id
stringlengths
5
9
technique
stringlengths
3
43
subtechniqueid
stringlengths
3
60
sentences
stringlengths
1
871
t1591.003
gather victim org information
identifyTechniquebusinessTechniquetempo
many times, organizations are overburdened, and cyberattacks during the holidays are the last thing on their minds. the current pandemic heightened the threat, which has resulted in many firms operating with significant cyber security flaws resulting from the rapid shift to working from home. cybercriminals exploit these flaws to get access to systems “ and vulnerabilities increase with less network supervision during the holidays.
t1591.003
gather victim org information
identifyTechniquebusinessTechniquetempo
once they had infected the computers of the personnel in charge of cash transfer systems or atms, the attackers collected snapshots of victims screens and studied their daily activities in the bank.
t1591.004
gather victim org information
identifyTechniqueroles
restoreprivacy, an information site about privacy, examined the proof the seller put out and found the following information, scraped from linkedin user profiles: email addresses, full names, phone numbers, physical addresses, linkedin username and profile url, personal and professional experience background.
t1591.004
gather victim org information
identifyTechniqueroles
targets are identified, groomed, and then deceived by quite sophisticated email techniques into wiring funds to 'burner' bank accounts, and thinking that the email request comes from the ceo, the victim willingly sends the money.
t1591.004
gather victim org information
identifyTechniqueroles
this threat group instructs its affiliates to parse companies websites and social media to identify leadership, hr, and accounting staff for following targeted spear phishing attacks.
t1591.004
gather victim org information
identifyTechniqueroles
some spam lists are selected to target a specific business role, for example identified sales representatives.
t1591.004
gather victim org information
identifyTechniqueroles
through reading the extracted emails, threat actors identified that fund transfers were originating in the accounting department by person a and approved by manager b.
t1592
gather victim host information
null
adversaries may gather information about the victims hosts that can be used during targeting
t1592
gather victim host information
null
citation threatconnect infrastructure dec 2020citation att scanbox much of this activity may have a very high occurrence and associated false positive rate as well as potentially taking place outside the visibility of the target organization making detection difficult for defenders
t1592
gather victim host information
null
detection efforts may be focused on related stages of the adversary lifecycle such as during initial access
t1592
gather victim host information
null
information about hosts may include a variety of details including administrative data ex name assigned ip functionality etc
t1592
gather victim host information
null
internet scan response content
t1592
gather victim host information
null
internet scanners may be used to look for patterns associated with malicious content designed to collect host information from visitors
t1592.001
gather victim host information
hardware
actors targeting poor countries pay attention to learn victims hardware, as it is often so old that does not support newer more secure operating systems.
t1592.001
gather victim host information
hardware
another door in for initial access are iot devices, and hackers are trying to learn the used hardware versions, as it is often produced to never be fully updated or secured.
t1592.001
gather victim host information
hardware
this group was using job postings, resumes, and public purchase invoices to determine the hardware used by the victim organization.
t1592.001
gather victim host information
hardware
after the attacker gathered information about the hardware used in the organization, they proceeded to register typosquatting domains mimicking these hardware manufacturers.
t1592.001
gather victim host information
hardware
this russian apt gathered information on the specific type of industrial controllers used by some ukrainian power transmission stations.
t1592.002
gather victim host information
software
sandworm team has researched software code to enable supply-chain operations most notably for the 2017 not petya attack. sandworm team also collected a list of computers using specific software as part of its targeting efforts.
t1592.002
gather victim host information
software
public procurement data such as purchase invoices for software allowed attackers to plan their exploitation for the initial access.
t1592.002
gather victim host information
software
andariel has inserted a malicious script within compromised websites to collect potential victim information such as browser type, system language, flash player version, and other data.
t1592.002
gather victim host information
software
some threat groups use supply chain compromise as an opportunistic attack on whomever is a client, others “ specifically research software suppliers for a given target.
t1592.002
gather victim host information
software
gathering information from server banners allows attackers to use known vulnerabilities for certain kinds of server software.
t1592.003
gather victim host information
firmware
intruders impersonated the ceo and demanded information on the age and patch level of the network appliances.
t1592.003
gather victim host information
firmware
while the problem with the firmware update level was outlined in the previous assessment report, the company failed to act on it, moreover the very assessment ended up in the hands of the threat actors.
t1592.003
gather victim host information
firmware
slow implementation of the firmware patch for this vulnerability became apparent to the attackers who started directing their botnets to target it.
t1592.003
gather victim host information
firmware
attackers did research on the backdoor in the standard router firmware in that country.
t1592.003
gather victim host information
firmware
this botnet handers gather information on the dominating types of iot firmware with known vulnerabilities.
t1592.004
gather victim host information
clientTechniqueconfigurations
hafnium has interacted with office 365 tenants to gather details regarding target's environments.
t1592.004
gather victim host information
clientTechniqueconfigurations
attackers website was checking visitors host information and serving the malicious content only to those with certain language settings.
t1592.004
gather victim host information
clientTechniqueconfigurations
this group was studying organizations purchase invoices to learn what operating systems are in use, their versions and architecture.
t1592.004
gather victim host information
clientTechniqueconfigurations
the scanbox framework first configures the remote c&c server that it will use and collects a small amount of information about the victim that is visiting the compromised website including: referer user-agent location cookie title to identify specific content that the victim is visiting domain charset screen width and height operating system language
t1592.004
gather victim host information
clientTechniqueconfigurations
the attackers were able to compromise the website and include code that loaded a malicious javascript file from a remote server that records visitors user-agent, location, charset, operating system, and language.
t1592.004
gather victim host information
clientTechniqueconfigurations
hackers were checking client configuration virtualization status and generally were trying to avoid targeting virtual machines.
t1593
search open websitesdomains
null
adversaries may search freely available websites andor domains for information about victims that can be used during targeting
t1593
search open websitesdomains
null
detection efforts may be focused on related stages of the adversary lifecycle such as during initial access
t1593
search open websitesdomains
null
information about victims may be available in various online sites such as social media new sites or those hosting information about business operations such as hiring or requestedawarded contracts
t1593
search open websitesdomains
null
much of this activity may have a very high occurrence and associated false positive rate as well as potentially taking place outside the visibility of the target organization making detection difficult for defenders
t1593.001
search open websitesdomains
socialTechniquemedia
kimsuky has used twitter to monitor potential victims and to prepare targeted phishing e-mails.
t1593.001
search open websitesdomains
socialTechniquemedia
hackers use social media observe activities by interns or new employees from targeted organizations and find relevant information using hashtags such as #newjob, #firstday, #internship, #firstdayatwork, etc.
t1593.001
search open websitesdomains
socialTechniquemedia
attackers analyzed company employees social media images to try to find information like internal office layouts, desktop applications, digital files, badge pictures, outlook calendars in the background of a quintessential coffee cup post, passwords openly written over whiteboards and desks, etc.
t1593.001
search open websitesdomains
socialTechniquemedia
a short video shared by an employee about a day in the office may provide the attackers with check-in procedures, building layout, parking structure, weak door controls, credentials, employees' dress code trappings, premise security arrangements, operating systems, antivirus choice, phone numbers, and much more.
t1593.001
search open websitesdomains
socialTechniquemedia
this group was identifying employees social media accounts and researching interpersonal connection to abuse it in the following spear phishing attacks.
t1593.002
search open websitesdomains
searchTechniqueengines
apt 31 used its own anonymization network to collect information on the victims website via search engine queries.
t1593.002
search open websitesdomains
searchTechniqueengines
file œcobaltstrike manual_v2 .docx encourage affiliates to search for the right victims based on income found using google dorks.
t1593.002
search open websitesdomains
searchTechniqueengines
the following google dork was used to detect vulnerable or hacked servers.
t1593.002
search open websitesdomains
searchTechniqueengines
attackers were able to collect plaintext passwords from a specially crafted google query looking for publicly exposed .env files.
t1593.002
search open websitesdomains
searchTechniqueengines
this group used search engine queries to inspect victim organization website for logfiles, spreadsheets, and other documents potentially exposing sensitive information.
t1594
search victim owned websites
null
adversaries may search websites owned by the victim for information that can be used during targeting
t1594
search victim owned websites
null
analyzing web metadata may also reveal artifacts that can be attributed to potentially malicious activity such as referer or user agent string https fields
t1594
search victim owned websites
null
application log application log content
t1594
search victim owned websites
null
monitor for suspicious network traffic that could be indicative of adversary reconnaissance such as rapid successions of requests indicative of web crawling andor large quantities of requests originating from a single source especially if the source is known to be associated with an adversary
t1594
search victim owned websites
null
victim owned websites may contain a variety of details including names of departmentsdivisions physical locations and data about key employees such as names roles and contact info ex email addressest1589
t1595
active scanning
null
active scans are those where the adversary probes victim infrastructure via network traffic as opposed to other forms of reconnaissance that do not involve direct interaction
t1595
active scanning
null
adversaries may execute active reconnaissance scans to gather information that can be used during targeting
t1595
active scanning
null
analyzing web metadata may also reveal artifacts that can be attributed to potentially malicious activity such as referer or user agent string https fields
t1595
active scanning
null
detection efforts may be focused on related stages of the adversary lifecycle such as during initial access
t1595
active scanning
null
monitor for suspicious network traffic that could be indicative of scanning such as large quantities originating from a single source especially if the source is known to be associated with an adversarybotnet
t1595
active scanning
null
much of this activity may have a very high occurrence and associated false positive rate as well as potentially taking place outside the visibility of the target organization making detection difficult for defenders
t1595
active scanning
null
network traffic network traffic flow network traffic network traffic content
t1595.001
active scanning
scanningTechniqueipTechniqueblocks
the adversaries were scanning victim ip blocks to gather information that can be used during targeting.
t1595.001
active scanning
scanningTechniqueipTechniqueblocks
after finding victims asns, attackers continued by scanning these net ranges to detect active ip addresses and open ports.
t1595.001
active scanning
scanningTechniqueipTechniqueblocks
one member of anonymous was sharing victims ip addresses, another “ was scanning them to reveal host software versions.
t1595.001
active scanning
scanningTechniqueipTechniqueblocks
this attacker was scanning companys ip space for any artifact he could find.
t1595.001
active scanning
scanningTechniqueipTechniqueblocks
first, the attacker was using simple pings icmp requests and responses to detect which targets ip addresses are actively in use.
t1595.002
active scanning
vulnerabilityTechniquescanning
apt28 has performed large-scale scans in an attempt to find vulnerable servers.
t1595.002
active scanning
vulnerabilityTechniquescanning
sandworm team has scanned network infrastructure for vulnerabilities as part of its operational planning.
t1595.002
active scanning
vulnerabilityTechniquescanning
volatile cedar has performed vulnerability scans of the target server.
t1595.002
active scanning
vulnerabilityTechniquescanning
first, this threat group would engage in vulnerability reconnaissance via application-specific vulnerability discovery and identifying vulnerable content management systems cms and cms components.
t1595.002
active scanning
vulnerabilityTechniquescanning
adversaries scan victims for vulnerabilities that can be used during targeting.
t1595.002
active scanning
vulnerabilityTechniquescanning
these scans may also include more broad attempts to gather victim host information that can be used to identify more commonly known, exploitable vulnerabilities.
t1595.002
active scanning
vulnerabilityTechniquescanning
vulnerability scans typically harvest running software and version numbers via server banners, listening ports, or other network artifacts.
t1595.002
active scanning
vulnerabilityTechniquescanning
vulnerability scans typically check if the configuration of a target host application ex: software and version potentially aligns with the target of a specific exploit the adversary may seek to use.
t1596
search open technical databases
null
adversaries may search freely available technical databases for information about victims that can be used during targeting
t1596
search open technical databases
null
detection efforts may be focused on related stages of the adversary lifecycle such as during initial access
t1596
search open technical databases
null
information about victims may be available in online databases and repositories such as registrations of domainscertificates as well as public collections of network dataartifacts gathered from traffic andor scans
t1596
search open technical databases
null
much of this activity may have a very high occurrence and associated false positive rate as well as potentially taking place outside the visibility of the target organization making detection difficult for defenders
t1596.001
search open technical databases
dnspassiveTechniquedns
threat actors search dns records to gather information about target hosts.
t1596.001
search open technical databases
dnspassiveTechniquedns
adversaries can use dns to discover subdomains.
t1596.001
search open technical databases
dnspassiveTechniquedns
threat actors can use dns misconfigurations for initial access.
t1596.001
search open technical databases
dnspassiveTechniquedns
threat actors can search central repositories of logged responses for information.
t1596.001
search open technical databases
dnspassiveTechniquedns
dns leaks can provide information about a domain to attackers.
t1596.001
search open technical databases
dnspassiveTechniquedns
adversaries use the dns information of mail servers as a pivot to attack.
t1596.002
search open technical databases
whois
kaseya has used a single ip address in a range to find the total size of the range.
t1596.002
search open technical databases
whois
domain names can be used to find ownership and contact information.
t1596.002
search open technical databases
whois
whois can be queried for assigned ip block and dns name.
t1596.002
search open technical databases
whois
kaseya has used active scanning for reconnaissance on networks, open ports, and services..
t1596.002
search open technical databases
whois
kaseya has used shodan to establish operational resources that can be exploited.
t1596.003
search open technical databases
digitalTechniquecertificates
threat actors use site certificates to gain intel about a target.
t1596.003
search open technical databases
digitalTechniquecertificates
threat actors often perform reconnaissance through data searching via digital certificates.
t1596.003
search open technical databases
digitalTechniquecertificates
threat actors check digital certificates for geolocation information to ascertain if a potential target is outwith their protected regions.
t1596.003
search open technical databases
digitalTechniquecertificates
certain cobaltstrike functionality allows the malware to check openly available digital security data to assist in reconnaissance.
t1596.003
search open technical databases
digitalTechniquecertificates
apt27 often checks digital certificates to consolidate and contribute to their information before launching an attack.
t1596.004
search open technical databases
cdns
adversaries use content delivery networks to discover centralized assets.
t1596.004
search open technical databases
cdns
threat actors can find leaked cdn content that may not have protections of other assets and can be exploited.
t1596.004
search open technical databases
cdns
cdns may incorrectly expose login portals on the internet.
t1596.004
search open technical databases
cdns
threat actors can use osint tools to scan open cdn repositories.
t1596.004
search open technical databases
cdns
attackers can use found assets to determine links to cdns.
t1596.005
search open technical databases
scanTechniquedatabases
adversaries can search public databases for active ip addresses, hostnames, open ports, certificates, and even server banners.
t1596.005
search open technical databases
scanTechniquedatabases
threat actors can use online resources and lookup tools to harvest information from these services.