prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Traffic Signaling | SYNful Knock can be sent instructions via special packets to change its functionality. Code for new functionality can be included in these messages. |
Traffic Signaling | Umbreon provides additional access using its backdoor Espeon, providing a reverse shell upon receipt of a special packet. |
Traffic Signaling | Uroburos can intercept the first client to server packet in the 3-way TCP handshake to determine if the packet contains the correct unique value for a specific Uroburos implant. If the value does not match, the packet and the rest of the TCP session are passed to the legitimate listening application. |
Traffic Signaling | Winnti for Linux has used a passive listener, capable of identifying a specific magic value before executing tasking, as a secondary command and control (C2) mechanism. |
Traffic Signaling:Port Knocking | Mafalda can use port-knocking to authenticate itself to another implant called Cryshell to establish an indirect connection to the C2 server. |
Traffic Signaling:Port Knocking | metaMain has authenticated itself to a different implant, Cryshell, through a port knocking and handshake procedure. |
Traffic Signaling:Port Knocking | It has used a script that configures the knockd service and firewall to only accept C2 connections from systems that use a specified sequence of knock ports. |
Traffic Signaling:Socket Filters | Penquin installs a TCP and UDP filter on the eth0 interface. |
Valid Accounts | During the 2015 Ukraine Electric Power Attack, It used valid accounts on the corporate network to escalate privileges, move laterally, and establish persistence within the corporate network. |
Valid Accounts | It actors leverage legitimate credentials to log into external remote services. |
Valid Accounts | It has used legitimate credentials to gain initial access, maintain access, and exfiltrate data from a victim network. The group has specifically used credentials stolen through a spearphishing email to login to the DCCC network. The group has also leveraged default manufacturer's passwords to gain initial access to corporate networks via IoT devices such as a VOIP phone, printer, and video decoder. |
Valid Accounts | It has used a compromised account to access an organization's VPN infrastructure. |
Valid Accounts | It has used valid accounts for initial access and privilege escalation. |
Valid Accounts | It has used stolen credentials to compromise Outlook Web Access (OWA). |
Valid Accounts | It used compromised credentials to log on to other systems. |
Valid Accounts | It has used previously compromised administrative accounts to escalate privileges. |
Valid Accounts | It actors used legitimate credentials of banking employees to perform operations that sent them millions of dollars. |
Valid Accounts | It has used a valid account to maintain persistence via scheduled task. |
Valid Accounts | It has compromised user credentials and used valid accounts for operations. |
Valid Accounts | Dtrack used hard-coded credentials to gain access to a network share. |
Valid Accounts | Adversaries can instruct Duqu to spread laterally by copying itself to shares it has enumerated and for which it has obtained legitimate credentials (via keylogging or other means). The remote host is then infected by using the compromised credentials to schedule a task on remote machines that executes the malware. |
Valid Accounts | It has used stolen credentials to connect remotely to victim networks using VPNs protected with only a single factor. |
Valid Accounts | It has used legitimate credentials to hijack email communications. |
Valid Accounts | It has used legitimate VPN, RDP, Citrix, or VNC credentials to maintain access to a victim environment. |
Valid Accounts | To move laterally on a victim network, It has used credentials stolen from various systems on which it gathered usernames and password hashes. |
Valid Accounts | It has harvested valid administrative credentials for lateral movement. |
Valid Accounts | It has used valid accounts for persistence and lateral movement. |
Valid Accounts | It has used valid credentials with various services during lateral movement. |
Valid Accounts | It leveraged valid accounts to maintain access to a victim network. |
Valid Accounts | Industroyer can use supplied user credentials to execute processes and stop services. |
Valid Accounts | It has used credential dumpers or stealers to obtain legitimate credentials, which they used to gain access to victim accounts. |
Valid Accounts | Kinsing has used valid SSH credentials to access remote hosts. |
Valid Accounts | It has used compromised credentials and/or session tokens to gain access into a victim's VPN, VDI, RDP, and IAMs. |
Valid Accounts | It has used administrator credentials to gain access to restricted network segments. |
Valid Accounts | It has obtained valid accounts to gain initial access. |
Valid Accounts | Linux Rabbit acquires valid SSH accounts through brute force. |
Valid Accounts | It has used valid accounts including shared between Managed Service Providers and clients to move between the two environments. |
Valid Accounts | During Night Dragon, threat actors used compromised VPN accounts to gain access to victim systems. |
Valid Accounts | It has used compromised credentials to access other systems on a victim network. |
Valid Accounts | During Operation Wocao, threat actors used valid VPN credentials to gain initial access. |
Valid Accounts | It attempts to obtain legitimate credentials during operations. |
Valid Accounts | It has used valid compromised credentials to gain access to victim environments. |
Valid Accounts | It have used previously acquired legitimate credentials prior to attacks. |
Valid Accounts | Some SeaDuke samples have a module to extract email from Microsoft Exchange servers using compromised credentials. |
Valid Accounts | It has used compromised credentials to log on to other systems and escalate privileges. |
Valid Accounts | It has used compromised credentials to obtain unauthorized access to online accounts. |
Valid Accounts | During the SolarWinds Compromise, It used different compromised credentials for remote access and to move laterally. |
Valid Accounts | It used legitimate account credentials that they dumped to navigate the internal victim network as though they were the legitimate account owner. |
Valid Accounts | It has used compromised VPN accounts. |
Valid Accounts | It actors obtain legitimate credentials using a variety of methods and use them to further lateral movement on victim networks. |
Valid Accounts | It has used valid credentials for privileged accounts with the goal of accessing domain controllers. |
Valid Accounts:Default Accounts | It has leveraged default credentials for authenticating myWebMethods (WMS) and QLogic web management interface to gain initial access. |
Valid Accounts:Default Accounts | HyperStack can use default credentials to connect to IPC$ shares on remote machines. |
Valid Accounts:Default Accounts | It enabled and used the default system managed account, DefaultAccount, via "powershell.exe" /c net user DefaultAccount /active:yes to connect to a targeted Exchange server over RDP. |
Valid Accounts:Default Accounts | Stuxnet infected WinCC machines via a hardcoded database server password. |
Valid Accounts:Domain Accounts | It leverages valid accounts after gaining credentials for use within the victim domain. |
Valid Accounts:Domain Accounts | It has used compromised domain accounts to gain access to the target environment. |
Valid Accounts:Domain Accounts | Cobalt Strike can use known credentials to run commands and spawn processes as a domain user account. |
Valid Accounts:Domain Accounts | CreepySnail can use stolen credentials to authenticate on target networks. |
Valid Accounts:Domain Accounts | It has collected credentials from infected systems, including domain accounts. |
Valid Accounts:Domain Accounts | It has used domain administrator accounts after dumping LSASS process memory. |
Valid Accounts:Domain Accounts | It has used administrator credentials for lateral movement in compromised networks. |
Valid Accounts:Domain Accounts | During Night Dragon, threat actors used domain accounts to gain further access to victim systems. |
Valid Accounts:Domain Accounts | During Operation CuckooBees, the threat actors used compromised domain administrator credentials as part of their lateral movement. |
Valid Accounts:Domain Accounts | For Operation Ghost, It used stolen administrator credentials for lateral movement on compromised networks. |
Valid Accounts:Domain Accounts | During Operation Wocao, threat actors used domain credentials, including domain admin, for lateral movement and privilege escalation. |
Valid Accounts:Domain Accounts | Ryuk can use stolen domain admin accounts to move laterally within a victim domain. |
Valid Accounts:Domain Accounts | It has used stolen credentials to access administrative accounts within the domain. |
Valid Accounts:Domain Accounts | If Shamoon cannot access shares using current privileges, it attempts access using hard coded, domain-specific credentials gathered earlier in the intrusion. |
Valid Accounts:Domain Accounts | During the SolarWinds Compromise, It used domain administrators' accounts to help facilitate lateral movement on compromised networks. |
Valid Accounts:Domain Accounts | Stuxnet attempts to access network resources with a domain account’s credentials. |
Valid Accounts:Domain Accounts | It has used stolen domain admin accounts to compromise additional hosts. |
Valid Accounts:Domain Accounts | It actors used compromised domain credentials for the victim's endpoint management platform, Altiris, to move laterally. |
Valid Accounts:Domain Accounts | It has used compromised domain accounts to authenticate to devices on compromised networks. |
Valid Accounts:Domain Accounts | It has used administrative accounts, including Domain Admin, to move laterally within a victim network. |
Valid Accounts:Local Accounts | It has used legitimate local admin account credentials. |
Valid Accounts:Local Accounts | Cobalt Strike can use known credentials to run commands and spawn processes as a local user account. |
Valid Accounts:Local Accounts | Emotet can brute force a local admin password, then use it to facilitate lateral movement. |
Valid Accounts:Local Accounts | It has moved laterally using the Local Administrator account. |
Valid Accounts:Local Accounts | It has used the NT AUTHORITY\SYSTEM account to create files on Exchange servers. |
Valid Accounts:Local Accounts | It has used a tool called GREASE to add a Windows admin account in order to allow them continued access via RDP. |
Valid Accounts:Local Accounts | NotPetya can use valid credentials with PsExec or wmic to spread itself to remote systems. |
Valid Accounts:Local Accounts | During Operation Wocao, threat actors used local account credentials found during the intrusion for lateral movement and privilege escalation. |
Valid Accounts:Local Accounts | It has created admin accounts on a compromised host. |
Valid Accounts:Local Accounts | During the SolarWinds Compromise, It used compromised local accounts to access victims' networks. |
Valid Accounts:Local Accounts | It has used known administrator account credentials to execute the backdoor directly. |
Valid Accounts:Local Accounts | It has abused local accounts that have the same password across the victim’s network. |
Valid Accounts:Local Accounts | Umbreon creates valid local users to provide access to the system. |
Valid Accounts:Cloud Accounts | It has used compromised Office 365 service accounts with Global Administrator privileges to collect email from user inboxes. |
Valid Accounts:Cloud Accounts | It has gained access to a global administrator account in Azure AD and has used Service Principal credentials in Exchange. |
Valid Accounts:Cloud Accounts | It has used compromised Office 365 accounts in tandem with Ruler in an attempt to gain control of endpoints. |
Valid Accounts:Cloud Accounts | During C0027, It leveraged compromised credentials from victim users to authenticate to Azure tenants. |
Valid Accounts:Cloud Accounts | It has used compromised credentials to sign into victims’ Microsoft 365 accounts. |
Valid Accounts:Cloud Accounts | It has used compromised credentials to access cloud assets within a target organization. |
Valid Accounts:Cloud Accounts | Pacu leverages valid cloud accounts to perform most of its operations. |
Valid Accounts:Cloud Accounts | Peirates can use stolen service account tokens to perform its operations. |
Valid Accounts:Cloud Accounts | ROADTools leverages valid cloud credentials to perform enumeration operations using the internal Azure AD Graph API. |
Valid Accounts:Cloud Accounts | During the SolarWinds Compromise, It used a compromised O365 administrator account to create a new Service Principal. |
Abuse Elevation Control Mechanism:Setuid and Setgid | Exaramel for Linux can execute commands with high privileges via a specific binary with setuid functionality. |
Abuse Elevation Control Mechanism:Setuid and Setgid | Keydnap adds the setuid flag to a binary so it can easily elevate in the future. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.