Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1554 | Compromise Host Software Binary |
SLOWPULSE is applied in compromised environments through modifications to legitimate Pulse Secure files.[2] |
|
Enterprise | T1074 | .001 | Data Staged: Local Data Staging |
SLOWPULSE can write logged ACE credentials to |
Enterprise | T1556 | .004 | Modify Authentication Process: Network Device Authentication |
SLOWPULSE can modify LDAP and two factor authentication flows by inspecting login credentials and forcing successful authentication if the provided password matches a chosen backdoor password.[1] |
.006 | Modify Authentication Process: Multi-Factor Authentication |
SLOWPULSE can insert malicious logic to bypass RADIUS and ACE two factor authentication (2FA) flows if a designated attacker-supplied password is provided.[1] |
||
Enterprise | T1111 | Multi-Factor Authentication Interception |
SLOWPULSE can log credentials on compromised Pulse Secure VPNs during the |
|
Enterprise | T1027 | Obfuscated Files or Information |
SLOWPULSE can hide malicious code in the padding regions between legitimate functions in the Pulse Secure |