ID | Name |
---|---|
T1204.001 | Malicious Link |
T1204.002 | Malicious File |
T1204.003 | Malicious Image |
An adversary may rely upon a user clicking a malicious link in order to gain execution. Users may be subjected to social engineering to get them to click on a link that will lead to code execution. This user action will typically be observed as follow-on behavior from Spearphishing Link. Clicking on a link may also lead to other execution techniques such as exploitation of a browser or application vulnerability via Exploitation for Client Execution. Links may also lead users to download files that require execution via Malicious File.
ID | Name | Description |
---|---|---|
S0584 | AppleJeus |
AppleJeus's spearphishing links required user interaction to navigate to the malicious website.[1] |
G0007 | APT28 |
APT28 has tricked unwitting recipients into clicking on malicious hyperlinks within emails crafted to resemble trustworthy senders.[2][3] |
G0016 | APT29 |
APT29 has used various forms of spearphishing attempting to get a user to click on a malicious link.[4][5] |
G0022 | APT3 |
APT3 has lured victims into clicking malicious links delivered through spearphishing.[6] |
G0050 | APT32 |
APT32 has lured targets to download a Cobalt Strike beacon by including a malicious link within spearphishing emails.[7][8][9] |
G0064 | APT33 |
APT33 has lured users to click links to malicious HTML applications delivered via spearphishing emails.[10][11] |
G0087 | APT39 |
APT39 has sent spearphishing emails in an attempt to lure users to click on a malicious link.[12][13] |
S0475 | BackConfig |
BackConfig has compromised victims via links to URLs hosting malicious content.[14] |
S0534 | Bazar |
Bazar can gain execution after a user clicks on a malicious link to decoy landing pages hosted on Google Docs.[15][16][17] |
G0098 | BlackTech |
BlackTech has used e-mails with malicious links to lure victims into installing malware.[18] |
S1039 | Bumblebee |
Bumblebee has relied upon a user downloading a file from a OneDrive link for execution.[19][20] |
C0011 | C0011 |
During C0011, Transparent Tribe relied on student targets to click on a malicious link sent via email.[21] |
C0021 | C0021 |
During C0021, the threat actors lured users into clicking a malicious link which led to the download of a ZIP archive containing a malicious .LNK file.[22] |
G0080 | Cobalt Group |
Cobalt Group has sent emails containing malicious links that require users to execute a file or macro to infect the victim machine.[23][24][25] |
G0142 | Confucius |
Confucius has lured victims into clicking on a malicious link sent through spearphishing.[26] |
G1034 | Daggerfly |
Daggerfly has used strategic website compromise to deliver a malicious link requiring user interaction.[27] |
G1006 | Earth Lusca |
Earth Lusca has sent spearphishing emails that required the user to click on a malicious link and subsequently open a decoy document with a malicious loader.[28] |
G0066 | Elderwood |
Elderwood has leveraged multiple types of spearphishing in order to attempt to get a user to open links.[29][30] |
S0367 | Emotet |
Emotet has relied upon users clicking on a malicious link delivered through spearphishing.[31][32] |
G0120 | Evilnum |
Evilnum has sent spearphishing emails designed to trick the recipient into opening malicious shortcut links which downloads a .LNK file.[33] |
G1011 | EXOTIC LILY |
EXOTIC LILY has used malicious links to lure users into executing malicious payloads.[34] |
G0085 | FIN4 |
FIN4 has lured victims to click malicious links delivered via spearphishing emails (often sent from compromised accounts).[35][36] |
G0046 | FIN7 |
FIN7 has used malicious links to lure victims into downloading malware.[37] |
G0061 | FIN8 |
FIN8 has used emails with malicious links to lure victims into installing malware.[38][39][40] |
G0047 | Gamaredon Group |
Gamaredon Group has attempted to get users to click on a link pointing to a malicious HTML file leading to follow-on malicious content.[41] |
S1138 | Gootloader |
Gootloader has been executed through malicious links presented to users as internet search results.[42][43] |
S0531 | Grandoreiro |
Grandoreiro has used malicious links to gain execution on victim machines.[44][45] |
S0561 | GuLoader |
GuLoader has relied upon users clicking on links to malicious documents.[46] |
S0499 | Hancitor |
Hancitor has relied upon users clicking on a malicious link delivered through phishing.[47] |
S0528 | Javali |
Javali has achieved execution through victims clicking links to malicious websites.[48] |
S0585 | Kerrdown |
Kerrdown has gained execution through victims opening malicious links.[9] |
G0094 | Kimsuky |
Kimsuky has lured victims into clicking malicious links.[49] |
S0669 | KOCTOPUS |
KOCTOPUS has relied on victims clicking on a malicious link delivered via email.[50] |
S1160 | Latrodectus |
Latrodectus has been executed through malicious links distributed in email campaigns.[51][52] |
G0140 | LazyScripter |
LazyScripter has relied upon users clicking on links to malicious files.[50] |
G0065 | Leviathan |
Leviathan has sent spearphishing email links attempting to get a user to click.[53][54] |
G1014 | LuminousMoth |
LuminousMoth has lured victims into clicking malicious Dropbox download links delivered through spearphishing.[55] |
G0095 | Machete |
Machete has has relied on users opening malicious links delivered through spearphishing to execute malware.[56][57][58] |
G0059 | Magic Hound |
Magic Hound has attempted to lure victims into opening malicious links embedded in emails.[59][60] |
S0530 | Melcoz |
Melcoz has gained execution through victims opening malicious links.[48] |
G0103 | Mofang |
Mofang's spearphishing emails required a user to click the link to connect to a compromised website.[61] |
G0021 | Molerats |
Molerats has sent malicious links via email trick users into opening a RAR archive and running an executable.[62][63] |
G0069 | MuddyWater |
MuddyWater has distributed URLs in phishing e-mails that link to lure documents.[64][65][66] |
G0129 | Mustang Panda |
Mustang Panda has sent malicious links including links directing victims to a Google Drive folder.[67][68][69] |
G1020 | Mustard Tempest |
Mustard Tempest has lured users into downloading malware through malicious links in fake advertisements and spearphishing emails.[70][71] |
S0198 | NETWIRE |
NETWIRE has been executed through convincing victims into clicking malicious links.[72][46] |
C0002 | Night Dragon |
During Night Dragon, threat actors enticed users to click on links in spearphishing emails to download malware.[73] |
S0644 | ObliqueRAT |
ObliqueRAT has gained execution on targeted systems through luring users to click on links to malicious URLs.[74][75] |
G0049 | OilRig |
OilRig has delivered malicious links to achieve execution on the target system.[76][77][78] |
C0022 | Operation Dream Job |
During Operation Dream Job, Lazarus Group lured users into executing a malicious link to disclose private account information or provide initial access.[79][80] |
C0016 | Operation Dust Storm |
During Operation Dust Storm, the threat actors relied on a victim clicking on a malicious link sent via email.[81] |
C0005 | Operation Spalax |
During Operation Spalax, the threat actors relied on a victim to click on a malicious link distributed via phishing emails.[82] |
S1017 | OutSteel |
OutSteel has relied on a user to click a malicious link within a spearphishing email.[83] |
G0040 | Patchwork |
Patchwork has used spearphishing with links to try to get users to click, download and open malicious files.[84][85][86][14] |
S0435 | PLEAD | |
S0453 | Pony |
Pony has attempted to lure targets into clicking links in spoofed emails from legitimate banks.[87] |
S0650 | QakBot |
QakBot has gained execution through users opening malicious links.[88][89][90][91][92][93][94] |
G1039 | RedCurl |
RedCurl has used malicious links to infect the victim machines.[95][96] |
G1031 | Saint Bear |
Saint Bear has, in addition to email-based phishing attachments, used malicious websites masquerading as legitimate entities to host links to malicious files for user execution.[83][97] |
S1018 | Saint Bot |
Saint Bot has relied on users to click on a malicious link delivered via a spearphishing.[83] |
G0034 | Sandworm Team |
Sandworm Team has tricked unwitting recipients into clicking on malicious hyperlinks within emails crafted to resemble trustworthy senders.[98] |
G0121 | Sidewinder |
Sidewinder has lured targets to click on malicious links to gain execution in the target environment.[99][100][101][102] |
S0649 | SMOKEDHAM |
SMOKEDHAM has relied upon users clicking on a malicious link delivered through phishing.[103] |
S1086 | Snip3 |
Snip3 has been executed through luring victims into clicking malicious links.[104] |
S1124 | SocGholish |
SocGholish has lured victims into interacting with malicious links on compromised websites for execution.[71] |
S0646 | SpicyOmelette |
SpicyOmelette has been executed through malicious links within spearphishing emails.[25] |
S1030 | Squirrelwaffle |
Squirrelwaffle has relied on victims to click on a malicious link send via phishing campaigns.[105] |
G1018 | TA2541 |
TA2541 has used malicious links to cloud and web services to gain execution on victim machines.[106][72] |
G0092 | TA505 |
TA505 has used lures to get users to click links in emails and attachments. For example, TA505 makes their malware look like legitimate Microsoft Word documents, .pdf and/or .lnk files. [107][108][109][110][111][112][113][114] |
G1037 | TA577 |
TA577 has lured users into executing malicious JavaScript files by sending malicious links via email.[51] |
G1038 | TA578 |
TA578 has placed malicious links in contact forms on victim sites, often spoofing a copyright complaint, to redirect users to malicious file downloads.[51] |
G0134 | Transparent Tribe |
Transparent Tribe has directed users to open URLs hosting malicious content.[74][75] |
S0436 | TSCookie |
TSCookie has been executed via malicious links embedded in e-mails spoofing the Ministries of Education, Culture, Sports, Science and Technology of Japan.[115] |
G0010 | Turla |
Turla has used spearphishing via a link to get users to download and run their malware.[116] |
C0037 | Water Curupira Pikabot Distribution |
Water Curupira Pikabot Distribution distributed a PDF attachment containing a malicious link to a Pikabot installer.[117] |
G0112 | Windshift |
Windshift has used links embedded in e-mails to lure victims into executing malicious code.[118] |
G1035 | Winter Vivern |
Winter Vivern has mimicked legitimate government-related domains to deliver malicious webpages containing links to documents or other content for user execution.[119][120] |
G0102 | Wizard Spider |
Wizard Spider has lured victims into clicking a malicious link delivered through spearphishing.[121] |
G0128 | ZIRCONIUM |
ZIRCONIUM has used malicious links in e-mails to lure victims into downloading malware.[122][123] |
ID | Mitigation | Description |
---|---|---|
M1031 | Network Intrusion Prevention |
If a link is being visited by a user, network intrusion prevention systems and systems designed to scan and remove malicious downloads can be used to block activity. |
M1021 | Restrict Web-Based Content |
If a link is being visited by a user, block unknown or unused files in transit by default that should not be downloaded or by policy from suspicious sites as a best practice to prevent some vectors, such as .scr, .exe, .pif, .cpl, etc. Some download scanning devices can open and analyze compressed and encrypted formats, such as zip and rar that may be used to conceal malicious files. |
M1017 | User Training |
Use user training as a way to bring awareness to common phishing and spearphishing techniques and how to raise suspicion for potentially malicious events. |
ID | Data Source | Data Component | Detects |
---|---|---|---|
DS0022 | File | File Creation |
Monitor for files created on a system after a user clicks on a malicious link. Look for common download paths and suspicious files with executable extensions. Analytic 1 - Files downloaded from links and then executed.
|
DS0029 | Network Traffic | Network Connection Creation |
Monitor for network connections to suspicious or external sites shortly after a user clicks on a link, especially if the URL is linked to phishing or malicious activities. Analytic 1 - Web-based network connections to suspicious destinations.
|
Network Traffic Content |
Inspect the content of the network traffic to look for signs of suspicious web traffic, such as phishing links or abnormal HTTP GET/POST requests. Analytic 1 - Suspicious network traffic content
|