text1
stringlengths 7
2.5k
| labels
stringlengths 9
100
|
---|---|
Rocke exploited Apache Struts, Oracle WebLogic (CVE-2017-10271), and Adobe ColdFusion (CVE-2017-3066) vulnerabilities to deliver malware. | ['T1190'] |
SoreFang can gain access by exploiting a Sangfor SSL VPN vulnerability that allows for the placement and delivery of malicious update binaries. | ['T1190'] |
Threat Group-3390 has exploited the Microsoft SharePoint vulnerability CVE-2019-0604 and CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065 in Exchange Server. | ['T1190'] |
Volatile Cedar has targeted publicly facing web servers, with both automatic and manual vulnerability discovery. | ['T1190'] |
menuPass has leveraged vulnerabilities in Pulse Secure VPNs to hijack sessions. | ['T1190'] |
sqlmap can be used to automate exploitation of SQL injection vulnerabilities. | ['T1190'] |
Elderwood has targeted manufacturers in the supply chain for the defense industry. | ['T1195'] |
NotPetya's initial infection vector for the June 27, 2017 compromise was a backdoor in the Ukrainian tax accounting software M.E.Doc. | ['T1195'] |
Smoke Loader was distributed through a compromised update to a Tor client with a coin miner payload. | ['T1195'] |
XCSSET adds malicious code to a host's Xcode projects by enumerating CocoaPods "target_integrator.rb" files under the "/Library/Ruby/Gems" folder or enumerates all ".xcodeproj" folders under a given directory. XCSSET then downloads a script and Mach-O file into the Xcode project folder. | ['T1195.001'] |
APT29 gained initial network access to some victims via a trojanized update of SolarWinds Orion software. | ['T1195.002'] |
APT41 gained access to production environments where they could inject malicious code into legitimate, signed files and widely distribute them to end users. | ['T1195.002'] |
Cobalt Group has compromised legitimate web browser updates to deliver a backdoor. | ['T1195.002'] |
Dragonfly has placed trojanized installers for control system software on legitimate vendor app stores. | ['T1195.002'] |
GOLD SOUTHFIELD has distributed ransomware by backdooring software installers via a strategic web compromise of the site hosting Italian WinRAR. | ['T1195.002'] |
Gelsemium has compromised software supply chains to gain access to victims. | ['T1195.002'] |
GoldenSpy has been packaged with a legitimate tax preparation software. | ['T1195.002'] |
SUNSPOT malware was designed and used to insert SUNBURST into software builds of the SolarWinds Orion IT management product. | ['T1195.002'] |
Sandworm Team has distributed NotPetya by compromising the legitimate Ukrainian accounting software M.E.Doc and replacing a legitimate software update with a malicious one. | ['T1195.002'] |
Threat Group-3390 has compromised the Able Desktop installer to gain access to victim's environments. | ['T1195.002'] |
A JPIN variant downloads the backdoor payload via the BITS service. | ['T1197'] |
APT39 has used the BITS protocol to exfiltrate stolen data from a compromised host. | ['T1197'] |
BITSAdmin can be used to create BITS Jobs to launch a malicious process. | ['T1197'] |
Cobalt Strike can download a hosted "beacon" payload using BITSAdmin. | ['T1197'] |
Egregor has used BITSadmin to download and execute malicious DLLs. | ['T1197'] |
Leviathan has used BITSAdmin to download additional tools. | ['T1197'] |
MarkiRAT can use BITS Utility to connect with the C2 server. | ['T1197'] |
Patchwork has used BITS jobs to download malicious payloads. | ['T1197'] |
ProLock can use BITS jobs to download its malicious payload. | ['T1197'] |
UBoatRAT takes advantage of the /SetNotifyCmdLine option in BITSAdmin to ensure it stays running on a system to maintain persistence. | ['T1197'] |
APT29 has gained access through compromised accounts at cloud solution partners, and used compromised certificates issued by Mimecast to authenticate to Mimecast customer systems. | ['T1199'] |
GOLD SOUTHFIELD has breached Managed Service Providers (MSP's) to deliver malware to MSP customers. | ['T1199'] |
LAPSUS$ has accessed internet-facing identity providers such as Azure Active Directory and Okta to target specific organizations. | ['T1199'] |
Once APT28 gained access to the DCCC network, the group then proceeded to use that access to compromise the DNC network. | ['T1199'] |
POLONIUM has used compromised credentials from an IT company to target downstream customers including a law firm and aviation company. | ['T1199'] |
Sandworm Team has used dedicated network connections from one victim organization to gain unauthorized access to a separate organization. | ['T1199'] |
APT34 has used net.exe in a script with "net accounts /domain" to find the password policy of a domain. | ['T1201'] |
BloodHound can collect password policy information on the target environment. | ['T1201'] |
During Operation CuckooBees, the threat actors used the `net accounts` command as part of their advanced reconnaissance. | ['T1201'] |
Kwampirs collects password policy information with the command "net accounts". | ['T1201'] |
OilRig has used net.exe in a script with "net accounts /domain" to find the password policy of a domain. | ['T1201'] |
The "net accounts" and "net accounts /domain" commands with Net can be used to obtain password policy information. | ['T1201'] |
Turla has used "net accounts" and "net accounts /domain" to acquire password policy information. | ['T1201'] |
Forfiles can be used to subvert controls and possibly conceal command execution by not directly invoking cmd. | ['T1202'] |
Lazarus Group persistence mechanisms have used "forfiles.exe" to execute .htm files. | ['T1202'] |
APT12 has exploited multiple vulnerabilities for execution, including Microsoft Office vulnerabilities (CVE-2009-3129, CVE-2012-0158) and vulnerabilities in Adobe Reader and Flash (CVE-2009-4324, CVE-2009-0927, CVE-2011-0609, CVE-2011-0611). | ['T1203'] |
APT28 has exploited Microsoft Office vulnerability CVE-2017-0262 for execution. | ['T1203'] |
APT29 has used multiple software exploits for common client software, like Microsoft Word, Exchange, and Adobe Reader, to gain code execution. | ['T1203'] |
APT3 has exploited the Adobe Flash Player vulnerability CVE-2015-3113 and Internet Explorer vulnerability CVE-2014-1776. | ['T1203'] |
APT32 has used RTF document that includes an exploit to execute malicious code. (CVE-2017-11882) | ['T1203'] |
APT33 has attempted to exploit a known vulnerability in WinRAR (CVE-2018-20250), and attempted to gain remote code execution via a security bypass vulnerability (CVE-2017-11774). | ['T1203'] |
APT37 has used exploits for Flash Player (CVE-2016-4117, CVE-2018-4878), Word (CVE-2017-0199), Internet Explorer (CVE-2020-1380 and CVE-2020-26411), and Microsoft Edge (CVE-2021-26411) for execution. | ['T1203'] |
APT41 leveraged the follow exploits in their operations: CVE-2012-0158, CVE-2015-1641, CVE-2017-0199, CVE-2017-11882, and CVE-2019-3396. | ['T1203'] |
Agent Tesla exploits CVE-2017-11882 in Microsoft’s Equation Editor to execute a process. | ['T1203'] |
Agent Tesla has exploited Office vulnerabilities such as CVE-2017-11882 and CVE-2017-8570 for execution during delivery. | ['T1203'] |
Aoqin Dragon has exploited CVE-2012-0158 and CVE-2010-3333 for execution against targeted systems. | ['T1203'] |
Axiom has used exploits for multiple vulnerabilities including CVE-2014-0322, CVE-2012-4792, CVE-2012-1889, and CVE-2013-3893. | ['T1203'] |
BITTER has exploited Microsoft Office vulnerabilities CVE-2012-0158, CVE-2017-11882, CVE-2018-0798, and CVE-2018-0802. | ['T1203'] |
BRONZE BUTLER has exploited Microsoft Office vulnerabilities CVE-2014-4114, CVE-2018-0802, and CVE-2018-0798 for execution. | ['T1203'] |
Bankshot leverages a known zero-day vulnerability in Adobe Flash to execute the implant into the victims’ machines. | ['T1203'] |
Cobalt Strike can exploit Oracle Java vulnerabilities for execution, including CVE-2011-3544, CVE-2013-2465, CVE-2012-4681, and CVE-2013-2460. | ['T1203'] |
Confucius has exploited Microsoft Office vulnerabilities, including CVE-2015-1641, CVE-2017-11882, and CVE-2018-0802. | ['T1203'] |
Dragonfly has exploited CVE-2011-0611 in Adobe Flash Player to gain execution on a targeted system. | ['T1203'] |
During Frankenstein, the threat actors exploited CVE-2017-11882 to execute code on the victim's machine. | ['T1203'] |
During Operation Dust Storm, the threat actors exploited Adobe Flash vulnerability CVE-2011-0611, Microsoft Windows Help vulnerability CVE-2010-1885, and several Internet Explorer vulnerabilities, including CVE-2011-1255, CVE-2012-1889, and CVE-2014-0322. | ['T1203'] |
EXOTIC LILY has used malicious documents containing exploits for CVE-2021-40444 affecting Microsoft MSHTML. | ['T1203'] |
Elderwood has used exploitation of endpoint software, including Microsoft Internet Explorer Adobe Flash vulnerabilities, to gain execution. They have also used zero-day exploits. | ['T1203'] |
Ember Bear has exploited Microsoft Office vulnerability CVE-2017-11882. | ['T1203'] |
EvilBunny has exploited CVE-2011-4369, a vulnerability in the PRC component in Adobe Reader. | ['T1203'] |
Inception has exploited CVE-2012-0158, CVE-2014-1761, CVE-2017-11882 and CVE-2018-0802 for execution. | ['T1203'] |
InvisiMole has installed legitimate but vulnerable Total Video Player software and wdigest.dll library drivers on compromised hosts to exploit stack overflow and input validation vulnerabilities for code execution. | ['T1203'] |
KeyBoy exploits the vulnerability CVE-2012-0158 for execution. | ['T1203'] |
Lazarus Group has exploited Adobe Flash vulnerability CVE-2018-4878 for execution. | ['T1203'] |
Leviathan has exploited multiple Microsoft Office and .NET vulnerabilities for execution, including CVE-2017-0199, CVE-2017-8759, and CVE-2017-11882. | ['T1203'] |
MuddyWater has exploited the Office vulnerability CVE-2017-0199 for execution. | ['T1203'] |
Patchwork uses malicious documents to deliver remote execution exploits as part of. The group has previously exploited CVE-2017-8570, CVE-2012-1856, CVE-2014-4114, CVE-2017-0199, CVE-2017-11882, and CVE-2015-1641. | ['T1203'] |
Ramsay has been embedded in documents exploiting CVE-2017-0199, CVE-2017-11882, and CVE-2017-8570. | ['T1203'] |
SUPERNOVA was installed via exploitation of a SolarWinds Orion API authentication bypass vulnerability (CVE-2020-10148). | ['T1203'] |
Sandworm Team has exploited vulnerabilities in Microsoft PowerPoint via OLE objects (CVE-2014-4114) and Microsoft Word via crafted TIFF images (CVE-2013-3906). | ['T1203'] |
SpeakUp attempts to exploit the following vulnerabilities in order to execute its malicious script: CVE-2012-0874, CVE-2010-1871, CVE-2017-10271, CVE-2018-2894, CVE-2016-3088, JBoss AS 3/4/5/6, and the Hadoop YARN ResourceManager. | ['T1203'] |
The White Company has taken advantage of a known vulnerability in Microsoft Word (CVE 2012-0158) to execute code. | ['T1203'] |
Threat Group-3390 has exploited CVE-2018-0798 in Equation Editor. | ['T1203'] |
Tonto Team has exploited Microsoft vulnerabilities, including CVE-2018-0798, CVE-2018-8174, CVE-2018-0802, CVE-2017-11882, CVE-2019-9489 CVE-2020-8468, and CVE-2018-0798 to enable execution of their delivered malicious payloads. | ['T1203'] |
Transparent Tribe has crafted malicious files to exploit CVE-2012-0158 and CVE-2010-3333 for execution. | ['T1203'] |
Tropic Trooper has executed commands through Microsoft security vulnerabilities, including CVE-2017-11882, CVE-2018-0802, and CVE-2012-0158. | ['T1203'] |
admin@338 has exploited client software vulnerabilities for execution, such as Microsoft Word CVE-2012-0158. | ['T1203'] |
LAPSUS$ has recruited target organization employees or contractors who provide credentials and approve an associated MFA prompt, or install remote management software onto a corporate workstation, allowing LAPSUS$ to take control of an authenticated system. | ['T1204'] |
Magic Hound has attempted to get users to execute malware via social media and spearphishing emails. | ['T1204'] |
APT29 has used various forms of spearphishing attempting to get a user to click on a malicous link. | ['T1204.001'] |
APT32 has lured targets to download a Cobalt Strike beacon by including a malicious link within spearphishing emails. | ['T1204.001'] |
APT33 has lured users to click links to malicious HTML applications delivered via spearphishing emails. | ['T1204.001'] |
APT39 has sent spearphishing emails in an attempt to lure users to click on a malicious link. | ['T1204.001'] |
Bazar can gain execution after a user clicks on a malicious link to decoy landing pages hosted on Google Docs. | ['T1204.001'] |
Cobalt Group has sent emails containing malicious links that require users to execute a file or macro to infect the victim machine. | ['T1204.001'] |
Dragonfly 2.0 has used various forms of spearphishing in attempts to get users to open links. | ['T1204.001'] |
During Night Dragon, threat actors enticed users to click on links in spearphishing emails to download malware. | ['T1204.001'] |
During Operation Spalax, the threat actors relied on a victim to click on a malicious link distributed via phishing emails. | ['T1204.001'] |
EXOTIC LILY has used malicious links to lure users into executing malicious payloads. | ['T1204.001'] |
Earth Lusca has sent spearphishing emails that required the user to click on a malicious link and subsequently open a decoy document with a malicious loader. | ['T1204.001'] |
Elderwood has leveraged multiple types of spearphishing in order to attempt to get a user to open links. | ['T1204.001'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.