text1
stringlengths 7
2.5k
| labels
stringlengths 9
100
|
---|---|
Leafminer has obtained and used tools such as LaZagne, Mimikatz, PsExec, and MailSniper. | ['T1588.002'] |
Moses Staff has used the commercial tool DiskCryptor. | ['T1588.002'] |
MuddyWater has made use of legitimate tools ConnectWise and Remote Utilities to gain access to target environment. | ['T1588.002'] |
Night Dragon has obtained and used tools such as gsecdump. | ['T1588.002'] |
POLONIUM has obtained and used tools such as AirVPN and plink in their operations. | ['T1588.002'] |
PittyTiger has obtained and used tools such as Mimikatz and gsecdump. | ['T1588.002'] |
Sandworm Team has acquired open-source tools for some of it's operations; for example it acquired Invoke-PSImage to establish an encrypted channel from a compromised host to Sandworm Team's C2 server as part of its preparation for the 2018 Winter Olympics attack. | ['T1588.002'] |
Silent Librarian has obtained free and publicly available tools including SingleFile and HTTrack to copy login pages of targeted organizations. | ['T1588.002'] |
TA505 has used a variety of tools in their operations, including AdFind, BloodHound, Mimikatz, and PowerSploit. | ['T1588.002'] |
TEMP.Veles has obtained and used tools such as Mimikatz and PsExec. | ['T1588.002'] |
Threat Group-3390 has obtained and used tools such as Impacket, pwdump, Mimikatz, gsecdump, NBTscan, and Windows Credential Editor. | ['T1588.002'] |
Turla has obtained and customized publicly-available tools like Mimikatz. | ['T1588.002'] |
WIRTE has obtained and used Empire for post-exploitation activities. | ['T1588.002'] |
Whitefly has obtained and used tools such as Mimikatz. | ['T1588.002'] |
Wizard Spider has obtained and used publicly-available post-exploitation frameworks and tools like Metasploit, Empire, Mimikatz. | ['T1588.002'] |
menuPass has used and modified open-source tools like Impacket, Mimikatz, and pwdump. | ['T1588.002'] |
Ember Bear has stolen legitimate certificates to sign malicious payloads. | ['T1588.003'] |
Lazarus Group has used code signing certificates issued by Sectigo RSA for some of its malware and tools. | ['T1588.003'] |
MegaCortex has used code signing certificates issued to fake companies to bypass security controls. | ['T1588.003'] |
Wizard Spider obtained a code signing certificate signed by Digicert for some of its malware. | ['T1588.003'] |
BlackTech has used valid, stolen digital certificates for some of their malware and tools. | ['T1588.004'] |
Kimsuky has obtained exploit code for various CVEs. | ['T1588.005'] |
In 2017, Sandworm Team conducted technical research related to vulnerabilities associated with websites used by the Korean Sport and Olympic Committee, a Korean power company, and a Korean airport. | ['T1588.006'] |
APT32 has conducted targeted surveillance against activists and bloggers. | ['T1589'] |
HEXANE has identified specific potential victims at targeted organizations. | ['T1589'] |
LAPSUS$ has gathered detailed information of target employees to enhance their social engineering lures. | ['T1589'] |
APT28 has harvested user's login credentials. | ['T1589.001'] |
APT29 has conducted credential theft operations to obtain credentials to be used for access to victim environments. | ['T1589.001'] |
Chimera has collected credentials for the target organization from previous breaches for use in brute force attacks. | ['T1589.001'] |
LAPSUS$ has gathered user identities and credentials to gain initial access to a victim's organization; the group has also called an organization's help desk to reset a target's credentials. | ['T1589.001'] |
Magic Hound gathered credentials from two victims that they then attempted to validate across 75 different websites. | ['T1589.001'] |
AADInternals can check for the existence of user email addresses using public Microsoft APIs. | ['T1589.002'] |
APT32 has collected e-mail addresses for activists and bloggers in order to target them with spyware. | ['T1589.002'] |
EXOTIC LILY has gathered targeted individuals' e-mail addresses through open source research and website contact forms. | ['T1589.002'] |
HEXANE has targeted executives, human resources staff, and IT personnel for spearphishing. | ['T1589.002'] |
Kimsuky has collected valid email addresses that were subsequently used in spearphishing campaigns. | ['T1589.002'] |
Lazarus Group collected email addresses belonging to various departments of a targeted organization which were used in follow-on phishing campaigns. | ['T1589.002'] |
Sandworm Team has obtained valid emails addresses while conducting research against target organizations that were subsequently used in spearphishing campaigns. | ['T1589.002'] |
Silent Librarian has collected e-mail addresses from targeted organizations from open Internet searches. | ['T1589.002'] |
Sandworm Team's research of potential victim organizations included the identification and collection of employee information. | ['T1589.003'] |
Silent Librarian has collected lists of names for individuals from targeted organizations. | ['T1589.003'] |
AADInternals can gather information about a tenant’s domains using public Microsoft APIs. | ['T1590.001'] |
Sandworm Team conducted technical reconnaissance of the Parliament of Georgia's official internet domain prior to its 2019 attack. | ['T1590.001'] |
Andariel has limited its watering hole attacks to specific IP address ranges. | ['T1590.005'] |
Lazarus Group has studied publicly available information about a targeted organization to tailor spearphishing efforts against specific departments and/or individuals. | ['T1591'] |
Dragonfly has collected open source information to identify relationships between organizations for targeting purposes. | ['T1591.002'] |
LAPSUS$ has gathered detailed knowledge of an organization's supply chain relationships. | ['T1591.002'] |
HEXANE has identified executives, HR, and IT staff at victim organizations for further targeting. | ['T1591.004'] |
LAPSUS$ has gathered detailed knowledge of team structures within a target organization. | ['T1591.004'] |
Lazarus Group has targeted specific individuals within an organization with tailored job vacancy announcements. | ['T1591.004'] |
Andariel has inserted a malicious script within compromised websites to collect potential victim information such as browser type, system language, Flash Player version, and other data. | ['T1592.002'] |
Sandworm Team has researched software code to enable supply-chain operations, most notably for the 2017 NotPetya attack. Sandworm Team also collected a list of computers using specific software as part of its targeting efforts. | ['T1592.002'] |
HAFNIUM has interacted with Office 365 tenants to gather details regarding target's environments. | ['T1592.004'] |
EXOTIC LILY has copied data from social media sites to impersonate targeted individuals. | ['T1593.001'] |
Kimsuky has used Twitter to monitor potential victims and to prepare targeted phishing e-mails. | ['T1593.001'] |
Lazarus Group has used LinkedIn to identify and target specific employees within a chosen organization. | ['T1593.001'] |
Kimsuky has searched for vulnerabilities, tools, and geopolitical trends on Google to target victims. | ['T1593.002'] |
LAPSUS$ has searched public code repositories for exposed credentials. | ['T1593.003'] |
EXOTIC LILY has used contact forms on victim websites to generate phishing e-mails. | ['T1594'] |
Kimsuky has searched for information on the target company's website. | ['T1594'] |
Sandworm Team has conducted research against potential victim websites as part of its operational planning. | ['T1594'] |
TeamTNT has scanned specific lists of target IP addresses. | ['T1595.001'] |
APT28 has performed large-scale scans in an attempt to find vulnerable servers. | ['T1595.002'] |
APT29 has conducted widespread scanning of target environments to identify vulnerabilities for exploit. | ['T1595.002'] |
Earth Lusca has scanned for vulnerabilities in the public-facing servers of their targets. | ['T1595.002'] |
Magic Hound has conducted widespread scanning to identify public-facing systems vulnerable to Log4j (CVE-2021-44228). | ['T1595.002'] |
Sandworm Team has scanned network infrastructure for vulnerabilities as part of its operational planning. | ['T1595.002'] |
TeamTNT has scanned for vulnerabilities in IoT devices and other related resources such as the Docker API. | ['T1595.002'] |
Volatile Cedar has used DirBuster and GoBuster to brute force web directories and DNS subdomains. | ['T1595.003'] |
EXOTIC LILY has searched for information on targeted individuals on business databases including RocketReach and CrunchBase. | ['T1597'] |
LAPSUS$ has purchased credentials and session tokens from criminal underground forums. | ['T1597.002'] |
APT28 has used spearphishing to compromise credentials. | ['T1598'] |
ZIRCONIUM targeted presidential campaign staffers with credential phishing e-mails. | ['T1598'] |
Astaroth has been delivered via malicious e-mail attachments. | ['T1598.002'] |
Dragonfly has used spearphishing with Microsoft Office attachments to enable harvesting of user credentials. | ['T1598.002'] |
Sidewinder has sent e-mails with malicious attachments that lead victims to credential harvesting websites. | ['T1598.002'] |
AADInternals can send phishing emails containing malicious links designed to collect users’ credentials. | ['T1598.003'] |
APT28 has conducted credential phishing campaigns with embedded links to attacker-controlled domains. | ['T1598.003'] |
APT32 has used malicious links to direct users to web pages designed to harvest credentials. | ['T1598.003'] |
Dragonfly has used spearphishing with PDF attachments containing malicious links that redirected to credential harvesting websites. | ['T1598.003'] |
Kimsuky has used links in e-mail to steal account information. | ['T1598.003'] |
Magic Hound has used SMS and email messages with links designed to steal credentials. | ['T1598.003'] |
SMOKEDHAM has been delivered via malicious links in phishing emails. | ['T1598.003'] |
Sandworm Team has crafted spearphishing emails with hyperlinks designed to trick unwitting recipients into revealing their account credentials. | ['T1598.003'] |
Sidewinder has sent e-mails with malicious links to credential harvesting websites. | ['T1598.003'] |
Silent Librarian has used links in e-mails to direct victims to credential harvesting websites designed to appear like the targeted organization's login page. | ['T1598.003'] |
SYNful Knock is malware that is inserted into a network device by patching the operating system image. | ['T1601.001'] |
APT29 has bypassed MFA set on OWA accounts by generating a cookie value from a previously stolen secret key. | ['T1606.001'] |
AADInternals can be used to create SAML tokens using the AD Federated Services token signing certificate. | ['T1606.002'] |
APT29 created tokens using compromised SAML signing certificates. | ['T1606.002'] |
UNC2452 created tokens using compromised SAML signing certificates. | ['T1606.002'] |
Mustang Panda has used servers under their control to validate tracking pixels sent to phishing victims. | ['T1608'] |
APT32 has hosted malicious payloads in Dropbox, Amazon S3, and Google Drive for use during targeting. | ['T1608.001'] |
BITTER has registered domains to stage payloads. | ['T1608.001'] |
During Night Dragon, threat actors uploaded commonly available hacker tools to compromised web servers. | ['T1608.001'] |
EXOTIC LILY has uploaded malicious payloads to file-sharing services including TransferNow, TransferXL, WeTransfer, and OneDrive. | ['T1608.001'] |
Earth Lusca has staged malware and malicious files on compromised web servers, GitHub, and Google Drive. | ['T1608.001'] |
For C0011, Transparent Tribe hosted malicious documents on domains registered by the group. | ['T1608.001'] |
For Operation Sharpshooter, the threat actors staged malicious files on Dropbox and other websites. | ['T1608.001'] |
For Operation Spalax, the threat actors staged malware and malicious files in legitimate hosting services such as OneDrive or MediaFire. | ['T1608.001'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.