prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Exfiltration Over Web Service:Exfiltration to Cloud Storage
|
Empire can use Dropbox for data exfiltration.
|
Exfiltration Over Web Service:Exfiltration to Cloud Storage
|
It has exfiltrated stolen data to the MEGA file sharing site.
|
Exfiltration Over Web Service:Exfiltration to Cloud Storage
|
It has exfiltrated data to file sharing sites, including MEGA.
|
Exfiltration Over Web Service:Exfiltration to Cloud Storage
|
HAMMERTOSS exfiltrates data by uploading it to accounts created by the actors on Web cloud storage providers for the adversaries to retrieve later.
|
Exfiltration Over Web Service:Exfiltration to Cloud Storage
|
It has used cloud services, including OneDrive, for data exfiltration.
|
Exfiltration Over Web Service:Exfiltration to Cloud Storage
|
It has exfiltrated stolen files and data to actor-controlled Blogspot accounts.
|
Exfiltration Over Web Service:Exfiltration to Cloud Storage
|
It has used an uploader known as LUNCHMONEY that can exfiltrate files to Dropbox.
|
Exfiltration Over Web Service:Exfiltration to Cloud Storage
|
It has exfiltrated data to Google Drive.
|
Exfiltration Over Web Service:Exfiltration to Cloud Storage
|
Octopus has exfiltrated data to file sharing sites.
|
Exfiltration Over Web Service:Exfiltration to Cloud Storage
|
During Operation Dream Job, It used a custom build of open-source command-line dbxcli to exfiltrate stolen data to Dropbox.
|
Exfiltration Over Web Service:Exfiltration to Cloud Storage
|
It has exfiltrated stolen data to It-owned OneDrive and Dropbox accounts.
|
Exfiltration Over Web Service:Exfiltration to Cloud Storage
|
RainyDay can use a file exfiltration tool to upload specific files to Dropbox.
|
Exfiltration Over Web Service:Exfiltration to Cloud Storage
|
Rclone can exfiltrate data to cloud storage services such as Dropbox, Google Drive, Amazon S3, and MEGA.
|
Exfiltration Over Web Service:Exfiltration to Cloud Storage
|
ROKRAT can send collected data to cloud storage services such as PCloud.
|
Exfiltration Over Web Service:Exfiltration to Cloud Storage
|
It has exfiltrated stolen data to Dropbox.
|
Exfiltration Over Web Service:Exfiltration to Cloud Storage
|
It has used WebDAV to upload stolen USB files to a cloud drive. It has also exfiltrated stolen files to OneDrive and 4shared.
|
Exfiltration Over Web Service:Exfiltration to Cloud Storage
|
It has exfiltrated stolen victim data to various cloud storage providers.
|
Exfiltration Over Web Service:Exfiltration to Cloud Storage
|
ItM has exfiltrated stolen data to Dropbox.
|
Scheduled Transfer
|
ADVSTORESHELL collects, compresses, encrypts, and exfiltrates data to the C2 server every 10 minutes.
|
Scheduled Transfer
|
Chrommme can set itself to sleep before requesting a new command from C2.
|
Scheduled Transfer
|
Cobalt Strike can set its Beacon payload to reach out to the C2 server on an arbitrary and random interval.
|
Scheduled Transfer
|
ComRAT has been programmed to sleep outside local business hours (9 to 5, Monday to Friday).
|
Scheduled Transfer
|
Dipsind can be configured to only run during normal working hours, which would make its communications harder to distinguish from normal traffic.
|
Scheduled Transfer
|
Flagpro has the ability to wait for a specified time interval between communicating with and executing commands from C2.
|
Scheduled Transfer
|
It sent the victim computer identifier in a User-Agent string back to the C2 server every 10 minutes.
|
Scheduled Transfer
|
jRAT can be configured to reconnect at certain intervals.
|
Scheduled Transfer
|
Kazuar can sleep for a specific time and be set to communicate at specific intervals.
|
Scheduled Transfer
|
LightNeuron can be configured to exfiltrate data during nighttime or working hours.
|
Scheduled Transfer
|
Linfo creates a backdoor through which remote attackers can change the frequency at which compromised hosts contact remote C2 infrastructure.
|
Scheduled Transfer
|
It sends stolen data to the C2 server every 10 minutes.
|
Scheduled Transfer
|
POWERSTATS can sleep for a given number of seconds.
|
Scheduled Transfer
|
ShadowPad has sent data back to C2 every 8 hours.
|
Scheduled Transfer
|
Shark can pause C2 communications for a specified time.
|
Scheduled Transfer
|
ShimRat can sleep when instructed to do so by the C2.
|
Scheduled Transfer
|
TinyIt contacts its C2 based on a scheduled timing set in its configuration.
|
Account Access Removal
|
It has removed a targeted organization's global admin accounts to lock the organization out of all access.
|
Account Access Removal
|
LockerGoga has been observed changing account passwords and logging off current users.
|
Account Access Removal
|
MegaCortex has changed user account passwords and logged users off the system.
|
Account Access Removal
|
Meteor has the ability to change the password of local users on compromised hosts and can log off users.
|
Data Destruction
|
It has used a custom secure delete function to make deleted files unrecoverable.
|
Data Destruction
|
BlackEnergy 2 contains a "Destroy" plug-in that destroys data stored on victim hard drives by overwriting file contents.
|
Data Destruction
|
CaddyWiper can work alphabetically through drives on a compromised system to take ownership of and overwrite all files.
|
Data Destruction
|
Diavol can delete specified files from a targeted system.
|
Data Destruction
|
It has used tools to delete files and folders from victims' desktops and profiles.
|
Data Destruction
|
HermeticWiper can recursively wipe folders and files in Windows, Program Files, Program Files(x86), PerfLogs, Boot, System, Volume Information, and AppData folders using FSCTL_MOVE_FILE. HermeticWiper can also overwrite symbolic links and big files in My Documents and on the Desktop with random bytes.
|
Data Destruction
|
Industroyer’s data wiper module clears registry keys and overwrites both ICS configuration and Windows files.
|
Data Destruction
|
Kazuar can overwrite files with random data before deleting them.
|
Data Destruction
|
KillDisk deletes system files to make the OS unbootable. KillDisk also targets and deletes files with 35 different file extensions.
|
Data Destruction
|
It has deleted the target's systems and resources both on-premises and in the cloud.
|
Data Destruction
|
It has used a custom secure delete function to overwrite file contents with data from heap memory.
|
Data Destruction
|
Meteor can fill a victim's files and directories with zero-bytes in replacement of real content before deleting them.
|
Data Destruction
|
Olympic Destroyer overwrites files locally and on remote shares.
|
Data Destruction
|
PowerDuke has a command to write random data across a file and delete it.
|
Data Destruction
|
Proxysvc can overwrite files indicated by the attacker before deleting them.
|
Data Destruction
|
RawDisk was used in Shamoon to write to protected system locations such as the MBR and disk partitions in an effort to destroy data.
|
Data Destruction
|
REvil has the capability to destroy files and folders.
|
Data Destruction
|
It has used the BlackEnergy KillDisk component to overwrite files on Windows-based Human-Machine Interfaces.
|
Data Destruction
|
SDelete deletes data in a way that makes it unrecoverable.
|
Data Destruction
|
Shamoon attempts to overwrite operating system files and disk structures with image files. In a later variant, randomly generated data was used for data overwrites.
|
Data Destruction
|
StoneDrill has a disk wiper module that targets files other than those in the Windows directory.
|
Data Destruction
|
WhisperGate can corrupt files by overwriting the first 1 MB with 0xcc and appending random extensions.
|
Data Destruction
|
Xbash has destroyed Linux-based databases as part of its ransomware capabilities.
|
Data Encrypted for Impact
|
It has used Hermes ransomware to encrypt files with AES256.
|
Data Encrypted for Impact
|
It used a ransomware called Encryptor RaaS to encrypt files on the targeted systems and provide a ransom note to the user.
|
Data Encrypted for Impact
|
Avaddon encrypts the victim system using a combination of AES256 and RSA encryption schemes.
|
Data Encrypted for Impact
|
AvosLocker has encrypted files and network resources using AES-256 and added an .avos, .avos2, or .AvosLinux extension to filenames.
|
Data Encrypted for Impact
|
Babuk can use ChaCha8 and ECDH to encrypt data.
|
Data Encrypted for Impact
|
Bad Rabbit has encrypted files and disks using AES-128-CBC and RSA-2048.
|
Data Encrypted for Impact
|
BitPaymer can import a hard-coded RSA 1024-bit public key, generate a 128-bit RC4 key for each file, and encrypt the file in place, appending .locked to the filename.
|
Data Encrypted for Impact
|
Black Basta can encrypt files with the ChaCha20 cypher and using a multithreaded process to increase speed.
|
Data Encrypted for Impact
|
BlackCat has the ability to encrypt Windows devices, Linux devices, and VMWare instances.
|
Data Encrypted for Impact
|
During C0015, the threat actors used Conti ransomware to encrypt a compromised network.
|
Data Encrypted for Impact
|
During C0018, the threat actors used AvosLocker ransomware to encrypt files on the compromised network.
|
Data Encrypted for Impact
|
Clop can encrypt files using AES, RSA, and RC4 and will add the ".clop" extension to encrypted files.
|
Data Encrypted for Impact
|
Conti can use CreateIoCompletionPort(), PostQueuedCompletionStatus(), and GetQueuedCompletionPort() to rapidly encrypt files, excluding those with the extensions of .exe, .dll, and .lnk. It has used a different AES-256 encryption key per file with a bundled RAS-4096 public encryption key that is unique for each victim. Conti can use "Windows Restart Manager" to ensure files are unlocked and open for encryption.
|
Data Encrypted for Impact
|
Cuba has the ability to encrypt system data and add the ".cuba" extension to encrypted files.
|
Data Encrypted for Impact
|
DCSrv has encrypted drives using the core encryption mechanism from DiskCryptor.
|
Data Encrypted for Impact
|
DEATHRANSOM can use public and private key pair encryption to encrypt files for ransom payment.
|
Data Encrypted for Impact
|
Diavol has encrypted files using an RSA key though the CryptEncrypt API and has appended filenames with ".lock64".
|
Data Encrypted for Impact
|
Egregor can encrypt all non-system files using a hybrid AES-RSA algorithm prior to displaying a ransom note.
|
Data Encrypted for Impact
|
EKANS uses standard encryption library functions to encrypt files.
|
Data Encrypted for Impact
|
It has encrypted virtual disk volumes on ESXi servers using a version of Darkside ransomware.
|
Data Encrypted for Impact
|
It has deployed ransomware such as Ragnar Locker, White Rabbit, and attempted to execute Noberus on compromised networks.
|
Data Encrypted for Impact
|
FIVEHANDS can use an embedded NTRU public key to encrypt data for ransom.
|
Data Encrypted for Impact
|
HELLOKITTY can use an embedded RSA-2048 public key to encrypt victim data for ransom.
|
Data Encrypted for Impact
|
It has encrypted domain-controlled systems using BitPaymer.
|
Data Encrypted for Impact
|
JCry has encrypted files and demanded Bitcoin to decrypt those files.
|
Data Encrypted for Impact
|
KillDisk has a ransomware component that encrypts files with an AES key that is also RSA-1028 encrypted.
|
Data Encrypted for Impact
|
LockerGoga has encrypted files, including core Windows OS files, using RSA-OAEP MGF1 and then demanded Bitcoin be paid for the decryption key.
|
Data Encrypted for Impact
|
It has used BitLocker and DiskCryptor to encrypt targeted workstations.
|
Data Encrypted for Impact
|
Maze has disrupted systems by encrypting files on targeted machines, claiming to decrypt files if a ransom payment is made. Maze has used the ChaCha algorithm, based on Salsa20, and an RSA algorithm to encrypt files.
|
Data Encrypted for Impact
|
MegaCortex has used the open-source library, Mbed Crypto, and generated AES keys to carry out the file encryption process.
|
Data Encrypted for Impact
|
Netwalker can encrypt files on infected machines to extort victims.
|
Data Encrypted for Impact
|
NotPetya encrypts user files and disk structures like the MBR with 2048-bit RSA.
|
Data Encrypted for Impact
|
Pay2Key can encrypt data on victim's machines using RSA and AES algorithms in order to extort a ransom payment for decryption.
|
Data Encrypted for Impact
|
Prestige has leveraged the CryptoPP C++ library to encrypt files on target systems using AES and appended filenames with .enc.
|
Data Encrypted for Impact
|
ProLock can encrypt files on a compromised host with RC6, and encrypts the key with RSA-1024.
|
Data Encrypted for Impact
|
Pysa has used RSA and AES-CBC encryption algorithm to encrypt a list of targeted file extensions.
|
Data Encrypted for Impact
|
Ragnar Locker encrypts files on the local machine and mapped drives prior to displaying a note demanding a ransom.
|
Data Encrypted for Impact
|
REvil can encrypt files on victim systems and demands a ransom to decrypt the files.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.