T1189 Drive-by Compromise Mappings

Adversaries may gain access to a system through a user visiting a website over the normal course of browsing. With this technique, the user's web browser is typically targeted for exploitation, but adversaries may also use compromised websites for non-exploitation behavior such as acquiring Application Access Token.

Multiple ways of delivering exploit code to a browser exist, including:

  • A legitimate website is compromised where adversaries have injected some form of malicious code such as JavaScript, iFrames, and cross-site scripting.
  • Malicious ads are paid for and served through legitimate ad providers.
  • Built-in web application interfaces are leveraged for the insertion of any other kind of object that can be used to display web content or contain a script that executes on the visiting client (e.g. forum posts, comments, and other user controllable web content).

Often the website used by an adversary is one visited by a specific community, such as government, a particular industry, or region, where the goal is to compromise a specific user or set of users based on a shared interest. This kind of targeted attack is referred to a strategic web compromise or watering hole attack. There are several known examples of this occurring.(Citation: Shadowserver Strategic Web Compromise)

Typical drive-by compromise process:

  1. A user visits a website that is used to host the adversary controlled content.
  2. Scripts automatically execute, typically searching versions of the browser and plugins for a potentially vulnerable version.
    • The user may be required to assist in this process by enabling scripting or active website components and ignoring warning dialog boxes.
  3. Upon finding a vulnerable version, exploit code is delivered to the browser.
  4. If exploitation is successful, then it will give the adversary code execution on the user's system unless other protections are in place.
    • In some cases a second visit to the website after the initial scan is required before exploit code is delivered.

Unlike Exploit Public-Facing Application, the focus of this technique is to exploit software on a client endpoint upon visiting a website. This will commonly give an adversary access to systems on the internal network instead of external systems that may be in a DMZ.

Adversaries may also use compromised websites to deliver a user to a malicious application designed to Steal Application Access Tokens, like OAuth tokens, to gain access to protected applications and information. These malicious applications have been delivered through popups on legitimate websites.(Citation: Volexity OceanLotus Nov 2017)

View in MITRE ATT&CK®

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name
AC-4 Information Flow Enforcement Protects T1189 Drive-by Compromise
AC-6 Least Privilege Protects T1189 Drive-by Compromise
CA-7 Continuous Monitoring Protects T1189 Drive-by Compromise
CM-2 Baseline Configuration Protects T1189 Drive-by Compromise
CM-6 Configuration Settings Protects T1189 Drive-by Compromise
CM-8 System Component Inventory Protects T1189 Drive-by Compromise
SA-22 Unsupported System Components Protects T1189 Drive-by Compromise
SC-18 Mobile Code Protects T1189 Drive-by Compromise
SC-2 Separation of System and User Functionality Protects T1189 Drive-by Compromise
SC-29 Heterogeneity Protects T1189 Drive-by Compromise
SC-3 Security Function Isolation Protects T1189 Drive-by Compromise
SC-30 Concealment and Misdirection Protects T1189 Drive-by Compromise
SC-39 Process Isolation Protects T1189 Drive-by Compromise
SC-7 Boundary Protection Protects T1189 Drive-by Compromise
SI-2 Flaw Remediation Protects T1189 Drive-by Compromise
SI-3 Malicious Code Protection Protects T1189 Drive-by Compromise
SI-4 System Monitoring Protects T1189 Drive-by Compromise
SI-7 Software, Firmware, and Information Integrity Protects T1189 Drive-by Compromise
CVE-2019-15280 Cisco Firepower Management Center exploitation_technique T1189 Drive-by Compromise
CVE-2019-1943 Cisco Small Business 300 Series Managed Switches secondary_impact T1189 Drive-by Compromise
CVE-2019-15974 Cisco Managed Services Accelerator secondary_impact T1189 Drive-by Compromise
CVE-2019-15276 Cisco Wireless LAN Controller (WLC) exploitation_technique T1189 Drive-by Compromise
CVE-2019-1915 Cisco Unified Communications Manager exploitation_technique T1189 Drive-by Compromise
CVE-2020-3198 Cisco IOS 12.2(60)EZ16 exploitation_technique T1189 Drive-by Compromise
CVE-2020-5339 RSA Authentication Manager exploitation_technique T1189 Drive-by Compromise
CVE-2019-18578 XtremIO exploitation_technique T1189 Drive-by Compromise
CVE-2020-5340 RSA Authentication Manager exploitation_technique T1189 Drive-by Compromise
CVE-2018-11059 RSA Archer exploitation_technique T1189 Drive-by Compromise
CVE-2018-11073 Authentication Manager exploitation_technique T1189 Drive-by Compromise
CVE-2020-11036 GLPI exploitation_technique T1189 Drive-by Compromise
CVE-2020-5290 rctf exploitation_technique T1189 Drive-by Compromise
CVE-2020-11054 qutebrowser exploitation_technique T1189 Drive-by Compromise
CVE-2020-4068 APNSwift exploitation_technique T1189 Drive-by Compromise
CVE-2020-5266 ps_linklist exploitation_technique T1189 Drive-by Compromise
CVE-2019-0911 Internet Explorer 11 exploitation_technique T1189 Drive-by Compromise
CVE-2018-8355 ChakraCore exploitation_technique T1189 Drive-by Compromise
CVE-2019-1118 Windows exploitation_technique T1189 Drive-by Compromise
CVE-2018-8248 Microsoft Office exploitation_technique T1189 Drive-by Compromise
CVE-2019-1106 Microsoft Edge exploitation_technique T1189 Drive-by Compromise
CVE-2019-0926 Microsoft Edge exploitation_technique T1189 Drive-by Compromise
CVE-2019-1052 Microsoft Edge exploitation_technique T1189 Drive-by Compromise
CVE-2020-6820 Thunderbird uncategorized T1189 Drive-by Compromise
CVE-2019-9978 n/a uncategorized T1189 Drive-by Compromise
CVE-2013-0707 n/a uncategorized T1189 Drive-by Compromise
CVE-2016-3298 n/a uncategorized T1189 Drive-by Compromise
CVE-2012-4681 n/a uncategorized T1189 Drive-by Compromise
CVE-2012-0158 n/a uncategorized T1189 Drive-by Compromise
CVE-2020-6418 Chrome uncategorized T1189 Drive-by Compromise
CVE-2020-5902 BIG-IP uncategorized T1189 Drive-by Compromise
CVE-2019-7286 iOS uncategorized T1189 Drive-by Compromise
CVE-2019-18935 n/a uncategorized T1189 Drive-by Compromise
CVE-2019-17026 Firefox ESR uncategorized T1189 Drive-by Compromise
CVE-2019-13720 Chrome uncategorized T1189 Drive-by Compromise
CVE-2019-11886 n/a uncategorized T1189 Drive-by Compromise
CVE-2018-9206 Blueimp jQuery-File-Upload uncategorized T1189 Drive-by Compromise
CVE-2018-8174 Windows 7 uncategorized T1189 Drive-by Compromise
CVE-2018-8120 Windows Server 2008 uncategorized T1189 Drive-by Compromise
CVE-2018-0798 Equation Editor uncategorized T1189 Drive-by Compromise
CVE-2016-4656 n/a uncategorized T1189 Drive-by Compromise
CVE-2016-1409 n/a uncategorized T1189 Drive-by Compromise
CVE-2015-2590 n/a uncategorized T1189 Drive-by Compromise
CVE-2015-2425 n/a uncategorized T1189 Drive-by Compromise
CVE-2014-2817 n/a uncategorized T1189 Drive-by Compromise
CVE-2014-0324 n/a uncategorized T1189 Drive-by Compromise
CVE-2014-0307 n/a uncategorized T1189 Drive-by Compromise
CVE-2013-5211 n/a uncategorized T1189 Drive-by Compromise
CVE-2013-2471 n/a uncategorized T1189 Drive-by Compromise
CVE-2013-1493 n/a uncategorized T1189 Drive-by Compromise
CVE-2013-0625 n/a uncategorized T1189 Drive-by Compromise
CVE-2013-0422 n/a uncategorized T1189 Drive-by Compromise
CVE-2011-3402 n/a uncategorized T1189 Drive-by Compromise
CVE-2010-1423 n/a uncategorized T1189 Drive-by Compromise
CVE-2010-1165 n/a uncategorized T1189 Drive-by Compromise
CVE-2009-1862 n/a uncategorized T1189 Drive-by Compromise
CVE-2009-1807 n/a uncategorized T1189 Drive-by Compromise
CVE-2009-1151 n/a uncategorized T1189 Drive-by Compromise
CVE-2015-1641 n/a uncategorized T1189 Drive-by Compromise
CVE-2020-11901 n/a uncategorized T1189 Drive-by Compromise
CVE-2016-7256 n/a uncategorized T1189 Drive-by Compromise
CVE-2016-3714 n/a uncategorized T1189 Drive-by Compromise
CVE-2015-0071 n/a uncategorized T1189 Drive-by Compromise
CVE-2014-4123 n/a uncategorized T1189 Drive-by Compromise
CVE-2014-0266 n/a uncategorized T1189 Drive-by Compromise
CVE-2010-1885 n/a uncategorized T1189 Drive-by Compromise
CVE-2009-3459 n/a uncategorized T1189 Drive-by Compromise
CVE-2020-13125 n/a uncategorized T1189 Drive-by Compromise
CVE-2014-7187 n/a uncategorized T1189 Drive-by Compromise
CVE-2011-3544 n/a uncategorized T1189 Drive-by Compromise
CVE-2016-0034 n/a uncategorized T1189 Drive-by Compromise
CVE-2015-7756 n/a uncategorized T1189 Drive-by Compromise
CVE-2015-2426 n/a uncategorized T1189 Drive-by Compromise
CVE-2018-0802 Equation Editor uncategorized T1189 Drive-by Compromise
CVE-2015-2424 n/a uncategorized T1189 Drive-by Compromise
CVE-2012-2539 n/a uncategorized T1189 Drive-by Compromise
CVE-2017-0022 XML Core Services uncategorized T1189 Drive-by Compromise
CVE-2020-6819 Thunderbird uncategorized T1189 Drive-by Compromise
CVE-2020-10257 n/a uncategorized T1189 Drive-by Compromise
CVE-2017-15919 n/a uncategorized T1189 Drive-by Compromise
CVE-2017-0222 Internet Explorer uncategorized T1189 Drive-by Compromise
CVE-2017-0149 Internet Explorer uncategorized T1189 Drive-by Compromise
CVE-2016-9079 Firefox uncategorized T1189 Drive-by Compromise
CVE-2016-7189 n/a uncategorized T1189 Drive-by Compromise
CVE-2016-3393 n/a uncategorized T1189 Drive-by Compromise
CVE-2015-5123 n/a uncategorized T1189 Drive-by Compromise
CVE-2015-2502 n/a uncategorized T1189 Drive-by Compromise
CVE-2015-2419 n/a uncategorized T1189 Drive-by Compromise
CVE-2014-6332 n/a uncategorized T1189 Drive-by Compromise
CVE-2014-1815 n/a uncategorized T1189 Drive-by Compromise
CVE-2013-2465 n/a uncategorized T1189 Drive-by Compromise
CVE-2013-2423 n/a uncategorized T1189 Drive-by Compromise
CVE-2012-3213 n/a uncategorized T1189 Drive-by Compromise
CVE-2010-3971 n/a uncategorized T1189 Drive-by Compromise
CVE-2009-1136 n/a uncategorized T1189 Drive-by Compromise
CVE-2014-1776 n/a uncategorized T1189 Drive-by Compromise
CVE-2013-3918 n/a uncategorized T1189 Drive-by Compromise
action.malware.vector.Web application - drive-by Web via auto-executed or "drive-by" infection. Child of 'Web application'. related-to T1189 Drive-by Compromise
amazon_guardduty Amazon GuardDuty technique_scores T1189 Drive-by Compromise
amazon_inspector Amazon Inspector technique_scores T1189 Drive-by Compromise
aws_web_application_firewall AWS Web Application Firewall technique_scores T1189 Drive-by Compromise