PITSTOP is a backdoor that was deployed on compromised Ivanti Connect Secure VPNs during Cutting Edge to enable command execution and file read/write.[1]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1059 | .004 | Command and Scripting Interpreter: Unix Shell |
PITSTOP has the ability to receive shell commands over a Unix domain socket.[1] |
Enterprise | T1140 | Deobfuscate/Decode Files or Information |
PITSTOP can deobfuscate base64 encoded and AES encrypted commands.[1] |
|
Enterprise | T1573 | .002 | Encrypted Channel: Asymmetric Cryptography | |
Enterprise | T1559 | Inter-Process Communication |
PITSTOP can listen over the Unix domain socket located at |
|
Enterprise | T1205 | .002 | Traffic Signaling: Socket Filters |
PITSTOP can listen and evaluate incoming commands on the domain socket, created by PITHOOK malware, located at |
ID | Name | Description |
---|---|---|
C0029 | Cutting Edge |