Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1048 | .003 | Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol |
ftp may be used to exfiltrate data separate from the main command and control protocol.[1][2] |
Enterprise | T1105 | Ingress Tool Transfer |
ftp may be abused by adversaries to transfer tools or files from an external system into a compromised environment.[1][2] |
|
Enterprise | T1570 | Lateral Tool Transfer |
ftp may be abused by adversaries to transfer tools or files between systems within a compromised environment.[1][2] |
ID | Name | References |
---|---|---|
G0019 | Naikon | |
G0087 | APT39 | |
G0096 | APT41 | |
G0064 | APT33 | |
G0049 | OilRig | |
G1001 | HEXANE |
HEXANE probed victim infrastructure in support of HomeLand Justice.[8] |
ID | Name | Description |
---|---|---|
C0038 | HomeLand Justice |