id
stringlengths 5
9
| technique
stringlengths 3
43
| subtechniqueid
stringlengths 3
60
⌀ | sentences
stringlengths 1
871
|
---|---|---|---|
t1591.003
|
gather victim org information
|
identifyTechniquebusinessTechniquetempo
|
many times, organizations are overburdened, and cyberattacks during the holidays are the last thing on their minds. the current pandemic heightened the threat, which has resulted in many firms operating with significant cyber security flaws resulting from the rapid shift to working from home. cybercriminals exploit these flaws to get access to systems “ and vulnerabilities increase with less network supervision during the holidays.
|
t1591.003
|
gather victim org information
|
identifyTechniquebusinessTechniquetempo
|
once they had infected the computers of the personnel in charge of cash transfer systems or atms, the attackers collected snapshots of victims screens and studied their daily activities in the bank.
|
t1591.004
|
gather victim org information
|
identifyTechniqueroles
|
restoreprivacy, an information site about privacy, examined the proof the seller put out and found the following information, scraped from linkedin user profiles: email addresses, full names, phone numbers, physical addresses, linkedin username and profile url, personal and professional experience background.
|
t1591.004
|
gather victim org information
|
identifyTechniqueroles
|
targets are identified, groomed, and then deceived by quite sophisticated email techniques into wiring funds to 'burner' bank accounts, and thinking that the email request comes from the ceo, the victim willingly sends the money.
|
t1591.004
|
gather victim org information
|
identifyTechniqueroles
|
this threat group instructs its affiliates to parse companies websites and social media to identify leadership, hr, and accounting staff for following targeted spear phishing attacks.
|
t1591.004
|
gather victim org information
|
identifyTechniqueroles
|
some spam lists are selected to target a specific business role, for example identified sales representatives.
|
t1591.004
|
gather victim org information
|
identifyTechniqueroles
|
through reading the extracted emails, threat actors identified that fund transfers were originating in the accounting department by person a and approved by manager b.
|
t1592
|
gather victim host information
| null |
adversaries may gather information about the victims hosts that can be used during targeting
|
t1592
|
gather victim host information
| null |
citation threatconnect infrastructure dec 2020citation att scanbox much of this activity may have a very high occurrence and associated false positive rate as well as potentially taking place outside the visibility of the target organization making detection difficult for defenders
|
t1592
|
gather victim host information
| null |
detection efforts may be focused on related stages of the adversary lifecycle such as during initial access
|
t1592
|
gather victim host information
| null |
information about hosts may include a variety of details including administrative data ex name assigned ip functionality etc
|
t1592
|
gather victim host information
| null |
internet scan response content
|
t1592
|
gather victim host information
| null |
internet scanners may be used to look for patterns associated with malicious content designed to collect host information from visitors
|
t1592.001
|
gather victim host information
|
hardware
|
actors targeting poor countries pay attention to learn victims hardware, as it is often so old that does not support newer more secure operating systems.
|
t1592.001
|
gather victim host information
|
hardware
|
another door in for initial access are iot devices, and hackers are trying to learn the used hardware versions, as it is often produced to never be fully updated or secured.
|
t1592.001
|
gather victim host information
|
hardware
|
this group was using job postings, resumes, and public purchase invoices to determine the hardware used by the victim organization.
|
t1592.001
|
gather victim host information
|
hardware
|
after the attacker gathered information about the hardware used in the organization, they proceeded to register typosquatting domains mimicking these hardware manufacturers.
|
t1592.001
|
gather victim host information
|
hardware
|
this russian apt gathered information on the specific type of industrial controllers used by some ukrainian power transmission stations.
|
t1592.002
|
gather victim host information
|
software
|
sandworm team has researched software code to enable supply-chain operations most notably for the 2017 not petya attack. sandworm team also collected a list of computers using specific software as part of its targeting efforts.
|
t1592.002
|
gather victim host information
|
software
|
public procurement data such as purchase invoices for software allowed attackers to plan their exploitation for the initial access.
|
t1592.002
|
gather victim host information
|
software
|
andariel has inserted a malicious script within compromised websites to collect potential victim information such as browser type, system language, flash player version, and other data.
|
t1592.002
|
gather victim host information
|
software
|
some threat groups use supply chain compromise as an opportunistic attack on whomever is a client, others “ specifically research software suppliers for a given target.
|
t1592.002
|
gather victim host information
|
software
|
gathering information from server banners allows attackers to use known vulnerabilities for certain kinds of server software.
|
t1592.003
|
gather victim host information
|
firmware
|
intruders impersonated the ceo and demanded information on the age and patch level of the network appliances.
|
t1592.003
|
gather victim host information
|
firmware
|
while the problem with the firmware update level was outlined in the previous assessment report, the company failed to act on it, moreover the very assessment ended up in the hands of the threat actors.
|
t1592.003
|
gather victim host information
|
firmware
|
slow implementation of the firmware patch for this vulnerability became apparent to the attackers who started directing their botnets to target it.
|
t1592.003
|
gather victim host information
|
firmware
|
attackers did research on the backdoor in the standard router firmware in that country.
|
t1592.003
|
gather victim host information
|
firmware
|
this botnet handers gather information on the dominating types of iot firmware with known vulnerabilities.
|
t1592.004
|
gather victim host information
|
clientTechniqueconfigurations
|
hafnium has interacted with office 365 tenants to gather details regarding target's environments.
|
t1592.004
|
gather victim host information
|
clientTechniqueconfigurations
|
attackers website was checking visitors host information and serving the malicious content only to those with certain language settings.
|
t1592.004
|
gather victim host information
|
clientTechniqueconfigurations
|
this group was studying organizations purchase invoices to learn what operating systems are in use, their versions and architecture.
|
t1592.004
|
gather victim host information
|
clientTechniqueconfigurations
|
the scanbox framework first configures the remote c&c server that it will use and collects a small amount of information about the victim that is visiting the compromised website including: referer user-agent location cookie title to identify specific content that the victim is visiting domain charset screen width and height operating system language
|
t1592.004
|
gather victim host information
|
clientTechniqueconfigurations
|
the attackers were able to compromise the website and include code that loaded a malicious javascript file from a remote server that records visitors user-agent, location, charset, operating system, and language.
|
t1592.004
|
gather victim host information
|
clientTechniqueconfigurations
|
hackers were checking client configuration virtualization status and generally were trying to avoid targeting virtual machines.
|
t1593
|
search open websitesdomains
| null |
adversaries may search freely available websites andor domains for information about victims that can be used during targeting
|
t1593
|
search open websitesdomains
| null |
detection efforts may be focused on related stages of the adversary lifecycle such as during initial access
|
t1593
|
search open websitesdomains
| null |
information about victims may be available in various online sites such as social media new sites or those hosting information about business operations such as hiring or requestedawarded contracts
|
t1593
|
search open websitesdomains
| null |
much of this activity may have a very high occurrence and associated false positive rate as well as potentially taking place outside the visibility of the target organization making detection difficult for defenders
|
t1593.001
|
search open websitesdomains
|
socialTechniquemedia
|
kimsuky has used twitter to monitor potential victims and to prepare targeted phishing e-mails.
|
t1593.001
|
search open websitesdomains
|
socialTechniquemedia
|
hackers use social media observe activities by interns or new employees from targeted organizations and find relevant information using hashtags such as #newjob, #firstday, #internship, #firstdayatwork, etc.
|
t1593.001
|
search open websitesdomains
|
socialTechniquemedia
|
attackers analyzed company employees social media images to try to find information like internal office layouts, desktop applications, digital files, badge pictures, outlook calendars in the background of a quintessential coffee cup post, passwords openly written over whiteboards and desks, etc.
|
t1593.001
|
search open websitesdomains
|
socialTechniquemedia
|
a short video shared by an employee about a day in the office may provide the attackers with check-in procedures, building layout, parking structure, weak door controls, credentials, employees' dress code trappings, premise security arrangements, operating systems, antivirus choice, phone numbers, and much more.
|
t1593.001
|
search open websitesdomains
|
socialTechniquemedia
|
this group was identifying employees social media accounts and researching interpersonal connection to abuse it in the following spear phishing attacks.
|
t1593.002
|
search open websitesdomains
|
searchTechniqueengines
|
apt 31 used its own anonymization network to collect information on the victims website via search engine queries.
|
t1593.002
|
search open websitesdomains
|
searchTechniqueengines
|
file œcobaltstrike manual_v2 .docx encourage affiliates to search for the right victims based on income found using google dorks.
|
t1593.002
|
search open websitesdomains
|
searchTechniqueengines
|
the following google dork was used to detect vulnerable or hacked servers.
|
t1593.002
|
search open websitesdomains
|
searchTechniqueengines
|
attackers were able to collect plaintext passwords from a specially crafted google query looking for publicly exposed .env files.
|
t1593.002
|
search open websitesdomains
|
searchTechniqueengines
|
this group used search engine queries to inspect victim organization website for logfiles, spreadsheets, and other documents potentially exposing sensitive information.
|
t1594
|
search victim owned websites
| null |
adversaries may search websites owned by the victim for information that can be used during targeting
|
t1594
|
search victim owned websites
| null |
analyzing web metadata may also reveal artifacts that can be attributed to potentially malicious activity such as referer or user agent string https fields
|
t1594
|
search victim owned websites
| null |
application log application log content
|
t1594
|
search victim owned websites
| null |
monitor for suspicious network traffic that could be indicative of adversary reconnaissance such as rapid successions of requests indicative of web crawling andor large quantities of requests originating from a single source especially if the source is known to be associated with an adversary
|
t1594
|
search victim owned websites
| null |
victim owned websites may contain a variety of details including names of departmentsdivisions physical locations and data about key employees such as names roles and contact info ex email addressest1589
|
t1595
|
active scanning
| null |
active scans are those where the adversary probes victim infrastructure via network traffic as opposed to other forms of reconnaissance that do not involve direct interaction
|
t1595
|
active scanning
| null |
adversaries may execute active reconnaissance scans to gather information that can be used during targeting
|
t1595
|
active scanning
| null |
analyzing web metadata may also reveal artifacts that can be attributed to potentially malicious activity such as referer or user agent string https fields
|
t1595
|
active scanning
| null |
detection efforts may be focused on related stages of the adversary lifecycle such as during initial access
|
t1595
|
active scanning
| null |
monitor for suspicious network traffic that could be indicative of scanning such as large quantities originating from a single source especially if the source is known to be associated with an adversarybotnet
|
t1595
|
active scanning
| null |
much of this activity may have a very high occurrence and associated false positive rate as well as potentially taking place outside the visibility of the target organization making detection difficult for defenders
|
t1595
|
active scanning
| null |
network traffic network traffic flow network traffic network traffic content
|
t1595.001
|
active scanning
|
scanningTechniqueipTechniqueblocks
|
the adversaries were scanning victim ip blocks to gather information that can be used during targeting.
|
t1595.001
|
active scanning
|
scanningTechniqueipTechniqueblocks
|
after finding victims asns, attackers continued by scanning these net ranges to detect active ip addresses and open ports.
|
t1595.001
|
active scanning
|
scanningTechniqueipTechniqueblocks
|
one member of anonymous was sharing victims ip addresses, another “ was scanning them to reveal host software versions.
|
t1595.001
|
active scanning
|
scanningTechniqueipTechniqueblocks
|
this attacker was scanning companys ip space for any artifact he could find.
|
t1595.001
|
active scanning
|
scanningTechniqueipTechniqueblocks
|
first, the attacker was using simple pings icmp requests and responses to detect which targets ip addresses are actively in use.
|
t1595.002
|
active scanning
|
vulnerabilityTechniquescanning
|
apt28 has performed large-scale scans in an attempt to find vulnerable servers.
|
t1595.002
|
active scanning
|
vulnerabilityTechniquescanning
|
sandworm team has scanned network infrastructure for vulnerabilities as part of its operational planning.
|
t1595.002
|
active scanning
|
vulnerabilityTechniquescanning
|
volatile cedar has performed vulnerability scans of the target server.
|
t1595.002
|
active scanning
|
vulnerabilityTechniquescanning
|
first, this threat group would engage in vulnerability reconnaissance via application-specific vulnerability discovery and identifying vulnerable content management systems cms and cms components.
|
t1595.002
|
active scanning
|
vulnerabilityTechniquescanning
|
adversaries scan victims for vulnerabilities that can be used during targeting.
|
t1595.002
|
active scanning
|
vulnerabilityTechniquescanning
|
these scans may also include more broad attempts to gather victim host information that can be used to identify more commonly known, exploitable vulnerabilities.
|
t1595.002
|
active scanning
|
vulnerabilityTechniquescanning
|
vulnerability scans typically harvest running software and version numbers via server banners, listening ports, or other network artifacts.
|
t1595.002
|
active scanning
|
vulnerabilityTechniquescanning
|
vulnerability scans typically check if the configuration of a target host application ex: software and version potentially aligns with the target of a specific exploit the adversary may seek to use.
|
t1596
|
search open technical databases
| null |
adversaries may search freely available technical databases for information about victims that can be used during targeting
|
t1596
|
search open technical databases
| null |
detection efforts may be focused on related stages of the adversary lifecycle such as during initial access
|
t1596
|
search open technical databases
| null |
information about victims may be available in online databases and repositories such as registrations of domainscertificates as well as public collections of network dataartifacts gathered from traffic andor scans
|
t1596
|
search open technical databases
| null |
much of this activity may have a very high occurrence and associated false positive rate as well as potentially taking place outside the visibility of the target organization making detection difficult for defenders
|
t1596.001
|
search open technical databases
|
dnspassiveTechniquedns
|
threat actors search dns records to gather information about target hosts.
|
t1596.001
|
search open technical databases
|
dnspassiveTechniquedns
|
adversaries can use dns to discover subdomains.
|
t1596.001
|
search open technical databases
|
dnspassiveTechniquedns
|
threat actors can use dns misconfigurations for initial access.
|
t1596.001
|
search open technical databases
|
dnspassiveTechniquedns
|
threat actors can search central repositories of logged responses for information.
|
t1596.001
|
search open technical databases
|
dnspassiveTechniquedns
|
dns leaks can provide information about a domain to attackers.
|
t1596.001
|
search open technical databases
|
dnspassiveTechniquedns
|
adversaries use the dns information of mail servers as a pivot to attack.
|
t1596.002
|
search open technical databases
|
whois
|
kaseya has used a single ip address in a range to find the total size of the range.
|
t1596.002
|
search open technical databases
|
whois
|
domain names can be used to find ownership and contact information.
|
t1596.002
|
search open technical databases
|
whois
|
whois can be queried for assigned ip block and dns name.
|
t1596.002
|
search open technical databases
|
whois
|
kaseya has used active scanning for reconnaissance on networks, open ports, and services..
|
t1596.002
|
search open technical databases
|
whois
|
kaseya has used shodan to establish operational resources that can be exploited.
|
t1596.003
|
search open technical databases
|
digitalTechniquecertificates
|
threat actors use site certificates to gain intel about a target.
|
t1596.003
|
search open technical databases
|
digitalTechniquecertificates
|
threat actors often perform reconnaissance through data searching via digital certificates.
|
t1596.003
|
search open technical databases
|
digitalTechniquecertificates
|
threat actors check digital certificates for geolocation information to ascertain if a potential target is outwith their protected regions.
|
t1596.003
|
search open technical databases
|
digitalTechniquecertificates
|
certain cobaltstrike functionality allows the malware to check openly available digital security data to assist in reconnaissance.
|
t1596.003
|
search open technical databases
|
digitalTechniquecertificates
|
apt27 often checks digital certificates to consolidate and contribute to their information before launching an attack.
|
t1596.004
|
search open technical databases
|
cdns
|
adversaries use content delivery networks to discover centralized assets.
|
t1596.004
|
search open technical databases
|
cdns
|
threat actors can find leaked cdn content that may not have protections of other assets and can be exploited.
|
t1596.004
|
search open technical databases
|
cdns
|
cdns may incorrectly expose login portals on the internet.
|
t1596.004
|
search open technical databases
|
cdns
|
threat actors can use osint tools to scan open cdn repositories.
|
t1596.004
|
search open technical databases
|
cdns
|
attackers can use found assets to determine links to cdns.
|
t1596.005
|
search open technical databases
|
scanTechniquedatabases
|
adversaries can search public databases for active ip addresses, hostnames, open ports, certificates, and even server banners.
|
t1596.005
|
search open technical databases
|
scanTechniquedatabases
|
threat actors can use online resources and lookup tools to harvest information from these services.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.