mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-27 01:07:18 +00:00
Merge branch 'MISP:main' into main
This commit is contained in:
commit
eb8622d213
9 changed files with 237 additions and 1954 deletions
|
@ -1519,7 +1519,7 @@
|
||||||
"value": "Upload, install, and configure software/tools - T1362"
|
"value": "Upload, install, and configure software/tools - T1362"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"description": "By responding to LLMNR/NBT-NS network traffic, adversaries may spoof an authoritative source for name resolution to force communication with an adversary controlled system. This activity may be used to collect or relay authentication materials. \n\nLink-Local Multicast Name Resolution (LLMNR) and NetBIOS Name Service (NBT-NS) are Microsoft Windows components that serve as alternate methods of host identification. LLMNR is based upon the Domain Name System (DNS) format and allows hosts on the same local link to perform name resolution for other hosts. NBT-NS identifies systems on a local network by their NetBIOS name. (Citation: Wikipedia LLMNR)(Citation: TechNet NetBIOS)\n\nAdversaries can spoof an authoritative source for name resolution on a victim network by responding to LLMNR (UDP 5355)/NBT-NS (UDP 137) traffic as if they know the identity of the requested host, effectively poisoning the service so that the victims will communicate with the adversary controlled system. If the requested host belongs to a resource that requires identification/authentication, the username and NTLMv2 hash will then be sent to the adversary controlled system. The adversary can then collect the hash information sent over the wire through tools that monitor the ports for traffic or through [Network Sniffing](https://attack.mitre.org/techniques/T1040) and crack the hashes offline through [Brute Force](https://attack.mitre.org/techniques/T1110) to obtain the plaintext passwords.\n\nIn some cases where an adversary has access to a system that is in the authentication path between systems or when automated scans that use credentials attempt to authenticate to an adversary controlled system, the NTLMv1/v2 hashes can be intercepted and relayed to access and execute code against a target system. The relay step can happen in conjunction with poisoning but may also be independent of it.(Citation: byt3bl33d3r NTLM Relaying)(Citation: Secure Ideas SMB Relay) Additionally, adversaries may encapsulate the NTLMv1/v2 hashes into various protocols, such as LDAP, SMB, MSSQL and HTTP, to expand and use multiple services with the valid NTLM response. \n\nSeveral tools may be used to poison name services within local networks such as NBNSpoof, Metasploit, and [Responder](https://attack.mitre.org/software/S0174).(Citation: GitHub NBNSpoof)(Citation: Rapid7 LLMNR Spoofer)(Citation: GitHub Responder)",
|
"description": "By responding to LLMNR/NBT-NS network traffic, adversaries may spoof an authoritative source for name resolution to force communication with an adversary controlled system. This activity may be used to collect or relay authentication materials. \n\nLink-Local Multicast Name Resolution (LLMNR) and NetBIOS Name Service (NBT-NS) are Microsoft Windows components that serve as alternate methods of host identification. LLMNR is based upon the Domain Name System (DNS) format and allows hosts on the same local link to perform name resolution for other hosts. NBT-NS identifies systems on a local network by their NetBIOS name. (Citation: Wikipedia LLMNR)(Citation: TechNet NetBIOS)\n\nAdversaries can spoof an authoritative source for name resolution on a victim network by responding to LLMNR (UDP 5355)/NBT-NS (UDP 137) traffic as if they know the identity of the requested host, effectively poisoning the service so that the victims will communicate with the adversary controlled system. If the requested host belongs to a resource that requires identification/authentication, the username and NTLMv2 hash will then be sent to the adversary controlled system. The adversary can then collect the hash information sent over the wire through tools that monitor the ports for traffic or through [Network Sniffing](https://attack.mitre.org/techniques/T1040) and crack the hashes offline through [Brute Force](https://attack.mitre.org/techniques/T1110) to obtain the plaintext passwords.\n\nIn some cases where an adversary has access to a system that is in the authentication path between systems or when automated scans that use credentials attempt to authenticate to an adversary controlled system, the NTLMv1/v2 hashes can be intercepted and relayed to access and execute code against a target system. The relay step can happen in conjunction with poisoning but may also be independent of it.(Citation: byt3bl33d3r NTLM Relaying)(Citation: Secure Ideas SMB Relay) Additionally, adversaries may encapsulate the NTLMv1/v2 hashes into various protocols, such as LDAP, SMB, MSSQL and HTTP, to expand and use multiple services with the valid NTLM response. \n\nSeveral tools may be used to poison name services within local networks such as NBNSpoof, Metasploit, and [Responder](https://attack.mitre.org/software/S0174).(Citation: GitHub NBNSpoof)(Citation: Rapid7 LLMNR Spoofer)(Citation: GitHub Responder)",
|
||||||
"meta": {
|
"meta": {
|
||||||
"external_id": "T1557.001",
|
"external_id": "T1557.001",
|
||||||
"kill_chain": [
|
"kill_chain": [
|
||||||
|
@ -4827,7 +4827,7 @@
|
||||||
"value": "Temporary Elevated Cloud Access - T1548.005"
|
"value": "Temporary Elevated Cloud Access - T1548.005"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"description": "Adversaries may modify the kernel to automatically execute programs on system boot. Loadable Kernel Modules (LKMs) are pieces of code that can be loaded and unloaded into the kernel upon demand. They extend the functionality of the kernel without the need to reboot the system. For example, one type of module is the device driver, which allows the kernel to access hardware connected to the system.(Citation: Linux Kernel Programming) \n\nWhen used maliciously, LKMs can be a type of kernel-mode [Rootkit](https://attack.mitre.org/techniques/T1014) that run with the highest operating system privilege (Ring 0).(Citation: Linux Kernel Module Programming Guide) Common features of LKM based rootkits include: hiding itself, selective hiding of files, processes and network activity, as well as log tampering, providing authenticated backdoors, and enabling root access to non-privileged users.(Citation: iDefense Rootkit Overview)\n\nKernel extensions, also called kext, are used in macOS to load functionality onto a system similar to LKMs for Linux. Since the kernel is responsible for enforcing security and the kernel extensions run as apart of the kernel, kexts are not governed by macOS security policies. Kexts are loaded and unloaded through <code>kextload</code> and <code>kextunload</code> commands. Kexts need to be signed with a developer ID that is granted privileges by Apple allowing it to sign Kernel extensions. Developers without these privileges may still sign kexts but they will not load unless SIP is disabled. If SIP is enabled, the kext signature is verified before being added to the AuxKC.(Citation: System and kernel extensions in macOS)\n\nSince macOS Catalina 10.15, kernel extensions have been deprecated in favor of System Extensions. However, kexts are still allowed as \"Legacy System Extensions\" since there is no System Extension for Kernel Programming Interfaces.(Citation: Apple Kernel Extension Deprecation)\n\nAdversaries can use LKMs and kexts to conduct [Persistence](https://attack.mitre.org/tactics/TA0003) and/or [Privilege Escalation](https://attack.mitre.org/tactics/TA0004) on a system. Examples have been found in the wild, and there are some relevant open source projects as well.(Citation: Volatility Phalanx2)(Citation: CrowdStrike Linux Rootkit)(Citation: GitHub Reptile)(Citation: GitHub Diamorphine)(Citation: RSAC 2015 San Francisco Patrick Wardle)(Citation: Synack Secure Kernel Extension Broken)(Citation: Securelist Ventir)(Citation: Trend Micro Skidmap)",
|
"description": "Adversaries may modify the kernel to automatically execute programs on system boot. Loadable Kernel Modules (LKMs) are pieces of code that can be loaded and unloaded into the kernel upon demand. They extend the functionality of the kernel without the need to reboot the system. For example, one type of module is the device driver, which allows the kernel to access hardware connected to the system.(Citation: Linux Kernel Programming) \n\nWhen used maliciously, LKMs can be a type of kernel-mode [Rootkit](https://attack.mitre.org/techniques/T1014) that run with the highest operating system privilege (Ring 0).(Citation: Linux Kernel Module Programming Guide) Common features of LKM based rootkits include: hiding itself, selective hiding of files, processes and network activity, as well as log tampering, providing authenticated backdoors, and enabling root access to non-privileged users.(Citation: iDefense Rootkit Overview)\n\nKernel extensions, also called kext, are used in macOS to load functionality onto a system similar to LKMs for Linux. Since the kernel is responsible for enforcing security and the kernel extensions run as apart of the kernel, kexts are not governed by macOS security policies. Kexts are loaded and unloaded through <code>kextload</code> and <code>kextunload</code> commands. Kexts need to be signed with a developer ID that is granted privileges by Apple allowing it to sign Kernel extensions. Developers without these privileges may still sign kexts but they will not load unless SIP is disabled. If SIP is enabled, the kext signature is verified before being added to the AuxKC.(Citation: System and kernel extensions in macOS)\n\nSince macOS Catalina 10.15, kernel extensions have been deprecated in favor of System Extensions. However, kexts are still allowed as \"Legacy System Extensions\" since there is no System Extension for Kernel Programming Interfaces.(Citation: Apple Kernel Extension Deprecation)\n\nAdversaries can use LKMs and kexts to conduct [Persistence](https://attack.mitre.org/tactics/TA0003) and/or [Privilege Escalation](https://attack.mitre.org/tactics/TA0004) on a system. Examples have been found in the wild, and there are some relevant open source projects as well.(Citation: Volatility Phalanx2)(Citation: CrowdStrike Linux Rootkit)(Citation: GitHub Reptile)(Citation: GitHub Diamorphine)(Citation: RSAC 2015 San Francisco Patrick Wardle)(Citation: Synack Secure Kernel Extension Broken)(Citation: Securelist Ventir)(Citation: Trend Micro Skidmap)",
|
||||||
"meta": {
|
"meta": {
|
||||||
"external_id": "T1547.006",
|
"external_id": "T1547.006",
|
||||||
"kill_chain": [
|
"kill_chain": [
|
||||||
|
@ -5160,7 +5160,7 @@
|
||||||
"value": "Exfiltration Over C2 Channel - T1041"
|
"value": "Exfiltration Over C2 Channel - T1041"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"description": "Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. A common goal for post-compromise exploitation of remote services is for lateral movement to enable access to a remote system.\n\nAn adversary may need to determine if the remote system is in a vulnerable state, which may be done through [Network Service Discovery](https://attack.mitre.org/techniques/T1046) or other Discovery methods looking for common, vulnerable software that may be deployed in the network, the lack of certain patches that may indicate vulnerabilities, or security software that may be used to detect or contain remote exploitation. Servers are likely a high value target for lateral movement exploitation, but endpoint systems may also be at risk if they provide an advantage or access to additional resources.\n\nThere are several well-known vulnerabilities that exist in common services such as SMB (Citation: CIS Multiple SMB Vulnerabilities) and RDP (Citation: NVD CVE-2017-0176) as well as applications that may be used within internal networks such as MySQL (Citation: NVD CVE-2016-6662) and web server services.(Citation: NVD CVE-2014-7169)\n\nDepending on the permissions level of the vulnerable remote service an adversary may achieve [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068) as a result of lateral movement exploitation as well.",
|
"description": "Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. A common goal for post-compromise exploitation of remote services is for lateral movement to enable access to a remote system.\n\nAn adversary may need to determine if the remote system is in a vulnerable state, which may be done through [Network Service Discovery](https://attack.mitre.org/techniques/T1046) or other Discovery methods looking for common, vulnerable software that may be deployed in the network, the lack of certain patches that may indicate vulnerabilities, or security software that may be used to detect or contain remote exploitation. Servers are likely a high value target for lateral movement exploitation, but endpoint systems may also be at risk if they provide an advantage or access to additional resources.\n\nThere are several well-known vulnerabilities that exist in common services such as SMB (Citation: CIS Multiple SMB Vulnerabilities) and RDP (Citation: NVD CVE-2017-0176) as well as applications that may be used within internal networks such as MySQL (Citation: NVD CVE-2016-6662) and web server services.(Citation: NVD CVE-2014-7169)\n\nDepending on the permissions level of the vulnerable remote service an adversary may achieve [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068) as a result of lateral movement exploitation as well.",
|
||||||
"meta": {
|
"meta": {
|
||||||
"external_id": "T1210",
|
"external_id": "T1210",
|
||||||
"kill_chain": [
|
"kill_chain": [
|
||||||
|
@ -5997,7 +5997,7 @@
|
||||||
"value": "Bypass User Account Control - T1088"
|
"value": "Bypass User Account Control - T1088"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"description": "Adversaries may exploit a system or application vulnerability to bypass security features. Exploitation of a vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. Vulnerabilities may exist in defensive security software that can be used to disable or circumvent them.\n\nAdversaries may have prior knowledge through reconnaissance that security software exists within an environment or they may perform checks during or shortly after the system is compromised for [Security Software Discovery](https://attack.mitre.org/techniques/T1518/001). The security software will likely be targeted directly for exploitation. There are examples of antivirus software being targeted by persistent threat groups to avoid detection.\n\nThere have also been examples of vulnerabilities in public cloud infrastructure of SaaS applications that may bypass defense boundaries (Citation: Salesforce zero-day in facebook phishing attack), evade security logs (Citation: Bypassing CloudTrail in AWS Service Catalog), or deploy hidden infrastructure.(Citation: GhostToken GCP flaw)",
|
"description": "Adversaries may exploit a system or application vulnerability to bypass security features. Exploitation of a vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. Vulnerabilities may exist in defensive security software that can be used to disable or circumvent them.\n\nAdversaries may have prior knowledge through reconnaissance that security software exists within an environment or they may perform checks during or shortly after the system is compromised for [Security Software Discovery](https://attack.mitre.org/techniques/T1518/001). The security software will likely be targeted directly for exploitation. There are examples of antivirus software being targeted by persistent threat groups to avoid detection.\n\nThere have also been examples of vulnerabilities in public cloud infrastructure of SaaS applications that may bypass defense boundaries (Citation: Salesforce zero-day in facebook phishing attack), evade security logs (Citation: Bypassing CloudTrail in AWS Service Catalog), or deploy hidden infrastructure.(Citation: GhostToken GCP flaw)",
|
||||||
"meta": {
|
"meta": {
|
||||||
"external_id": "T1211",
|
"external_id": "T1211",
|
||||||
"kill_chain": [
|
"kill_chain": [
|
||||||
|
@ -6056,7 +6056,7 @@
|
||||||
"value": "Extra Window Memory Injection - T1181"
|
"value": "Extra Window Memory Injection - T1181"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"description": "Adversaries may exploit software vulnerabilities in an attempt to collect credentials. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. \n\nCredentialing and authentication mechanisms may be targeted for exploitation by adversaries as a means to gain access to useful credentials or circumvent the process to gain authenticated access to systems. One example of this is `MS14-068`, which targets Kerberos and can be used to forge Kerberos tickets using domain user permissions.(Citation: Technet MS14-068)(Citation: ADSecurity Detecting Forged Tickets) Another example of this is replay attacks, in which the adversary intercepts data packets sent between parties and then later replays these packets. If services don't properly validate authentication requests, these replayed packets may allow an adversary to impersonate one of the parties and gain unauthorized access or privileges.(Citation: Bugcrowd Replay Attack)(Citation: Comparitech Replay Attack)(Citation: Microsoft Midnight Blizzard Replay Attack)\n\nSuch exploitation has been demonstrated in cloud environments as well. For example, adversaries have exploited vulnerabilities in public cloud infrastructure that allowed for unintended authentication token creation and renewal.(Citation: Storm-0558 techniques for unauthorized email access)\n\nExploitation for credential access may also result in Privilege Escalation depending on the process targeted or credentials obtained.",
|
"description": "Adversaries may exploit software vulnerabilities in an attempt to collect credentials. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. \n\nCredentialing and authentication mechanisms may be targeted for exploitation by adversaries as a means to gain access to useful credentials or circumvent the process to gain authenticated access to systems. One example of this is `MS14-068`, which targets Kerberos and can be used to forge Kerberos tickets using domain user permissions.(Citation: Technet MS14-068)(Citation: ADSecurity Detecting Forged Tickets) Another example of this is replay attacks, in which the adversary intercepts data packets sent between parties and then later replays these packets. If services don't properly validate authentication requests, these replayed packets may allow an adversary to impersonate one of the parties and gain unauthorized access or privileges.(Citation: Bugcrowd Replay Attack)(Citation: Comparitech Replay Attack)(Citation: Microsoft Midnight Blizzard Replay Attack)\n\nSuch exploitation has been demonstrated in cloud environments as well. For example, adversaries have exploited vulnerabilities in public cloud infrastructure that allowed for unintended authentication token creation and renewal.(Citation: Storm-0558 techniques for unauthorized email access)\n\nExploitation for credential access may also result in Privilege Escalation depending on the process targeted or credentials obtained.",
|
||||||
"meta": {
|
"meta": {
|
||||||
"external_id": "T1212",
|
"external_id": "T1212",
|
||||||
"kill_chain": [
|
"kill_chain": [
|
||||||
|
@ -6161,7 +6161,7 @@
|
||||||
"value": "System Network Connections Discovery - T1421"
|
"value": "System Network Connections Discovery - T1421"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"description": "Loadable Kernel Modules (or LKMs) are pieces of code that can be loaded and unloaded into the kernel upon demand. They extend the functionality of the kernel without the need to reboot the system. For example, one type of module is the device driver, which allows the kernel to access hardware connected to the system. (Citation: Linux Kernel Programming) When used maliciously, Loadable Kernel Modules (LKMs) can be a type of kernel-mode [Rootkit](https://attack.mitre.org/techniques/T1014) that run with the highest operating system privilege (Ring 0). (Citation: Linux Kernel Module Programming Guide) Adversaries can use loadable kernel modules to covertly persist on a system and evade defenses. Examples have been found in the wild and there are some open source projects. (Citation: Volatility Phalanx2) (Citation: CrowdStrike Linux Rootkit) (Citation: GitHub Reptile) (Citation: GitHub Diamorphine)\n\nCommon features of LKM based rootkits include: hiding itself, selective hiding of files, processes and network activity, as well as log tampering, providing authenticated backdoors and enabling root access to non-privileged users. (Citation: iDefense Rootkit Overview)\n\nKernel extensions, also called kext, are used for macOS to load functionality onto a system similar to LKMs for Linux. They are loaded and unloaded through <code>kextload</code> and <code>kextunload</code> commands. Several examples have been found where this can be used. (Citation: RSAC 2015 San Francisco Patrick Wardle) (Citation: Synack Secure Kernel Extension Broken) Examples have been found in the wild. (Citation: Securelist Ventir)",
|
"description": "Loadable Kernel Modules (or LKMs) are pieces of code that can be loaded and unloaded into the kernel upon demand. They extend the functionality of the kernel without the need to reboot the system. For example, one type of module is the device driver, which allows the kernel to access hardware connected to the system. (Citation: Linux Kernel Programming) When used maliciously, Loadable Kernel Modules (LKMs) can be a type of kernel-mode [Rootkit](https://attack.mitre.org/techniques/T1014) that run with the highest operating system privilege (Ring 0). (Citation: Linux Kernel Module Programming Guide) Adversaries can use loadable kernel modules to covertly persist on a system and evade defenses. Examples have been found in the wild and there are some open source projects. (Citation: Volatility Phalanx2) (Citation: CrowdStrike Linux Rootkit) (Citation: GitHub Reptile) (Citation: GitHub Diamorphine)\n\nCommon features of LKM based rootkits include: hiding itself, selective hiding of files, processes and network activity, as well as log tampering, providing authenticated backdoors and enabling root access to non-privileged users. (Citation: iDefense Rootkit Overview)\n\nKernel extensions, also called kext, are used for macOS to load functionality onto a system similar to LKMs for Linux. They are loaded and unloaded through <code>kextload</code> and <code>kextunload</code> commands. Several examples have been found where this can be used. (Citation: RSAC 2015 San Francisco Patrick Wardle) (Citation: Synack Secure Kernel Extension Broken) Examples have been found in the wild. (Citation: Securelist Ventir)",
|
||||||
"meta": {
|
"meta": {
|
||||||
"external_id": "T1215",
|
"external_id": "T1215",
|
||||||
"kill_chain": [
|
"kill_chain": [
|
||||||
|
@ -11307,7 +11307,7 @@
|
||||||
"value": "Purchase Technical Data - T1597.002"
|
"value": "Purchase Technical Data - T1597.002"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"description": "Adversaries may rent Virtual Private Servers (VPSs) that can be used during targeting. There exist a variety of cloud service providers that will sell virtual machines/containers as a service. By utilizing a VPS, adversaries can make it difficult to physically tie back operations to them. The use of cloud infrastructure can also make it easier for adversaries to rapidly provision, modify, and shut down their infrastructure.\n\nAcquiring a VPS for use in later stages of the adversary lifecycle, such as Command and Control, can allow adversaries to benefit from the ubiquity and trust associated with higher reputation cloud service providers. Adversaries may also acquire infrastructure from VPS service providers that are known for renting VPSs with minimal registration information, allowing for more anonymous acquisitions of infrastructure.(Citation: TrendmicroHideoutsLease)",
|
"description": "Adversaries may rent Virtual Private Servers (VPSs) that can be used during targeting. There exist a variety of cloud service providers that will sell virtual machines/containers as a service. By utilizing a VPS, adversaries can make it difficult to physically tie back operations to them. The use of cloud infrastructure can also make it easier for adversaries to rapidly provision, modify, and shut down their infrastructure.\n\nAcquiring a VPS for use in later stages of the adversary lifecycle, such as Command and Control, can allow adversaries to benefit from the ubiquity and trust associated with higher reputation cloud service providers. Adversaries may also acquire infrastructure from VPS service providers that are known for renting VPSs with minimal registration information, allowing for more anonymous acquisitions of infrastructure.(Citation: TrendmicroHideoutsLease)",
|
||||||
"meta": {
|
"meta": {
|
||||||
"external_id": "T1583.003",
|
"external_id": "T1583.003",
|
||||||
"kill_chain": [
|
"kill_chain": [
|
||||||
|
@ -22346,7 +22346,7 @@
|
||||||
"value": "DNS Calculation - T1568.003"
|
"value": "DNS Calculation - T1568.003"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"description": "Adversaries may register for web services that can be used during targeting. A variety of popular websites exist for adversaries to register for a web-based service that can be abused during later stages of the adversary lifecycle, such as during Command and Control ([Web Service](https://attack.mitre.org/techniques/T1102)), [Exfiltration Over Web Service](https://attack.mitre.org/techniques/T1567), or [Phishing](https://attack.mitre.org/techniques/T1566). Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. By utilizing a web service, adversaries can make it difficult to physically tie back operations to them.",
|
"description": "Adversaries may register for web services that can be used during targeting. A variety of popular websites exist for adversaries to register for a web-based service that can be abused during later stages of the adversary lifecycle, such as during Command and Control ([Web Service](https://attack.mitre.org/techniques/T1102)), [Exfiltration Over Web Service](https://attack.mitre.org/techniques/T1567), or [Phishing](https://attack.mitre.org/techniques/T1566). Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. By utilizing a web service, adversaries can make it difficult to physically tie back operations to them.",
|
||||||
"meta": {
|
"meta": {
|
||||||
"external_id": "T1583.006",
|
"external_id": "T1583.006",
|
||||||
"kill_chain": [
|
"kill_chain": [
|
||||||
|
@ -22662,7 +22662,7 @@
|
||||||
"value": "Accessibility Features - T1546.008"
|
"value": "Accessibility Features - T1546.008"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"description": "Adversaries may compromise access to third-party web services that can be used during targeting. A variety of popular websites exist for legitimate users to register for web-based services, such as GitHub, Twitter, Dropbox, Google, SendGrid, etc. Adversaries may try to take ownership of a legitimate user's access to a web service and use that web service as infrastructure in support of cyber operations. Such web services can be abused during later stages of the adversary lifecycle, such as during Command and Control ([Web Service](https://attack.mitre.org/techniques/T1102)), [Exfiltration Over Web Service](https://attack.mitre.org/techniques/T1567), or [Phishing](https://attack.mitre.org/techniques/T1566).(Citation: Recorded Future Turla Infra 2020) Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. By utilizing a web service, particularly when access is stolen from legitimate users, adversaries can make it difficult to physically tie back operations to them. Additionally, leveraging compromised web-based email services may allow adversaries to leverage the trust associated with legitimate domains.",
|
"description": "Adversaries may compromise access to third-party web services that can be used during targeting. A variety of popular websites exist for legitimate users to register for web-based services, such as GitHub, Twitter, Dropbox, Google, SendGrid, etc. Adversaries may try to take ownership of a legitimate user's access to a web service and use that web service as infrastructure in support of cyber operations. Such web services can be abused during later stages of the adversary lifecycle, such as during Command and Control ([Web Service](https://attack.mitre.org/techniques/T1102)), [Exfiltration Over Web Service](https://attack.mitre.org/techniques/T1567), or [Phishing](https://attack.mitre.org/techniques/T1566).(Citation: Recorded Future Turla Infra 2020) Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. By utilizing a web service, particularly when access is stolen from legitimate users, adversaries can make it difficult to physically tie back operations to them. Additionally, leveraging compromised web-based email services may allow adversaries to leverage the trust associated with legitimate domains.",
|
||||||
"meta": {
|
"meta": {
|
||||||
"external_id": "T1584.006",
|
"external_id": "T1584.006",
|
||||||
"kill_chain": [
|
"kill_chain": [
|
||||||
|
@ -25765,7 +25765,7 @@
|
||||||
"value": "Obfuscate infrastructure - T1331"
|
"value": "Obfuscate infrastructure - T1331"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"description": "Adversaries may implement hidden windows to conceal malicious activity from the plain sight of users. In some cases, windows that would typically be displayed when an application carries out an operation can be hidden. This may be utilized by system administrators to avoid disrupting user work environments when carrying out administrative tasks. Adversaries may abuse operating system functionality to hide otherwise visible windows from users so as not to alert the user to adversary activity on the system.\n\n### Windows\nThere are a variety of features in scripting languages in Windows, such as [PowerShell](https://attack.mitre.org/techniques/T1086), Jscript, and VBScript to make windows hidden. One example of this is <code>powershell.exe -WindowStyle Hidden</code>. (Citation: PowerShell About 2019)\n\n### Mac\nThe configurations for how applications run on macOS are listed in property list (plist) files. One of the tags in these files can be <code>apple.awt.UIElement</code>, which allows for Java applications to prevent the application's icon from appearing in the Dock. A common use for this is when applications run in the system tray, but don't also want to show up in the Dock. However, adversaries can abuse this feature and hide their running window.(Citation: Antiquated Mac Malware)\n",
|
"description": "Adversaries may implement hidden windows to conceal malicious activity from the plain sight of users. In some cases, windows that would typically be displayed when an application carries out an operation can be hidden. This may be utilized by system administrators to avoid disrupting user work environments when carrying out administrative tasks. Adversaries may abuse operating system functionality to hide otherwise visible windows from users so as not to alert the user to adversary activity on the system.\n\n### Windows\nThere are a variety of features in scripting languages in Windows, such as [PowerShell](https://attack.mitre.org/techniques/T1086), Jscript, and VBScript to make windows hidden. One example of this is <code>powershell.exe -WindowStyle Hidden</code>. (Citation: PowerShell About 2019)\n\n### Mac\nThe configurations for how applications run on macOS are listed in property list (plist) files. One of the tags in these files can be <code>apple.awt.UIElement</code>, which allows for Java applications to prevent the application's icon from appearing in the Dock. A common use for this is when applications run in the system tray, but don't also want to show up in the Dock. However, adversaries can abuse this feature and hide their running window.(Citation: Antiquated Mac Malware)\n",
|
||||||
"meta": {
|
"meta": {
|
||||||
"external_id": "T1143",
|
"external_id": "T1143",
|
||||||
"kill_chain": [
|
"kill_chain": [
|
||||||
|
@ -28335,7 +28335,7 @@
|
||||||
"value": "Steganography - T1027.003"
|
"value": "Steganography - T1027.003"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"description": "Adversaries may abuse AppleScript for execution. AppleScript is a macOS scripting language designed to control applications and parts of the OS via inter-application messages called AppleEvents.(Citation: Apple AppleScript) These AppleEvent messages can be sent independently or easily scripted with AppleScript. These events can locate open windows, send keystrokes, and interact with almost any open application locally or remotely.\n\nScripts can be run from the command-line via <code>osascript /path/to/script</code> or <code>osascript -e \"script here\"</code>. Aside from the command line, scripts can be executed in numerous ways including Mail rules, Calendar.app alarms, and Automator workflows. AppleScripts can also be executed as plain text shell scripts by adding <code>#!/usr/bin/osascript</code> to the start of the script file.(Citation: SentinelOne AppleScript)\n\nAppleScripts do not need to call <code>osascript</code> to execute. However, they may be executed from within mach-O binaries by using the macOS [Native API](https://attack.mitre.org/techniques/T1106)s <code>NSAppleScript</code> or <code>OSAScript</code>, both of which execute code independent of the <code>/usr/bin/osascript</code> command line utility.\n\nAdversaries may abuse AppleScript to execute various behaviors, such as interacting with an open SSH connection, moving to remote machines, and even presenting users with fake dialog boxes. These events cannot start applications remotely (they can start them locally), but they can interact with applications if they're already running remotely. On macOS 10.10 Yosemite and higher, AppleScript has the ability to execute [Native API](https://attack.mitre.org/techniques/T1106)s, which otherwise would require compilation and execution in a mach-O binary file format.(Citation: SentinelOne macOS Red Team) Since this is a scripting language, it can be used to launch more common techniques as well such as a reverse shell via [Python](https://attack.mitre.org/techniques/T1059/006).(Citation: Macro Malware Targets Macs)",
|
"description": "Adversaries may abuse AppleScript for execution. AppleScript is a macOS scripting language designed to control applications and parts of the OS via inter-application messages called AppleEvents.(Citation: Apple AppleScript) These AppleEvent messages can be sent independently or easily scripted with AppleScript. These events can locate open windows, send keystrokes, and interact with almost any open application locally or remotely.\n\nScripts can be run from the command-line via <code>osascript /path/to/script</code> or <code>osascript -e \"script here\"</code>. Aside from the command line, scripts can be executed in numerous ways including Mail rules, Calendar.app alarms, and Automator workflows. AppleScripts can also be executed as plain text shell scripts by adding <code>#!/usr/bin/osascript</code> to the start of the script file.(Citation: SentinelOne AppleScript)\n\nAppleScripts do not need to call <code>osascript</code> to execute. However, they may be executed from within mach-O binaries by using the macOS [Native API](https://attack.mitre.org/techniques/T1106)s <code>NSAppleScript</code> or <code>OSAScript</code>, both of which execute code independent of the <code>/usr/bin/osascript</code> command line utility.\n\nAdversaries may abuse AppleScript to execute various behaviors, such as interacting with an open SSH connection, moving to remote machines, and even presenting users with fake dialog boxes. These events cannot start applications remotely (they can start them locally), but they can interact with applications if they're already running remotely. On macOS 10.10 Yosemite and higher, AppleScript has the ability to execute [Native API](https://attack.mitre.org/techniques/T1106)s, which otherwise would require compilation and execution in a mach-O binary file format.(Citation: SentinelOne macOS Red Team) Since this is a scripting language, it can be used to launch more common techniques as well such as a reverse shell via [Python](https://attack.mitre.org/techniques/T1059/006).(Citation: Macro Malware Targets Macs)",
|
||||||
"meta": {
|
"meta": {
|
||||||
"external_id": "T1059.002",
|
"external_id": "T1059.002",
|
||||||
"kill_chain": [
|
"kill_chain": [
|
||||||
|
@ -29402,7 +29402,7 @@
|
||||||
"value": "Tool - T1588.002"
|
"value": "Tool - T1588.002"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"description": "Adversaries may buy, lease, or rent physical servers that can be used during targeting. Use of servers allows an adversary to stage, launch, and execute an operation. During post-compromise activity, adversaries may utilize servers for various tasks, including for Command and Control. Adversaries may use web servers to support support watering hole operations, as in [Drive-by Compromise](https://attack.mitre.org/techniques/T1189), or email servers to support [Phishing](https://attack.mitre.org/techniques/T1566) operations. Instead of compromising a third-party [Server](https://attack.mitre.org/techniques/T1584/004) or renting a [Virtual Private Server](https://attack.mitre.org/techniques/T1583/003), adversaries may opt to configure and run their own servers in support of operations.\n\nAdversaries may only need a lightweight setup if most of their activities will take place using online infrastructure. Or, they may need to build extensive infrastructure if they want to test, communicate, and control other aspects of their activities on their own systems.(Citation: NYTStuxnet)",
|
"description": "Adversaries may buy, lease, or rent physical servers that can be used during targeting. Use of servers allows an adversary to stage, launch, and execute an operation. During post-compromise activity, adversaries may utilize servers for various tasks, including for Command and Control. Adversaries may use web servers to support support watering hole operations, as in [Drive-by Compromise](https://attack.mitre.org/techniques/T1189), or email servers to support [Phishing](https://attack.mitre.org/techniques/T1566) operations. Instead of compromising a third-party [Server](https://attack.mitre.org/techniques/T1584/004) or renting a [Virtual Private Server](https://attack.mitre.org/techniques/T1583/003), adversaries may opt to configure and run their own servers in support of operations.\n\nAdversaries may only need a lightweight setup if most of their activities will take place using online infrastructure. Or, they may need to build extensive infrastructure if they want to test, communicate, and control other aspects of their activities on their own systems.(Citation: NYTStuxnet)",
|
||||||
"meta": {
|
"meta": {
|
||||||
"external_id": "T1583.004",
|
"external_id": "T1583.004",
|
||||||
"kill_chain": [
|
"kill_chain": [
|
||||||
|
@ -29433,7 +29433,7 @@
|
||||||
"value": "Server - T1583.004"
|
"value": "Server - T1583.004"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"description": "Adversaries may buy, lease, or rent a network of compromised systems that can be used during targeting. A botnet is a network of compromised systems that can be instructed to perform coordinated tasks.(Citation: Norton Botnet) Adversaries may purchase a subscription to use an existing botnet from a booter/stresser service. With a botnet at their disposal, adversaries may perform follow-on activity such as large-scale [Phishing](https://attack.mitre.org/techniques/T1566) or Distributed Denial of Service (DDoS).(Citation: Imperva DDoS for Hire)(Citation: Krebs-Anna)(Citation: Krebs-Bazaar)(Citation: Krebs-Booter)",
|
"description": "Adversaries may buy, lease, or rent a network of compromised systems that can be used during targeting. A botnet is a network of compromised systems that can be instructed to perform coordinated tasks.(Citation: Norton Botnet) Adversaries may purchase a subscription to use an existing botnet from a booter/stresser service. With a botnet at their disposal, adversaries may perform follow-on activity such as large-scale [Phishing](https://attack.mitre.org/techniques/T1566) or Distributed Denial of Service (DDoS).(Citation: Imperva DDoS for Hire)(Citation: Krebs-Anna)(Citation: Krebs-Bazaar)(Citation: Krebs-Booter)",
|
||||||
"meta": {
|
"meta": {
|
||||||
"external_id": "T1583.005",
|
"external_id": "T1583.005",
|
||||||
"kill_chain": [
|
"kill_chain": [
|
||||||
|
@ -29617,7 +29617,7 @@
|
||||||
"value": "Trap - T1546.005"
|
"value": "Trap - T1546.005"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"description": "Adversaries may compromise numerous third-party systems to form a botnet that can be used during targeting. A botnet is a network of compromised systems that can be instructed to perform coordinated tasks.(Citation: Norton Botnet) Instead of purchasing/renting a botnet from a booter/stresser service, adversaries may build their own botnet by compromising numerous third-party systems.(Citation: Imperva DDoS for Hire) Adversaries may also conduct a takeover of an existing botnet, such as redirecting bots to adversary-controlled C2 servers.(Citation: Dell Dridex Oct 2015) With a botnet at their disposal, adversaries may perform follow-on activity such as large-scale [Phishing](https://attack.mitre.org/techniques/T1566) or Distributed Denial of Service (DDoS).",
|
"description": "Adversaries may compromise numerous third-party systems to form a botnet that can be used during targeting. A botnet is a network of compromised systems that can be instructed to perform coordinated tasks.(Citation: Norton Botnet) Instead of purchasing/renting a botnet from a booter/stresser service, adversaries may build their own botnet by compromising numerous third-party systems.(Citation: Imperva DDoS for Hire) Adversaries may also conduct a takeover of an existing botnet, such as redirecting bots to adversary-controlled C2 servers.(Citation: Dell Dridex Oct 2015) With a botnet at their disposal, adversaries may perform follow-on activity such as large-scale [Phishing](https://attack.mitre.org/techniques/T1566) or Distributed Denial of Service (DDoS).",
|
||||||
"meta": {
|
"meta": {
|
||||||
"external_id": "T1584.005",
|
"external_id": "T1584.005",
|
||||||
"kill_chain": [
|
"kill_chain": [
|
||||||
|
|
File diff suppressed because it is too large
Load diff
File diff suppressed because it is too large
Load diff
|
@ -527,13 +527,6 @@
|
||||||
"dest-uuid": "f303a39a-6255-4b89-aecc-18c4d8ca7163",
|
"dest-uuid": "f303a39a-6255-4b89-aecc-18c4d8ca7163",
|
||||||
"type": "uses"
|
"type": "uses"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"dest-uuid": "7f3a035d-d83a-45b8-8111-412aa8ade802",
|
|
||||||
"tags": [
|
|
||||||
"estimative-language:likelihood-probability=\"likely\""
|
|
||||||
],
|
|
||||||
"type": "similar"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"dest-uuid": "0a3ead4e-6d47-4ccb-854c-a6a4f9d96b22",
|
"dest-uuid": "0a3ead4e-6d47-4ccb-854c-a6a4f9d96b22",
|
||||||
"tags": [
|
"tags": [
|
||||||
|
@ -583,13 +576,6 @@
|
||||||
"dest-uuid": "731f4f55-b6d0-41d1-a7a9-072a66389aea",
|
"dest-uuid": "731f4f55-b6d0-41d1-a7a9-072a66389aea",
|
||||||
"type": "uses"
|
"type": "uses"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"dest-uuid": "3fb18a77-91ef-4c68-a9a9-fa6bdbea38e8",
|
|
||||||
"tags": [
|
|
||||||
"estimative-language:likelihood-probability=\"likely\""
|
|
||||||
],
|
|
||||||
"type": "similar"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"dest-uuid": "731f4f55-b6d0-41d1-a7a9-072a66389aea",
|
"dest-uuid": "731f4f55-b6d0-41d1-a7a9-072a66389aea",
|
||||||
"tags": [
|
"tags": [
|
||||||
|
@ -723,13 +709,6 @@
|
||||||
],
|
],
|
||||||
"type": "similar"
|
"type": "similar"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"dest-uuid": "8410d208-7450-407d-b56c-e5c1ced19632",
|
|
||||||
"tags": [
|
|
||||||
"estimative-language:likelihood-probability=\"likely\""
|
|
||||||
],
|
|
||||||
"type": "similar"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"dest-uuid": "0a3ead4e-6d47-4ccb-854c-a6a4f9d96b22",
|
"dest-uuid": "0a3ead4e-6d47-4ccb-854c-a6a4f9d96b22",
|
||||||
"tags": [
|
"tags": [
|
||||||
|
@ -1476,13 +1455,6 @@
|
||||||
"dest-uuid": "f1951e8a-500e-4a26-8803-76d95c4554b4",
|
"dest-uuid": "f1951e8a-500e-4a26-8803-76d95c4554b4",
|
||||||
"type": "uses"
|
"type": "uses"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"dest-uuid": "6dd05630-9bd8-11e8-a8b9-47ce338a4367",
|
|
||||||
"tags": [
|
|
||||||
"estimative-language:likelihood-probability=\"likely\""
|
|
||||||
],
|
|
||||||
"type": "similar"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"dest-uuid": "ffe742ed-9100-4686-9e00-c331da544787",
|
"dest-uuid": "ffe742ed-9100-4686-9e00-c331da544787",
|
||||||
"tags": [
|
"tags": [
|
||||||
|
@ -2108,13 +2080,6 @@
|
||||||
],
|
],
|
||||||
"type": "similar"
|
"type": "similar"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"dest-uuid": "ccde5b0d-fe13-48e6-a6f4-4e434ce29371",
|
|
||||||
"tags": [
|
|
||||||
"estimative-language:likelihood-probability=\"likely\""
|
|
||||||
],
|
|
||||||
"type": "similar"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"dest-uuid": "ca1a3f50-5ebd-41f8-8320-2c7d6a6e88be",
|
"dest-uuid": "ca1a3f50-5ebd-41f8-8320-2c7d6a6e88be",
|
||||||
"tags": [
|
"tags": [
|
||||||
|
@ -2326,13 +2291,6 @@
|
||||||
"dest-uuid": "f1951e8a-500e-4a26-8803-76d95c4554b4",
|
"dest-uuid": "f1951e8a-500e-4a26-8803-76d95c4554b4",
|
||||||
"type": "uses"
|
"type": "uses"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"dest-uuid": "811bdec0-e236-48ae-b27c-1a8fe0bfc3a9",
|
|
||||||
"tags": [
|
|
||||||
"estimative-language:likelihood-probability=\"likely\""
|
|
||||||
],
|
|
||||||
"type": "similar"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"dest-uuid": "f44731de-ea9f-406d-9b83-30ecbb9b4392",
|
"dest-uuid": "f44731de-ea9f-406d-9b83-30ecbb9b4392",
|
||||||
"tags": [
|
"tags": [
|
||||||
|
@ -2629,13 +2587,6 @@
|
||||||
"dest-uuid": "f4599aa0-4f85-4a32-80ea-fc39dc965945",
|
"dest-uuid": "f4599aa0-4f85-4a32-80ea-fc39dc965945",
|
||||||
"type": "uses"
|
"type": "uses"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"dest-uuid": "bdb420be-5882-41c8-b439-02bbef69d83f",
|
|
||||||
"tags": [
|
|
||||||
"estimative-language:likelihood-probability=\"likely\""
|
|
||||||
],
|
|
||||||
"type": "similar"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"dest-uuid": "7fd87010-3a00-4da3-b905-410525e8ec44",
|
"dest-uuid": "7fd87010-3a00-4da3-b905-410525e8ec44",
|
||||||
"tags": [
|
"tags": [
|
||||||
|
@ -4026,27 +3977,6 @@
|
||||||
"dest-uuid": "eb6cf439-1bcb-4d10-bc68-1eed844ed7b3",
|
"dest-uuid": "eb6cf439-1bcb-4d10-bc68-1eed844ed7b3",
|
||||||
"type": "uses"
|
"type": "uses"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"dest-uuid": "e683cd91-40b4-4e1c-be25-34a27610a22e",
|
|
||||||
"tags": [
|
|
||||||
"estimative-language:likelihood-probability=\"likely\""
|
|
||||||
],
|
|
||||||
"type": "similar"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"dest-uuid": "4cfa42a3-71d9-43e2-bf23-daa79f326387",
|
|
||||||
"tags": [
|
|
||||||
"estimative-language:likelihood-probability=\"likely\""
|
|
||||||
],
|
|
||||||
"type": "similar"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"dest-uuid": "5a78ec38-8b93-4dde-a99e-0c9b77674838",
|
|
||||||
"tags": [
|
|
||||||
"estimative-language:likelihood-probability=\"likely\""
|
|
||||||
],
|
|
||||||
"type": "similar"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"dest-uuid": "e8b4e1ec-8e3b-484c-9038-4459b1ed8060",
|
"dest-uuid": "e8b4e1ec-8e3b-484c-9038-4459b1ed8060",
|
||||||
"tags": [
|
"tags": [
|
||||||
|
|
133
clusters/producer.json
Normal file
133
clusters/producer.json
Normal file
|
@ -0,0 +1,133 @@
|
||||||
|
{
|
||||||
|
"authors": [
|
||||||
|
"Various"
|
||||||
|
],
|
||||||
|
"category": "actor",
|
||||||
|
"description": "List of threat intelligence producer from security vendors to CERTs including any producer of intelligence at large.",
|
||||||
|
"name": "Producer",
|
||||||
|
"source": "MISP Project",
|
||||||
|
"type": "producer",
|
||||||
|
"uuid": "faab7b69-c850-491a-b36c-ba48c1c03279",
|
||||||
|
"values": [
|
||||||
|
{
|
||||||
|
"description": "Intel 471 provides adversary and malware intelligence for leading security teams. Our adversary intelligence is focused on infiltrating access to closed sources where threat actors collaborate, communicate and plan cyber attacks. Our malware intelligence leverages our adversary intelligence and underground capabilities to provide timely data and context on malicious infrastructure.",
|
||||||
|
"meta": {
|
||||||
|
"company-type": [
|
||||||
|
"Cyber Security Vendor"
|
||||||
|
],
|
||||||
|
"country": "US",
|
||||||
|
"official-refs": [
|
||||||
|
"https://intel471.com/"
|
||||||
|
],
|
||||||
|
"product-type": [
|
||||||
|
"intelligence-feed-provider"
|
||||||
|
],
|
||||||
|
"products": [
|
||||||
|
"Malware Intelligence",
|
||||||
|
"Vulnerability Intelligence"
|
||||||
|
],
|
||||||
|
"refs": [
|
||||||
|
"https://www.applytosupply.digitalmarketplace.service.gov.uk/g-cloud/services/448869643798857"
|
||||||
|
],
|
||||||
|
"synonyms": [
|
||||||
|
"Intel 471 Inc.",
|
||||||
|
"Intel 471"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "306bc923-3200-47e3-ade9-50ffc41f668c",
|
||||||
|
"value": "Intel471"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "Sophos Ltd. is a British-based security software and hardware company. It was listed on the London Stock Exchange until it was acquired by Thoma Bravo in February 2020",
|
||||||
|
"meta": {
|
||||||
|
"company-type": [
|
||||||
|
"Cyber Security Vendor"
|
||||||
|
],
|
||||||
|
"country": "UK",
|
||||||
|
"official-refs": [
|
||||||
|
"https://www.sophos.com/"
|
||||||
|
],
|
||||||
|
"product-type": [
|
||||||
|
"antivirus-vendor"
|
||||||
|
],
|
||||||
|
"products": [
|
||||||
|
"Endpoint"
|
||||||
|
],
|
||||||
|
"refs": [
|
||||||
|
"https://www.sophos.com/en-us/legal"
|
||||||
|
],
|
||||||
|
"synonyms": [
|
||||||
|
"Sophos LTD"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "455b9e40-e8dd-443b-87b3-c70bd09b4231",
|
||||||
|
"value": "Sophos"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "Group-IB is a creator of cybersecurity technologies to investigate, prevent and fight digital crime",
|
||||||
|
"uuid": "21afba9e-cd2a-45c9-b421-b1f14fd181e9",
|
||||||
|
"value": "Group-IB"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "",
|
||||||
|
"uuid": "da5cdcd1-7b15-4371-b7eb-ca32916d2052",
|
||||||
|
"value": "Mandiant"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "",
|
||||||
|
"uuid": "ad99da77-986b-45bc-a7b0-c1887dd55b59",
|
||||||
|
"value": "Spycloud"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "",
|
||||||
|
"uuid": "993c6a36-b625-4a1f-8737-72ba5a197744",
|
||||||
|
"value": "Domaintools"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "",
|
||||||
|
"uuid": "4e7c737a-4912-488a-8571-1f9226ebad05",
|
||||||
|
"value": "Feedly"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "",
|
||||||
|
"uuid": "17fec4c4-3822-4198-9735-cee04aa51305",
|
||||||
|
"value": "Networksdb.io"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "",
|
||||||
|
"uuid": "101ca178-12c8-4488-b234-93f263e30b1a",
|
||||||
|
"value": "Censys"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "",
|
||||||
|
"uuid": "3f79697b-63d8-4c86-aabf-84df1f03c43d",
|
||||||
|
"value": "DomainIQ"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "",
|
||||||
|
"uuid": "542f8890-128b-42ca-97f9-8fe2af7ab783",
|
||||||
|
"value": "Arctic"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "",
|
||||||
|
"uuid": "1e98d9ac-0ef1-4046-bf9f-7c905a56ba90",
|
||||||
|
"value": "Bitsight"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "",
|
||||||
|
"uuid": "9f279581-5514-42cd-8011-05af9787ee37",
|
||||||
|
"value": "RiskIQ"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "",
|
||||||
|
"uuid": "c9bd796a-8b73-42ab-8abe-0016292f5528",
|
||||||
|
"value": "Sweepatic"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "",
|
||||||
|
"uuid": "8a22c0b2-d05f-4142-ab74-ffdf38fe4758",
|
||||||
|
"value": "Team Cymru"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"version": 3
|
||||||
|
}
|
|
@ -1810,7 +1810,8 @@
|
||||||
"https://blogs.microsoft.com/on-the-issues/2019/03/27/new-steps-to-protect-customers-from-hacking/",
|
"https://blogs.microsoft.com/on-the-issues/2019/03/27/new-steps-to-protect-customers-from-hacking/",
|
||||||
"https://www.clearskysec.com/wp-content/uploads/2017/12/Charming_Kitten_2017.pdf",
|
"https://www.clearskysec.com/wp-content/uploads/2017/12/Charming_Kitten_2017.pdf",
|
||||||
"https://attack.mitre.org/groups/G0058/",
|
"https://attack.mitre.org/groups/G0058/",
|
||||||
"https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf"
|
"https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf",
|
||||||
|
"https://www.volexity.com/blog/2024/02/13/charmingcypress-innovating-persistence/"
|
||||||
],
|
],
|
||||||
"synonyms": [
|
"synonyms": [
|
||||||
"Newscaster",
|
"Newscaster",
|
||||||
|
@ -1818,7 +1819,8 @@
|
||||||
"iKittens",
|
"iKittens",
|
||||||
"Group 83",
|
"Group 83",
|
||||||
"NewsBeef",
|
"NewsBeef",
|
||||||
"G0058"
|
"G0058",
|
||||||
|
"CharmingCypress"
|
||||||
],
|
],
|
||||||
"targeted-sector": [
|
"targeted-sector": [
|
||||||
"Defense",
|
"Defense",
|
||||||
|
@ -12582,16 +12584,21 @@
|
||||||
{
|
{
|
||||||
"description": "Winter Vivern is a cyberespionage group first revealed by DomainTools in 2021. It is thought to have been active since at least 2020 and it targets governments in Europe and Central Asia. To compromise its targets, the group uses malicious documents, phishing websites, and a custom PowerShell backdoor.",
|
"description": "Winter Vivern is a cyberespionage group first revealed by DomainTools in 2021. It is thought to have been active since at least 2020 and it targets governments in Europe and Central Asia. To compromise its targets, the group uses malicious documents, phishing websites, and a custom PowerShell backdoor.",
|
||||||
"meta": {
|
"meta": {
|
||||||
|
"country": "RU",
|
||||||
"refs": [
|
"refs": [
|
||||||
"https://www.sentinelone.com/labs/winter-vivern-uncovering-a-wave-of-global-espionage/",
|
"https://www.sentinelone.com/labs/winter-vivern-uncovering-a-wave-of-global-espionage/",
|
||||||
"https://www.domaintools.com/resources/blog/winter-vivern-a-look-at-re-crafted-government-maldocs",
|
"https://www.domaintools.com/resources/blog/winter-vivern-a-look-at-re-crafted-government-maldocs",
|
||||||
"https://www.welivesecurity.com/en/eset-research/winter-vivern-exploits-zero-day-vulnerability-roundcube-webmail-servers/",
|
"https://www.welivesecurity.com/en/eset-research/winter-vivern-exploits-zero-day-vulnerability-roundcube-webmail-servers/",
|
||||||
"https://www.proofpoint.com/us/blog/threat-insight/exploitation-dish-best-served-cold-winter-vivern-uses-known-zimbra-vulnerability",
|
"https://www.proofpoint.com/us/blog/threat-insight/exploitation-dish-best-served-cold-winter-vivern-uses-known-zimbra-vulnerability",
|
||||||
"https://socprime.com/blog/uac-0114-group-aka-winter-vivern-attack-detection-hackers-launch-malicious-phishing-campaigns-targeting-government-entities-of-ukraine-and-poland/"
|
"https://socprime.com/blog/uac-0114-group-aka-winter-vivern-attack-detection-hackers-launch-malicious-phishing-campaigns-targeting-government-entities-of-ukraine-and-poland/",
|
||||||
|
"https://cybersecuritynews.com/russian-hackers-xss-flaw/",
|
||||||
|
"https://www.recordedfuture.com/russia-aligned-tag-70-targets-european-government-and-military-mail"
|
||||||
],
|
],
|
||||||
"synonyms": [
|
"synonyms": [
|
||||||
"UAC-0114",
|
"UAC-0114",
|
||||||
"TA473"
|
"TA473",
|
||||||
|
"TAG-70",
|
||||||
|
"TA-473"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"uuid": "b7497d28-02de-4722-8b97-1fc53e1d1b68",
|
"uuid": "b7497d28-02de-4722-8b97-1fc53e1d1b68",
|
||||||
|
@ -15196,7 +15203,73 @@
|
||||||
},
|
},
|
||||||
"uuid": "3682a08e-c1d9-4dff-ae08-774883dddba6",
|
"uuid": "3682a08e-c1d9-4dff-ae08-774883dddba6",
|
||||||
"value": "BANISHED KITTEN"
|
"value": "BANISHED KITTEN"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "ProCC is a threat actor targeting the hospitality sector with remote access Trojan malware. They use email attachments to exploit vulnerabilities like CVE-2017-0199 and deploy customized versions of RATs such as RevengeRAT, NjRAT, NanoCoreRAT, and 888 RAT. ProCC's malware is capable of collecting data from the clipboard and printer spooler, as well as capturing screenshots on infected machines.",
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"https://securelist.com/revengehotels/95229/"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "c74f78d1-3728-4bb9-b84f-0e46d2e870b2",
|
||||||
|
"value": "ProCC"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "Since the beginning of 2023, ResumeLooters have been able to compromise at least 65 websites. The group employs a variety of simple techniques, including SQL injection and XSS. The threat actor attempted to insert XSS scripts into all available forms, aiming to execute it on the administrators’ device to obtain admin credentials. While the group was able to execute the XSS script on some visitors’ devices with administrative access, allowing ResumeLooters to steal the HTML code of the pages the victims were visiting, Group-IB did not find any confirmation of admin credential thefts.",
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"https://www.group-ib.com/blog/resumelooters/"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "76dbe26b-8b39-40f5-bc2b-9620004f388e",
|
||||||
|
"value": "ResumeLooters"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "ShadowSyndicate is a threat actor associated with various ransomware groups, using a consistent Secure Shell fingerprint across multiple servers. They have been linked to ransomware families such as Quantum, Nokoyawa, and ALPHV. ShadowSyndicate's infrastructure overlaps with that of Cl0p, suggesting potential connections between the two groups. Their activities indicate they may be a Ransomware-as-a-Service affiliate.",
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"https://www.group-ib.com/blog/shadowsyndicate-raas/"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "24a7e1eb-b7c7-486b-96b2-8d313d65bf70",
|
||||||
|
"value": "ShadowSyndicate"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "LabHost is a threat actor group targeting Canadian Banks with Phishing-as-a-Service attacks. They have been observed using tools like LabRat and LabSend for real-time campaign management and SMS lures. LabHost's phishing campaigns have similarities to Frappo campaigns, but they operate separately and offer different subscription packages.",
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"https://www.phishlabs.com/blog/phishing-service-profile-labhost-threat-actor-group"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "583cdea6-1d72-44d4-824f-f965e8a23f3e",
|
||||||
|
"value": "LabHost"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "Cyber Anarchy Squad is a pro-Ukrainian hacktivist group known for targeting Russian companies and infrastructure. They have carried out cyberattacks on Russian telecom providers, financial institutions, and government agencies, causing disruptions to services and leaking stolen data. The group has used techniques such as wiping network equipment, defacing websites, and leaking sensitive documents to support their cause. Cyber Anarchy Squad has been active for at least four years, evolving from cyber-bullying to more sophisticated hacking activities.",
|
||||||
|
"meta": {
|
||||||
|
"country": "UA",
|
||||||
|
"refs": [
|
||||||
|
"https://srslyriskybiz.substack.com/p/russias-extradition-wars-are-not",
|
||||||
|
"https://therecord.media/proukraine-hackers-claim-to-take-down-russian-isp"
|
||||||
|
],
|
||||||
|
"synonyms": [
|
||||||
|
"Cyber Anarchy Squad"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "264d9a4b-9b0b-416f-9b09-819e96967a30",
|
||||||
|
"value": "Cyber.Anarchy.Squad"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "GoldFactory is a threat actor group attributed to developing sophisticated mobile banking malware targeting victims primarily in the Asia-Pacific region, specifically Vietnam and Thailand. They utilize social engineering to deliver malware to victims' devices and have close connections to the Gigabud malware family. GoldFactory's Trojans, such as GoldPickaxe and GoldDigger, employ tactics like smishing, phishing, and fake login screens to compromise victims' phones and steal sensitive information. Their evolving malware suite demonstrates a high level of operational maturity and ingenuity, requiring a proactive and multi-faceted cybersecurity approach to detect and mitigate their threats.",
|
||||||
|
"meta": {
|
||||||
|
"country": "CN",
|
||||||
|
"refs": [
|
||||||
|
"https://www.group-ib.com/blog/goldfactory-ios-trojan/"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "74268518-8dd9-4223-9f7f-54421463cdb3",
|
||||||
|
"value": "GoldFactory"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 301
|
"version": 302
|
||||||
}
|
}
|
||||||
|
|
9
galaxies/producer.json
Normal file
9
galaxies/producer.json
Normal file
|
@ -0,0 +1,9 @@
|
||||||
|
{
|
||||||
|
"description": "List of threat intelligence producer from security vendors to CERTs including any producer of intelligence at large.",
|
||||||
|
"icon": "book",
|
||||||
|
"name": "Producer",
|
||||||
|
"namespace": "misp",
|
||||||
|
"type": "producer",
|
||||||
|
"uuid": "2d74a15e-9c88-452e-af14-d0ecd2e9cd63",
|
||||||
|
"version": 1
|
||||||
|
}
|
|
@ -10,7 +10,7 @@ if [ $? -eq 0 ]; then
|
||||||
else
|
else
|
||||||
echo "Dependencies missing or with incorrect versions. Please install all dependencies from $requirements_path into your environment."
|
echo "Dependencies missing or with incorrect versions. Please install all dependencies from $requirements_path into your environment."
|
||||||
rm installed.txt # Clean up
|
rm installed.txt # Clean up
|
||||||
exit 1
|
# exit 1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
rm installed.txt # Clean up
|
rm installed.txt # Clean up
|
||||||
|
@ -18,4 +18,4 @@ rm installed.txt # Clean up
|
||||||
python3 generator.py
|
python3 generator.py
|
||||||
cd ./site/ || exit
|
cd ./site/ || exit
|
||||||
mkdocs build
|
mkdocs build
|
||||||
rsync --include ".*" -v -rz --checksum site/ circl@cppz.circl.lu:/var/www/misp-galaxy.org
|
rsync --include ".*" -avh --delete -rz --checksum site/ circl@cppz.circl.lu:/var/www/misp-galaxy.org
|
||||||
|
|
|
@ -5,7 +5,7 @@ cffi==1.16.0
|
||||||
charset-normalizer==3.3.2
|
charset-normalizer==3.3.2
|
||||||
click==8.1.7
|
click==8.1.7
|
||||||
colorama==0.4.6
|
colorama==0.4.6
|
||||||
cryptography==42.0.2
|
cryptography==42.0.4
|
||||||
Deprecated==1.2.14
|
Deprecated==1.2.14
|
||||||
ghp-import==2.1.0
|
ghp-import==2.1.0
|
||||||
gitdb==4.0.11
|
gitdb==4.0.11
|
||||||
|
|
Loading…
Reference in a new issue