prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Exploitation of Remote Services | It has used tools to exploit the ZeroLogon vulnerability (CVE-2020-1472). |
Exploitation of Remote Services | It has exploited the Microsoft Netlogon vulnerability (CVE-2020-1472). |
Exploitation of Remote Services | NotPetya can use two exploits in SMBv1, EternalBlue and EternalRomance, to spread itself to other remote systems on the network. |
Exploitation of Remote Services | PoshC2 contains a module for exploiting SMB via EternalBlue. |
Exploitation of Remote Services | QakBot can move laterally using worm-like functionality through exploitation of SMB. |
Exploitation of Remote Services | Stuxnet propagates using the MS10-061 Print Spooler and MS08-067 Windows Server Service vulnerabilities. |
Exploitation of Remote Services | It has exploited MS17-010 to move laterally to other systems on the network. |
Exploitation of Remote Services | It has used EternalBlue exploits for lateral movement. |
Exploitation of Remote Services | TrickBot utilizes EternalBlue and EternalRomance exploits for lateral movement in the modules wormwinDll, wormDll, mwormDll, nwormDll, tabDll. |
Exploitation of Remote Services | WannaCry uses an exploit in SMBv1 to spread itself to other remote systems on a network. |
Exploitation of Remote Services | It has exploited or attempted to exploit Zerologon (CVE-2020-1472) and EternalBlue (MS17-010) vulnerabilities. |
Internal Spearphishing | It has used an Outlook VBA module on infected systems to send phishing emails with malicious attachments to other employees within the organization. |
Internal Spearphishing | It has conducted internal spearphishing attacks against executives, HR, and IT personnel to gain information and access. |
Internal Spearphishing | It has sent internal spearphishing emails for lateral movement after stealing victim information. |
Internal Spearphishing | It has conducted internal spearphishing within the victim's environment for lateral movement. |
Internal Spearphishing | During Operation Dream Job, It conducted internal spearphishing from within a compromised organization. |
Lateral Tool Transfer | During the 2015 Ukraine Electric Power Attack, It moved their tools laterally within the corporate network and between the ICS and corporate network. |
Lateral Tool Transfer | During the 2016 Ukraine Electric Power Attack, It used move to transfer files to a network share. |
Lateral Tool Transfer | It has spread malware in target networks by copying modules to folders masquerading as removable devices. |
Lateral Tool Transfer | It has deployed tools after moving laterally using administrative accounts. |
Lateral Tool Transfer | BITSAdmin can be used to create BITS Jobs to upload and/or download files from SMB file servers. |
Lateral Tool Transfer | BlackCat can replicate itself across connected servers via psexec. |
Lateral Tool Transfer | During C0015, the threat actors used WMI to load Cobalt Strike onto additional hosts within a compromised network. |
Lateral Tool Transfer | During C0018, the threat actors transferred the SoftPerfect Network Scanner and other tools to machines in the network using AnyDesk and PDQ Deploy. |
Lateral Tool Transfer | It has copied tools between compromised hosts using SMB. |
Lateral Tool Transfer | cmd can be used to copy files to/from a remotely connected internal system. |
Lateral Tool Transfer | DustySky searches for network drives and removable media and duplicates itself onto them. |
Lateral Tool Transfer | Emotet has copied itself to remote systems using the service.exe filename. |
Lateral Tool Transfer | esentutl can be used to copy files to/from a remote share. |
Lateral Tool Transfer | Expand can be used to download or upload a file over a network share. |
Lateral Tool Transfer | It has deployed Meterpreter stagers and SplinterRAT instances in the victim network after moving laterally. |
Lateral Tool Transfer | ftp may be abused by adversaries to transfer tools or files between systems within a compromised environment. |
Lateral Tool Transfer | It has used PsExec to move laterally between hosts in the target network. |
Lateral Tool Transfer | HermeticWizard can copy files to other machines on a compromised network. |
Lateral Tool Transfer | LockerGoga has been observed moving around the victim network via SMB, indicating the actors behind this ransomware are manually copying files form computer to computer instead of self-propagating. |
Lateral Tool Transfer | Lucifer can use certutil for propagation on Windows hosts within intranets. |
Lateral Tool Transfer | It has copied tools within a compromised network using RDP. |
Lateral Tool Transfer | Operators deploying Netwalker have used psexec to copy the Netwalker payload across accessible systems. |
Lateral Tool Transfer | Olympic Destroyer attempts to copy itself to remote machines on the network. |
Lateral Tool Transfer | During Operation Wocao, threat actors used SMB to copy files to and from target systems. |
Lateral Tool Transfer | PsExec can be used to download or upload a file over a network share. |
Lateral Tool Transfer | It has used move to transfer files to a network share and has copied payloads--such as Prestige ransomware--to an Active Directory Domain Controller and distributed via the Default Domain Group Policy Object. |
Lateral Tool Transfer | Shamoon attempts to copy itself to remote machines on the network. |
Lateral Tool Transfer | Stuxnet uses an RPC server that contains a file dropping routine and support for payload version updates for P2P communications within a victim network. |
Lateral Tool Transfer | It RPC backdoors can be used to transfer files to/from victim machines on the local network. |
Lateral Tool Transfer | It has copied web shells between servers in targeted environments. |
Lateral Tool Transfer | WannaCry attempts to copy itself to remote computers after gaining access via an SMB exploit. |
Lateral Tool Transfer | It has used stolen credentials to copy tools into the %TEMP% directory of domain controllers. |
Remote Service Session Hijacking:RDP Hijacking | It has targeted victims with remote administration tools including RDP. |
Remote Service Session Hijacking:RDP Hijacking | WannaCry enumerates current remote desktop sessions and tries to execute the malware on each session. |
Remote Services | Brute Ratel C4 has the ability to use RPC for lateral movement. |
Remote Services | Kivars has the ability to remotely trigger keyboard input and mouse clicks. |
Remote Services | MacMa can manage remote screen sessions. |
Remote Services | Stuxnet can propagate via peer-to-peer communication and updates using RPC. |
Remote Services | It has used the WebDAV protocol to execute Ryuk payloads hosted on network file shares. |
Remote Services:Remote Desktop Protocol | The It group is known to have used RDP during operations. |
Remote Services:Remote Desktop Protocol | It enables the Remote Desktop Protocol for persistence. It has also interacted with compromised systems to browse and copy files through RDP sessions. |
Remote Services:Remote Desktop Protocol | It has been seen using RDP for lateral movement and persistence, in some cases employing the rdpwinst tool for mangement of multiple sessions. |
Remote Services:Remote Desktop Protocol | It used RDP for lateral movement. |
Remote Services:Remote Desktop Protocol | It has used RDP during operations. |
Remote Services:Remote Desktop Protocol | It has used Remote Desktop to log on to servers interactively and manually copy files to remote hosts. |
Remote Services:Remote Desktop Protocol | During C0015, the threat actors used RDP to access specific network hosts of interest. |
Remote Services:Remote Desktop Protocol | During C0018, the threat actors opened a variety of ports to establish RDP connections, including ports 28035, 32467, 41578, and 46892. |
Remote Services:Remote Desktop Protocol | It enables concurrent Remote Desktop Protocol (RDP) sessions. |
Remote Services:Remote Desktop Protocol | It has used RDP to access targeted systems. |
Remote Services:Remote Desktop Protocol | It has used Remote Desktop Protocol to conduct lateral movement. |
Remote Services:Remote Desktop Protocol | Cobalt Strike can start a VNC-based remote desktop server and tunnel the connection through the already established C2 channel. |
Remote Services:Remote Desktop Protocol | DarkComet can open an active screen of the victim’s machine and take control of the mouse and keyboard. |
Remote Services:Remote Desktop Protocol | It has moved laterally via RDP. |
Remote Services:Remote Desktop Protocol | It has used RDP to move laterally to systems in the victim environment. |
Remote Services:Remote Desktop Protocol | It has remotely accessed compromised environments via Remote Desktop Services (RDS) for lateral movement. |
Remote Services:Remote Desktop Protocol | It used RDP to move laterally in victim networks. |
Remote Services:Remote Desktop Protocol | It has used RDP to move laterally in victim environments. |
Remote Services:Remote Desktop Protocol | It has used RDP for lateral movement. |
Remote Services:Remote Desktop Protocol | It has used RDP to log in and move laterally in the target environment. |
Remote Services:Remote Desktop Protocol | It has used remote desktop sessions for lateral movement. |
Remote Services:Remote Desktop Protocol | Imminent Monitor has a module for performing remote desktop access. |
Remote Services:Remote Desktop Protocol | jRAT can support RDP control. |
Remote Services:Remote Desktop Protocol | It has used RDP for direct remote point-and-click access. |
Remote Services:Remote Desktop Protocol | Koadic can enable remote desktop on the victim's machine. |
Remote Services:Remote Desktop Protocol | It malware SierraCharlie uses RDP for propagation. |
Remote Services:Remote Desktop Protocol | It has targeted RDP credentials and used it to move through the victim environment. |
Remote Services:Remote Desktop Protocol | It has used Remote Desktop Services to copy tools on targeted systems. |
Remote Services:Remote Desktop Protocol | It has used RDP connections to move across the victim network. |
Remote Services:Remote Desktop Protocol | njRAT has a module for performing remote desktop access. |
Remote Services:Remote Desktop Protocol | It has used Remote Desktop Protocol for lateral movement. The group has also used tunneling tools to tunnel RDP into the environment. |
Remote Services:Remote Desktop Protocol | It attempted to use RDP to move laterally. |
Remote Services:Remote Desktop Protocol | Pupy can enable/disable RDP connection and can start a remote desktop session using a browser web socket client. |
Remote Services:Remote Desktop Protocol | Pysa has laterally moved using RDP connections. |
Remote Services:Remote Desktop Protocol | QuasarRAT has a module for performing remote desktop access. |
Remote Services:Remote Desktop Protocol | Revenge RAT has a plugin to perform RDP access. |
Remote Services:Remote Desktop Protocol | SDBbot has the ability to use RDP to connect to victim's machines. |
Remote Services:Remote Desktop Protocol | ServHelper has commands for adding a remote desktop user and sending RDP traffic to the attacker through a reverse SSH tunnel. |
Remote Services:Remote Desktop Protocol | It has used RDP for lateral movement. |
Remote Services:Remote Desktop Protocol | During the SolarWinds Compromise, It used RDP sessions from public-facing systems to internal servers. |
Remote Services:Remote Desktop Protocol | It utilized RDP throughout an operation. |
Remote Services:Remote Desktop Protocol | WarzoneRAT has the ability to control an infected PC using RDP. |
Remote Services:Remote Desktop Protocol | It has used RDP for lateral movement and to deploy ransomware interactively. |
Remote Services:Remote Desktop Protocol | zwShell has used RDP for lateral movement. |
Remote Services:Remote Desktop Protocol | ZxShell has remote desktop functionality. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.