prompt
stringclasses
508 values
procedure
stringlengths
20
478
Phishing:Spearphishing Attachment
Pony has been delivered via spearphishing attachments.
Phishing:Spearphishing Attachment
QakBot has spread through emails with malicious attachments.
Phishing:Spearphishing Attachment
Ramsay has been distributed through spearphishing emails with malicious attachments.
Phishing:Spearphishing Attachment
It has attached a malicious document to an email to gain initial access.
Phishing:Spearphishing Attachment
REvil has been distributed via malicious e-mail attachments including MS Word Documents.
Phishing:Spearphishing Attachment
Rifdoor has been distributed in e-mails with malicious Excel or Word documents.
Phishing:Spearphishing Attachment
ROKRAT has been delivered via spearphishing emails that contain a malicious Hangul Office or Microsoft Word document.
Phishing:Spearphishing Attachment
It has been delivered via spearphishing attachments disguised as PDF documents.
Phishing:Spearphishing Attachment
It has used spearphishing attachments to distribute its malware.
Phishing:Spearphishing Attachment
Saint Bot has been distributed as malicious attachments within spearphishing emails.
Phishing:Spearphishing Attachment
It has delivered malicious Microsoft Office attachments via spearphishing emails.
Phishing:Spearphishing Attachment
It has sent spearphishing emails with malicious hta file attachments.
Phishing:Spearphishing Attachment
It has sent e-mails with malicious attachments often crafted for specific targets.
Phishing:Spearphishing Attachment
It has sent emails with malicious DOCX, CHM, LNK and ZIP attachments.
Phishing:Spearphishing Attachment
Snip3 has been delivered to victims through malicious e-mail attachments.
Phishing:Spearphishing Attachment
Squirrelwaffle has been distributed via malicious Microsoft Office documents within spam emails.
Phishing:Spearphishing Attachment
SVCReady has been distributed via spearphishing campaigns containing malicious Mircrosoft Word documents.
Phishing:Spearphishing Attachment
It has sent phishing emails with malicious attachments for initial access including MS Word documents.
Phishing:Spearphishing Attachment
It has targeted victims using spearphishing emails with malicious Microsoft Word attachments.
Phishing:Spearphishing Attachment
It has used spearphishing emails with malicious attachments to initially compromise victims.
Phishing:Spearphishing Attachment
It has sent spearphishing attachments with password protected ZIP files.
Phishing:Spearphishing Attachment
Taidoor has been delivered through spearphishing emails.
Phishing:Spearphishing Attachment
It has sent phishing emails with malicious Microsoft Word attachments to victims.
Phishing:Spearphishing Attachment
It has used e-mail to deliver malicious attachments to victims.
Phishing:Spearphishing Attachment
ThreatNeedle has been distributed via a malicious Word document within a spearphishing email.
Phishing:Spearphishing Attachment
It has delivered payloads via spearphishing attachments.
Phishing:Spearphishing Attachment
It has sent spearphishing e-mails with attachments to deliver malicious payloads.
Phishing:Spearphishing Attachment
TrickBot has used an email with an Excel sheet containing a malicious macro to deploy the malware
Phishing:Spearphishing Attachment
It sent spearphishing emails that contained malicious Microsoft Office and fake installer file attachments.
Phishing:Spearphishing Attachment
Valak has been delivered via spearphishing e-mails with password protected ZIP files.
Phishing:Spearphishing Attachment
WarzoneRAT has been distributed as a malicious attachment within an email.
Phishing:Spearphishing Attachment
It has sent spearphishing emails with attachment to harvest credentials and deliver malware.
Phishing:Spearphishing Attachment
It has sent emails to intended victims with malicious MS Word and Excel attachments.
Phishing:Spearphishing Attachment
It has used spearphishing attachments to deliver Microsoft documents containing macros or PDFs containing malicious links to download either Emotet, Bokbot, TrickBot, or Bazar.
Phishing:Spearphishing Attachment
Woody RAT has been delivered via malicious Word documents and archive files.
Phishing:Spearphishing Attachment
ZxxZ has been distributed via spearphishing emails, usually containing a malicious RTF or Excel attachment.
Phishing:Spearphishing Link
AADInternals can send "consent phishing" emails containing malicious links designed to steal users’ access tokens.
Phishing:Spearphishing Link
AppleJeus has been distributed via spearphishing link.
Phishing:Spearphishing Link
It has sent spearphishing emails containing hyperlinks to malicious files.
Phishing:Spearphishing Link
It sent spearphishing emails which used a URL-shortener service to masquerade as a legitimate service and to redirect targets to credential harvesting sites.
Phishing:Spearphishing Link
It has used spearphishing with a link to trick victims into clicking on a link to a zip file containing malicious files.
Phishing:Spearphishing Link
It has sent spearphishing emails containing malicious links.
Phishing:Spearphishing Link
It has sent spearphishing emails containing malicious links.
Phishing:Spearphishing Link
It has sent spearphishing emails containing links to .hta files.
Phishing:Spearphishing Link
It leveraged spearphishing emails with malicious links to initially compromise victims.
Phishing:Spearphishing Link
Bazar has been spread via emails with embedded malicious links.
Phishing:Spearphishing Link
It has used spearphishing e-mails with links to cloud services to deliver malware.
Phishing:Spearphishing Link
Bumblebee has been spread through e-mail campaigns with malicious links.
Phishing:Spearphishing Link
During C0011, It sent emails containing a malicious link to student targets in India.
Phishing:Spearphishing Link
During C0021, the threat actors sent phishing emails with unique malicious links, likely for tracking victim clicks.
Phishing:Spearphishing Link
It has sent emails with URLs pointing to malicious documents.
Phishing:Spearphishing Link
It has sent malicious links to victims through email campaigns.
Phishing:Spearphishing Link
It has sent spearphishing emails to potential targets that contained a malicious link.
Phishing:Spearphishing Link
It has delivered zero-day exploits and malware to victims via targeted emails containing a link to malicious content hosted on an uncommon Web server.
Phishing:Spearphishing Link
It has sent spearphishing emails containing malicious links.
Phishing:Spearphishing Link
Emotet has been delivered by phishing emails containing links.
Phishing:Spearphishing Link
It has sent spearphishing emails containing a link to a zip file hosted on Google Drive.
Phishing:Spearphishing Link
It has relied on victims to open malicious links in e-mails for execution.
Phishing:Spearphishing Link
It has used spearphishing emails (often sent from compromised accounts) containing malicious links.
Phishing:Spearphishing Link
It has conducted broad phishing campaigns using malicious links.
Phishing:Spearphishing Link
It has distributed targeted emails containing links to malicious documents with embedded macros.
Phishing:Spearphishing Link
Grandoreiro has been spread via malicious links embedded in e-mails.
Phishing:Spearphishing Link
GuLoader has been spread in phishing campaigns using malicious web links.
Phishing:Spearphishing Link
Hancitor has been delivered via phishing emails which contained malicious links.
Phishing:Spearphishing Link
Javali has been delivered via malicious links embedded in e-mails.
Phishing:Spearphishing Link
Kerrdown has been distributed via e-mails containing a malicious link.
Phishing:Spearphishing Link
It has sent spearphishing emails containing a link to a document that contained malicious macros or took the victim to an actor-controlled domain.
Phishing:Spearphishing Link
KOCTOPUS has been distributed as a malicious link within an email.
Phishing:Spearphishing Link
It has sent malicious links to victims via email.
Phishing:Spearphishing Link
It has used spam emails that contain a link that redirects the victim to download a malicious document.
Phishing:Spearphishing Link
It has sent spearphishing emails with links, often using a fraudulent lookalike domain and stolen branding.
Phishing:Spearphishing Link
It has sent spearphishing emails containing a malicious Dropbox download link.
Phishing:Spearphishing Link
It has sent phishing emails that contain a link to an external server with ZIP and RAR archives.
Phishing:Spearphishing Link
It has sent malicious URL links through email to victims. In some cases the URLs were shortened or linked to Word documents with malicious macros that executed PowerShells scripts to download Pupy.
Phishing:Spearphishing Link
Melcoz has been spread through malicious links embedded in e-mails.
Phishing:Spearphishing Link
It delivered spearphishing emails with malicious links included.
Phishing:Spearphishing Link
It has sent phishing emails with malicious links included.
Phishing:Spearphishing Link
It has sent targeted spearphishing e-mails with malicious links.
Phishing:Spearphishing Link
It has delivered malicious links to their intended targets.
Phishing:Spearphishing Link
NETWIRE has been spread via e-mail campaigns utilizing malicious links.
Phishing:Spearphishing Link
During Night Dragon, threat actors sent spearphishing emails containing links to compromised websites where malware was downloaded.
Phishing:Spearphishing Link
It has sent spearphising emails with malicious links to potential victims.
Phishing:Spearphishing Link
During Operation Dream Job, It sent malicious OneDrive links with fictitious job offer advertisements via email.
Phishing:Spearphishing Link
During Operation Dust Storm, the threat actors sent spearphishing emails containing a malicious link.
Phishing:Spearphishing Link
During Operation Spalax, the threat actors sent phishing emails to victims that contained a malicious link.
Phishing:Spearphishing Link
OutSteel has been distributed through malicious links contained within spearphishing emails.
Phishing:Spearphishing Link
It has used spearphishing with links to deliver files with exploits to initial victims.
Phishing:Spearphishing Link
Pony has been delivered via spearphishing emails which contained malicious links.
Phishing:Spearphishing Link
QakBot has spread through emails with malicious links.
Phishing:Spearphishing Link
Saint Bot has been distributed through malicious links contained within spearphishing emails.
Phishing:Spearphishing Link
It has crafted phishing emails containing malicious hyperlinks.
Phishing:Spearphishing Link
It has sent e-mails with malicious links often crafted for specific targets.
Phishing:Spearphishing Link
Snip3 has been delivered to victims through e-mail links to malicious files.
Phishing:Spearphishing Link
SpicyOmelette has been distributed via emails containing a malicious link that appears to be a PDF document.
Phishing:Spearphishing Link
Squirrelwaffle has been distributed through phishing emails containing a malicious URL.
Phishing:Spearphishing Link
It has used spearphishing e-mails with malicious links to deliver malware.
Phishing:Spearphishing Link
It has sent spearphishing emails containing malicious links.
Phishing:Spearphishing Link
It has embedded links to malicious downloads in e-mails.
Phishing:Spearphishing Link
TrickBot has been delivered via malicious links in phishing e-mails.
Phishing:Spearphishing Link
It attempted to trick targets into clicking on a link featuring a seemingly legitimate domain from Adobe.com to download their malware and gain initial access.