Version 15.1 16.0
Software : Enterprise ATT&CK Changelog
Added Software
| Description |
|---|
VPNFilter is a multi-stage, modular platform with versatile capabilities to support both intelligence-collection and destructive cyber attack operations. VPNFilter modules such as its packet sniffer ('ps') can collect traffic that passes through an infected device, allowing the theft of website credentials and monitoring of Modbus SCADA protocols. [1] [2] VPNFilter was assessed to be replaced by Sandworm Team with Cyclops Blink starting in 2019.[3] References:
|
| Description |
|---|
Raspberry Robin is initial access malware first identified in September 2021, and active through early 2024. The malware is notable for spreading via infected USB devices containing a malicious LNK object that, on execution, retrieves remote hosted payloads for installation. Raspberry Robin has been widely used against various industries and geographies, and as a precursor to information stealer, ransomware, and other payloads such as SocGholish, Cobalt Strike, IcedID, and Bumblebee.[1][2][3] The DLL componenet in the Raspberry Robin infection chain is also referred to as "Roshtyak."[4] The name "Raspberry Robin" is used to refer to both the malware as well as the threat actor associated with its use, although the Raspberry Robin operators are also tracked as References:
|
| Description |
|---|
NPPSPY is an implementation of a theoretical mechanism first presented in 2004 for capturing credentials submitted to a Windows system via a rogue Network Provider API item. NPPSPY captures credentials following submission and writes them to a file on the victim system for follow-on exfiltration.[1][2] References: |
| Description |
|---|
IPsec Helper is a post-exploitation remote access tool linked to Agrius operations. This malware shares significant programming and functional overlaps with Apostle ransomware, also linked to Agrius. IPsec Helper provides basic remote access tool functionality such as uploading files from victim systems, running commands, and deploying additional payloads.[1] References: |
| Description |
|---|
Apostle is malware that has functioned as both a wiper and, in more recent versions, as ransomware. Apostle is written in .NET and shares various programming and functional overlaps with IPsec Helper.[1] References: |
| Description |
|---|
MultiLayer Wiper is wiper malware written in .NET associated with Agrius operations. Observed samples of MultiLayer Wiper have an anomalous, future compilation date suggesting possible metadata manipulation.[1] References: |
| Description |
|---|
BFG Agonizer is a wiper related to the open-source project CRYLINE-v.5.0. The malware is associated with wiping operations conducted by the Agrius threat actor.[1] References: |
| Description |
|---|
Gootloader is a Javascript-based infection framework that has been used since at least 2020 as a delivery method for the Gootkit banking trojan, Cobalt Strike, REvil, and others. Gootloader operates on an "Initial Access as a Service" model and has leveraged SEO Poisoning to provide access to entities in multiple sectors worldwide including financial, military, automotive, pharmaceutical, and energy.[1][2] References: |
| Description |
|---|
INC Ransomware is a ransomware strain that has been used by the INC Ransom group since at least 2023 against multiple industry sectors worldwide. INC Ransomware can employ partial encryption combined with multi-threading to speed encryption.[1][2][3] References: |
| Description |
|---|
Spica is a custom backdoor written in Rust that has been used by Star Blizzard since at least 2023.[1] References: |
| Description |
|---|
LunarWeb is a backdoor that has been used by Turla since at least 2020 including in a compromise of a European ministry of foreign affairs (MFA) together with LunarLoader and LunarMail. LunarWeb has only been observed deployed against servers and can use Steganography to obfuscate command and control.[1] References: |
| Description |
|---|
LunarMail is a backdoor that has been used by Turla since at least 2020 including in a compromise of a European ministry of foreign affairs (MFA) in conjunction with LunarLoader and LunarWeb. LunarMail is designed to be deployed on workstations and can use email messages and Steganography in command and control.[1] References: |
| Description |
|---|
LunarLoader is the loader component for the LunarWeb and LunarMail backdoors that has been used by Turla since at least 2020 including against a European ministry of foreign affairs (MFA). LunarLoader has been observed as a standalone and as a part of trojanized open-source software such as AdmPwd.[1] References: |
| Description |
|---|
FRP, which stands for Fast Reverse Proxy, is an openly available tool that is capable of exposing a server located behind a firewall or Network Address Translation (NAT) to the Internet. FRP can support multiple protocols including TCP, UDP, and HTTP(S) and has been abused by threat actors to proxy command and control communications.[1][2][3][4] References:
|
| Description |
|---|
Pikabot is a backdoor used for initial access and follow-on tool deployment active since early 2023. Pikabot is notable for extensive use of multiple encoding, encryption, and defense evasion mechanisms to evade defenses and avoid analysis. Pikabot has some overlaps with QakBot, but insufficient evidence exists to definitively link these two malware families. Pikabot is frequently used to deploy follow on tools such as Cobalt Strike or ransomware variants.[1][2][3] References:
|
| Description |
|---|
MgBot is a modular malware framework exclusively associated with Daggerfly operations since at least 2012. MgBot was developed in C++ and features a module design with multiple available plugins that have been under active development through 2024.[1][2][3] References:
|
| Description |
|---|
Raccoon Stealer is an information stealer malware family active since at least 2019 as a malware-as-a-service offering sold in underground forums. Raccoon Stealer has experienced two periods of activity across two variants, from 2019 to March 2022, then resurfacing in a revised version in June 2022.[1][2] References: |
| Description |
|---|
CHIMNEYSWEEP is a backdoor malware that was deployed during HomeLand Justice along with ROADSWEEP ransomware, and has been used to target Farsi and Arabic speakers since at least 2012.[1] References: |
| Description |
|---|
ROADSWEEP is a ransomware that was deployed against Albanian government networks during HomeLand Justice along with the CHIMNEYSWEEP backdoor.[1] References: |
| Description |
|---|
ZeroCleare is a wiper malware that has been used in conjunction with the RawDisk driver since at least 2019 by suspected Iran-nexus threat actors including activity targeting the energy and industrial sectors in the Middle East and political targets in Albania.[1][2][3][4] References:
|
| Description |
|---|
IMAPLoader is a .NET-based loader malware exclusively associated with CURIUM operations since at least 2022. IMAPLoader leverages email protocols for command and control and payload delivery.[1] References: |
| Description |
|---|
Cuckoo Stealer is a macOS malware with characteristics of spyware and an infostealer that has been in use since at least 2024. Cuckoo Stealer is a universal Mach-O binary that can run on Intel or ARM-based Macs and has been spread through trojanized versions of various potentially unwanted programs or PUP's such as converters, cleaners, and uninstallers.[1][2] References: |
| Description |
|---|
VersaMem is a web shell designed for deployment to Versa Director servers following exploitation. Discovered in August 2024, VersaMem was used during Versa Director Zero Day Exploitation by Volt Typhoon to target ISPs and MSPs. VersaMem is deployed as a Java Archive (JAR) and allows for credential capture for Versa Director logon activity as well as follow-on execution of arbitrary Java payloads.[1] References: |
| Description |
|---|
Covenant is a multi-platform command and control framework written in .NET. While designed for penetration testing and security research, the tool has also been used by threat actors such as HAFNIUM during operations. Covenant functions through a central listener managing multiple deployed "Grunts" that communicate back to the controller.[1][2] References: |
| Description |
|---|
Manjusaka is a Chinese-language intrusion framework, similar to Sliver and Cobalt Strike, with an ELF binary written in GoLang as the controller for Windows and Linux implants written in Rust. First identified in 2022, Manjusaka consists of multiple components, only one of which (a command and control module) is freely available.[1] References: |
| Description |
|---|
Latrodectus is a Windows malware downloader that has been used since at least 2023 to download and execute additional payloads and modules. Latrodectus has most often been distributed through email campaigns, primarily by TA577 and TA578, and has infrastructure overlaps with historic IcedID operations.[1][2][3] References:
|
| Description |
|---|
BPFDoor is a Linux based passive long-term backdoor used by China-based threat actors. First seen in 2021, BPFDoor is named after its usage of Berkley Packet Filter (BPF) to execute single task instructions. BPFDoor supports multiple protocols for communicating with a C2 including TCP, UDP, and ICMP and can start local or reverse shells that bypass firewalls using iptables.[1][2] References: |
| Description |
|---|
Playcrypt is a ransomware that has been used by Play since at least 2022 in attacks against against the business, government, critical infrastructure, healthcare, and media sectors in North America, South America, and Europe. Playcrypt derives its name from adding the .play extension to encrypted files and has overlap with tactics and tools associated with Hive and Nokoyawa ransomware and infrastructure associated with Quantum ransomware.[1][2][3] References:
|
Modified Software
| Description |
|---|
Mimikatz is a credential dumper capable of obtaining plaintext Windows account logins and passwords, along with many other features that make it useful for testing the security of networks. [1] [2] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2024-02-09 21:31:30.227000+00:00 | 2024-09-25 20:34:58.387000+00:00 |
| Description |
|---|
Windows Credential Editor is a password dumping tool. [1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-03-30 18:28:34.296000+00:00 | 2024-09-12 15:17:22.004000+00:00 |
| external_references[1]['description'] | Amplia Security. (n.d.). Windows Credentials Editor (WCE) F.A.Q.. Retrieved December 17, 2015. | Amplia Security. (n.d.). Windows Credentials Editor (WCE) F.A.Q.. Retrieved September 12, 2024. |
| external_references[1]['url'] | http://www.ampliasecurity.com/research/wcefaq.html | https://web.archive.org/web/20240904163410/https://www.ampliasecurity.com/research/wcefaq.html |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| Description |
|---|
PoisonIvy is a popular remote access tool (RAT) that has been used by many groups.[1][2][3] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2024-02-14 19:16:01.583000+00:00 | 2024-09-19 14:30:03.923000+00:00 |
| external_references[5]['description'] | FireEye. (2014). POISON IVY: Assessing Damage and Extracting Intelligence. Retrieved November 12, 2014. | FireEye. (2014). POISON IVY: Assessing Damage and Extracting Intelligence. Retrieved September 19, 2024. |
| external_references[5]['url'] | https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-poison-ivy.pdf | https://www.mandiant.com/sites/default/files/2021-09/rpt-poison-ivy.pdf |
| Description |
|---|
GLOOXMAIL is malware used by APT1 that mimics legitimate Jabber/XMPP traffic. [1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-03-30 16:42:52.248000+00:00 | 2024-08-28 14:16:00.884000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
PsExec is a free Microsoft tool that can be used to execute a program on another computer. It is used by IT administrators and attackers.[1][2] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2024-04-04 03:50:11+00:00 | 2024-09-25 20:31:21.768000+00:00 |
| x_mitre_version | 1.6 | 1.7 |
| Description |
|---|
gh0st RAT is a remote access tool (RAT). The source code is public and it has been used by multiple groups.[1][2][3] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2024-02-06 19:00:45.557000+00:00 | 2024-05-07 19:07:45.403000+00:00 |
| x_mitre_version | 3.2 | 3.3 |
| Description |
|---|
BLACKCOFFEE is malware that has been used by several Chinese groups since at least 2013. [1] [2] References:
|
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-03-30 14:58:42.298000+00:00 | 2024-09-04 17:04:35.670000+00:00 |
| external_references[2]['url'] | https://www2.fireeye.com/rs/fireye/images/APT17_Report.pdf | https://web.archive.org/web/20240119213200/https://www2.fireeye.com/rs/fireye/images/APT17_Report.pdf |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| Description |
|---|
ASPXSpy is a Web shell. It has been modified by Threat Group-3390 actors to create the ASPXTool version. [1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-09-22 20:56:06.265000+00:00 | 2024-05-22 19:06:12.701000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.2 | 1.3 |
| Description |
|---|
ftp is a utility commonly available with operating systems to transfer information over the File Transfer Protocol (FTP). Adversaries can use it to transfer other tools onto a system or to exfiltrate data.[1][2] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-03-07 22:20:18.809000+00:00 | 2024-08-14 15:21:48.196000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 2.0 | 2.1 |
| Description |
|---|
Remsec is a modular backdoor that has been used by Strider and appears to have been designed primarily for espionage purposes. Many of its modules are written in Lua. [1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2024-04-11 00:16:18.864000+00:00 | 2024-08-05 18:23:59.724000+00:00 |
| x_mitre_version | 1.3 | 1.4 |
| Description |
|---|
Miner-C is malware that mines victims for the Monero cryptocurrency. It has targeted FTP servers and Network Attached Storage (NAS) devices to spread. [1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_aliases | ['Miner-C'] | |
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2018-10-17 00:14:20.652000+00:00 | 2024-09-12 15:19:00.433000+00:00 |
| external_references[1]['description'] | Cimpanu, C.. (2016, September 9). Cryptocurrency Mining Malware Discovered Targeting Seagate NAS Hard Drives. Retrieved October 12, 2016. | Cimpanu, C.. (2016, September 9). Cryptocurrency Mining Malware Discovered Targeting Seagate NAS Hard Drives. Retrieved September 12, 2024. |
| external_references[1]['url'] | http://news.softpedia.com/news/cryptocurrency-mining-malware-discovered-targeting-seagate-nas-hard-drives-508119.shtml | https://news.softpedia.com/news/cryptocurrency-mining-malware-discovered-targeting-seagate-nas-hard-drives-508119.shtml |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| Description |
|---|
ChChes is a Trojan that appears to be used exclusively by menuPass. It was used to target Japanese organizations in 2016. Its lack of persistence methods suggests it may be intended as a first-stage tool. [1] [2] [3] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-23 15:14:18.599000+00:00 | 2024-09-12 19:32:28.615000+00:00 |
| external_references[4]['description'] | Carr, N.. (2017, April 6). Retrieved June 29, 2017. | Carr, N.. (2017, April 6). Retrieved September 12, 2024. |
| external_references[4]['url'] | https://twitter.com/ItsReallyNick/status/850105140589633536 | https://x.com/ItsReallyNick/status/850105140589633536 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| Description |
|---|
RedLeaves is a malware family used by menuPass. The code overlaps with PlugX and may be based upon the open source tool Trochilus. [1] [2] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2024-04-11 00:17:52.256000+00:00 | 2024-09-12 19:32:28.614000+00:00 |
| external_references[3]['description'] | Carr, N.. (2017, April 6). Retrieved June 29, 2017. | Carr, N.. (2017, April 6). Retrieved September 12, 2024. |
| external_references[3]['url'] | https://twitter.com/ItsReallyNick/status/850105140589633536 | https://x.com/ItsReallyNick/status/850105140589633536 |
| Description |
|---|
Cobalt Strike is a commercial, full-featured, remote access tool that bills itself as “adversary simulation software designed to execute targeted attacks and emulate the post-exploitation actions of advanced threat actors”. Cobalt Strike’s interactive post-exploit capabilities cover the full range of ATT&CK tactics, all executed within a single, integrated system.[1] In addition to its own capabilities, Cobalt Strike leverages the capabilities of other well-known tools such as Metasploit and Mimikatz.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2024-04-17 22:05:58.343000+00:00 | 2024-09-25 20:32:57.099000+00:00 |
| x_mitre_version | 1.12 | 1.13 |
| Description |
|---|
Janicab is an OS X trojan that relied on a valid developer ID and oblivious users to install it. [1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-03-19 18:00:00.645000+00:00 | 2024-09-12 19:07:36.511000+00:00 |
| external_references[1]['url'] | http://www.thesafemac.com/new-signed-malware-called-janicab/ | https://web.archive.org/web/20230331162455/https://www.thesafemac.com/new-signed-malware-called-janicab/ |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| Description |
|---|
FinFisher is a government-grade commercial surveillance spyware reportedly sold exclusively to government agencies for use in targeted and lawful criminal investigations. It is heavily obfuscated and uses multiple anti-analysis techniques. It has other variants including Wingbird. [1] [2] [3] [4] [5] References:
|
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-03-02 15:47:13.329000+00:00 | 2024-09-12 17:23:46.687000+00:00 |
| external_references[3]['description'] | FinFisher. (n.d.). Retrieved December 20, 2017. | FinFisher. (n.d.). Retrieved September 12, 2024. |
| external_references[3]['url'] | http://www.finfisher.com/FinFisher/index.html | https://web.archive.org/web/20171222050934/http://www.finfisher.com/FinFisher/index.html |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| Description |
|---|
Winexe is a lightweight, open source tool similar to PsExec designed to allow system administrators to execute commands on remote servers. [1] Winexe is unique in that it is a GNU/Linux based client. [2] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_aliases | ['Winexe'] | |
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2018-10-17 00:14:20.652000+00:00 | 2024-09-04 21:09:10.255000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
Iterable Item Removed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| external_references | {'source_name': 'Winexe', 'description': '(Citation: Winexe Github Sept 2013) (Citation: Überwachung APT28 Forfiles June 2015)'} |
| Description |
|---|
HAPPYWORK is a downloader used by APT37 to target South Korean government and financial victims in November 2016. [1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_aliases | ['HAPPYWORK'] | |
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2018-10-17 00:14:20.652000+00:00 | 2024-09-04 20:44:43.949000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
Iterable Item Removed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| external_references | {'source_name': 'HAPPYWORK', 'description': '(Citation: FireEye APT37 Feb 2018)'} |
| Description |
|---|
SHUTTERSPEED is a backdoor used by APT37. [1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_aliases | ['SHUTTERSPEED'] | |
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2018-10-17 00:14:20.652000+00:00 | 2024-09-04 21:36:27.669000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
Iterable Item Removed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| external_references | {'source_name': 'SHUTTERSPEED', 'description': '(Citation: FireEye APT37 Feb 2018)'} |
| Description |
|---|
WINERACK is a backdoor used by APT37. [1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_aliases | ['WINERACK'] | |
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2018-10-17 00:14:20.652000+00:00 | 2024-09-04 21:37:24.766000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
Iterable Item Removed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| external_references | {'source_name': 'WINERACK', 'description': '(Citation: FireEye APT37 Feb 2018)'} |
| Description |
|---|
Gold Dragon is a Korean-language, data gathering implant that was first observed in the wild in South Korea in July 2017. Gold Dragon was used along with Brave Prince and RunningRAT in operations targeting organizations associated with the 2018 Pyeongchang Winter Olympics. [1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-04-11 21:45:35.889000+00:00 | 2024-05-06 20:40:17+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.2 | 1.3 |
| Description |
|---|
Koadic is a Windows post-exploitation framework and penetration testing tool that is publicly available on GitHub. Koadic has several options for staging payloads and creating implants, and performs most of its operations using Windows Script Host.[1][2][3] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-04-06 19:32:33.511000+00:00 | 2024-09-27 18:36:30.831000+00:00 |
| external_references[4]['description'] | Magius, J., et al. (2017, July 19). Koadic. Retrieved June 18, 2018. | Magius, J., et al. (2017, July 19). Koadic. Retrieved September 27, 2024. |
| external_references[4]['url'] | https://github.com/zerosum0x0/koadic | https://github.com/offsecginger/koadic |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| Description |
|---|
DDKONG is a malware sample that was part of a campaign by Rancor. DDKONG was first seen used in February 2017. [1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_aliases | ['DDKONG'] | |
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2018-10-17 00:14:20.652000+00:00 | 2024-09-04 21:38:11.979000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
Iterable Item Removed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| external_references | {'source_name': 'DDKONG', 'description': '(Citation: Rancor Unit42 June 2018)'} |
| Description |
|---|
QuasarRAT is an open-source, remote access tool that has been publicly available on GitHub since at least 2014. QuasarRAT is developed in the C# language.[1][2] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-08-02 15:36:30.238000+00:00 | 2024-05-07 19:10:03.843000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 2.0 | 2.1 |
| Description |
|---|
NanoCore is a modular remote access tool developed in .NET that can be used to spy on victims and steal information. It has been used by threat actors since 2013.[1][2][3][4] References:
|
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-03-30 17:10:28.673000+00:00 | 2024-09-25 15:05:04.341000+00:00 |
| external_references[3]['description'] | Patel, K. (2018, March 02). The NanoCore RAT Has Resurfaced From the Sewers. Retrieved November 9, 2018. | Patel, K. (2018, March 02). The NanoCore RAT Has Resurfaced From the Sewers. Retrieved September 25, 2024. |
| external_references[3]['url'] | https://cofense.com/nanocore-rat-resurfaced-sewers/ | https://web.archive.org/web/20240522112705/https://cofense.com/blog/nanocore-rat-resurfaced-sewers/ |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| Description |
|---|
Micropsia is a remote access tool written in Delphi.[1][2] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2024-04-11 00:43:46.245000+00:00 | 2024-10-04 11:08:25.923000+00:00 |
| external_references[3]['url'] | https://blog.radware.com/security/2018/07/micropsia-malware/ | https://www.radware.com/blog/security/2018/07/micropsia-malware/ |
| Description |
|---|
Impacket is an open source collection of modules written in Python for programmatically constructing and manipulating network protocols. Impacket contains several tools for remote service execution, Kerberos manipulation, Windows credential dumping, packet sniffing, and relay attacks.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2024-03-14 17:27:34.759000+00:00 | 2024-10-07 19:08:53.273000+00:00 |
| x_mitre_version | 1.6 | 1.7 |
| Description |
|---|
Ruler is a tool to abuse Microsoft Exchange services. It is publicly available on GitHub and the tool is executed via the command line. The creators of Ruler have also released a defensive tool, NotRuler, to detect its usage.[1][2] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-06-22 21:31:54.771000+00:00 | 2024-10-14 22:11:30.271000+00:00 |
| x_mitre_platforms[1] | Office 365 | Office Suite |
| Description |
|---|
Nltest is a Windows command-line utility used to list domain controllers and enumerate domain trusts.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-08-09 18:03:17.167000+00:00 | 2024-09-25 20:27:04.356000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.2 | 1.3 |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-07-27 15:44:31.364000+00:00 | 2024-09-25 20:32:02.152000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.7 | 1.8 |
| Description |
|---|
RawDisk is a legitimate commercial driver from the EldoS Corporation that is used for interacting with files, disks, and partitions. The driver allows for direct modification of data on a local computer's hard drive. In some cases, the tool can enact these raw disk modifications from user-mode processes, circumventing Windows operating system security features.[1][2] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-07-28 18:55:35.991000+00:00 | 2024-08-14 15:22:38.134000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Modified Description View changes side-by-side |
|---|
| [Emotet](https://attack.mitre.org/software/S0367) is a modular malware variant which is primarily used as a downloader for other malware variants such as [TrickBot](https://attack.mitre.org/software/S0266) and [IcedID](https://attack.mitre.org/software/S0483). Emotet first emerged in June 2014 2014, initially targeting the financial sector, and has been primarily used expanded to target the banking sector. (Citation: multiple verticals over time.(Citation: Trend Micro Banking Malware Jan 2019) |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-09-29 19:44:43.868000+00:00 | 2024-07-09 16:04:18.570000+00:00 |
| description | [Emotet](https://attack.mitre.org/software/S0367) is a modular malware variant which is primarily used as a downloader for other malware variants such as [TrickBot](https://attack.mitre.org/software/S0266) and [IcedID](https://attack.mitre.org/software/S0483). Emotet first emerged in June 2014 and has been primarily used to target the banking sector. (Citation: Trend Micro Banking Malware Jan 2019) | [Emotet](https://attack.mitre.org/software/S0367) is a modular malware variant which is primarily used as a downloader for other malware variants such as [TrickBot](https://attack.mitre.org/software/S0266) and [IcedID](https://attack.mitre.org/software/S0483). Emotet first emerged in June 2014, initially targeting the financial sector, and has expanded to multiple verticals over time.(Citation: Trend Micro Banking Malware Jan 2019) |
| x_mitre_version | 1.5 | 1.6 |
| Description |
|---|
Astaroth is a Trojan and information stealer known to affect companies in Europe, Brazil, and throughout Latin America. It has been known publicly since at least late 2017. [1][2][3] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2024-04-11 02:58:17.763000+00:00 | 2024-09-25 15:03:49.408000+00:00 |
| external_references[2]['description'] | Doaty, J., Garrett, P.. (2018, September 10). We’re Seeing a Resurgence of the Demonic Astaroth WMIC Trojan. Retrieved April 17, 2019. | Doaty, J., Garrett, P.. (2018, September 10). We’re Seeing a Resurgence of the Demonic Astaroth WMIC Trojan. Retrieved September 25, 2024. |
| external_references[2]['url'] | https://cofense.com/seeing-resurgence-demonic-astaroth-wmic-trojan/ | https://web.archive.org/web/20200302071436/https://cofense.com/seeing-resurgence-demonic-astaroth-wmic-trojan/ |
| Modified Description View changes side-by-side |
|---|
| [Ebury](https://attack.mitre.org/software/S0377) is an SSH OpenSSH backdoor and credential stealer targeting Linux operating systems. Attackers require root-level access, which allows them servers and container hosts developed by [Windigo](https://attack.mitre.org/groups/G0124). [Ebury](https://attack.mitre.org/software/S0377) is primarily installed through modifying shared libraries (`.so` files) executed by the legitimate OpenSSH program. First seen in 2009, [Ebury](https://attack.mitre.org/software/S0377) has been used to replace SSH binaries (ssh, sshd, ssh-add, etc) or modify maintain a shared library used by OpenSSH (libkeyutils).(Citation: botnet of servers, deploy additional malware, and steal cryptocurrency wallets, credentials, and credit card details.(Citation: ESET Ebury Feb 2014)(Citation: BleepingComputer Ebury March 2017)(Citation: ESET Ebury Oct 2017) 2017)(Citation: ESET Ebury May 2024) |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-04-23 22:56:14.591000+00:00 | 2024-09-20 21:15:51.302000+00:00 |
| description | [Ebury](https://attack.mitre.org/software/S0377) is an SSH backdoor targeting Linux operating systems. Attackers require root-level access, which allows them to replace SSH binaries (ssh, sshd, ssh-add, etc) or modify a shared library used by OpenSSH (libkeyutils).(Citation: ESET Ebury Feb 2014)(Citation: BleepingComputer Ebury March 2017)(Citation: ESET Ebury Oct 2017) | [Ebury](https://attack.mitre.org/software/S0377) is an OpenSSH backdoor and credential stealer targeting Linux servers and container hosts developed by [Windigo](https://attack.mitre.org/groups/G0124). [Ebury](https://attack.mitre.org/software/S0377) is primarily installed through modifying shared libraries (`.so` files) executed by the legitimate OpenSSH program. First seen in 2009, [Ebury](https://attack.mitre.org/software/S0377) has been used to maintain a botnet of servers, deploy additional malware, and steal cryptocurrency wallets, credentials, and credit card details.(Citation: ESET Ebury Feb 2014)(Citation: BleepingComputer Ebury March 2017)(Citation: ESET Ebury Oct 2017)(Citation: ESET Ebury May 2024) |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.3 | 2.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| external_references | {'source_name': 'ESET Ebury May 2024', 'description': 'Marc-Etienne M.Léveillé. (2024, May 1). Ebury is alive but unseen. Retrieved May 21, 2024.', 'url': 'https://web-assets.esetstatic.com/wls/en/papers/white-papers/ebury-is-alive-but-unseen.pdf'} |
| Description |
|---|
Ursnif is a banking trojan and variant of the Gozi malware observed being spread through various automated exploit kits, Spearphishing Attachments, and malicious links.[1][2] Ursnif is associated primarily with data theft, but variants also include components (backdoors, spyware, file injectors, etc.) capable of a wide variety of behaviors.[3] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2024-04-10 22:18:21.527000+00:00 | 2024-09-12 19:50:37.023000+00:00 |
| external_references[6]['description'] | NJCCIC. (2016, September 27). Ursnif. Retrieved June 4, 2019. | NJCCIC. (2016, September 27). Ursnif. Retrieved September 12, 2024. |
| external_references[6]['url'] | https://www.cyber.nj.gov/threat-profiles/trojan-variants/ursnif | https://www.cyber.nj.gov/threat-landscape/malware/trojans/ursnif |
| Description |
|---|
EvilBunny is a C++ malware sample observed since 2011 that was designed to be a execution platform for Lua scripts.[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-04-02 00:14:13.954000+00:00 | 2024-08-05 18:21:34.265000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.2 | 1.3 |
| Description |
|---|
MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, insider intel, network architecture information, etc.). It can be used by a non-administrative user to search their own email, or by an Exchange administrator to search the mailboxes of every user in a domain.[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2020-03-30 17:01:41.302000+00:00 | 2024-10-14 22:11:30.271000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_platforms | Office Suite |
Iterable Item Removed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_platforms | Office 365 | |
| x_mitre_platforms | Azure AD |
| Description |
|---|
BabyShark is a Microsoft Visual Basic (VB) script-based malware family that is believed to be associated with several North Korean campaigns. [1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-03-12 17:26:12.324000+00:00 | 2024-05-06 20:38:32.432000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.2 | 2.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| external_references | {'source_name': 'LATEOP', 'description': '(Citation: Mandiant APT43 March 2024)'} | |
| external_references | {'source_name': 'Mandiant APT43 March 2024', 'description': 'Mandiant. (2024, March 14). APT43: North Korean Group Uses Cybercrime to Fund Espionage Operations. Retrieved May 3, 2024.', 'url': 'https://services.google.com/fh/files/misc/apt43-report-en.pdf'} | |
| x_mitre_aliases | LATEOP |
| Description |
|---|
PoetRAT is a remote access trojan (RAT) that was first identified in April 2020. PoetRAT has been used in multiple campaigns against the private and public sectors in Azerbaijan, including ICS and SCADA systems in the energy sector. The STIBNITE activity group has been observed using the malware. PoetRAT derived its name from references in the code to poet William Shakespeare. [1][2][3] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-22 05:09:38.370000+00:00 | 2024-08-05 18:24:31.652000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 2.2 | 2.3 |
| Description |
|---|
IcedID is a modular banking malware designed to steal financial information that has been observed in the wild since at least 2017. IcedID has been downloaded by Emotet in multiple campaigns.[1][2] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_contributors | ['Jorge Orchilles', 'Matt Brenton', 'Zaw Min Htun, @Z3TAE'] |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2024-04-11 02:16:08.503000+00:00 | 2024-10-28 19:20:20.633000+00:00 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
BloodHound is an Active Directory (AD) reconnaissance tool that can reveal hidden relationships and identify attack paths within an AD environment.[1][2][3] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-08-09 18:00:13.178000+00:00 | 2024-09-25 20:33:37.892000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.5 | 1.6 |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2021-04-13 20:44:14.476000+00:00 | 2024-09-12 19:39:44.514000+00:00 |
| external_references[4]['description'] | Costin Raiu. (2020, October 2). Costin Raiu Twitter IAmTheKing SlothfulMedia. Retrieved November 16, 2020. | Costin Raiu. (2020, October 2). Costin Raiu Twitter IAmTheKing SlothfulMedia. Retrieved September 12, 2024. |
| external_references[4]['url'] | https://twitter.com/craiu/status/1311920398259367942 | https://x.com/craiu/status/1311920398259367942 |
| external_references[7]['description'] | ESET Research. (2020, October 1). ESET Research Tweet Linking Slothfulmedia and PowerPool. Retrieved November 17, 2020. | ESET Research. (2020, October 1). ESET Research Tweet Linking Slothfulmedia and PowerPool. Retrieved September 12, 2024. |
| external_references[7]['url'] | https://twitter.com/ESETresearch/status/1311762215490461696 | https://x.com/ESETresearch/status/1311762215490461696 |
| external_references[5]['description'] | USCYBERCOM. (2020, October 1). USCYBERCOM Cybersecurity Alert SLOTHFULMEDIA. Retrieved November 16, 2020. | USCYBERCOM. (2020, October 1). USCYBERCOM Cybersecurity Alert SLOTHFULMEDIA. Retrieved September 12, 2024. |
| external_references[5]['url'] | https://twitter.com/CNMF_CyberAlert/status/1311743710997159953 | https://x.com/CNMF_CyberAlert/status/1311743710997159953 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2024-04-04 03:49:04.493000+00:00 | 2024-09-25 15:21:53.462000+00:00 |
| x_mitre_version | 1.4 | 1.5 |
| Description |
|---|
GrimAgent is a backdoor that has been used before the deployment of Ryuk ransomware since at least 2020; it is likely used by FIN6 and Wizard Spider.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-07-29 19:44:21.016000+00:00 | 2024-09-19 14:32:39.426000+00:00 |
| external_references[1]['description'] | Priego, A. (2021, July). THE BROTHERS GRIM: THE REVERSING TALE OF GRIMAGENT MALWARE USED BY RYUK. Retrieved July 16, 2021. | Priego, A. (2021, July). THE BROTHERS GRIM: THE REVERSING TALE OF GRIMAGENT MALWARE USED BY RYUK. Retrieved September 19, 2024. |
| external_references[1]['url'] | https://gibnc.group-ib.com/s/Group-IB_GrimAgent_analysis#pdfviewer | https://www.group-ib.com/blog/grimagent/ |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| Description |
|---|
Wevtutil is a Windows command-line utility that enables administrators to retrieve information about event logs and publishers.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-10-13 17:45:16.377000+00:00 | 2024-09-25 20:32:25.006000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.1 | 1.2 |
| Description |
|---|
QakBot is a modular banking trojan that has been used primarily by financially-motivated actors since at least 2007. QakBot is continuously maintained and developed and has evolved from an information stealer into a delivery agent for ransomware, most notably ProLock and Egregor.[1][2][3][4] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-12-05 20:22:37.368000+00:00 | 2024-09-17 16:10:03.901000+00:00 |
| x_mitre_version | 1.2 | 1.3 |
| Description |
|---|
DarkWatchman is a lightweight JavaScript-based remote access tool (RAT) that avoids file operations; it was first observed in November 2021.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2024-04-11 02:40:18.361000+00:00 | 2024-08-26 16:28:39.922000+00:00 |
| external_references[1]['url'] | https://www.prevailion.com/darkwatchman-new-fileless-techniques/ | https://web.archive.org/web/20220629230035/https://www.prevailion.com/darkwatchman-new-fileless-techniques/ |
| Description |
|---|
AADInternals is a PowerShell-based framework for administering, enumerating, and exploiting Azure Active Directory. The tool is publicly available on GitHub.[1][2] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-04-15 00:59:18.335000+00:00 | 2024-10-14 22:11:30.271000+00:00 |
| x_mitre_platforms[1] | Azure AD | Office Suite |
| x_mitre_platforms[2] | Office 365 | Identity Provider |
| Description |
|---|
ROADTools is a framework for enumerating Azure Active Directory environments. The tool is written in Python and publicly available on GitHub.[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False | |
| x_mitre_platforms | ['Identity Provider'] |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-04-01 13:27:48.378000+00:00 | 2024-09-16 17:02:37.377000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| Modified Description View changes side-by-side |
|---|
| [Cyclops Blink](https://attack.mitre.org/software/S0687) is a modular malware that has been used in widespread campaigns by [Sandworm Team](https://attack.mitre.org/groups/G0034) since at least 2019 to target Small/Home Office (SOHO) network devices, including WatchGuard and Asus.(Citation: Asus. [Cyclops Blink](https://attack.mitre.org/software/S0687) is assessed to be a replacement for [VPNFilter](https://attack.mitre.org/software/S1010), a similar platform targeting network devices.(Citation: NCSC Cyclops Blink February 2022)(Citation: NCSC CISA Cyclops Blink Advisory February 2022)(Citation: Trend Micro Cyclops Blink March 2022) |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-04-14 17:00:26.886000+00:00 | 2024-08-15 22:36:30.074000+00:00 |
| description | [Cyclops Blink](https://attack.mitre.org/software/S0687) is a modular malware that has been used in widespread campaigns by [Sandworm Team](https://attack.mitre.org/groups/G0034) since at least 2019 to target Small/Home Office (SOHO) network devices, including WatchGuard and Asus.(Citation: NCSC Cyclops Blink February 2022)(Citation: NCSC CISA Cyclops Blink Advisory February 2022)(Citation: Trend Micro Cyclops Blink March 2022) | [Cyclops Blink](https://attack.mitre.org/software/S0687) is a modular malware that has been used in widespread campaigns by [Sandworm Team](https://attack.mitre.org/groups/G0034) since at least 2019 to target Small/Home Office (SOHO) network devices, including WatchGuard and Asus. [Cyclops Blink](https://attack.mitre.org/software/S0687) is assessed to be a replacement for [VPNFilter](https://attack.mitre.org/software/S1010), a similar platform targeting network devices.(Citation: NCSC Cyclops Blink February 2022)(Citation: NCSC CISA Cyclops Blink Advisory February 2022)(Citation: Trend Micro Cyclops Blink March 2022) |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
SILENTTRINITY is an open source remote administration and post-exploitation framework primarily written in Python that includes stagers written in Powershell, C, and Boo. SILENTTRINITY was used in a 2019 campaign against Croatian government agencies by unidentified cyber actors.[1][2] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-04-14 19:27:39.308000+00:00 | 2024-09-23 14:18:53.140000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| x_mitre_contributors[0] | Daniel Acevedo, @darmad0, ARMADO | Daniel Acevedo, Blackbot |
| Description |
|---|
Flagpro is a Windows-based, first-stage downloader that has been used by BlackTech since at least October 2020. It has primarily been used against defense, media, and communications companies in Japan.[1] References: |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_deprecated | False |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-04-01 14:41:47.579000+00:00 | 2024-09-04 21:39:21.144000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
Iterable Item Removed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| external_references | {'source_name': 'Flagpro ', 'description': '(Citation: NTT Security Flagpro new December 2021)'} |
| Modified Description View changes side-by-side |
|---|
| [MacMa](https://attack.mitre.org/software/S1016) is a macOS-based backdoor with a large set of functionalities to control and exfiltrate files from a compromised computer. [MacMa](https://attack.mitre.org/software/S1016) has been observed in the wild since November 2021.(Citation: ESET DazzleSpy Jan 2022) [MacMa](https://attack.mitre.org/software/S1016) shares command and control and unique libraries with [MgBot](https://attack.mitre.org/software/S1146) and [Nightdoor](https://attack.mitre.org/software/S1147), indicating a relationship with the [Daggerfly](https://attack.mitre.org/groups/G1034) threat actor.(Citation: Symantec Daggerfly 2024) |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-10-24 18:52:29.002000+00:00 | 2024-07-26 17:48:10.580000+00:00 |
| description | [MacMa](https://attack.mitre.org/software/S1016) is a macOS-based backdoor with a large set of functionalities to control and exfiltrate files from a compromised computer. [MacMa](https://attack.mitre.org/software/S1016) has been observed in the wild since November 2021.(Citation: ESET DazzleSpy Jan 2022) | [MacMa](https://attack.mitre.org/software/S1016) is a macOS-based backdoor with a large set of functionalities to control and exfiltrate files from a compromised computer. [MacMa](https://attack.mitre.org/software/S1016) has been observed in the wild since November 2021.(Citation: ESET DazzleSpy Jan 2022) [MacMa](https://attack.mitre.org/software/S1016) shares command and control and unique libraries with [MgBot](https://attack.mitre.org/software/S1146) and [Nightdoor](https://attack.mitre.org/software/S1147), indicating a relationship with the [Daggerfly](https://attack.mitre.org/groups/G1034) threat actor.(Citation: Symantec Daggerfly 2024) |
| x_mitre_attack_spec_version | 3.0.0 | 3.2.0 |
| x_mitre_version | 1.0 | 2.0 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| external_references | {'source_name': 'Symantec Daggerfly 2024', 'description': 'Threat Hunter Team. (2024, July 23). Daggerfly: Espionage Group Makes Major Update to Toolset. Retrieved July 25, 2024.', 'url': 'https://symantec-enterprise-blogs.security.com/threat-intelligence/daggerfly-espionage-updated-toolset'} |
| Modified Description View changes side-by-side |
|---|
| [OutSteel](https://attack.mitre.org/software/S1017) is a file uploader and document stealer developed with the scripting language AutoIT that has been used by [Ember Bear](https://attack.mitre.org/groups/G1003) [Saint Bear](https://attack.mitre.org/groups/G1031) since at least March 2021.(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 ) |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_aliases | ['OutSteel'] |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-06-09 18:53:30.145000+00:00 | 2024-10-08 20:11:00.316000+00:00 |
| description | [OutSteel](https://attack.mitre.org/software/S1017) is a file uploader and document stealer developed with the scripting language AutoIT that has been used by [Ember Bear](https://attack.mitre.org/groups/G1003) since at least March 2021.(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 ) | [OutSteel](https://attack.mitre.org/software/S1017) is a file uploader and document stealer developed with the scripting language AutoIT that has been used by [Saint Bear](https://attack.mitre.org/groups/G1031) since at least March 2021.(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 ) |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 2.0 |
| Modified Description View changes side-by-side |
|---|
| [Saint Bot](https://attack.mitre.org/software/S1018) is a .NET downloader that has been used by [Ember Bear](https://attack.mitre.org/groups/G1003) [Saint Bear](https://attack.mitre.org/groups/G1031) since at least March 2021.(Citation: Malwarebytes Saint Bot April 2021)(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 ) |
Details
Dictionary Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_aliases | ['Saint Bot'] |
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-06-09 19:56:56.809000+00:00 | 2024-10-08 20:10:44.570000+00:00 |
| description | [Saint Bot](https://attack.mitre.org/software/S1018) is a .NET downloader that has been used by [Ember Bear](https://attack.mitre.org/groups/G1003) since at least March 2021.(Citation: Malwarebytes Saint Bot April 2021)(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 ) | [Saint Bot](https://attack.mitre.org/software/S1018) is a .NET downloader that has been used by [Saint Bear](https://attack.mitre.org/groups/G1031) since at least March 2021.(Citation: Malwarebytes Saint Bot April 2021)(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 ) |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 2.0 |
| Description |
|---|
CreepyDrive is a custom implant has been used by POLONIUM since at least early 2022 for C2 with and exfiltration to actor-controlled OneDrive accounts.[1] POLONIUM has used a similar implant called CreepyBox that relies on actor-controlled DropBox accounts.[1] References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-08-10 13:07:11.790000+00:00 | 2024-10-14 22:11:30.271000+00:00 |
| x_mitre_platforms[1] | Office 365 | Office Suite |
| Description |
|---|
Bumblebee is a custom loader written in C++ that has been used by multiple threat actors, including possible initial access brokers, to download and execute additional payloads since at least March 2022. Bumblebee has been linked to ransomware operations including Conti, Quantum, and Mountlocker and derived its name from the appearance of "bumblebee" in the user-agent.[1][2][3] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2022-10-21 21:43:41.253000+00:00 | 2024-09-17 17:58:55.921000+00:00 |
| x_mitre_attack_spec_version | 2.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-04-17 21:44:03.462000+00:00 | 2024-09-19 15:46:58.008000+00:00 |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| x_mitre_version | 1.0 | 1.1 |
| Description |
|---|
DarkGate first emerged in 2018 and has evolved into an initial access and data gathering tool associated with various criminal cyber operations. Written in Delphi and named "DarkGate" by its author, DarkGate is associated with credential theft, cryptomining, cryptotheft, and pre-ransomware actions.[1] DarkGate use increased significantly starting in 2022 and is under active development by its author, who provides it as a Malware-as-a-Service offering.[2] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2024-04-01 21:19:06.580000+00:00 | 2024-09-29 10:22:45.776000+00:00 |
Iterable Item Added
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| x_mitre_contributors | Phyo Paing Htun (ChiLai) |