| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1059 | .008 | Command and Scripting Interpreter: Network Device CLI |
PHASEJAM has leveraged native commands associated with the compromised network appliance to execute code.[2] |
| Enterprise | T1554 | Compromise Host Software Binary |
PHASEJAM has modified legitimate components to enable persistence and execution, including inserting a web shell into |
|
| Enterprise | T1565 | Data Manipulation |
PHASEJAM has blocked legitimate upgrades of Ivanti Connect Secure systems and falsely indicates a successful upgrade while operating on an older version.[2] |
|
| Enterprise | T1678 | Delay Execution |
PHASEJAM has used the |
|
| Enterprise | T1140 | Deobfuscate/Decode Files or Information |
PHASEJAM has the ability to decode Base64 commands and data.[2] |
|
| Enterprise | T1685 | Disable or Modify Tools |
PHASEJAM has modified Ivanti Connect Secure appliances and blocks the system upgrades by altering the DSUpgrade.pm file.[2] |
|
| .003 | Modify or Spoof Tool UI |
PHASEJAM has prevented legitimate Ivanti Connect Secure system upgrades by intercepting the upgrade command and rendering fake HTML upgrade progress bar through a function called |
||
| Enterprise | T1546 | .004 | Event Triggered Execution: Unix Shell Configuration Modification |
PHASEJAM has used a bash script to modify components on Ivanti Connect Secure appliances and execute files via |
| Enterprise | T1041 | Exfiltration Over C2 Channel |
PHASEJAM has the ability to exfiltrate data from the victim appliance.[2] |
|
| Enterprise | T1105 | Ingress Tool Transfer |
PHASEJAM has the ability to upload files onto the compromised appliance.[2] |
|
| Enterprise | T1036 | .003 | Masquerading: Rename Legitimate Utilities |
PHASEJAM has renamed the file |
| Enterprise | T1027 | .010 | Obfuscated Files or Information: Command Obfuscation | |
| .013 | Obfuscated Files or Information: Encrypted/Encoded File |
PHASEJAM has launched a webshell using the |
||
| Enterprise | T1505 | .003 | Server Software Component: Web Shell |
PHASEJAM has inserted Perl-based web shells into legitimate files that provided threat actors with remote access and code execution capabilities on the compromised network appliance.[2] |
| Enterprise | T1489 | Service Stop |
PHASEJAM has disabled the |
|