text1
stringlengths 7
2.5k
| labels
stringlengths 9
100
|
---|---|
FIN4 has lured victims to click malicious links delivered via spearphishing emails (often sent from compromised accounts). | ['T1204.001'] |
FIN7 has used malicious links to lure victims into downloading malware. | ['T1204.001'] |
Grandoreiro has used malicious links to gain execution on victim machines. | ['T1204.001'] |
Hancitor has relied upon users clicking on a malicious link delivered through phishing. | ['T1204.001'] |
Javali has achieved execution through victims clicking links to malicious websites. | ['T1204.001'] |
KOCTOPUS has relied on victims clicking on a malicious link delivered via email. | ['T1204.001'] |
Kerrdown has gained execution through victims opening malicious links. | ['T1204.001'] |
Kimsuky has lured victims into clicking malicious links. | ['T1204.001'] |
Lazarus Group has sent spearphishing emails in an attempt to lure users to click on a malicious link. | ['T1204.001'] |
LazyScripter has relied upon users clicking on links to malicious files. | ['T1204.001'] |
Leviathan has sent spearphishing email links attempting to get a user to click. | ['T1204.001'] |
Magic Hound has attempted to lure victims into opening malicious links embedded in emails. | ['T1204.001'] |
Melcoz has gained execution through victims opening malicious links. | ['T1204.001'] |
Mofang's spearphishing emails required a user to click the link to connect to a compromised website. | ['T1204.001'] |
MuddyWater has distributed URLs in phishing e-mails that link to lure documents. | ['T1204.001'] |
Mustang Panda has sent malicious links including links directing victims to a Google Drive folder. | ['T1204.001'] |
NETWIRE has been executed through convincing victims into clicking malicious links. | ['T1204.001'] |
ObliqueRAT has gained execution on targeted systems through luring users to click on links to malicious URLs. | ['T1204.001'] |
OilRig has delivered malicious links to achieve execution on the target system. | ['T1204.001'] |
OutSteel has relied on a user to click a malicious link within a spearphishing email. | ['T1204.001'] |
PLEAD has been executed via malicious links in e-mails. | ['T1204.001'] |
QakBot has gained execution through users opening malicious links. | ['T1204.001'] |
SMOKEDHAM has relied upon users clicking on a malicious link delivered through phishing. | ['T1204.001'] |
Sandworm Team has tricked unwitting recipients into clicking on malicious hyperlinks within emails crafted to resemble trustworthy senders. | ['T1204.001'] |
Sidewinder has lured targets to click on malicious links to gain execution in the target environment. | ['T1204.001'] |
SpicyOmelette has been executed through malicious links within spearphishing emails. | ['T1204.001'] |
Squirrelwaffle has relied on victims to click on a malicious link send via phishing campaigns. | ['T1204.001'] |
TSCookie has been executed via malicious links embedded in e-mails spoofing the Ministries of Education, Culture, Sports, Science and Technology of Japan. | ['T1204.001'] |
Transparent Tribe has directed users to open URLs hosting malicious content. | ['T1204.001'] |
Turla has used spearphishing via a link to get users to download and run their malware. | ['T1204.001'] |
Windshift has used links embedded in e-mails to lure victims into executing malicious code. | ['T1204.001'] |
Wizard Spider has lured victims into clicking a malicious link delivered through spearphishing. | ['T1204.001'] |
ZIRCONIUM has used malicious links in e-mails to lure victims into downloading malware. | ['T1204.001'] |
A Word document delivering TYPEFRAME prompts the user to enable macro execution. | ['T1204.002'] |
APT-C-36 has prompted victims to accept macros in order to execute the subsequent payload. | ['T1204.002'] |
APT28 attempted to get users to click on Microsoft Office attachments containing malicious macro scripts. | ['T1204.002'] |
APT29 has used various forms of spearphishing attempting to get a user to open attachments, including, but not limited to, malicious Microsoft Word documents, .pdf, and .lnk files. | ['T1204.002'] |
APT30 has relied on users to execute malicious file attachments delivered via spearphishing emails. | ['T1204.002'] |
APT32 has attempted to lure users to execute a malicious dropper delivered via a spearphishing attachment. | ['T1204.002'] |
APT37 has sent spearphishing attachments attempting to get a user to open them. | ['T1204.002'] |
APT39 has sent spearphishing emails in an attempt to lure users to click on a malicious attachment. | ['T1204.002'] |
Ajax Security Team has lured victims into executing malicious files. | ['T1204.002'] |
Aoqin Dragon has lured victims into opening weaponized documents, fake external drives, and fake antivirus to execute malicious payloads. | ['T1204.002'] |
AppleJeus has required user execution of a malicious MSI installer. | ['T1204.002'] |
AppleSeed can achieve execution through users running malicious file attachments distributed via email. | ['T1204.002'] |
Astaroth has used malicious files including VBS, LNK, and HTML for execution. | ['T1204.002'] |
BITTER has attempted to lure victims into opening malicious attachments delivered via spearphishing. | ['T1204.002'] |
BLINDINGCAN has lured victims into executing malicious macros embedded within Microsoft Office documents. | ['T1204.002'] |
BRONZE BUTLER has attempted to get users to launch malicious Microsoft Word attachments delivered via spearphishing emails. | ['T1204.002'] |
Bad Rabbit has been executed through user installation of an executable disguised as a flash installer. | ['T1204.002'] |
Bisonal has relied on users to execute malicious file attachments delivered via spearphishing emails. | ['T1204.002'] |
BlackTech has used e-mails with malicious documents to lure victims into installing malware. | ['T1204.002'] |
BoomBox has gained execution through user interaction with a malicious file. | ['T1204.002'] |
Bumblebee has relied upon a user opening an ISO file to enable execution of malicious shortcut files and DLLs. | ['T1204.002'] |
Bundlore has attempted to get users to execute a malicious .app file that looks like a Flash Player update. | ['T1204.002'] |
CARROTBALL has been executed through users being lured into opening malicious e-mail attachments. | ['T1204.002'] |
CSPY Downloader has been delivered via malicious documents with embedded macros. | ['T1204.002'] |
Clambling has gained execution through luring victims into opening malicious files. | ['T1204.002'] |
Cobalt Group has sent emails containing malicious attachments that require users to execute a file or macro to infect the victim machine. | ['T1204.002'] |
DanBot has relied on victims' opening a malicious file for initial execution. | ['T1204.002'] |
Dark Caracal makes their malware look like Flash Player, Office, or PDF documents in order to entice a user to click on it. | ['T1204.002'] |
DnsSystem has lured victims into opening macro-enabled Word documents for execution. | ['T1204.002'] |
Dragonfly has used various forms of spearphishing in attempts to get users to open malicious attachments. | ['T1204.002'] |
During C0011, Transparent Tribe relied on a student target to open a malicious document delivered via email. | ['T1204.002'] |
During Operation Dust Storm, the threat actors relied on potential victims to open a malicious Microsoft Word document sent via email. | ['T1204.002'] |
During Operation Sharpshooter, the threat actors relied on victims executing malicious Microsoft Word or PDF files. | ['T1204.002'] |
During Operation Spalax, the threat actors relied on a victim to open a PDF document and click on an embedded malicious link to download malware. | ['T1204.002'] |
EXOTIC LILY has gained execution through victims clicking on malicious LNK files contained within ISO files, which can execute hidden DLLs within the ISO. | ['T1204.002'] |
Earth Lusca required users to click on a malicious file for the loader to activate. | ['T1204.002'] |
Elderwood has leveraged multiple types of spearphishing in order to attempt to get a user to open attachments. | ['T1204.002'] |
Ember Bear has attempted to lure victims into executing malicious files. | ['T1204.002'] |
Emotet has relied upon users clicking on a malicious attachment delivered through spearphishing. | ['T1204.002'] |
FIN4 has lured victims to launch malicious attachments delivered via spearphishing emails (often sent from compromised accounts). | ['T1204.002'] |
FIN7 lured victims to double-click on images in the attachments they sent which would then execute the hidden LNK file. | ['T1204.002'] |
FIN8 has used malicious e-mail attachments to lure victims into executing malware. | ['T1204.002'] |
Ferocious Kitten has attempted to convince victims to enable malicious content within a spearphishing email by including an odd decoy message. | ['T1204.002'] |
Frankenstein has used trojanized Microsoft Word documents sent via email, which prompted the victim to enable macros. | ['T1204.002'] |
Gallmaker sent victims a lure document with a warning that asked victims to “enable content” for execution. | ['T1204.002'] |
Gamaredon Group has attempted to get users to click on Office attachments with malicious macros embedded. | ['T1204.002'] |
Gorgon Group attempted to get users to launch malicious Microsoft Office attachments delivered via spearphishing emails. | ['T1204.002'] |
Grandoreiro has infected victims via malicious attachments. | ['T1204.002'] |
IcedID has been executed through Word documents with malicious embedded macros. | ['T1204.002'] |
InvisiMole can deliver trojanized versions of software and documents, relying on user execution. | ['T1204.002'] |
JCry has achieved execution by luring users to click on a file that appeared to be an Adobe Flash Player update installer. | ['T1204.002'] |
Javali has achieved execution through victims opening malicious attachments, including MSI files with embedded VBScript. | ['T1204.002'] |
KONNI has relied on a victim to enable malicious macros within an attachment delivered via email. | ['T1204.002'] |
Kerrdown has gained execution through victims opening malicious files. | ['T1204.002'] |
Kimsuky has used attempted to lure victims into opening malicious e-mail attachments. | ['T1204.002'] |
Leviathan has sent spearphishing attachments attempting to get a user to click. | ['T1204.002'] |
Lokibot has tricked recipients into enabling malicious macros by getting victims to click "enable content" in email attachments. | ['T1204.002'] |
Magic Hound has attempted to lure victims into opening malicious email attachments. | ['T1204.002'] |
Magic Hound has lured victims into executing malicious files. | ['T1204.002'] |
Metamorfo requires the user to double-click the executable to run the malicious HTA file or to download a malicious installer. | ['T1204.002'] |
Mofang's malicious spearphishing attachments required a user to open the file after receiving. | ['T1204.002'] |
Molerats has sent malicious files via email that tricked users into clicking Enable Content to run an embedded macro and to download malicious archives. | ['T1204.002'] |
Mongall has relied on a user opening a malicious document for execution. | ['T1204.002'] |
MuddyWater has attempted to get users to enable macros and launch malicious Microsoft Word documents delivered via spearphishing emails. | ['T1204.002'] |
Mustang Panda has sent malicious files requiring direct victim interaction to execute. | ['T1204.002'] |
NETWIRE has been executed through luring victims into opening malicious documents. | ['T1204.002'] |
Naikon has convinced victims to open malicious attachments to execute malware. | ['T1204.002'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.