ATT&CK Changes Between v8.0 and v8.1

Key

Colors for description field
Added
Changed
Deleted

Additional formats

These ATT&CK Navigator layer files can be uploaded to ATT&CK Navigator manually.

This JSON file contains the machine readble output used to create this page: changelog.json

Techniques

enterprise-attack

Patches

[T1584.005] Compromise Infrastructure: Botnet

Current version: 1.0


Old Description
New Description
t1Before compromising a victim, adversaries may compromise numt1Before compromising a victim, adversaries may compromise num
>erous third-party systems to form a botnet that can be used >erous third-party systems to form a botnet that can be used 
>during targeting. A botnet is a network of compromised syste>during targeting. A botnet is a network of compromised syste
>ms that can be instructed to perform coordinated tasks.(Cita>ms that can be instructed to perform coordinated tasks.(Cita
>tion: Norton Botnet) Instead of purchasing/renting a botnet >tion: Norton Botnet) Instead of purchasing/renting a botnet 
>from a booter/stressor service(Citation: Imperva DDoS for Hi>from a booter/stresser service(Citation: Imperva DDoS for Hi
>re), adversaries may build their own botnet by compromising >re), adversaries may build their own botnet by compromising 
>numerous third-party systems. Adversaries may also conduct a>numerous third-party systems. Adversaries may also conduct a
> takeover of an existing botnet, such as redirecting bots to> takeover of an existing botnet, such as redirecting bots to
> adversary-controlled C2 servers.(Citation: Dell Dridex Oct > adversary-controlled C2 servers.(Citation: Dell Dridex Oct 
>2015) With a botnet at their disposal, adversaries may perfo>2015) With a botnet at their disposal, adversaries may perfo
>rm follow-on activity such as large-scale [Phishing](https:/>rm follow-on activity such as large-scale [Phishing](https:/
>/attack.mitre.org/techniques/T1566) or Distributed Denial of>/attack.mitre.org/techniques/T1566) or Distributed Denial of
> Service (DDoS).> Service (DDoS).
Details
values_changed
STIX FieldOld valueNew Value
descriptionBefore compromising a victim, adversaries may compromise numerous third-party systems to form a botnet that can be used during targeting. A botnet is a network of compromised systems that can be instructed to perform coordinated tasks.(Citation: Norton Botnet) Instead of purchasing/renting a botnet from a booter/stressor service(Citation: Imperva DDoS for Hire), adversaries may build their own botnet by compromising numerous third-party systems. Adversaries may also conduct a takeover of an existing botnet, such as redirecting bots to adversary-controlled C2 servers.(Citation: Dell Dridex Oct 2015) With a botnet at their disposal, adversaries may perform follow-on activity such as large-scale [Phishing](https://attack.mitre.org/techniques/T1566) or Distributed Denial of Service (DDoS).Before compromising a victim, adversaries may compromise numerous third-party systems to form a botnet that can be used during targeting. A botnet is a network of compromised systems that can be instructed to perform coordinated tasks.(Citation: Norton Botnet) Instead of purchasing/renting a botnet from a booter/stresser service(Citation: Imperva DDoS for Hire), adversaries may build their own botnet by compromising numerous third-party systems. Adversaries may also conduct a takeover of an existing botnet, such as redirecting bots to adversary-controlled C2 servers.(Citation: Dell Dridex Oct 2015) With a botnet at their disposal, adversaries may perform follow-on activity such as large-scale [Phishing](https://attack.mitre.org/techniques/T1566) or Distributed Denial of Service (DDoS).

[T1583.005] Acquire Infrastructure: Botnet

Current version: 1.0


Old Description
New Description
t1Before compromising a victim, adversaries may buy, lease, ort1Before compromising a victim, adversaries may buy, lease, or
> rent a network of compromised systems that can be used duri> rent a network of compromised systems that can be used duri
>ng targeting. A botnet is a network of compromised systems t>ng targeting. A botnet is a network of compromised systems t
>hat can be instructed to perform coordinated tasks.(Citation>hat can be instructed to perform coordinated tasks.(Citation
>: Norton Botnet) Adversaries may purchase a subscription to >: Norton Botnet) Adversaries may purchase a subscription to 
>use an existing botnet from a booter/stressor service. With >use an existing botnet from a booter/stresser service. With 
>a botnet at their disposal, adversaries may perform follow-o>a botnet at their disposal, adversaries may perform follow-o
>n activity such as large-scale [Phishing](https://attack.mit>n activity such as large-scale [Phishing](https://attack.mit
>re.org/techniques/T1566) or Distributed Denial of Service (D>re.org/techniques/T1566) or Distributed Denial of Service (D
>DoS).(Citation: Imperva DDoS for Hire)(Citation: Krebs-Anna)>DoS).(Citation: Imperva DDoS for Hire)(Citation: Krebs-Anna)
>(Citation: Krebs-Bazaar)(Citation: Krebs-Booter)>(Citation: Krebs-Bazaar)(Citation: Krebs-Booter)
Details
values_changed
STIX FieldOld valueNew Value
descriptionBefore compromising a victim, adversaries may buy, lease, or rent a network of compromised systems that can be used during targeting. A botnet is a network of compromised systems that can be instructed to perform coordinated tasks.(Citation: Norton Botnet) Adversaries may purchase a subscription to use an existing botnet from a booter/stressor service. With a botnet at their disposal, adversaries may perform follow-on activity such as large-scale [Phishing](https://attack.mitre.org/techniques/T1566) or Distributed Denial of Service (DDoS).(Citation: Imperva DDoS for Hire)(Citation: Krebs-Anna)(Citation: Krebs-Bazaar)(Citation: Krebs-Booter)Before compromising a victim, adversaries may buy, lease, or rent a network of compromised systems that can be used during targeting. A botnet is a network of compromised systems that can be instructed to perform coordinated tasks.(Citation: Norton Botnet) Adversaries may purchase a subscription to use an existing botnet from a booter/stresser service. With a botnet at their disposal, adversaries may perform follow-on activity such as large-scale [Phishing](https://attack.mitre.org/techniques/T1566) or Distributed Denial of Service (DDoS).(Citation: Imperva DDoS for Hire)(Citation: Krebs-Anna)(Citation: Krebs-Bazaar)(Citation: Krebs-Booter)

Software

enterprise-attack

New Software

[S0154] Cobalt Strike

Current version: 1.5

Description: [Cobalt Strike](https://attack.mitre.org/software/S0154) is a commercial, full-featured, penetration testing tool which bills itself as “adversary simulation software designed to execute targeted attacks and emulate the post-exploitation actions of advanced threat actors”. Cobalt Strike’s interactive post-exploit capabilities cover the full range of ATT&CK tactics, all executed within a single, integrated system. (Citation: cobaltstrike manual) In addition to its own capabilities, [Cobalt Strike](https://attack.mitre.org/software/S0154) leverages the capabilities of other well-known tools such as Metasploit and [Mimikatz](https://attack.mitre.org/software/S0002). (Citation: cobaltstrike manual)

Deletions

[S0154] Cobalt Strike

Current version: 1.4

Description: [Cobalt Strike](https://attack.mitre.org/software/S0154) is a commercial, full-featured, penetration testing tool which bills itself as “adversary simulation software designed to execute targeted attacks and emulate the post-exploitation actions of advanced threat actors”. Cobalt Strike’s interactive post-exploit capabilities cover the full range of ATT&CK tactics, all executed within a single, integrated system. (Citation: cobaltstrike manual) In addition to its own capabilities, [Cobalt Strike](https://attack.mitre.org/software/S0154) leverages the capabilities of other well-known tools such as Metasploit and [Mimikatz](https://attack.mitre.org/software/S0002). (Citation: cobaltstrike manual)

Groups

enterprise-attack

Minor Version Changes

[G0102] Wizard Spider

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1[Wizard Spider](https://attack.mitre.org/groups/G0102) is fit1[Wizard Spider](https://attack.mitre.org/groups/G0102) is a 
>nancially motivated group that has been conducting ransomwar>financially motivated criminal group that has been conductin
>e campaigns since at least August 2018, primarily targeting >g ransomware campaigns since at least August 2018 against a 
>large organizations. (Citation: CrowdStrike Ryuk January 201>variety of organizations, ranging from major corporations to
>9)> hospitals.(Citation: CrowdStrike Ryuk January 2019)(Citatio
 >n: DHS/CISA Ransomware Targeting Healthcare October 2020)
Details
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://www.crowdstrike.com/blog/big-game-hunting-with-ryuk-another-lucrative-targeted-ransomware/
values_changed
STIX FieldOld valueNew Value
modified2020-08-03 18:57:52.513000+00:002020-11-10 19:06:49.687000+00:00
description[Wizard Spider](https://attack.mitre.org/groups/G0102) is financially motivated group that has been conducting ransomware campaigns since at least August 2018, primarily targeting large organizations. (Citation: CrowdStrike Ryuk January 2019)[Wizard Spider](https://attack.mitre.org/groups/G0102) is a financially motivated criminal group that has been conducting ransomware campaigns since at least August 2018 against a variety of organizations, ranging from major corporations to hospitals.(Citation: CrowdStrike Ryuk January 2019)(Citation: DHS/CISA Ransomware Targeting Healthcare October 2020)
external_references[1]['source_name']TEMP.MixMasterUNC1878
external_references[1]['description'](Citation: FireEye Ryuk and Trickbot January 2019)(Citation: FireEye KEGTAP SINGLEMALT October 2020)
external_references[2]['source_name']Grim SpiderTEMP.MixMaster
external_references[2]['description'](Citation: CrowdStrike Ryuk January 2019)(Citation: CrowdStrike Grim Spider May 2019)(Citation: FireEye Ryuk and Trickbot January 2019)
external_references[3]['source_name']CrowdStrike Ryuk January 2019Grim Spider
external_references[3]['description']Hanel, A. (2019, January 10). Big Game Hunting with Ryuk: Another Lucrative Targeted Ransomware. Retrieved May 12, 2020.(Citation: CrowdStrike Ryuk January 2019)(Citation: CrowdStrike Grim Spider May 2019)
external_references[4]['source_name']FireEye Ryuk and Trickbot January 2019CrowdStrike Ryuk January 2019
external_references[4]['description']Goody, K., et al (2019, January 11). A Nasty Trick: From Credential Theft Malware to Business Disruption. Retrieved May 12, 2020.Hanel, A. (2019, January 10). Big Game Hunting with Ryuk: Another Lucrative Targeted Ransomware. Retrieved May 12, 2020.
external_references[4]['url']https://www.fireeye.com/blog/threat-research/2019/01/a-nasty-trick-from-credential-theft-malware-to-business-disruption.htmlhttps://www.crowdstrike.com/blog/big-game-hunting-with-ryuk-another-lucrative-targeted-ransomware/
external_references[5]['source_name']CrowdStrike Grim Spider May 2019DHS/CISA Ransomware Targeting Healthcare October 2020
external_references[5]['description']John, E. and Carvey, H. (2019, May 30). Unraveling the Spiderweb: Timelining ATT&CK Artifacts Used by GRIM SPIDER. Retrieved May 12, 2020.DHS/CISA. (2020, October 28). Ransomware Activity Targeting the Healthcare and Public Health Sector. Retrieved October 28, 2020.
external_references[5]['url']https://www.crowdstrike.com/blog/timelining-grim-spiders-big-game-hunting-tactics/https://us-cert.cisa.gov/ncas/alerts/aa20-302a
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
aliasesUNC1878
external_references{'source_name': 'FireEye KEGTAP SINGLEMALT October 2020', 'description': 'Kimberly Goody, Jeremy Kennelly, Joshua Shilko, Steve Elovitz, Douglas Bienstock. (2020, October 28). Unhappy Hour Special: KEGTAP and SINGLEMALT With a Ransomware Chaser. Retrieved October 28, 2020.', 'url': 'https://www.fireeye.com/blog/threat-research/2020/10/kegtap-and-singlemalt-with-a-ransomware-chaser.html'}
external_references{'source_name': 'FireEye Ryuk and Trickbot January 2019', 'description': 'Goody, K., et al (2019, January 11). A Nasty Trick: From Credential Theft Malware to Business Disruption. Retrieved May 12, 2020.', 'url': 'https://www.fireeye.com/blog/threat-research/2019/01/a-nasty-trick-from-credential-theft-malware-to-business-disruption.html'}
external_references{'source_name': 'CrowdStrike Grim Spider May 2019', 'description': 'John, E. and Carvey, H. (2019, May 30). Unraveling the Spiderweb: Timelining ATT&CK Artifacts Used by GRIM SPIDER. Retrieved May 12, 2020.', 'url': 'https://www.crowdstrike.com/blog/timelining-grim-spiders-big-game-hunting-tactics/'}