Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network. The weakness in the system can be a software bug, a temporary glitch, or a misconfiguration.
Exploited applications are often websites/web servers, but can also include databases (like SQL), standard services (like SMB or SSH), network device administration and management protocols (like SNMP and Smart Install), and any other system with Internet-accessible open sockets.[1][2][3][4][5] On ESXi infrastructure, adversaries may exploit exposed OpenSLP services; they may alternatively exploit exposed VMware vCenter servers.[6][7] Depending on the flaw being exploited, this may also involve Exploitation for Defense Evasion or Exploitation for Client Execution.
If an application is hosted on cloud-based infrastructure and/or is containerized, then exploiting it may lead to compromise of the underlying instance or container. This can allow an adversary a path to access the cloud or container APIs (e.g., via the Cloud Instance Metadata API), exploit container host access via Escape to Host, or take advantage of weak identity and access management policies.
Adversaries may also exploit edge network infrastructure and related appliances, specifically targeting devices that do not support robust host-based defenses.[8][9]
For websites and databases, the OWASP top 10 and CWE top 25 highlight the most common web-based vulnerabilities.[10][11]
| ID | Name | Description |
|---|---|---|
| G1030 | Agrius |
Agrius exploits public-facing applications for initial access to victim environments. Examples include widespread attempts to exploit CVE-2018-13379 in FortiOS devices and SQL injection activity.[12] |
| G0007 | APT28 |
APT28 has used a variety of public exploits, including CVE 2020-0688 and CVE 2020-17144, to gain execution on vulnerable Microsoft Exchange; they have also conducted SQL injection attacks against external websites.[13][14] |
| G0016 | APT29 |
APT29 has exploited CVE-2019-19781 for Citrix, CVE-2019-11510 for Pulse Secure VPNs, CVE-2018-13379 for FortiGate VPNs, and CVE-2019-9670 in Zimbra software to gain access.[15][16] |
| G0087 | APT39 | |
| G0096 | APT41 |
APT41 exploited CVE-2020-10189 against Zoho ManageEngine Desktop Central through unsafe deserialization, and CVE-2019-19781 to compromise Citrix Application Delivery Controllers (ADC) and gateway devices.[18] APT41 leveraged vulnerabilities such as ProxyLogon exploitation or SQL injection for initial access.[19] APT41 exploited CVE-2021-26855 against a vulnerable Microsoft Exchange Server to gain initial access to the victim network.[20] |
| G1023 | APT5 |
APT5 has exploited vulnerabilities in externally facing software and devices including Pulse Secure VPNs and Citrix Application Delivery Controllers.[21][22][23] [24] |
| C0046 | ArcaneDoor |
ArcaneDoor abused WebVPN traffic to targeted devices to achieve unauthorized remote code execution.[25] |
| G0001 | Axiom |
Axiom has been observed using SQL injection to gain access to systems.[26][27] |
| G0135 | BackdoorDiplomacy |
BackdoorDiplomacy has exploited CVE-2020-5902, an F5 BIP-IP vulnerability, to drop a Linux backdoor. BackdoorDiplomacy has also exploited mis-configured Plesk servers.[28] |
| G1043 | BlackByte |
BlackByte exploited vulnerabilities such as ProxyLogon and ProxyShell for initial access to victim environments.[29][30][31][32] |
| G0098 | BlackTech |
BlackTech has exploited a buffer overflow vulnerability in Microsoft Internet Information Services (IIS) 6.0, CVE-2017-7269, in order to establish a new HTTP or command and control (C2) server.[33] |
| G0108 | Blue Mockingbird |
Blue Mockingbird has gained initial access by exploiting CVE-2019-18935, a vulnerability within Telerik UI for ASP.NET AJAX.[34] |
| S1184 | BOLDMOVE |
BOLDMOVE is associated with exploitation of CVE-2022-49475 in FortiOS.[35] |
| C0017 | C0017 |
During C0017, APT41 exploited CVE-2021-44207 in the USAHerds application and CVE-2021-44228 in Log4j, as well as other .NET deserialization, SQL injection, and directory traversal vulnerabilities to gain initial access.[36] |
| C0018 | C0018 |
During C0018, the threat actors exploited VMWare Horizon Unified Access Gateways that were vulnerable to several Log4Shell vulnerabilities, including CVE-2021-44228, CVE-2021-45046, CVE-2021-45105, and CVE-2021-44832.[37] |
| C0027 | C0027 |
During C0027, Scattered Spider exploited CVE-2021-35464 in the ForgeRock Open Access Management (OpenAM) application server to gain initial access.[38] |
| G1021 | Cinnamon Tempest |
Cinnamon Tempest has exploited multiple unpatched vulnerabilities for initial access including vulnerabilities in Microsoft Exchange, Manage Engine AdSelfService Plus, Confluence, and Log4j.[39][40][41][42] |
| S1105 | COATHANGER |
COATHANGER is installed following exploitation of a vulnerable FortiGate device. [43] |
| C0029 | Cutting Edge |
During Cutting Edge, threat actors exploited CVE-2023-46805 and CVE-2024-21887 in Ivanti Connect Secure VPN appliances to enable authentication bypass and command injection. A server-side request forgery (SSRF) vulnerability, CVE-2024-21893, was identified later and used to bypass mitigations for the initial two vulnerabilities by chaining with CVE-2024-21887.[44][45][46][47][48] |
| G0035 | Dragonfly |
Dragonfly has conducted SQL injection attacks, exploited vulnerabilities CVE-2019-19781 and CVE-2020-0688 for Citrix and MS Exchange, and CVE-2018-13379 for Fortinet VPNs.[49] |
| G1006 | Earth Lusca |
Earth Lusca has compromised victims by directly exploiting vulnerabilities of public-facing servers, including those associated with Microsoft Exchange and Oracle GlassFish.[50] |
| G1003 | Ember Bear |
Ember Bear gains initial access to victim environments by exploiting external-facing services. Examples include exploitation of CVE-2021-26084 in Confluence servers; CVE-2022-41040, ProxyShell, and other vulnerabilities in Microsoft Exchange; and multiple vulnerabilities in open-source platforms such as content management systems.[51][52] |
| G1016 | FIN13 |
FIN13 has exploited known vulnerabilities such as CVE-2017-1000486 (Primefaces Application Expression Language Injection), CVE-2015-7450 (WebSphere Application Server SOAP Deserialization Exploit), CVE-2010-5326 (SAP NewWeaver Invoker Servlet Exploit), and EDB-ID-24963 (SAP NetWeaver ConfigServlet Remote Code Execution) to gain initial access.[53][54] |
| G0046 | FIN7 |
FIN7 has compromised targeted organizations through exploitation of CVE-2021-31207 in Exchange.[39] |
| C0053 | FLORAHOX Activity |
FLORAHOX Activity has exploited and infected vulnerable routers to recruit additional network devices into the ORB.[55] |
| G0117 | Fox Kitten |
Fox Kitten has exploited known vulnerabilities in Fortinet, PulseSecure, and Palo Alto VPN appliances.[56][57][58][59][60] |
| C0041 | FrostyGoop Incident |
FrostyGoop Incident was likely enabled by the adversary exploiting an unknown vulnerability in an external-facing router.[61] |
| G0093 | GALLIUM |
GALLIUM exploited a publicly-facing servers including Wildfly/JBoss servers to gain access to the network.[62][63] |
| G0115 | GOLD SOUTHFIELD |
GOLD SOUTHFIELD has exploited Oracle WebLogic vulnerabilities for initial compromise.[64] |
| G0125 | HAFNIUM |
HAFNIUM has exploited multiple vulnerabilities to compromise edge devices and on-premises versions of Microsoft Exchange Server.[65][66][67][68][40][69] |
| S0224 | Havij | |
| C0038 | HomeLand Justice |
For HomeLand Justice, threat actors exploited CVE-2019-0604 in Microsoft SharePoint for initial access.[71] |
| G1032 | INC Ransom |
INC Ransom has exploited known vulnerabilities including CVE-2023-3519 in Citrix NetScaler for initial access.[72][73] |
| G0004 | Ke3chang |
Ke3chang has compromised networks by exploiting Internet-facing applications, including vulnerable Microsoft Exchange and SharePoint servers.[74] |
| G0094 | Kimsuky |
Kimsuky has exploited various vulnerabilities for initial access, including Microsoft Exchange vulnerability CVE-2020-0688.[75] |
| G0065 | Leviathan |
Leviathan has used exploits against publicly-disclosed vulnerabilities for initial access into victim networks.[76] |
| C0049 | Leviathan Australian Intrusions |
Leviathan exploited public-facing web applications and appliances for initial access during Leviathan Australian Intrusions.[76] |
| G0059 | Magic Hound |
Magic Hound has exploited the Log4j utility (CVE-2021-44228), on-premises MS Exchange servers via "ProxyShell" (CVE-2021-34473, CVE-2021-34523, CVE-2021-31207), and Fortios SSL VPNs (CVE-2018-13379).[77][78][79][80][81][40] |
| G1051 | Medusa Group |
Medusa Group has leveraged public facing vulnerabilities in their campaigns against victim organizations to gain initial access.[82][83] Medusa Group has also utilized CVE-2024-1709 in ScreenConnect, and CVE-2023-48788 in Fortinet EMS for initial access to victim environments.[84] |
| G0045 | menuPass |
menuPass has leveraged vulnerabilities in Pulse Secure VPNs to hijack sessions.[85] |
| G1009 | Moses Staff |
Moses Staff has exploited known vulnerabilities in public-facing infrastructure such as Microsoft Exchange Servers.[86] |
| G0069 | MuddyWater |
MuddyWater has exploited the Microsoft Exchange memory corruption vulnerability (CVE-2020-0688).[87] |
| C0002 | Night Dragon |
During Night Dragon, threat actors used SQL injection exploits against extranet web servers to gain access.[88] |
| C0012 | Operation CuckooBees |
During Operation CuckooBees, the threat actors exploited multiple vulnerabilities in externally facing servers.[89] |
| C0048 | Operation MidnightEclipse |
During Operation MidnightEclipse, threat actors exploited CVE-2024-3400 in Palo Alto Networks GlobalProtect.[90][91] |
| C0014 | Operation Wocao |
During Operation Wocao, threat actors gained initial access by exploiting vulnerabilities in JBoss webservers.[92] |
| G1040 | Play |
Play has exploited known vulnerabilities for initial access including CVE-2018-13379 and CVE-2020-12812 in FortiOS and CVE-2022-41082 and CVE-2022-41040 ("ProxyNotShell") in Microsoft Exchange.[93][94] |
| S1242 | Qilin |
Qilin has been delivered through exploitation of exposed applications and interfaces including Citrix and RDP.[95] |
| C0055 | Quad7 Activity |
Quad7 Activity has enabled the exploitation of vulnerabilities for remote code execution capabilities in SOHO routers including CVE-2023-50224 and CVE-2025-9377 in TP-Link devices.[96][97] |
| G0106 | Rocke |
Rocke exploited Apache Struts, Oracle WebLogic (CVE-2017-10271), and Adobe ColdFusion (CVE-2017-3066) vulnerabilities to deliver malware.[98][99] |
| G1045 | Salt Typhoon |
Salt Typhoon has exploited CVE-2018-0171 in the Smart Install feature of Cisco IOS and Cisco IOS XE software for initial access.[100] |
| G0034 | Sandworm Team |
Sandworm Team exploits public-facing applications for initial access and to acquire infrastructure, such as exploitation of the EXIM mail transfer agent in Linux systems.[101][102] |
| G1041 | Sea Turtle |
Sea Turtle gained access to victim environments by exploiting multiple known vulnerabilities over several campaigns.[103][104] |
| C0045 | ShadowRay |
During ShadowRay, threat actors exploited CVE-2023-48022 on publicly exposed Ray servers to steal computing power and to expose sensitive data.[105] |
| C0058 | SharePoint ToolShell Exploitation |
During SharePoint ToolShell Exploitation, threat actors exploited authentication bypass and remote code execution vulnerabilities (CVE-2025-49706 and CVE-2025-49704) against on-premises SharePoint servers. This activity was characterized by crafted |
| S0623 | Siloscape |
Siloscape is executed after the attacker gains initial access to a Windows container using a known vulnerability.[112] |
| C0024 | SolarWinds Compromise |
During the SolarWinds Compromise, APT29 exploited CVE-2020-0688 against the Microsoft Exchange Control Panel to regain access to a network.[113][15] |
| S0516 | SoreFang |
SoreFang can gain access by exploiting a Sangfor SSL VPN vulnerability that allows for the placement and delivery of malicious update binaries.[114] |
| C0052 | SPACEHOP Activity |
SPACEHOP Activity has enabled the exploitation of CVE-2022-27518 and CVE-2022-27518 for illegitimate access.[23][55] |
| S0225 | sqlmap |
sqlmap can be used to automate exploitation of SQL injection vulnerabilities.[115] |
| G1053 | Storm-0501 |
Storm-0501 has exploited N-day vulnerabilities associated with public facing services to gain initial access to victim environments to include Zoho ManageEngine (CVE-2022-47966), Citrix NetScaler "Citrix Bleed" (CVE-2023-4966), and Adobe ColdFusion 2016 (CVE-2023-29300 or CVE-2023-38203).[116] |
| G0027 | Threat Group-3390 |
Threat Group-3390 has exploited the Microsoft SharePoint vulnerability CVE-2019-0604 and CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065 in Exchange Server.[117] |
| G1022 | ToddyCat |
ToddyCat has exploited the ProxyLogon vulnerability (CVE-2021-26855) to compromise Exchange Servers at multiple organizations.[118] |
| G1048 | UNC3886 |
UNC3886 has exploited CVE-2022-42475 in FortiOS SSL VPNs to obtain access.[119][8] |
| C0039 | Versa Director Zero Day Exploitation |
Versa Director Zero Day Exploitation involved exploitation of a vulnerability in Versa Director servers, since identified as CVE-2024-39717, for initial access and code execution.[120] |
| G0123 | Volatile Cedar |
Volatile Cedar has targeted publicly facing web servers, with both automatic and manual vulnerability discovery.[121] [122] |
| G1017 | Volt Typhoon |
Volt Typhoon has gained initial access through exploitation of multiple vulnerabilities in internet-facing software and appliances such as Fortinet, Ivanti (formerly Pulse Secure), NETGEAR, Citrix, and Cisco.[123][124] |
| G1035 | Winter Vivern |
Winter Vivern has exploited known and zero-day vulnerabilities in software usch as Roundcube Webmail servers and the "Follina" vulnerability.[125][126] |
| S0412 | ZxShell |
ZxShell has been dropped through exploitation of CVE-2011-2462, CVE-2013-3163, and CVE-2014-0322.[127] |
| ID | Mitigation | Description |
|---|---|---|
| M1048 | Application Isolation and Sandboxing |
Application isolation will limit what other processes and system features the exploited target can access. |
| M1050 | Exploit Protection |
Web Application Firewalls may be used to limit exposure of applications to prevent exploit traffic from reaching the application. |
| M1037 | Filter Network Traffic |
Restrict outbound network traffic from public-facing servers to prevent unauthorized connections from initiating communications with attacker-controlled infrastructure. While this may not prevent the initial exploitation, it limits the attacker's ability to verify and control the compromised server post-exploit, reducing the overall impact of the attack. |
| M1035 | Limit Access to Resource Over Network |
Ensure that all publicly exposed services are actually intended to be so, and restrict access to any that should only be available internally. |
| M1030 | Network Segmentation |
Segment externally facing servers and services from the rest of the network with a DMZ or on separate hosting infrastructure. |
| M1026 | Privileged Account Management |
Use least privilege for service accounts will limit what permissions the exploited process gets on the rest of the system. |
| M1051 | Update Software |
Update software regularly by employing patch management for externally exposed applications. |
| M1016 | Vulnerability Scanning |
Regularly scan externally facing systems for vulnerabilities and establish procedures to rapidly patch systems when critical vulnerabilities are discovered through scanning and through public disclosure.[10] |
| ID | Name | Analytic ID | Analytic Description |
|---|---|---|---|
| DET0080 | Exploit Public-Facing Application – multi-signal correlation (request → error → post-exploit process/egress) | AN0219 |
Adversary sends crafted HTTP/S (or other service) input to an Internet-facing app (IIS/ASP.NET, API, device portal). Chain: (1) abnormal request patterns to public endpoint → (2) elevated 4xx/5xx or unusual methods/paths → (3) server process (w3wp.exe/other service) spawns shell/LOLbins or loads non-standard modules → (4) optional outbound callback from the host/container. |
| AN0220 |
Adversary exploits Apache/Nginx/app servers. Chain: (1) suspicious requests in access logs → (2) spike of 5xx or WAF blocks → (3) web server or interpreter (apache2/nginx/php-fpm/node/python) spawns /bin/sh, curl, wget, socat, or writes webshell → (4) outbound callback. |
||
| AN0221 |
Adversary targets macOS-hosted public services (e.g., nginx, node). Chain: suspicious inbound request → service crash/5xx → service spawns shell or writes file → new outbound connection. |
||
| AN0222 |
Adversary exploits containerized app via ingress or service. Chain: (1) suspicious request in ingress/app logs → (2) container process spawns a shell/exec/sidecar (kubectl exec/docker exec) → (3) egress to Internet or metadata service (169.254.169.254). |
||
| AN0223 |
Adversary targets cloud-hosted public endpoints. Chain: (1) ALB/ELB/Cloud LB logs show exploit-like inputs or error spikes → (2) workload spawns shell or reaches metadata API → (3) egress to new external hosts. |
||
| AN0224 |
Adversary exploits exposed OpenSLP on ESXi or vCenter public endpoints. Chain: inbound request pattern to mgmt service → hostd/vpxd error/crash/restart → unexpected process behavior or datastore access → outbound callback. |
||
| AN0225 |
Adversary exploits public admin services on routers/firewalls/switches. Chain: anomalous HTTP/SNMP/SmartInstall inputs → device syslog errors/restarts → config changes/CLI spawn → egress to attacker C2. |