prompt
stringclasses
508 values
procedure
stringlengths
20
478
Exploitation of Remote Services
It has used tools to exploit the ZeroLogon vulnerability (CVE-2020-1472).
Exploitation of Remote Services
It has exploited the Microsoft Netlogon vulnerability (CVE-2020-1472).
Exploitation of Remote Services
NotPetya can use two exploits in SMBv1, EternalBlue and EternalRomance, to spread itself to other remote systems on the network.
Exploitation of Remote Services
PoshC2 contains a module for exploiting SMB via EternalBlue.
Exploitation of Remote Services
QakBot can move laterally using worm-like functionality through exploitation of SMB.
Exploitation of Remote Services
Stuxnet propagates using the MS10-061 Print Spooler and MS08-067 Windows Server Service vulnerabilities.
Exploitation of Remote Services
It has exploited MS17-010 to move laterally to other systems on the network.
Exploitation of Remote Services
It has used EternalBlue exploits for lateral movement.
Exploitation of Remote Services
TrickBot utilizes EternalBlue and EternalRomance exploits for lateral movement in the modules wormwinDll, wormDll, mwormDll, nwormDll, tabDll.
Exploitation of Remote Services
WannaCry uses an exploit in SMBv1 to spread itself to other remote systems on a network.
Exploitation of Remote Services
It has exploited or attempted to exploit Zerologon (CVE-2020-1472) and EternalBlue (MS17-010) vulnerabilities.
Internal Spearphishing
It has used an Outlook VBA module on infected systems to send phishing emails with malicious attachments to other employees within the organization.
Internal Spearphishing
It has conducted internal spearphishing attacks against executives, HR, and IT personnel to gain information and access.
Internal Spearphishing
It has sent internal spearphishing emails for lateral movement after stealing victim information.
Internal Spearphishing
It has conducted internal spearphishing within the victim's environment for lateral movement.
Internal Spearphishing
During Operation Dream Job, It conducted internal spearphishing from within a compromised organization.
Lateral Tool Transfer
During the 2015 Ukraine Electric Power Attack, It moved their tools laterally within the corporate network and between the ICS and corporate network.
Lateral Tool Transfer
During the 2016 Ukraine Electric Power Attack, It used move to transfer files to a network share.
Lateral Tool Transfer
It has spread malware in target networks by copying modules to folders masquerading as removable devices.
Lateral Tool Transfer
It has deployed tools after moving laterally using administrative accounts.
Lateral Tool Transfer
BITSAdmin can be used to create BITS Jobs to upload and/or download files from SMB file servers.
Lateral Tool Transfer
BlackCat can replicate itself across connected servers via psexec.
Lateral Tool Transfer
During C0015, the threat actors used WMI to load Cobalt Strike onto additional hosts within a compromised network.
Lateral Tool Transfer
During C0018, the threat actors transferred the SoftPerfect Network Scanner and other tools to machines in the network using AnyDesk and PDQ Deploy.
Lateral Tool Transfer
It has copied tools between compromised hosts using SMB.
Lateral Tool Transfer
cmd can be used to copy files to/from a remotely connected internal system.
Lateral Tool Transfer
DustySky searches for network drives and removable media and duplicates itself onto them.
Lateral Tool Transfer
Emotet has copied itself to remote systems using the service.exe filename.
Lateral Tool Transfer
esentutl can be used to copy files to/from a remote share.
Lateral Tool Transfer
Expand can be used to download or upload a file over a network share.
Lateral Tool Transfer
It has deployed Meterpreter stagers and SplinterRAT instances in the victim network after moving laterally.
Lateral Tool Transfer
ftp may be abused by adversaries to transfer tools or files between systems within a compromised environment.
Lateral Tool Transfer
It has used PsExec to move laterally between hosts in the target network.
Lateral Tool Transfer
HermeticWizard can copy files to other machines on a compromised network.
Lateral Tool Transfer
LockerGoga has been observed moving around the victim network via SMB, indicating the actors behind this ransomware are manually copying files form computer to computer instead of self-propagating.
Lateral Tool Transfer
Lucifer can use certutil for propagation on Windows hosts within intranets.
Lateral Tool Transfer
It has copied tools within a compromised network using RDP.
Lateral Tool Transfer
Operators deploying Netwalker have used psexec to copy the Netwalker payload across accessible systems.
Lateral Tool Transfer
Olympic Destroyer attempts to copy itself to remote machines on the network.
Lateral Tool Transfer
During Operation Wocao, threat actors used SMB to copy files to and from target systems.
Lateral Tool Transfer
PsExec can be used to download or upload a file over a network share.
Lateral Tool Transfer
It has used move to transfer files to a network share and has copied payloads--such as Prestige ransomware--to an Active Directory Domain Controller and distributed via the Default Domain Group Policy Object.
Lateral Tool Transfer
Shamoon attempts to copy itself to remote machines on the network.
Lateral Tool Transfer
Stuxnet uses an RPC server that contains a file dropping routine and support for payload version updates for P2P communications within a victim network.
Lateral Tool Transfer
It RPC backdoors can be used to transfer files to/from victim machines on the local network.
Lateral Tool Transfer
It has copied web shells between servers in targeted environments.
Lateral Tool Transfer
WannaCry attempts to copy itself to remote computers after gaining access via an SMB exploit.
Lateral Tool Transfer
It has used stolen credentials to copy tools into the %TEMP% directory of domain controllers.
Remote Service Session Hijacking:RDP Hijacking
It has targeted victims with remote administration tools including RDP.
Remote Service Session Hijacking:RDP Hijacking
WannaCry enumerates current remote desktop sessions and tries to execute the malware on each session.
Remote Services
Brute Ratel C4 has the ability to use RPC for lateral movement.
Remote Services
Kivars has the ability to remotely trigger keyboard input and mouse clicks.
Remote Services
MacMa can manage remote screen sessions.
Remote Services
Stuxnet can propagate via peer-to-peer communication and updates using RPC.
Remote Services
It has used the WebDAV protocol to execute Ryuk payloads hosted on network file shares.
Remote Services:Remote Desktop Protocol
The It group is known to have used RDP during operations.
Remote Services:Remote Desktop Protocol
It enables the Remote Desktop Protocol for persistence. It has also interacted with compromised systems to browse and copy files through RDP sessions.
Remote Services:Remote Desktop Protocol
It has been seen using RDP for lateral movement and persistence, in some cases employing the rdpwinst tool for mangement of multiple sessions.
Remote Services:Remote Desktop Protocol
It used RDP for lateral movement.
Remote Services:Remote Desktop Protocol
It has used RDP during operations.
Remote Services:Remote Desktop Protocol
It has used Remote Desktop to log on to servers interactively and manually copy files to remote hosts.
Remote Services:Remote Desktop Protocol
During C0015, the threat actors used RDP to access specific network hosts of interest.
Remote Services:Remote Desktop Protocol
During C0018, the threat actors opened a variety of ports to establish RDP connections, including ports 28035, 32467, 41578, and 46892.
Remote Services:Remote Desktop Protocol
It enables concurrent Remote Desktop Protocol (RDP) sessions.
Remote Services:Remote Desktop Protocol
It has used RDP to access targeted systems.
Remote Services:Remote Desktop Protocol
It has used Remote Desktop Protocol to conduct lateral movement.
Remote Services:Remote Desktop Protocol
Cobalt Strike can start a VNC-based remote desktop server and tunnel the connection through the already established C2 channel.
Remote Services:Remote Desktop Protocol
DarkComet can open an active screen of the victim’s machine and take control of the mouse and keyboard.
Remote Services:Remote Desktop Protocol
It has moved laterally via RDP.
Remote Services:Remote Desktop Protocol
It has used RDP to move laterally to systems in the victim environment.
Remote Services:Remote Desktop Protocol
It has remotely accessed compromised environments via Remote Desktop Services (RDS) for lateral movement.
Remote Services:Remote Desktop Protocol
It used RDP to move laterally in victim networks.
Remote Services:Remote Desktop Protocol
It has used RDP to move laterally in victim environments.
Remote Services:Remote Desktop Protocol
It has used RDP for lateral movement.
Remote Services:Remote Desktop Protocol
It has used RDP to log in and move laterally in the target environment.
Remote Services:Remote Desktop Protocol
It has used remote desktop sessions for lateral movement.
Remote Services:Remote Desktop Protocol
Imminent Monitor has a module for performing remote desktop access.
Remote Services:Remote Desktop Protocol
jRAT can support RDP control.
Remote Services:Remote Desktop Protocol
It has used RDP for direct remote point-and-click access.
Remote Services:Remote Desktop Protocol
Koadic can enable remote desktop on the victim's machine.
Remote Services:Remote Desktop Protocol
It malware SierraCharlie uses RDP for propagation.
Remote Services:Remote Desktop Protocol
It has targeted RDP credentials and used it to move through the victim environment.
Remote Services:Remote Desktop Protocol
It has used Remote Desktop Services to copy tools on targeted systems.
Remote Services:Remote Desktop Protocol
It has used RDP connections to move across the victim network.
Remote Services:Remote Desktop Protocol
njRAT has a module for performing remote desktop access.
Remote Services:Remote Desktop Protocol
It has used Remote Desktop Protocol for lateral movement. The group has also used tunneling tools to tunnel RDP into the environment.
Remote Services:Remote Desktop Protocol
It attempted to use RDP to move laterally.
Remote Services:Remote Desktop Protocol
Pupy can enable/disable RDP connection and can start a remote desktop session using a browser web socket client.
Remote Services:Remote Desktop Protocol
Pysa has laterally moved using RDP connections.
Remote Services:Remote Desktop Protocol
QuasarRAT has a module for performing remote desktop access.
Remote Services:Remote Desktop Protocol
Revenge RAT has a plugin to perform RDP access.
Remote Services:Remote Desktop Protocol
SDBbot has the ability to use RDP to connect to victim's machines.
Remote Services:Remote Desktop Protocol
ServHelper has commands for adding a remote desktop user and sending RDP traffic to the attacker through a reverse SSH tunnel.
Remote Services:Remote Desktop Protocol
It has used RDP for lateral movement.
Remote Services:Remote Desktop Protocol
During the SolarWinds Compromise, It used RDP sessions from public-facing systems to internal servers.
Remote Services:Remote Desktop Protocol
It utilized RDP throughout an operation.
Remote Services:Remote Desktop Protocol
WarzoneRAT has the ability to control an infected PC using RDP.
Remote Services:Remote Desktop Protocol
It has used RDP for lateral movement and to deploy ransomware interactively.
Remote Services:Remote Desktop Protocol
zwShell has used RDP for lateral movement.
Remote Services:Remote Desktop Protocol
ZxShell has remote desktop functionality.