prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Drive-by Compromise | It has infected victims by tricking them into visiting compromised watering hole websites. |
Drive-by Compromise | It has used strategic web compromises, particularly of South Korean websites, to distribute malware. The group has also used torrent file-sharing sites to more indiscriminately disseminate malware to victims. As part of their compromises, the group has used a Javascript based profiler called RICECURRY to profile a victim's web browser and deliver malicious code accordingly. |
Drive-by Compromise | It has conducted watering holes schemes to gain initial access to victims. |
Drive-by Compromise | It has used watering hole attacks to gain access. |
Drive-by Compromise | Bad Rabbit spread through watering holes on popular sites by injecting JavaScript into the HTML body or a .js file. |
Drive-by Compromise | It compromised three Japanese websites using a Flash exploit to perform watering hole attacks. |
Drive-by Compromise | Bundlore has been spread through malicious advertisements on websites. |
Drive-by Compromise | During C0010, UNC3890 actors likely established a watering hole that was hosted on a login page of a legitimate Israeli shipping company that was active until at least November 2021. |
Drive-by Compromise | It leveraged a watering hole to serve up malicious code. |
Drive-by Compromise | It used embedded iframes on hotel login portals to redirect selected victims to download malware. |
Drive-by Compromise | It has compromised targets via strategic web compromise (SWC) utilizing a custom exploit kit. |
Drive-by Compromise | It has performed watering hole attacks. |
Drive-by Compromise | It has delivered zero-day exploits and malware to victims by injecting malicious code into specific public Web pages visited by targets within a particular sector. |
Drive-by Compromise | Grandoreiro has used compromised websites and Google Ads to bait victims into downloading its installer. |
Drive-by Compromise | KARAE was distributed through torrent file-sharing websites to South Korean victims, using a YouTube video downloader application as a lure. |
Drive-by Compromise | It delivered RATANKBA and other malicious code to victims via a compromised legitimate website. |
Drive-by Compromise | It has infected victims using watering holes. |
Drive-by Compromise | It has infected victims using watering holes. |
Drive-by Compromise | LoudMiner is typically bundled with pirated copies of Virtual Studio Technology (VST) for Windows and macOS. |
Drive-by Compromise | It has distributed It through a fake blog website. |
Drive-by Compromise | It has conducted watering-hole attacks through media and magazine websites. |
Drive-by Compromise | During Operation Dust Storm, the threat actors used a watering hole attack on a popular software reseller to exploit the then-zero-day Internet Explorer vulnerability CVE-2014-0322. |
Drive-by Compromise | It has used watering holes to deliver files with exploits to initial victims. |
Drive-by Compromise | It has sometimes used drive-by attacks against vulnerable browser plugins. |
Drive-by Compromise | POORAIM has been delivered through compromised sites acting as watering holes. |
Drive-by Compromise | It has used watering hole attacks to deliver malicious versions of legitimate installers. |
Drive-by Compromise | REvil has infected victim machines through compromised websites and exploit kits. |
Drive-by Compromise | It has distributed its malware via the RIG and SUNDOWN exploit kits, as well as online advertising network Yandex.Direct. |
Drive-by Compromise | Snip3 has been delivered to targets via downloads from malicious domains. |
Drive-by Compromise | It has extensively used strategic web compromises to target victims. |
Drive-by Compromise | It has used websites with malicious hyperlinks and iframes to infect targeted victims with Crimson, njRAT, and other malicious tools. |
Drive-by Compromise | It has infected victims using watering holes. |
Drive-by Compromise | It has distributed Windows malware via drive-by downloads. |
Drive-by Compromise | It has used compromised websites to register custom URL schemes on a remote system. |
Exploit Public-Facing Application | It has used a variety of public exploits, including CVE 2020-0688 and CVE 2020-17144, to gain execution on vulnerable Microsoft Exchange; they have also conducted SQL injection attacks against external websites. |
Exploit Public-Facing Application | It has exploited CVE-2019-19781 for Citrix, CVE-2019-11510 for Pulse Secure VPNs, CVE-2018-13379 for FortiGate VPNs, and CVE-2019-9670 in Zimbra software to gain access. |
Exploit Public-Facing Application | It has used SQL injection for initial compromise. |
Exploit Public-Facing Application | It exploited CVE-2020-10189 against Zoho ManageEngine Desktop Central, and CVE-2019-19781 to compromise Citrix Application Delivery Controllers (ADC) and gateway devices. |
Exploit Public-Facing Application | It has been observed using SQL injection to gain access to systems. |
Exploit Public-Facing Application | It has exploited CVE-2020-5902, an F5 BIP-IP vulnerability, to drop a Linux backdoor. It has also exploited mis-configured Plesk servers. |
Exploit Public-Facing Application | It has exploited a buffer overflow vulnerability in Microsoft Internet Information Services (IIS) 6.0, CVE-2017-7269, in order to establish a new HTTP or command and control (C2) server. |
Exploit Public-Facing Application | It has gained initial access by exploiting CVE-2019-18935, a vulnerability within Telerik UI for ASP.NET AJAX. |
Exploit Public-Facing Application | During C0017, It exploited CVE-2021-44207 in the USAHerds application and CVE-2021-44228 in Log4j, as well as other .NET deserialization, SQL injection, and directory traversal vulnerabilities to gain initial access. |
Exploit Public-Facing Application | During C0018, the threat actors exploited VMWare Horizon Unified Access Gateways that were vulnerable to several Log4Shell vulnerabilities, including CVE-2021-44228, CVE-2021-45046, CVE-2021-45105, and CVE-2021-44832. |
Exploit Public-Facing Application | During C0027, It exploited CVE-2021-35464 in the ForgeRock Open Access Management (OpenAM) application server to gain initial access. |
Exploit Public-Facing Application | It has conducted SQL injection attacks, exploited vulnerabilities CVE-2019-19781 and CVE-2020-0688 for Citrix and MS Exchange, and CVE-2018-13379 for Fortinet VPNs. |
Exploit Public-Facing Application | It has compromised victims by directly exploiting vulnerabilities of public-facing servers, including those associated with Microsoft Exchange and Oracle GlassFish. |
Exploit Public-Facing Application | It has exploited known vulnerabilities such as CVE-2017-1000486 (Primefaces Application Expression Language Injection), CVE-2015-7450 (WebSphere Application Server SOAP Deserialization Exploit), CVE-2010-5326 (SAP NewWeaver Invoker Servlet Exploit), and EDB-ID-24963 (SAP NetWeaver ConfigServlet Remote Code Execution) to gain initial access. |
Exploit Public-Facing Application | It has exploited known vulnerabilities in Fortinet, PulseSecure, and Palo Alto VPN appliances. |
Exploit Public-Facing Application | It exploited a publicly-facing servers including Wildfly/JBoss servers to gain access to the network. |
Exploit Public-Facing Application | It has exploited Oracle WebLogic vulnerabilities for initial compromise. |
Exploit Public-Facing Application | It has exploited CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065 to compromise on-premises versions of Microsoft Exchange Server, enabling access to email accounts and installation of additional malware. |
Exploit Public-Facing Application | Havij is used to automate SQL injection. |
Exploit Public-Facing Application | It has compromised networks by exploiting Internet-facing applications, including vulnerable Microsoft Exchange and SharePoint servers. |
Exploit Public-Facing Application | It has exploited various vulnerabilities for initial access, including Microsoft Exchange vulnerability CVE-2020-0688. |
Exploit Public-Facing Application | It has exploited the Log4j utility (CVE-2021-44228), on-premises MS Exchange servers via "ProxyShell" (CVE-2021-34473, CVE-2021-34523, CVE-2021-31207), and Fortios SSL VPNs (CVE-2018-13379). |
Exploit Public-Facing Application | It has leveraged vulnerabilities in Pulse Secure VPNs to hijack sessions. |
Exploit Public-Facing Application | It has exploited known vulnerabilities in public-facing infrastructure such as Microsoft Exchange Servers. |
Exploit Public-Facing Application | It has exploited the Microsoft Exchange memory corruption vulnerability (CVE-2020-0688). |
Exploit Public-Facing Application | During Night Dragon, threat actors used SQL injection exploits against extranet web servers to gain access. |
Exploit Public-Facing Application | During Operation CuckooBees, the threat actors exploited multiple vulnerabilities in externally facing servers. |
Exploit Public-Facing Application | During Operation Wocao, threat actors gained initial access by exploiting vulnerabilities in JBoss webservers. |
Exploit Public-Facing Application | It exploited Apache Struts, Oracle WebLogic (CVE-2017-10271), and Adobe ColdFusion (CVE-2017-3066) vulnerabilities to deliver malware. |
Exploit Public-Facing Application | Siloscape is executed after the attacker gains initial access to a Windows container using a known vulnerability. |
Exploit Public-Facing Application | During the SolarWinds Compromise, It exploited CVE-2020-0688 against the Microsoft Exchange Control Panel to regain access to a network. |
Exploit Public-Facing Application | SoreFang can gain access by exploiting a Sangfor SSL VPN vulnerability that allows for the placement and delivery of malicious update binaries. |
Exploit Public-Facing Application | sqlmap can be used to automate exploitation of SQL injection vulnerabilities. |
Exploit Public-Facing Application | It has exploited the Microsoft SharePoint vulnerability CVE-2019-0604 and CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065 in Exchange Server. |
Exploit Public-Facing Application | It has targeted publicly facing web servers, with both automatic and manual vulnerability discovery. |
Exploit Public-Facing Application | It gained initial access through exploitation of CVE-2021-40539 in internet-facing ManageEngine ADSelfService Plus servers. |
Exploit Public-Facing Application | ZxShell has been dropped through exploitation of CVE-2011-2462, CVE-2013-3163, and CVE-2014-0322. |
External Remote Services | During the 2015 Ukraine Electric Power Attack, It installed a modified Dropbear SSH client as the backdoor to target systems. |
External Remote Services | It actors leverage legitimate credentials to log into external remote services. |
External Remote Services | It has used Tor and a variety of commercial VPN services to route brute force authentication attempts. |
External Remote Services | It has used compromised identities to access networks via VPNs and Citrix. |
External Remote Services | It compromised an online billing/payment service using VPN access between a third-party service provider and the targeted payment service. |
External Remote Services | During C0027, It used Citrix and VPNs to persist in compromised environments. |
External Remote Services | It has used legitimate credentials to login to an external VPN, Citrix, SSH, and other remote services. |
External Remote Services | During CostaRicto, the threat actors set up remote tunneling using an SSH tool to maintain access to a compromised environment. |
External Remote Services | Doki was executed through an open Docker daemon API port. |
External Remote Services | It has used VPNs and Outlook Web Access (OWA) to maintain access to victim networks. |
External Remote Services | It has gained access to compromised environments via remote access services such as the corporate virtual private network (VPN). |
External Remote Services | It has used legitimate VPN, Citrix, or VNC credentials to maintain access to a victim environment. |
External Remote Services | It has used VPN services, including SoftEther VPN, to access and maintain persistence in victim environments. |
External Remote Services | It has used publicly-accessible RDP and remote management and monitoring (RMM) servers to gain access to victim machines. |
External Remote Services | Hildegard was executed through an unsecure kubelet that allowed anonymous access to the victim environment. |
External Remote Services | It has gained access through VPNs including with compromised accounts and stolen VPN certificates. |
External Remote Services | It has used RDP to establish persistence. |
External Remote Services | Kinsing was executed in an Ubuntu container deployed via an open Docker daemon API. |
External Remote Services | It has gained access to internet-facing systems and applications, including virtual private network (VPN), remote desktop protocol (RDP), and virtual desktop infrastructure (VDI) including Citrix. |
External Remote Services | It has used external remote services such as virtual private networks (VPN) to gain initial access. |
External Remote Services | Linux Rabbit attempts to gain access to the server via SSH. |
External Remote Services | Mafalda can establish an SSH connection from a compromised host to a server. |
External Remote Services | During Night Dragon, threat actors used compromised VPN accounts to gain access to victim systems. |
External Remote Services | It uses remote services such as VPN, Citrix, or OWA to persist in an environment. |
External Remote Services | During Operation CuckooBees, the threat actors enabled WinRM over HTTP/HTTPS as a backup persistence mechanism using the following command: cscript //nologo "C:\Windows\System32\winrm.vbs" set winrm/config/service@{EnableCompatibilityHttpsListener="true"}. |
External Remote Services | During Operation Wocao, threat actors used stolen credentials to connect to the victim's network via VPN. |
External Remote Services | It has used Dropbear SSH with a hardcoded backdoor password to maintain persistence within the target network. It has also used VPN tunnels established in legitimate software company infrastructure to gain access to internal networks of that software company's users. |
External Remote Services | It has leveraged legitimate remote management tools to maintain persistent access. |
External Remote Services | For the SolarWinds Compromise, It used compromised identities to access networks via SSH, VPNs, and other remote access tools. |