prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Phishing:Spearphishing Attachment | Pony has been delivered via spearphishing attachments. |
Phishing:Spearphishing Attachment | QakBot has spread through emails with malicious attachments. |
Phishing:Spearphishing Attachment | Ramsay has been distributed through spearphishing emails with malicious attachments. |
Phishing:Spearphishing Attachment | It has attached a malicious document to an email to gain initial access. |
Phishing:Spearphishing Attachment | REvil has been distributed via malicious e-mail attachments including MS Word Documents. |
Phishing:Spearphishing Attachment | Rifdoor has been distributed in e-mails with malicious Excel or Word documents. |
Phishing:Spearphishing Attachment | ROKRAT has been delivered via spearphishing emails that contain a malicious Hangul Office or Microsoft Word document. |
Phishing:Spearphishing Attachment | It has been delivered via spearphishing attachments disguised as PDF documents. |
Phishing:Spearphishing Attachment | It has used spearphishing attachments to distribute its malware. |
Phishing:Spearphishing Attachment | Saint Bot has been distributed as malicious attachments within spearphishing emails. |
Phishing:Spearphishing Attachment | It has delivered malicious Microsoft Office attachments via spearphishing emails. |
Phishing:Spearphishing Attachment | It has sent spearphishing emails with malicious hta file attachments. |
Phishing:Spearphishing Attachment | It has sent e-mails with malicious attachments often crafted for specific targets. |
Phishing:Spearphishing Attachment | It has sent emails with malicious DOCX, CHM, LNK and ZIP attachments. |
Phishing:Spearphishing Attachment | Snip3 has been delivered to victims through malicious e-mail attachments. |
Phishing:Spearphishing Attachment | Squirrelwaffle has been distributed via malicious Microsoft Office documents within spam emails. |
Phishing:Spearphishing Attachment | SVCReady has been distributed via spearphishing campaigns containing malicious Mircrosoft Word documents. |
Phishing:Spearphishing Attachment | It has sent phishing emails with malicious attachments for initial access including MS Word documents. |
Phishing:Spearphishing Attachment | It has targeted victims using spearphishing emails with malicious Microsoft Word attachments. |
Phishing:Spearphishing Attachment | It has used spearphishing emails with malicious attachments to initially compromise victims. |
Phishing:Spearphishing Attachment | It has sent spearphishing attachments with password protected ZIP files. |
Phishing:Spearphishing Attachment | Taidoor has been delivered through spearphishing emails. |
Phishing:Spearphishing Attachment | It has sent phishing emails with malicious Microsoft Word attachments to victims. |
Phishing:Spearphishing Attachment | It has used e-mail to deliver malicious attachments to victims. |
Phishing:Spearphishing Attachment | ThreatNeedle has been distributed via a malicious Word document within a spearphishing email. |
Phishing:Spearphishing Attachment | It has delivered payloads via spearphishing attachments. |
Phishing:Spearphishing Attachment | It has sent spearphishing e-mails with attachments to deliver malicious payloads. |
Phishing:Spearphishing Attachment | TrickBot has used an email with an Excel sheet containing a malicious macro to deploy the malware |
Phishing:Spearphishing Attachment | It sent spearphishing emails that contained malicious Microsoft Office and fake installer file attachments. |
Phishing:Spearphishing Attachment | Valak has been delivered via spearphishing e-mails with password protected ZIP files. |
Phishing:Spearphishing Attachment | WarzoneRAT has been distributed as a malicious attachment within an email. |
Phishing:Spearphishing Attachment | It has sent spearphishing emails with attachment to harvest credentials and deliver malware. |
Phishing:Spearphishing Attachment | It has sent emails to intended victims with malicious MS Word and Excel attachments. |
Phishing:Spearphishing Attachment | It has used spearphishing attachments to deliver Microsoft documents containing macros or PDFs containing malicious links to download either Emotet, Bokbot, TrickBot, or Bazar. |
Phishing:Spearphishing Attachment | Woody RAT has been delivered via malicious Word documents and archive files. |
Phishing:Spearphishing Attachment | ZxxZ has been distributed via spearphishing emails, usually containing a malicious RTF or Excel attachment. |
Phishing:Spearphishing Link | AADInternals can send "consent phishing" emails containing malicious links designed to steal users’ access tokens. |
Phishing:Spearphishing Link | AppleJeus has been distributed via spearphishing link. |
Phishing:Spearphishing Link | It has sent spearphishing emails containing hyperlinks to malicious files. |
Phishing:Spearphishing Link | It sent spearphishing emails which used a URL-shortener service to masquerade as a legitimate service and to redirect targets to credential harvesting sites. |
Phishing:Spearphishing Link | It has used spearphishing with a link to trick victims into clicking on a link to a zip file containing malicious files. |
Phishing:Spearphishing Link | It has sent spearphishing emails containing malicious links. |
Phishing:Spearphishing Link | It has sent spearphishing emails containing malicious links. |
Phishing:Spearphishing Link | It has sent spearphishing emails containing links to .hta files. |
Phishing:Spearphishing Link | It leveraged spearphishing emails with malicious links to initially compromise victims. |
Phishing:Spearphishing Link | Bazar has been spread via emails with embedded malicious links. |
Phishing:Spearphishing Link | It has used spearphishing e-mails with links to cloud services to deliver malware. |
Phishing:Spearphishing Link | Bumblebee has been spread through e-mail campaigns with malicious links. |
Phishing:Spearphishing Link | During C0011, It sent emails containing a malicious link to student targets in India. |
Phishing:Spearphishing Link | During C0021, the threat actors sent phishing emails with unique malicious links, likely for tracking victim clicks. |
Phishing:Spearphishing Link | It has sent emails with URLs pointing to malicious documents. |
Phishing:Spearphishing Link | It has sent malicious links to victims through email campaigns. |
Phishing:Spearphishing Link | It has sent spearphishing emails to potential targets that contained a malicious link. |
Phishing:Spearphishing Link | It has delivered zero-day exploits and malware to victims via targeted emails containing a link to malicious content hosted on an uncommon Web server. |
Phishing:Spearphishing Link | It has sent spearphishing emails containing malicious links. |
Phishing:Spearphishing Link | Emotet has been delivered by phishing emails containing links. |
Phishing:Spearphishing Link | It has sent spearphishing emails containing a link to a zip file hosted on Google Drive. |
Phishing:Spearphishing Link | It has relied on victims to open malicious links in e-mails for execution. |
Phishing:Spearphishing Link | It has used spearphishing emails (often sent from compromised accounts) containing malicious links. |
Phishing:Spearphishing Link | It has conducted broad phishing campaigns using malicious links. |
Phishing:Spearphishing Link | It has distributed targeted emails containing links to malicious documents with embedded macros. |
Phishing:Spearphishing Link | Grandoreiro has been spread via malicious links embedded in e-mails. |
Phishing:Spearphishing Link | GuLoader has been spread in phishing campaigns using malicious web links. |
Phishing:Spearphishing Link | Hancitor has been delivered via phishing emails which contained malicious links. |
Phishing:Spearphishing Link | Javali has been delivered via malicious links embedded in e-mails. |
Phishing:Spearphishing Link | Kerrdown has been distributed via e-mails containing a malicious link. |
Phishing:Spearphishing Link | It has sent spearphishing emails containing a link to a document that contained malicious macros or took the victim to an actor-controlled domain. |
Phishing:Spearphishing Link | KOCTOPUS has been distributed as a malicious link within an email. |
Phishing:Spearphishing Link | It has sent malicious links to victims via email. |
Phishing:Spearphishing Link | It has used spam emails that contain a link that redirects the victim to download a malicious document. |
Phishing:Spearphishing Link | It has sent spearphishing emails with links, often using a fraudulent lookalike domain and stolen branding. |
Phishing:Spearphishing Link | It has sent spearphishing emails containing a malicious Dropbox download link. |
Phishing:Spearphishing Link | It has sent phishing emails that contain a link to an external server with ZIP and RAR archives. |
Phishing:Spearphishing Link | It has sent malicious URL links through email to victims. In some cases the URLs were shortened or linked to Word documents with malicious macros that executed PowerShells scripts to download Pupy. |
Phishing:Spearphishing Link | Melcoz has been spread through malicious links embedded in e-mails. |
Phishing:Spearphishing Link | It delivered spearphishing emails with malicious links included. |
Phishing:Spearphishing Link | It has sent phishing emails with malicious links included. |
Phishing:Spearphishing Link | It has sent targeted spearphishing e-mails with malicious links. |
Phishing:Spearphishing Link | It has delivered malicious links to their intended targets. |
Phishing:Spearphishing Link | NETWIRE has been spread via e-mail campaigns utilizing malicious links. |
Phishing:Spearphishing Link | During Night Dragon, threat actors sent spearphishing emails containing links to compromised websites where malware was downloaded. |
Phishing:Spearphishing Link | It has sent spearphising emails with malicious links to potential victims. |
Phishing:Spearphishing Link | During Operation Dream Job, It sent malicious OneDrive links with fictitious job offer advertisements via email. |
Phishing:Spearphishing Link | During Operation Dust Storm, the threat actors sent spearphishing emails containing a malicious link. |
Phishing:Spearphishing Link | During Operation Spalax, the threat actors sent phishing emails to victims that contained a malicious link. |
Phishing:Spearphishing Link | OutSteel has been distributed through malicious links contained within spearphishing emails. |
Phishing:Spearphishing Link | It has used spearphishing with links to deliver files with exploits to initial victims. |
Phishing:Spearphishing Link | Pony has been delivered via spearphishing emails which contained malicious links. |
Phishing:Spearphishing Link | QakBot has spread through emails with malicious links. |
Phishing:Spearphishing Link | Saint Bot has been distributed through malicious links contained within spearphishing emails. |
Phishing:Spearphishing Link | It has crafted phishing emails containing malicious hyperlinks. |
Phishing:Spearphishing Link | It has sent e-mails with malicious links often crafted for specific targets. |
Phishing:Spearphishing Link | Snip3 has been delivered to victims through e-mail links to malicious files. |
Phishing:Spearphishing Link | SpicyOmelette has been distributed via emails containing a malicious link that appears to be a PDF document. |
Phishing:Spearphishing Link | Squirrelwaffle has been distributed through phishing emails containing a malicious URL. |
Phishing:Spearphishing Link | It has used spearphishing e-mails with malicious links to deliver malware. |
Phishing:Spearphishing Link | It has sent spearphishing emails containing malicious links. |
Phishing:Spearphishing Link | It has embedded links to malicious downloads in e-mails. |
Phishing:Spearphishing Link | TrickBot has been delivered via malicious links in phishing e-mails. |
Phishing:Spearphishing Link | It attempted to trick targets into clicking on a link featuring a seemingly legitimate domain from Adobe.com to download their malware and gain initial access. |