prompt
stringclasses
508 values
procedure
stringlengths
20
478
Drive-by Compromise
It has infected victims by tricking them into visiting compromised watering hole websites.
Drive-by Compromise
It has used strategic web compromises, particularly of South Korean websites, to distribute malware. The group has also used torrent file-sharing sites to more indiscriminately disseminate malware to victims. As part of their compromises, the group has used a Javascript based profiler called RICECURRY to profile a victim's web browser and deliver malicious code accordingly.
Drive-by Compromise
It has conducted watering holes schemes to gain initial access to victims.
Drive-by Compromise
It has used watering hole attacks to gain access.
Drive-by Compromise
Bad Rabbit spread through watering holes on popular sites by injecting JavaScript into the HTML body or a .js file.
Drive-by Compromise
It compromised three Japanese websites using a Flash exploit to perform watering hole attacks.
Drive-by Compromise
Bundlore has been spread through malicious advertisements on websites.
Drive-by Compromise
During C0010, UNC3890 actors likely established a watering hole that was hosted on a login page of a legitimate Israeli shipping company that was active until at least November 2021.
Drive-by Compromise
It leveraged a watering hole to serve up malicious code.
Drive-by Compromise
It used embedded iframes on hotel login portals to redirect selected victims to download malware.
Drive-by Compromise
It has compromised targets via strategic web compromise (SWC) utilizing a custom exploit kit.
Drive-by Compromise
It has performed watering hole attacks.
Drive-by Compromise
It has delivered zero-day exploits and malware to victims by injecting malicious code into specific public Web pages visited by targets within a particular sector.
Drive-by Compromise
Grandoreiro has used compromised websites and Google Ads to bait victims into downloading its installer.
Drive-by Compromise
KARAE was distributed through torrent file-sharing websites to South Korean victims, using a YouTube video downloader application as a lure.
Drive-by Compromise
It delivered RATANKBA and other malicious code to victims via a compromised legitimate website.
Drive-by Compromise
It has infected victims using watering holes.
Drive-by Compromise
It has infected victims using watering holes.
Drive-by Compromise
LoudMiner is typically bundled with pirated copies of Virtual Studio Technology (VST) for Windows and macOS.
Drive-by Compromise
It has distributed It through a fake blog website.
Drive-by Compromise
It has conducted watering-hole attacks through media and magazine websites.
Drive-by Compromise
During Operation Dust Storm, the threat actors used a watering hole attack on a popular software reseller to exploit the then-zero-day Internet Explorer vulnerability CVE-2014-0322.
Drive-by Compromise
It has used watering holes to deliver files with exploits to initial victims.
Drive-by Compromise
It has sometimes used drive-by attacks against vulnerable browser plugins.
Drive-by Compromise
POORAIM has been delivered through compromised sites acting as watering holes.
Drive-by Compromise
It has used watering hole attacks to deliver malicious versions of legitimate installers.
Drive-by Compromise
REvil has infected victim machines through compromised websites and exploit kits.
Drive-by Compromise
It has distributed its malware via the RIG and SUNDOWN exploit kits, as well as online advertising network Yandex.Direct.
Drive-by Compromise
Snip3 has been delivered to targets via downloads from malicious domains.
Drive-by Compromise
It has extensively used strategic web compromises to target victims.
Drive-by Compromise
It has used websites with malicious hyperlinks and iframes to infect targeted victims with Crimson, njRAT, and other malicious tools.
Drive-by Compromise
It has infected victims using watering holes.
Drive-by Compromise
It has distributed Windows malware via drive-by downloads.
Drive-by Compromise
It has used compromised websites to register custom URL schemes on a remote system.
Exploit Public-Facing Application
It has used a variety of public exploits, including CVE 2020-0688 and CVE 2020-17144, to gain execution on vulnerable Microsoft Exchange; they have also conducted SQL injection attacks against external websites.
Exploit Public-Facing Application
It has exploited CVE-2019-19781 for Citrix, CVE-2019-11510 for Pulse Secure VPNs, CVE-2018-13379 for FortiGate VPNs, and CVE-2019-9670 in Zimbra software to gain access.
Exploit Public-Facing Application
It has used SQL injection for initial compromise.
Exploit Public-Facing Application
It exploited CVE-2020-10189 against Zoho ManageEngine Desktop Central, and CVE-2019-19781 to compromise Citrix Application Delivery Controllers (ADC) and gateway devices.
Exploit Public-Facing Application
It has been observed using SQL injection to gain access to systems.
Exploit Public-Facing Application
It has exploited CVE-2020-5902, an F5 BIP-IP vulnerability, to drop a Linux backdoor. It has also exploited mis-configured Plesk servers.
Exploit Public-Facing Application
It has exploited a buffer overflow vulnerability in Microsoft Internet Information Services (IIS) 6.0, CVE-2017-7269, in order to establish a new HTTP or command and control (C2) server.
Exploit Public-Facing Application
It has gained initial access by exploiting CVE-2019-18935, a vulnerability within Telerik UI for ASP.NET AJAX.
Exploit Public-Facing Application
During C0017, It exploited CVE-2021-44207 in the USAHerds application and CVE-2021-44228 in Log4j, as well as other .NET deserialization, SQL injection, and directory traversal vulnerabilities to gain initial access.
Exploit Public-Facing Application
During C0018, the threat actors exploited VMWare Horizon Unified Access Gateways that were vulnerable to several Log4Shell vulnerabilities, including CVE-2021-44228, CVE-2021-45046, CVE-2021-45105, and CVE-2021-44832.
Exploit Public-Facing Application
During C0027, It exploited CVE-2021-35464 in the ForgeRock Open Access Management (OpenAM) application server to gain initial access.
Exploit Public-Facing Application
It has conducted SQL injection attacks, exploited vulnerabilities CVE-2019-19781 and CVE-2020-0688 for Citrix and MS Exchange, and CVE-2018-13379 for Fortinet VPNs.
Exploit Public-Facing Application
It has compromised victims by directly exploiting vulnerabilities of public-facing servers, including those associated with Microsoft Exchange and Oracle GlassFish.
Exploit Public-Facing Application
It has exploited known vulnerabilities such as CVE-2017-1000486 (Primefaces Application Expression Language Injection), CVE-2015-7450 (WebSphere Application Server SOAP Deserialization Exploit), CVE-2010-5326 (SAP NewWeaver Invoker Servlet Exploit), and EDB-ID-24963 (SAP NetWeaver ConfigServlet Remote Code Execution) to gain initial access.
Exploit Public-Facing Application
It has exploited known vulnerabilities in Fortinet, PulseSecure, and Palo Alto VPN appliances.
Exploit Public-Facing Application
It exploited a publicly-facing servers including Wildfly/JBoss servers to gain access to the network.
Exploit Public-Facing Application
It has exploited Oracle WebLogic vulnerabilities for initial compromise.
Exploit Public-Facing Application
It has exploited CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065 to compromise on-premises versions of Microsoft Exchange Server, enabling access to email accounts and installation of additional malware.
Exploit Public-Facing Application
Havij is used to automate SQL injection.
Exploit Public-Facing Application
It has compromised networks by exploiting Internet-facing applications, including vulnerable Microsoft Exchange and SharePoint servers.
Exploit Public-Facing Application
It has exploited various vulnerabilities for initial access, including Microsoft Exchange vulnerability CVE-2020-0688.
Exploit Public-Facing Application
It has exploited the Log4j utility (CVE-2021-44228), on-premises MS Exchange servers via "ProxyShell" (CVE-2021-34473, CVE-2021-34523, CVE-2021-31207), and Fortios SSL VPNs (CVE-2018-13379).
Exploit Public-Facing Application
It has leveraged vulnerabilities in Pulse Secure VPNs to hijack sessions.
Exploit Public-Facing Application
It has exploited known vulnerabilities in public-facing infrastructure such as Microsoft Exchange Servers.
Exploit Public-Facing Application
It has exploited the Microsoft Exchange memory corruption vulnerability (CVE-2020-0688).
Exploit Public-Facing Application
During Night Dragon, threat actors used SQL injection exploits against extranet web servers to gain access.
Exploit Public-Facing Application
During Operation CuckooBees, the threat actors exploited multiple vulnerabilities in externally facing servers.
Exploit Public-Facing Application
During Operation Wocao, threat actors gained initial access by exploiting vulnerabilities in JBoss webservers.
Exploit Public-Facing Application
It exploited Apache Struts, Oracle WebLogic (CVE-2017-10271), and Adobe ColdFusion (CVE-2017-3066) vulnerabilities to deliver malware.
Exploit Public-Facing Application
Siloscape is executed after the attacker gains initial access to a Windows container using a known vulnerability.
Exploit Public-Facing Application
During the SolarWinds Compromise, It exploited CVE-2020-0688 against the Microsoft Exchange Control Panel to regain access to a network.
Exploit Public-Facing Application
SoreFang can gain access by exploiting a Sangfor SSL VPN vulnerability that allows for the placement and delivery of malicious update binaries.
Exploit Public-Facing Application
sqlmap can be used to automate exploitation of SQL injection vulnerabilities.
Exploit Public-Facing Application
It has exploited the Microsoft SharePoint vulnerability CVE-2019-0604 and CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065 in Exchange Server.
Exploit Public-Facing Application
It has targeted publicly facing web servers, with both automatic and manual vulnerability discovery.
Exploit Public-Facing Application
It gained initial access through exploitation of CVE-2021-40539 in internet-facing ManageEngine ADSelfService Plus servers.
Exploit Public-Facing Application
ZxShell has been dropped through exploitation of CVE-2011-2462, CVE-2013-3163, and CVE-2014-0322.
External Remote Services
During the 2015 Ukraine Electric Power Attack, It installed a modified Dropbear SSH client as the backdoor to target systems.
External Remote Services
It actors leverage legitimate credentials to log into external remote services.
External Remote Services
It has used Tor and a variety of commercial VPN services to route brute force authentication attempts.
External Remote Services
It has used compromised identities to access networks via VPNs and Citrix.
External Remote Services
It compromised an online billing/payment service using VPN access between a third-party service provider and the targeted payment service.
External Remote Services
During C0027, It used Citrix and VPNs to persist in compromised environments.
External Remote Services
It has used legitimate credentials to login to an external VPN, Citrix, SSH, and other remote services.
External Remote Services
During CostaRicto, the threat actors set up remote tunneling using an SSH tool to maintain access to a compromised environment.
External Remote Services
Doki was executed through an open Docker daemon API port.
External Remote Services
It has used VPNs and Outlook Web Access (OWA) to maintain access to victim networks.
External Remote Services
It has gained access to compromised environments via remote access services such as the corporate virtual private network (VPN).
External Remote Services
It has used legitimate VPN, Citrix, or VNC credentials to maintain access to a victim environment.
External Remote Services
It has used VPN services, including SoftEther VPN, to access and maintain persistence in victim environments.
External Remote Services
It has used publicly-accessible RDP and remote management and monitoring (RMM) servers to gain access to victim machines.
External Remote Services
Hildegard was executed through an unsecure kubelet that allowed anonymous access to the victim environment.
External Remote Services
It has gained access through VPNs including with compromised accounts and stolen VPN certificates.
External Remote Services
It has used RDP to establish persistence.
External Remote Services
Kinsing was executed in an Ubuntu container deployed via an open Docker daemon API.
External Remote Services
It has gained access to internet-facing systems and applications, including virtual private network (VPN), remote desktop protocol (RDP), and virtual desktop infrastructure (VDI) including Citrix.
External Remote Services
It has used external remote services such as virtual private networks (VPN) to gain initial access.
External Remote Services
Linux Rabbit attempts to gain access to the server via SSH.
External Remote Services
Mafalda can establish an SSH connection from a compromised host to a server.
External Remote Services
During Night Dragon, threat actors used compromised VPN accounts to gain access to victim systems.
External Remote Services
It uses remote services such as VPN, Citrix, or OWA to persist in an environment.
External Remote Services
During Operation CuckooBees, the threat actors enabled WinRM over HTTP/HTTPS as a backup persistence mechanism using the following command: cscript //nologo "C:\Windows\System32\winrm.vbs" set winrm/config/service@{EnableCompatibilityHttpsListener="true"}.
External Remote Services
During Operation Wocao, threat actors used stolen credentials to connect to the victim's network via VPN.
External Remote Services
It has used Dropbear SSH with a hardcoded backdoor password to maintain persistence within the target network. It has also used VPN tunnels established in legitimate software company infrastructure to gain access to internal networks of that software company's users.
External Remote Services
It has leveraged legitimate remote management tools to maintain persistent access.
External Remote Services
For the SolarWinds Compromise, It used compromised identities to access networks via SSH, VPNs, and other remote access tools.