T1486 Data Encrypted for Impact Mappings

Adversaries may encrypt data on target systems or on large numbers of systems in a network to interrupt availability to system and network resources. They can attempt to render stored data inaccessible by encrypting files or data on local and remote drives and withholding access to a decryption key. This may be done in order to extract monetary compensation from a victim in exchange for decryption or a decryption key (ransomware) or to render data permanently inaccessible in cases where the key is not saved or transmitted.(Citation: US-CERT Ransomware 2016)(Citation: FireEye WannaCry 2017)(Citation: US-CERT NotPetya 2017)(Citation: US-CERT SamSam 2018)

In the case of ransomware, it is typical that common user files like Office documents, PDFs, images, videos, audio, text, and source code files will be encrypted (and often renamed and/or tagged with specific file markers). Adversaries may need to first employ other behaviors, such as File and Directory Permissions Modification or System Shutdown/Reboot, in order to unlock and/or gain access to manipulate these files.(Citation: CarbonBlack Conti July 2020) In some cases, adversaries may encrypt critical system files, disk partitions, and the MBR.(Citation: US-CERT NotPetya 2017)

To maximize impact on the target organization, malware designed for encrypting data may have worm-like features to propagate across a network by leveraging other attack techniques like Valid Accounts, OS Credential Dumping, and SMB/Windows Admin Shares.(Citation: FireEye WannaCry 2017)(Citation: US-CERT NotPetya 2017) Encryption malware may also leverage Internal Defacement, such as changing victim wallpapers, or otherwise intimidate victims by sending ransom notes or other messages to connected printers (known as "print bombing").(Citation: NHS Digital Egregor Nov 2020)

In cloud environments, storage objects within compromised accounts may also be encrypted.(Citation: Rhino S3 Ransomware Part 1)

View in MITRE ATT&CK®

Intel vPro Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
intel-tdt Intel Threat Detection Technology CrowdStrike AMS T1486 Data Encrypted for Impact
Comments
Intel Threat Detection Technology's (Intel TDT) targeted malware detection solution applies machine learning to hardware telemetry derived from the CPU to detect sustained malicious code execution patterns, like ransomware and cryptomining, at runtime. Operating on CPU level data enables TDT to detect malware execution irrespective of deployment scheme, programming language or obfuscation schemes. This enables Microsoft Defender Antivirus to use Intel TDT to help rapidly detect and respond to these threats. Intel Threat Detection Technology (TDT) and CrowdStrike's Accelerated Memory Scanning (AMS): Defending Against Data Encrypted for Impact Attacks Intel Threat Detection Technology (TDT), combined with CrowdStrike's Accelerated Memory Scanning (CAMS), enhances cybersecurity defenses by enabling faster, real-time detection of Data Encrypted for Impact attacks. This integrated solution strengthens CrowdStrike Falcon, improving its ability to detect and mitigate cyber threats earlier in the kill chain, all while minimizing system performance impact. Data Encrypted for Impact refers to the tactic used by adversaries to encrypt data or communication with the intent to cause operational disruption, evade detection, or increase the impact of a cyberattack. This can involve encrypting sensitive files to prevent access or exfiltration, or using encryption as a means to disguise malicious payloads, making it harder for security systems to detect or analyze the malicious data. Ransomware attacks, where data is encrypted and held hostage for a ransom, are a prime example of this tactic. Intel TDT plays a crucial role in identifying these threats by providing real-time telemetry on program execution, memory access, and control flow. This detailed telemetry helps security teams quickly detect suspicious behaviors, such as the use of encryption algorithms, unauthorized encryption of sensitive data, or abnormal interactions with file systems that could indicate an attempt to encrypt or obfuscate data for malicious purposes.
References
intel-tdt Intel Threat Detection Technology Microsoft Defender T1486 Data Encrypted for Impact
Comments
Intel Threat Detection Technology's (Intel TDT) targeted malware detection solution applies machine learning to hardware telemetry derived from the CPU to detect sustained malicious code execution patterns, like ransomware and cryptomining, at runtime. Operating on CPU level data enables TDT to detect malware execution irrespective of deployment scheme, programming language or obfuscation schemes. This enables Microsoft Defender Antivirus to use Intel TDT to help rapidly detect and respond to these threats. Intel Threat Detection Technology (TDT) and CrowdStrike's Accelerated Memory Scanning (AMS): Defending Against Data Encrypted for Impact Attacks Intel Threat Detection Technology (TDT), combined with CrowdStrike's Accelerated Memory Scanning (CAMS), enhances cybersecurity defenses by enabling faster, real-time detection of Data Encrypted for Impact attacks. This integrated solution strengthens CrowdStrike Falcon, improving its ability to detect and mitigate cyber threats earlier in the kill chain, all while minimizing system performance impact. Data Encrypted for Impact refers to the tactic used by adversaries to encrypt data or communication with the intent to cause operational disruption, evade detection, or increase the impact of a cyberattack. This can involve encrypting sensitive files to prevent access or exfiltration, or using encryption as a means to disguise malicious payloads, making it harder for security systems to detect or analyze the malicious data. Ransomware attacks, where data is encrypted and held hostage for a ransom, are a prime example of this tactic. Intel TDT plays a crucial role in identifying these threats by providing real-time telemetry on program execution, memory access, and control flow. This detailed telemetry helps security teams quickly detect suspicious behaviors, such as the use of encryption algorithms, unauthorized encryption of sensitive data, or abnormal interactions with file systems that could indicate an attempt to encrypt or obfuscate data for malicious purposes.
References

Known Exploited Vulnerabilities Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability secondary_impact T1486 Data Encrypted for Impact
Comments
CVE-2021-34473 is a part of the ProxyShell vulnerabilities in Microsoft Exchange and CVE-2021-34473 is a code execution vulnerability that requires no user action or privileges to exploit.
References
CVE-2021-44228 Apache Log4j2 Remote Code Execution Vulnerability secondary_impact T1486 Data Encrypted for Impact
Comments
CVE-2021-44228, known as Log4Shell, affects Apache’s Log4j library, an open-source logging framework. An actor can exploit this vulnerability by submitting a specially crafted request to a vulnerable system that causes that system to execute arbitrary code. The request allows a cyber actor to take full control over the system. The actor can then steal information, launch ransomware, or conduct other malicious activity.
References
CVE-2009-3960 Adobe BlazeDS Information Disclosure Vulnerability primary_impact T1486 Data Encrypted for Impact
Comments
This vulnerability is exploited through an XML injection or XML external entity injection. In-the-wild reporting indicates adversaries have used this exploit to establish a web shell on a victim machine. This adversary took actions to cover their tracks, establish persistence, exfiltrate Registry data, escalated privileges, moved laterally, disabled security software, installed and ran ransomware.
References
CVE-2016-1019 Adobe Flash Player Arbitrary Code Execution Vulnerability secondary_impact T1486 Data Encrypted for Impact
Comments
This vulnerability is exploited by taking advantage of a flaw of Adobe Flash embedded within browsers. In the wild, threat actors have been seen using a browser-based exploit kit to initiate a drive-by compromise of the exploit. After exploit, adversaries can install their own malware or specifically ransomware.
References
CVE-2021-42258 BQE BillQuick Web Suite SQL Injection Vulnerability secondary_impact T1486 Data Encrypted for Impact
Comments
CVE-2021-42258 is a SQL injection vulnerability in BillQuick Web Suite that allows attackers to execute arbitrary SQL commands on the database server
References
CVE-2015-8651 Adobe Flash Player Integer Overflow Vulnerability secondary_impact T1486 Data Encrypted for Impact
Comments
This vulnerability is exploited with maliciously-crafted code hosted on a website via drive-by compromise. It has been seen used in the wild by exploit kits whose goal is frequently to load ransomware onto the target machine.
References
CVE-2019-11634 Citrix Workspace Application and Receiver for Windows Remote Code Execution Vulnerability secondary_impact T1486 Data Encrypted for Impact
Comments
Vulnerability in Citrix Receiver for Windows may allows attacker to gain read/write access to the client's local drives, potentially enabling code execution on the client device, such as deploying ransomware
References
CVE-2021-45046 Apache Log4j2 Deserialization of Untrusted Data Vulnerability secondary_impact T1486 Data Encrypted for Impact
CVE-2020-1472 Microsoft Netlogon Privilege Escalation Vulnerability secondary_impact T1486 Data Encrypted for Impact
Comments
CVE-2020-1472, an elevation of privilege vulnerability in Microsoft’s Netlogon. A remote attacker can exploit this vulnerability to breach unpatched Active Directory domain controllers and obtain domain administrator access. CVE-2020-1472 has been reported to be exploited by Ransomware groups for initial access.
References
CVE-2023-0669 Fortra GoAnywhere MFT Remote Code Execution Vulnerability secondary_impact T1486 Data Encrypted for Impact
Comments
This vulnerability is exploited through a cross-site request forgery (CSRF) flaw in GoAnywhere's license installation process. Attackers initiate this vulnerability by leveraging the absence of CSRF protection, allowing them to execute remote code without authentication. This enables them to compromise targeted systems, facilitating ransomware attacks and unauthorized access. This vulnerability has been actively exploited, leading to ransomware attacks by the Clop group.
References
CVE-2023-27532 Veeam Backup & Replication Cloud Connect Missing Authentication for Critical Function Vulnerability secondary_impact T1486 Data Encrypted for Impact
Comments
CVE-2023-27532 is a vulnerability in their backup & replication servers exposed online which allows unauthenticated users to request encrypted credentials. Public reporting has indicated that various ransomware groups have exploited vulnerability to gain access and crash the backup infrastructure hosts, extract stored encrypted credentials, and deploy additional tools.
References
CVE-2023-38831 RARLAB WinRAR Code Execution Vulnerability secondary_impact T1486 Data Encrypted for Impact
Comments
CVE-2023-38831 is a vulnerability within the crafred archive process of WinRAR that occurs when a user attempts to open a seemingly legitimate document within a compromised archive, the vulnerability allows the attacker to execute arbitrary code on the system via a specially prepared archive. There have been public reports on the FROZENLAKE spear-phishing campaign, FROZENBARENTS, and ISLANDDREAMS leveraging this vulnerability.
References
CVE-2023-28252 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability secondary_impact T1486 Data Encrypted for Impact
Comments
This vulnerability is exploited by an adversary that has gained local access to the victim system. If successfully exploited, the adversary would gain full SYSTEM level privileges. This CVE has been leveraged in the wild by Storm-0506 involved deploying Black Basta ransomware, initiated through a Qakbot infection and exploiting a Windows vulnerability (CVE-2023-28252) to gain elevated privileges. The attackers used tools like Cobalt Strike and Pypykatz for credential theft and lateral movement, eventually creating an "ESX Admins" group to encrypt the ESXi file system and disrupt hosted VMs. Based on the described exploitation of CVE-2023-28252 and the associated attack activities, the following MITRE ATT&CK Tactics, Techniques, and Procedures (TTPs) could be linked to this CVE:
References
CVE-2023-36884 Microsoft Windows Search Remote Code Execution Vulnerability secondary_impact T1486 Data Encrypted for Impact
Comments
This remote code execution vulnerability in Microsoft Office has been exploited by adversarial groups to distribute ransomware. Attackers use specially crafted Microsoft Office documents to bypass security features, enabling remote code execution without user prompts. These documents are typically delivered through phishing techniques, enticing victims to open them. Once opened, the ransomware encrypts files and demands a ransom for decryption, while also removing system backups and leaving a ransom note threatening data loss if recovery is attempted without the provided decryptor key. The ransomware further erases system logs and may publish stolen data on leak websites, leading to unauthorized access to sensitive information and potential installation of backdoors for further exploitation. Microsoft addressed this vulnerability in their security updates by introducing measures to make file paths unpredictable, thereby mitigating the exploit chain. Despite these updates, additional vulnerabilities in Microsoft Office and Windows were identified. Security solutions offer protection against these exploits, and findings are shared with cybersecurity alliances to enhance collective defense efforts. This vulnerability has been exploited by the Russian group Storm-0978, also known as RomCom, who craft specially designed Microsoft Office documents related to the Ukrainian World Congress. These documents bypass Microsoft's Mark-of-the-Web (MotW) security feature, enabling remote code execution without security prompts. The adversary used phishing techniques to deliver these documents, enticing victims to open them. Once opened, the ransomware, known as Underground, executes, encrypting files and demanding a ransom for decryption. The ransomware further removes shadow copies, terminates MS SQL Server services, and leaves a ransom note threatening data loss if recovery is attempted without their decryptor key. It also erases Windows Event logs and publishes stolen victim data on a data leak website, causing unauthorized access to sensitive information and potential installation of backdoors for further exploitation.
References
CVE-2022-22947 VMware Spring Cloud Gateway Code Injection Vulnerability secondary_impact T1486 Data Encrypted for Impact
Comments
This vulnerability is exploited by a remote attacker via a code injection attack to gain perform arbitrary remote code execution. CISA has linked this vulnerability to adversary campaigns performed by Andariel to perform cyber espionage via ransomware operations.
References