value
stringlengths
25
18k
subtecnique
int64
0
1
answer
stringclasses
2 values
id
stringlengths
5
9
name
stringlengths
3
102
Install persistence through rc.d services: rc.d (/etc/rc.d/init.d/linux_kill).
1
accept
T1037.004
Boot or Logon Initialization Scripts: Rc Scripts
Backwards compatibility on Ubuntu allowed attackers to achieve persistence via RC scripts.
1
accept
T1037.004
Boot or Logon Initialization Scripts: Rc Scripts
As the malware tries to achieve persistence, Hatching Triage analysis reports suspicious behavior: “Modifies rc script.”
1
accept
T1037.004
Boot or Logon Initialization Scripts: Rc Scripts
APT41 has configured payloads to load via LD_PRELOAD.
1
accept
T1574.006
Hijack Execution Flow: Dynamic Linker Hijacking
Ebury has injected its dynamic library into descendent processes of sshd via LD_PRELOAD.
1
accept
T1574.006
Hijack Execution Flow: Dynamic Linker Hijacking
HiddenWasp adds itself as a shared object to the LD_PRELOAD environment variable.
1
accept
T1574.006
Hijack Execution Flow: Dynamic Linker Hijacking
Hildegard has modified /etc/ld.so.preload to intercept shared library import functions.
1
accept
T1574.006
Hijack Execution Flow: Dynamic Linker Hijacking
Rocke has modified /etc/ld.so.preload to hook libc functions in order to hide the installed dropper and mining software in process lists.
1
accept
T1574.006
Hijack Execution Flow: Dynamic Linker Hijacking
APT32 has used JavaScript for drive-by downloads and C2 communications.
1
accept
T1059.007
Command and Scripting Interpreter: Javascript
Astaroth uses JavaScript to perform its core functionalities.
1
accept
T1059.007
Command and Scripting Interpreter: Javascript
Bundlore can execute JavaScript by injecting it into the victim's browser.
1
accept
T1059.007
Command and Scripting Interpreter: Javascript
Cobalt Group has executed JavaScript scriptlets on the victim's machine.
1
accept
T1059.007
Command and Scripting Interpreter: Javascript
The Cobalt Strike System Profiler can use JavaScript to perform reconnaissance actions.
1
accept
T1059.007
Command and Scripting Interpreter: Javascript
Evilnum has used malicious JavaScript files on the victim's machine.
1
accept
T1059.007
Command and Scripting Interpreter: Javascript
FIN6 has used malicious JavaScript to steal payment card data from e-commerce sites.
1
accept
T1059.007
Command and Scripting Interpreter: Javascript
FIN7 used JavaScript scripts to help perform tasks on the victim's machine. ;; GRIFFON is written in and executed as JavaScript. ;; Higaisa used JavaScript to execute additional files. ;; InvisiMole can use a JavaScript file as part of its execution chain. ;; jRAT has been distributed as HTA files with JScript. ;; Kimsuky has used JScript for logging and downloading additional tools. ;; Leafminer infected victims using JavaScript code. ;; Metamorfo includes payloads written in JavaScript. ;; ;;Molerats used various implants including those built with JS on target machines. ;; MuddyWater has used JavaScript files to execute its POWERSTATS payload. ;; NanHaiShu executes additional Jscript code on the victim's machine. ;; POWERSTATS can use JavaScript code for execution. ;; Sidewinder has used JavaScript to drop and execute malware loaders. ;; Silence has used JS scripts. ;; TA505 has used JavaScript for code execution. ;; Turla has used various JavaScript-based backdoors. ;; Valak can execute JavaScript containing configuration data for establishing persistence.
1
accept
T1059.007
Command and Scripting Interpreter: Javascript
Silent Librarian has cloned victim organization login pages and staged them for later use in credential harvesting campaigns. Silent Librarian has also made use of a variety of URL shorteners for these staged websites.
1
accept
T1608.005
Stage Capabilities: Link Target
The attackers prepared over 39,000 phishing pages mimicking the four platforms' login pages.
1
accept
T1608.005
Stage Capabilities: Link Target
They used Ngrok’s paid option to acquire customized phishing URLs displaying Meta’s trademarks (such as hxxp://facebook[.]in[.]ngrok[.]io/).
1
accept
T1608.005
Stage Capabilities: Link Target
Prior to the attack, they registered typosquatted domains, set up phishing pages and employed URL shortener service.
1
accept
T1608.005
Stage Capabilities: Link Target
The attacker placed archived malicious Office Documents at the link target.
1
accept
T1608.005
Stage Capabilities: Link Target
APT32 has stood up websites containing numerous articles and content scraped from the Internet to make them appear legitimate but some of these pages include malicious JavaScript to profile the potential victim or infect them via a fake software update.
1
accept
T1608.004
Stage Capabilities: Drive
Threat Group-3390 has embedded malicious code into websites to screen a potential victim's IP address and then exploit their browser if they are of interest.
1
accept
T1608.004
Stage Capabilities: Drive
The attackers prepared an malvertizing: an ad combined of image and a JavaScript, which contained malicious code, and pushed it to legitimate websites via ad networks.
1
accept
T1608.004
Stage Capabilities: Drive
Second stage of the Magecart attack included injecting malicious Javascript on the vulnerable checkout pages.
1
accept
T1608.004
Stage Capabilities: Drive
This APT group was looking to compromise industry’s online publications to prepare for watering whole attacks.
1
accept
T1608.004
Stage Capabilities: Drive
Adversaries created self-signed certificates and installed them on their web servers.
1
accept
T1608.003
Stage Capabilities: Install Digital Certificate
Attackers installed Let’s Encrypt certificates on their phishing servers to gain additional trust from the visitors.
1
accept
T1608.003
Stage Capabilities: Install Digital Certificate
They prepare phishing pages with valid SSL/TLS certificates installed.
1
accept
T1608.003
Stage Capabilities: Install Digital Certificate
According to PhishLabs, in the last quarter of 2019, 74% of reported phishing websites were 'secure,' being both HTTPS and with the lock symbol, meaning cybercriminals installed SSL certificates and circumvented so-called verification processes.
1
accept
T1608.003
Stage Capabilities: Install Digital Certificate
Actors installed SSL certificates they made using OpenSSL (where you can even be your own Certificate Authority).
1
accept
T1608.003
Stage Capabilities: Install Digital Certificate
Threat Group-3390 has staged tools including gsecdump and WCE on previously compromised websites.
1
accept
T1608.002
Stage Capabilities: Upload Tool
Prior to the attack, the adversaries uploaded remote administration tools to compromised websites they controlled.
1
accept
T1608.002
Stage Capabilities: Upload Tool
Threat actor placed several double-purpose tools on his GitHub repository.
1
accept
T1608.002
Stage Capabilities: Upload Tool
The attackers uploaded Remote Utilities RAT tool to a third-party compromised website to be used if the victim environment won’t have a remote administration tool installed.
1
accept
T1608.002
Stage Capabilities: Upload Tool
FIN5 staged a customized version of PsExec.
1
accept
T1608.002
Stage Capabilities: Upload Tool
APT32 has hosted malicious payloads in Dropbox Amazon S3 and Google Drive for use during targeting.
1
accept
T1608.001
Stage Capabilities: Upload Malware
They were posting obfuscated malicious payloads on Pastebin to be used later during the attack.
1
accept
T1608.001
Stage Capabilities: Upload Malware
Some of the compromised websites were used to stage post-compromise malware such as keyloggers.
1
accept
T1608.001
Stage Capabilities: Upload Malware
These government hackers staged malicious Java scripts on the Microsoft typosquatted domains they registered earlier.
1
accept
T1608.001
Stage Capabilities: Upload Malware
Gamaredon stage malicious VBA scripts on various compromised websites.
1
accept
T1608.001
Stage Capabilities: Upload Malware
APT41 has used search order hijacking to execute malicious payloads such as Winnti RAT.
1
accept
T1574.001
Hijack Execution Flow: Dll Search Order Hijacking
Astaroth can launch itself via DLL Search Order Hijacking.
1
accept
T1574.001
Hijack Execution Flow: Dll Search Order Hijacking
BOOSTWRITE has exploited the loading of the legitimate Dwrite.dll file by actually loading the gdi library which then loads the gdiplus library and ultimately loads the local Dwrite dll.
1
accept
T1574.001
Hijack Execution Flow: Dll Search Order Hijacking
Crutch can persist via DLL search order hijacking on Google Chrome Mozilla Firefox or Microsoft OneDrive.
1
accept
T1574.001
Hijack Execution Flow: Dll Search Order Hijacking
Downdelph uses search order hijacking of the Windows executable sysprep.exe to escalate privileges.
1
accept
T1574.001
Hijack Execution Flow: Dll Search Order Hijacking
Empire contains modules that can discover and exploit various DLL hijacking opportunities.
1
accept
T1574.001
Hijack Execution Flow: Dll Search Order Hijacking
Evilnum has used the malware variant TerraTV to load a malicious DLL placed in the TeamViewer directory instead of the original Windows DLL located in a system folder.
1
accept
T1574.001
Hijack Execution Flow: Dll Search Order Hijacking
A FinFisher variant uses DLL search order hijacking. ;; Hikit has used DLL Search Order Hijacking to load oci.dll as a persistence mechanism. ;; HTTPBrowser abuses the Windows DLL load order by using a legitimate Symantec anti-virus binary VPDN_LU.exe to load a malicious DLL that mimics a legitimate Symantec DLL navlu.dll. ;; InvisiMole can be launched by using DLL search order hijacking in which the wrapper DLL is placed in the same folder as explorer.exe and loaded during startup into the Windows Explorer process instead of the legitimate library. ;; Melcoz can use DLL hijacking to bypass security controls. ;; menuPass has used DLL search order hijacking. ;; MirageFox is likely loaded via DLL hijacking into a legitimate McAfee binary. ;; PowerSploit contains a collection of Privesc-PowerUp modules that can discover and exploit DLL hijacking opportunities in services and processes. ;; Prikormka uses DLL search order hijacking for persistence by saving itself as ntshrui.dll to the Windows directory so it will load before the legitimate ntshrui.dll saved in the System32 subdirectory. ;; Ramsay can hijack outdated Windows application dependencies with malicious versions of its own DLL payload. ;; RedLeaves is launched through use of DLL search order hijacking to load a malicious dll. ;; RTM has used search order hijacking to force TeamViewer to load a malicious DLL. ;; Threat Group-3390 has performed DLL search order hijacking to execute their payload. ;; Variants of WEBC2 achieve persistence by using DLL search order hijacking usually by copying the DLL file to %SYSTEMROOT% (C:\WINDOWS\ntshrui.dll). ;; Whitefly has used search order hijacking to run the loader Vcrodat.
1
accept
T1574.001
Hijack Execution Flow: Dll Search Order Hijacking
APT19 launched an HTTP malware variant and a Port 22 malware variant using a legitimate executable that loaded the malicious DLL.
1
accept
T1574.002
Hijack Execution Flow: Dll Side
APT3 has been known to side load DLLs with a valid version of Chrome with one of their tools.
1
accept
T1574.002
Hijack Execution Flow: Dll Side
APT32 ran legitimately-signed executables from Symantec and McAfee which load a malicious DLL. The group also side-loads its backdoor by dropping a library and a legitimate signed executable (AcroTranscoder).
1
accept
T1574.002
Hijack Execution Flow: Dll Side
APT41 used legitimate executables to perform DLL side-loading of their malware.
1
accept
T1574.002
Hijack Execution Flow: Dll Side
BADNEWS typically loads its DLL file into a legitimate signed Java or VMware executable.
1
accept
T1574.002
Hijack Execution Flow: Dll Side
DLL side-loading has been used to execute BBSRAT through a legitimate Citrix executable ssonsvr.exe. The Citrix executable was dropped along with BBSRAT by the dropper.
1
accept
T1574.002
Hijack Execution Flow: Dll Side
BlackTech has used DLL side loading by giving DLLs hardcoded names and placing them in searched directories.
1
accept
T1574.002
Hijack Execution Flow: Dll Side
BRONZE BUTLER has used legitimate applications to side-load malicious DLLs. ;; Chimera has used side loading to place malicious DLLs in memory. ;; Denis exploits a security vulnerability to load a fake DLL and execute its code. ;; Egregor has used DLL side-loading to execute its payload. ;; FinFisher uses DLL side-loading to load malicious programs. ;; GALLIUM used DLL side-loading to covertly load PoisonIvy into memory on the victim machine. ;; A gh0st RAT variant has used DLL side-loading. ;; Goopy has the ability to side-load malicious DLLs with legitimate applications from Kaspersky Microsoft and Google. ;; Higaisa’s JavaScript file used a legitimate Microsoft Office 2007 package to side-load the OINFO12.OCX dynamic link library. ;; HTTPBrowser has used DLL side-loading. ;; HyperBro has used a legitimate application to sideload a DLL to decrypt decompress and run a payload. ;; Javali can use DLL side-loading to load malicious DLLs into legitimate executables. ;; LookBack side loads its communications module as a DLL into the libcurl.dll loader. ;; menuPass has used DLL side-loading to launch versions of Mimikatz and PwDump6 as well as UPPERCUT. ;; Metamorfo has side-loaded its malicious DLL file. ;; Mustang Panda has used a legitimately signed executable to execute a malicious payload within a DLL file. ;; Naikon has used DLL side-loading to load malicious DLL's into legitimate executables. ;; OwaAuth has been loaded onto Exchange servers and disguised as an ISAPI filter (DLL file). The IIS w3wp.exe process then loads the malicious DLL. ;; A Patchwork .dll that contains BADNEWS is loaded and executed using DLL side-loading. ;; PlugX has used DLL side-loading to evade anti-virus. ;; Sakula uses DLL side-loading typically using a digitally signed sample of Kaspersky Anti-Virus (AV) 6.0 for Windows Workstations or McAfee's Outlook Scan About Box to load malicious DLL files. ;; Sidewinder has used DLL side-loading to drop and execute malicious payloads including the hijacking of the legitimate Windows application file rekeywiz.exe. ;; During the T9000 installation process it drops a copy of the legitimate Microsoft binary igfxtray.exe. The executable contains a side-loading weakness which is used to load a portion of the malware. ;; Threat Group-3390 has used DLL side-loading including by using legitimate Kaspersky antivirus variants in which the DLL acts as a stub loader that loads and executes the shell code. ;; Tropic Trooper has been known to side-load DLLs using a valid version of a Windows Address Book and Windows Defender executable with one of their tools. ;; Waterbear has used DLL side loading to import and load a malicious DLL loader. ;; Wingbird side loads a malicious file sspisrv.dll in part of a spoofed lssas.exe service. ;; ZeroT has used DLL side-loading to load malicious payloads.
1
accept
T1574.002
Hijack Execution Flow: Dll Side
APT39 has used malware to turn off the RequireSigned feature which ensures only signed DLLs can be run on Windows.
1
accept
T1553.006
Subvert Trust Controls: Code Signing Policy Modification
BlackEnergy has enabled the TESTSIGNING boot configuration option to facilitate loading of a driver component.
1
accept
T1553.006
Subvert Trust Controls: Code Signing Policy Modification
Hikit has attempted to disable driver signing verification by tampering with several Registry keys prior to the loading of a rootkit driver component.
1
accept
T1553.006
Subvert Trust Controls: Code Signing Policy Modification
Turla has modified variables in kernel memory to turn off Driver Signature Enforcement after exploiting vulnerabilities that obtained kernel mode privileges.
1
accept
T1553.006
Subvert Trust Controls: Code Signing Policy Modification
ESPecter patches Windows kernel function SepInitializeCodeIntegrity directly in memory to disable Driver Signature Enforcement (DSE).
1
accept
T1553.006
Subvert Trust Controls: Code Signing Policy Modification
APT38 has prepended a space to all of their terminal commands to operate without leaving traces in the HISTCONTROL environment.
1
accept
T1562.003
Impair Defenses: Impair Command History Logging
Attackers set SaveNothing option for PSReadLine to turn off logging PowerShell command history.
1
accept
T1562.003
Impair Defenses: Impair Command History Logging
Threat actors set the command history size to zero (export HISTFILESIZE=0) to prevent logging of commands.
1
accept
T1562.003
Impair Defenses: Impair Command History Logging
Prior to executing PowerShell commands, attackers meddled with PSReadLine module to disable logging.
1
accept
T1562.003
Impair Defenses: Impair Command History Logging
After getting the initial access to the Windows Server, hackers changed PSReadLine logging destination to confuse incident responders.
1
accept
T1562.003
Impair Defenses: Impair Command History Logging
APT-C-36 has disguised its scheduled tasks as those used by Google.
1
accept
T1036.004
Masquerading: Masquerade Task Or Service
APT29 named tasks \Microsoft\Windows\SoftwareProtectionPlatform\EventCacheManager in order to appear legitimate.
1
accept
T1036.004
Masquerading: Masquerade Task Or Service
APT32 has used hidden or non-printing characters to help masquerade service names such as appending a Unicode no-break space character to a legitimate service name. APT32 has also impersonated the legitimate Flash installer file name install_flashplayer.exe".
1
accept
T1036.004
Masquerading: Masquerade Task Or Service
Attor's dispatcher disguises itself as a legitimate task (i.e. the task name and description appear legitimate).
1
accept
T1036.004
Masquerading: Masquerade Task Or Service
Bazar can create a task named to appear benign.
1
accept
T1036.004
Masquerading: Masquerade Task Or Service
build_downer has added itself to the Registry Run key as "NVIDIA" to appear legitimate.
1
accept
T1036.004
Masquerading: Masquerade Task Or Service
Carbanak has copied legitimate service names to use for malicious services.
1
accept
T1036.004
Masquerading: Masquerade Task Or Service
Catchamas adds a new service named NetAdapter in an apparent attempt to masquerade as a legitimate service. ;; ComRAT has used a task name associated with Windows SQM Consolidator. ;; Crutch has established persistence with a scheduled task impersonating the Outlook item finder. ;; CSPY Downloader has attempted to appear as a legitimate Windows service with a fake description claiming it is used to support packed applications. ;; Egregor has masqueraded the svchost.exe process to exfiltrate data. ;; The Exaramel for Windows dropper creates and starts a Windows service named wsmprovav with the description “Windows Check AV” in an apparent attempt to masquerade as a legitimate service. ;; FIN6 has renamed the "psexec" service name to "mstdc" to masquerade as a legitimate Windows service. ;; FIN7 has created a scheduled task named “AdobeFlashSync” to establish persistence. ;; Fox Kitten has named the task for a reverse proxy lpupdate to appear legitimate. ;; Fysbis has masqueraded as the rsyncd and dbus-inotifier services. ;; GoldMax has impersonated systems management software to avoid detection. ;; Higaisa named a shellcode loader binary svchast.exe to spoof the legitimate svchost.exe. ;; InnaputRAT variants have attempted to appear legitimate by adding a new service named OfficeUpdateService. ;; InvisiMole has attempted to disguise itself by registering under a seemingly legitimate service name. ;; IronNetInjector has been disguised as a legitimate service using the name PythonUpdateSrvc. ;; Kimsuky has disguised services to appear as benign software or related to operating system functions. ;; Kwampirs establishes persistence by adding a new service with the display name "WMI Performance Adapter Extension" in an attempt to masquerade as a legitimate WMI service. ;; A Lazarus Group custom backdoor implant included a custom PE loader named "Security Package" that was added into the lsass.exe process via registry key. ;; Machete renamed task names to masquerade as legitimate Google Chrome Java Dropbox Adobe Reader and Python tasks. ;; Maze operators have created scheduled tasks masquerading as "Windows Update Security" "Windows Update Security Patches" and "Google Chrome Security Update" designed to launch the ransomware. ;; Nidiran can create a new service named msamger (Microsoft Security Accounts Manager) which mimics the legitimate Microsoft database by the same name. ;; Okrum can establish persistence by adding a new service NtmsSvc with the display name Removable Storage to masquerade as a legitimate Removable Storage Manager. ;; OSX_OCEANLOTUS.D has disguised its app bundle by adding special characters to the filename and using the icon for legitimate Word documents. ;; In one instance menuPass added PlugX as a service with a display name of "Corel Writing Tools Utility." ;; POWERSTATS has created a scheduled task named "MicrosoftEdge" to establish persistence. ;; PROMETHIUM has named services to appear legitimate. ;; New services created by RawPOS are made to appear like legitimate Windows services with names such as "Windows Management Help Service" "Microsoft Support" and "Windows Advanced Task Manager". ;; RDAT has used Windows Video Service as a name for malicious services. ;; RTM has named the scheduled task it creates "Windows Update". ;; Seasalt has masqueraded as a service called "SaSaut" with a display name of "System Authorization Service" in an apparent attempt to masquerade as a legitimate service. ;; Shamoon creates a new service named “ntssrv” that attempts to appear legitimate; the service's display name is “Microsoft Network Realtime Inspection Service” and its description is “Helps guard against time change attempts targeting known and newly discovered vulnerabilities in network time protocols.” Newer versions create the "MaintenaceSrv" service which misspells the word "maintenance." ;; ShimRat can impersonate Windows services and antivirus products to avoid detection on compromised systems. ;; SLOTHFULMEDIA has named a service it establishes on victim machines as "TaskFrame" to hide its malicious purpose. ;; StrongPity has named services to appear legitimate. ;; To establish persistence Truvasys adds a Registry Run key with a value "TaskMgr" in an attempt to masquerade as the legitimate Windows Task Manager. ;; UNC2452 named tasks \Microsoft\Windows\SoftwareProtectionPlatform\EventCacheManager in order to appear legitimate. ;; Some Volgmer variants add new services with display names generated by a list of hard-coded strings such as Application Background Security and Windows presumably as a way to masquerade as a legitimate service. ;; Wizard Spider has used scheduled tasks to install TrickBot using task names to appear legitimate such as WinDotNet GoogleTask or Sysnetsf. It has also used common document file names for other malware binaries. ;; ZIRCONIUM has created a run key named Dropbox Update Setup to mask a persistence mechanism for a malicious binary."
1
accept
T1036.004
Masquerading: Masquerade Task Or Service
APT29 leveraged privileged accounts to replicate directory service data with domain controllers.
1
accept
T1003.006
OS Credential Dumping: Dcsync
Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways including from DCSync/NetSync.
1
accept
T1003.006
OS Credential Dumping: Dcsync
Operation Wocao has used Mimikatz's DCSync to dump credentials from the memory of the targeted system.
1
accept
T1003.006
OS Credential Dumping: Dcsync
UNC2452 leveraged privileged accounts to replicate directory service data with domain controllers.
1
accept
T1003.006
OS Credential Dumping: Dcsync
The attacker discovered domain controllers (DCs) and submitted a replication request. This prompted the primary DC to replicate the credentials of other DCs back to the compromised domain administrator, using the Directory Replication Service (DRS) remote protocol.
1
accept
T1003.006
OS Credential Dumping: Dcsync
APT33 has used a variety of publicly available tools like LaZagne to gather credentials.
1
accept
T1003.004
OS Credential Dumping: Lsa Secrets
CosmicDuke collects LSA secrets.
1
accept
T1003.004
OS Credential Dumping: Lsa Secrets
CrackMapExec can dump hashed passwords from LSA secrets for the targeted system.
1
accept
T1003.004
OS Credential Dumping: Lsa Secrets
Dragonfly 2.0 dropped and executed SecretsDump to dump password hashes.
1
accept
T1003.004
OS Credential Dumping: Lsa Secrets
gsecdump can dump LSA secrets.
1
accept
T1003.004
OS Credential Dumping: Lsa Secrets
SecretsDump and Mimikatz modules within Impacket can perform credential dumping to obtain account and password information.
1
accept
T1003.004
OS Credential Dumping: Lsa Secrets
Ke3chang has dumped credentials including by using gsecdump.
1
accept
T1003.004
OS Credential Dumping: Lsa Secrets
LaZagne can perform credential dumping from LSA secrets to obtain account and password information. ;; Leafminer used several tools for retrieving login and password information including LaZagne. ;; menuPass has used a modified version of pentesting tools wmiexec.vbs and secretsdump.py to dump credentials. ;; Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways including from the LSA. ;; MuddyWater has performed credential dumping with LaZagne. ;; OilRig has used credential dumping tools such as LaZagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access. ;; Pupy can use Lazagne for harvesting credentials. ;; Threat Group-3390 actors have used gsecdump to dump credentials. They have also dumped credentials from domain controllers.
1
accept
T1003.004
OS Credential Dumping: Lsa Secrets
APT28 has used a brute-force/password-spray tooling that operated in two modes: in brute-force mode it typically sent over 300 authentication attempts per hour per targeted account over the course of several hours or days.
1
accept
T1110.001
Brute Force: Password Guessing
China Chopper's server component can perform brute force password guessing against authentication portals.
1
accept
T1110.001
Brute Force: Password Guessing
CrackMapExec can brute force passwords for a specified user on a single target system or across an entire network.
1
accept
T1110.001
Brute Force: Password Guessing
Emotet has been observed using a hard coded list of passwords to brute force user accounts.
1
accept
T1110.001
Brute Force: Password Guessing
Lucifer has attempted to brute force TCP ports 135 (RPC) and 1433 (MSSQL) with the default username or list of usernames and passwords.
1
accept
T1110.001
Brute Force: Password Guessing
P.A.S. Webshell can use predefined users and passwords to execute brute force attacks against SSH FTP POP3 MySQL MSSQL and PostgreSQL services.
1
accept
T1110.001
Brute Force: Password Guessing
Pony has used a small dictionary of common passwords against a collected list of local accounts.
1
accept
T1110.001
Brute Force: Password Guessing
SpeakUp can perform brute forcing using a pre-defined list of usernames and passwords in an attempt to log in to administrative panels. ;; Xbash can obtain a list of weak passwords from the C2 server to use for brute forcing as well as attempt to brute force services with open ports.
1
accept
T1110.001
Brute Force: Password Guessing
Cleaver has used custom tools to facilitate ARP cache poisoning.
1
accept
T1557.002
Man
Iran’s cyber hacking skills have evolved to include customized private tools with ARP poisoning function.
1
accept
T1557.002
Man
Alireza’s C++ tools include the following techniques: • ARP poisoning
1
accept
T1557.002
Man
Jasus is an ARP cache poisoner developed by the Operation Cleaver team.
1
accept
T1557.002
Man