/techniques/T1021/003) (DCOM).(Citation: Fireeye Hunting COM June 2019) Various COM interfaces are exposed that can be abused to invoke arbitrary execution via a variety of programming languages such as C, C++, Java, and [Visual Basic](https://attack.mitre.org/techniques/T1059/005).(Citation: Microsoft COM) Specific COM objects also exist to directly perform functions beyond code execution, such as creating a [Scheduled Task/Job](https://attack.mitre.org/techniques/T1053), fileless download/execution, and other adversary behaviors related to privilege escalation and persistence.(Citation: Fireeye Hunting COM June 2019)(Citation: ProjectZero File Write EoP Apr 2018)
enterprise-attack
Component Object Model
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1559/001 external_id: T1559.001 source_name: Fireeye Hunting COM June 2019 description: Hamilton, C. (2019, June 4). Hunting COM Objects. Retrieved June 10, 2019. url: https://www.fireeye.com/blog/threat-research/2019/06/hunting-com-objects.html source_name: Microsoft COM description: Microsoft. (n.d.). Component Object Model (COM). Retrieved November 22, 2017. url: https://msdn.microsoft.com/library/windows/desktop/ms680573.aspx source_name: ProjectZero File Write EoP Apr 2018 description: Forshaw, J. (2018, April 18). Windows Exploitation Tricks: Exploiting Arbitrary File Writes for Local Elevation of Privilege. Retrieved May 3, 2018. url: https://googleprojectzero.blogspot.com/2018/04/windows-exploitation-tricks-exploiting.html source_name: Enigma Outlook DCOM Lateral Movement Nov 2017 description: Nelson, M. (2017, November 16). Lateral Movement using Outlook's CreateObject Method and DotNetToJScript. Retrieved November 21, 2017. url: https://enigma0x3.net/2017/11/16/lateral-movement-using-outlooks-createobject-method-and-dotnettojscript/ source_name: Enigma MMC20 COM Jan 2017 description: Nelson, M. (2017, January 5). Lateral Movement using the MMC20 Application COM Object. Retrieved November 21, 2017. url: https://enigma0x3.net/2017/01/05/lateral-movement-using-the-mmc20-application-com-object/
kill_chain_name: mitre-attack phase_name: execution
Windows
Adversaries may execute their own malicious payloads by hijacking the search order used to load DLLs. Windows systems use a common method to look for required DLLs to load into a program. (Citation: Microsoft Dynamic Link Library Search Order)(Citation: FireEye Hijacking July 2010) Hijacking DLL loads may be for the purpose of establishing persistence as well as elevating privileges and/or evading restrictions on file execution. There are many ways an adversary can hijack DLL loads. Adversaries may plant trojan dynamic-link library files (DLLs) in a directory that will be searched before the location of a legitimate library that will be requested by a program, causing Windows to load their malicious library when it is called for by the victim program. Adversaries may also perform DLL preloading, also called binary planting attacks, (Citation: OWASP Binary Planting) by placing a malicious DLL with the same name as an ambiguously specified DLL in a location that Windows searches before the legitimate DLL. Often this location is the current working directory of the program.(Citation: FireEye fxsst June 2011) Remote DLL preloading attacks occur when a program sets its current directory to a remote location such as a Web share before loading a DLL. (Citation: Microsoft Security Advisory 2269637) Phantom DLL hijacking is a specific type of DLL search order hijacking where adversaries target references to non-existent DLL files.(Citation: Adversaries Hijack DLLs) They may be able to load their own malicious DLL by planting it with the correct name in the location of the missing module. Adversaries may also directly modify the search order via DLL redirection, which after being enabled (in the Registry and creation of a redirection file) may cause a program to load a different DLL.(Citation: Microsoft Dynamic-Link Library Redirection)(Citation: Microsoft Manifests)(Citation: FireEye DLL Search Order Hijacking) If a search order-vulnerable program is configured to run at a higher privilege level, then the adversary-controlled DLL that is loaded will also be executed at the higher level. In this case, the technique could be used for privilege escalation from user to administrator or SYSTEM or from administrator to SYSTEM, depending on the program. Programs that fall victim to path hijacking may appear to behave normally because malicious DLLs may be configured to also load the legitimate DLLs they were meant to replace.
enterprise-attack
DLL Search Order Hijacking
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1574/001 external_id: T1574.001 source_name: Adversaries Hijack DLLs description: CrowdStrike, Falcon OverWatch Team. (2022, December 30). Retrieved October 19, 2023. url: https://www.crowdstrike.com/blog/4-ways-adversaries-hijack-dlls/ source_name: FireEye Hijacking July 2010 description: Harbour, N. (2010, July 15). Malware Persistence without the Windows Registry. Retrieved November 17, 2020. url: https://www.fireeye.com/blog/threat-research/2010/07/malware-persistence-windows-registry.html source_name: FireEye fxsst June 2011 description: Harbour, N. (2011, June 3). What the fxsst?. Retrieved November 17, 2020. url: https://www.fireeye.com/blog/threat-research/2011/06/fxsst.html source_name: Microsoft Security Advisory 2269637 description: Microsoft. (, May 23). Microsoft Security Advisory 2269637. Retrieved March 13, 2020. url: https://docs.microsoft.com/en-us/security-updates/securityadvisories/2010/2269637 source_name: Microsoft Dynamic-Link Library Redirection description: Microsoft. (2018, May 31). Dynamic-Link Library Redirection. Retrieved March 13, 2020. url: https://docs.microsoft.com/en-us/windows/win32/dlls/dynamic-link-library-redirection?redirectedfrom=MSDN source_name: Microsoft Dynamic Link Library Search Order description: Microsoft. (2018, May 31). Dynamic-Link Library Search Order. Retrieved November 30, 2014. url: https://docs.microsoft.com/en-us/windows/win32/dlls/dynamic-link-library-search-order?redirectedfrom=MSDN source_name: Microsoft Manifests description: Microsoft. (n.d.). Manifests. Retrieved December 5, 2014. url: https://msdn.microsoft.com/en-US/library/aa375365 source_name: FireEye DLL Search Order Hijacking description: Nick Harbour. (2010, September 1). DLL Search Order Hijacking Revisited. Retrieved March 13, 2020. url: https://www.fireeye.com/blog/threat-research/2010/08/dll-search-order-hijacking-revisited.html source_name: OWASP Binary Planting description: OWASP. (2013, January 30). Binary planting. Retrieved June 7, 2016. url: https://www.owasp.org/index.php/Binary_planting
kill_chain_name: mitre-attack phase_name: defense-evasion
Windows
Once established within a system or network, an adversary may use automated techniques for collecting internal data. Methods for performing this technique could include use of a [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059) to search for and copy information fitting set criteria such as file type, location, or name at specific time intervals. In cloud-based environments, adversaries may also use cloud APIs, data pipelines, command line interfaces, or extract, transform, and load (ETL) services to automatically collect data.(Citation: Mandiant UNC3944 SMS Phishing 2023) This functionality could also be built into remote access tools. This technique may incorporate use of other techniques such as [File and Directory Discovery](https://attack.mitre.org/techniques/T1083) and [Lateral Tool Transfer](https://attack.mitre.org/techniques/T1570) to identify and move files, as well as [Cloud Service Dashboard](https://attack.mitre.org/techniques/T1538) and [Cloud Storage Object Discovery](https://attack.mitre.org/techniques/T1619) to identify resources in cloud environments.
enterprise-attack
Automated Collection
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1119 external_id: T1119 source_name: Mandiant UNC3944 SMS Phishing 2023 description: Mandiant Intelligence. (2023, September 14). Why Are You Texting Me? UNC3944 Leverages SMS Phishing Campaigns for SIM Swapping, Ransomware, Extortion, and Notoriety. Retrieved January 2, 2024. url: https://www.mandiant.com/resources/blog/unc3944-sms-phishing-sim-swapping-ransomware
kill_chain_name: mitre-attack phase_name: collection
Linux
Adversaries may collect data stored in the clipboard from users copying information within or between applications. For example, on Windows adversaries can access clipboard data by using <code>clip.exe</code> or <code>Get-Clipboard</code>.(Citation: MSDN Clipboard)(Citation: clip_win_server)(Citation: CISA_AA21_200B) Additionally, adversaries may monitor then replace users’ clipboard with their data (e.g., [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1565/002)).(Citation: mining_ruby_reversinglabs) macOS and Linux also have commands, such as <code>pbpaste</code>, to grab clipboard contents.(Citation: Operating with EmPyre)
enterprise-attack
Clipboard Data
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1115 external_id: T1115 source_name: CISA_AA21_200B description: CISA. (2021, August 20). Alert (AA21-200B) Chinese State-Sponsored Cyber Operations: Observed TTPs. Retrieved June 21, 2022. url: https://www.cisa.gov/uscert/ncas/alerts/aa21-200b source_name: mining_ruby_reversinglabs description: Maljic, T. (2020, April 16). Mining for malicious Ruby gems. Retrieved October 15, 2022. url: https://blog.reversinglabs.com/blog/mining-for-malicious-ruby-gems source_name: clip_win_server description: Microsoft, JasonGerend, et al. (2023, February 3). clip. Retrieved June 21, 2022. url: https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/clip source_name: MSDN Clipboard description: Microsoft. (n.d.). About the Clipboard. Retrieved March 29, 2016. url: https://msdn.microsoft.com/en-us/library/ms649012 source_name: Operating with EmPyre description: rvrsh3ll. (2016, May 18). Operating with EmPyre. Retrieved July 12, 2017. url: https://medium.com/rvrsh3ll/operating-with-empyre-ea764eda3363
kill_chain_name: mitre-attack phase_name: collection
Linux
Adversaries may gather credentials from the proc filesystem or `/proc`. The proc filesystem is a pseudo-filesystem used as an interface to kernel data structures for Linux based systems managing virtual memory. For each process, the `/proc/<PID>/maps` file shows how memory is mapped within the process’s virtual address space. And `/proc/<PID>/mem`, exposed for debugging purposes, provides access to the process’s virtual address space.(Citation: Picus Labs Proc cump 2022)(Citation: baeldung Linux proc map 2022) When executing with root privileges, adversaries can search these memory locations for all processes on a system that contain patterns indicative of credentials. Adversaries may use regex patterns, such as <code>grep -E "^[0-9a-f-]* r" /proc/"$pid"/maps | cut -d' ' -f 1</code>, to look for fixed strings in memory structures or cached hashes.(Citation: atomic-red proc file system) When running without privileged access, processes can still view their own virtual memory locations. Some services or programs may save credentials in clear text inside the process’s memory.(Citation: MimiPenguin GitHub May 2017)(Citation: Polop Linux PrivEsc Gitbook) If running as or with the permissions of a web browser, a process can search the `/maps` & `/mem` locations for common website credential patterns (that can also be used to find adjacent memory within the same structure) in which hashes or cleartext credentials may be located.
enterprise-attack
Proc Filesystem
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1003/007 external_id: T1003.007 source_name: atomic-red proc file system description: Atomic Red Team. (2023, November). T1003.007 - OS Credential Dumping: Proc Filesystem. Retrieved March 28, 2024. url: https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1003.007/T1003.007.md source_name: baeldung Linux proc map 2022 description: baeldung. (2022, April 8). Understanding the Linux /proc/id/maps File. Retrieved March 31, 2023. url: https://www.baeldung.com/linux/proc-id-maps source_name: Polop Linux PrivEsc Gitbook description: Carlos Polop. (2023, March 5). Linux Privilege Escalation. Retrieved March 31, 2023. url: https://book.hacktricks.xyz/linux-hardening/privilege-escalation#proc-usdpid-maps-and-proc-usdpid-mem source_name: MimiPenguin GitHub May 2017 description: Gregal, H. (2017, May 12). MimiPenguin. Retrieved December 5, 2017. url: https://github.com/huntergregal/mimipenguin source_name: Picus Labs Proc cump 2022 description: Huseyin Can YUCEEL & Picus Labs. (2022, March 22). Retrieved March 31, 2023. url: https://www.picussecurity.com/resource/the-mitre-attck-t1003-os-credential-dumping-technique-and-its-adversary-use
kill_chain_name: mitre-attack phase_name: credential-access
Linux
Adversaries may buy, lease, or rent a network of compromised systems that can be used during targeting. A botnet is a network of compromised systems that can be instructed to perform coordinated tasks.(Citation: Norton Botnet) Adversaries may purchase a subscription to use an existing botnet from a booter/stresser service. With a botnet at their disposal, adversaries may perform follow-on activity such as large-scale [Phishing](https://attack.mitre.org/techniques/T1566) or Distributed Denial of Service (DDoS).(Citation: Imperva DDoS for Hire)(Citation: Krebs-Anna)(Citation: Krebs-Bazaar)(Citation: Krebs-Booter)
enterprise-attack
Botnet
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1583/005 external_id: T1583.005 source_name: Norton Botnet description: Norton. (n.d.). What is a botnet?. Retrieved October 4, 2020. url: https://us.norton.com/internetsecurity-malware-what-is-a-botnet.html source_name: Imperva DDoS for Hire description: Imperva. (n.d.). Booters, Stressers and DDoSers. Retrieved October 4, 2020. url: https://www.imperva.com/learn/ddos/booters-stressers-ddosers/ source_name: Krebs-Anna description: Brian Krebs. (2017, January 18). Who is Anna-Senpai, the Mirai Worm Author?. Retrieved May 15, 2017. url: https://krebsonsecurity.com/2017/01/who-is-anna-senpai-the-mirai-worm-author/ source_name: Krebs-Bazaar description: Brian Krebs. (2016, October 31). Hackforums Shutters Booter Service Bazaar. Retrieved May 15, 2017. url: https://krebsonsecurity.com/2016/10/hackforums-shutters-booter-service-bazaar/ source_name: Krebs-Booter description: Brian Krebs. (2016, October 27). Are the Days of “Booter” Services Numbered?. Retrieved May 15, 2017. url: https://krebsonsecurity.com/2016/10/are-the-days-of-booter-services-numbered/
kill_chain_name: mitre-attack phase_name: resource-development
PRE
Adversaries may acquire user credentials from third-party password managers.(Citation: ise Password Manager February 2019) Password managers are applications designed to store user credentials, normally in an encrypted database. Credentials are typically accessible after a user provides a master password that unlocks the database. After the database is unlocked, these credentials may be copied to memory. These databases can be stored as files on disk.(Citation: ise Password Manager February 2019) Adversaries may acquire user credentials from password managers by extracting the master password and/or plain-text credentials from memory.(Citation: FoxIT Wocao December 2019)(Citation: Github KeeThief) Adversaries may extract credentials from memory via [Exploitation for Credential Access](https://attack.mitre.org/techniques/T1212).(Citation: NVD CVE-2019-3610) Adversaries may also try brute forcing via [Password Guessing](https://attack.mitre.org/techniques/T1110/001) to obtain the master password of a password manager.(Citation: Cyberreason Anchor December 2019)
enterprise-attack
Password Managers
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1555/005 external_id: T1555.005 source_name: ise Password Manager February 2019 description: ise. (2019, February 19). Password Managers: Under the Hood of Secrets Management. Retrieved January 22, 2021. url: https://www.ise.io/casestudies/password-manager-hacking/ source_name: FoxIT Wocao December 2019 description: Dantzig, M. v., Schamper, E. (2019, December 19). Operation Wocao: Shining a light on one of China’s hidden hacking groups. Retrieved October 8, 2020. url: https://www.fox-it.com/media/kadlze5c/201912_report_operation_wocao.pdf source_name: Github KeeThief description: Lee, C., Schoreder, W. (n.d.). KeeThief. Retrieved February 8, 2021. url: https://github.com/GhostPack/KeeThief source_name: NVD CVE-2019-3610 description: National Vulnerability Database. (2019, October 9). CVE-2019-3610 Detail. Retrieved April 14, 2021. url: https://nvd.nist.gov/vuln/detail/CVE-2019-3610 source_name: Cyberreason Anchor December 2019 description: Dahan, A. et al. (2019, December 11). DROPPING ANCHOR: FROM A TRICKBOT INFECTION TO THE DISCOVERY OF THE ANCHOR MALWARE. Retrieved September 10, 2020. url: https://www.cybereason.com/blog/dropping-anchor-from-a-trickbot-infection-to-the-discovery-of-the-anchor-malware
kill_chain_name: mitre-attack phase_name: credential-access
Linux
Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apple’s security model to ensure only trusted applications are executed on a host. Gatekeeper was built on top of File Quarantine in Snow Leopard (10.6, 2009) and has grown to include Code Signing, security policy compliance, Notarization, and more. Gatekeeper also treats applications running for the first time differently than reopened applications.(Citation: TheEclecticLightCompany Quarantine and the flag)(Citation: TheEclecticLightCompany apple notarization ) Based on an opt-in system, when files are downloaded an extended attribute (xattr) called `com.apple.quarantine` (also known as a quarantine flag) can be set on the file by the application performing the download. Launch Services opens the application in a suspended state. For first run applications with the quarantine flag set, Gatekeeper executes the following functions: 1. Checks extended attribute – Gatekeeper checks for the quarantine flag, then provides an alert prompt to the user to allow or deny execution.(Citation: OceanLotus for OS X)(Citation: 20 macOS Common Tools and Techniques) 2. Checks System Policies - Gatekeeper checks the system security policy, allowing execution of apps downloaded from either just the App Store or the App Store and identified developers. 3. Code Signing – Gatekeeper checks for a valid code signature from an Apple Developer ID. 4. Notarization - Using the `api.apple-cloudkit.com` API, Gatekeeper reaches out to Apple servers to verify or pull down the notarization ticket and ensure the ticket is not revoked. Users can override notarization, which will result in a prompt of executing an “unauthorized app” and the security policy will be modified. Adversaries can subvert one or multiple security controls within Gatekeeper checks through logic errors (e.g. [Exploitation for Defense Evasion](https://attack.mitre.org/techniques/T1211)), unchecked file types, and external libraries. For example, prior to macOS 13 Ventura, code signing and notarization checks were only conducted on first launch, allowing adversaries to write malicious executables to previously opened applications in order to bypass Gatekeeper security checks.(Citation: theevilbit gatekeeper bypass 2021)(Citation: Application Bundle Manipulation Brandon Dalton) Applications and files loaded onto the system from a USB flash drive, optical disk, external hard drive, from a drive shared over the local network, or using the curl command may not set the quarantine flag. Additionally, it is possible to avoid setting the quarantine flag using [Drive-by Compromise](https://attack.mitre.org/techniques/T1189).
enterprise-attack
Gatekeeper Bypass
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1553/001 external_id: T1553.001 source_name: Application Bundle Manipulation Brandon Dalton description: Brandon Dalton. (2022, August 9). A bundle of nerves: Tweaking macOS security controls to thwart application bundle manipulation. Retrieved September 27, 2022. url: https://redcanary.com/blog/mac-application-bundles/ source_name: theevilbit gatekeeper bypass 2021 description: Csaba Fitzl. (2021, June 29). GateKeeper - Not a Bypass (Again). Retrieved September 22, 2021. url: https://theevilbit.github.io/posts/gatekeeper_not_a_bypass/ source_name: OceanLotus for OS X description: Eddie Lee. (2016, February 17). OceanLotus for OS X - an Application Bundle Pretending to be an Adobe Flash Update. Retrieved July 5, 2017. url: https://www.alienvault.com/blogs/labs-research/oceanlotus-for-os-x-an-application-bundle-pretending-to-be-an-adobe-flash-update source_name: TheEclecticLightCompany Quarantine and the flag description: hoakley. (2020, October 29). Quarantine and the quarantine flag. Retrieved September 13, 2021. url: https://eclecticlight.co/2020/10/29/quarantine-and-the-quarantine-flag/ source_name: TheEclecticLightCompany apple notarization description: How Notarization Works. (2020, August 28). How notarization works. Retrieved September 13, 2021. url: https://eclecticlight.co/2020/08/28/how-notarization-works/ source_name: 20 macOS Common Tools and Techniques description: Phil Stokes. (2021, February 16). 20 Common Tools & Techniques Used by macOS Threat Actors & Malware. Retrieved August 23, 2021. url: https://labs.sentinelone.com/20-common-tools-techniques-used-by-macos-threat-actors-malware/
kill_chain_name: mitre-attack phase_name: defense-evasion
macOS
Adversaries may prepare an operational environment to infect systems that visit a website over the normal course of browsing. Endpoint systems may be compromised through browsing to adversary controlled sites, as in [Drive-by Compromise](https://attack.mitre.org/techniques/T1189). In such cases, the user's web browser is typically targeted for exploitation (often not requiring any extra user interaction once landing on the site), but adversaries may also set up websites for non-exploitation behavior such as [Application Access Token](https://attack.mitre.org/techniques/T1550/001). Prior to [Drive-by Compromise](https://attack.mitre.org/techniques/T1189), adversaries must stage resources needed to deliver that exploit to users who browse to an adversary controlled site. Drive-by content can be staged on adversary controlled infrastructure that has been acquired ([Acquire Infrastructure](https://attack.mitre.org/techniques/T1583)) or previously compromised ([Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)). Adversaries may upload or inject malicious web content, such as [JavaScript](https://attack.mitre.org/techniques/T1059/007), into websites.(Citation: FireEye CFR Watering Hole 2012)(Citation: Gallagher 2015) This may be done in a number of ways, including: * Inserting malicious scripts into web pages or other user controllable web content such as forum posts * Modifying script files served to websites from publicly writeable cloud storage buckets * Crafting malicious web advertisements and purchasing ad space on a website through legitimate ad providers (i.e., [Malvertising](https://attack.mitre.org/techniques/T1583/008)) In addition to staging content to exploit a user's web browser, adversaries may also stage scripting content to profile the user's browser (as in [Gather Victim Host Information](https://attack.mitre.org/techniques/T1592)) to ensure it is vulnerable prior to attempting exploitation.(Citation: ATT ScanBox) Websites compromised by an adversary and used to stage a drive-by may be ones visited by a specific community, such as government, a particular industry, or region, where the goal is to compromise a specific user or set of users based on a shared interest. This kind of targeted campaign is referred to a strategic web compromise or watering hole attack. Adversaries may purchase domains similar to legitimate domains (ex: homoglyphs, typosquatting, different top-level domain, etc.) during acquisition of infrastructure ([Domains](https://attack.mitre.org/techniques/T1583/001)) to help facilitate [Drive-by Compromise](https://attack.mitre.org/techniques/T1189).
enterprise-attack
Drive-by Target
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1608/004 external_id: T1608.004 source_name: ATT ScanBox description: Blasco, J. (2014, August 28). Scanbox: A Reconnaissance Framework Used with Watering Hole Attacks. Retrieved October 19, 2020. url: https://cybersecurity.att.com/blogs/labs-research/scanbox-a-reconnaissance-framework-used-on-watering-hole-attacks source_name: Gallagher 2015 description: Gallagher, S.. (2015, August 5). Newly discovered Chinese hacking group hacked 100+ websites to use as “watering holes”. Retrieved January 25, 2016. url: http://arstechnica.com/security/2015/08/newly-discovered-chinese-hacking-group-hacked-100-websites-to-use-as-watering-holes/ source_name: FireEye CFR Watering Hole 2012 description: Kindlund, D. (2012, December 30). CFR Watering Hole Attack Details. Retrieved December 18, 2020. url: https://www.fireeye.com/blog/threat-research/2012/12/council-foreign-relations-water-hole-attack-details.html
kill_chain_name: mitre-attack phase_name: resource-development
PRE
Adversaries may try to gather information about registered local system services. Adversaries may obtain information about services using tools as well as OS utility commands such as <code>sc query</code>, <code>tasklist /svc</code>, <code>systemctl --type=service</code>, and <code>net start</code>. Adversaries may use the information from [System Service Discovery](https://attack.mitre.org/techniques/T1007) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.
enterprise-attack
System Service Discovery
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1007 external_id: T1007
kill_chain_name: mitre-attack phase_name: discovery
Windows
Adversaries may passively sniff network traffic to capture information about an environment, including authentication material passed over the network. Network sniffing refers to using the network interface on a system to monitor or capture information sent over a wired or wireless connection. An adversary may place a network interface into promiscuous mode to passively access data in transit over the network, or use span ports to capture a larger amount of data. Data captured via this technique may include user credentials, especially those sent over an insecure, unencrypted protocol. Techniques for name service resolution poisoning, such as [LLMNR/NBT-NS Poisoning and SMB Relay](https://attack.mitre.org/techniques/T1557/001), can also be used to capture credentials to websites, proxies, and internal systems by redirecting traffic to an adversary. Network sniffing may reveal configuration details, such as running services, version numbers, and other network characteristics (e.g. IP addresses, hostnames, VLAN IDs) necessary for subsequent [Lateral Movement](https://attack.mitre.org/tactics/TA0008) and/or [Defense Evasion](https://attack.mitre.org/tactics/TA0005) activities. Adversaries may likely also utilize network sniffing during [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1557) (AiTM) to passively gain additional knowledge about the environment. In cloud-based environments, adversaries may still be able to use traffic mirroring services to sniff network traffic from virtual machines. For example, AWS Traffic Mirroring, GCP Packet Mirroring, and Azure vTap allow users to define specified instances to collect traffic from and specified targets to send collected traffic to.(Citation: AWS Traffic Mirroring)(Citation: GCP Packet Mirroring)(Citation: Azure Virtual Network TAP) Often, much of this traffic will be in cleartext due to the use of TLS termination at the load balancer level to reduce the strain of encrypting and decrypting traffic.(Citation: Rhino Security Labs AWS VPC Traffic Mirroring)(Citation: SpecterOps AWS Traffic Mirroring) The adversary can then use exfiltration techniques such as Transfer Data to Cloud Account in order to access the sniffed traffic.(Citation: Rhino Security Labs AWS VPC Traffic Mirroring) On network devices, adversaries may perform network captures using [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) commands such as `monitor capture`.(Citation: US-CERT-TA18-106A)(Citation: capture_embedded_packet_on_software)
enterprise-attack
Network Sniffing
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1040 external_id: T1040 source_name: AWS Traffic Mirroring description: Amazon Web Services. (n.d.). How Traffic Mirroring works. Retrieved March 17, 2022. url: https://docs.aws.amazon.com/vpc/latest/mirroring/traffic-mirroring-how-it-works.html source_name: capture_embedded_packet_on_software description: Cisco. (2022, August 17). Configure and Capture Embedded Packet on Software. Retrieved July 13, 2022. url: https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-embedded-packet-capture/116045-productconfig-epc-00.html source_name: GCP Packet Mirroring description: Google Cloud. (n.d.). Packet Mirroring overview. Retrieved March 17, 2022. url: https://cloud.google.com/vpc/docs/packet-mirroring source_name: SpecterOps AWS Traffic Mirroring description: Luke Paine. (2020, March 11). Through the Looking Glass — Part 1. Retrieved March 17, 2022. url: https://posts.specterops.io/through-the-looking-glass-part-1-f539ae308512 source_name: Azure Virtual Network TAP description: Microsoft. (2022, February 9). Virtual network TAP. Retrieved March 17, 2022. url: https://docs.microsoft.com/en-us/azure/virtual-network/virtual-network-tap-overview source_name: Rhino Security Labs AWS VPC Traffic Mirroring description: Spencer Gietzen. (2019, September 17). Abusing VPC Traffic Mirroring in AWS. Retrieved March 17, 2022. url: https://rhinosecuritylabs.com/aws/abusing-vpc-traffic-mirroring-in-aws/ source_name: US-CERT-TA18-106A description: US-CERT. (2018, April 20). Alert (TA18-106A) Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. Retrieved October 19, 2020. url: https://www.us-cert.gov/ncas/alerts/TA18-106A
kill_chain_name: mitre-attack phase_name: discovery
Linux
Adversaries may create, acquire, or steal code signing materials to sign their malware or tools. Code signing provides a level of authenticity on a binary from the developer and a guarantee that the binary has not been tampered with. (Citation: Wikipedia Code Signing) The certificates used during an operation may be created, acquired, or stolen by the adversary. (Citation: Securelist Digital Certificates) (Citation: Symantec Digital Certificates) Unlike [Invalid Code Signature](https://attack.mitre.org/techniques/T1036/001), this activity will result in a valid signature. Code signing to verify software on first run can be used on modern Windows and macOS systems. It is not used on Linux due to the decentralized nature of the platform. (Citation: Wikipedia Code Signing)(Citation: EclecticLightChecksonEXECodeSigning) Code signing certificates may be used to bypass security policies that require signed code to execute on a system.
enterprise-attack
Code Signing
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1553/002 external_id: T1553.002 source_name: EclecticLightChecksonEXECodeSigning description: Howard Oakley. (2020, November 16). Checks on executable code in Catalina and Big Sur: a first draft. Retrieved September 21, 2022. url: https://eclecticlight.co/2020/11/16/checks-on-executable-code-in-catalina-and-big-sur-a-first-draft/ source_name: Securelist Digital Certificates description: Ladikov, A. (2015, January 29). Why You Shouldn’t Completely Trust Files Signed with Digital Certificates. Retrieved March 31, 2016. url: https://securelist.com/why-you-shouldnt-completely-trust-files-signed-with-digital-certificates/68593/ source_name: Symantec Digital Certificates description: Shinotsuka, H. (2013, February 22). How Attackers Steal Private Keys from Digital Certificates. Retrieved March 31, 2016. url: http://www.symantec.com/connect/blogs/how-attackers-steal-private-keys-digital-certificates source_name: Wikipedia Code Signing description: Wikipedia. (2015, November 10). Code Signing. Retrieved March 31, 2016. url: https://en.wikipedia.org/wiki/Code_signing
kill_chain_name: mitre-attack phase_name: defense-evasion
macOS
Adversaries may access data from cloud storage. Many IaaS providers offer solutions for online data object storage such as Amazon S3, Azure Storage, and Google Cloud Storage. Similarly, SaaS enterprise platforms such as Office 365 and Google Workspace provide cloud-based document storage to users through services such as OneDrive and Google Drive, while SaaS application providers such as Slack, Confluence, Salesforce, and Dropbox may provide cloud storage solutions as a peripheral or primary use case of their platform. In some cases, as with IaaS-based cloud storage, there exists no overarching application (such as SQL or Elasticsearch) with which to interact with the stored objects: instead, data from these solutions is retrieved directly though the [Cloud API](https://attack.mitre.org/techniques/T1059/009). In SaaS applications, adversaries may be able to collect this data directly from APIs or backend cloud storage objects, rather than through their front-end application or interface (i.e., [Data from Information Repositories](https://attack.mitre.org/techniques/T1213)). Adversaries may collect sensitive data from these cloud storage solutions. Providers typically offer security guides to help end users configure systems, though misconfigurations are a common problem.(Citation: Amazon S3 Security, 2019)(Citation: Microsoft Azure Storage Security, 2019)(Citation: Google Cloud Storage Best Practices, 2019) There have been numerous incidents where cloud storage has been improperly secured, typically by unintentionally allowing public access to unauthenticated users, overly-broad access by all users, or even access for any anonymous person outside the control of the Identity Access Management system without even needing basic user permissions. This open access may expose various types of sensitive data, such as credit cards, personally identifiable information, or medical records.(Citation: Trend Micro S3 Exposed PII, 2017)(Citation: Wired Magecart S3 Buckets, 2019)(Citation: HIPAA Journal S3 Breach, 2017)(Citation: Rclone-mega-extortion_05_2021) Adversaries may also obtain then abuse leaked credentials from source repositories, logs, or other means as a way to gain access to cloud storage objects.
enterprise-attack
Data from Cloud Storage
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1530 external_id: T1530 source_name: Amazon S3 Security, 2019 description: Amazon. (2019, May 17). How can I secure the files in my Amazon S3 bucket?. Retrieved October 4, 2019. url: https://aws.amazon.com/premiumsupport/knowledge-center/secure-s3-resources/ source_name: Microsoft Azure Storage Security, 2019 description: Amlekar, M., Brooks, C., Claman, L., et. al.. (2019, March 20). Azure Storage security guide. Retrieved October 4, 2019. url: https://docs.microsoft.com/en-us/azure/storage/common/storage-security-guide source_name: Wired Magecart S3 Buckets, 2019 description: Barrett, B.. (2019, July 11). Hack Brief: A Card-Skimming Hacker Group Hit 17K Domains—and Counting. Retrieved October 4, 2019. url: https://www.wired.com/story/magecart-amazon-cloud-hacks/ source_name: Google Cloud Storage Best Practices, 2019 description: Google. (2019, September 16). Best practices for Cloud Storage. Retrieved October 4, 2019. url: https://cloud.google.com/storage/docs/best-practices source_name: HIPAA Journal S3 Breach, 2017 description: HIPAA Journal. (2017, October 11). 47GB of Medical Records and Test Results Found in Unsecured Amazon S3 Bucket. Retrieved October 4, 2019. url: https://www.hipaajournal.com/47gb-medical-records-unsecured-amazon-s3-bucket/ source_name: Rclone-mega-extortion_05_2021 description: Justin Schoenfeld, Aaron Didier. (2021, May 4). Transferring leverage in a ransomware attack. Retrieved July 14, 2022. url: https://redcanary.com/blog/rclone-mega-extortion/ source_name: Trend Micro S3 Exposed PII, 2017 description: Trend Micro. (2017, November 6). A Misconfigured Amazon S3 Exposed Almost 50 Thousand PII in Australia. Retrieved October 4, 2019. url: https://www.trendmicro.com/vinfo/us/security/news/virtualization-and-cloud/a-misconfigured-amazon-s3-exposed-almost-50-thousand-pii-in-australia
kill_chain_name: mitre-attack phase_name: collection
IaaS
Adversaries may modify systems in order to manipulate the data as it is accessed and displayed to an end user, thus threatening the integrity of the data.(Citation: FireEye APT38 Oct 2018)(Citation: DOJ Lazarus Sony 2018) By manipulating runtime data, adversaries may attempt to affect a business process, organizational understanding, and decision making. Adversaries may alter application binaries used to display data in order to cause runtime manipulations. Adversaries may also conduct [Change Default File Association](https://attack.mitre.org/techniques/T1546/001) and [Masquerading](https://attack.mitre.org/techniques/T1036) to cause a similar effect. The type of modification and the impact it will have depends on the target application and process as well as the goals and objectives of the adversary. For complex systems, an adversary would likely need special expertise and possibly access to specialized software related to the system that would typically be gained through a prolonged information gathering campaign in order to have the desired impact.
enterprise-attack
Runtime Data Manipulation
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1565/003 external_id: T1565.003 source_name: FireEye APT38 Oct 2018 description: FireEye. (2018, October 03). APT38: Un-usual Suspects. Retrieved November 6, 2018. url: https://content.fireeye.com/apt/rpt-apt38 source_name: DOJ Lazarus Sony 2018 description: Department of Justice. (2018, September 6). Criminal Complaint - United States of America v. PARK JIN HYOK. Retrieved March 29, 2019. url: https://www.justice.gov/opa/press-release/file/1092091/download
kill_chain_name: mitre-attack phase_name: impact
Linux
Adversaries may search the Registry on compromised systems for insecurely stored credentials. The Windows Registry stores configuration information that can be used by the system or other programs. Adversaries may query the Registry looking for credentials and passwords that have been stored for use by other programs or services. Sometimes these credentials are used for automatic logons. Example commands to find Registry keys related to password information: (Citation: Pentestlab Stored Credentials) * Local Machine Hive: <code>reg query HKLM /f password /t REG_SZ /s</code> * Current User Hive: <code>reg query HKCU /f password /t REG_SZ /s</code>
enterprise-attack
Credentials in Registry
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1552/002 external_id: T1552.002 source_name: Pentestlab Stored Credentials description: netbiosX. (2017, April 19). Stored Credentials. Retrieved April 6, 2018. url: https://pentestlab.blog/2017/04/19/stored-credentials/
kill_chain_name: mitre-attack phase_name: credential-access
Windows
Adversaries may look for folders and drives shared on remote systems as a means of identifying sources of information to gather as a precursor for Collection and to identify potential systems of interest for Lateral Movement. Networks often contain shared network drives and folders that enable users to access file directories on various systems across a network. File sharing over a Windows network occurs over the SMB protocol. (Citation: Wikipedia Shared Resource) (Citation: TechNet Shared Folder) [Net](https://attack.mitre.org/software/S0039) can be used to query a remote system for available shared drives using the <code>net view \\\\remotesystem</code> command. It can also be used to query shared drives on the local system using <code>net share</code>. For macOS, the <code>sharing -l</code> command lists all shared points used for smb services.
enterprise-attack
Network Share Discovery
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1135 external_id: T1135 source_name: TechNet Shared Folder description: Microsoft. (n.d.). Share a Folder or Drive. Retrieved June 30, 2017. url: https://technet.microsoft.com/library/cc770880.aspx source_name: Wikipedia Shared Resource description: Wikipedia. (2017, April 15). Shared resource. Retrieved June 30, 2017. url: https://en.wikipedia.org/wiki/Shared_resource
kill_chain_name: mitre-attack phase_name: discovery
macOS
Adversaries may attempt to gather information about attached peripheral devices and components connected to a computer system.(Citation: Peripheral Discovery Linux)(Citation: Peripheral Discovery macOS) Peripheral devices could include auxiliary resources that support a variety of functionalities such as keyboards, printers, cameras, smart card readers, or removable storage. The information may be used to enhance their awareness of the system and network environment or may be used for further actions.
enterprise-attack
Peripheral Device Discovery
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1120 external_id: T1120 source_name: Peripheral Discovery Linux description: Shahriar Shovon. (2018, March). List USB Devices Linux. Retrieved March 11, 2022. url: https://linuxhint.com/list-usb-devices-linux/ source_name: Peripheral Discovery macOS description: SS64. (n.d.). system_profiler. Retrieved March 11, 2022. url: https://ss64.com/osx/system_profiler.html
kill_chain_name: mitre-attack phase_name: discovery
Windows
An adversary may attempt to evade process tree-based analysis by modifying executed malware's parent process ID (PPID). If endpoint protection software leverages the “parent-child" relationship for detection, breaking this relationship could result in the adversary’s behavior not being associated with previous process tree activity. On Unix-based systems breaking this process tree is common practice for administrators to execute software using scripts and programs.(Citation: 3OHA double-fork 2022) On Linux systems, adversaries may execute a series of [Native API](https://attack.mitre.org/techniques/T1106) calls to alter malware's process tree. For example, adversaries can execute their payload without any arguments, call the `fork()` API call twice, then have the parent process exit. This creates a grandchild process with no parent process that is immediately adopted by the `init` system process (PID 1), which successfully disconnects the execution of the adversary's payload from its previous process tree. Another example is using the “daemon” syscall to detach from the current parent process and run in the background.(Citation: Sandfly BPFDoor 2022)(Citation: Microsoft XorDdos Linux Stealth 2022)
enterprise-attack
Break Process Trees
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1036/009 external_id: T1036.009 source_name: 3OHA double-fork 2022 description: Juan Tapiador. (2022, April 11). UNIX daemonization and the double fork. Retrieved September 29, 2023. url: https://0xjet.github.io/3OHA/2022/04/11/post.html source_name: Microsoft XorDdos Linux Stealth 2022 description: Microsoft Threat Intelligence. (2022, May 19). Rise in XorDdos: A deeper look at the stealthy DDoS malware targeting Linux devices. Retrieved September 27, 2023. url: https://www.microsoft.com/en-us/security/blog/2022/05/19/rise-in-xorddos-a-deeper-look-at-the-stealthy-ddos-malware-targeting-linux-devices/ source_name: Sandfly BPFDoor 2022 description: The Sandfly Security Team. (2022, May 11). BPFDoor - An Evasive Linux Backdoor Technical Analysis. Retrieved September 29, 2023. url: https://sandflysecurity.com/blog/bpfdoor-an-evasive-linux-backdoor-technical-analysis/
kill_chain_name: mitre-attack phase_name: defense-evasion
Linux
Adversaries may gather information about the victim's network topology that can be used during targeting. Information about network topologies may include a variety of details, including the physical and/or logical arrangement of both external-facing and internal network environments. This information may also include specifics regarding network devices (gateways, routers, etc.) and other infrastructure. Adversaries may gather this information in various ways, such as direct collection actions via [Active Scanning](https://attack.mitre.org/techniques/T1595) or [Phishing for Information](https://attack.mitre.org/techniques/T1598). Information about network topologies may also be exposed to adversaries via online or other accessible data sets (ex: [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594)).(Citation: DNS Dumpster) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596) or [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593)), establishing operational resources (ex: [Acquire Infrastructure](https://attack.mitre.org/techniques/T1583) or [Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)), and/or initial access (ex: [External Remote Services](https://attack.mitre.org/techniques/T1133)).
enterprise-attack
Network Topology
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1590/004 external_id: T1590.004 source_name: DNS Dumpster description: Hacker Target. (n.d.). DNS Dumpster. Retrieved October 20, 2020. url: https://dnsdumpster.com/
kill_chain_name: mitre-attack phase_name: reconnaissance
PRE
Adversaries may create self-signed code signing certificates that can be used during targeting. Code signing is the process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted. Code signing provides a level of authenticity for a program from the developer and a guarantee that the program has not been tampered with.(Citation: Wikipedia Code Signing) Users and/or security tools may trust a signed piece of code more than an unsigned piece of code even if they don't know who issued the certificate or who the author is. Prior to [Code Signing](https://attack.mitre.org/techniques/T1553/002), adversaries may develop self-signed code signing certificates for use in operations.
enterprise-attack
Code Signing Certificates
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1587/002 external_id: T1587.002 source_name: Wikipedia Code Signing description: Wikipedia. (2015, November 10). Code Signing. Retrieved March 31, 2016. url: https://en.wikipedia.org/wiki/Code_signing
kill_chain_name: mitre-attack phase_name: resource-development
PRE
Adversaries may modify file or directory permissions/attributes to evade access control lists (ACLs) and access protected files.(Citation: Hybrid Analysis Icacls1 June 2018)(Citation: Hybrid Analysis Icacls2 May 2018) File and directory permissions are commonly managed by ACLs configured by the file or directory owner, or users with the appropriate permissions. File and directory ACL implementations vary by platform, but generally explicitly designate which users or groups can perform which actions (read, write, execute, etc.). Windows implements file and directory ACLs as Discretionary Access Control Lists (DACLs).(Citation: Microsoft DACL May 2018) Similar to a standard ACL, DACLs identifies the accounts that are allowed or denied access to a securable object. When an attempt is made to access a securable object, the system checks the access control entries in the DACL in order. If a matching entry is found, access to the object is granted. Otherwise, access is denied.(Citation: Microsoft Access Control Lists May 2018) Adversaries can interact with the DACLs using built-in Windows commands, such as `icacls`, `cacls`, `takeown`, and `attrib`, which can grant adversaries higher permissions on specific files and folders. Further, [PowerShell](https://attack.mitre.org/techniques/T1059/001) provides cmdlets that can be used to retrieve or modify file and directory DACLs. Specific file and directory modifications may be a required step for many techniques, such as establishing Persistence via [Accessibility Features](https://attack.mitre.org/techniques/T1546/008), [Boot or Logon Initialization Scripts](https://attack.mitre.org/techniques/T1037), or tainting/hijacking other instrumental binary/configuration files via [Hijack Execution Flow](https://attack.mitre.org/techniques/T1574).
enterprise-attack
Windows File and Directory Permissions Modification
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1222/001 external_id: T1222.001 source_name: Hybrid Analysis Icacls1 June 2018 description: Hybrid Analysis. (2018, June 12). c9b65b764985dfd7a11d3faf599c56b8.exe. Retrieved August 19, 2018. url: https://www.hybrid-analysis.com/sample/ef0d2628823e8e0a0de3b08b8eacaf41cf284c086a948bdfd67f4e4373c14e4d?environmentId=100 source_name: Hybrid Analysis Icacls2 May 2018 description: Hybrid Analysis. (2018, May 30). 2a8efbfadd798f6111340f7c1c956bee.dll. Retrieved August 19, 2018. url: https://www.hybrid-analysis.com/sample/22dab012c3e20e3d9291bce14a2bfc448036d3b966c6e78167f4626f5f9e38d6?environmentId=110 source_name: Microsoft Access Control Lists May 2018 description: M. Satran, M. Jacobs. (2018, May 30). Access Control Lists. Retrieved February 4, 2020. url: https://docs.microsoft.com/en-us/windows/win32/secauthz/access-control-lists source_name: Microsoft DACL May 2018 description: Microsoft. (2018, May 30). DACLs and ACEs. Retrieved August 19, 2018. url: https://docs.microsoft.com/windows/desktop/secauthz/dacls-and-aces source_name: EventTracker File Permissions Feb 2014 description: Netsurion. (2014, February 19). Monitoring File Permission Changes with the Windows Security Log. Retrieved August 19, 2018. url: https://www.eventtracker.com/tech-articles/monitoring-file-permission-changes-windows-security-log/
kill_chain_name: mitre-attack phase_name: defense-evasion
Windows
Adversaries may abuse Microsoft Office add-ins to obtain persistence on a compromised system. Office add-ins can be used to add functionality to Office programs. (Citation: Microsoft Office Add-ins) There are different types of add-ins that can be used by the various Office products; including Word/Excel add-in Libraries (WLL/XLL), VBA add-ins, Office Component Object Model (COM) add-ins, automation add-ins, VBA Editor (VBE), Visual Studio Tools for Office (VSTO) add-ins, and Outlook add-ins. (Citation: MRWLabs Office Persistence Add-ins)(Citation: FireEye Mail CDS 2018) Add-ins can be used to obtain persistence because they can be set to execute code when an Office application starts.
enterprise-attack
Add-ins
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1137/006 external_id: T1137.006 source_name: Microsoft Office Add-ins description: Microsoft. (n.d.). Add or remove add-ins. Retrieved July 3, 2017. url: https://support.office.com/article/Add-or-remove-add-ins-0af570c4-5cf3-4fa9-9b88-403625a0b460 source_name: MRWLabs Office Persistence Add-ins description: Knowles, W. (2017, April 21). Add-In Opportunities for Office Persistence. Retrieved July 3, 2017. url: https://labs.mwrinfosecurity.com/blog/add-in-opportunities-for-office-persistence/ source_name: FireEye Mail CDS 2018 description: Caban, D. and Hirani, M. (2018, October 3). You’ve Got Mail! Enterprise Email Compromise. Retrieved April 22, 2019. url: https://summit.fireeye.com/content/dam/fireeye-www/summit/cds-2018/presentations/cds18-technical-s03-youve-got-mail.pdf source_name: GlobalDotName Jun 2019 description: Shukrun, S. (2019, June 2). Office Templates and GlobalDotName - A Stealthy Office Persistence Technique. Retrieved August 26, 2019. url: https://www.221bluestreet.com/post/office-templates-and-globaldotname-a-stealthy-office-persistence-technique
kill_chain_name: mitre-attack phase_name: persistence
Windows
Adversaries may abuse Microsoft transport agents to establish persistent access to systems. Microsoft Exchange transport agents can operate on email messages passing through the transport pipeline to perform various tasks such as filtering spam, filtering malicious attachments, journaling, or adding a corporate signature to the end of all outgoing emails.(Citation: Microsoft TransportAgent Jun 2016)(Citation: ESET LightNeuron May 2019) Transport agents can be written by application developers and then compiled to .NET assemblies that are subsequently registered with the Exchange server. Transport agents will be invoked during a specified stage of email processing and carry out developer defined tasks. Adversaries may register a malicious transport agent to provide a persistence mechanism in Exchange Server that can be triggered by adversary-specified email events.(Citation: ESET LightNeuron May 2019) Though a malicious transport agent may be invoked for all emails passing through the Exchange transport pipeline, the agent can be configured to only carry out specific tasks in response to adversary defined criteria. For example, the transport agent may only carry out an action like copying in-transit attachments and saving them for later exfiltration if the recipient email address matches an entry on a list provided by the adversary.
enterprise-attack
Transport Agent
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1505/002 external_id: T1505.002 source_name: Microsoft TransportAgent Jun 2016 description: Microsoft. (2016, June 1). Transport agents. Retrieved June 24, 2019. url: https://docs.microsoft.com/en-us/exchange/transport-agents-exchange-2013-help source_name: ESET LightNeuron May 2019 description: Faou, M. (2019, May). Turla LightNeuron: One email away from remote code execution. Retrieved June 24, 2019. url: https://www.welivesecurity.com/wp-content/uploads/2019/05/ESET-LightNeuron.pdf
kill_chain_name: mitre-attack phase_name: persistence
Linux
An adversary may attempt to get detailed information about the operating system and hardware, including version, patches, hotfixes, service packs, and architecture. Adversaries may use the information from [System Information Discovery](https://attack.mitre.org/techniques/T1082) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions. Tools such as [Systeminfo](https://attack.mitre.org/software/S0096) can be used to gather detailed system information. If running with privileged access, a breakdown of system data can be gathered through the <code>systemsetup</code> configuration tool on macOS. As an example, adversaries with user-level access can execute the <code>df -aH</code> command to obtain currently mounted disks and associated freely available space. Adversaries may also leverage a [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) on network devices to gather detailed system information (e.g. <code>show version</code>).(Citation: US-CERT-TA18-106A) [System Information Discovery](https://attack.mitre.org/techniques/T1082) combined with information gathered from other forms of discovery and reconnaissance can drive payload development and concealment.(Citation: OSX.FairyTale)(Citation: 20 macOS Common Tools and Techniques) Infrastructure as a Service (IaaS) cloud providers such as AWS, GCP, and Azure allow access to instance and virtual machine information via APIs. Successful authenticated API calls can return data such as the operating system platform and status of a particular instance or the model view of a virtual machine.(Citation: Amazon Describe Instance)(Citation: Google Instances Resource)(Citation: Microsoft Virutal Machine API)
enterprise-attack
System Information Discovery
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1082 external_id: T1082 source_name: Amazon Describe Instance description: Amazon. (n.d.). describe-instance-information. Retrieved March 3, 2020. url: https://docs.aws.amazon.com/cli/latest/reference/ssm/describe-instance-information.html source_name: Google Instances Resource description: Google. (n.d.). Rest Resource: instance. Retrieved March 3, 2020. url: https://cloud.google.com/compute/docs/reference/rest/v1/instances source_name: Microsoft Virutal Machine API description: Microsoft. (2019, March 1). Virtual Machines - Get. Retrieved October 8, 2019. url: https://docs.microsoft.com/en-us/rest/api/compute/virtualmachines/get source_name: 20 macOS Common Tools and Techniques description: Phil Stokes. (2021, February 16). 20 Common Tools & Techniques Used by macOS Threat Actors & Malware. Retrieved August 23, 2021. url: https://labs.sentinelone.com/20-common-tools-techniques-used-by-macos-threat-actors-malware/ source_name: OSX.FairyTale description: Phile Stokes. (2018, September 20). On the Trail of OSX.FairyTale | Adware Playing at Malware. Retrieved August 24, 2021. url: https://www.sentinelone.com/blog/trail-osx-fairytale-adware-playing-malware/ source_name: US-CERT-TA18-106A description: US-CERT. (2018, April 20). Alert (TA18-106A) Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. Retrieved October 19, 2020. url: https://www.us-cert.gov/ncas/alerts/TA18-106A
kill_chain_name: mitre-attack phase_name: discovery
Windows
Adversaries may communicate using OSI application layer protocols to avoid detection/network filtering by blending in with existing traffic. Commands to the remote system, and often the results of those commands, will be embedded within the protocol traffic between the client and server. Adversaries may utilize many different protocols, including those used for web browsing, transferring files, electronic mail, or DNS. For connections that occur internally within an enclave (such as those between a proxy or pivot node and other nodes), commonly used protocols are SMB, SSH, or RDP.(Citation: Mandiant APT29 Eye Spy Email Nov 22)
enterprise-attack
Application Layer Protocol
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1071 external_id: T1071 source_name: University of Birmingham C2 description: Gardiner, J., Cova, M., Nagaraja, S. (2014, February). Command & Control Understanding, Denying and Detecting. Retrieved April 20, 2016. url: https://arxiv.org/ftp/arxiv/papers/1408/1408.1136.pdf source_name: Mandiant APT29 Eye Spy Email Nov 22 description: Mandiant. (2022, May 2). UNC3524: Eye Spy on Your Email. Retrieved August 17, 2023. url: https://www.mandiant.com/resources/blog/unc3524-eye-spy-email
kill_chain_name: mitre-attack phase_name: command-and-control
Linux
Adversaries may execute their own malicious payloads by hijacking how the .NET `AppDomainManager` loads assemblies. The .NET framework uses the `AppDomainManager` class to create and manage one or more isolated runtime environments (called application domains) inside a process to host the execution of .NET applications. Assemblies (`.exe` or `.dll` binaries compiled to run as .NET code) may be loaded into an application domain as executable code.(Citation: Microsoft App Domains) Known as "AppDomainManager injection," adversaries may execute arbitrary code by hijacking how .NET applications load assemblies. For example, malware may create a custom application domain inside a target process to load and execute an arbitrary assembly. Alternatively, configuration files (`.config`) or process environment variables that define .NET runtime settings may be tampered with to instruct otherwise benign .NET applications to load a malicious assembly (identified by name) into the target process.(Citation: PenTestLabs AppDomainManagerInject)(Citation: PwC Yellow Liderc)(Citation: Rapid7 AppDomain Manager Injection)
enterprise-attack
AppDomainManager
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1574/014 external_id: T1574.014 source_name: PenTestLabs AppDomainManagerInject description: Administrator. (2020, May 26). APPDOMAINMANAGER INJECTION AND DETECTION. Retrieved March 28, 2024. url: https://pentestlaboratories.com/2020/05/26/appdomainmanager-injection-and-detection/ source_name: Microsoft App Domains description: Microsoft. (2021, September 15). Application domains. Retrieved March 28, 2024. url: https://learn.microsoft.com/dotnet/framework/app-domains/application-domains source_name: PwC Yellow Liderc description: PwC Threat Intelligence. (2023, October 25). Yellow Liderc ships its scripts and delivers IMAPLoader malware. Retrieved March 29, 2024. url: https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/yellow-liderc-ships-its-scripts-delivers-imaploader-malware.html source_name: Rapid7 AppDomain Manager Injection description: Spagnola, N. (2023, May 5). AppDomain Manager Injection: New Techniques For Red Teams. Retrieved March 29, 2024. url: https://www.rapid7.com/blog/post/2023/05/05/appdomain-manager-injection-new-techniques-for-red-teams/
kill_chain_name: mitre-attack phase_name: defense-evasion
Windows
Adversaries may stage data collected from multiple systems in a central location or directory on one system prior to Exfiltration. Data may be kept in separate files or combined into one file through techniques such as [Archive Collected Data](https://attack.mitre.org/techniques/T1560). Interactive command shells may be used, and common functionality within [cmd](https://attack.mitre.org/software/S0106) and bash may be used to copy data into a staging location. In cloud environments, adversaries may stage data within a particular instance or virtual machine before exfiltration. An adversary may [Create Cloud Instance](https://attack.mitre.org/techniques/T1578/002) and stage data in that instance.(Citation: Mandiant M-Trends 2020) By staging data on one system prior to Exfiltration, adversaries can minimize the number of connections made to their C2 server and better evade detection.
enterprise-attack
Remote Data Staging
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1074/002 external_id: T1074.002 source_name: Mandiant M-Trends 2020 description: Mandiant. (2020, February). M-Trends 2020. Retrieved April 24, 2020. url: https://content.fireeye.com/m-trends/rpt-m-trends-2020
kill_chain_name: mitre-attack phase_name: collection
Windows
An adversary may add additional roles or permissions to an adversary-controlled user or service account to maintain persistent access to a container orchestration system. For example, an adversary with sufficient permissions may create a RoleBinding or a ClusterRoleBinding to bind a Role or ClusterRole to a Kubernetes account.(Citation: Kubernetes RBAC)(Citation: Aquasec Kubernetes Attack 2023) Where attribute-based access control (ABAC) is in use, an adversary with sufficient permissions may modify a Kubernetes ABAC policy to give the target account additional permissions.(Citation: Kuberentes ABAC) This account modification may immediately follow [Create Account](https://attack.mitre.org/techniques/T1136) or other malicious account activity. Adversaries may also modify existing [Valid Accounts](https://attack.mitre.org/techniques/T1078) that they have compromised. Note that where container orchestration systems are deployed in cloud environments, as with Google Kubernetes Engine, Amazon Elastic Kubernetes Service, and Azure Kubernetes Service, cloud-based role-based access control (RBAC) assignments or ABAC policies can often be used in place of or in addition to local permission assignments.(Citation: Google Cloud Kubernetes IAM)(Citation: AWS EKS IAM Roles for Service Accounts)(Citation: Microsoft Azure Kubernetes Service Service Accounts) In these cases, this technique may be used in conjunction with [Additional Cloud Roles](https://attack.mitre.org/techniques/T1098/003).
enterprise-attack
Additional Container Cluster Roles
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1098/006 external_id: T1098.006 source_name: AWS EKS IAM Roles for Service Accounts description: Amazon Web Services. (n.d.). IAM roles for service accounts. Retrieved July 14, 2023. url: https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html source_name: Google Cloud Kubernetes IAM description: Google Cloud. (n.d.). Create IAM policies. Retrieved July 14, 2023. url: https://cloud.google.com/kubernetes-engine/docs/how-to/iam source_name: Kuberentes ABAC description: Kuberenets. (n.d.). Using ABAC Authorization. Retrieved July 14, 2023. url: https://kubernetes.io/docs/reference/access-authn-authz/abac/ source_name: Kubernetes RBAC description: Kubernetes. (n.d.). Role Based Access Control Good Practices. Retrieved March 8, 2023. url: https://kubernetes.io/docs/concepts/security/rbac-good-practices/ source_name: Aquasec Kubernetes Attack 2023 description: Michael Katchinskiy, Assaf Morag. (2023, April 21). First-Ever Attack Leveraging Kubernetes RBAC to Backdoor Clusters. Retrieved July 14, 2023. url: https://blog.aquasec.com/leveraging-kubernetes-rbac-to-backdoor-clusters source_name: Microsoft Azure Kubernetes Service Service Accounts description: Microsoft Azure. (2023, April 28). Access and identity options for Azure Kubernetes Service (AKS). Retrieved July 14, 2023. url: https://learn.microsoft.com/en-us/azure/aks/concepts-identity
kill_chain_name: mitre-attack phase_name: privilege-escalation
Containers
Adversaries may abuse task scheduling functionality to facilitate initial or recurring execution of malicious code. Utilities exist within all major operating systems to schedule programs or scripts to be executed at a specified date and time. A task can also be scheduled on a remote system, provided the proper authentication is met (ex: RPC and file and printer sharing in Windows environments). Scheduling a task on a remote system typically may require being a member of an admin or otherwise privileged group on the remote system.(Citation: TechNet Task Scheduler Security) Adversaries may use task scheduling to execute programs at system startup or on a scheduled basis for persistence. These mechanisms can also be abused to run a process under the context of a specified account (such as one with elevated permissions/privileges). Similar to [System Binary Proxy Execution](https://attack.mitre.org/techniques/T1218), adversaries have also abused task scheduling to potentially mask one-time execution under a trusted system process.(Citation: ProofPoint Serpent)
enterprise-attack
Scheduled Task/Job
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1053 external_id: T1053 source_name: ProofPoint Serpent description: Campbell, B. et al. (2022, March 21). Serpent, No Swiping! New Backdoor Targets French Entities with Unique Attack Chain. Retrieved April 11, 2022. url: https://www.proofpoint.com/us/blog/threat-insight/serpent-no-swiping-new-backdoor-targets-french-entities-unique-attack-chain source_name: TechNet Task Scheduler Security description: Microsoft. (2005, January 21). Task Scheduler and security. Retrieved June 8, 2016. url: https://technet.microsoft.com/en-us/library/cc785125.aspx
kill_chain_name: mitre-attack phase_name: privilege-escalation
Windows
Adversaries may abuse msiexec.exe to proxy execution of malicious payloads. Msiexec.exe is the command-line utility for the Windows Installer and is thus commonly associated with executing installation packages (.msi).(Citation: Microsoft msiexec) The Msiexec.exe binary may also be digitally signed by Microsoft. Adversaries may abuse msiexec.exe to launch local or network accessible MSI files. Msiexec.exe can also execute DLLs.(Citation: LOLBAS Msiexec)(Citation: TrendMicro Msiexec Feb 2018) Since it may be signed and native on Windows systems, msiexec.exe can be used to bypass application control solutions that do not account for its potential abuse. Msiexec.exe execution may also be elevated to SYSTEM privileges if the <code>AlwaysInstallElevated</code> policy is enabled.(Citation: Microsoft AlwaysInstallElevated 2018)
enterprise-attack
Msiexec
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1218/007 external_id: T1218.007 source_name: TrendMicro Msiexec Feb 2018 description: Co, M. and Sison, G. (2018, February 8). Attack Using Windows Installer msiexec.exe leads to LokiBot. Retrieved April 18, 2019. url: https://blog.trendmicro.com/trendlabs-security-intelligence/attack-using-windows-installer-msiexec-exe-leads-lokibot/ source_name: LOLBAS Msiexec description: LOLBAS. (n.d.). Msiexec.exe. Retrieved April 18, 2019. url: https://lolbas-project.github.io/lolbas/Binaries/Msiexec/ source_name: Microsoft msiexec description: Microsoft. (2017, October 15). msiexec. Retrieved January 24, 2020. url: https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/msiexec source_name: Microsoft AlwaysInstallElevated 2018 description: Microsoft. (2018, May 31). AlwaysInstallElevated. Retrieved December 14, 2020. url: https://docs.microsoft.com/en-us/windows/win32/msi/alwaysinstallelevated
kill_chain_name: mitre-attack phase_name: defense-evasion
Windows
Adversaries may gather information about the victim's network trust dependencies that can be used during targeting. Information about network trusts may include a variety of details, including second or third-party organizations/domains (ex: managed service providers, contractors, etc.) that have connected (and potentially elevated) network access. Adversaries may gather this information in various ways, such as direct elicitation via [Phishing for Information](https://attack.mitre.org/techniques/T1598). Information about network trusts may also be exposed to adversaries via online or other accessible data sets (ex: [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)).(Citation: Pentesting AD Forests) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Active Scanning](https://attack.mitre.org/techniques/T1595) or [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593)), establishing operational resources (ex: [Acquire Infrastructure](https://attack.mitre.org/techniques/T1583) or [Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)), and/or initial access (ex: [Trusted Relationship](https://attack.mitre.org/techniques/T1199)).
enterprise-attack
Network Trust Dependencies
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1590/003 external_id: T1590.003 source_name: Pentesting AD Forests description: García, C. (2019, April 3). Pentesting Active Directory Forests. Retrieved October 20, 2020. url: https://www.slideshare.net/rootedcon/carlos-garca-pentesting-active-directory-forests-rooted2019
kill_chain_name: mitre-attack phase_name: reconnaissance
PRE
Adversaries may attempt to cause a denial of service (DoS) by reflecting a high-volume of network traffic to a target. This type of Network DoS takes advantage of a third-party server intermediary that hosts and will respond to a given spoofed source IP address. This third-party server is commonly termed a reflector. An adversary accomplishes a reflection attack by sending packets to reflectors with the spoofed address of the victim. Similar to Direct Network Floods, more than one system may be used to conduct the attack, or a botnet may be used. Likewise, one or more reflectors may be used to focus traffic on the target.(Citation: Cloudflare ReflectionDoS May 2017) This Network DoS attack may also reduce the availability and functionality of the targeted system(s) and network. Reflection attacks often take advantage of protocols with larger responses than requests in order to amplify their traffic, commonly known as a Reflection Amplification attack. Adversaries may be able to generate an increase in volume of attack traffic that is several orders of magnitude greater than the requests sent to the amplifiers. The extent of this increase will depending upon many variables, such as the protocol in question, the technique used, and the amplifying servers that actually produce the amplification in attack volume. Two prominent protocols that have enabled Reflection Amplification Floods are DNS(Citation: Cloudflare DNSamplficationDoS) and NTP(Citation: Cloudflare NTPamplifciationDoS), though the use of several others in the wild have been documented.(Citation: Arbor AnnualDoSreport Jan 2018) In particular, the memcache protocol showed itself to be a powerful protocol, with amplification sizes up to 51,200 times the requesting packet.(Citation: Cloudflare Memcrashed Feb 2018)
enterprise-attack
Reflection Amplification
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1498/002 external_id: T1498.002 source_name: Cloudflare ReflectionDoS May 2017 description: Marek Majkowsk, Cloudflare. (2017, May 24). Reflections on reflection (attacks). Retrieved April 23, 2019. url: https://blog.cloudflare.com/reflections-on-reflections/ source_name: Cloudflare DNSamplficationDoS description: Cloudflare. (n.d.). What is a DNS amplification attack?. Retrieved April 23, 2019. url: https://www.cloudflare.com/learning/ddos/dns-amplification-ddos-attack/ source_name: Cloudflare NTPamplifciationDoS description: Cloudflare. (n.d.). What is a NTP amplificaiton attack?. Retrieved April 23, 2019. url: https://www.cloudflare.com/learning/ddos/ntp-amplification-ddos-attack/ source_name: Arbor AnnualDoSreport Jan 2018 description: Philippe Alcoy, Steinthor Bjarnason, Paul Bowen, C.F. Chui, Kirill Kasavchnko, and Gary Sockrider of Netscout Arbor. (2018, January). Insight into the Global Threat Landscape - Netscout Arbor's 13th Annual Worldwide Infrastructure Security Report. Retrieved April 22, 2019. url: https://pages.arbornetworks.com/rs/082-KNA-087/images/13th_Worldwide_Infrastructure_Security_Report.pdf source_name: Cloudflare Memcrashed Feb 2018 description: Marek Majkowski of Cloudflare. (2018, February 27). Memcrashed - Major amplification attacks from UDP port 11211. Retrieved April 18, 2019. url: https://blog.cloudflare.com/memcrashed-major-amplification-attacks-from-port-11211/ source_name: Cisco DoSdetectNetflow description: Cisco. (n.d.). Detecting and Analyzing Network Threats With NetFlow. Retrieved April 25, 2019. url: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/netflow/configuration/15-mt/nf-15-mt-book/nf-detct-analy-thrts.pdf
kill_chain_name: mitre-attack phase_name: impact
Windows
Adversaries may register malicious password filter dynamic link libraries (DLLs) into the authentication process to acquire user credentials as they are validated. Windows password filters are password policy enforcement mechanisms for both domain and local accounts. Filters are implemented as DLLs containing a method to validate potential passwords against password policies. Filter DLLs can be positioned on local computers for local accounts and/or domain controllers for domain accounts. Before registering new passwords in the Security Accounts Manager (SAM), the Local Security Authority (LSA) requests validation from each registered filter. Any potential changes cannot take effect until every registered filter acknowledges validation. Adversaries can register malicious password filters to harvest credentials from local computers and/or entire domains. To perform proper validation, filters must receive plain-text credentials from the LSA. A malicious password filter would receive these plain-text credentials every time a password request is made.(Citation: Carnal Ownage Password Filters Sept 2013)
enterprise-attack
Password Filter DLL
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1556/002 external_id: T1556.002 source_name: Carnal Ownage Password Filters Sept 2013 description: Fuller, R. (2013, September 11). Stealing passwords every time they change. Retrieved November 21, 2017. url: http://carnal0wnage.attackresearch.com/2013/09/stealing-passwords-every-time-they.html source_name: Clymb3r Function Hook Passwords Sept 2013 description: Bialek, J. (2013, September 15). Intercepting Password Changes With Function Hooking. Retrieved November 21, 2017. url: https://clymb3r.wordpress.com/2013/09/15/intercepting-password-changes-with-function-hooking/
kill_chain_name: mitre-attack phase_name: persistence
Windows
Adversaries may abuse components of Terminal Services to enable persistent access to systems. Microsoft Terminal Services, renamed to Remote Desktop Services in some Windows Server OSs as of 2022, enable remote terminal connections to hosts. Terminal Services allows servers to transmit a full, interactive, graphical user interface to clients via RDP.(Citation: Microsoft Remote Desktop Services) [Windows Service](https://attack.mitre.org/techniques/T1543/003)s that are run as a "generic" process (ex: <code>svchost.exe</code>) load the service's DLL file, the location of which is stored in a Registry entry named <code>ServiceDll</code>.(Citation: Microsoft System Services Fundamentals) The <code>termsrv.dll</code> file, typically stored in `%SystemRoot%\System32\`, is the default <code>ServiceDll</code> value for Terminal Services in `HKLM\System\CurrentControlSet\services\TermService\Parameters\`. Adversaries may modify and/or replace the Terminal Services DLL to enable persistent access to victimized hosts.(Citation: James TermServ DLL) Modifications to this DLL could be done to execute arbitrary payloads (while also potentially preserving normal <code>termsrv.dll</code> functionality) as well as to simply enable abusable features of Terminal Services. For example, an adversary may enable features such as concurrent [Remote Desktop Protocol](https://attack.mitre.org/techniques/T1021/001) sessions by either patching the <code>termsrv.dll</code> file or modifying the <code>ServiceDll</code> value to point to a DLL that provides increased RDP functionality.(Citation: Windows OS Hub RDP)(Citation: RDPWrap Github) On a non-server Windows OS this increased functionality may also enable an adversary to avoid Terminal Services prompts that warn/log out users of a system when a new RDP session is created.
enterprise-attack
Terminal Services DLL
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1505/005 external_id: T1505.005 source_name: James TermServ DLL description: James. (2019, July 14). @James_inthe_box. Retrieved March 28, 2022. url: https://twitter.com/james_inthe_box/status/1150495335812177920 source_name: Microsoft System Services Fundamentals description: Microsoft. (2018, February 17). Windows System Services Fundamentals. Retrieved March 28, 2022. url: https://social.technet.microsoft.com/wiki/contents/articles/12229.windows-system-services-fundamentals.aspx source_name: Microsoft Remote Desktop Services description: Microsoft. (2019, August 23). About Remote Desktop Services. Retrieved March 28, 2022. url: https://docs.microsoft.com/windows/win32/termserv/about-terminal-services source_name: RDPWrap Github description: Stas'M Corp. (2014, October 22). RDP Wrapper Library by Stas'M. Retrieved March 28, 2022. url: https://github.com/stascorp/rdpwrap source_name: Windows OS Hub RDP description: Windows OS Hub. (2021, November 10). How to Allow Multiple RDP Sessions in Windows 10 and 11?. Retrieved March 28, 2022. url: http://woshub.com/how-to-allow-multiple-rdp-sessions-in-windows-10/
kill_chain_name: mitre-attack phase_name: persistence
Windows
Adversaries may abuse AppleScript for execution. AppleScript is a macOS scripting language designed to control applications and parts of the OS via inter-application messages called AppleEvents.(Citation: Apple AppleScript) These AppleEvent messages can be sent independently or easily scripted with AppleScript. These events can locate open windows, send keystrokes, and interact with almost any open application locally or remotely. Scripts can be run from the command-line via <code>osascript /path/to/script</code> or <code>osascript -e "script here"</code>. Aside from the command line, scripts can be executed in numerous ways including Mail rules, Calendar.app alarms, and Automator workflows. AppleScripts can also be executed as plain text shell scripts by adding <code>#!/usr/bin/osascript</code> to the start of the script file.(Citation: SentinelOne AppleScript) AppleScripts do not need to call <code>osascript</code> to execute. However, they may be executed from within mach-O binaries by using the macOS [Native API](https://attack.mitre.org/techniques/T1106)s <code>NSAppleScript</code> or <code>OSAScript</code>, both of which execute code independent of the <code>/usr/bin/osascript</code> command line utility. Adversaries may abuse AppleScript to execute various behaviors, such as interacting with an open SSH connection, moving to remote machines, and even presenting users with fake dialog boxes. These events cannot start applications remotely (they can start them locally), but they can interact with applications if they're already running remotely. On macOS 10.10 Yosemite and higher, AppleScript has the ability to execute [Native API](https://attack.mitre.org/techniques/T1106)s, which otherwise would require compilation and execution in a mach-O binary file format.(Citation: SentinelOne macOS Red Team) Since this is a scripting language, it can be used to launch more common techniques as well such as a reverse shell via [Python](https://attack.mitre.org/techniques/T1059/006).(Citation: Macro Malware Targets Macs)
enterprise-attack
AppleScript
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1059/002 external_id: T1059.002 source_name: Apple AppleScript description: Apple. (2016, January 25). Introduction to AppleScript Language Guide. Retrieved March 28, 2020. url: https://developer.apple.com/library/archive/documentation/AppleScript/Conceptual/AppleScriptLangGuide/introduction/ASLR_intro.html source_name: SentinelOne macOS Red Team description: Phil Stokes. (2019, December 5). macOS Red Team: Calling Apple APIs Without Building Binaries. Retrieved July 17, 2020. url: https://www.sentinelone.com/blog/macos-red-team-calling-apple-apis-without-building-binaries/ source_name: SentinelOne AppleScript description: Phil Stokes. (2020, March 16). How Offensive Actors Use AppleScript For Attacking macOS. Retrieved July 17, 2020. url: https://www.sentinelone.com/blog/how-offensive-actors-use-applescript-for-attacking-macos/ source_name: Macro Malware Targets Macs description: Yerko Grbic. (2017, February 14). Macro Malware Targets Macs. Retrieved July 8, 2017. url: https://www.mcafee.com/blogs/other-blogs/mcafee-labs/macro-malware-targets-macs/
kill_chain_name: mitre-attack phase_name: execution
macOS
Adversaries may abuse Internet browser extensions to establish persistent access to victim systems. Browser extensions or plugins are small programs that can add functionality and customize aspects of Internet browsers. They can be installed directly or through a browser's app store and generally have access and permissions to everything that the browser can access.(Citation: Wikipedia Browser Extension)(Citation: Chrome Extensions Definition) Malicious extensions can be installed into a browser through malicious app store downloads masquerading as legitimate extensions, through social engineering, or by an adversary that has already compromised a system. Security can be limited on browser app stores so it may not be difficult for malicious extensions to defeat automated scanners.(Citation: Malicious Chrome Extension Numbers) Depending on the browser, adversaries may also manipulate an extension's update url to install updates from an adversary controlled server or manipulate the mobile configuration file to silently install additional extensions. Previous to macOS 11, adversaries could silently install browser extensions via the command line using the <code>profiles</code> tool to install malicious <code>.mobileconfig</code> files. In macOS 11+, the use of the <code>profiles</code> tool can no longer install configuration profiles, however <code>.mobileconfig</code> files can be planted and installed with user interaction.(Citation: xorrior chrome extensions macOS) Once the extension is installed, it can browse to websites in the background, steal all information that a user enters into a browser (including credentials), and be used as an installer for a RAT for persistence.(Citation: Chrome Extension Crypto Miner)(Citation: ICEBRG Chrome Extensions)(Citation: Banker Google Chrome Extension Steals Creds)(Citation: Catch All Chrome Extension) There have also been instances of botnets using a persistent backdoor through malicious Chrome extensions for [Command and Control](https://attack.mitre.org/tactics/TA0011).(Citation: Stantinko Botnet)(Citation: Chrome Extension C2 Malware) Adversaries may also use browser extensions to modify browser permissions and components, privacy settings, and other security controls for [Defense Evasion](https://attack.mitre.org/tactics/TA0005).(Citation: Browers FriarFox)(Citation: Browser Adrozek)
enterprise-attack
Browser Extensions
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1176 external_id: T1176 source_name: Chrome Extension Crypto Miner description: Brinkmann, M. (2017, September 19). First Chrome extension with JavaScript Crypto Miner detected. Retrieved November 16, 2017. url: https://www.ghacks.net/2017/09/19/first-chrome-extension-with-javascript-crypto-miner-detected/ source_name: xorrior chrome extensions macOS description: Chris Ross. (2019, February 8). No Place Like Chrome. Retrieved April 27, 2021. url: https://www.xorrior.com/No-Place-Like-Chrome/ source_name: Chrome Extensions Definition description: Chrome. (n.d.). What are Extensions?. Retrieved November 16, 2017. url: https://developer.chrome.com/extensions source_name: ICEBRG Chrome Extensions description: De Tore, M., Warner, J. (2018, January 15). MALICIOUS CHROME EXTENSIONS ENABLE CRIMINALS TO IMPACT OVER HALF A MILLION USERS AND GLOBAL BUSINESSES. Retrieved January 17, 2018. url: https://www.icebrg.io/blog/malicious-chrome-extensions-enable-criminals-to-impact-over-half-a-million-users-and-global-businesses source_name: Malicious Chrome Extension Numbers description: Jagpal, N., et al. (2015, August). Trends and Lessons from Three Years Fighting Malicious Extensions. Retrieved November 17, 2017. url: https://static.googleusercontent.com/media/research.google.com/en//pubs/archive/43824.pdf source_name: Chrome Extension C2 Malware description: Kjaer, M. (2016, July 18). Malware in the browser: how you might get hacked by a Chrome extension. Retrieved November 22, 2017. url: https://kjaer.io/extension-malware/ source_name: Catch All Chrome Extension description: Marinho, R. (n.d.). "Catch-All" Google Chrome Malicious Extension Steals All Posted Data. Retrieved November 16, 2017. url: https://isc.sans.edu/forums/diary/CatchAll+Google+Chrome+Malicious+Extension+Steals+All+Posted+Data/22976/https:/threatpost.com/malicious-chrome-extension-steals-data-posted-to-any-website/128680/) source_name: Banker Google Chrome Extension Steals Creds description: Marinho, R. (n.d.). (Banker(GoogleChromeExtension)).targeting. Retrieved November 18, 2017. url: https://isc.sans.edu/forums/diary/BankerGoogleChromeExtensiontargetingBrazil/22722/ source_name: Browser Adrozek description: Microsoft Threat Intelligence. (2020, December 10). Widespread malware campaign seeks to silently inject ads into search results, affects multiple browsers. Retrieved February 26, 2024. url: https://www.microsoft.com/en-us/security/blog/2020/12/10/widespread-malware-campaign-seeks-to-silently-inject-ads-into-search-results-affects-multiple-browsers/ source_name: Browers FriarFox description: Raggi, Michael. Proofpoint Threat Research Team. (2021, February 25). TA413 Leverages New FriarFox Browser Extension to Target the Gmail Accounts of Global Tibetan Organizations. Retrieved February 26, 2024. url: https://www.proofpoint.com/us/blog/threat-insight/ta413-leverages-new-friarfox-browser-extension-target-gmail-accounts-global source_name: Stantinko Botnet description: Vachon, F., Faou, M. (2017, July 20). Stantinko: A massive adware campaign operating covertly since 2012. Retrieved November 16, 2017. url: https://www.welivesecurity.com/2017/07/20/stantinko-massive-adware-campaign-operating-covertly-since-2012/ source_name: Wikipedia Browser Extension description: Wikipedia. (2017, October 8). Browser Extension. Retrieved January 11, 2018. url: https://en.wikipedia.org/wiki/Browser_extension
kill_chain_name: mitre-attack phase_name: persistence
Linux
Adversaries may target the different network services provided by systems to conduct a denial of service (DoS). Adversaries often target the availability of DNS and web services, however others have been targeted as well.(Citation: Arbor AnnualDoSreport Jan 2018) Web server software can be attacked through a variety of means, some of which apply generally while others are specific to the software being used to provide the service. One example of this type of attack is known as a simple HTTP flood, where an adversary sends a large number of HTTP requests to a web server to overwhelm it and/or an application that runs on top of it. This flood relies on raw volume to accomplish the objective, exhausting any of the various resources required by the victim software to provide the service.(Citation: Cloudflare HTTPflood) Another variation, known as a SSL renegotiation attack, takes advantage of a protocol feature in SSL/TLS. The SSL/TLS protocol suite includes mechanisms for the client and server to agree on an encryption algorithm to use for subsequent secure connections. If SSL renegotiation is enabled, a request can be made for renegotiation of the crypto algorithm. In a renegotiation attack, the adversary establishes a SSL/TLS connection and then proceeds to make a series of renegotiation requests. Because the cryptographic renegotiation has a meaningful cost in computation cycles, this can cause an impact to the availability of the service when done in volume.(Citation: Arbor SSLDoS April 2012)
enterprise-attack
Service Exhaustion Flood
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1499/002 external_id: T1499.002 source_name: Arbor SSLDoS April 2012 description: ASERT Team, Netscout Arbor. (2012, April 24). DDoS Attacks on SSL: Something Old, Something New. Retrieved April 22, 2019. url: https://www.netscout.com/blog/asert/ddos-attacks-ssl-something-old-something-new source_name: Cisco DoSdetectNetflow description: Cisco. (n.d.). Detecting and Analyzing Network Threats With NetFlow. Retrieved April 25, 2019. url: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/netflow/configuration/15-mt/nf-15-mt-book/nf-detct-analy-thrts.pdf source_name: Cloudflare HTTPflood description: Cloudflare. (n.d.). What is an HTTP flood DDoS attack?. Retrieved April 22, 2019. url: https://www.cloudflare.com/learning/ddos/http-flood-ddos-attack/ source_name: Arbor AnnualDoSreport Jan 2018 description: Philippe Alcoy, Steinthor Bjarnason, Paul Bowen, C.F. Chui, Kirill Kasavchnko, and Gary Sockrider of Netscout Arbor. (2018, January). Insight into the Global Threat Landscape - Netscout Arbor's 13th Annual Worldwide Infrastructure Security Report. Retrieved April 22, 2019. url: https://pages.arbornetworks.com/rs/082-KNA-087/images/13th_Worldwide_Infrastructure_Security_Report.pdf
kill_chain_name: mitre-attack phase_name: impact
Windows
Adversaries may manipulate hardware components in products prior to receipt by a final consumer for the purpose of data or system compromise. By modifying hardware or firmware in the supply chain, adversaries can insert a backdoor into consumer networks that may be difficult to detect and give the adversary a high degree of control over the system. Hardware backdoors may be inserted into various devices, such as servers, workstations, network infrastructure, or peripherals.
enterprise-attack
Compromise Hardware Supply Chain
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1195/003 external_id: T1195.003
kill_chain_name: mitre-attack phase_name: initial-access
Linux
Adversaries may interact with the native OS application programming interface (API) to execute behaviors. Native APIs provide a controlled means of calling low-level OS services within the kernel, such as those involving hardware/devices, memory, and processes.(Citation: NT API Windows)(Citation: Linux Kernel API) These native APIs are leveraged by the OS during system boot (when other system components are not yet initialized) as well as carrying out tasks and requests during routine operations. Adversaries may abuse these OS API functions as a means of executing behaviors. Similar to [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059), the native API and its hierarchy of interfaces provide mechanisms to interact with and utilize various components of a victimized system. Native API functions (such as <code>NtCreateProcess</code>) may be directed invoked via system calls / syscalls, but these features are also often exposed to user-mode applications via interfaces and libraries.(Citation: OutFlank System Calls)(Citation: CyberBit System Calls)(Citation: MDSec System Calls) For example, functions such as the Windows API <code>CreateProcess()</code> or GNU <code>fork()</code> will allow programs and scripts to start other processes.(Citation: Microsoft CreateProcess)(Citation: GNU Fork) This may allow API callers to execute a binary, run a CLI command, load modules, etc. as thousands of similar API functions exist for various system operations.(Citation: Microsoft Win32)(Citation: LIBC)(Citation: GLIBC) Higher level software frameworks, such as Microsoft .NET and macOS Cocoa, are also available to interact with native APIs. These frameworks typically provide language wrappers/abstractions to API functionalities and are designed for ease-of-use/portability of code.(Citation: Microsoft NET)(Citation: Apple Core Services)(Citation: MACOS Cocoa)(Citation: macOS Foundation) Adversaries may use assembly to directly or in-directly invoke syscalls in an attempt to subvert defensive sensors and detection signatures such as user mode API-hooks.(Citation: Redops Syscalls) Adversaries may also attempt to tamper with sensors and defensive tools associated with API monitoring, such as unhooking monitored functions via [Disable or Modify Tools](https://attack.mitre.org/techniques/T1562/001).
enterprise-attack
Native API
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1106 external_id: T1106 source_name: MACOS Cocoa description: Apple. (2015, September 16). Cocoa Application Layer. Retrieved June 25, 2020. url: https://developer.apple.com/library/archive/documentation/MacOSX/Conceptual/OSX_Technology_Overview/CocoaApplicationLayer/CocoaApplicationLayer.html#//apple_ref/doc/uid/TP40001067-CH274-SW1 source_name: Apple Core Services description: Apple. (n.d.). Core Services. Retrieved June 25, 2020. url: https://developer.apple.com/documentation/coreservices source_name: macOS Foundation description: Apple. (n.d.). Foundation. Retrieved July 1, 2020. url: https://developer.apple.com/documentation/foundation source_name: OutFlank System Calls description: de Plaa, C. (2019, June 19). Red Team Tactics: Combining Direct System Calls and sRDI to bypass AV/EDR. Retrieved September 29, 2021. url: https://outflank.nl/blog/2019/06/19/red-team-tactics-combining-direct-system-calls-and-srdi-to-bypass-av-edr/ source_name: Redops Syscalls description: Feichter, D. (2023, June 30). Direct Syscalls vs Indirect Syscalls. Retrieved September 27, 2023. url: https://redops.at/en/blog/direct-syscalls-vs-indirect-syscalls source_name: GNU Fork description: Free Software Foundation, Inc.. (2020, June 18). Creating a Process. Retrieved June 25, 2020. url: https://www.gnu.org/software/libc/manual/html_node/Creating-a-Process.html source_name: CyberBit System Calls description: Gavriel, H. (2018, November 27). Malware Mitigation when Direct System Calls are Used. Retrieved September 29, 2021. url: https://www.cyberbit.com/blog/endpoint-security/malware-mitigation-when-direct-system-calls-are-used/ source_name: GLIBC description: glibc developer community. (2020, February 1). The GNU C Library (glibc). Retrieved June 25, 2020. url: https://www.gnu.org/software/libc/ source_name: LIBC description: Kerrisk, M. (2016, December 12). libc(7) — Linux manual page. Retrieved June 25, 2020. url: https://man7.org/linux/man-pages//man7/libc.7.html source_name: Linux Kernel API description: Linux Kernel Organization, Inc. (n.d.). The Linux Kernel API. Retrieved June 25, 2020. url: https://www.kernel.org/doc/html/v4.12/core-api/kernel-api.html source_name: MDSec System Calls description: MDSec Research. (2020, December). Bypassing User-Mode Hooks and Direct Invocation of System Calls for Red Teams. Retrieved September 29, 2021. url: https://www.mdsec.co.uk/2020/12/bypassing-user-mode-hooks-and-direct-invocation-of-system-calls-for-red-teams/ source_name: Microsoft CreateProcess description: Microsoft. (n.d.). CreateProcess function. Retrieved December 5, 2014. url: http://msdn.microsoft.com/en-us/library/ms682425 source_name: Microsoft Win32 description: Microsoft. (n.d.). Programming reference for the Win32 API. Retrieved March 15, 2020. url: https://docs.microsoft.com/en-us/windows/win32/api/ source_name: Microsoft NET description: Microsoft. (n.d.). What is .NET Framework?. Retrieved March 15, 2020. url: https://dotnet.microsoft.com/learn/dotnet/what-is-dotnet-framework source_name: NT API Windows description: The NTinterlnals.net team. (n.d.). Nowak, T. Retrieved June 25, 2020. url: https://undocumented.ntinternals.net/
kill_chain_name: mitre-attack phase_name: execution
Windows
Adversaries may clear or remove evidence of malicious network connections in order to clean up traces of their operations. Configuration settings as well as various artifacts that highlight connection history may be created on a system and/or in application logs from behaviors that require network connections, such as [Remote Services](https://attack.mitre.org/techniques/T1021) or [External Remote Services](https://attack.mitre.org/techniques/T1133). Defenders may use these artifacts to monitor or otherwise analyze network connections created by adversaries. Network connection history may be stored in various locations. For example, RDP connection history may be stored in Windows Registry values under (Citation: Microsoft RDP Removal): * <code>HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default</code> * <code>HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers</code> Windows may also store information about recent RDP connections in files such as <code>C:\Users\\%username%\Documents\Default.rdp</code> and `C:\Users\%username%\AppData\Local\Microsoft\Terminal Server Client\Cache\`.(Citation: Moran RDPieces) Similarly, macOS and Linux hosts may store information highlighting connection history in system logs (such as those stored in `/Library/Logs` and/or `/var/log/`).(Citation: Apple Culprit Access)(Citation: FreeDesktop Journal)(Citation: Apple Unified Log Analysis Remote Login and Screen Sharing) Malicious network connections may also require changes to third-party applications or network configuration settings, such as [Disable or Modify System Firewall](https://attack.mitre.org/techniques/T1562/004) or tampering to enable [Proxy](https://attack.mitre.org/techniques/T1090). Adversaries may delete or modify this data to conceal indicators and/or impede defensive analysis.
enterprise-attack
Clear Network Connection History and Configurations
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1070/007 external_id: T1070.007 source_name: FreeDesktop Journal description: freedesktop.org. (n.d.). systemd-journald.service. Retrieved June 15, 2022. url: https://www.freedesktop.org/software/systemd/man/systemd-journald.service.html source_name: Microsoft RDP Removal description: Microsoft. (2021, September 24). How to remove entries from the Remote Desktop Connection Computer box. Retrieved June 15, 2022. url: https://docs.microsoft.com/troubleshoot/windows-server/remote/remove-entries-from-remote-desktop-connection-computer source_name: Moran RDPieces description: Moran, B. (2020, November 18). Putting Together the RDPieces. Retrieved October 17, 2022. url: https://www.osdfcon.org/presentations/2020/Brian-Moran_Putting-Together-the-RDPieces.pdf source_name: Apple Culprit Access description: rjben. (2012, May 30). How do you find the culprit when unauthorized access to a computer is a problem?. Retrieved August 3, 2022. url: https://discussions.apple.com/thread/3991574 source_name: Apple Unified Log Analysis Remote Login and Screen Sharing description: Sarah Edwards. (2020, April 30). Analysis of Apple Unified Logs: Quarantine Edition [Entry 6] – Working From Home? Remote Logins. Retrieved August 19, 2021. url: https://sarah-edwards-xzkc.squarespace.com/blog/2020/4/30/analysis-of-apple-unified-logs-quarantine-edition-entry-6-working-from-home-remote-logins
kill_chain_name: mitre-attack phase_name: defense-evasion
Linux
Adversaries may reveal credentials of accounts that have disabled Kerberos preauthentication by [Password Cracking](https://attack.mitre.org/techniques/T1110/002) Kerberos messages.(Citation: Harmj0y Roasting AS-REPs Jan 2017) Preauthentication offers protection against offline [Password Cracking](https://attack.mitre.org/techniques/T1110/002). When enabled, a user requesting access to a resource initiates communication with the Domain Controller (DC) by sending an Authentication Server Request (AS-REQ) message with a timestamp that is encrypted with the hash of their password. If and only if the DC is able to successfully decrypt the timestamp with the hash of the user’s password, it will then send an Authentication Server Response (AS-REP) message that contains the Ticket Granting Ticket (TGT) to the user. Part of the AS-REP message is signed with the user’s password.(Citation: Microsoft Kerberos Preauth 2014) For each account found without preauthentication, an adversary may send an AS-REQ message without the encrypted timestamp and receive an AS-REP message with TGT data which may be encrypted with an insecure algorithm such as RC4. The recovered encrypted data may be vulnerable to offline [Password Cracking](https://attack.mitre.org/techniques/T1110/002) attacks similarly to [Kerberoasting](https://attack.mitre.org/techniques/T1558/003) and expose plaintext credentials. (Citation: Harmj0y Roasting AS-REPs Jan 2017)(Citation: Stealthbits Cracking AS-REP Roasting Jun 2019) An account registered to a domain, with or without special privileges, can be abused to list all domain accounts that have preauthentication disabled by utilizing Windows tools like [PowerShell](https://attack.mitre.org/techniques/T1059/001) with an LDAP filter. Alternatively, the adversary may send an AS-REQ message for each user. If the DC responds without errors, the account does not require preauthentication and the AS-REP message will already contain the encrypted data. (Citation: Harmj0y Roasting AS-REPs Jan 2017)(Citation: Stealthbits Cracking AS-REP Roasting Jun 2019) Cracked hashes may enable [Persistence](https://attack.mitre.org/tactics/TA0003), [Privilege Escalation](https://attack.mitre.org/tactics/TA0004), and [Lateral Movement](https://attack.mitre.org/tactics/TA0008) via access to [Valid Accounts](https://attack.mitre.org/techniques/T1078).(Citation: SANS Attacking Kerberos Nov 2014)
enterprise-attack
AS-REP Roasting
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1558/004 external_id: T1558.004 source_name: Harmj0y Roasting AS-REPs Jan 2017 description: HarmJ0y. (2017, January 17). Roasting AS-REPs. Retrieved August 24, 2020. url: http://www.harmj0y.net/blog/activedirectory/roasting-as-reps/ source_name: Microsoft Kerberos Preauth 2014 description: Sanyal, M.. (2014, March 18). Kerberos Pre-Authentication: Why It Should Not Be Disabled. Retrieved August 25, 2020. url: https://social.technet.microsoft.com/wiki/contents/articles/23559.kerberos-pre-authentication-why-it-should-not-be-disabled.aspx source_name: Stealthbits Cracking AS-REP Roasting Jun 2019 description: Jeff Warren. (2019, June 27). Cracking Active Directory Passwords with AS-REP Roasting. Retrieved August 24, 2020. url: https://blog.stealthbits.com/cracking-active-directory-passwords-with-as-rep-roasting/ source_name: SANS Attacking Kerberos Nov 2014 description: Medin, T. (2014, November). Attacking Kerberos - Kicking the Guard Dog of Hades. Retrieved March 22, 2018. url: https://redsiege.com/kerberoast-slides source_name: AdSecurity Cracking Kerberos Dec 2015 description: Metcalf, S. (2015, December 31). Cracking Kerberos TGS Tickets Using Kerberoast – Exploiting Kerberos to Compromise the Active Directory Domain. Retrieved March 22, 2018. url: https://adsecurity.org/?p=2293 source_name: Microsoft Detecting Kerberoasting Feb 2018 description: Bani, M. (2018, February 23). Detecting Kerberoasting activity using Azure Security Center. Retrieved March 23, 2018. url: https://blogs.technet.microsoft.com/motiba/2018/02/23/detecting-kerberoasting-activity-using-azure-security-center/ source_name: Microsoft 4768 TGT 2017 description: Microsoft. (2017, April 19). 4768(S, F): A Kerberos authentication ticket (TGT) was requested. Retrieved August 24, 2020. url: https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4768
kill_chain_name: mitre-attack phase_name: credential-access
Windows
Adversaries may compromise third-party Virtual Private Servers (VPSs) that can be used during targeting. There exist a variety of cloud service providers that will sell virtual machines/containers as a service. Adversaries may compromise VPSs purchased by third-party entities. By compromising a VPS to use as infrastructure, adversaries can make it difficult to physically tie back operations to themselves.(Citation: NSA NCSC Turla OilRig) Compromising a VPS for use in later stages of the adversary lifecycle, such as Command and Control, can allow adversaries to benefit from the ubiquity and trust associated with higher reputation cloud service providers as well as that added by the compromised third-party.
enterprise-attack
Virtual Private Server
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1584/003 external_id: T1584.003 source_name: NSA NCSC Turla OilRig description: NSA/NCSC. (2019, October 21). Cybersecurity Advisory: Turla Group Exploits Iranian APT To Expand Coverage Of Victims. Retrieved October 16, 2020. url: https://media.defense.gov/2019/Oct/18/2002197242/-1/-1/0/NSA_CSA_Turla_20191021%20ver%204%20-%20nsa.gov.pdf source_name: ThreatConnect Infrastructure Dec 2020 description: ThreatConnect. (2020, December 15). Infrastructure Research and Hunting: Boiling the Domain Ocean. Retrieved October 12, 2021. url: https://threatconnect.com/blog/infrastructure-research-hunting/ source_name: Mandiant SCANdalous Jul 2020 description: Stephens, A. (2020, July 13). SCANdalous! (External Detection Using Network Scan Data and Automation). Retrieved October 12, 2021. url: https://www.mandiant.com/resources/scandalous-external-detection-using-network-scan-data-and-automation source_name: Koczwara Beacon Hunting Sep 2021 description: Koczwara, M. (2021, September 7). Hunting Cobalt Strike C2 with Shodan. Retrieved October 12, 2021. url: https://michaelkoczwara.medium.com/cobalt-strike-c2-hunting-with-shodan-c448d501a6e2
kill_chain_name: mitre-attack phase_name: resource-development
PRE
Adversaries may execute commands and perform malicious tasks using AutoIT and AutoHotKey automation scripts. AutoIT and AutoHotkey (AHK) are scripting languages that enable users to automate Windows tasks. These automation scripts can be used to perform a wide variety of actions, such as clicking on buttons, entering text, and opening and closing programs.(Citation: AutoIT)(Citation: AutoHotKey) Adversaries may use AHK (`.ahk`) and AutoIT (`.au3`) scripts to execute malicious code on a victim's system. For example, adversaries have used for AHK to execute payloads and other modular malware such as keyloggers. Adversaries have also used custom AHK files containing embedded malware as [Phishing](https://attack.mitre.org/techniques/T1566) payloads.(Citation: Splunk DarkGate) These scripts may also be compiled into self-contained executable payloads (`.exe`).(Citation: AutoIT)(Citation: AutoHotKey)
enterprise-attack
AutoHotKey & AutoIT
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1059/010 external_id: T1059.010 source_name: AutoHotKey description: AutoHotkey Foundation LLC. (n.d.). Using the Program. Retrieved March 29, 2024. url: https://www.autohotkey.com/docs/v1/Program.htm source_name: AutoIT description: AutoIT. (n.d.). Running Scripts. Retrieved March 29, 2024. url: https://www.autoitscript.com/autoit3/docs/intro/running.htm source_name: Splunk DarkGate description: Splunk Threat Research Team. (2024, January 17). Enter The Gates: An Analysis of the DarkGate AutoIt Loader. Retrieved March 29, 2024. url: https://www.splunk.com/en_us/blog/security/enter-the-gates-an-analysis-of-the-darkgate-autoit-loader.html
kill_chain_name: mitre-attack phase_name: execution
Windows
Adversaries may reduce the level of effort required to decrypt data transmitted over the network by reducing the cipher strength of encrypted communications.(Citation: Cisco Synful Knock Evolution) Adversaries can weaken the encryption software on a compromised network device by reducing the key size used by the software to convert plaintext to ciphertext (e.g., from hundreds or thousands of bytes to just a couple of bytes). As a result, adversaries dramatically reduce the amount of effort needed to decrypt the protected information without the key. Adversaries may modify the key size used and other encryption parameters using specialized commands in a [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) introduced to the system through [Modify System Image](https://attack.mitre.org/techniques/T1601) to change the configuration of the device. (Citation: Cisco Blog Legacy Device Attacks)
enterprise-attack
Reduce Key Space
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1600/001 external_id: T1600.001 source_name: Cisco Synful Knock Evolution description: Graham Holmes. (2015, October 8). Evolution of attacks on Cisco IOS devices. Retrieved October 19, 2020. url: https://blogs.cisco.com/security/evolution-of-attacks-on-cisco-ios-devices source_name: Cisco Blog Legacy Device Attacks description: Omar Santos. (2020, October 19). Attackers Continue to Target Legacy Devices. Retrieved October 20, 2020. url: https://community.cisco.com/t5/security-blogs/attackers-continue-to-target-legacy-devices/ba-p/4169954
kill_chain_name: mitre-attack phase_name: defense-evasion
Network
In addition to clearing system logs, an adversary may clear the command history of a compromised account to conceal the actions undertaken during an intrusion. Various command interpreters keep track of the commands users type in their terminal so that users can retrace what they've done. On Linux and macOS, these command histories can be accessed in a few different ways. While logged in, this command history is tracked in a file pointed to by the environment variable <code>HISTFILE</code>. When a user logs off a system, this information is flushed to a file in the user's home directory called <code>~/.bash_history</code>. The benefit of this is that it allows users to go back to commands they've used before in different sessions. Adversaries may delete their commands from these logs by manually clearing the history (<code>history -c</code>) or deleting the bash history file <code>rm ~/.bash_history</code>. Adversaries may also leverage a [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) on network devices to clear command history data (<code>clear logging</code> and/or <code>clear history</code>).(Citation: US-CERT-TA18-106A) On Windows hosts, PowerShell has two different command history providers: the built-in history and the command history managed by the <code>PSReadLine</code> module. The built-in history only tracks the commands used in the current session. This command history is not available to other sessions and is deleted when the session ends. The <code>PSReadLine</code> command history tracks the commands used in all PowerShell sessions and writes them to a file (<code>$env:APPDATA\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt</code> by default). This history file is available to all sessions and contains all past history since the file is not deleted when the session ends.(Citation: Microsoft PowerShell Command History) Adversaries may run the PowerShell command <code>Clear-History</code> to flush the entire command history from a current PowerShell session. This, however, will not delete/flush the <code>ConsoleHost_history.txt</code> file. Adversaries may also delete the <code>ConsoleHost_history.txt</code> file or edit its contents to hide PowerShell commands they have run.(Citation: Sophos PowerShell command audit)(Citation: Sophos PowerShell Command History Forensics)
enterprise-attack
Clear Command History
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1070/003 external_id: T1070.003 source_name: Sophos PowerShell command audit description: jak. (2020, June 27). Live Discover - PowerShell command audit. Retrieved August 21, 2020. url: https://community.sophos.com/products/intercept/early-access-program/f/live-discover-response-queries/121529/live-discover---powershell-command-audit source_name: Microsoft PowerShell Command History description: Microsoft. (2020, May 13). About History. Retrieved September 4, 2020. url: https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_history?view=powershell-7 source_name: US-CERT-TA18-106A description: US-CERT. (2018, April 20). Alert (TA18-106A) Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. Retrieved October 19, 2020. url: https://www.us-cert.gov/ncas/alerts/TA18-106A source_name: Sophos PowerShell Command History Forensics description: Vikas, S. (2020, August 26). PowerShell Command History Forensics. Retrieved September 4, 2020. url: https://community.sophos.com/products/malware/b/blog/posts/powershell-command-history-forensics
kill_chain_name: mitre-attack phase_name: defense-evasion
Linux
Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters. Various Windows utilities may be used to execute commands, possibly without invoking [cmd](https://attack.mitre.org/software/S0106). For example, [Forfiles](https://attack.mitre.org/software/S0193), the Program Compatibility Assistant (pcalua.exe), components of the Windows Subsystem for Linux (WSL), as well as other utilities may invoke the execution of programs and commands from a [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059), Run window, or via scripts. (Citation: VectorSec ForFiles Aug 2017) (Citation: Evi1cg Forfiles Nov 2017) Adversaries may abuse these features for [Defense Evasion](https://attack.mitre.org/tactics/TA0005), specifically to perform arbitrary execution while subverting detections and/or mitigation controls (such as Group Policy) that limit/prevent the usage of [cmd](https://attack.mitre.org/software/S0106) or file extensions more commonly associated with malicious payloads.
enterprise-attack
Indirect Command Execution
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1202 external_id: T1202 source_name: Evi1cg Forfiles Nov 2017 description: Evi1cg. (2017, November 26). block cmd.exe ? try this :. Retrieved January 22, 2018. url: https://twitter.com/Evi1cg/status/935027922397573120 source_name: RSA Forfiles Aug 2017 description: Partington, E. (2017, August 14). Are you looking out for forfiles.exe (if you are watching for cmd.exe). Retrieved January 22, 2018. url: https://community.rsa.com/community/products/netwitness/blog/2017/08/14/are-you-looking-out-for-forfilesexe-if-you-are-watching-for-cmdexe source_name: VectorSec ForFiles Aug 2017 description: vector_sec. (2017, August 11). Defenders watching launches of cmd? What about forfiles?. Retrieved January 22, 2018. url: https://twitter.com/vector_sec/status/896049052642533376
kill_chain_name: mitre-attack phase_name: defense-evasion
Windows
Adversaries may move onto systems, possibly those on disconnected or air-gapped networks, by copying malware to removable media and taking advantage of Autorun features when the media is inserted into a system and executes. In the case of Lateral Movement, this may occur through modification of executable files stored on removable media or by copying malware and renaming it to look like a legitimate file to trick users into executing it on a separate system. In the case of Initial Access, this may occur through manual manipulation of the media, modification of systems used to initially format the media, or modification to the media's firmware itself. Mobile devices may also be used to infect PCs with malware if connected via USB.(Citation: Exploiting Smartphone USB ) This infection may be achieved using devices (Android, iOS, etc.) and, in some instances, USB charging cables.(Citation: Windows Malware Infecting Android)(Citation: iPhone Charging Cable Hack) For example, when a smartphone is connected to a system, it may appear to be mounted similar to a USB-connected disk drive. If malware that is compatible with the connected system is on the mobile device, the malware could infect the machine (especially if Autorun features are enabled).
enterprise-attack
Replication Through Removable Media
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1091 external_id: T1091 source_name: Windows Malware Infecting Android description: Lucian Constantin. (2014, January 23). Windows malware tries to infect Android devices connected to PCs. Retrieved May 25, 2022. url: https://www.computerworld.com/article/2486903/windows-malware-tries-to-infect-android-devices-connected-to-pcs.html source_name: iPhone Charging Cable Hack description: Zack Whittaker. (2019, August 12). This hacker’s iPhone charging cable can hijack your computer. Retrieved May 25, 2022. url: https://techcrunch.com/2019/08/12/iphone-charging-cable-hack-computer-def-con/ source_name: Exploiting Smartphone USB description: Zhaohui Wang & Angelos Stavrou. (n.d.). Exploiting Smart-Phone USB Connectivity For Fun And Profit. Retrieved May 25, 2022. url: https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.226.3427&rep=rep1&type=pdf
kill_chain_name: mitre-attack phase_name: initial-access
Windows
Adversaries may search local system sources, such as file systems and configuration files or local databases, to find files of interest and sensitive data prior to Exfiltration. Adversaries may do this using a [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059), such as [cmd](https://attack.mitre.org/software/S0106) as well as a [Network Device CLI](https://attack.mitre.org/techniques/T1059/008), which have functionality to interact with the file system to gather information.(Citation: show_run_config_cmd_cisco) Adversaries may also use [Automated Collection](https://attack.mitre.org/techniques/T1119) on the local system.
enterprise-attack
Data from Local System
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1005 external_id: T1005 source_name: show_run_config_cmd_cisco description: Cisco. (2022, August 16). show running-config - Cisco IOS Configuration Fundamentals Command Reference . Retrieved July 13, 2022. url: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/cf_command_ref/show_protocols_through_showmon.html#wp2760878733 source_name: Mandiant APT41 Global Intrusion description: Gyler, C.,Perez D.,Jones, S.,Miller, S.. (2021, February 25). This is Not a Test: APT41 Initiates Global Intrusion Campaign Using Multiple Exploits. Retrieved February 17, 2022. url: https://www.mandiant.com/resources/apt41-initiates-global-intrusion-campaign-using-multiple-exploits source_name: US-CERT-TA18-106A description: US-CERT. (2018, April 20). Alert (TA18-106A) Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. Retrieved October 19, 2020. url: https://www.us-cert.gov/ncas/alerts/TA18-106A
kill_chain_name: mitre-attack phase_name: collection
Linux
Adversaries may use [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1027) to hide artifacts of an intrusion from analysis. They may require separate mechanisms to decode or deobfuscate that information depending on how they intend to use it. Methods for doing that include built-in functionality of malware or by using utilities present on the system. One such example is the use of [certutil](https://attack.mitre.org/software/S0160) to decode a remote access tool portable executable file that has been hidden inside a certificate file.(Citation: Malwarebytes Targeted Attack against Saudi Arabia) Another example is using the Windows <code>copy /b</code> command to reassemble binary fragments into a malicious payload.(Citation: Carbon Black Obfuscation Sept 2016) Sometimes a user's action may be required to open it for deobfuscation or decryption as part of [User Execution](https://attack.mitre.org/techniques/T1204). The user may also be required to input a password to open a password protected compressed/encrypted file that was provided by the adversary. (Citation: Volexity PowerDuke November 2016)
enterprise-attack
Deobfuscate/Decode Files or Information
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1140 external_id: T1140 source_name: Volexity PowerDuke November 2016 description: Adair, S.. (2016, November 9). PowerDuke: Widespread Post-Election Spear Phishing Campaigns Targeting Think Tanks and NGOs. Retrieved January 11, 2017. url: https://www.volexity.com/blog/2016/11/09/powerduke-post-election-spear-phishing-campaigns-targeting-think-tanks-and-ngos/ source_name: Malwarebytes Targeted Attack against Saudi Arabia description: Malwarebytes Labs. (2017, March 27). New targeted attack against Saudi Arabia Government. Retrieved July 3, 2017. url: https://blog.malwarebytes.com/cybercrime/social-engineering-cybercrime/2017/03/new-targeted-attack-saudi-arabia-government/ source_name: Carbon Black Obfuscation Sept 2016 description: Tedesco, B. (2016, September 23). Security Alert Summary. Retrieved February 12, 2018. url: https://www.carbonblack.com/2016/09/23/security-advisory-variants-well-known-adware-families-discovered-include-sophisticated-obfuscation-techniques-previously-associated-nation-state-attacks/
kill_chain_name: mitre-attack phase_name: defense-evasion
Windows
Adversaries may abuse Microsoft Outlook rules to obtain persistence on a compromised system. Outlook rules allow a user to define automated behavior to manage email messages. A benign rule might, for example, automatically move an email to a particular folder in Outlook if it contains specific words from a specific sender. Malicious Outlook rules can be created that can trigger code execution when an adversary sends a specifically crafted email to that user.(Citation: SilentBreak Outlook Rules) Once malicious rules have been added to the user’s mailbox, they will be loaded when Outlook is started. Malicious rules will execute when an adversary sends a specifically crafted email to the user.(Citation: SilentBreak Outlook Rules)
enterprise-attack
Outlook Rules
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1137/005 external_id: T1137.005 source_name: SilentBreak Outlook Rules description: Landers, N. (2015, December 4). Malicious Outlook Rules. Retrieved February 4, 2019. url: https://silentbreaksecurity.com/malicious-outlook-rules/ source_name: Microsoft Detect Outlook Forms description: Fox, C., Vangel, D. (2018, April 22). Detect and Remediate Outlook Rules and Custom Forms Injections Attacks in Office 365. Retrieved February 4, 2019. url: https://docs.microsoft.com/en-us/office365/securitycompliance/detect-and-remediate-outlook-rules-forms-attack source_name: Pfammatter - Hidden Inbox Rules description: Damian Pfammatter. (2018, September 17). Hidden Inbox Rules in Microsoft Exchange. Retrieved October 12, 2021. url: https://blog.compass-security.com/2018/09/hidden-inbox-rules-in-microsoft-exchange/ source_name: SensePost NotRuler description: SensePost. (2017, September 21). NotRuler - The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange. Retrieved February 4, 2019. url: https://github.com/sensepost/notruler
kill_chain_name: mitre-attack phase_name: persistence
Windows
Adversaries may maliciously modify components of a victim environment in order to hinder or disable defensive mechanisms. This not only involves impairing preventative defenses, such as firewalls and anti-virus, but also detection capabilities that defenders can use to audit activity and identify malicious behavior. This may also span both native defenses as well as supplemental capabilities installed by users and administrators. Adversaries may also impair routine operations that contribute to defensive hygiene, such as blocking users from logging out of a computer or stopping it from being shut down. These restrictions can further enable malicious operations as well as the continued propagation of incidents.(Citation: Emotet shutdown) Adversaries could also target event aggregation and analysis mechanisms, or otherwise disrupt these procedures by altering other system components.
enterprise-attack
Impair Defenses
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1562 external_id: T1562 source_name: Emotet shutdown description: The DFIR Report. (2022, November 8). Emotet Strikes Again – LNK File Leads to Domain Wide Ransomware. Retrieved March 6, 2023. url: https://thedfirreport.com/2022/11/28/emotet-strikes-again-lnk-file-leads-to-domain-wide-ransomware/
kill_chain_name: mitre-attack phase_name: defense-evasion
Windows
Adversaries may compromise cloud accounts that can be used during targeting. Adversaries can use compromised cloud accounts to further their operations, including leveraging cloud storage services such as Dropbox, Microsoft OneDrive, or AWS S3 buckets for [Exfiltration to Cloud Storage](https://attack.mitre.org/techniques/T1567/002) or to [Upload Tool](https://attack.mitre.org/techniques/T1608/002)s. Cloud accounts can also be used in the acquisition of infrastructure, such as [Virtual Private Server](https://attack.mitre.org/techniques/T1583/003)s or [Serverless](https://attack.mitre.org/techniques/T1583/007) infrastructure. Compromising cloud accounts may allow adversaries to develop sophisticated capabilities without managing their own servers.(Citation: Awake Security C2 Cloud) A variety of methods exist for compromising cloud accounts, such as gathering credentials via [Phishing for Information](https://attack.mitre.org/techniques/T1598), purchasing credentials from third-party sites, conducting [Password Spraying](https://attack.mitre.org/techniques/T1110/003) attacks, or attempting to [Steal Application Access Token](https://attack.mitre.org/techniques/T1528)s.(Citation: MSTIC Nobelium Oct 2021) Prior to compromising cloud accounts, adversaries may conduct Reconnaissance to inform decisions about which accounts to compromise to further their operation. In some cases, adversaries may target privileged service provider accounts with the intent of leveraging a [Trusted Relationship](https://attack.mitre.org/techniques/T1199) between service providers and their customers.(Citation: MSTIC Nobelium Oct 2021)
enterprise-attack
Cloud Accounts
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1586/003 external_id: T1586.003 source_name: Awake Security C2 Cloud description: Gary Golomb and Tory Kei. (n.d.). Threat Hunting Series: Detecting Command & Control in the Cloud. Retrieved May 27, 2022. url: https://awakesecurity.com/blog/threat-hunting-series-detecting-command-control-in-the-cloud/ source_name: MSTIC Nobelium Oct 2021 description: Microsoft Threat Intelligence Center. (2021, October 25). NOBELIUM targeting delegated administrative privileges to facilitate broader attacks. Retrieved March 25, 2022. url: https://www.microsoft.com/security/blog/2021/10/25/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks/
kill_chain_name: mitre-attack phase_name: resource-development
PRE
Adversaries may compromise email accounts that can be used during targeting. Adversaries can use compromised email accounts to further their operations, such as leveraging them to conduct [Phishing for Information](https://attack.mitre.org/techniques/T1598), [Phishing](https://attack.mitre.org/techniques/T1566), or large-scale spam email campaigns. Utilizing an existing persona with a compromised email account may engender a level of trust in a potential victim if they have a relationship with, or knowledge of, the compromised persona. Compromised email accounts can also be used in the acquisition of infrastructure (ex: [Domains](https://attack.mitre.org/techniques/T1583/001)). A variety of methods exist for compromising email accounts, such as gathering credentials via [Phishing for Information](https://attack.mitre.org/techniques/T1598), purchasing credentials from third-party sites, brute forcing credentials (ex: password reuse from breach credential dumps), or paying employees, suppliers or business partners for access to credentials.(Citation: AnonHBGary)(Citation: Microsoft DEV-0537) Prior to compromising email accounts, adversaries may conduct Reconnaissance to inform decisions about which accounts to compromise to further their operation. Adversaries may target compromising well-known email accounts or domains from which malicious spam or [Phishing](https://attack.mitre.org/techniques/T1566) emails may evade reputation-based email filtering rules. Adversaries can use a compromised email account to hijack existing email threads with targets of interest.
enterprise-attack
Email Accounts
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1586/002 external_id: T1586.002 source_name: AnonHBGary description: Bright, P. (2011, February 15). Anonymous speaks: the inside story of the HBGary hack. Retrieved March 9, 2017. url: https://arstechnica.com/tech-policy/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack/ source_name: Microsoft DEV-0537 description: Microsoft. (2022, March 22). DEV-0537 criminal actor targeting organizations for data exfiltration and destruction. Retrieved March 23, 2022. url: https://www.microsoft.com/security/blog/2022/03/22/dev-0537-criminal-actor-targeting-organizations-for-data-exfiltration-and-destruction/
kill_chain_name: mitre-attack phase_name: resource-development
PRE
Adversaries may upload malware to third-party or adversary controlled infrastructure to make it accessible during targeting. Malicious software can include payloads, droppers, post-compromise tools, backdoors, and a variety of other malicious content. Adversaries may upload malware to support their operations, such as making a payload available to a victim network to enable [Ingress Tool Transfer](https://attack.mitre.org/techniques/T1105) by placing it on an Internet accessible web server. Malware may be placed on infrastructure that was previously purchased/rented by the adversary ([Acquire Infrastructure](https://attack.mitre.org/techniques/T1583)) or was otherwise compromised by them ([Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)). Malware can also be staged on web services, such as GitHub or Pastebin, or hosted on the InterPlanetary File System (IPFS), where decentralized content storage makes the removal of malicious files difficult.(Citation: Volexity Ocean Lotus November 2020)(Citation: Talos IPFS 2022) Adversaries may upload backdoored files, such as application binaries, virtual machine images, or container images, to third-party software stores or repositories (ex: GitHub, CNET, AWS Community AMIs, Docker Hub). By chance encounter, victims may directly download/install these backdoored files via [User Execution](https://attack.mitre.org/techniques/T1204). [Masquerading](https://attack.mitre.org/techniques/T1036) may increase the chance of users mistakenly executing these files.
enterprise-attack
Upload Malware
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1608/001 external_id: T1608.001 source_name: Volexity Ocean Lotus November 2020 description: Adair, S. and Lancaster, T. (2020, November 6). OceanLotus: Extending Cyber Espionage Operations Through Fake Websites. Retrieved November 20, 2020. url: https://www.volexity.com/blog/2020/11/06/oceanlotus-extending-cyber-espionage-operations-through-fake-websites/ source_name: Talos IPFS 2022 description: Edmund Brumaghin. (2022, November 9). Threat Spotlight: Cyber Criminal Adoption of IPFS for Phishing, Malware Campaigns. Retrieved March 8, 2023. url: https://blog.talosintelligence.com/ipfs-abuse/
kill_chain_name: mitre-attack phase_name: resource-development
PRE
Adversaries may manipulate products or product delivery mechanisms prior to receipt by a final consumer for the purpose of data or system compromise. Supply chain compromise can take place at any stage of the supply chain including: * Manipulation of development tools * Manipulation of a development environment * Manipulation of source code repositories (public or private) * Manipulation of source code in open-source dependencies * Manipulation of software update/distribution mechanisms * Compromised/infected system images (multiple cases of removable media infected at the factory)(Citation: IBM Storwize)(Citation: Schneider Electric USB Malware) * Replacement of legitimate software with modified versions * Sales of modified/counterfeit products to legitimate distributors * Shipment interdiction While supply chain compromise can impact any component of hardware or software, adversaries looking to gain execution have often focused on malicious additions to legitimate software in software distribution or update channels.(Citation: Avast CCleaner3 2018)(Citation: Microsoft Dofoil 2018)(Citation: Command Five SK 2011) Targeting may be specific to a desired victim set or malicious software may be distributed to a broad set of consumers but only move on to additional tactics on specific victims.(Citation: Symantec Elderwood Sept 2012)(Citation: Avast CCleaner3 2018)(Citation: Command Five SK 2011) Popular open source projects that are used as dependencies in many applications may also be targeted as a means to add malicious code to users of the dependency.(Citation: Trendmicro NPM Compromise)
enterprise-attack
Supply Chain Compromise
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1195 external_id: T1195 source_name: Avast CCleaner3 2018 description: Avast Threat Intelligence Team. (2018, March 8). New investigations into the CCleaner incident point to a possible third stage that had keylogger capacities. Retrieved March 15, 2018. url: https://blog.avast.com/new-investigations-in-ccleaner-incident-point-to-a-possible-third-stage-that-had-keylogger-capacities source_name: Command Five SK 2011 description: Command Five Pty Ltd. (2011, September). SK Hack by an Advanced Persistent Threat. Retrieved April 6, 2018. url: https://www.commandfive.com/papers/C5_APT_SKHack.pdf source_name: IBM Storwize description: IBM Support. (2017, April 26). Storwize USB Initialization Tool may contain malicious code. Retrieved May 28, 2019. url: https://www-01.ibm.com/support/docview.wss?uid=ssg1S1010146&myns=s028&mynp=OCSTHGUJ&mynp=OCSTLM5A&mynp=OCSTLM6B&mynp=OCHW206&mync=E&cm_sp=s028-_-OCSTHGUJ-OCSTLM5A-OCSTLM6B-OCHW206-_-E source_name: Symantec Elderwood Sept 2012 description: O'Gorman, G., and McDonald, G.. (2012, September 6). The Elderwood Project. Retrieved February 15, 2018. url: https://web.archive.org/web/20190717233006/http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the-elderwood-project.pdf source_name: Schneider Electric USB Malware description: Schneider Electric. (2018, August 24). Security Notification – USB Removable Media Provided With Conext Combox and Conext Battery Monitor. Retrieved May 28, 2019. url: https://www.se.com/ww/en/download/document/SESN-2018-236-01/ source_name: Trendmicro NPM Compromise description: Trendmicro. (2018, November 29). Hacker Infects Node.js Package to Steal from Bitcoin Wallets. Retrieved April 10, 2019. url: https://www.trendmicro.com/vinfo/dk/security/news/cybercrime-and-digital-threats/hacker-infects-node-js-package-to-steal-from-bitcoin-wallets source_name: Microsoft Dofoil 2018 description: Windows Defender Research. (2018, March 7). Behavior monitoring combined with machine learning spoils a massive Dofoil coin mining campaign. Retrieved March 20, 2018. url: https://cloudblogs.microsoft.com/microsoftsecure/2018/03/07/behavior-monitoring-combined-with-machine-learning-spoils-a-massive-dofoil-coin-mining-campaign/
kill_chain_name: mitre-attack phase_name: initial-access
Linux
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network. The weakness in the system can be a software bug, a temporary glitch, or a misconfiguration. Exploited applications are often websites/web servers, but can also include databases (like SQL), standard services (like SMB or SSH), network device administration and management protocols (like SNMP and Smart Install), and any other system with Internet accessible open sockets.(Citation: NVD CVE-2016-6662)(Citation: CIS Multiple SMB Vulnerabilities)(Citation: US-CERT TA18-106A Network Infrastructure Devices 2018)(Citation: Cisco Blog Legacy Device Attacks)(Citation: NVD CVE-2014-7169) Depending on the flaw being exploited this may also involve [Exploitation for Defense Evasion](https://attack.mitre.org/techniques/T1211) or [Exploitation for Client Execution](https://attack.mitre.org/techniques/T1203). If an application is hosted on cloud-based infrastructure and/or is containerized, then exploiting it may lead to compromise of the underlying instance or container. This can allow an adversary a path to access the cloud or container APIs, exploit container host access via [Escape to Host](https://attack.mitre.org/techniques/T1611), or take advantage of weak identity and access management policies. Adversaries may also exploit edge network infrastructure and related appliances, specifically targeting devices that do not support robust host-based defenses.(Citation: Mandiant Fortinet Zero Day)(Citation: Wired Russia Cyberwar) For websites and databases, the OWASP top 10 and CWE top 25 highlight the most common web-based vulnerabilities.(Citation: OWASP Top 10)(Citation: CWE top 25)
enterprise-attack
Exploit Public-Facing Application
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1190 external_id: T1190 source_name: CWE top 25 description: Christey, S., Brown, M., Kirby, D., Martin, B., Paller, A.. (2011, September 13). 2011 CWE/SANS Top 25 Most Dangerous Software Errors. Retrieved April 10, 2019. url: https://cwe.mitre.org/top25/index.html source_name: CIS Multiple SMB Vulnerabilities description: CIS. (2017, May 15). Multiple Vulnerabilities in Microsoft Windows SMB Server Could Allow for Remote Code Execution. Retrieved April 3, 2018. url: https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-microsoft-windows-smb-server-could-allow-for-remote-code-execution/ source_name: Wired Russia Cyberwar description: Greenberg, A. (2022, November 10). Russia’s New Cyberwarfare in Ukraine Is Fast, Dirty, and Relentless. Retrieved March 22, 2023. url: https://www.wired.com/story/russia-ukraine-cyberattacks-mandiant/ source_name: Mandiant Fortinet Zero Day description: Marvi, A. et al.. (2023, March 16). Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation. Retrieved March 22, 2023. url: https://www.mandiant.com/resources/blog/fortinet-malware-ecosystem source_name: NVD CVE-2016-6662 description: National Vulnerability Database. (2017, February 2). CVE-2016-6662 Detail. Retrieved April 3, 2018. url: https://nvd.nist.gov/vuln/detail/CVE-2016-6662 source_name: NVD CVE-2014-7169 description: National Vulnerability Database. (2017, September 24). CVE-2014-7169 Detail. Retrieved April 3, 2018. url: https://nvd.nist.gov/vuln/detail/CVE-2014-7169 source_name: Cisco Blog Legacy Device Attacks description: Omar Santos. (2020, October 19). Attackers Continue to Target Legacy Devices. Retrieved October 20, 2020. url: https://community.cisco.com/t5/security-blogs/attackers-continue-to-target-legacy-devices/ba-p/4169954 source_name: OWASP Top 10 description: OWASP. (2018, February 23). OWASP Top Ten Project. Retrieved April 3, 2018. url: https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project source_name: US-CERT TA18-106A Network Infrastructure Devices 2018 description: US-CERT. (2018, April 20). Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. Retrieved October 19, 2020. url: https://us-cert.cisa.gov/ncas/alerts/TA18-106A
kill_chain_name: mitre-attack phase_name: initial-access
Windows
Adversaries may attempt to subvert Kerberos authentication by stealing or forging Kerberos tickets to enable [Pass the Ticket](https://attack.mitre.org/techniques/T1550/003). Kerberos is an authentication protocol widely used in modern Windows domain environments. In Kerberos environments, referred to as “realms”, there are three basic participants: client, service, and Key Distribution Center (KDC).(Citation: ADSecurity Kerberos Ring Decoder) Clients request access to a service and through the exchange of Kerberos tickets, originating from KDC, they are granted access after having successfully authenticated. The KDC is responsible for both authentication and ticket granting. Adversaries may attempt to abuse Kerberos by stealing tickets or forging tickets to enable unauthorized access. On Windows, the built-in <code>klist</code> utility can be used to list and analyze cached Kerberos tickets.(Citation: Microsoft Klist) Linux systems on Active Directory domains store Kerberos credentials locally in the credential cache file referred to as the "ccache". The credentials are stored in the ccache file while they remain valid and generally while a user's session lasts.(Citation: MIT ccache) On modern Redhat Enterprise Linux systems, and derivative distributions, the System Security Services Daemon (SSSD) handles Kerberos tickets. By default SSSD maintains a copy of the ticket database that can be found in <code>/var/lib/sss/secrets/secrets.ldb</code> as well as the corresponding key located in <code>/var/lib/sss/secrets/.secrets.mkey</code>. Both files require root access to read. If an adversary is able to access the database and key, the credential cache Kerberos blob can be extracted and converted into a usable Kerberos ccache file that adversaries may use for [Pass the Ticket](https://attack.mitre.org/techniques/T1550/003). The ccache file may also be converted into a Windows format using tools such as Kekeo.(Citation: Linux Kerberos Tickets)(Citation: Brining MimiKatz to Unix)(Citation: Kekeo) Kerberos tickets on macOS are stored in a standard ccache format, similar to Linux. By default, access to these ccache entries is federated through the KCM daemon process via the Mach RPC protocol, which uses the caller's environment to determine access. The storage location for these ccache entries is influenced by the <code>/etc/krb5.conf</code> configuration file and the <code>KRB5CCNAME</code> environment variable which can specify to save them to disk or keep them protected via the KCM daemon. Users can interact with ticket storage using <code>kinit</code>, <code>klist</code>, <code>ktutil</code>, and <code>kcc</code> built-in binaries or via Apple's native Kerberos framework. Adversaries can use open source tools to interact with the ccache files directly or to use the Kerberos framework to call lower-level APIs for extracting the user's TGT or Service Tickets.(Citation: SpectorOps Bifrost Kerberos macOS 2019)(Citation: macOS kerberos framework MIT)
enterprise-attack
Steal or Forge Kerberos Tickets
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1558 external_id: T1558 source_name: CERT-EU Golden Ticket Protection description: Abolins, D., Boldea, C., Socha, K., Soria-Machado, M. (2016, April 26). Kerberos Golden Ticket Protection. Retrieved July 13, 2017. url: https://cert.europa.eu/static/WhitePapers/UPDATED%20-%20CERT-EU_Security_Whitepaper_2014-007_Kerberos_Golden_Ticket_Protection_v1_4.pdf source_name: Microsoft Detecting Kerberoasting Feb 2018 description: Bani, M. (2018, February 23). Detecting Kerberoasting activity using Azure Security Center. Retrieved March 23, 2018. url: https://blogs.technet.microsoft.com/motiba/2018/02/23/detecting-kerberoasting-activity-using-azure-security-center/ source_name: Kekeo description: Benjamin Delpy. (n.d.). Kekeo. Retrieved October 4, 2021. url: https://github.com/gentilkiwi/kekeo source_name: SpectorOps Bifrost Kerberos macOS 2019 description: Cody Thomas. (2019, November 14). When Kirbi walks the Bifrost. Retrieved October 6, 2021. url: https://posts.specterops.io/when-kirbi-walks-the-bifrost-4c727807744f source_name: Medium Detecting Attempts to Steal Passwords from Memory description: French, D. (2018, October 2). Detecting Attempts to Steal Passwords from Memory. Retrieved October 11, 2019. url: https://medium.com/threatpunter/detecting-attempts-to-steal-passwords-from-memory-558f16dce4ea source_name: Stealthbits Detect PtT 2019 description: Jeff Warren. (2019, February 19). How to Detect Pass-the-Ticket Attacks. Retrieved February 27, 2020. url: https://blog.stealthbits.com/detect-pass-the-ticket-attacks source_name: macOS kerberos framework MIT description: Massachusetts Institute of Technology. (2007, October 27). Kerberos for Macintosh Preferences Documentation. Retrieved October 6, 2021. url: http://web.mit.edu/macdev/KfM/Common/Documentation/preferences.html source_name: MIT ccache description: Massachusetts Institute of Technology. (n.d.). MIT Kerberos Documentation: Credential Cache. Retrieved October 4, 2021. url: https://web.mit.edu/kerberos/krb5-1.12/doc/basic/ccache_def.html source_name: AdSecurity Cracking Kerberos Dec 2015 description: Metcalf, S. (2015, December 31). Cracking Kerberos TGS Tickets Using Kerberoast – Exploiting Kerberos to Compromise the Active Directory Domain. Retrieved March 22, 2018. url: https://adsecurity.org/?p=2293 source_name: ADSecurity Detecting Forged Tickets description: Metcalf, S. (2015, May 03). Detecting Forged Kerberos Ticket (Golden Ticket & Silver Ticket) Use in Active Directory. Retrieved December 23, 2015. url: https://adsecurity.org/?p=1515 source_name: Microsoft Kerberos Golden Ticket description: Microsoft. (2015, March 24). Kerberos Golden Ticket Check (Updated). Retrieved February 27, 2020. url: https://gallery.technet.microsoft.com/scriptcenter/Kerberos-Golden-Ticket-b4814285 source_name: Microsoft Klist description: Microsoft. (2021, March 3). klist. Retrieved October 14, 2021. url: https://docs.microsoft.com/windows-server/administration/windows-commands/klist source_name: ADSecurity Kerberos Ring Decoder description: Sean Metcalf. (2014, September 12). Kerberos, Active Directory’s Secret Decoder Ring. Retrieved February 27, 2020. url: https://adsecurity.org/?p=227 source_name: Brining MimiKatz to Unix description: Tim Wadhwa-Brown. (2018, November). Where 2 worlds collide Bringing Mimikatz et al to UNIX. Retrieved October 13, 2021. url: https://labs.portcullis.co.uk/download/eu-18-Wadhwa-Brown-Where-2-worlds-collide-Bringing-Mimikatz-et-al-to-UNIX.pdf source_name: Linux Kerberos Tickets description: Trevor Haskell. (2020, April 1). Kerberos Tickets on Linux Red Teams. Retrieved October 4, 2021. url: https://www.fireeye.com/blog/threat-research/2020/04/kerberos-tickets-on-linux-red-teams.html
kill_chain_name: mitre-attack phase_name: credential-access
Windows
Adversaries may search for common password storage locations to obtain user credentials.(Citation: F-Secure The Dukes) Passwords are stored in several places on a system, depending on the operating system or application holding the credentials. There are also specific applications and services that store passwords to make them easier for users to manage and maintain, such as password managers and cloud secrets vaults. Once credentials are obtained, they can be used to perform lateral movement and access restricted information.
enterprise-attack
Credentials from Password Stores
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1555 external_id: T1555 source_name: F-Secure The Dukes description: F-Secure Labs. (2015, September 17). The Dukes: 7 years of Russian cyberespionage. Retrieved December 10, 2015. url: https://www.f-secure.com/documents/996508/1030745/dukes_whitepaper.pdf
kill_chain_name: mitre-attack phase_name: credential-access
Linux
Adversaries may use an existing, legitimate external Web service to exfiltrate data rather than their primary command and control channel. Popular Web services acting as an exfiltration mechanism may give a significant amount of cover due to the likelihood that hosts within a network are already communicating with them prior to compromise. Firewall rules may also already exist to permit traffic to these services. Web service providers also commonly use SSL/TLS encryption, giving adversaries an added level of protection.
enterprise-attack
Exfiltration Over Web Service
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1567 external_id: T1567
kill_chain_name: mitre-attack phase_name: exfiltration
Linux