text1
stringlengths
7
2.5k
labels
stringlengths
9
100
Rocke exploited Apache Struts, Oracle WebLogic (CVE-2017-10271), and Adobe ColdFusion (CVE-2017-3066) vulnerabilities to deliver malware.
['T1190']
SoreFang can gain access by exploiting a Sangfor SSL VPN vulnerability that allows for the placement and delivery of malicious update binaries.
['T1190']
Threat Group-3390 has exploited the Microsoft SharePoint vulnerability CVE-2019-0604 and CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065 in Exchange Server.
['T1190']
Volatile Cedar has targeted publicly facing web servers, with both automatic and manual vulnerability discovery.
['T1190']
menuPass has leveraged vulnerabilities in Pulse Secure VPNs to hijack sessions.
['T1190']
sqlmap can be used to automate exploitation of SQL injection vulnerabilities.
['T1190']
Elderwood has targeted manufacturers in the supply chain for the defense industry.
['T1195']
NotPetya's initial infection vector for the June 27, 2017 compromise was a backdoor in the Ukrainian tax accounting software M.E.Doc.
['T1195']
Smoke Loader was distributed through a compromised update to a Tor client with a coin miner payload.
['T1195']
XCSSET adds malicious code to a host's Xcode projects by enumerating CocoaPods "target_integrator.rb" files under the "/Library/Ruby/Gems" folder or enumerates all ".xcodeproj" folders under a given directory. XCSSET then downloads a script and Mach-O file into the Xcode project folder.
['T1195.001']
APT29 gained initial network access to some victims via a trojanized update of SolarWinds Orion software.
['T1195.002']
APT41 gained access to production environments where they could inject malicious code into legitimate, signed files and widely distribute them to end users.
['T1195.002']
Cobalt Group has compromised legitimate web browser updates to deliver a backdoor.
['T1195.002']
Dragonfly has placed trojanized installers for control system software on legitimate vendor app stores.
['T1195.002']
GOLD SOUTHFIELD has distributed ransomware by backdooring software installers via a strategic web compromise of the site hosting Italian WinRAR.
['T1195.002']
Gelsemium has compromised software supply chains to gain access to victims.
['T1195.002']
GoldenSpy has been packaged with a legitimate tax preparation software.
['T1195.002']
SUNSPOT malware was designed and used to insert SUNBURST into software builds of the SolarWinds Orion IT management product.
['T1195.002']
Sandworm Team has distributed NotPetya by compromising the legitimate Ukrainian accounting software M.E.Doc and replacing a legitimate software update with a malicious one.
['T1195.002']
Threat Group-3390 has compromised the Able Desktop installer to gain access to victim's environments.
['T1195.002']
A JPIN variant downloads the backdoor payload via the BITS service.
['T1197']
APT39 has used the BITS protocol to exfiltrate stolen data from a compromised host.
['T1197']
BITSAdmin can be used to create BITS Jobs to launch a malicious process.
['T1197']
Cobalt Strike can download a hosted "beacon" payload using BITSAdmin.
['T1197']
Egregor has used BITSadmin to download and execute malicious DLLs.
['T1197']
Leviathan has used BITSAdmin to download additional tools.
['T1197']
MarkiRAT can use BITS Utility to connect with the C2 server.
['T1197']
Patchwork has used BITS jobs to download malicious payloads.
['T1197']
ProLock can use BITS jobs to download its malicious payload.
['T1197']
UBoatRAT takes advantage of the /SetNotifyCmdLine option in BITSAdmin to ensure it stays running on a system to maintain persistence.
['T1197']
APT29 has gained access through compromised accounts at cloud solution partners, and used compromised certificates issued by Mimecast to authenticate to Mimecast customer systems.
['T1199']
GOLD SOUTHFIELD has breached Managed Service Providers (MSP's) to deliver malware to MSP customers.
['T1199']
LAPSUS$ has accessed internet-facing identity providers such as Azure Active Directory and Okta to target specific organizations.
['T1199']
Once APT28 gained access to the DCCC network, the group then proceeded to use that access to compromise the DNC network.
['T1199']
POLONIUM has used compromised credentials from an IT company to target downstream customers including a law firm and aviation company.
['T1199']
Sandworm Team has used dedicated network connections from one victim organization to gain unauthorized access to a separate organization.
['T1199']
APT34 has used net.exe in a script with "net accounts /domain" to find the password policy of a domain.
['T1201']
BloodHound can collect password policy information on the target environment.
['T1201']
During Operation CuckooBees, the threat actors used the `net accounts` command as part of their advanced reconnaissance.
['T1201']
Kwampirs collects password policy information with the command "net accounts".
['T1201']
OilRig has used net.exe in a script with "net accounts /domain" to find the password policy of a domain.
['T1201']
The "net accounts" and "net accounts /domain" commands with Net can be used to obtain password policy information.
['T1201']
Turla has used "net accounts" and "net accounts /domain" to acquire password policy information.
['T1201']
Forfiles can be used to subvert controls and possibly conceal command execution by not directly invoking cmd.
['T1202']
Lazarus Group persistence mechanisms have used "forfiles.exe" to execute .htm files.
['T1202']
APT12 has exploited multiple vulnerabilities for execution, including Microsoft Office vulnerabilities (CVE-2009-3129, CVE-2012-0158) and vulnerabilities in Adobe Reader and Flash (CVE-2009-4324, CVE-2009-0927, CVE-2011-0609, CVE-2011-0611).
['T1203']
APT28 has exploited Microsoft Office vulnerability CVE-2017-0262 for execution.
['T1203']
APT29 has used multiple software exploits for common client software, like Microsoft Word, Exchange, and Adobe Reader, to gain code execution.
['T1203']
APT3 has exploited the Adobe Flash Player vulnerability CVE-2015-3113 and Internet Explorer vulnerability CVE-2014-1776.
['T1203']
APT32 has used RTF document that includes an exploit to execute malicious code. (CVE-2017-11882)
['T1203']
APT33 has attempted to exploit a known vulnerability in WinRAR (CVE-2018-20250), and attempted to gain remote code execution via a security bypass vulnerability (CVE-2017-11774).
['T1203']
APT37 has used exploits for Flash Player (CVE-2016-4117, CVE-2018-4878), Word (CVE-2017-0199), Internet Explorer (CVE-2020-1380 and CVE-2020-26411), and Microsoft Edge (CVE-2021-26411) for execution.
['T1203']
APT41 leveraged the follow exploits in their operations: CVE-2012-0158, CVE-2015-1641, CVE-2017-0199, CVE-2017-11882, and CVE-2019-3396.
['T1203']
Agent Tesla exploits CVE-2017-11882 in Microsoft’s Equation Editor to execute a process.
['T1203']
Agent Tesla has exploited Office vulnerabilities such as CVE-2017-11882 and CVE-2017-8570 for execution during delivery.
['T1203']
Aoqin Dragon has exploited CVE-2012-0158 and CVE-2010-3333 for execution against targeted systems.
['T1203']
Axiom has used exploits for multiple vulnerabilities including CVE-2014-0322, CVE-2012-4792, CVE-2012-1889, and CVE-2013-3893.
['T1203']
BITTER has exploited Microsoft Office vulnerabilities CVE-2012-0158, CVE-2017-11882, CVE-2018-0798, and CVE-2018-0802.
['T1203']
BRONZE BUTLER has exploited Microsoft Office vulnerabilities CVE-2014-4114, CVE-2018-0802, and CVE-2018-0798 for execution.
['T1203']
Bankshot leverages a known zero-day vulnerability in Adobe Flash to execute the implant into the victims’ machines.
['T1203']
Cobalt Strike can exploit Oracle Java vulnerabilities for execution, including CVE-2011-3544, CVE-2013-2465, CVE-2012-4681, and CVE-2013-2460.
['T1203']
Confucius has exploited Microsoft Office vulnerabilities, including CVE-2015-1641, CVE-2017-11882, and CVE-2018-0802.
['T1203']
Dragonfly has exploited CVE-2011-0611 in Adobe Flash Player to gain execution on a targeted system.
['T1203']
During Frankenstein, the threat actors exploited CVE-2017-11882 to execute code on the victim's machine.
['T1203']
During Operation Dust Storm, the threat actors exploited Adobe Flash vulnerability CVE-2011-0611, Microsoft Windows Help vulnerability CVE-2010-1885, and several Internet Explorer vulnerabilities, including CVE-2011-1255, CVE-2012-1889, and CVE-2014-0322.
['T1203']
EXOTIC LILY has used malicious documents containing exploits for CVE-2021-40444 affecting Microsoft MSHTML.
['T1203']
Elderwood has used exploitation of endpoint software, including Microsoft Internet Explorer Adobe Flash vulnerabilities, to gain execution. They have also used zero-day exploits.
['T1203']
Ember Bear has exploited Microsoft Office vulnerability CVE-2017-11882.
['T1203']
EvilBunny has exploited CVE-2011-4369, a vulnerability in the PRC component in Adobe Reader.
['T1203']
Inception has exploited CVE-2012-0158, CVE-2014-1761, CVE-2017-11882 and CVE-2018-0802 for execution.
['T1203']
InvisiMole has installed legitimate but vulnerable Total Video Player software and wdigest.dll library drivers on compromised hosts to exploit stack overflow and input validation vulnerabilities for code execution.
['T1203']
KeyBoy exploits the vulnerability CVE-2012-0158 for execution.
['T1203']
Lazarus Group has exploited Adobe Flash vulnerability CVE-2018-4878 for execution.
['T1203']
Leviathan has exploited multiple Microsoft Office and .NET vulnerabilities for execution, including CVE-2017-0199, CVE-2017-8759, and CVE-2017-11882.
['T1203']
MuddyWater has exploited the Office vulnerability CVE-2017-0199 for execution.
['T1203']
Patchwork uses malicious documents to deliver remote execution exploits as part of. The group has previously exploited CVE-2017-8570, CVE-2012-1856, CVE-2014-4114, CVE-2017-0199, CVE-2017-11882, and CVE-2015-1641.
['T1203']
Ramsay has been embedded in documents exploiting CVE-2017-0199, CVE-2017-11882, and CVE-2017-8570.
['T1203']
SUPERNOVA was installed via exploitation of a SolarWinds Orion API authentication bypass vulnerability (CVE-2020-10148).
['T1203']
Sandworm Team has exploited vulnerabilities in Microsoft PowerPoint via OLE objects (CVE-2014-4114) and Microsoft Word via crafted TIFF images (CVE-2013-3906).
['T1203']
SpeakUp attempts to exploit the following vulnerabilities in order to execute its malicious script: CVE-2012-0874, CVE-2010-1871, CVE-2017-10271, CVE-2018-2894, CVE-2016-3088, JBoss AS 3/4/5/6, and the Hadoop YARN ResourceManager.
['T1203']
The White Company has taken advantage of a known vulnerability in Microsoft Word (CVE 2012-0158) to execute code.
['T1203']
Threat Group-3390 has exploited CVE-2018-0798 in Equation Editor.
['T1203']
Tonto Team has exploited Microsoft vulnerabilities, including CVE-2018-0798, CVE-2018-8174, CVE-2018-0802, CVE-2017-11882, CVE-2019-9489 CVE-2020-8468, and CVE-2018-0798 to enable execution of their delivered malicious payloads.
['T1203']
Transparent Tribe has crafted malicious files to exploit CVE-2012-0158 and CVE-2010-3333 for execution.
['T1203']
Tropic Trooper has executed commands through Microsoft security vulnerabilities, including CVE-2017-11882, CVE-2018-0802, and CVE-2012-0158.
['T1203']
admin@338 has exploited client software vulnerabilities for execution, such as Microsoft Word CVE-2012-0158.
['T1203']
LAPSUS$ has recruited target organization employees or contractors who provide credentials and approve an associated MFA prompt, or install remote management software onto a corporate workstation, allowing LAPSUS$ to take control of an authenticated system.
['T1204']
Magic Hound has attempted to get users to execute malware via social media and spearphishing emails.
['T1204']
APT29 has used various forms of spearphishing attempting to get a user to click on a malicous link.
['T1204.001']
APT32 has lured targets to download a Cobalt Strike beacon by including a malicious link within spearphishing emails.
['T1204.001']
APT33 has lured users to click links to malicious HTML applications delivered via spearphishing emails.
['T1204.001']
APT39 has sent spearphishing emails in an attempt to lure users to click on a malicious link.
['T1204.001']
Bazar can gain execution after a user clicks on a malicious link to decoy landing pages hosted on Google Docs.
['T1204.001']
Cobalt Group has sent emails containing malicious links that require users to execute a file or macro to infect the victim machine.
['T1204.001']
Dragonfly 2.0 has used various forms of spearphishing in attempts to get users to open links.
['T1204.001']
During Night Dragon, threat actors enticed users to click on links in spearphishing emails to download malware.
['T1204.001']
During Operation Spalax, the threat actors relied on a victim to click on a malicious link distributed via phishing emails.
['T1204.001']
EXOTIC LILY has used malicious links to lure users into executing malicious payloads.
['T1204.001']
Earth Lusca has sent spearphishing emails that required the user to click on a malicious link and subsequently open a decoy document with a malicious loader.
['T1204.001']
Elderwood has leveraged multiple types of spearphishing in order to attempt to get a user to open links.
['T1204.001']