Adversaries may upload, install, or otherwise set up capabilities that can be used during targeting. To support their operations, an adversary may need to take capabilities they developed (Develop Capabilities) or obtained (Obtain Capabilities) and stage them on infrastructure under their control. These capabilities may be staged on infrastructure that was previously purchased/rented by the adversary (Acquire Infrastructure) or was otherwise compromised by them (Compromise Infrastructure). Capabilities can also be staged on web services, such as GitHub or Pastebin.(Citation: Volexity Ocean Lotus November 2020)
Staging of capabilities can aid the adversary in a number of initial access and post-compromise behaviors, including (but not limited to):
Technique ID | Technique Name | Number of Mappings |
---|---|---|
T1608.004 | Drive-by Target | 2 |
T1608.003 | Install Digital Certificate | 2 |
T1608.005 | Link Target | 1 |
T1608.001 | Upload Malware | 2 |
T1608.002 | Upload Tool | 2 |