Skip to content

Hide Navigation Hide TOC

Edit

Tidal References

Tidal References Cluster

Authors
Authors and/or Contributors
Tidal Cyber

D3Secutrity CTI Feeds

Banerd, W. (2019, April 30). 10 of the Best Open Source Threat Intelligence Feeds. Retrieved October 20, 2020.

Internal MISP references

UUID 088f2cbd-cce1-477f-9ffb-319477d74b69 which can be used as unique global reference for D3Secutrity CTI Feeds in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
date_published 2019-04-30T00:00:00Z
source MITRE
title 10 of the Best Open Source Threat Intelligence Feeds

Linux Logs

Marcel. (2018, April 19). 12 Critical Linux Log Files You Must be Monitoring. Retrieved March 29, 2020.

Internal MISP references

UUID aa25e385-802c-4f04-81bb-bb7d1a7599ec which can be used as unique global reference for Linux Logs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-29T00:00:00Z
date_published 2018-04-19T00:00:00Z
source MITRE
title 12 Critical Linux Log Files You Must be Monitoring

Netspi PowerShell Execution Policy Bypass

Sutherland, S. (2014, September 9). 15 Ways to Bypass the PowerShell Execution Policy. Retrieved July 23, 2015.

Internal MISP references

UUID 0ee90db4-f21c-4c68-bd35-aa6c5edd3b4e which can be used as unique global reference for Netspi PowerShell Execution Policy Bypass in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-07-23T00:00:00Z
date_published 2014-09-09T00:00:00Z
source MITRE
title 15 Ways to Bypass the PowerShell Execution Policy

Mandiant-leaks

DANIEL KAPELLMANN ZAFRA, COREY HIDELBRANDT, NATHAN BRUBAKER, KEITH LUNDEN. (2022, January 31). 1 in 7 OT Ransomware Extortion Attacks Leak Critical Operational Technology Information. Retrieved August 18, 2023.

Internal MISP references

UUID aecc3ffb-c524-5ad9-b621-7228f53e27c3 which can be used as unique global reference for Mandiant-leaks in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-18T00:00:00Z
date_published 2022-01-31T00:00:00Z
source MITRE
title 1 in 7 OT Ransomware Extortion Attacks Leak Critical Operational Technology Information

Tilbury Windows Credentials

Chad Tilbury. (2017, August 8). 1Windows Credentials: Attack, Mitigation, Defense. Retrieved February 21, 2020.

Internal MISP references

UUID 2ddae0c9-910c-4c1a-b524-de3a58dbba13 which can be used as unique global reference for Tilbury Windows Credentials in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-21T00:00:00Z
date_published 2017-08-08T00:00:00Z
source MITRE
title 1Windows Credentials: Attack, Mitigation, Defense

CWE top 25

Christey, S., Brown, M., Kirby, D., Martin, B., Paller, A.. (2011, September 13). 2011 CWE/SANS Top 25 Most Dangerous Software Errors. Retrieved April 10, 2019.

Internal MISP references

UUID d8ee8b1f-c18d-48f3-9758-6860cd31c3e3 which can be used as unique global reference for CWE top 25 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-10T00:00:00Z
date_published 2011-09-13T00:00:00Z
source MITRE
title 2011 CWE/SANS Top 25 Most Dangerous Software Errors

CrowdStrike 2015 Global Threat Report

CrowdStrike Intelligence. (2016). 2015 Global Threat Report. Retrieved April 11, 2018.

Internal MISP references

UUID 50d467da-286b-45f3-8d5a-e9d8632f7bf1 which can be used as unique global reference for CrowdStrike 2015 Global Threat Report in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-11T00:00:00Z
date_published 2016-01-01T00:00:00Z
source MITRE
title 2015 Global Threat Report

Prolific OSX Malware History

Bit9 + Carbon Black Threat Research Team. (2015). 2015: The Most Prolific Year in History for OS X Malware. Retrieved July 8, 2017.

Internal MISP references

UUID 74b0f1a9-5822-4dcf-9a92-9a6df0b4db1e which can be used as unique global reference for Prolific OSX Malware History in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-08T00:00:00Z
date_published 2015-01-01T00:00:00Z
source MITRE
title 2015: The Most Prolific Year in History for OS X Malware

CERN Windigo June 2019

CERN. (2019, June 4). 2019/06/04 Advisory: Windigo attacks. Retrieved February 10, 2021.

Internal MISP references

UUID e9f1289f-a32e-441c-8787-cb32a26216d1 which can be used as unique global reference for CERN Windigo June 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-10T00:00:00Z
date_published 2019-06-04T00:00:00Z
source MITRE
title 2019/06/04 Advisory: Windigo attacks

CrowdStrike GTR 2019

CrowdStrike. (2019, January). 2019 Global Threat Report. Retrieved June 10, 2020.

Internal MISP references

UUID d6aa917e-baee-4379-8e69-a04b9aa5192a which can be used as unique global reference for CrowdStrike GTR 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-10T00:00:00Z
date_published 2019-01-01T00:00:00Z
source MITRE
title 2019 Global Threat Report

Crowdstrike GTR2020 Mar 2020

Crowdstrike. (2020, March 2). 2020 Global Threat Report. Retrieved December 11, 2020.

Internal MISP references

UUID a2325ace-e5a1-458d-80c1-5037bd7fa727 which can be used as unique global reference for Crowdstrike GTR2020 Mar 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-11T00:00:00Z
date_published 2020-03-02T00:00:00Z
source MITRE
title 2020 Global Threat Report

RecordedFuture 2021 Ad Infra

Insikt Group. (2022, January 18). 2021 Adversary Infrastructure Report. Retrieved March 25, 2022.

Internal MISP references

UUID d509e6f2-c317-4483-a51e-ad15a78a12c0 which can be used as unique global reference for RecordedFuture 2021 Ad Infra in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-25T00:00:00Z
date_published 2022-01-18T00:00:00Z
source MITRE
title 2021 Adversary Infrastructure Report

Red Canary 2021 Threat Detection Report March 2021

Red Canary. (2021, March 31). 2021 Threat Detection Report. Retrieved August 31, 2021.

Internal MISP references

UUID 83b906fc-ac2a-4f49-b87e-31f046e95fb7 which can be used as unique global reference for Red Canary 2021 Threat Detection Report March 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-31T00:00:00Z
date_published 2021-03-31T00:00:00Z
source MITRE
title 2021 Threat Detection Report

ACSC BlackCat Apr 2022

Australian Cyber Security Centre. (2022, April 14). 2022-004: ACSC Ransomware Profile - ALPHV (aka BlackCat). Retrieved December 20, 2022.

Internal MISP references

UUID 3b85eaeb-6bf5-529b-80a4-439ceb6c5d6d which can be used as unique global reference for ACSC BlackCat Apr 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-12-20T00:00:00Z
date_published 2022-04-14T00:00:00Z
source MITRE
title 2022-004: ACSC Ransomware Profile - ALPHV (aka BlackCat)

Crowdstrike HuntReport 2022

CrowdStrike. (2023). 2022 Falcon OverWatch Threat Hunting Report. Retrieved May 20, 2024.

Internal MISP references

UUID cae1043a-2473-5b7e-b9ed-27d4f9c5b9b0 which can be used as unique global reference for Crowdstrike HuntReport 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-20T00:00:00Z
date_published 2023-01-01T00:00:00Z
source MITRE
title 2022 Falcon OverWatch Threat Hunting Report

Internet crime report 2022

IC3. (2022). 2022 Internet Crime Report. Retrieved August 18, 2023.

Internal MISP references

UUID ef30c4eb-3da3-5c7b-a304-188acd2f7ebc which can be used as unique global reference for Internet crime report 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-18T00:00:00Z
date_published 2022-01-01T00:00:00Z
source MITRE
title 2022 Internet Crime Report

RC PowerShell

Red Canary. (n.d.). 2022 Threat Detection Report: PowerShell. Retrieved March 17, 2023.

Internal MISP references

UUID 0f154aa6-8c9d-5bfc-a3c4-5f3e1420f55f which can be used as unique global reference for RC PowerShell in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-17T00:00:00Z
source MITRE
title 2022 Threat Detection Report: PowerShell

ASD Royal Ransomware January 24 2023

Australian Signals Directorate. (2023, January 24). 2023-01: ASD's ACSC Ransomware Profile - Royal. Retrieved June 28, 2024.

Internal MISP references

UUID 514b704c-8668-4b61-8411-5b682e3b8471 which can be used as unique global reference for ASD Royal Ransomware January 24 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-28T00:00:00Z
date_published 2023-01-24T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title 2023-01: ASD's ACSC Ransomware Profile - Royal

Palo Alto Latrodectus Activity June 2024

Unit 42. (2024, June 25). 2024-06-25-IOCs-from-Latrodectus-activity. Retrieved September 13, 2024.

Internal MISP references

UUID 00f32246-e19b-5b20-b5c1-27b75c6667ca which can be used as unique global reference for Palo Alto Latrodectus Activity June 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-13T00:00:00Z
date_published 2024-06-25T00:00:00Z
source MITRE
title 2024-06-25-IOCs-from-Latrodectus-activity

20 macOS Common Tools and Techniques

Phil Stokes. (2021, February 16). 20 Common Tools & Techniques Used by macOS Threat Actors & Malware. Retrieved August 23, 2021.

Internal MISP references

UUID 3ee99ff4-daf4-4776-9d94-f7cf193c2b0c which can be used as unique global reference for 20 macOS Common Tools and Techniques in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-23T00:00:00Z
date_published 2021-02-16T00:00:00Z
source MITRE
title 20 Common Tools & Techniques Used by macOS Threat Actors & Malware

Microsoft GPP Key

Microsoft. (n.d.). 2.2.1.1.4 Password Encryption. Retrieved April 11, 2018.

Internal MISP references

UUID 24d8847b-d5de-4513-a55f-62c805dfa1dc which can be used as unique global reference for Microsoft GPP Key in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-11T00:00:00Z
source MITRE
title 2.2.1.1.4 Password Encryption

Microsoft _VBA_PROJECT Stream

Microsoft. (2020, February 19). 2.3.4.1 _VBA_PROJECT Stream: Version Dependent Project Information. Retrieved September 18, 2020.

Internal MISP references

UUID 70c75ee4-4ba4-4124-8001-0fadb49a5ac6 which can be used as unique global reference for Microsoft _VBA_PROJECT Stream in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-18T00:00:00Z
date_published 2020-02-19T00:00:00Z
source MITRE
title 2.3.4.1 _VBA_PROJECT Stream: Version Dependent Project Information

Microsoft Learn

Microsoft. (2021, April 6). 2.5 ExtraData. Retrieved September 30, 2022.

Internal MISP references

UUID 73ba4e07-cfbd-4b23-b52a-1ebbd7cc0fe4 which can be used as unique global reference for Microsoft Learn in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-30T00:00:00Z
date_published 2021-04-06T00:00:00Z
source MITRE
title 2.5 ExtraData

Hybrid Analysis Icacls2 May 2018

Hybrid Analysis. (2018, May 30). 2a8efbfadd798f6111340f7c1c956bee.dll. Retrieved August 19, 2018.

Internal MISP references

UUID 5d33fcb4-0f01-4b88-b1ee-dad6dcc867f4 which can be used as unique global reference for Hybrid Analysis Icacls2 May 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-19T00:00:00Z
date_published 2018-05-30T00:00:00Z
source MITRE
title 2a8efbfadd798f6111340f7c1c956bee.dll

Bleeping Computer 2easy 2021

Bill Toulas. (2021, December 21). 2easy now a significant dark web marketplace for stolen data. Retrieved October 7, 2024.

Internal MISP references

UUID 23ebd169-3ac6-5074-a238-a8e7d96f48ab which can be used as unique global reference for Bleeping Computer 2easy 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-07T00:00:00Z
date_published 2021-12-21T00:00:00Z
source MITRE
title 2easy now a significant dark web marketplace for stolen data

Microsoft Wow6432Node 2018

Microsoft. (2018, May 31). 32-bit and 64-bit Application Data in the Registry. Retrieved August 3, 2020.

Internal MISP references

UUID cbc14af8-f0d9-46c9-ae2c-d93d706ac84e which can be used as unique global reference for Microsoft Wow6432Node 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-03T00:00:00Z
date_published 2018-05-31T00:00:00Z
source MITRE
title 32-bit and 64-bit Application Data in the Registry

DOJ-DPRK Heist

Department of Justice. (2021). 3 North Korean Military Hackers Indicted in Wide-Ranging Scheme to Commit Cyber-attacks and Financial Crimes Across the Globe. Retrieved August 18, 2023.

Internal MISP references

UUID c50d2a5b-1d44-5f18-aaff-4be9f6d3f3ac which can be used as unique global reference for DOJ-DPRK Heist in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-18T00:00:00Z
date_published 2021-01-01T00:00:00Z
source MITRE
title 3 North Korean Military Hackers Indicted in Wide-Ranging Scheme to Commit Cyber-attacks and Financial Crimes Across the Globe

ITWorld Hard Disk Health Dec 2014

Pinola, M. (2014, December 14). 3 tools to check your hard drive's health and make sure it's not already dying on you. Retrieved October 2, 2018.

Internal MISP references

UUID e48fab76-7e38-420e-b69b-709f37bde847 which can be used as unique global reference for ITWorld Hard Disk Health Dec 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-10-02T00:00:00Z
date_published 2014-12-14T00:00:00Z
source MITRE
title 3 tools to check your hard drive's health and make sure it's not already dying on you

Microsoft 4657 APR 2017

Miroshnikov, A. & Hall, J. (2017, April 18). 4657(S): A registry value was modified. Retrieved August 9, 2018.

Internal MISP references

UUID ee681893-edd6-46c7-bb11-38fc24eef899 which can be used as unique global reference for Microsoft 4657 APR 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-09T00:00:00Z
date_published 2017-04-18T00:00:00Z
source MITRE
title 4657(S): A registry value was modified

Microsoft 4697 APR 2017

Miroshnikov, A. & Hall, J. (2017, April 18). 4697(S): A service was installed in the system. Retrieved August 7, 2018.

Internal MISP references

UUID 17473dc7-39cd-4c90-85cb-05d4c1364fff which can be used as unique global reference for Microsoft 4697 APR 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-07T00:00:00Z
date_published 2017-04-18T00:00:00Z
source MITRE
title 4697(S): A service was installed in the system

Microsoft User Creation Event

Lich, B., Miroshnikov, A. (2017, April 5). 4720(S): A user account was created. Retrieved June 30, 2017.

Internal MISP references

UUID 01e2068b-83bc-4479-8fc9-dfaafdbf272b which can be used as unique global reference for Microsoft User Creation Event in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-06-30T00:00:00Z
date_published 2017-04-05T00:00:00Z
source MITRE
title 4720(S): A user account was created

Microsoft User Modified Event

Lich, B., Miroshnikov, A. (2017, April 5). 4738(S): A user account was changed. Retrieved June 30, 2017.

Internal MISP references

UUID fb4164f9-1e03-43f1-8143-179c9f08dff2 which can be used as unique global reference for Microsoft User Modified Event in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-06-30T00:00:00Z
date_published 2017-04-05T00:00:00Z
source MITRE
title 4738(S): A user account was changed

Microsoft 4768 TGT 2017

Microsoft. (2017, April 19). 4768(S, F): A Kerberos authentication ticket (TGT) was requested. Retrieved August 24, 2020.

Internal MISP references

UUID 19237af4-e535-4059-a8a9-63280cdf4722 which can be used as unique global reference for Microsoft 4768 TGT 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-24T00:00:00Z
date_published 2017-04-19T00:00:00Z
source MITRE
title 4768(S, F): A Kerberos authentication ticket (TGT) was requested

HIPAA Journal S3 Breach, 2017

HIPAA Journal. (2017, October 11). 47GB of Medical Records and Test Results Found in Unsecured Amazon S3 Bucket. Retrieved October 4, 2019.

Internal MISP references

UUID b0fbf593-4aeb-4167-814b-ed3d4479ded0 which can be used as unique global reference for HIPAA Journal S3 Breach, 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-04T00:00:00Z
date_published 2017-10-11T00:00:00Z
source MITRE
title 47GB of Medical Records and Test Results Found in Unsecured Amazon S3 Bucket

Slack Security Risks

Michael Osakwe. (2020, November 18). 4 SaaS and Slack Security Risks to Consider. Retrieved March 17, 2023.

Internal MISP references

UUID 4332430a-0dec-5942-88ce-21f6d02cc9a9 which can be used as unique global reference for Slack Security Risks in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-17T00:00:00Z
date_published 2020-11-18T00:00:00Z
source MITRE
title 4 SaaS and Slack Security Risks to Consider

PurpleSec Data Loss Prevention

Michael Swanagan. (2020, October 24). 7 Data Loss Prevention Best Practices & Strategies. Retrieved August 30, 2021.

Internal MISP references

UUID b7d786db-c50e-4d1f-947e-205e8eefa2da which can be used as unique global reference for PurpleSec Data Loss Prevention in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-30T00:00:00Z
date_published 2020-10-24T00:00:00Z
source MITRE
title 7 Data Loss Prevention Best Practices & Strategies

7zip Homepage

I. Pavlov. (2019). 7-Zip. Retrieved February 20, 2020.

Internal MISP references

UUID fc1396d2-1ffd-4fd9-ba60-3f6e0a9dfffb which can be used as unique global reference for 7zip Homepage in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-20T00:00:00Z
date_published 2019-01-01T00:00:00Z
source MITRE
title 7-Zip

VMWare 8Base June 28 2023

Deborah Snyder, Fae Carlisle, Dana Behling, Bria Beathley. (2023, June 28). 8Base Ransomware: A Heavy Hitting Player. Retrieved August 4, 2023.

Internal MISP references

UUID 573e9520-6181-4535-9ed3-2338688a8e9f which can be used as unique global reference for VMWare 8Base June 28 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-04T00:00:00Z
date_published 2023-06-28T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title 8Base Ransomware: A Heavy Hitting Player

Acronis 8Base July 17 2023

Acronis Security Team. (2023, July 17). 8Base ransomware stays unseen for a year. Retrieved August 4, 2023.

Internal MISP references

UUID c9822477-1578-4068-9882-41e4d6eaee3f which can be used as unique global reference for Acronis 8Base July 17 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-04T00:00:00Z
date_published 2023-07-17T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title 8Base ransomware stays unseen for a year

MicroFocus 9002 Aug 2016

Petrovsky, O. (2016, August 30). “9002 RAT” -- a second building on the left. Retrieved February 20, 2018.

Internal MISP references

UUID a4d6bdd1-e70c-491b-a569-72708095c809 which can be used as unique global reference for MicroFocus 9002 Aug 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-20T00:00:00Z
date_published 2016-08-30T00:00:00Z
source MITRE
title “9002 RAT” -- a second building on the left

CISA AA21-200A APT40 July 2021

CISA. (2021, July 19). (AA21-200A) Joint Cybersecurity Advisory – Tactics, Techniques, and Procedures of Indicted APT40 Actors Associated with China’s MSS Hainan State Security Department. Retrieved August 12, 2021.

Internal MISP references

UUID 3a2dbd8b-54e3-406a-b77c-b6fae5541b6d which can be used as unique global reference for CISA AA21-200A APT40 July 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-12T00:00:00Z
date_published 2021-07-19T00:00:00Z
source MITRE, Tidal Cyber
title (AA21-200A) Joint Cybersecurity Advisory – Tactics, Techniques, and Procedures of Indicted APT40 Actors Associated with China’s MSS Hainan State Security Department

CISA Iran Albanian Attacks September 2022

CISA. (2022, September 23). AA22-264A Iranian State Actors Conduct Cyber Operations Against the Government of Albania. Retrieved August 6, 2024.

Internal MISP references

UUID c5d37bde-52bc-525a-b25a-e097f77a924a which can be used as unique global reference for CISA Iran Albanian Attacks September 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-06T00:00:00Z
date_published 2022-09-23T00:00:00Z
source MITRE
title AA22-264A Iranian State Actors Conduct Cyber Operations Against the Government of Albania

AADInternals

Dr. Nestori Syynimaa. (2018, October 25). AADInternals. Retrieved February 1, 2022.

Internal MISP references

UUID d6faadde-690d-44d1-b1aa-0991a5374604 which can be used as unique global reference for AADInternals in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-01T00:00:00Z
date_published 2018-10-25T00:00:00Z
source MITRE
title AADInternals

AADInternals Documentation

Dr. Nestori Syynimaa. (2018, October 25). AADInternals. Retrieved February 18, 2022.

Internal MISP references

UUID 320231a1-4dbe-4eaa-b14d-48de738ba697 which can be used as unique global reference for AADInternals Documentation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-18T00:00:00Z
date_published 2018-10-25T00:00:00Z
source MITRE
title AADInternals Documentation

AADInternals Github

Dr. Nestori Syynimaa. (2021, December 13). AADInternals. Retrieved February 1, 2022.

Internal MISP references

UUID 643d3947-c0ec-47c4-bb58-5e546084433c which can be used as unique global reference for AADInternals Github in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-01T00:00:00Z
date_published 2021-12-13T00:00:00Z
source MITRE
title AADInternals Github

Gigamon BADHATCH Jul 2019

Savelesky, K., et al. (2019, July 23). ABADBABE 8BADFOOD: Discovering BADHATCH and a Detailed Look at FIN8's Tooling. Retrieved September 8, 2021.

Internal MISP references

UUID 69a45479-e982-58ee-9e2d-caaf825f0ad4 which can be used as unique global reference for Gigamon BADHATCH Jul 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-08T00:00:00Z
date_published 2019-07-23T00:00:00Z
source MITRE
title ABADBABE 8BADFOOD: Discovering BADHATCH and a Detailed Look at FIN8's Tooling

bad_luck_blackcat

Kaspersky Global Research & Analysis Team (GReAT). (2022). A Bad Luck BlackCat. Retrieved May 5, 2022.

Internal MISP references

UUID 0d1e9635-b7b6-454b-9482-b1fc7d33bfff which can be used as unique global reference for bad_luck_blackcat in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-05T00:00:00Z
date_published 2022-01-01T00:00:00Z
source MITRE
title A Bad Luck BlackCat

Cybereason Bazar July 2020

Cybereason Nocturnus. (2020, July 16). A BAZAR OF TRICKS: FOLLOWING TEAM9’S DEVELOPMENT CYCLES. Retrieved November 18, 2020.

Internal MISP references

UUID 8819875a-5139-4dae-94c8-e7cc9f847580 which can be used as unique global reference for Cybereason Bazar July 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-18T00:00:00Z
date_published 2020-07-16T00:00:00Z
source MITRE
title A BAZAR OF TRICKS: FOLLOWING TEAM9’S DEVELOPMENT CYCLES

Red Canary Hospital Thwarted Ryuk October 2020

Brian Donohue, Katie Nickels, Paul Michaud, Adina Bodkins, Taylor Chapman, Tony Lambert, Jeff Felling, Kyle Rainey, Mike Haag, Matt Graeber, Aaron Didier.. (2020, October 29). A Bazar start: How one hospital thwarted a Ryuk ransomware outbreak. Retrieved October 30, 2020.

Internal MISP references

UUID ae5d4c47-54c9-4f7b-9357-88036c524217 which can be used as unique global reference for Red Canary Hospital Thwarted Ryuk October 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-30T00:00:00Z
date_published 2020-10-29T00:00:00Z
source MITRE
title A Bazar start: How one hospital thwarted a Ryuk ransomware outbreak

CyberCX Anonymous Sudan June 19 2023

CyberCX Intelligence. (2023, June 19). A bear in wolf’s clothing: Insights into the infrastructure used by Anonymous Sudan to attack Australian organisations. Retrieved October 10, 2023.

Internal MISP references

UUID 68ded9b7-3042-44e0-8bf7-cdba2174a3d8 which can be used as unique global reference for CyberCX Anonymous Sudan June 19 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-10T00:00:00Z
date_published 2023-06-19T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title A bear in wolf’s clothing: Insights into the infrastructure used by Anonymous Sudan to attack Australian organisations

Netskope Cloud Phishing

Ashwin Vamshi. (2020, August 12). A Big Catch: Cloud Phishing from Google App Engine and Azure App Service. Retrieved August 18, 2022.

Internal MISP references

UUID 25d46bc1-4c05-48d3-95f0-aa3ee1100bf9 which can be used as unique global reference for Netskope Cloud Phishing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-18T00:00:00Z
date_published 2020-08-12T00:00:00Z
source MITRE
title A Big Catch: Cloud Phishing from Google App Engine and Azure App Service

Elastic Abnormal Process ID or Lock File Created

Elastic. (n.d.). Abnormal Process ID or Lock File Created. Retrieved September 19, 2024.

Internal MISP references

UUID 99091ea0-35b3-590d-bd6c-0cc20b6be8f9 which can be used as unique global reference for Elastic Abnormal Process ID or Lock File Created in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-19T00:00:00Z
source MITRE
title Abnormal Process ID or Lock File Created

Microsoft O365 Admin Roles

Ako-Adjei, K., Dickhaus, M., Baumgartner, P., Faigel, D., et. al.. (2019, October 8). About admin roles. Retrieved October 18, 2019.

Internal MISP references

UUID 8014a0cc-f793-4d9a-a2cc-ef9e9c5a826a which can be used as unique global reference for Microsoft O365 Admin Roles in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-18T00:00:00Z
date_published 2019-10-08T00:00:00Z
source MITRE
title About admin roles

Microsoft Atom Table

Microsoft. (n.d.). About Atom Tables. Retrieved December 8, 2017.

Internal MISP references

UUID a22636c8-8e39-4583-93ef-f0b7f0a218d8 which can be used as unique global reference for Microsoft Atom Table in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-08T00:00:00Z
source MITRE
title About Atom Tables

Microsoft About BITS

Microsoft. (2019, July 12). About BITS. Retrieved March 16, 2020.

Internal MISP references

UUID 8d6d47d1-a6ea-4673-8ade-ba61bfeef084 which can be used as unique global reference for Microsoft About BITS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-16T00:00:00Z
date_published 2019-07-12T00:00:00Z
source MITRE
title About BITS

Microsoft About Event Tracing 2018

Microsoft. (2018, May 30). About Event Tracing. Retrieved June 7, 2019.

Internal MISP references

UUID 689d944f-ad66-4908-91fb-bb1ecdafe8d9 which can be used as unique global reference for Microsoft About Event Tracing 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-07T00:00:00Z
date_published 2018-05-30T00:00:00Z
source MITRE
title About Event Tracing

Microsoft PowerShell Command History

Microsoft. (2020, May 13). About History. Retrieved September 4, 2020.

Internal MISP references

UUID 6c873fb4-db43-4bad-b5e4-a7d45cbe796f which can be used as unique global reference for Microsoft PowerShell Command History in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-04T00:00:00Z
date_published 2020-05-13T00:00:00Z
source MITRE
title About History

Microsoft List View Controls

Microsoft. (2021, May 25). About List-View Controls. Retrieved January 4, 2022.

Internal MISP references

UUID 7d6c6ba6-cda6-4f27-bfc8-af5b759305ed which can be used as unique global reference for Microsoft List View Controls in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-04T00:00:00Z
date_published 2021-05-25T00:00:00Z
source MITRE
title About List-View Controls

Microsoft PowerShell Logging

Microsoft. (2020, March 30). about_Logging_Windows. Retrieved September 28, 2021.

Internal MISP references

UUID 81c94686-741d-45d7-90f3-0c7979374e87 which can be used as unique global reference for Microsoft PowerShell Logging in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-28T00:00:00Z
date_published 2020-03-30T00:00:00Z
source MITRE
title about_Logging_Windows

Apple About Mac Scripting 2016

Apple. (2016, June 13). About Mac Scripting. Retrieved April 14, 2021.

Internal MISP references

UUID d2f32ac1-9b5b-408d-a7ab-d92dd9efe0ed which can be used as unique global reference for Apple About Mac Scripting 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-14T00:00:00Z
date_published 2016-06-13T00:00:00Z
source MITRE
title About Mac Scripting

PowerShell About 2019

Wheeler, S. et al.. (2019, May 1). About PowerShell.exe. Retrieved October 11, 2019.

Internal MISP references

UUID 2c504602-4f5d-47fc-9780-e1e5041a0b3a which can be used as unique global reference for PowerShell About 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-11T00:00:00Z
date_published 2019-05-01T00:00:00Z
source MITRE
title About PowerShell.exe

Microsoft PowerShellB64

Microsoft. (2023, February 8). about_PowerShell_exe: EncodedCommand. Retrieved March 17, 2023.

Internal MISP references

UUID 7e50721c-c6d5-5449-8326-529da4cf5465 which can be used as unique global reference for Microsoft PowerShellB64 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-17T00:00:00Z
date_published 2023-02-08T00:00:00Z
source MITRE
title about_PowerShell_exe: EncodedCommand

Microsoft Profiles

Microsoft. (2021, September 27). about_Profiles. Retrieved February 4, 2022.

Internal MISP references

UUID b25ab0bf-c28b-4747-b075-30bcdfbc0e35 which can be used as unique global reference for Microsoft Profiles in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-04T00:00:00Z
date_published 2021-09-27T00:00:00Z
source MITRE
title about_Profiles

Microsoft About Profiles

Microsoft. (2017, November 29). About Profiles. Retrieved June 14, 2019.

Internal MISP references

UUID 1da63665-7a96-4bc3-9606-a3575b913819 which can be used as unique global reference for Microsoft About Profiles in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-14T00:00:00Z
date_published 2017-11-29T00:00:00Z
source MITRE
title About Profiles

Microsoft Remote Desktop Services

Microsoft. (2019, August 23). About Remote Desktop Services. Retrieved March 28, 2022.

Internal MISP references

UUID a981e013-f839-46e9-9c8a-128c4897f77a which can be used as unique global reference for Microsoft Remote Desktop Services in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-28T00:00:00Z
date_published 2019-08-23T00:00:00Z
source MITRE
title About Remote Desktop Services

systemsetup mac time

Apple Support. (n.d.). About systemsetup in Remote Desktop. Retrieved March 27, 2024.

Internal MISP references

UUID a85bd111-a2ca-5e66-b90e-f52ff780fc5c which can be used as unique global reference for systemsetup mac time in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-27T00:00:00Z
source MITRE
title About systemsetup in Remote Desktop

MSDN Clipboard

Microsoft. (n.d.). About the Clipboard. Retrieved March 29, 2016.

Internal MISP references

UUID 2c1b2d58-a5dc-4aee-8bdb-129a81c10408 which can be used as unique global reference for MSDN Clipboard in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-03-29T00:00:00Z
source MITRE
title About the Clipboard

Microsoft HTML Help Executable Program

Microsoft. (n.d.). About the HTML Help Executable Program. Retrieved October 3, 2018.

Internal MISP references

UUID 1af226cc-bb93-43c8-972e-367482c5d487 which can be used as unique global reference for Microsoft HTML Help Executable Program in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-10-03T00:00:00Z
source MITRE
title About the HTML Help Executable Program

About UEFI

UEFI Forum. (n.d.). About UEFI Forum. Retrieved January 5, 2016.

Internal MISP references

UUID 2e6fe82c-d90f-42b6-8247-397ab8823c7c which can be used as unique global reference for About UEFI in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-05T00:00:00Z
source MITRE
title About UEFI Forum

Microsoft Window Classes

Microsoft. (n.d.). About Window Classes. Retrieved December 16, 2017.

Internal MISP references

UUID cc620fcd-1f4a-4670-84b5-3f12c9b85053 which can be used as unique global reference for Microsoft Window Classes in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-16T00:00:00Z
source MITRE
title About Window Classes

Picus Sodinokibi January 2020

Ozarslan, S. (2020, January 15). A Brief History of Sodinokibi. Retrieved August 5, 2020.

Internal MISP references

UUID 2e9c2206-a04e-4278-9492-830cc9347ff9 which can be used as unique global reference for Picus Sodinokibi January 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-05T00:00:00Z
date_published 2020-01-15T00:00:00Z
source MITRE
title A Brief History of Sodinokibi

Application Bundle Manipulation Brandon Dalton

Brandon Dalton. (2022, August 9). A bundle of nerves: Tweaking macOS security controls to thwart application bundle manipulation. Retrieved September 27, 2022.

Internal MISP references

UUID 2a8fd573-6ab0-403b-b813-88d9d3edab36 which can be used as unique global reference for Application Bundle Manipulation Brandon Dalton in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-27T00:00:00Z
date_published 2022-08-09T00:00:00Z
source MITRE
title A bundle of nerves: Tweaking macOS security controls to thwart application bundle manipulation

NCC Group Chimera January 2021

Jansen, W . (2021, January 12). Abusing cloud services to fly under the radar. Retrieved September 12, 2024.

Internal MISP references

UUID 70c217c3-83a2-40f2-8f47-b68d8bd4cdf0 which can be used as unique global reference for NCC Group Chimera January 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2021-01-12T00:00:00Z
source MITRE
title Abusing cloud services to fly under the radar

Electron 2

Trend Micro. (2023, June 6). Abusing Electronbased applications in targeted attacks. Retrieved March 7, 2024.

Internal MISP references

UUID 0be977fd-7b7e-5ddb-aa0c-def81b97b2a5 which can be used as unique global reference for Electron 2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-07T00:00:00Z
date_published 2023-06-06T00:00:00Z
source MITRE
title Abusing Electronbased applications in targeted attacks

Harmj0y Abusing GPO Permissions

Schroeder, W. (2016, March 17). Abusing GPO Permissions. Retrieved September 23, 2024.

Internal MISP references

UUID 18cc9426-9b51-46fa-9106-99688385ebe4 which can be used as unique global reference for Harmj0y Abusing GPO Permissions in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-23T00:00:00Z
date_published 2016-03-17T00:00:00Z
source MITRE
title Abusing GPO Permissions

on security kerberos linux

Boal, Calum. (2020, January 28). Abusing Kerberos From Linux - An Overview of Available Tools. Retrieved September 17, 2024.

Internal MISP references

UUID 7d0870a0-db94-5213-a1b7-fc3c6557dcc0 which can be used as unique global reference for on security kerberos linux in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-17T00:00:00Z
date_published 2020-01-28T00:00:00Z
source MITRE
title Abusing Kerberos From Linux - An Overview of Available Tools

Retwin Directory Share Pivot

Routin, D. (2017, November 13). Abusing network shares for efficient lateral movements and privesc (DirSharePivot). Retrieved April 12, 2018.

Internal MISP references

UUID 027c5274-6b61-447a-9058-edb844f112dd which can be used as unique global reference for Retwin Directory Share Pivot in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-12T00:00:00Z
date_published 2017-11-13T00:00:00Z
source MITRE
title Abusing network shares for efficient lateral movements and privesc (DirSharePivot)

BOHOPS Abusing the COM Registry

BOHOPS. (2018, August 18). Abusing the COM Registry Structure (Part 2): Hijacking & Loading Techniques. Retrieved August 10, 2020.

Internal MISP references

UUID 3b5c0e62-7ac9-42e1-b2dd-8f2e0739b9d7 which can be used as unique global reference for BOHOPS Abusing the COM Registry in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-10T00:00:00Z
date_published 2018-08-18T00:00:00Z
source MITRE
title Abusing the COM Registry Structure (Part 2): Hijacking & Loading Techniques

abusing_com_reg

bohops. (2018, August 18). ABUSING THE COM REGISTRY STRUCTURE (PART 2): HIJACKING & LOADING TECHNIQUES. Retrieved September 20, 2021.

Internal MISP references

UUID 7f0f223f-09b1-4f8f-b6f1-1044e2ac7066 which can be used as unique global reference for abusing_com_reg in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-20T00:00:00Z
date_published 2018-08-18T00:00:00Z
source MITRE
title ABUSING THE COM REGISTRY STRUCTURE (PART 2): HIJACKING & LOADING TECHNIQUES

Rhino Security Labs AWS VPC Traffic Mirroring

Spencer Gietzen. (2019, September 17). Abusing VPC Traffic Mirroring in AWS. Retrieved March 17, 2022.

Internal MISP references

UUID 09cac813-862c-47c8-a47f-154c5436afbb which can be used as unique global reference for Rhino Security Labs AWS VPC Traffic Mirroring in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-17T00:00:00Z
date_published 2019-09-17T00:00:00Z
source MITRE
title Abusing VPC Traffic Mirroring in AWS

Narrator Accessibility Abuse

Comi, G. (2019, October 19). Abusing Windows 10 Narrator's 'Feedback-Hub' URI for Fileless Persistence. Retrieved April 28, 2020.

Internal MISP references

UUID fc889ba3-79a5-445a-81ea-dfe81c1cc542 which can be used as unique global reference for Narrator Accessibility Abuse in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-04-28T00:00:00Z
date_published 2019-10-19T00:00:00Z
source MITRE
title Abusing Windows 10 Narrator's 'Feedback-Hub' URI for Fileless Persistence

Intezer ACBackdoor

Sanmillan, I. (2019, November 18). ACBackdoor: Analysis of a New Multiplatform Backdoor. Retrieved October 4, 2021.

Internal MISP references

UUID e6cb833f-cf18-498b-a233-848853423412 which can be used as unique global reference for Intezer ACBackdoor in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-04T00:00:00Z
date_published 2019-11-18T00:00:00Z
source MITRE
title ACBackdoor: Analysis of a New Multiplatform Backdoor

AccCheckConsole.exe - LOLBAS Project

LOLBAS. (2022, January 2). AccCheckConsole.exe. Retrieved December 4, 2023.

Internal MISP references

UUID de5523bd-e735-4751-84e9-a1be1d2980ec which can be used as unique global reference for AccCheckConsole.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2022-01-02T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title AccCheckConsole.exe

CyberScoop APT28 Nov 2018

Shoorbajee, Z. (2018, November 29). Accenture: Russian hackers using Brexit talks to disguise phishing lures. Retrieved July 16, 2019.

Internal MISP references

UUID ef8f0990-b2da-4538-8b02-7401dc5a4120 which can be used as unique global reference for CyberScoop APT28 Nov 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-07-16T00:00:00Z
date_published 2018-11-29T00:00:00Z
source MITRE
title Accenture: Russian hackers using Brexit talks to disguise phishing lures

Microsoft Azure Kubernetes Service Service Accounts

Microsoft Azure. (2023, April 28). Access and identity options for Azure Kubernetes Service (AKS). Retrieved July 14, 2023.

Internal MISP references

UUID bf374b41-b2a3-5c07-bf84-9ea0e1a9e6c5 which can be used as unique global reference for Microsoft Azure Kubernetes Service Service Accounts in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-14T00:00:00Z
date_published 2023-04-28T00:00:00Z
source MITRE
title Access and identity options for Azure Kubernetes Service (AKS)

CrowdStrike Access Brokers

CrowdStrike Intelligence Team. (2022, February 23). Access Brokers: Who Are the Targets, and What Are They Worth?. Retrieved March 10, 2023.

Internal MISP references

UUID 0f772693-e09d-5c82-85c2-77f5fee39ef0 which can be used as unique global reference for CrowdStrike Access Brokers in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-10T00:00:00Z
date_published 2022-02-23T00:00:00Z
source MITRE
title Access Brokers: Who Are the Targets, and What Are They Worth?

Microsoft Access Control Lists May 2018

M. Satran, M. Jacobs. (2018, May 30). Access Control Lists. Retrieved February 4, 2020.

Internal MISP references

UUID 2aeda95a-7741-4a74-a5a4-29a9e7a89451 which can be used as unique global reference for Microsoft Access Control Lists May 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-04T00:00:00Z
date_published 2018-05-30T00:00:00Z
source MITRE
title Access Control Lists

Auth0 Access Tokens

Auth0. (n.d.). Access Tokens. Retrieved September 29, 2021.

Internal MISP references

UUID 43e8e178-a0da-44d8-be1b-853307e0d4ae which can be used as unique global reference for Auth0 Access Tokens in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-29T00:00:00Z
source MITRE
title Access Tokens

BSidesSLC 2020 - LNK Elastic

French, D., Filar, B.. (2020, March 21). A Chain Is No Stronger Than Its Weakest LNK. Retrieved November 30, 2020.

Internal MISP references

UUID 4c2ede51-33f6-4d09-9186-43b023b079c0 which can be used as unique global reference for BSidesSLC 2020 - LNK Elastic in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-30T00:00:00Z
date_published 2020-03-21T00:00:00Z
source MITRE
title A Chain Is No Stronger Than Its Weakest LNK

Mythic SpecterOps

Thomas, C. (2020, August 13). A Change of Mythic Proportions. Retrieved March 25, 2022.

Internal MISP references

UUID 98d4453e-2e80-422a-ac8c-47f650f46e3c which can be used as unique global reference for Mythic SpecterOps in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-25T00:00:00Z
date_published 2020-08-13T00:00:00Z
source MITRE
title A Change of Mythic Proportions

FireEye Chinese Espionage October 2019

Nalani Fraser, Kelli Vanderlee. (2019, October 10). Achievement Unlocked - Chinese Cyber Espionage Evolves to Support Higher Level Missions. Retrieved October 17, 2021.

Internal MISP references

UUID d37c069c-7fb8-44e1-8377-da97e8bbcf67 which can be used as unique global reference for FireEye Chinese Espionage October 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-17T00:00:00Z
date_published 2019-10-10T00:00:00Z
source MITRE, Tidal Cyber
title Achievement Unlocked - Chinese Cyber Espionage Evolves to Support Higher Level Missions

Unit42 AcidBox June 2020

Reichel, D. and Idrizovic, E. (2020, June 17). AcidBox: Rare Malware Repurposing Turla Group Exploit Targeted Russian Organizations. Retrieved March 16, 2021.

Internal MISP references

UUID f3f2eca0-fda3-451e-bf13-aacb14668e48 which can be used as unique global reference for Unit42 AcidBox June 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-16T00:00:00Z
date_published 2020-06-17T00:00:00Z
source MITRE
title AcidBox: Rare Malware Repurposing Turla Group Exploit Targeted Russian Organizations

AcidRain JAGS 2022

Juan Andres Guerrero-Saade and Max van Amerongen, SentinelOne. (2022, March 31). AcidRain | A Modem Wiper Rains Down on Europe. Retrieved March 25, 2024.

Internal MISP references

UUID bd4a7b2e-a387-5e1b-9d9e-52464a8e25c9 which can be used as unique global reference for AcidRain JAGS 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-25T00:00:00Z
date_published 2022-03-31T00:00:00Z
source MITRE
title AcidRain

acroread package compromised Arch Linux Mail 8JUL2018

Eli Schwartz. (2018, June 8). acroread package compromised. Retrieved April 23, 2019.

Internal MISP references

UUID 99245022-2130-404d-bf7a-095d84a515cd which can be used as unique global reference for acroread package compromised Arch Linux Mail 8JUL2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-23T00:00:00Z
date_published 2018-06-08T00:00:00Z
source MITRE
title acroread package compromised

Microsoft Actinium February 2022

Microsoft Threat Intelligence Center. (2022, February 4). ACTINIUM targets Ukrainian organizations. Retrieved February 18, 2022.

Internal MISP references

UUID 5ab658db-7f71-4213-8146-e22da54160b3 which can be used as unique global reference for Microsoft Actinium February 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-18T00:00:00Z
date_published 2022-02-04T00:00:00Z
source MITRE
title ACTINIUM targets Ukrainian organizations

Wikipedia Active Directory

Wikipedia. (2018, March 10). Active Directory. Retrieved April 11, 2018.

Internal MISP references

UUID 924e1186-57e5-43db-94ab-29afa3fdaa7b which can be used as unique global reference for Wikipedia Active Directory in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-11T00:00:00Z
date_published 2018-03-10T00:00:00Z
source MITRE
title Active Directory

Microsoft AD Accounts

Microsoft. (2019, August 23). Active Directory Accounts. Retrieved March 13, 2020.

Internal MISP references

UUID df734659-2441-487a-991d-59064c61b771 which can be used as unique global reference for Microsoft AD Accounts in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-13T00:00:00Z
date_published 2019-08-23T00:00:00Z
source MITRE
title Active Directory Accounts

Microsoft AD Admin Tier Model

Microsoft. (2019, February 14). Active Directory administrative tier model. Retrieved February 21, 2020.

Internal MISP references

UUID 3afba81a-3b1d-41ec-938e-24f055698d52 which can be used as unique global reference for Microsoft AD Admin Tier Model in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-21T00:00:00Z
date_published 2019-02-14T00:00:00Z
source MITRE
title Active Directory administrative tier model

Microsoft AD CS Overview

Microsoft. (2016, August 31). Active Directory Certificate Services Overview. Retrieved August 2, 2022.

Internal MISP references

UUID f1b2526a-1bf6-4954-a9b3-a5e008761ceb which can be used as unique global reference for Microsoft AD CS Overview in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-02T00:00:00Z
date_published 2016-08-31T00:00:00Z
source MITRE
title Active Directory Certificate Services Overview

Microsoft Get-ADUser

Microsoft. (n.d.). Active Directory Cmdlets - Get-ADUser. Retrieved November 30, 2017.

Internal MISP references

UUID b68ac85e-a007-4a72-9185-2877e9184fad which can be used as unique global reference for Microsoft Get-ADUser in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-30T00:00:00Z
source MITRE
title Active Directory Cmdlets - Get-ADUser

Active Directory Enumeration with LDIFDE

Microsoft. (2023, June 26). Active Directory Enumeration with LDIFDE. Retrieved July 11, 2023.

Internal MISP references

UUID 51e6623a-4448-4244-8c81-4eab102e5926 which can be used as unique global reference for Active Directory Enumeration with LDIFDE in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-11T00:00:00Z
date_published 2023-06-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Active Directory Enumeration with LDIFDE

Microsoft SID-History Attribute

Microsoft. (n.d.). Active Directory Schema - SID-History attribute. Retrieved November 30, 2017.

Internal MISP references

UUID 32150673-5593-4a2c-9872-aaa96a21aa5c which can be used as unique global reference for Microsoft SID-History Attribute in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-30T00:00:00Z
source MITRE
title Active Directory Schema - SID-History attribute

Volexity Ivanti Zero-Day Exploitation January 2024

Meltzer, M. et al. (2024, January 10). Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN. Retrieved February 27, 2024.

Internal MISP references

UUID 93eda380-ea21-59e0-97e8-5bec1f9a0e71 which can be used as unique global reference for Volexity Ivanti Zero-Day Exploitation January 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-27T00:00:00Z
date_published 2024-01-10T00:00:00Z
source MITRE
title Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN

ActiveMalwareEnergy

Dan Goodin. (2014, June 30). Active malware operation let attackers sabotage US energy industry. Retrieved March 9, 2017.

Internal MISP references

UUID f2ef73c6-5d4c-423e-a3f5-194cba121eb1 which can be used as unique global reference for ActiveMalwareEnergy in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-09T00:00:00Z
date_published 2014-06-30T00:00:00Z
source MITRE
title Active malware operation let attackers sabotage US energy industry

Klein Active Setup 2010

Klein, H. (2010, April 22). Active Setup Explained. Retrieved December 18, 2020.

Internal MISP references

UUID cbdd6290-1dda-48af-a101-fb3db6581276 which can be used as unique global reference for Klein Active Setup 2010 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-18T00:00:00Z
date_published 2010-04-22T00:00:00Z
source MITRE
title Active Setup Explained

Dark Vortex Brute Ratel C4

Dark Vortex. (n.d.). A Customized Command and Control Center for Red Team and Adversary Simulation. Retrieved February 7, 2023.

Internal MISP references

UUID 47992cb5-df11-56c2-b266-6f58d75f8315 which can be used as unique global reference for Dark Vortex Brute Ratel C4 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-07T00:00:00Z
source MITRE
title A Customized Command and Control Center for Red Team and Adversary Simulation

ad_blocker_with_miner

Kuzmenko, A.. (2021, March 10). Ad blocker with miner included. Retrieved October 28, 2021.

Internal MISP references

UUID 8e30f71e-80b8-4662-bc95-bf3cf7cfcf40 which can be used as unique global reference for ad_blocker_with_miner in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-28T00:00:00Z
date_published 2021-03-10T00:00:00Z
source MITRE
title Ad blocker with miner included

Microsoft Support O365 Add Another Admin, October 2019

Microsoft. (n.d.). Add Another Admin. Retrieved October 18, 2019.

Internal MISP references

UUID c31cfc48-289e-42aa-8046-b41261fdeb96 which can be used as unique global reference for Microsoft Support O365 Add Another Admin, October 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-18T00:00:00Z
source MITRE
title Add Another Admin

Amazon AWS IMDS V2

MacCarthaigh, C. (2019, November 19). Add defense in depth against open firewalls, reverse proxies, and SSRF vulnerabilities with enhancements to the EC2 Instance Metadata Service. Retrieved October 14, 2020.

Internal MISP references

UUID f252eb18-86e9-4ed0-b9da-2c81f12a6e13 which can be used as unique global reference for Amazon AWS IMDS V2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-14T00:00:00Z
date_published 2019-11-19T00:00:00Z
source MITRE
title Add defense in depth against open firewalls, reverse proxies, and SSRF vulnerabilities with enhancements to the EC2 Instance Metadata Service

Adding Login Items

Apple. (2016, September 13). Adding Login Items. Retrieved July 11, 2017.

Internal MISP references

UUID 5ab3e243-37a6-46f1-b28f-6846ecdef0ae which can be used as unique global reference for Adding Login Items in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-11T00:00:00Z
date_published 2016-09-13T00:00:00Z
source MITRE
title Adding Login Items

MRWLabs Office Persistence Add-ins

Knowles, W. (2017, April 21). Add-In Opportunities for Office Persistence. Retrieved July 3, 2017.

Internal MISP references

UUID a5b6ab63-0e6f-4789-a017-ceab1719ed85 which can be used as unique global reference for MRWLabs Office Persistence Add-ins in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-03T00:00:00Z
date_published 2017-04-21T00:00:00Z
source MITRE
title Add-In Opportunities for Office Persistence

AddinUtil.exe - LOLBAS Project

LOLBAS. (2023, October 5). AddinUtil.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 91af546d-0a56-4c17-b292-6257943a8aba which can be used as unique global reference for AddinUtil.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2023-10-05T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title AddinUtil.exe

Microsoft - Add-MailboxPermission

Microsoft. (n.d.). Add-Mailbox Permission. Retrieved September 13, 2019.

Internal MISP references

UUID b8d40efb-c78d-47dd-9d83-e5a31af73691 which can be used as unique global reference for Microsoft - Add-MailboxPermission in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-13T00:00:00Z
source MITRE
title Add-Mailbox Permission

AddMonitor

Microsoft. (n.d.). AddMonitor function. Retrieved November 12, 2014.

Internal MISP references

UUID 8c1a719e-6ca1-4b41-966d-ddb87c849fe0 which can be used as unique global reference for AddMonitor in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-12T00:00:00Z
source MITRE
title AddMonitor function

Microsoft Azure AD Users

Microsoft. (2019, November 11). Add or delete users using Azure Active Directory. Retrieved January 30, 2020.

Internal MISP references

UUID b69468a2-693e-4bd0-8dc1-ccfd7d5630c0 which can be used as unique global reference for Microsoft Azure AD Users in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-01-30T00:00:00Z
date_published 2019-11-11T00:00:00Z
source MITRE
title Add or delete users using Azure Active Directory

Microsoft Office Add-ins

Microsoft. (n.d.). Add or remove add-ins. Retrieved July 3, 2017.

Internal MISP references

UUID 99b20e30-76a8-4108-84ae-daf92058b44b which can be used as unique global reference for Microsoft Office Add-ins in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-03T00:00:00Z
source MITRE
title Add or remove add-ins

Microsoft AddPrintProcessor May 2018

Microsoft. (2018, May 31). AddPrintProcessor function. Retrieved October 5, 2020.

Internal MISP references

UUID 12c7160b-c93c-44cd-b108-68d4823aec8c which can be used as unique global reference for Microsoft AddPrintProcessor May 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-05T00:00:00Z
date_published 2018-05-31T00:00:00Z
source MITRE
title AddPrintProcessor function

RFC1918

IETF Network Working Group. (1996, February). Address Allocation for Private Internets. Retrieved October 20, 2020.

Internal MISP references

UUID f2cdf62e-cb9b-4a48-99a2-d46e7d9e7a9e which can be used as unique global reference for RFC1918 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
date_published 1996-02-01T00:00:00Z
source MITRE
title Address Allocation for Private Internets

Microsoft Exchange Address Lists

Microsoft. (2020, February 7). Address lists in Exchange Server. Retrieved March 26, 2020.

Internal MISP references

UUID 138ec24a-4361-4ce0-b78e-508c11db397c which can be used as unique global reference for Microsoft Exchange Address Lists in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-26T00:00:00Z
date_published 2020-02-07T00:00:00Z
source MITRE
title Address lists in Exchange Server

Microsoft AD DS Getting Started

Foulds, I. et al. (2018, August 7). AD DS Getting Started. Retrieved September 23, 2021.

Internal MISP references

UUID 82d01c77-571b-4f33-a286-878f325462ae which can be used as unique global reference for Microsoft AD DS Getting Started in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-23T00:00:00Z
date_published 2018-08-07T00:00:00Z
source MITRE
title AD DS Getting Started

Akamai DGA Mitigation

Liu, H. and Yuzifovich, Y. (2018, January 9). A Death Match of Domain Generation Algorithms. Retrieved February 18, 2019.

Internal MISP references

UUID 5b14cdf6-261a-4d7e-acb4-74e7fafa9467 which can be used as unique global reference for Akamai DGA Mitigation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-18T00:00:00Z
date_published 2018-01-09T00:00:00Z
source MITRE
title A Death Match of Domain Generation Algorithms

Keychain Decryption Passware

Yana Gourenko. (n.d.). A Deep Dive into Apple Keychain Decryption. Retrieved April 13, 2022.

Internal MISP references

UUID 6a426ab4-5b0b-46d4-9dfe-e2587f69e111 which can be used as unique global reference for Keychain Decryption Passware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-13T00:00:00Z
source MITRE
title A Deep Dive into Apple Keychain Decryption

Trend Micro Deep Dive Into Defacement

Marco Balduzzi, Ryan Flores, Lion Gu, Federico Maggi, Vincenzo Ciancaglini, Roel Reyes, Akira Urano. (n.d.). A Deep Dive into Defacement: How Geopolitical Events Trigger Web Attacks. Retrieved April 19, 2019.

Internal MISP references

UUID 4886418b-3a2e-4f12-b91e-3bb2a8134112 which can be used as unique global reference for Trend Micro Deep Dive Into Defacement in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-19T00:00:00Z
source MITRE
title A Deep Dive into Defacement: How Geopolitical Events Trigger Web Attacks

Talos Lokibot Jan 2021

Muhammad, I., Unterbrink, H.. (2021, January 6). A Deep Dive into Lokibot Infection Chain. Retrieved August 31, 2021.

Internal MISP references

UUID 3baba4e6-0cf5-45eb-8abb-6c389743af89 which can be used as unique global reference for Talos Lokibot Jan 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-31T00:00:00Z
date_published 2021-01-06T00:00:00Z
source MITRE
title A Deep Dive into Lokibot Infection Chain

Malwarebytes Saint Bot April 2021

Hasherezade. (2021, April 6). A deep dive into Saint Bot, a new downloader. Retrieved June 9, 2022.

Internal MISP references

UUID 3a1faa47-7bd3-453f-9b7a-bb17efb8bb3c which can be used as unique global reference for Malwarebytes Saint Bot April 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-09T00:00:00Z
date_published 2021-04-06T00:00:00Z
source MITRE
title A deep dive into Saint Bot, a new downloader

SecurityScorecard CredoMap September 2022

Vlad Pasca. (2022, September 27). A Deep Dive Into the APT28’s stealer called CredoMap. Retrieved December 5, 2023.

Internal MISP references

UUID 3e683efc-4712-4397-8d55-4354ff7ad9f0 which can be used as unique global reference for SecurityScorecard CredoMap September 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-05T00:00:00Z
date_published 2022-09-27T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title A Deep Dive Into the APT28’s stealer called CredoMap

Krebs DNS Hijack 2019

Brian Krebs. (2019, February 18). A Deep Dive on the Recent Widespread DNS Hijacking Attacks. Retrieved February 14, 2022.

Internal MISP references

UUID 9bdc618d-ff55-4ac8-8967-6039c6c24cb1 which can be used as unique global reference for Krebs DNS Hijack 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-14T00:00:00Z
date_published 2019-02-18T00:00:00Z
source MITRE
title A Deep Dive on the Recent Widespread DNS Hijacking Attacks

Reaqta MuddyWater November 2017

Reaqta. (2017, November 22). A dive into MuddyWater APT targeting Middle-East. Retrieved May 18, 2020.

Internal MISP references

UUID ecd28ccf-edb6-478d-a8f1-da630df42127 which can be used as unique global reference for Reaqta MuddyWater November 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-18T00:00:00Z
date_published 2017-11-22T00:00:00Z
source MITRE
title A dive into MuddyWater APT targeting Middle-East

ESET Turla PowerShell May 2019

Faou, M. and Dumont R.. (2019, May 29). A dive into Turla PowerShell usage. Retrieved June 14, 2019.

Internal MISP references

UUID 68c0f34b-691a-4847-8d49-f18b7f4e5188 which can be used as unique global reference for ESET Turla PowerShell May 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-14T00:00:00Z
date_published 2019-05-29T00:00:00Z
source MITRE
title A dive into Turla PowerShell usage

Kubernetes Admission Controllers

Kubernetes. (n.d.). Admission Controllers Reference. Retrieved March 8, 2023.

Internal MISP references

UUID ea035e41-159b-5f12-96fc-0638eace9fd2 which can be used as unique global reference for Kubernetes Admission Controllers in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-08T00:00:00Z
source MITRE
title Admission Controllers Reference

Krebs Adobe

Brian Krebs. (2013, October 3). Adobe To Announce Source Code, Customer Data Breach. Retrieved May 17, 2021.

Internal MISP references

UUID bc2b0b89-e00d-4beb-bf27-fe81d8c826a4 which can be used as unique global reference for Krebs Adobe in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-05-17T00:00:00Z
date_published 2013-10-03T00:00:00Z
source MITRE
title Adobe To Announce Source Code, Customer Data Breach

Github AD-Pentest-Script

Twi1ight. (2015, July 11). AD-Pentest-Script - wmiexec.vbs. Retrieved June 29, 2017.

Internal MISP references

UUID 45a5f6c2-b52e-4518-a10e-19797e6fdcc3 which can be used as unique global reference for Github AD-Pentest-Script in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-06-29T00:00:00Z
date_published 2015-07-11T00:00:00Z
source MITRE
title AD-Pentest-Script - wmiexec.vbs

adplus.exe - LOLBAS Project

LOLBAS. (2021, September 1). adplus.exe. Retrieved December 4, 2023.

Internal MISP references

UUID d407ca0a-7ace-4dc5-947d-69a1e5a1d459 which can be used as unique global reference for adplus.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-09-01T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title adplus.exe

Microsoft ADV170021 Dec 2017

Microsoft. (2017, December 12). ADV170021 - Microsoft Office Defense in Depth Update. Retrieved February 3, 2018.

Internal MISP references

UUID ce960e76-848f-440d-9843-54773f7b11cf which can be used as unique global reference for Microsoft ADV170021 Dec 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-03T00:00:00Z
date_published 2017-12-12T00:00:00Z
source MITRE
title ADV170021 - Microsoft Office Defense in Depth Update

CISA AA20-352A 2021

CISA. (2021, April 15). Advanced Persistent Threat Compromise of Government Agencies, Critical Infrastructure, and Private Sector Organizations. Retrieved August 30, 2024.

Internal MISP references

UUID 1e68b9ef-0aee-5d69-be72-3bc4d5cfa6b9 which can be used as unique global reference for CISA AA20-352A 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-30T00:00:00Z
date_published 2021-04-15T00:00:00Z
source MITRE
title Advanced Persistent Threat Compromise of Government Agencies, Critical Infrastructure, and Private Sector Organizations

FireEye APT Groups

FireEye. (n.d.). Advanced Persistent Threat Groups. Retrieved August 3, 2018.

Internal MISP references

UUID 5b6b909d-870a-4d14-85ec-6aa14e598740 which can be used as unique global reference for FireEye APT Groups in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-03T00:00:00Z
source MITRE, Tidal Cyber
title Advanced Persistent Threat Groups

Mandiant Advanced Persistent Threats

Mandiant. (n.d.). Advanced Persistent Threats (APTs). Retrieved February 14, 2024.

Internal MISP references

UUID 2d16615b-09fc-5925-8f59-6d20f334d236 which can be used as unique global reference for Mandiant Advanced Persistent Threats in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-14T00:00:00Z
source MITRE
title Advanced Persistent Threats (APTs)

Mandiant APT Groups List

Mandiant. (n.d.). Advanced Persistent Threats (APTs). Retrieved September 14, 2023.

Internal MISP references

UUID c984fcfc-1bfd-4b1e-9034-a6ff3e6ebf97 which can be used as unique global reference for Mandiant APT Groups List in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Advanced Persistent Threats (APTs)

Advanced_sec_audit_policy_settings

Simpson, D. et al. (2017, April 19). Advanced security audit policy settings. Retrieved September 14, 2021.

Internal MISP references

UUID 9aef57b1-1a2e-4833-815e-887616cc0570 which can be used as unique global reference for Advanced_sec_audit_policy_settings in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-14T00:00:00Z
date_published 2017-04-19T00:00:00Z
source MITRE
title Advanced security audit policy settings

Adversaries Hijack DLLs

CrowdStrike, Falcon OverWatch Team. (2022, December 30). Retrieved October 19, 2023.

Internal MISP references

UUID 01836e53-4316-51a7-852c-01e585212276 which can be used as unique global reference for Adversaries Hijack DLLs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-19T00:00:00Z
source MITRE
title Adversaries Hijack DLLs

CrowdStrike Richochet Chollima September 2021

CrowdStrike. (2021, September 30). Adversary Profile - Ricochet Chollima. Retrieved September 30, 2021.

Internal MISP references

UUID 69a23467-c55c-43a3-951d-c208e6ead6f7 which can be used as unique global reference for CrowdStrike Richochet Chollima September 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-30T00:00:00Z
date_published 2021-09-30T00:00:00Z
source MITRE
title Adversary Profile - Ricochet Chollima

Elastic - Hunting for Persistence Part 1

French, D., Murphy, B. (2020, March 24). Adversary tradecraft 101: Hunting for persistence using Elastic Security (Part 1). Retrieved December 21, 2020.

Internal MISP references

UUID bd9406d3-c3e3-4737-97a1-a4bc997c88cd which can be used as unique global reference for Elastic - Hunting for Persistence Part 1 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-21T00:00:00Z
date_published 2020-03-24T00:00:00Z
source MITRE
title Adversary tradecraft 101: Hunting for persistence using Elastic Security (Part 1)

NCSC APT29 July 2020

National Cyber Security Centre. (2020, July 16). Advisory: APT29 targets COVID-19 vaccine development. Retrieved September 29, 2020.

Internal MISP references

UUID 28da86a6-4ca1-4bb4-a401-d4aa469c0034 which can be used as unique global reference for NCSC APT29 July 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-29T00:00:00Z
date_published 2020-07-16T00:00:00Z
source MITRE
title Advisory: APT29 targets COVID-19 vaccine development

Advpack.dll - LOLBAS Project

LOLBAS. (2018, May 25). Advpack.dll. Retrieved December 4, 2023.

Internal MISP references

UUID 837ccb3c-316d-4d96-8a33-b5df40870aba which can be used as unique global reference for Advpack.dll - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Advpack.dll

Kaspersky Adwind Feb 2016

Kamluk, V. & Gostev, A. (2016, February). Adwind - A Cross-Platform RAT. Retrieved April 23, 2019.

Internal MISP references

UUID 69fd8de4-81bc-4165-b77d-c5fc72cfa699 which can be used as unique global reference for Kaspersky Adwind Feb 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-23T00:00:00Z
date_published 2016-02-01T00:00:00Z
source MITRE
title Adwind - A Cross-Platform RAT

Bitdefender Trickbot VNC module Whitepaper 2021

Radu Tudorica. (2021, July 12). A Fresh Look at Trickbot’s Ever-Improving VNC Module. Retrieved September 28, 2021.

Internal MISP references

UUID ee2709d7-2b33-48ac-8e90-a2770d469d80 which can be used as unique global reference for Bitdefender Trickbot VNC module Whitepaper 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-28T00:00:00Z
date_published 2021-07-12T00:00:00Z
source MITRE
title A Fresh Look at Trickbot’s Ever-Improving VNC Module

Mac Backdoors are back

Dan Goodin. (2016, July 6). After hiatus, in-the-wild Mac backdoors are suddenly back. Retrieved July 8, 2017.

Internal MISP references

UUID c37f00dc-ee53-4be1-9046-0a28bdc5649a which can be used as unique global reference for Mac Backdoors are back in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-08T00:00:00Z
date_published 2016-07-06T00:00:00Z
source MITRE
title After hiatus, in-the-wild Mac backdoors are suddenly back

SentinelOne January 30 2023

SentinelOne. (2023, January 30). Agenda (Qilin). Retrieved June 7, 2024.

Internal MISP references

UUID 290e84bc-7dae-46ec-81de-78c94b98e45b which can be used as unique global reference for SentinelOne January 30 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-07T00:00:00Z
date_published 2023-01-30T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Agenda (Qilin)

Trend Micro March 26 2024

Arianne Dela Cruz; Raymart Yambot; Raighen Sanchez; Darrel Tristan Virtusio Read time. (2024, March 26). Agenda Ransomware Propagates to vCenters and ESXi via Custom PowerShell Script. Retrieved April 5, 2024.

Internal MISP references

UUID d5634b8e-420a-4721-a3d2-19d9f36697f4 which can be used as unique global reference for Trend Micro March 26 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-05T00:00:00Z
date_published 2024-03-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Agenda Ransomware Propagates to vCenters and ESXi via Custom PowerShell Script

Kaspersky MSSQL Aug 2019

Plakhov, A., Sitchikhin, D. (2019, August 22). Agent 1433: remote attack on Microsoft SQL Server. Retrieved September 4, 2019.

Internal MISP references

UUID 569a6be3-7a10-4aa4-be26-a62ed562a4ce which can be used as unique global reference for Kaspersky MSSQL Aug 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-04T00:00:00Z
date_published 2019-08-22T00:00:00Z
source MITRE
title Agent 1433: remote attack on Microsoft SQL Server

Securelist Agent.btz

Gostev, A.. (2014, March 12). Agent.btz: a Source of Inspiration?. Retrieved April 8, 2016.

Internal MISP references

UUID 3b876c56-1d18-49e3-9a96-5cee4af7ab72 which can be used as unique global reference for Securelist Agent.btz in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-08T00:00:00Z
date_published 2014-03-12T00:00:00Z
source MITRE
title Agent.btz: a Source of Inspiration?

ThreatExpert Agent.btz

Shevchenko, S.. (2008, November 30). Agent.btz - A Threat That Hit Pentagon. Retrieved April 8, 2016.

Internal MISP references

UUID b710c404-b02e-444c-9388-9a5e751971d2 which can be used as unique global reference for ThreatExpert Agent.btz in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-08T00:00:00Z
date_published 2008-11-30T00:00:00Z
source MITRE
title Agent.btz - A Threat That Hit Pentagon

AgentExecutor.exe - LOLBAS Project

LOLBAS. (2020, July 23). AgentExecutor.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 633d7f25-df9d-4619-9aa9-92d1d9d225d7 which can be used as unique global reference for AgentExecutor.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2020-07-23T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title AgentExecutor.exe

SentinelLabs Agent Tesla Aug 2020

Walter, J. (2020, August 10). Agent Tesla | Old RAT Uses New Tricks to Stay on Top. Retrieved December 11, 2020.

Internal MISP references

UUID 5f712e3f-5a9d-4af3-b846-a61dc1d59b3a which can be used as unique global reference for SentinelLabs Agent Tesla Aug 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-11T00:00:00Z
date_published 2020-08-10T00:00:00Z
source MITRE
title Agent Tesla

LogPoint Agent Tesla March 23 2023

Anish Bogati. (2023, March 23). AgentTesla's Capabilities: A Review and Detection Strategies. Retrieved May 7, 2023.

Internal MISP references

UUID 28bfb97b-4b58-408a-bef9-9081f6ddedb8 which can be used as unique global reference for LogPoint Agent Tesla March 23 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2023-03-23T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title AgentTesla's Capabilities: A Review and Detection Strategies

Sekoia.io Blog September 9 2024

Sekoia TDR; Felix Aimé; Pierre-Antoine D; Charles M. (2024, September 9). A glimpse into the Quad7 operators' next moves and associated botnets. Retrieved September 11, 2024.

Internal MISP references

UUID eb4a1888-3b04-449b-9738-d96ae26adfee which can be used as unique global reference for Sekoia.io Blog September 9 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-11T00:00:00Z
date_published 2024-09-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title A glimpse into the Quad7 operators' next moves and associated botnets

ATT Sidewinder January 2021

Hegel, T. (2021, January 13). A Global Perspective of the SideWinder APT. Retrieved January 27, 2021.

Internal MISP references

UUID d6644f88-d727-4f62-897a-bfa18f86380d which can be used as unique global reference for ATT Sidewinder January 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-27T00:00:00Z
date_published 2021-01-13T00:00:00Z
source MITRE, Tidal Cyber
title A Global Perspective of the SideWinder APT

Unit42 Agrius 2023

Or Chechik, Tom Fakterman, Daniel Frank & Assaf Dahan. (2023, November 6). Agonizing Serpens (Aka Agrius) Targeting the Israeli Higher Education and Tech Sectors. Retrieved May 22, 2024.

Internal MISP references

UUID 70fb43bd-f8e1-56a5-a0e9-884e85f16b10 which can be used as unique global reference for Unit42 Agrius 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-22T00:00:00Z
date_published 2023-11-06T00:00:00Z
source MITRE
title Agonizing Serpens (Aka Agrius) Targeting the Israeli Higher Education and Tech Sectors

CheckPoint Agrius 2023

Marc Salinas Fernandez & Jiri Vinopal. (2023, May 23). AGRIUS DEPLOYS MONEYBIRD IN TARGETED ATTACKS AGAINST ISRAELI ORGANIZATIONS. Retrieved May 21, 2024.

Internal MISP references

UUID b3034b5d-1fe5-5677-a2e8-9329141875d4 which can be used as unique global reference for CheckPoint Agrius 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-21T00:00:00Z
date_published 2023-05-23T00:00:00Z
source MITRE
title AGRIUS DEPLOYS MONEYBIRD IN TARGETED ATTACKS AGAINST ISRAELI ORGANIZATIONS

Harmj0y Domain Trusts

Schroeder, W. (2017, October 30). A Guide to Attacking Domain Trusts. Retrieved February 14, 2019.

Internal MISP references

UUID 23a9ef6c-9f71-47bb-929f-9a92f24553eb which can be used as unique global reference for Harmj0y Domain Trusts in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-14T00:00:00Z
date_published 2017-10-30T00:00:00Z
source MITRE
title A Guide to Attacking Domain Trusts

airwalk backdoor unix systems

airwalk. (2023, January 1). A guide to backdooring Unix systems. Retrieved May 31, 2023.

Internal MISP references

UUID 3f3bca4a-68fa-5d4a-b86f-36f82345ff36 which can be used as unique global reference for airwalk backdoor unix systems in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-31T00:00:00Z
date_published 2023-01-01T00:00:00Z
source MITRE
title A guide to backdooring Unix systems

Wired Lockergoga 2019

Greenberg, A. (2019, March 25). A Guide to LockerGoga, the Ransomware Crippling Industrial Firms. Retrieved July 17, 2019.

Internal MISP references

UUID de12f263-f76d-4b63-beb8-b210f7a8310d which can be used as unique global reference for Wired Lockergoga 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-07-17T00:00:00Z
date_published 2019-03-25T00:00:00Z
source MITRE
title A Guide to LockerGoga, the Ransomware Crippling Industrial Firms

ZDNET Selling Data

Cimpanu, C. (2020, May 9). A hacker group is selling more than 73 million user records on the dark web. Retrieved October 20, 2020.

Internal MISP references

UUID 61d00ae2-5494-4c6c-8860-6826e701ade8 which can be used as unique global reference for ZDNET Selling Data in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
date_published 2020-05-09T00:00:00Z
source MITRE
title A hacker group is selling more than 73 million user records on the dark web

ESET Zebrocy May 2019

ESET Research. (2019, May 22). A journey to Zebrocy land. Retrieved June 20, 2019.

Internal MISP references

UUID f8b837fb-e46c-4153-8e86-dc4b909b393a which can be used as unique global reference for ESET Zebrocy May 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-20T00:00:00Z
date_published 2019-05-22T00:00:00Z
source MITRE
title A journey to Zebrocy land

Kersten Akira 2023

Max Kersten & Alexandre Mundo. (2023, November 29). Akira Ransomware. Retrieved April 4, 2024.

Internal MISP references

UUID df191993-a2cb-5d26-960c-11d1c6d3d73b which can be used as unique global reference for Kersten Akira 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-04T00:00:00Z
date_published 2023-11-29T00:00:00Z
source MITRE
title Akira Ransomware

Akira Ransomware Analysis August 2023

SEQBOSS. (2023, August 10). AKIRA RANSOMWARE ANALYSIS. Retrieved April 3, 2024.

Internal MISP references

UUID b34d6a98-158e-4fe7-8fcd-79554c07631a which can be used as unique global reference for Akira Ransomware Analysis August 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-03T00:00:00Z
date_published 2023-08-10T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title AKIRA RANSOMWARE ANALYSIS

Sophos Akira May 9 2023

Paul Jaramillo. (2023, May 9). Akira Ransomware is “bringin’ 1988 back”. Retrieved February 27, 2024.

Internal MISP references

UUID 1343b052-b158-4dad-9ed4-9dbb7bb778dd which can be used as unique global reference for Sophos Akira May 9 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-27T00:00:00Z
date_published 2023-05-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Akira Ransomware is “bringin’ 1988 back”

BlackBerry Akira July 11 2024

BlackBerry Research and Intelligence Team. (2024, July 11). Akira Ransomware Targets the LATAM Airline Industry. Retrieved September 16, 2024.

Internal MISP references

UUID 59a1bd0f-a907-4918-90e1-d163bf84f927 which can be used as unique global reference for BlackBerry Akira July 11 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-16T00:00:00Z
date_published 2024-07-11T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Akira Ransomware Targets the LATAM Airline Industry

Microsoft AKS Azure AD 2023

Microsoft. (2023, February 27). AKS-managed Azure Active Directory integration. Retrieved March 8, 2023.

Internal MISP references

UUID 809db259-3557-5597-9d1a-7c00cc10b89c which can be used as unique global reference for Microsoft AKS Azure AD 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-08T00:00:00Z
date_published 2023-02-27T00:00:00Z
source MITRE
title AKS-managed Azure Active Directory integration

Okta DPoP 2023

Venkat Viswanathan. (2023, June 13). A leap forward in token security: Okta adds support for DPoP. Retrieved January 2, 2024.

Internal MISP references

UUID d792ede9-6ff6-5fae-a045-fd8b57abd3d3 which can be used as unique global reference for Okta DPoP 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-02T00:00:00Z
date_published 2023-06-13T00:00:00Z
source MITRE
title A leap forward in token security: Okta adds support for DPoP

US-CERT SamSam 2018

US-CERT. (2018, December 3). Alert (AA18-337A): SamSam Ransomware. Retrieved March 15, 2019.

Internal MISP references

UUID b9d14fea-2330-4eed-892c-b4e05a35d273 which can be used as unique global reference for US-CERT SamSam 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-15T00:00:00Z
date_published 2018-12-03T00:00:00Z
source MITRE
title Alert (AA18-337A): SamSam Ransomware

CISA MSS Sep 2020

CISA. (2020, September 14). Alert (AA20-258A): Chinese Ministry of State Security-Affiliated Cyber Threat Actor Activity. Retrieved October 1, 2020.

Internal MISP references

UUID ffe613e3-b528-42bf-81d5-4d8de38b3457 which can be used as unique global reference for CISA MSS Sep 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-01T00:00:00Z
date_published 2020-09-14T00:00:00Z
source MITRE
title Alert (AA20-258A): Chinese Ministry of State Security-Affiliated Cyber Threat Actor Activity

CISA Lokibot September 2020

DHS/CISA. (2020, September 22). Alert (AA20-266A) LokiBot Malware . Retrieved September 15, 2021.

Internal MISP references

UUID df979f7b-6de8-4029-ae47-700f29157db0 which can be used as unique global reference for CISA Lokibot September 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-15T00:00:00Z
date_published 2020-09-22T00:00:00Z
source MITRE
title Alert (AA20-266A) LokiBot Malware

CISA_AA21_200B

CISA. (2021, August 20). Alert (AA21-200B) Chinese State-Sponsored Cyber Operations: Observed TTPs. Retrieved June 21, 2022.

Internal MISP references

UUID 633c6045-8990-58ae-85f0-00139aa9a091 which can be used as unique global reference for CISA_AA21_200B in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-21T00:00:00Z
date_published 2021-08-20T00:00:00Z
source MITRE
title Alert (AA21-200B) Chinese State-Sponsored Cyber Operations: Observed TTPs

cisa_malware_orgs_ukraine

CISA. (2022, April 28). Alert (AA22-057A) Update: Destructive Malware Targeting Organizations in Ukraine. Retrieved July 29, 2022.

Internal MISP references

UUID ebe89b36-f87f-4e09-8030-a1328c0b8683 which can be used as unique global reference for cisa_malware_orgs_ukraine in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-29T00:00:00Z
date_published 2022-04-28T00:00:00Z
source MITRE
title Alert (AA22-057A) Update: Destructive Malware Targeting Organizations in Ukraine

US-CERT Ransomware 2016

US-CERT. (2016, March 31). Alert (TA16-091A): Ransomware and Recent Variants. Retrieved March 15, 2019.

Internal MISP references

UUID 866484fa-836d-4c5b-bbad-3594ef60599c which can be used as unique global reference for US-CERT Ransomware 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-15T00:00:00Z
date_published 2016-03-31T00:00:00Z
source MITRE
title Alert (TA16-091A): Ransomware and Recent Variants

US-CERT WannaCry 2017

US-CERT. (2017, May 12). Alert (TA17-132A): Indicators Associated With WannaCry Ransomware. Retrieved March 25, 2019.

Internal MISP references

UUID 349b8e9d-7172-4d01-b150-f0371d038b7e which can be used as unique global reference for US-CERT WannaCry 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-25T00:00:00Z
date_published 2017-05-12T00:00:00Z
source MITRE
title Alert (TA17-132A): Indicators Associated With WannaCry Ransomware

US-CERT HIDDEN COBRA June 2017

US-CERT. (2017, June 13). Alert (TA17-164A) HIDDEN COBRA – North Korea’s DDoS Botnet Infrastructure. Retrieved July 13, 2017.

Internal MISP references

UUID 8e57cea3-ee37-4507-bb56-7445050ec8ca which can be used as unique global reference for US-CERT HIDDEN COBRA June 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-13T00:00:00Z
date_published 2017-06-13T00:00:00Z
source MITRE
title Alert (TA17-164A) HIDDEN COBRA – North Korea’s DDoS Botnet Infrastructure

US-CERT NotPetya 2017

US-CERT. (2017, July 1). Alert (TA17-181A): Petya Ransomware. Retrieved March 15, 2019.

Internal MISP references

UUID 6a009850-834b-4178-9028-2745921b6743 which can be used as unique global reference for US-CERT NotPetya 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-15T00:00:00Z
date_published 2017-07-01T00:00:00Z
source MITRE
title Alert (TA17-181A): Petya Ransomware

US-CERT APT Energy Oct 2017

US-CERT. (2017, October 20). Alert (TA17-293A): Advanced Persistent Threat Activity Targeting Energy and Other Critical Infrastructure Sectors. Retrieved November 2, 2017.

Internal MISP references

UUID e34ddf0a-a112-4557-ac09-1ff540241a89 which can be used as unique global reference for US-CERT APT Energy Oct 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-02T00:00:00Z
date_published 2017-10-20T00:00:00Z
source MITRE
title Alert (TA17-293A): Advanced Persistent Threat Activity Targeting Energy and Other Critical Infrastructure Sectors

US-CERT FALLCHILL Nov 2017

US-CERT. (2017, November 22). Alert (TA17-318A): HIDDEN COBRA – North Korean Remote Administration Tool: FALLCHILL. Retrieved December 7, 2017.

Internal MISP references

UUID 045e03f9-af83-4442-b69e-b80f68e570ac which can be used as unique global reference for US-CERT FALLCHILL Nov 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-07T00:00:00Z
date_published 2017-11-22T00:00:00Z
source MITRE
title Alert (TA17-318A): HIDDEN COBRA – North Korean Remote Administration Tool: FALLCHILL

US-CERT Volgmer Nov 2017

US-CERT. (2017, November 22). Alert (TA17-318B): HIDDEN COBRA – North Korean Trojan: Volgmer. Retrieved December 7, 2017.

Internal MISP references

UUID c48c7ac0-8d55-4b62-9606-a9ce420459b6 which can be used as unique global reference for US-CERT Volgmer Nov 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-07T00:00:00Z
date_published 2017-11-22T00:00:00Z
source MITRE
title Alert (TA17-318B): HIDDEN COBRA – North Korean Trojan: Volgmer

US-CERT TA18-074A

US-CERT. (2018, March 16). Alert (TA18-074A): Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors. Retrieved June 6, 2018.

Internal MISP references

UUID 94e87a92-bf80-43e2-a3ab-cd7d4895f2fc which can be used as unique global reference for US-CERT TA18-074A in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-06-06T00:00:00Z
date_published 2018-03-16T00:00:00Z
source MITRE
title Alert (TA18-074A): Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors

US-CERT-TA18-106A

US-CERT. (2018, April 20). Alert (TA18-106A) Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. Retrieved October 19, 2020.

Internal MISP references

UUID 1fe55557-94af-4697-a675-884701f70f2a which can be used as unique global reference for US-CERT-TA18-106A in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
date_published 2018-04-20T00:00:00Z
source MITRE
title Alert (TA18-106A) Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices

US-CERT Emotet Jul 2018

US-CERT. (2018, July 20). Alert (TA18-201A) Emotet Malware. Retrieved March 25, 2019.

Internal MISP references

UUID 0043043a-4741-41c2-a6f2-f88d5caa8b7a which can be used as unique global reference for US-CERT Emotet Jul 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-25T00:00:00Z
date_published 2018-07-20T00:00:00Z
source MITRE
title Alert (TA18-201A) Emotet Malware

Sysdig LLMJacking 2024

LLMjacking: Stolen Cloud Credentials Used in New AI Attack. (2024, May 6). Alessandro Brucato. Retrieved September 25, 2024.

Internal MISP references

UUID 20d3128e-0900-5373-97f0-fcf26fc86271 which can be used as unique global reference for Sysdig LLMJacking 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-25T00:00:00Z
date_published 2024-05-06T00:00:00Z
source MITRE
title Alessandro Brucato

Alexa-dns

Scanning Alexa's Top 1M for AXFR. (2015, March 29). Retrieved June 5, 2024.

Internal MISP references

UUID 154a5d86-4478-5cf5-ac39-19ac7581a440 which can be used as unique global reference for Alexa-dns in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-05T00:00:00Z
source MITRE
title Alexa-dns

AlKhaser Debug

Noteworthy. (2019, January 6). Al-Khaser. Retrieved April 1, 2022.

Internal MISP references

UUID d9773aaf-e3ec-4ce3-b5c8-1ca3c4751622 which can be used as unique global reference for AlKhaser Debug in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-01T00:00:00Z
date_published 2019-01-06T00:00:00Z
source MITRE
title Al-Khaser

Microsoft RDP Logons

Microsoft. (2017, April 9). Allow log on through Remote Desktop Services. Retrieved August 5, 2024.

Internal MISP references

UUID 2b460644-dc33-5cf4-a80a-8509d9f7e152 which can be used as unique global reference for Microsoft RDP Logons in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-05T00:00:00Z
date_published 2017-04-09T00:00:00Z
source MITRE
title Allow log on through Remote Desktop Services

NetSPI ClickOnce

Ryan Gandrud. (2015, March 23). All You Need Is One – A ClickOnce Love Story. Retrieved September 9, 2024.

Internal MISP references

UUID be17ae41-52d0-51bd-b48f-5c1d3c5c8dc1 which can be used as unique global reference for NetSPI ClickOnce in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-09T00:00:00Z
date_published 2015-03-23T00:00:00Z
source MITRE
title All You Need Is One – A ClickOnce Love Story

Fysbis Palo Alto Analysis

Bryan Lee and Rob Downs. (2016, February 12). A Look Into Fysbis: Sofacy’s Linux Backdoor. Retrieved September 10, 2017.

Internal MISP references

UUID 3e527ad6-6b56-473d-8178-e1c3c14f2311 which can be used as unique global reference for Fysbis Palo Alto Analysis in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-09-10T00:00:00Z
date_published 2016-02-12T00:00:00Z
source MITRE
title A Look Into Fysbis: Sofacy’s Linux Backdoor

Medium KONNI Jan 2020

Karmi, D. (2020, January 4). A Look Into Konni 2019 Campaign. Retrieved April 28, 2020.

Internal MISP references

UUID e117a6ac-eaa2-4494-b4ae-2d9ae52c3251 which can be used as unique global reference for Medium KONNI Jan 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-04-28T00:00:00Z
date_published 2020-01-04T00:00:00Z
source MITRE
title A Look Into Konni 2019 Campaign

Unit 42 Palo Alto Ransomware in Public Clouds 2022

Jay Chen. (2022, May 16). A Look Into Public Clouds From the Ransomware Actor's Perspective. Retrieved March 21, 2023.

Internal MISP references

UUID cc6c2b69-ca51-513e-9666-a03be2ea5fcd which can be used as unique global reference for Unit 42 Palo Alto Ransomware in Public Clouds 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-21T00:00:00Z
date_published 2022-05-16T00:00:00Z
source MITRE
title A Look Into Public Clouds From the Ransomware Actor's Perspective

Cyber Centre ALPHV/BlackCat July 25 2023

Canadian Centre for Cyber Security. (2023, July 25). ALPHV/BlackCat Ransomware Targeting of Canadian Industries. Retrieved September 13, 2023.

Internal MISP references

UUID 610c8f22-1a96-42d2-934d-8467d136eed2 which can be used as unique global reference for Cyber Centre ALPHV/BlackCat July 25 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-13T00:00:00Z
date_published 2023-07-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title ALPHV/BlackCat Ransomware Targeting of Canadian Industries

Mandiant ALPHV Affiliate April 3 2023

Jason Deyalsingh, Nick Smith, Eduardo Mattos, Tyler Mclellan. (2023, April 3). ALPHV Ransomware Affiliate Targets Vulnerable Backup Installations to Gain Initial Access. Retrieved March 5, 2024.

Internal MISP references

UUID b8375832-f6a9-4617-a2ac-d23aacbf2bfe which can be used as unique global reference for Mandiant ALPHV Affiliate April 3 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-05T00:00:00Z
date_published 2023-04-03T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title ALPHV Ransomware Affiliate Targets Vulnerable Backup Installations to Gain Initial Access

Microsoft ADS Mar 2014

Marlin, J. (2013, March 24). Alternate Data Streams in NTFS. Retrieved March 21, 2018.

Internal MISP references

UUID eae434ff-97c0-4a82-9f80-215e515befae which can be used as unique global reference for Microsoft ADS Mar 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-21T00:00:00Z
date_published 2013-03-24T00:00:00Z
source MITRE
title Alternate Data Streams in NTFS

XPNSec PPID Nov 2017

Chester, A. (2017, November 20). Alternative methods of becoming SYSTEM. Retrieved June 4, 2019.

Internal MISP references

UUID 0dbf093e-4b54-4972-b048-2a6411037da4 which can be used as unique global reference for XPNSec PPID Nov 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-04T00:00:00Z
date_published 2017-11-20T00:00:00Z
source MITRE
title Alternative methods of becoming SYSTEM

Microsoft AlwaysInstallElevated 2018

Microsoft. (2018, May 31). AlwaysInstallElevated. Retrieved December 14, 2020.

Internal MISP references

UUID 19026f4c-ad65-435e-8c0e-a8ccc9895348 which can be used as unique global reference for Microsoft AlwaysInstallElevated 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-14T00:00:00Z
date_published 2018-05-31T00:00:00Z
source MITRE
title AlwaysInstallElevated

ASEC BLOG July 21 2022

Sanseo. (2022, July 21). Amadey Bot Being Distributed Through SmokeLoader - ASEC BLOG. Retrieved May 15, 2023.

Internal MISP references

UUID e320cc74-005a-46db-8a04-6ec487df327f which can be used as unique global reference for ASEC BLOG July 21 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-15T00:00:00Z
date_published 2022-07-21T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Amadey Bot Being Distributed Through SmokeLoader - ASEC BLOG

Amazon Snapshots

Amazon. (n.d.). Amazon EBS snapshots. Retrieved October 13, 2021.

Internal MISP references

UUID 3961a653-b53c-4ba4-9ea6-709e1d1bdb55 which can be used as unique global reference for Amazon Snapshots in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-13T00:00:00Z
source MITRE
title Amazon EBS snapshots

Amazon AMI

Amazon. (n.d.). Amazon Machine Images (AMI). Retrieved October 13, 2021.

Internal MISP references

UUID bc9ecf45-2a20-47df-a634-064237e5f126 which can be used as unique global reference for Amazon AMI in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-13T00:00:00Z
source MITRE
title Amazon Machine Images (AMI)

Amazon S3

Amazon. (n.d.). Amazon S3. Retrieved October 13, 2021.

Internal MISP references

UUID 7fecbd5d-626f-496a-a72f-5f166c78c204 which can be used as unique global reference for Amazon S3 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-13T00:00:00Z
source MITRE
title Amazon S3

Trend Micro S3 Exposed PII, 2017

Trend Micro. (2017, November 6). A Misconfigured Amazon S3 Exposed Almost 50 Thousand PII in Australia. Retrieved October 4, 2019.

Internal MISP references

UUID 1ba37b48-1219-4f87-af36-9bdd8d6265ca which can be used as unique global reference for Trend Micro S3 Exposed PII, 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-04T00:00:00Z
date_published 2017-11-06T00:00:00Z
source MITRE
title A Misconfigured Amazon S3 Exposed Almost 50 Thousand PII in Australia

Recorded Future Beacon Certificates

Insikt Group. (2019, June 18). A Multi-Method Approach to Identifying Rogue Cobalt Strike Servers. Retrieved September 16, 2024.

Internal MISP references

UUID 792ca8a7-c9b2-4e7f-8562-e1ccb60a402a which can be used as unique global reference for Recorded Future Beacon Certificates in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-16T00:00:00Z
date_published 2019-06-18T00:00:00Z
source MITRE
title A Multi-Method Approach to Identifying Rogue Cobalt Strike Servers

Botnet Scan

Dainotti, A. et al. (2012). Analysis of a “/0” Stealth Scan from a Botnet. Retrieved October 20, 2020.

Internal MISP references

UUID ca09941c-fcc8-460b-8b02-d1608a7d3813 which can be used as unique global reference for Botnet Scan in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
date_published 2012-01-01T00:00:00Z
source MITRE
title Analysis of a “/0” Stealth Scan from a Botnet

Trend Micro Ngrok September 2020

Borja, A. Camba, A. et al (2020, September 14). Analysis of a Convoluted Attack Chain Involving Ngrok. Retrieved September 15, 2020.

Internal MISP references

UUID e7b57e64-3532-4b98-9fa5-b832e6fcd53a which can be used as unique global reference for Trend Micro Ngrok September 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-15T00:00:00Z
source MITRE
title Analysis of a Convoluted Attack Chain Involving Ngrok

CIRCL PlugX March 2013

Computer Incident Response Center Luxembourg. (2013, March 29). Analysis of a PlugX variant. Retrieved November 5, 2018.

Internal MISP references

UUID 8ab89236-6994-43a3-906c-383e294f65d1 which can be used as unique global reference for CIRCL PlugX March 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-05T00:00:00Z
date_published 2013-03-29T00:00:00Z
source MITRE
title Analysis of a PlugX variant

Apple Unified Log Analysis Remote Login and Screen Sharing

Sarah Edwards. (2020, April 30). Analysis of Apple Unified Logs: Quarantine Edition [Entry 6] – Working From Home? Remote Logins. Retrieved August 19, 2021.

Internal MISP references

UUID a2169171-8e4a-4faa-811c-98b6204a5a57 which can be used as unique global reference for Apple Unified Log Analysis Remote Login and Screen Sharing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-19T00:00:00Z
date_published 2020-04-30T00:00:00Z
source MITRE
title Analysis of Apple Unified Logs: Quarantine Edition [Entry 6] – Working From Home? Remote Logins

Medium S2W WhisperGate January 2022

S2W. (2022, January 18). Analysis of Destructive Malware (WhisperGate) targeting Ukraine. Retrieved March 14, 2022.

Internal MISP references

UUID 06cf7197-244a-431b-a288-4c2bbd431ad5 which can be used as unique global reference for Medium S2W WhisperGate January 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-14T00:00:00Z
date_published 2022-01-18T00:00:00Z
source MITRE
title Analysis of Destructive Malware (WhisperGate) targeting Ukraine

Analysis of FG-IR-22-369

Guillaume Lovet and Alex Kong. (2023, March 9). Analysis of FG-IR-22-369. Retrieved May 15, 2023.

Internal MISP references

UUID f12b141e-6bb2-5563-9665-5756fec2d5e7 which can be used as unique global reference for Analysis of FG-IR-22-369 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-15T00:00:00Z
date_published 2023-03-09T00:00:00Z
source MITRE
title Analysis of FG-IR-22-369

Graeber 2014

Graeber, M. (2014, October). Analysis of Malicious Security Support Provider DLLs. Retrieved March 1, 2017.

Internal MISP references

UUID f2f9a6bf-b4d9-461e-b961-0610ea72faf0 which can be used as unique global reference for Graeber 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-01T00:00:00Z
date_published 2014-10-01T00:00:00Z
source MITRE
title Analysis of Malicious Security Support Provider DLLs

Fortinet Agent Tesla April 2018

Zhang, X. (2018, April 05). Analysis of New Agent Tesla Spyware Variant. Retrieved November 5, 2018.

Internal MISP references

UUID 86a65be7-0f70-4755-b526-a26b92eabaa2 which can be used as unique global reference for Fortinet Agent Tesla April 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-05T00:00:00Z
date_published 2018-04-05T00:00:00Z
source MITRE
title Analysis of New Agent Tesla Spyware Variant

Antiy CERT Ramsay April 2020

Antiy CERT. (2020, April 20). Analysis of Ramsay components of Darkhotel's infiltration and isolation network. Retrieved March 24, 2021.

Internal MISP references

UUID 280636da-fa21-472c-947c-651a628ea2cd which can be used as unique global reference for Antiy CERT Ramsay April 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-24T00:00:00Z
date_published 2020-04-20T00:00:00Z
source MITRE
title Analysis of Ramsay components of Darkhotel's infiltration and isolation network

Storm-0558 techniques for unauthorized email access

Microsoft Threat Intelligence. (2023, July 14). Analysis of Storm-0558 techniques for unauthorized email access. Retrieved September 18, 2023.

Internal MISP references

UUID 74fd79a9-09f7-5149-a457-687a1e2989de which can be used as unique global reference for Storm-0558 techniques for unauthorized email access in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-18T00:00:00Z
date_published 2023-07-14T00:00:00Z
source MITRE
title Analysis of Storm-0558 techniques for unauthorized email access

ESET Telebots July 2017

Cherepanov, A.. (2017, July 4). Analysis of TeleBots’ cunning backdoor . Retrieved June 11, 2020.

Internal MISP references

UUID 5d62c323-6626-4aad-8bf2-0d988e436f3d which can be used as unique global reference for ESET Telebots July 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-11T00:00:00Z
date_published 2017-07-04T00:00:00Z
source MITRE
title Analysis of TeleBots’ cunning backdoor

EST Kimsuky SmokeScreen April 2019

ESTSecurity. (2019, April 17). Analysis of the APT Campaign ‘Smoke Screen’ targeting to Korea and US 출처: https://blog.alyac.co.kr/2243 [이스트시큐리티 알약 블로그]. Retrieved September 29, 2021.

Internal MISP references

UUID 15213a3c-1e9f-47fa-9864-8ef2707c7fb6 which can be used as unique global reference for EST Kimsuky SmokeScreen April 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-29T00:00:00Z
date_published 2019-04-17T00:00:00Z
source MITRE
title Analysis of the APT Campaign ‘Smoke Screen’ targeting to Korea and US 출처: https://blog.alyac.co.kr/2243 [이스트시큐리티 알약 블로그]

Ukraine15 - EISAC - 201603

Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems. (2016, March 18). Analysis of the Cyber Attack on the Ukranian Power Grid: Defense Use Case. Retrieved March 27, 2018.

Internal MISP references

UUID 8adc6d36-3aa0-5d7b-8bb3-23f4426be8a6 which can be used as unique global reference for Ukraine15 - EISAC - 201603 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-27T00:00:00Z
date_published 2016-03-18T00:00:00Z
source MITRE
title Analysis of the Cyber Attack on the Ukranian Power Grid: Defense Use Case

Check Point Havij Analysis

Ganani, M. (2015, May 14). Analysis of the Havij SQL Injection tool. Retrieved March 19, 2018.

Internal MISP references

UUID 2e00a539-acbe-4462-a30f-43da4e8b9c4f which can be used as unique global reference for Check Point Havij Analysis in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-19T00:00:00Z
date_published 2015-05-14T00:00:00Z
source MITRE
title Analysis of the Havij SQL Injection tool

ESET Emotet Dec 2018

Perez, D.. (2018, December 28). Analysis of the latest Emotet propagation campaign. Retrieved April 16, 2019.

Internal MISP references

UUID 3fab9e25-e83e-4c90-ae32-dcd0c30757f8 which can be used as unique global reference for ESET Emotet Dec 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-16T00:00:00Z
date_published 2018-12-28T00:00:00Z
source MITRE
title Analysis of the latest Emotet propagation campaign

Rewterz Sidewinder COVID-19 June 2020

Rewterz. (2020, June 22). Analysis on Sidewinder APT Group – COVID-19. Retrieved January 29, 2021.

Internal MISP references

UUID cdd779f1-30c2-40be-a500-332920f0e21c which can be used as unique global reference for Rewterz Sidewinder COVID-19 June 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-29T00:00:00Z
date_published 2020-06-22T00:00:00Z
source MITRE
title Analysis on Sidewinder APT Group – COVID-19

CISA AR18-352A Quasar RAT December 2018

CISA. (2018, December 18). Analysis Report (AR18-352A) Quasar Open-Source Remote Administration Tool. Retrieved August 1, 2022.

Internal MISP references

UUID a109e42d-604f-4885-ada3-5d6895addc96 which can be used as unique global reference for CISA AR18-352A Quasar RAT December 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-01T00:00:00Z
date_published 2018-12-18T00:00:00Z
source MITRE
title Analysis Report (AR18-352A) Quasar Open-Source Remote Administration Tool

CISA AR21-126A FIVEHANDS May 2021

CISA. (2021, May 6). Analysis Report (AR21-126A) FiveHands Ransomware. Retrieved June 7, 2021.

Internal MISP references

UUID f98604dd-2881-4024-8e43-6f5f48c6c9fa which can be used as unique global reference for CISA AR21-126A FIVEHANDS May 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-07T00:00:00Z
date_published 2021-05-06T00:00:00Z
source MITRE
title Analysis Report (AR21-126A) FiveHands Ransomware

JoeSecurity Egregor 2020

Joe Security. (n.d.). Analysis Report fasm.dll. Retrieved January 6, 2021.

Internal MISP references

UUID d403e610-fa83-4c17-842f-223063864009 which can be used as unique global reference for JoeSecurity Egregor 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-06T00:00:00Z
source MITRE
title Analysis Report fasm.dll

GDATA Zeus Panda June 2017

Ebach, L. (2017, June 22). Analysis Results of Zeus.Variant.Panda. Retrieved November 5, 2018.

Internal MISP references

UUID 2d9a6957-5645-4863-968b-4a3c8736564b which can be used as unique global reference for GDATA Zeus Panda June 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-05T00:00:00Z
date_published 2017-06-22T00:00:00Z
source MITRE
title Analysis Results of Zeus.Variant.Panda

jstnk9.github.io June 01 2022

jstnk9.github.io. (2022, June 1). Analyzing AsyncRAT distributed in Colombia | Welcome to Jstnk webpage. Retrieved May 7, 2023.

Internal MISP references

UUID 4e7f573d-f8cc-4538-9f8d-b945f037e46f which can be used as unique global reference for jstnk9.github.io June 01 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2022-06-01T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Analyzing AsyncRAT distributed in Colombia

Analyzing CS Dec 2020

Maynier, E. (2020, December 20). Analyzing Cobalt Strike for Fun and Profit. Retrieved October 12, 2021.

Internal MISP references

UUID f2cb06bc-66d5-4c60-a2a4-74e5a0c23bee which can be used as unique global reference for Analyzing CS Dec 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-12T00:00:00Z
date_published 2020-12-20T00:00:00Z
source MITRE
title Analyzing Cobalt Strike for Fun and Profit

Objective_See 1 4 2024

Objective_See. (2024, January 4). Analyzing DPRK's SpectralBlur. Retrieved March 8, 2024.

Internal MISP references

UUID c96535be-4859-4ae3-9ba0-d482f1195863 which can be used as unique global reference for Objective_See 1 4 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-08T00:00:00Z
date_published 2024-01-04T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Analyzing DPRK's SpectralBlur

Microsoft Security Blog 4 22 2024

Microsoft Threat Intelligence. (2024, April 22). Analyzing Forest Blizzard's custom post-compromise tool for exploiting CVE-2022-38028 to obtain credentials . Retrieved April 22, 2024.

Internal MISP references

UUID 050ff793-d81d-499f-a136-905e76bce321 which can be used as unique global reference for Microsoft Security Blog 4 22 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-22T00:00:00Z
date_published 2024-04-22T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Analyzing Forest Blizzard's custom post-compromise tool for exploiting CVE-2022-38028 to obtain credentials

Uperesia Malicious Office Documents

Felix. (2016, September). Analyzing Malicious Office Documents. Retrieved April 11, 2018.

Internal MISP references

UUID f6ffb916-ac14-44d1-8566-26bafa06e77b which can be used as unique global reference for Uperesia Malicious Office Documents in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-11T00:00:00Z
date_published 2016-09-01T00:00:00Z
source MITRE
title Analyzing Malicious Office Documents

Unit42 OilRig Nov 2018

Falcone, R., Wilhoit, K.. (2018, November 16). Analyzing OilRig’s Ops Tempo from Testing to Weaponization to Delivery. Retrieved April 23, 2019.

Internal MISP references

UUID 9bc09d8a-d890-473b-a8cf-ea319fcc3462 which can be used as unique global reference for Unit42 OilRig Nov 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-23T00:00:00Z
date_published 2018-11-16T00:00:00Z
source MITRE
title Analyzing OilRig’s Ops Tempo from Testing to Weaponization to Delivery

McAfee GhostSecret

Sherstobitoff, R., Malhotra, A. (2018, April 24). Analyzing Operation GhostSecret: Attack Seeks to Steal Data Worldwide. Retrieved May 16, 2018.

Internal MISP references

UUID d1cd4f5b-253c-4833-8905-49fb58e7c016 which can be used as unique global reference for McAfee GhostSecret in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-05-16T00:00:00Z
date_published 2018-04-24T00:00:00Z
source MITRE
title Analyzing Operation GhostSecret: Attack Seeks to Steal Data Worldwide

McAfee-GhostSecret-fixurl

Ryan Sherstobitoff. (2018, April 24). Analyzing Operation GhostSecret: Attack Seeks to Steal Data Worldwide. Retrieved August 15, 2024.

Internal MISP references

UUID 8c88bc0d-102a-59ff-99e7-0d8a789c08a0 which can be used as unique global reference for McAfee-GhostSecret-fixurl in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-15T00:00:00Z
date_published 2018-04-24T00:00:00Z
source MITRE
title Analyzing Operation GhostSecret: Attack Seeks to Steal Data Worldwide

Microsoft Analyzing Solorigate Dec 2020

MSTIC. (2020, December 18). Analyzing Solorigate, the compromised DLL file that started a sophisticated cyberattack, and how Microsoft Defender helps protect customers . Retrieved January 5, 2021.

Internal MISP references

UUID 8ad72d46-ba2c-426f-bb0d-eb47723c8e11 which can be used as unique global reference for Microsoft Analyzing Solorigate Dec 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-05T00:00:00Z
date_published 2020-12-18T00:00:00Z
source MITRE
title Analyzing Solorigate, the compromised DLL file that started a sophisticated cyberattack, and how Microsoft Defender helps protect customers

Lastline PlugX Analysis

Vasilenko, R. (2013, December 17). An Analysis of PlugX Malware. Retrieved November 24, 2015.

Internal MISP references

UUID 9f7fa262-cede-4f47-94ca-1534c65c86e2 which can be used as unique global reference for Lastline PlugX Analysis in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-11-24T00:00:00Z
date_published 2013-12-17T00:00:00Z
source MITRE
title An Analysis of PlugX Malware

TrendMicro Sandworm October 2014

Wu, W. (2014, October 14). An Analysis of Windows Zero-day Vulnerability ‘CVE-2014-4114’ aka “Sandworm”. Retrieved June 18, 2020.

Internal MISP references

UUID 84f289ce-c7b9-4f67-b6cc-bd058e5e6bcb which can be used as unique global reference for TrendMicro Sandworm October 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-18T00:00:00Z
date_published 2014-10-14T00:00:00Z
source MITRE
title An Analysis of Windows Zero-day Vulnerability ‘CVE-2014-4114’ aka “Sandworm”

Dragos Crashoverride 2018

Joe Slowik. (2018, October 12). Anatomy of an Attack: Detecting and Defeating CRASHOVERRIDE. Retrieved December 18, 2020.

Internal MISP references

UUID d14442d5-2557-4a92-9a29-b15a20752f56 which can be used as unique global reference for Dragos Crashoverride 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-18T00:00:00Z
date_published 2018-10-12T00:00:00Z
source MITRE
title Anatomy of an Attack: Detecting and Defeating CRASHOVERRIDE

Anatomy of an hVNC Attack

Keshet, Lior. Kessem, Limor. (2017, January 25). Anatomy of an hVNC Attack. Retrieved November 28, 2023.

Internal MISP references

UUID 293c5d41-cd23-5da5-9d2b-754b626bc22a which can be used as unique global reference for Anatomy of an hVNC Attack in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-11-28T00:00:00Z
date_published 2017-01-25T00:00:00Z
source MITRE
title Anatomy of an hVNC Attack

Syscall 2014

Drysdale, D. (2014, July 16). Anatomy of a system call, part 2. Retrieved June 16, 2020.

Internal MISP references

UUID 4e8fe849-ab1a-4c51-b5eb-16fcd10e8bd0 which can be used as unique global reference for Syscall 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-16T00:00:00Z
date_published 2014-07-16T00:00:00Z
source MITRE
title Anatomy of a system call, part 2

SCADAfence_ransomware

Shaked, O. (2020, January 20). Anatomy of a Targeted Ransomware Attack. Retrieved June 18, 2022.

Internal MISP references

UUID 24c80db5-37a7-46ee-b232-f3c3ffb10f0a which can be used as unique global reference for SCADAfence_ransomware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-18T00:00:00Z
date_published 2020-01-20T00:00:00Z
source MITRE
title Anatomy of a Targeted Ransomware Attack

ESET IIS Malware 2021

Hromcová, Z., Cherepanov, A. (2021). Anatomy of Native IIS Malware. Retrieved September 9, 2021.

Internal MISP references

UUID d9c6e55b-39b7-4097-8ab2-8b87421ce2f4 which can be used as unique global reference for ESET IIS Malware 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-09T00:00:00Z
date_published 2021-01-01T00:00:00Z
source MITRE
title Anatomy of Native IIS Malware

Medium Anchor DNS July 2020

Grange, W. (2020, July 13). Anchor_dns malware goes cross platform. Retrieved September 10, 2020.

Internal MISP references

UUID de246d53-385f-44be-bf0f-25a76442b835 which can be used as unique global reference for Medium Anchor DNS July 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-10T00:00:00Z
date_published 2020-07-13T00:00:00Z
source MITRE
title Anchor_dns malware goes cross platform

NSA Joint Advisory SVR SolarWinds April 2021

NSA, FBI, DHS. (2021, April 15). Russian SVR Targets U.S. and Allied Networks. Retrieved April 16, 2021.

Internal MISP references

UUID 43d9c469-1d54-454b-ba67-74e7f1de9c10 which can be used as unique global reference for NSA Joint Advisory SVR SolarWinds April 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-16T00:00:00Z
source MITRE
title and Allied Networks

Kaspersky Andariel Ransomware June 2021

Park, S. (2021, June 15). Andariel evolves to target South Korea with ransomware. Retrieved September 29, 2021.

Internal MISP references

UUID f4efbcb5-494c-40e0-8734-5df1b92ec39c which can be used as unique global reference for Kaspersky Andariel Ransomware June 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-29T00:00:00Z
date_published 2021-06-15T00:00:00Z
source MITRE
title Andariel evolves to target South Korea with ransomware

CISA GRU29155 2024

US Cybersecurity & Infrastructure Security Agency et al. (2024, September 5). Russian Military Cyber Actors Target U.S. and Global Critical Infrastructure. Retrieved September 6, 2024.

Internal MISP references

UUID c4dba764-d864-59bf-a80d-f1263bc904e4 which can be used as unique global reference for CISA GRU29155 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-06T00:00:00Z
source MITRE
title and Global Critical Infrastructure

Sophos X-Ops C-23

Pankaj Kohli. (2021, November 23). Android APT spyware, targeting Middle East victims, enhances evasiveness. Retrieved October 30, 2023.

Internal MISP references

UUID 305c201b-ccc6-4e28-a1cb-97ca697bb214 which can be used as unique global reference for Sophos X-Ops C-23 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-30T00:00:00Z
date_published 2021-11-23T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Android APT spyware, targeting Middle East victims, enhances evasiveness

RFC826 ARP

Plummer, D. (1982, November). An Ethernet Address Resolution Protocol. Retrieved October 15, 2020.

Internal MISP references

UUID 8eef2b68-f932-4cba-8646-bff9a7848532 which can be used as unique global reference for RFC826 ARP in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-15T00:00:00Z
date_published 1982-11-01T00:00:00Z
source MITRE
title An Ethernet Address Resolution Protocol

HP SVCReady Jun 2022

Schlapfer, Patrick. (2022, June 6). A New Loader Gets Ready. Retrieved December 13, 2022.

Internal MISP references

UUID 48d5ec83-f1b9-595c-bb9a-d6d5cc513a41 which can be used as unique global reference for HP SVCReady Jun 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-12-13T00:00:00Z
date_published 2022-06-06T00:00:00Z
source MITRE
title A New Loader Gets Ready

SecureList Fileless

Legezo, D. (2022, May 4). A new secret stash for “fileless” malware. Retrieved March 23, 2023.

Internal MISP references

UUID 03eb080d-0b83-5cbb-9317-c50b35996c9b which can be used as unique global reference for SecureList Fileless in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-23T00:00:00Z
date_published 2022-05-04T00:00:00Z
source MITRE
title A new secret stash for “fileless” malware

ESET Ebury Feb 2014

M.Léveillé, M.. (2014, February 21). An In-depth Analysis of Linux/Ebury. Retrieved April 19, 2019.

Internal MISP references

UUID eb6d4f77-ac63-4cb8-8487-20f9e709334b which can be used as unique global reference for ESET Ebury Feb 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-19T00:00:00Z
date_published 2014-02-21T00:00:00Z
source MITRE
title An In-depth Analysis of Linux/Ebury

Welivesecurity Ebury SSH

M.Léveillé, M. (2014, February 21). An In-depth Analysis of Linux/Ebury. Retrieved January 8, 2018.

Internal MISP references

UUID 39384c7a-3032-4b45-a5eb-8ebe7de22aa2 which can be used as unique global reference for Welivesecurity Ebury SSH in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-08T00:00:00Z
date_published 2014-02-21T00:00:00Z
source MITRE
title An In-depth Analysis of Linux/Ebury

Avertium Black Basta June 2022

Avertium. (2022, June 1). AN IN-DEPTH LOOK AT BLACK BASTA RANSOMWARE. Retrieved March 7, 2023.

Internal MISP references

UUID 31c2ef62-2852-5418-9d52-2479a3a619d0 which can be used as unique global reference for Avertium Black Basta June 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-07T00:00:00Z
date_published 2022-06-01T00:00:00Z
source MITRE
title AN IN-DEPTH LOOK AT BLACK BASTA RANSOMWARE

Myers 2007

Myers, M., and Youndt, S. (2007). An Introduction to Hardware-Assisted Virtual Machine (HVM) Rootkits. Retrieved November 13, 2014.

Internal MISP references

UUID 689dfe75-9c06-4438-86fa-5fbbb09f0fe7 which can be used as unique global reference for Myers 2007 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-13T00:00:00Z
date_published 2007-01-01T00:00:00Z
source MITRE
title An Introduction to Hardware-Assisted Virtual Machine (HVM) Rootkits

Linux Services Run Levels

The Linux Foundation. (2006, January 11). An introduction to services, runlevels, and rc.d scripts. Retrieved September 28, 2021.

Internal MISP references

UUID 091aa85d-7d30-4800-9b2d-97f96d257798 which can be used as unique global reference for Linux Services Run Levels in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-28T00:00:00Z
date_published 2006-01-11T00:00:00Z
source MITRE
title An introduction to services, runlevels, and rc.d scripts

Anomali Pirate Panda April 2020

Moore, S. et al. (2020, April 30). Anomali Suspects that China-Backed APT Pirate Panda May Be Seeking Access to Vietnam Government Data Center. Retrieved May 19, 2020.

Internal MISP references

UUID f1d28b91-a529-439d-9548-c597baa245d4 which can be used as unique global reference for Anomali Pirate Panda April 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-19T00:00:00Z
date_published 2020-04-30T00:00:00Z
source MITRE
title Anomali Suspects that China-Backed APT Pirate Panda May Be Seeking Access to Vietnam Government Data Center

AnonGhost Team Profile

ADL. (2015, July 6). AnonGhost Team. Retrieved October 10, 2023.

Internal MISP references

UUID f868f5fa-df66-435f-8b32-d58e4785e46c which can be used as unique global reference for AnonGhost Team Profile in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-10T00:00:00Z
date_published 2015-07-06T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title AnonGhost Team

AnonHBGary

Bright, P. (2011, February 15). Anonymous speaks: the inside story of the HBGary hack. Retrieved March 9, 2017.

Internal MISP references

UUID 19ab02ea-883f-441c-bebf-4be64855374a which can be used as unique global reference for AnonHBGary in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-09T00:00:00Z
date_published 2011-02-15T00:00:00Z
source MITRE
title Anonymous speaks: the inside story of the HBGary hack

Fortinet Metamorfo Feb 2020

Zhang, X. (2020, February 4). Another Metamorfo Variant Targeting Customers of Financial Institutions in More Countries. Retrieved July 30, 2020.

Internal MISP references

UUID e89e3825-85df-45cf-b309-e449afed0288 which can be used as unique global reference for Fortinet Metamorfo Feb 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-07-30T00:00:00Z
date_published 2020-02-04T00:00:00Z
source MITRE
title Another Metamorfo Variant Targeting Customers of Financial Institutions in More Countries

MuddyWater TrendMicro June 2018

Villanueva, M., Co, M. (2018, June 14). Another Potential MuddyWater Campaign uses Powershell-based PRB-Backdoor. Retrieved July 3, 2018.

Internal MISP references

UUID b2c415e4-edbe-47fe-9820-b968114f81f0 which can be used as unique global reference for MuddyWater TrendMicro June 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-03T00:00:00Z
date_published 2018-06-14T00:00:00Z
source MITRE
title Another Potential MuddyWater Campaign uses Powershell-based PRB-Backdoor

AlienVault Sykipot 2011

Blasco, J. (2011, December 12). Another Sykipot sample likely targeting US federal agencies. Retrieved March 28, 2016.

Internal MISP references

UUID 800363c1-60df-47e7-8ded-c0f4b6e758f4 which can be used as unique global reference for AlienVault Sykipot 2011 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-03-28T00:00:00Z
date_published 2011-12-12T00:00:00Z
source MITRE
title Another Sykipot sample likely targeting US federal agencies

RiskIQ Newegg September 2018

Klijnsma, Y. (2018, September 19). Another Victim of the Magecart Assault Emerges: Newegg. Retrieved September 9, 2020.

Internal MISP references

UUID 095a705f-810b-4c4f-90ce-016117a5b4b6 which can be used as unique global reference for RiskIQ Newegg September 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-09T00:00:00Z
date_published 2018-09-19T00:00:00Z
source MITRE
title Another Victim of the Magecart Assault Emerges: Newegg

Dell WMI Persistence

Dell SecureWorks Counter Threat Unit™ (CTU) Research Team. (2016, March 28). A Novel WMI Persistence Implementation. Retrieved March 30, 2016.

Internal MISP references

UUID a88dd548-ac8f-4297-9e23-de2643294846 which can be used as unique global reference for Dell WMI Persistence in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-03-30T00:00:00Z
date_published 2016-03-28T00:00:00Z
source MITRE
title A Novel WMI Persistence Implementation

iDefense Rootkit Overview

Chuvakin, A. (2003, February). An Overview of Rootkits. Retrieved April 6, 2018.

Internal MISP references

UUID c1aef861-9e31-42e6-a2eb-5151b056762b which can be used as unique global reference for iDefense Rootkit Overview in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-06T00:00:00Z
date_published 2003-02-01T00:00:00Z
source MITRE
title An Overview of Rootkits

Trend Micro Rhysida August 09 2023

Trend Micro Research. (2023, August 9). An Overview of the New Rhysida Ransomware Targeting the Healthcare Sector. Retrieved August 11, 2023.

Internal MISP references

UUID 71704a3a-cf48-4764-af4e-8d2096bf5012 which can be used as unique global reference for Trend Micro Rhysida August 09 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-11T00:00:00Z
date_published 2023-08-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title An Overview of the New Rhysida Ransomware Targeting the Healthcare Sector

Mandiant Ukraine Cyber Threats January 2022

Hultquist, J. (2022, January 20). Anticipating Cyber Threats as the Ukraine Crisis Escalates. Retrieved January 24, 2022.

Internal MISP references

UUID 6f53117f-2e94-4981-be61-c3da4b783ce2 which can be used as unique global reference for Mandiant Ukraine Cyber Threats January 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-24T00:00:00Z
date_published 2022-01-20T00:00:00Z
source MITRE
title Anticipating Cyber Threats as the Ukraine Crisis Escalates

Microsoft AMSI

Microsoft. (2019, April 19). Antimalware Scan Interface (AMSI). Retrieved September 28, 2021.

Internal MISP references

UUID 32a4b7b5-8560-4600-aba9-15a6342b4dc3 which can be used as unique global reference for Microsoft AMSI in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-28T00:00:00Z
date_published 2019-04-19T00:00:00Z
source MITRE
title Antimalware Scan Interface (AMSI)

Microsoft Anti Spoofing

Microsoft. (2020, October 13). Anti-spoofing protection in EOP. Retrieved October 19, 2020.

Internal MISP references

UUID b3ac28ac-3f98-40fd-b1da-2461a9e3ffca which can be used as unique global reference for Microsoft Anti Spoofing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
date_published 2020-10-13T00:00:00Z
source MITRE
title Anti-spoofing protection in EOP

Fox-It Anunak Feb 2015

Prins, R. (2015, February 16). Anunak (aka Carbanak) Update. Retrieved January 20, 2017.

Internal MISP references

UUID d74a8d0b-887a-40b9-bd43-366764157990 which can be used as unique global reference for Fox-It Anunak Feb 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-01-20T00:00:00Z
date_published 2015-02-16T00:00:00Z
source MITRE
title Anunak (aka Carbanak) Update

Group-IB Anunak

Group-IB and Fox-IT. (2014, December). Anunak: APT against financial institutions. Retrieved April 20, 2016.

Internal MISP references

UUID fd254ecc-a076-4b9f-97f2-acb73c6a1695 which can be used as unique global reference for Group-IB Anunak in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-20T00:00:00Z
date_published 2014-12-01T00:00:00Z
source MITRE
title Anunak: APT against financial institutions

Google TAG Ukraine Threat Landscape March 2022

Huntley, S. (2022, March 7). An update on the threat landscape. Retrieved March 16, 2022.

Internal MISP references

UUID a6070f95-fbee-472e-a737-a8adbedbb4f8 which can be used as unique global reference for Google TAG Ukraine Threat Landscape March 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-16T00:00:00Z
date_published 2022-03-07T00:00:00Z
source MITRE
title An update on the threat landscape

Zairon Hooking Dec 2006

Felici, M. (2006, December 6). Any application-defined hook procedure on my machine?. Retrieved December 12, 2017.

Internal MISP references

UUID e816127a-04e4-4145-a784-50b1215612f2 which can be used as unique global reference for Zairon Hooking Dec 2006 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-12T00:00:00Z
date_published 2006-12-06T00:00:00Z
source MITRE
title Any application-defined hook procedure on my machine?

SentinelOne Aoqin Dragon June 2022

Chen, Joey. (2022, June 9). Aoqin Dragon | Newly-Discovered Chinese-linked APT Has Been Quietly Spying On Organizations For 10 Years. Retrieved July 14, 2022.

Internal MISP references

UUID b4e792e0-b1fa-4639-98b1-233aaec53594 which can be used as unique global reference for SentinelOne Aoqin Dragon June 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-14T00:00:00Z
date_published 2022-06-09T00:00:00Z
source MITRE
title Aoqin Dragon

Apache Server 2018

Apache. (n.d.). Apache HTTP Server Version 2.4 Documentation - Web Site Content. Retrieved July 27, 2018.

Internal MISP references

UUID 46f62435-bfb3-44b6-8c79-54af584cc35f which can be used as unique global reference for Apache Server 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-27T00:00:00Z
source MITRE
title Apache HTTP Server Version 2.4 Documentation - Web Site Content

Secureworks BRONZEUNION Feb 2019

Counter Threat Unit Research Team. (2019, February 27). A Peek into BRONZE UNION’s Toolbox. Retrieved September 24, 2019.

Internal MISP references

UUID 691df278-fd7d-4b73-a22c-227bc7641dec which can be used as unique global reference for Secureworks BRONZEUNION Feb 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-24T00:00:00Z
date_published 2019-02-27T00:00:00Z
source MITRE
title A Peek into BRONZE UNION’s Toolbox

AppArmor official

AppArmor. (2017, October 19). AppArmor Security Project Wiki. Retrieved December 20, 2017.

Internal MISP references

UUID 12df02e3-bbdd-4682-9662-1810402ad918 which can be used as unique global reference for AppArmor official in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-20T00:00:00Z
date_published 2017-10-19T00:00:00Z
source MITRE
title AppArmor Security Project Wiki

PenTestLabs AppDomainManagerInject

Administrator. (2020, May 26). APPDOMAINMANAGER INJECTION AND DETECTION. Retrieved March 28, 2024.

Internal MISP references

UUID f681fd40-5bfc-50c6-a654-f9a128af5ff1 which can be used as unique global reference for PenTestLabs AppDomainManagerInject in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-28T00:00:00Z
date_published 2020-05-26T00:00:00Z
source MITRE
title APPDOMAINMANAGER INJECTION AND DETECTION

Rapid7 AppDomain Manager Injection

Spagnola, N. (2023, May 5). AppDomain Manager Injection: New Techniques For Red Teams. Retrieved March 29, 2024.

Internal MISP references

UUID 881f8d23-908f-58cf-904d-5ef7b959eb39 which can be used as unique global reference for Rapid7 AppDomain Manager Injection in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-29T00:00:00Z
date_published 2023-05-05T00:00:00Z
source MITRE
title AppDomain Manager Injection: New Techniques For Red Teams

Mandiant APT1 Appendix

Mandiant. (n.d.). Appendix C (Digital) - The Malware Arsenal. Retrieved July 18, 2016.

Internal MISP references

UUID 1f31c09c-6a93-4142-8333-154138c1d70a which can be used as unique global reference for Mandiant APT1 Appendix in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-07-18T00:00:00Z
source MITRE
title Appendix C (Digital) - The Malware Arsenal

AppInit Secure Boot

Microsoft. (n.d.). AppInit DLLs and Secure Boot. Retrieved July 15, 2015.

Internal MISP references

UUID 2b951be3-5105-4665-972f-7809c057fd3f which can be used as unique global reference for AppInit Secure Boot in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-07-15T00:00:00Z
source MITRE
title AppInit DLLs and Secure Boot

AppInstaller.exe - LOLBAS Project

LOLBAS. (2020, December 2). AppInstaller.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 9a777e7c-e76c-465c-8b45-67503e715f7e which can be used as unique global reference for AppInstaller.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2020-12-02T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title AppInstaller.exe

objectivesee osx.shlayer apple approved 2020

Patrick Wardle. (2020, August 30). Apple Approved Malware malicious code ...now notarized!? #2020. Retrieved September 13, 2021.

Internal MISP references

UUID a2127d3d-c320-4637-a85c-16e20c2654f6 which can be used as unique global reference for objectivesee osx.shlayer apple approved 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-13T00:00:00Z
date_published 2020-08-30T00:00:00Z
source MITRE
title Apple Approved Malware malicious code ...now notarized!? #2020

AppleDocs AuthorizationExecuteWithPrivileges

Apple. (n.d.). Apple Developer Documentation - AuthorizationExecuteWithPrivileges. Retrieved August 8, 2019.

Internal MISP references

UUID 7b8875e8-5b93-4d49-a12b-2683bab2ba6e which can be used as unique global reference for AppleDocs AuthorizationExecuteWithPrivileges in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-08-08T00:00:00Z
source MITRE
title Apple Developer Documentation - AuthorizationExecuteWithPrivileges

AppleDocs Scheduling Timed Jobs

Apple. (n.d.). Retrieved July 17, 2017.

Internal MISP references

UUID 66dd8a7d-521f-4610-b478-52d748185ad3 which can be used as unique global reference for AppleDocs Scheduling Timed Jobs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-17T00:00:00Z
source MITRE
title AppleDocs Scheduling Timed Jobs

CISA AppleJeus Feb 2021

Cybersecurity and Infrastructure Security Agency. (2021, February 21). AppleJeus: Analysis of North Korea’s Cryptocurrency Malware. Retrieved March 1, 2021.

Internal MISP references

UUID 6873e14d-eba4-4e3c-9ccf-cec1d760f0be which can be used as unique global reference for CISA AppleJeus Feb 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-01T00:00:00Z
date_published 2021-02-21T00:00:00Z
source MITRE
title AppleJeus: Analysis of North Korea’s Cryptocurrency Malware

Apple Remote Desktop Admin Guide 3.3

Apple. (n.d.). Apple Remote Desktop Administrator Guide Version 3.3. Retrieved October 5, 2021.

Internal MISP references

UUID c57c2bba-a398-4e68-b2a7-fddcf0740b61 which can be used as unique global reference for Apple Remote Desktop Admin Guide 3.3 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-05T00:00:00Z
source MITRE
title Apple Remote Desktop Administrator Guide Version 3.3

applescript signing

Steven Sande. (2013, December 23). AppleScript and Automator gain new features in OS X Mavericks. Retrieved September 21, 2018.

Internal MISP references

UUID dd76c7ab-c3df-4f34-aaf0-684b56499065 which can be used as unique global reference for applescript signing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-09-21T00:00:00Z
date_published 2013-12-23T00:00:00Z
source MITRE
title AppleScript and Automator gain new features in OS X Mavericks

Microsoft Entra ID Service Principals

Microsoft. (2023, December 15). Application and service principal objects in Microsoft Entra ID. Retrieved February 28, 2024.

Internal MISP references

UUID 2a20c574-3e69-5da6-887e-68e34cee7562 which can be used as unique global reference for Microsoft Entra ID Service Principals in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-28T00:00:00Z
date_published 2023-12-15T00:00:00Z
source MITRE
title Application and service principal objects in Microsoft Entra ID

Microsoft App Domains

Microsoft. (2021, September 15). Application domains. Retrieved March 28, 2024.

Internal MISP references

UUID 268e7ade-c0a8-5859-8b16-6fa8aa3b0cb7 which can be used as unique global reference for Microsoft App Domains in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-28T00:00:00Z
date_published 2021-09-15T00:00:00Z
source MITRE
title Application domains

Corio 2008

Corio, C., & Sayana, D. P. (2008, June). Application Lockdown with Software Restriction Policies. Retrieved November 18, 2014.

Internal MISP references

UUID cae409ca-1c77-45df-88cd-c0998ac724ec which can be used as unique global reference for Corio 2008 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-18T00:00:00Z
date_published 2008-06-01T00:00:00Z
source MITRE
title Application Lockdown with Software Restriction Policies

Microsoft Application Lockdown

Corio, C., & Sayana, D. P.. (2008, June). Application Lockdown with Software Restriction Policies. Retrieved November 18, 2014.

Internal MISP references

UUID 5dab4466-0871-486a-84ad-0e648b2e937d which can be used as unique global reference for Microsoft Application Lockdown in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-18T00:00:00Z
date_published 2008-06-01T00:00:00Z
source MITRE
title Application Lockdown with Software Restriction Policies

SANS Application Whitelisting

Beechey, J.. (2014, November 18). Application Whitelisting: Panacea or Propaganda?. Retrieved November 18, 2014.

Internal MISP references

UUID a333f45f-1760-443a-9208-f3682ea32f67 which can be used as unique global reference for SANS Application Whitelisting in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-18T00:00:00Z
date_published 2014-11-18T00:00:00Z
source MITRE
title Application Whitelisting: Panacea or Propaganda?

Beechey 2010

Beechey, J. (2010, December). Application Whitelisting: Panacea or Propaganda?. Retrieved November 18, 2014.

Internal MISP references

UUID 4994e065-c6e4-4b41-8ae3-d72023135429 which can be used as unique global reference for Beechey 2010 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-18T00:00:00Z
date_published 2010-12-01T00:00:00Z
source MITRE
title Application Whitelisting: Panacea or Propaganda?

NSA MS AppLocker

NSA Information Assurance Directorate. (2014, August). Application Whitelisting Using Microsoft AppLocker. Retrieved March 31, 2016.

Internal MISP references

UUID 0db5c3ea-5392-4fd3-9f1d-9fa69aba4259 which can be used as unique global reference for NSA MS AppLocker in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-03-31T00:00:00Z
date_published 2014-08-01T00:00:00Z
source MITRE
title Application Whitelisting Using Microsoft AppLocker

Penetration Testing Lab MSXSL July 2017

netbiosX. (2017, July 6). AppLocker Bypass – MSXSL. Retrieved July 3, 2018.

Internal MISP references

UUID 2f1adf20-a4b8-48c1-861f-0a44271765d7 which can be used as unique global reference for Penetration Testing Lab MSXSL July 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-03T00:00:00Z
date_published 2017-07-06T00:00:00Z
source MITRE
title AppLocker Bypass – MSXSL

Burke/CISA ClickOnce Paper

William J. Burke IV. (n.d.). Appref-ms Abuse for Code Execution & C2. Retrieved September 9, 2024.

Internal MISP references

UUID 1bb14130-f819-5666-ab57-8f96fd4e7b05 which can be used as unique global reference for Burke/CISA ClickOnce Paper in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-09T00:00:00Z
source MITRE
title Appref-ms Abuse for Code Execution & C2

Microsoft Requests for Azure AD Roles in Privileged Identity Management

Microsoft. (2023, January 30). Approve or deny requests for Azure AD roles in Privileged Identity Management. Retrieved February 21, 2023.

Internal MISP references

UUID 1495effe-16a6-5b4e-9b50-1d1f7db48fa7 which can be used as unique global reference for Microsoft Requests for Azure AD Roles in Privileged Identity Management in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-21T00:00:00Z
date_published 2023-01-30T00:00:00Z
source MITRE
title Approve or deny requests for Azure AD roles in Privileged Identity Management

Apple App Security Overview

Apple Inc. (2021, February 18). App security overview. Retrieved October 12, 2021.

Internal MISP references

UUID 3b1e9a5d-7940-43b5-bc11-3112c0762740 which can be used as unique global reference for Apple App Security Overview in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-12T00:00:00Z
date_published 2021-02-18T00:00:00Z
source MITRE
title App security overview

Tripwire AppUNBlocker

Smith, T. (2016, October 27). AppUNBlocker: Bypassing AppLocker. Retrieved December 19, 2017.

Internal MISP references

UUID 2afb9a5f-c023-49df-90d1-e0ffb6d192f3 which can be used as unique global reference for Tripwire AppUNBlocker in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-19T00:00:00Z
date_published 2016-10-27T00:00:00Z
source MITRE
title AppUNBlocker: Bypassing AppLocker

Appvlp.exe - LOLBAS Project

LOLBAS. (2018, May 25). Appvlp.exe. Retrieved December 4, 2023.

Internal MISP references

UUID b0afe3e8-9f1d-4295-8811-8dfbe993c337 which can be used as unique global reference for Appvlp.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Appvlp.exe

BlackHat Atkinson Winchester Token Manipulation

Atkinson, J., Winchester, R. (2017, December 7). A Process is No One: Hunting for Token Manipulation. Retrieved December 21, 2017.

Internal MISP references

UUID 2eaee06d-529d-4fe0-9ca3-c62419f47a90 which can be used as unique global reference for BlackHat Atkinson Winchester Token Manipulation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-21T00:00:00Z
date_published 2017-12-07T00:00:00Z
source MITRE
title A Process is No One: Hunting for Token Manipulation

FireEye APT10 April 2017

FireEye iSIGHT Intelligence. (2017, April 6). APT10 (MenuPass Group): New Tools, Global Campaign Latest Manifestation of Longstanding Threat. Retrieved June 29, 2017.

Internal MISP references

UUID 2d494df8-83e3-45d2-b798-4c3bcf55f675 which can be used as unique global reference for FireEye APT10 April 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-06-29T00:00:00Z
date_published 2017-04-06T00:00:00Z
source MITRE
title APT10 (MenuPass Group): New Tools, Global Campaign Latest Manifestation of Longstanding Threat

Securelist APT10 March 2021

GREAT. (2021, March 30). APT10: sophisticated multi-layered loader Ecipekac discovered in A41APT campaign. Retrieved June 17, 2021.

Internal MISP references

UUID 90450a1e-59c3-491f-b842-2cf81023fc9e which can be used as unique global reference for Securelist APT10 March 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-17T00:00:00Z
date_published 2021-03-30T00:00:00Z
source MITRE
title APT10: sophisticated multi-layered loader Ecipekac discovered in A41APT campaign

FireEye APT10 Sept 2018

Matsuda, A., Muhammad I. (2018, September 13). APT10 Targeting Japanese Corporations Using Updated TTPs. Retrieved September 17, 2018.

Internal MISP references

UUID 5f122a27-2137-4016-a482-d04106187594 which can be used as unique global reference for FireEye APT10 Sept 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-09-17T00:00:00Z
date_published 2018-09-13T00:00:00Z
source MITRE
title APT10 Targeting Japanese Corporations Using Updated TTPs

NCC Group APT15 Alive and Strong

Smallridge, R. (2018, March 10). APT15 is alive and strong: An analysis of RoyalCli and RoyalDNS. Retrieved April 4, 2018.

Internal MISP references

UUID 02a50445-de06-40ab-9ea4-da5c37e066cd which can be used as unique global reference for NCC Group APT15 Alive and Strong in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-04T00:00:00Z
date_published 2018-03-10T00:00:00Z
source MITRE
title APT15 is alive and strong: An analysis of RoyalCli and RoyalDNS

Mandiant APT1

Mandiant. (n.d.). APT1 Exposing One of China’s Cyber Espionage Units. Retrieved July 18, 2016.

Internal MISP references

UUID 865eba93-cf6a-4e41-bc09-de9b0b3c2669 which can be used as unique global reference for Mandiant APT1 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-07-18T00:00:00Z
source MITRE, Tidal Cyber
title APT1 Exposing One of China’s Cyber Espionage Units

Profero APT27 December 2020

Global Threat Center, Intelligence Team. (2020, December). APT27 Turns to Ransomware. Retrieved November 12, 2021.

Internal MISP references

UUID 0290ea31-f817-471e-85ae-c3855c63f5c3 which can be used as unique global reference for Profero APT27 December 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-11-12T00:00:00Z
date_published 2020-12-01T00:00:00Z
source MITRE
title APT27 Turns to Ransomware

FireEye APT28 January 2017

FireEye iSIGHT Intelligence. (2017, January 11). APT28: At the Center of the Storm. Retrieved January 11, 2017.

Internal MISP references

UUID 61d80b8f-5bdb-41e6-b59a-d2d996392873 which can be used as unique global reference for FireEye APT28 January 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-01-11T00:00:00Z
date_published 2017-01-11T00:00:00Z
source MITRE, Tidal Cyber
title APT28: At the Center of the Storm

FireEye APT28

FireEye. (2015). APT28: A WINDOW INTO RUSSIA’S CYBER ESPIONAGE OPERATIONS?. Retrieved August 19, 2015.

Internal MISP references

UUID c423b2b2-25a3-4a8d-b89a-83ab07c0cd20 which can be used as unique global reference for FireEye APT28 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-08-19T00:00:00Z
date_published 2015-01-01T00:00:00Z
source MITRE, Tidal Cyber
title APT28: A WINDOW INTO RUSSIA’S CYBER ESPIONAGE OPERATIONS?

U.S. CISA APT28 Cisco Routers April 18 2023

Cybersecurity and Infrastructure Security Agency. (2023, April 18). APT28 Exploits Known Vulnerability to Carry Out Reconnaissance and Deploy Malware on Cisco Routers. Retrieved August 23, 2023.

Internal MISP references

UUID c532a6fc-b27f-4240-a071-3eaa866bce89 which can be used as unique global reference for U.S. CISA APT28 Cisco Routers April 18 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-23T00:00:00Z
date_published 2023-04-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title APT28 Exploits Known Vulnerability to Carry Out Reconnaissance and Deploy Malware on Cisco Routers

Symantec APT28 Oct 2018

Symantec Security Response. (2018, October 04). APT28: New Espionage Operations Target Military and Government Organizations. Retrieved November 14, 2018.

Internal MISP references

UUID 777bc94a-6c21-4f8c-9efa-a1cf52ececc0 which can be used as unique global reference for Symantec APT28 Oct 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-14T00:00:00Z
date_published 2018-10-04T00:00:00Z
source MITRE
title APT28: New Espionage Operations Target Military and Government Organizations

FireEye APT28 Hospitality Aug 2017

Smith, L. and Read, B.. (2017, August 11). APT28 Targets Hospitality Sector, Presents Threat to Travelers. Retrieved August 17, 2017.

Internal MISP references

UUID 7887dc90-3f05-411a-81ea-b86aa392104b which can be used as unique global reference for FireEye APT28 Hospitality Aug 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-08-17T00:00:00Z
date_published 2017-08-11T00:00:00Z
source MITRE
title APT28 Targets Hospitality Sector, Presents Threat to Travelers

Bitdefender APT28 Dec 2015

Bitdefender. (2015, December). APT28 Under the Scope. Retrieved February 23, 2017.

Internal MISP references

UUID 3dd67aae-7feb-4b07-a985-ccadc1b16f1d which can be used as unique global reference for Bitdefender APT28 Dec 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-02-23T00:00:00Z
date_published 2015-12-01T00:00:00Z
source MITRE
title APT28 Under the Scope

FireEye APT29 Domain Fronting With TOR March 2017

Matthew Dunwoody. (2017, March 27). APT29 Domain Fronting With TOR. Retrieved November 20, 2017.

Internal MISP references

UUID 1d919991-bc87-41bf-9e58-edf1b3806bb8 which can be used as unique global reference for FireEye APT29 Domain Fronting With TOR March 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-20T00:00:00Z
date_published 2017-03-27T00:00:00Z
source MITRE
title APT29 Domain Fronting With TOR

FireEye APT29 Domain Fronting

Dunwoody, M. (2017, March 27). APT29 Domain Fronting With TOR. Retrieved March 27, 2017.

Internal MISP references

UUID 3e013b07-deaf-4387-acd7-2d0565d196a9 which can be used as unique global reference for FireEye APT29 Domain Fronting in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-27T00:00:00Z
date_published 2017-03-27T00:00:00Z
source MITRE
title APT29 Domain Fronting With TOR

FireEye APT30

FireEye Labs. (2015, April). APT30 AND THE MECHANICS OF A LONG-RUNNING CYBER ESPIONAGE OPERATION. Retrieved May 1, 2015.

Internal MISP references

UUID c48d2084-61cf-4e86-8072-01e5d2de8416 which can be used as unique global reference for FireEye APT30 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-05-01T00:00:00Z
date_published 2015-04-01T00:00:00Z
source MITRE, Tidal Cyber
title APT30 AND THE MECHANICS OF A LONG-RUNNING CYBER ESPIONAGE OPERATION

Zscaler APT31 Covid-19 October 2020

Singh, S. and Antil, S. (2020, October 27). APT-31 Leverages COVID-19 Vaccine Theme and Abuses Legitimate Online Services. Retrieved March 24, 2021.

Internal MISP references

UUID 1647c9a6-e475-4a9a-a202-0133dbeef9a0 which can be used as unique global reference for Zscaler APT31 Covid-19 October 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-24T00:00:00Z
date_published 2020-10-27T00:00:00Z
source MITRE
title APT-31 Leverages COVID-19 Vaccine Theme and Abuses Legitimate Online Services

sentinelone apt32 macOS backdoor 2020

Phil Stokes. (2020, December 2). APT32 Multi-stage macOS Trojan Innovates on Crimeware Scripting Technique. Retrieved September 13, 2021.

Internal MISP references

UUID d31dcbe6-06ec-475e-b121-fd25a93c3ef7 which can be used as unique global reference for sentinelone apt32 macOS backdoor 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-13T00:00:00Z
date_published 2020-12-02T00:00:00Z
source MITRE
title APT32 Multi-stage macOS Trojan Innovates on Crimeware Scripting Technique

FireEye APT33 Webinar Sept 2017

Davis, S. and Carr, N. (2017, September 21). APT33: New Insights into Iranian Cyber Espionage Group. Retrieved February 15, 2018.

Internal MISP references

UUID 9b378592-5737-403d-8a07-27077f5b2d61 which can be used as unique global reference for FireEye APT33 Webinar Sept 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-15T00:00:00Z
date_published 2017-09-21T00:00:00Z
source MITRE
title APT33: New Insights into Iranian Cyber Espionage Group

FireEye APT34 Webinar Dec 2017

Davis, S. and Caban, D. (2017, December 19). APT34 - New Targeted Attack in the Middle East. Retrieved December 20, 2017.

Internal MISP references

UUID 4eef7032-de14-44a2-a403-82aefdc85c50 which can be used as unique global reference for FireEye APT34 Webinar Dec 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-20T00:00:00Z
date_published 2017-12-19T00:00:00Z
source MITRE
title APT34 - New Targeted Attack in the Middle East

DFIR Report APT35 ProxyShell March 2022

DFIR Report. (2022, March 21). APT35 Automates Initial Access Using ProxyShell. Retrieved May 25, 2022.

Internal MISP references

UUID 1837e917-d80b-4632-a1ca-c70d4b712ac7 which can be used as unique global reference for DFIR Report APT35 ProxyShell March 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-25T00:00:00Z
date_published 2022-03-21T00:00:00Z
source MITRE
title APT35 Automates Initial Access Using ProxyShell

Check Point APT35 CharmPower January 2022

Check Point. (2022, January 11). APT35 exploits Log4j vulnerability to distribute new modular PowerShell toolkit. Retrieved January 24, 2022.

Internal MISP references

UUID 81dce660-93ea-42a4-902f-0c6021d30f59 which can be used as unique global reference for Check Point APT35 CharmPower January 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-24T00:00:00Z
date_published 2022-01-11T00:00:00Z
source MITRE
title APT35 exploits Log4j vulnerability to distribute new modular PowerShell toolkit

FireEye APT37 Feb 2018

FireEye. (2018, February 20). APT37 (Reaper): The Overlooked North Korean Actor. Retrieved March 1, 2018.

Internal MISP references

UUID 4d575c1a-4ff9-49ce-97cd-f9d0637c2271 which can be used as unique global reference for FireEye APT37 Feb 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-01T00:00:00Z
date_published 2018-02-20T00:00:00Z
source MITRE, Tidal Cyber
title APT37 (Reaper): The Overlooked North Korean Actor

FireEye APT38 Oct 2018

FireEye. (2018, October 03). APT38: Un-usual Suspects. Retrieved November 6, 2018.

Internal MISP references

UUID 7c916329-af56-4723-820c-ef932a6e3409 which can be used as unique global reference for FireEye APT38 Oct 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-06T00:00:00Z
date_published 2018-10-03T00:00:00Z
source MITRE, Tidal Cyber
title APT38: Un-usual Suspects

FireEye APT39 Jan 2019

Hawley et al. (2019, January 29). APT39: An Iranian Cyber Espionage Group Focused on Personal Information. Retrieved February 19, 2019.

Internal MISP references

UUID ba366cfc-cc04-41a5-903b-a7bb73136bc3 which can be used as unique global reference for FireEye APT39 Jan 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-19T00:00:00Z
date_published 2019-01-29T00:00:00Z
source MITRE
title APT39: An Iranian Cyber Espionage Group Focused on Personal Information

APT3 Adversary Emulation Plan

Korban, C, et al. (2017, September). APT3 Adversary Emulation Plan. Retrieved January 16, 2018.

Internal MISP references

UUID 64c01921-c33f-402e-b30d-a2ba26583a24 which can be used as unique global reference for APT3 Adversary Emulation Plan in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-16T00:00:00Z
date_published 2017-09-01T00:00:00Z
source MITRE
title APT3 Adversary Emulation Plan

evolution of pirpi

Yates, M. (2017, June 18). APT3 Uncovered: The code evolution of Pirpi. Retrieved September 28, 2017.

Internal MISP references

UUID 9c8bd493-bf08-431b-9d53-29eb14a6eef5 which can be used as unique global reference for evolution of pirpi in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-09-28T00:00:00Z
date_published 2017-06-18T00:00:00Z
source MITRE
title APT3 Uncovered: The code evolution of Pirpi

FireEye APT40 March 2019

Plan, F., et al. (2019, March 4). APT40: Examining a China-Nexus Espionage Actor. Retrieved March 18, 2019.

Internal MISP references

UUID 8a44368f-3348-4817-aca7-81bfaca5ae6d which can be used as unique global reference for FireEye APT40 March 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-18T00:00:00Z
date_published 2019-03-04T00:00:00Z
source MITRE
title APT40: Examining a China-Nexus Espionage Actor

apt41_mandiant

Mandiant. (n.d.). APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION. Retrieved June 11, 2024.

Internal MISP references

UUID 599f4411-6829-5a2d-865c-ac59e80afe83 which can be used as unique global reference for apt41_mandiant in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-11T00:00:00Z
source MITRE
title APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION

Mandiant APT41 July 18 2024

Mike Stokkel, Pierre Gerlings, Renato Fontana, Luis Rocha, Jared Wilson, Stephen Eckels, Jonathan Lepore. (2024, July 18). APT41 Has Arisen From the DUST. Retrieved August 2, 2024.

Internal MISP references

UUID 34ee3a7c-27c0-492f-a3c6-a5a3e86915f0 which can be used as unique global reference for Mandiant APT41 July 18 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-02T00:00:00Z
date_published 2024-07-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title APT41 Has Arisen From the DUST

Google Cloud APT41 2024

Mike Stokkel et al. (2024, July 18). APT41 Has Arisen From the DUST. Retrieved September 16, 2024.

Internal MISP references

UUID 33bb9f8a-db9d-5dda-b4ae-2ba7fee0a0ae which can be used as unique global reference for Google Cloud APT41 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-16T00:00:00Z
date_published 2024-07-18T00:00:00Z
source MITRE
title APT41 Has Arisen From the DUST

apt41_dcsocytec_dec2022

DCSO CyTec Blog. (2022, December 24). APT41 — The spy who failed to encrypt me. Retrieved June 13, 2024.

Internal MISP references

UUID fad90e96-93fd-59bd-970e-f0b37cac331d which can be used as unique global reference for apt41_dcsocytec_dec2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-13T00:00:00Z
date_published 2022-12-24T00:00:00Z
source MITRE
title APT41 — The spy who failed to encrypt me

Rostovcev APT41 2021

Nikita Rostovcev. (2022, August 18). APT41 World Tour 2021 on a tight schedule. Retrieved February 22, 2024.

Internal MISP references

UUID b6e7fb29-7935-5454-8fb2-37585c46324a which can be used as unique global reference for Rostovcev APT41 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-22T00:00:00Z
date_published 2022-08-18T00:00:00Z
source MITRE
title APT41 World Tour 2021 on a tight schedule

Mandiant APT42

Mandiant. (n.d.). APT42: Crooked Charms, Cons and Compromise. Retrieved September 16, 2022.

Internal MISP references

UUID 10b3e476-a0c5-41fd-8cb8-5bfb245b118f which can be used as unique global reference for Mandiant APT42 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-16T00:00:00Z
source MITRE
title APT42: Crooked Charms, Cons and Compromise

Mandiant Crooked Charms August 12 2022

Mandiant. (2022, August 12). APT42: Crooked Charms, Cons and Compromises. Retrieved August 30, 2024.

Internal MISP references

UUID 53bab956-be5b-4d8d-b553-9926bc5d9fee which can be used as unique global reference for Mandiant Crooked Charms August 12 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-30T00:00:00Z
date_published 2022-08-12T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title APT42: Crooked Charms, Cons and Compromises

Mandiant APT43 March 2024

Mandiant. (2024, March 14). APT43: North Korean Group Uses Cybercrime to Fund Espionage Operations. Retrieved May 3, 2024.

Internal MISP references

UUID 8ac3fd0a-4a93-5262-9ac2-f676c5d11fda which can be used as unique global reference for Mandiant APT43 March 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-03T00:00:00Z
date_published 2024-03-14T00:00:00Z
source MITRE
title APT43: North Korean Group Uses Cybercrime to Fund Espionage Operations

mandiant_apt44_unearthing_sandworm

Roncone, G. et al. (n.d.). APT44: Unearthing Sandworm. Retrieved July 11, 2024.

Internal MISP references

UUID cc03d668-e4d9-5dc1-b365-203db84938f2 which can be used as unique global reference for mandiant_apt44_unearthing_sandworm in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-11T00:00:00Z
source MITRE
title APT44: Unearthing Sandworm

Mandiant APT45 July 25 2024

Taylor Long, Jeff Johnson, Alice Revelli, Fred Plan, Michael Barnhart. (2024, July 25). APT45: North Korea’s Digital Military Machine. Retrieved July 26, 2024.

Internal MISP references

UUID a9673491-7493-4b85-b5fc-595e91bc7fdc which can be used as unique global reference for Mandiant APT45 July 25 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-26T00:00:00Z
date_published 2024-07-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title APT45: North Korea’s Digital Military Machine

NSA APT5 Citrix Threat Hunting December 2022

National Security Agency. (2022, December). APT5: Citrix ADC Threat Hunting Guidance. Retrieved February 5, 2024.

Internal MISP references

UUID 916e2137-46e6-53c2-a917-5b5b5c4bae3a which can be used as unique global reference for NSA APT5 Citrix Threat Hunting December 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-05T00:00:00Z
date_published 2022-12-01T00:00:00Z
source MITRE
title APT5: Citrix ADC Threat Hunting Guidance

welivesecurity_apt-c-23

Stefanko, L. (2020, September 30). APT‑C‑23 group evolves its Android spyware. Retrieved March 4, 2024.

Internal MISP references

UUID 7196226e-7d0d-5e14-a4e3-9b6322537039 which can be used as unique global reference for welivesecurity_apt-c-23 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-04T00:00:00Z
date_published 2020-09-30T00:00:00Z
source MITRE
title APT‑C‑23 group evolves its Android spyware

QiAnXin APT-C-36 Feb2019

QiAnXin Threat Intelligence Center. (2019, February 18). APT-C-36: Continuous Attacks Targeting Colombian Government Institutions and Corporations. Retrieved May 5, 2020.

Internal MISP references

UUID cae075ea-42cb-4695-ac66-9187241393d1 which can be used as unique global reference for QiAnXin APT-C-36 Feb2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-05T00:00:00Z
date_published 2019-02-18T00:00:00Z
source MITRE, Tidal Cyber
title APT-C-36: Continuous Attacks Targeting Colombian Government Institutions and Corporations

360 Machete Sep 2020

kate. (2020, September 25). APT-C-43 steals Venezuelan military secrets to provide intelligence support for the reactionaries — HpReact campaign. Retrieved November 20, 2020.

Internal MISP references

UUID 682c843d-1bb8-4f30-9d2e-35e8d41b1976 which can be used as unique global reference for 360 Machete Sep 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-20T00:00:00Z
date_published 2020-09-25T00:00:00Z
source MITRE, Tidal Cyber
title APT-C-43 steals Venezuelan military secrets to provide intelligence support for the reactionaries — HpReact campaign

Cycraft Chimera April 2020

Cycraft. (2020, April 15). APT Group Chimera - APT Operation Skeleton key Targets Taiwan Semiconductor Vendors. Retrieved August 24, 2020..

Internal MISP references

UUID a5a14a4e-2214-44ab-9067-75429409d744 which can be used as unique global reference for Cycraft Chimera April 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-24T00:00:00Z
date_published 2020-04-15T00:00:00Z
source MITRE
title APT Group Chimera - APT Operation Skeleton key Targets Taiwan Semiconductor Vendors

CISA IT Service Providers

CISA. (n.d.). APTs Targeting IT Service Provider Customers. Retrieved November 16, 2020.

Internal MISP references

UUID b8bee7f9-155e-4765-9492-01182e4435b7 which can be used as unique global reference for CISA IT Service Providers in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-16T00:00:00Z
source MITRE
title APTs Targeting IT Service Provider Customers

Securelist GCMAN

Kaspersky Lab's Global Research & Analysis Team. (2016, February 8). APT-style bank robberies increase with Metel, GCMAN and Carbanak 2.0 attacks. Retrieved April 20, 2016.

Internal MISP references

UUID 1f07f234-50f0-4c1e-942a-a01d3f733161 which can be used as unique global reference for Securelist GCMAN in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-20T00:00:00Z
date_published 2016-02-08T00:00:00Z
source MITRE, Tidal Cyber
title APT-style bank robberies increase with Metel, GCMAN and Carbanak 2.0 attacks

Proofpoint TA459 April 2017

Axel F. (2017, April 27). APT Targets Financial Analysts with CVE-2017-0199. Retrieved February 15, 2018.

Internal MISP references

UUID dabad6df-1e31-4c16-9217-e079f2493b02 which can be used as unique global reference for Proofpoint TA459 April 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-15T00:00:00Z
date_published 2017-04-27T00:00:00Z
source MITRE, Tidal Cyber
title APT Targets Financial Analysts with CVE-2017-0199

Kaspersky ToddyCat June 2022

Dedola, G. (2022, June 21). APT ToddyCat. Retrieved January 3, 2024.

Internal MISP references

UUID 285c038b-e5fc-57ef-9a98-d9e24c52e2cf which can be used as unique global reference for Kaspersky ToddyCat June 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-03T00:00:00Z
date_published 2022-06-21T00:00:00Z
source MITRE
title APT ToddyCat

Global Research and Analysis Team . (2018, April 12). APT Trends report Q1 2018. Retrieved January 27, 2021.

Internal MISP references

UUID 587f5195-e696-4a3c-8c85-90b9c002cd11 which can be used as unique global reference for Securelist APT Trends April 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-27T00:00:00Z
date_published 2018-04-12T00:00:00Z
source MITRE
title APT Trends report Q1 2018

Global Research and Analysis Team. (2020, April 30). APT trends report Q1 2020. Retrieved September 19, 2022.

Internal MISP references

UUID 23c91719-5ebe-4d03-8018-df1809fffd2f which can be used as unique global reference for Kaspersky APT Trends Q1 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-19T00:00:00Z
date_published 2020-04-30T00:00:00Z
source MITRE
title APT trends report Q1 2020

GReAT . (2021, April 27). APT trends report Q1 2021. Retrieved June 6, 2022.

Internal MISP references

UUID 3fd0ba3b-7919-46d3-a444-50508603956f which can be used as unique global reference for Kaspersky APT Trends Q1 April 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-06T00:00:00Z
date_published 2021-04-27T00:00:00Z
source MITRE
title APT trends report Q1 2021

Kaspersky Lab's Global Research & Analysis Team. (2017, August 8). APT Trends report Q2 2017. Retrieved February 15, 2018.

Internal MISP references

UUID fe28042c-d289-463f-9ece-1a75a70b966e which can be used as unique global reference for Securelist APT Trends Q2 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-15T00:00:00Z
date_published 2017-08-08T00:00:00Z
source MITRE
title APT Trends report Q2 2017

Wired ArcaneDoor April 24 2024

Andy Greenberg. (2024, April 24). ‘ArcaneDoor’ Cyberspies Hacked Cisco Firewalls to Access Government Networks. Retrieved May 6, 2024.

Internal MISP references

UUID 05a8afd3-0173-41ca-b23b-196ea0f3b1c1 which can be used as unique global reference for Wired ArcaneDoor April 24 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-06T00:00:00Z
date_published 2024-04-24T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title ‘ArcaneDoor’ Cyberspies Hacked Cisco Firewalls to Access Government Networks

Cisco Talos ArcaneDoor April 24 2024

Cisco Talos. (2024, April 24). ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices. Retrieved May 6, 2024.

Internal MISP references

UUID 531c3f6f-2d2b-4774-b069-e2b7a13602c1 which can be used as unique global reference for Cisco Talos ArcaneDoor April 24 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-06T00:00:00Z
date_published 2024-04-24T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices

Wald0 Guide to GPOs

Robbins, A. (2018, April 2). A Red Teamer’s Guide to GPOs and OUs. Retrieved March 5, 2019.

Internal MISP references

UUID 48bb84ac-56c8-4840-9a11-2cc76213e24e which can be used as unique global reference for Wald0 Guide to GPOs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-05T00:00:00Z
date_published 2018-04-02T00:00:00Z
source MITRE
title A Red Teamer’s Guide to GPOs and OUs

Lau 2011

Lau, H. (2011, August 8). Are MBR Infections Back in Fashion? (Infographic). Retrieved November 13, 2014.

Internal MISP references

UUID fa809aab-5051-4f9c-8e27-b5989608b03c which can be used as unique global reference for Lau 2011 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-13T00:00:00Z
date_published 2011-08-08T00:00:00Z
source MITRE
title Are MBR Infections Back in Fashion? (Infographic)

Krebs-Booter

Brian Krebs. (2016, October 27). Are the Days of “Booter” Services Numbered?. Retrieved May 15, 2017.

Internal MISP references

UUID d29a88ae-273b-439e-8808-dc9931f1ff72 which can be used as unique global reference for Krebs-Booter in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-05-15T00:00:00Z
date_published 2016-10-27T00:00:00Z
source MITRE
title Are the Days of “Booter” Services Numbered?

RSA Forfiles Aug 2017

Partington, E. (2017, August 14). Are you looking out for forfiles.exe (if you are watching for cmd.exe). Retrieved January 22, 2018.

Internal MISP references

UUID 923d6d3e-6117-43a5-92c6-ea0c131355c2 which can be used as unique global reference for RSA Forfiles Aug 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-22T00:00:00Z
date_published 2017-08-14T00:00:00Z
source MITRE
title Are you looking out for forfiles.exe (if you are watching for cmd.exe)

FireEye Respond Webinar July 2017

Scavella, T. and Rifki, A. (2017, July 20). Are you Ready to Respond? (Webinar). Retrieved October 4, 2017.

Internal MISP references

UUID e7091d66-7faa-49d6-b16f-be1f79db4471 which can be used as unique global reference for FireEye Respond Webinar July 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-10-04T00:00:00Z
date_published 2017-07-20T00:00:00Z
source MITRE
title Are you Ready to Respond? (Webinar)

Browser-updates

Dusty Miller. (2023, October 17). Are You Sure Your Browser is Up to Date? The Current Landscape of Fake Browser Updates . Retrieved February 13, 2024.

Internal MISP references

UUID 89e913a8-1d52-53fe-b692-fb72e21d794f which can be used as unique global reference for Browser-updates in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-13T00:00:00Z
date_published 2023-10-17T00:00:00Z
source MITRE
title Are You Sure Your Browser is Up to Date? The Current Landscape of Fake Browser Updates

Sekoia.io AridViper

Threat & Detection Research Team. (2023, October 26). AridViper, an intrusion set allegedly associated with Hamas. Retrieved October 30, 2023.

Internal MISP references

UUID 963a97b9-71b2-46e7-8315-1d7ef76d832c which can be used as unique global reference for Sekoia.io AridViper in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-30T00:00:00Z
date_published 2023-10-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title AridViper, an intrusion set allegedly associated with Hamas

TechNet Arp

Microsoft. (n.d.). Arp. Retrieved April 17, 2016.

Internal MISP references

UUID 7714222e-8046-4884-b460-493d9ef46305 which can be used as unique global reference for TechNet Arp in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-17T00:00:00Z
source MITRE
title Arp

Cisco ARP Poisoning Mitigation 2016

King, J., Lauerman, K. (2016, January 22). ARP Poisoning (Man-in-the-Middle) Attack and Mitigation Technique. Retrieved October 15, 2020.

Internal MISP references

UUID 715cd044-f5ef-4cad-8741-308d104f05a5 which can be used as unique global reference for Cisco ARP Poisoning Mitigation 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-15T00:00:00Z
date_published 2016-01-22T00:00:00Z
source MITRE
title ARP Poisoning (Man-in-the-Middle) Attack and Mitigation Technique

ASEC Emotet 2017

ASEC. (2017). ASEC REPORT VOL.88. Retrieved April 16, 2019.

Internal MISP references

UUID a02e3bbf-5864-4ccf-8b6f-5f8452395670 which can be used as unique global reference for ASEC Emotet 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-16T00:00:00Z
date_published 2017-01-01T00:00:00Z
source MITRE
title ASEC REPORT VOL.88

ASERT Seven Pointed Dagger Aug 2015

ASERT. (2015, August). ASERT Threat Intelligence Report – Uncovering the Seven Pointed Dagger. Retrieved March 19, 2018.

Internal MISP references

UUID a8f323c7-82bc-46e6-bd6c-0b631abc644a which can be used as unique global reference for ASERT Seven Pointed Dagger Aug 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-19T00:00:00Z
date_published 2015-08-01T00:00:00Z
source MITRE
title ASERT Threat Intelligence Report – Uncovering the Seven Pointed Dagger

Securelist Sofacy Feb 2018

Kaspersky Lab's Global Research & Analysis Team. (2018, February 20). A Slice of 2017 Sofacy Activity. Retrieved November 27, 2018.

Internal MISP references

UUID 3a043bba-2451-4765-946b-c1f3bf4aea36 which can be used as unique global reference for Securelist Sofacy Feb 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-27T00:00:00Z
date_published 2018-02-20T00:00:00Z
source MITRE
title A Slice of 2017 Sofacy Activity

THE FINANCIAL TIMES LTD 2019.

THE FINANCIAL TIMES. (2019, September 2). A sobering day. Retrieved October 8, 2019.

Internal MISP references

UUID 5a01f0b7-86f7-44a1-bf35-46a631402ceb which can be used as unique global reference for THE FINANCIAL TIMES LTD 2019. in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-08T00:00:00Z
date_published 2019-09-02T00:00:00Z
source MITRE
title A sobering day

Aspnet_Compiler.exe - LOLBAS Project

LOLBAS. (2021, September 26). Aspnet_Compiler.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 15864c56-115e-4163-b816-03bdb9bfd5c5 which can be used as unique global reference for Aspnet_Compiler.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-09-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Aspnet_Compiler.exe

Mandiant UNC2452 APT29 April 2022

Mandiant. (2020, April 27). Assembling the Russian Nesting Doll: UNC2452 Merged into APT29. Retrieved March 26, 2023.

Internal MISP references

UUID 5276508c-6792-56be-b757-e4b495ef6c37 which can be used as unique global reference for Mandiant UNC2452 APT29 April 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-26T00:00:00Z
date_published 2020-04-27T00:00:00Z
source MITRE
title Assembling the Russian Nesting Doll: UNC2452 Merged into APT29

Microsoft AssemblyLoad

Microsoft. (n.d.). Assembly.Load Method. Retrieved February 9, 2024.

Internal MISP references

UUID 3d980d7a-7074-5812-9bb1-ca8e27e028bd which can be used as unique global reference for Microsoft AssemblyLoad in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-09T00:00:00Z
source MITRE
title Assembly.Load Method

Kubernetes Assigning Pods to Nodes

Kubernetes. (n.d.). Assigning Pods to Nodes. Retrieved February 15, 2024.

Internal MISP references

UUID fe6ba97b-ff61-541b-9a67-a835290dc4ab which can be used as unique global reference for Kubernetes Assigning Pods to Nodes in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-15T00:00:00Z
source MITRE
title Assigning Pods to Nodes

Microsoft Assoc Oct 2017

Plett, C. et al.. (2017, October 15). assoc. Retrieved August 7, 2018.

Internal MISP references

UUID 63fb65d7-6423-42de-b868-37fbc2bc133d which can be used as unique global reference for Microsoft Assoc Oct 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-07T00:00:00Z
date_published 2017-10-15T00:00:00Z
source MITRE
title assoc

Rhino Security Labs Enumerating AWS Roles

Spencer Gietzen. (2018, August 8). Assume the Worst: Enumerating AWS Roles through ‘AssumeRole’. Retrieved April 1, 2022.

Internal MISP references

UUID f403fc54-bdac-415a-9cc0-78803dd84214 which can be used as unique global reference for Rhino Security Labs Enumerating AWS Roles in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-01T00:00:00Z
date_published 2018-08-08T00:00:00Z
source MITRE
title Assume the Worst: Enumerating AWS Roles through ‘AssumeRole’

Cybereason Astaroth Feb 2019

Salem, E. (2019, February 13). ASTAROTH MALWARE USES LEGITIMATE OS AND ANTIVIRUS PROCESSES TO STEAL PASSWORDS AND PERSONAL DATA. Retrieved April 17, 2019.

Internal MISP references

UUID eb4dc1f8-c6e7-4d6c-9258-b03a0ae64d2e which can be used as unique global reference for Cybereason Astaroth Feb 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-17T00:00:00Z
date_published 2019-02-13T00:00:00Z
source MITRE
title ASTAROTH MALWARE USES LEGITIMATE OS AND ANTIVIRUS PROCESSES TO STEAL PASSWORDS AND PERSONAL DATA

spamhaus-malvertising

Miller, Sarah. (2023, February 2). A surge of malvertising across Google Ads is distributing dangerous malware. Retrieved February 21, 2023.

Internal MISP references

UUID 15a4d429-28c3-52be-aeb8-d94ad2743866 which can be used as unique global reference for spamhaus-malvertising in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-21T00:00:00Z
date_published 2023-02-02T00:00:00Z
source MITRE
title A surge of malvertising across Google Ads is distributing dangerous malware

Lua Proofpoint Sunseed

Raggi, Michael. Cass, Zydeca. The Proofpoint Threat Research Team.. (2022, March 1). Asylum Ambuscade: State Actor Uses Lua-based Sunseed Malware to Target European Governments and Refugee Movement. Retrieved August 5, 2024.

Internal MISP references

UUID 313e8333-0512-50d4-a7f6-4294dc935003 which can be used as unique global reference for Lua Proofpoint Sunseed in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-05T00:00:00Z
date_published 2022-03-01T00:00:00Z
source MITRE
title Asylum Ambuscade: State Actor Uses Lua-based Sunseed Malware to Target European Governments and Refugee Movement

Microsoft APC

Microsoft. (n.d.). Asynchronous Procedure Calls. Retrieved December 8, 2017.

Internal MISP references

UUID 37f1ef6c-fc0e-4e47-85ab-20d53caba77e which can be used as unique global reference for Microsoft APC in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-08T00:00:00Z
source MITRE
title Asynchronous Procedure Calls

Medium February 08 2023

Hack sydney. (2023, February 8). AsyncRAT: Analysing the Three Stages of Execution. Retrieved May 7, 2023.

Internal MISP references

UUID 86a69887-8d23-460f-9a51-96a10bfb3c29 which can be used as unique global reference for Medium February 08 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2023-02-08T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title AsyncRAT: Analysing the Three Stages of Execution

AsyncRAT Crusade: Detections and Defense | Splunk

Splunk-Blogs. (n.d.). AsyncRAT Crusade: Detections and Defense. Retrieved May 7, 2023.

Internal MISP references

UUID 2869d93c-d3fe-475e-adc9-ab6eb7e26c0f which can be used as unique global reference for AsyncRAT Crusade: Detections and Defense | Splunk in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title AsyncRAT Crusade: Detections and Defense

TechNet At

Microsoft. (n.d.). At. Retrieved April 28, 2016.

Internal MISP references

UUID 31b40c09-d68f-4889-b585-c077bd9cef28 which can be used as unique global reference for TechNet At in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-28T00:00:00Z
source MITRE
title At

Die.net Linux at Man Page

Thomas Koenig. (n.d.). at(1) - Linux man page. Retrieved December 19, 2017.

Internal MISP references

UUID 4bc1389d-9586-4dfc-a67c-58c6d3f6796a which can be used as unique global reference for Die.net Linux at Man Page in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-19T00:00:00Z
source MITRE
title at(1) - Linux man page

Linux at

IEEE/The Open Group. (2017). at(1p) — Linux manual page. Retrieved February 25, 2022.

Internal MISP references

UUID 3e3a84bc-ab6d-460d-8abc-cafae6eaaedd which can be used as unique global reference for Linux at in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-25T00:00:00Z
date_published 2017-01-01T00:00:00Z
source MITRE
title at(1p) — Linux manual page

PWC Pirpi Scanbox

Lancaster, T. (2015, July 25). A tale of Pirpi, Scanbox & CVE-2015-3113. Retrieved March 30, 2016.

Internal MISP references

UUID 4904261a-a3a9-4c3e-b6a7-079890026ee2 which can be used as unique global reference for PWC Pirpi Scanbox in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-03-30T00:00:00Z
date_published 2015-07-25T00:00:00Z
source MITRE
title A tale of Pirpi, Scanbox & CVE-2015-3113

Atbroker.exe - LOLBAS Project

LOLBAS. (2018, May 25). Atbroker.exe. Retrieved December 4, 2023.

Internal MISP references

UUID b0c21b56-6591-49c3-8e67-328ddb7b436d which can be used as unique global reference for Atbroker.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Atbroker.exe

ESET Attor Oct 2019

Hromcova, Z. (2019, October). AT COMMANDS, TOR-BASED COMMUNICATIONS: MEET ATTOR, A FANTASY CREATURE AND ALSO A SPY PLATFORM. Retrieved May 6, 2020.

Internal MISP references

UUID fdd57c56-d989-4a6f-8cc5-5b3713605dec which can be used as unique global reference for ESET Attor Oct 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-06T00:00:00Z
date_published 2019-10-01T00:00:00Z
source MITRE
title AT COMMANDS, TOR-BASED COMMUNICATIONS: MEET ATTOR, A FANTASY CREATURE AND ALSO A SPY PLATFORM

LogRhythm WannaCry

Noerenberg, E., Costis, A., and Quist, N. (2017, May 16). A Technical Analysis of WannaCry Ransomware. Retrieved March 25, 2019.

Internal MISP references

UUID 305d0742-154a-44af-8686-c6d8bd7f8636 which can be used as unique global reference for LogRhythm WannaCry in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-25T00:00:00Z
date_published 2017-05-16T00:00:00Z
source MITRE
title A Technical Analysis of WannaCry Ransomware

Malwarebytes Dyreza November 2015

hasherezade. (2015, November 4). A Technical Look At Dyreza. Retrieved June 15, 2020.

Internal MISP references

UUID 0a5719f2-8a88-44e2-81c5-2d16a39f1f8d which can be used as unique global reference for Malwarebytes Dyreza November 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-15T00:00:00Z
date_published 2015-11-04T00:00:00Z
source MITRE
title A Technical Look At Dyreza

At.exe - LOLBAS Project

LOLBAS. (2019, September 20). At.exe. Retrieved December 4, 2023.

Internal MISP references

UUID a31e1f5c-9b8d-4af4-875b-5c03d2400c12 which can be used as unique global reference for At.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2019-09-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title At.exe

ENSIL AtomBombing Oct 2016

Liberman, T. (2016, October 27). ATOMBOMBING: BRAND NEW CODE INJECTION FOR WINDOWS. Retrieved December 8, 2017.

Internal MISP references

UUID 9282dbab-391c-4ffd-ada9-1687413b686b which can be used as unique global reference for ENSIL AtomBombing Oct 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-08T00:00:00Z
date_published 2016-10-27T00:00:00Z
source MITRE
title ATOMBOMBING: BRAND NEW CODE INJECTION FOR WINDOWS

SentinelOne 5 3 2023

Phil Stokes. (2023, May 3). Atomic Stealer . Retrieved January 1, 2024.

Internal MISP references

UUID c4721cab-2895-48ed-bfde-748aa3c80209 which can be used as unique global reference for SentinelOne 5 3 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-01T00:00:00Z
date_published 2023-05-03T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Atomic Stealer

Malwarebytes 1 10 2024

Jerome Segura. (2024, January 10). Atomic Stealer rings in the new year with updated version . Retrieved January 11, 2024.

Internal MISP references

UUID 660de1b0-574d-48df-865a-257b8ed4b928 which can be used as unique global reference for Malwarebytes 1 10 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-11T00:00:00Z
date_published 2024-01-10T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Atomic Stealer rings in the new year with updated version

FireEye TRITON 2018

Miller, S. Reese, E. (2018, June 7). A Totally Tubular Treatise on TRITON and TriStation. Retrieved January 6, 2021.

Internal MISP references

UUID bfa5886a-a7f4-40d1-98d0-c3358abcf265 which can be used as unique global reference for FireEye TRITON 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-06T00:00:00Z
date_published 2018-06-07T00:00:00Z
source MITRE
title A Totally Tubular Treatise on TRITON and TriStation

The DFIR Report Truebot June 12 2023

The DFIR Report. (2023, June 12). A Truly Graceful Wipe Out. Retrieved June 15, 2023.

Internal MISP references

UUID a6311a66-bb36-4cad-a98f-2b0b89aafa3d which can be used as unique global reference for The DFIR Report Truebot June 12 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-15T00:00:00Z
date_published 2023-06-12T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title A Truly Graceful Wipe Out

DFIR Report Trickbot June 2023

The DFIR Report. (2023, June 12). A Truly Graceful Wipe Out. Retrieved May 31, 2024.

Internal MISP references

UUID b65988a7-3469-54d2-804c-e8ce1f698b5c which can be used as unique global reference for DFIR Report Trickbot June 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-31T00:00:00Z
date_published 2023-06-12T00:00:00Z
source MITRE
title A Truly Graceful Wipe Out

att_def_ps_logging

Hao, M. (2019, February 27). Attack and Defense Around PowerShell Event Logging. Retrieved November 24, 2021.

Internal MISP references

UUID 52212570-b1a6-4249-99d4-3bcf66c27140 which can be used as unique global reference for att_def_ps_logging in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-11-24T00:00:00Z
date_published 2019-02-27T00:00:00Z
source MITRE
title Attack and Defense Around PowerShell Event Logging

Attack chain leads to XWORM and AGENTTESLA | Elastic

Elastic Blog. (2023, April 7). Attack chain leads to XWORM and AGENTTESLA. Retrieved May 10, 2023.

Internal MISP references

UUID 9b32397b-58be-4275-a701-fe0351ff2982 which can be used as unique global reference for Attack chain leads to XWORM and AGENTTESLA | Elastic in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-10T00:00:00Z
date_published 2023-04-07T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Attack chain leads to XWORM and AGENTTESLA

Intezer TeamTNT September 2020

Fishbein, N. (2020, September 8). Attackers Abusing Legitimate Cloud Monitoring Tools to Conduct Cyber Attacks. Retrieved September 22, 2021.

Internal MISP references

UUID 1155a45e-86f4-497a-9a03-43b6dcb25202 which can be used as unique global reference for Intezer TeamTNT September 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-22T00:00:00Z
date_published 2020-09-08T00:00:00Z
source MITRE
title Attackers Abusing Legitimate Cloud Monitoring Tools to Conduct Cyber Attacks

Metcalf 2015

Metcalf, S. (2015, January 19). Attackers Can Now Use Mimikatz to Implant Skeleton Key on Domain Controllers & BackDoor Your Active Directory Forest. Retrieved February 3, 2015.

Internal MISP references

UUID 1c899028-466c-49b0-8d64-1a954c812508 which can be used as unique global reference for Metcalf 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-02-03T00:00:00Z
date_published 2015-01-19T00:00:00Z
source MITRE
title Attackers Can Now Use Mimikatz to Implant Skeleton Key on Domain Controllers & BackDoor Your Active Directory Forest

Cisco Blog Legacy Device Attacks

Omar Santos. (2020, October 19). Attackers Continue to Target Legacy Devices. Retrieved October 20, 2020.

Internal MISP references

UUID f7ce5099-7e04-4c0b-8767-e0eec664b18e which can be used as unique global reference for Cisco Blog Legacy Device Attacks in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
date_published 2020-10-19T00:00:00Z
source MITRE
title Attackers Continue to Target Legacy Devices

FireEye TRITON 2017

Johnson, B, et. al. (2017, December 14). Attackers Deploy New ICS Attack Framework "TRITON" and Cause Operational Disruption to Critical Infrastructure. Retrieved January 6, 2021.

Internal MISP references

UUID 597a4d8b-ffb2-4551-86db-b319f5a5b707 which can be used as unique global reference for FireEye TRITON 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-06T00:00:00Z
date_published 2017-12-14T00:00:00Z
source MITRE
title Attackers Deploy New ICS Attack Framework "TRITON" and Cause Operational Disruption to Critical Infrastructure

FireEye TRITON Dec 2017

Blake Johnson, Dan Caban, Marina Krotofil, Dan Scali, Nathan Brubaker, Christopher Glyer. (2017, December 14). Attackers Deploy New ICS Attack Framework “TRITON” and Cause Operational Disruption to Critical Infrastructure. Retrieved January 12, 2018.

Internal MISP references

UUID d4ca3351-eeb8-5342-8c85-806614e22c48 which can be used as unique global reference for FireEye TRITON Dec 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-12T00:00:00Z
date_published 2017-12-14T00:00:00Z
source MITRE
title Attackers Deploy New ICS Attack Framework “TRITON” and Cause Operational Disruption to Critical Infrastructure

Forbes GitHub Creds

Sandvik, R. (2014, January 14). Attackers Scrape GitHub For Cloud Service Credentials, Hijack Account To Mine Virtual Currency. Retrieved October 19, 2020.

Internal MISP references

UUID 303f8801-bdd6-4a0c-a90a-37867898c99c which can be used as unique global reference for Forbes GitHub Creds in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
date_published 2014-01-14T00:00:00Z
source MITRE
title Attackers Scrape GitHub For Cloud Service Credentials, Hijack Account To Mine Virtual Currency

GitHub Cloud Service Credentials

Runa A. Sandvik. (2014, January 14). Attackers Scrape GitHub For Cloud Service Credentials, Hijack Account To Mine Virtual Currency. Retrieved August 9, 2022.

Internal MISP references

UUID d2186b8c-10c9-493b-8e25-7d69fce006e4 which can be used as unique global reference for GitHub Cloud Service Credentials in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-09T00:00:00Z
date_published 2014-01-14T00:00:00Z
source MITRE
title Attackers Scrape GitHub For Cloud Service Credentials, Hijack Account To Mine Virtual Currency

Unit 42 Unsecured Docker Daemons

Chen, J.. (2020, January 29). Attacker's Tactics and Techniques in Unsecured Docker Daemons Revealed. Retrieved March 31, 2021.

Internal MISP references

UUID efcbbbdd-9af1-46c2-8538-3fd22f2b67d2 which can be used as unique global reference for Unit 42 Unsecured Docker Daemons in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-31T00:00:00Z
date_published 2020-01-29T00:00:00Z
source MITRE
title Attacker's Tactics and Techniques in Unsecured Docker Daemons Revealed

Talos Roblox Scam 2023

Tiago Pereira. (2023, November 2). Attackers use JavaScript URLs, API forms and more to scam users in popular online game “Roblox”. Retrieved January 2, 2024.

Internal MISP references

UUID 9371ee4a-ac23-5acb-af3f-132ef3645392 which can be used as unique global reference for Talos Roblox Scam 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-02T00:00:00Z
date_published 2023-11-02T00:00:00Z
source MITRE
title Attackers use JavaScript URLs, API forms and more to scam users in popular online game “Roblox”

Black Hills Attacking Exchange MailSniper, 2016

Bullock, B.. (2016, October 3). Attacking Exchange with MailSniper. Retrieved October 6, 2019.

Internal MISP references

UUID adedfddc-29b7-4245-aa67-cc590acb7434 which can be used as unique global reference for Black Hills Attacking Exchange MailSniper, 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-06T00:00:00Z
date_published 2016-10-03T00:00:00Z
source MITRE
title Attacking Exchange with MailSniper

SANS Attacking Kerberos Nov 2014

Medin, T. (2014, November). Attacking Kerberos - Kicking the Guard Dog of Hades. Retrieved March 22, 2018.

Internal MISP references

UUID f20d6bd0-d699-4ee4-8ef6-3c45ec12cd42 which can be used as unique global reference for SANS Attacking Kerberos Nov 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-22T00:00:00Z
date_published 2014-11-01T00:00:00Z
source MITRE
title Attacking Kerberos - Kicking the Guard Dog of Hades

NetSPI SQL Server CLR

Sutherland, S. (2017, July 13). Attacking SQL Server CLR Assemblies. Retrieved September 12, 2024.

Internal MISP references

UUID 6f3d8c89-9d5d-4754-98d5-44fe3a5dd0d5 which can be used as unique global reference for NetSPI SQL Server CLR in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2017-07-13T00:00:00Z
source MITRE
title Attacking SQL Server CLR Assemblies

Mandiant FIN5 GrrCON Oct 2016

Bromiley, M. and Lewis, P. (2016, October 7). Attacking the Hospitality and Gaming Industries: Tracking an Attacker Around the World in 7 Years. Retrieved October 6, 2017.

Internal MISP references

UUID 2bd39baf-4223-4344-ba93-98aa8453dc11 which can be used as unique global reference for Mandiant FIN5 GrrCON Oct 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-10-06T00:00:00Z
date_published 2016-10-07T00:00:00Z
source MITRE
title Attacking the Hospitality and Gaming Industries: Tracking an Attacker Around the World in 7 Years

Attacking VNC Servers PentestLab

Administrator, Penetration Testing Lab. (2012, October 30). Attacking VNC Servers. Retrieved October 6, 2021.

Internal MISP references

UUID f953ea41-f9ca-4f4e-a46f-ef1d2def1d07 which can be used as unique global reference for Attacking VNC Servers PentestLab in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-06T00:00:00Z
date_published 2012-10-30T00:00:00Z
source MITRE
title Attacking VNC Servers

Talos Template Injection July 2017

Baird, S. et al.. (2017, July 7). Attack on Critical Infrastructure Leverages Template Injection. Retrieved July 21, 2018.

Internal MISP references

UUID 175ea537-2a94-42c7-a83b-bec8906ee6b9 which can be used as unique global reference for Talos Template Injection July 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-21T00:00:00Z
date_published 2017-07-07T00:00:00Z
source MITRE
title Attack on Critical Infrastructure Leverages Template Injection

Lotus Blossom Dec 2015

Falcone, R. and Miller-Osborn, J.. (2015, December 18). Attack on French Diplomat Linked to Operation Lotus Blossom. Retrieved February 15, 2016.

Internal MISP references

UUID dcbe51a0-6d63-4401-b19e-46cd3c42204c which can be used as unique global reference for Lotus Blossom Dec 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-02-15T00:00:00Z
date_published 2015-12-18T00:00:00Z
source MITRE
title Attack on French Diplomat Linked to Operation Lotus Blossom

Symantec Attacks Against Government Sector

Symantec. (2021, June 10). Attacks Against the Government Sector. Retrieved September 28, 2021.

Internal MISP references

UUID f5940cc2-1bbd-4e42-813a-f50867b01035 which can be used as unique global reference for Symantec Attacks Against Government Sector in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-28T00:00:00Z
date_published 2021-06-10T00:00:00Z
source MITRE
title Attacks Against the Government Sector

Aqua Security Cloud Native Threat Report June 2021

Team Nautilus. (2021, June). Attacks in the Wild on the Container Supply Chain and Infrastructure. Retrieved August 26, 2021.

Internal MISP references

UUID be9652d5-7531-4143-9c44-aefd019b7a32 which can be used as unique global reference for Aqua Security Cloud Native Threat Report June 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-26T00:00:00Z
date_published 2021-06-01T00:00:00Z
source MITRE
title Attacks in the Wild on the Container Supply Chain and Infrastructure

CERT-FR PYSA April 2020

CERT-FR. (2020, April 1). ATTACKS INVOLVING THE MESPINOZA/PYSA RANSOMWARE. Retrieved March 1, 2021.

Internal MISP references

UUID 4e502db6-2e09-4422-9dcc-1e10e701e122 which can be used as unique global reference for CERT-FR PYSA April 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-01T00:00:00Z
date_published 2020-04-01T00:00:00Z
source MITRE
title ATTACKS INVOLVING THE MESPINOZA/PYSA RANSOMWARE

InsiderThreat NTFS EA Oct 2017

Sander, J. (2017, October 12). Attack Step 3: Persistence with NTFS Extended Attributes – File System Attacks. Retrieved March 21, 2018.

Internal MISP references

UUID 6d270128-0461-43ec-8925-204c7b5aacc9 which can be used as unique global reference for InsiderThreat NTFS EA Oct 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-21T00:00:00Z
date_published 2017-10-12T00:00:00Z
source MITRE
title Attack Step 3: Persistence with NTFS Extended Attributes – File System Attacks

Microsoft ASR Obfuscation

Microsoft. (2023, February 22). Attack surface reduction (ASR) rules reference: Block execution of potentially obfuscated scripts. Retrieved March 17, 2023.

Internal MISP references

UUID dec646d4-8b32-5091-b097-abe887aeca96 which can be used as unique global reference for Microsoft ASR Obfuscation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-17T00:00:00Z
date_published 2023-02-22T00:00:00Z
source MITRE
title Attack surface reduction (ASR) rules reference: Block execution of potentially obfuscated scripts

Obfuscated scripts

Microsoft. (2024, March 4). Attack surface reduction rules reference. Retrieved March 29, 2024.

Internal MISP references

UUID 2b4dcb27-f32e-50f0-83e0-350659e49f0b which can be used as unique global reference for Obfuscated scripts in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-29T00:00:00Z
date_published 2024-03-04T00:00:00Z
source MITRE
title Attack surface reduction rules reference

Sophos News August 27 2024

Andreas Klopsch. (2024, August 27). Attack tool update impairs Windows computers. Retrieved August 30, 2024.

Internal MISP references

UUID af1dfc7b-fdc2-448f-a4bf-34f8ee7d55bc which can be used as unique global reference for Sophos News August 27 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-30T00:00:00Z
date_published 2024-08-27T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Attack tool update impairs Windows computers

TrendMicro Msiexec Feb 2018

Co, M. and Sison, G. (2018, February 8). Attack Using Windows Installer msiexec.exe leads to LokiBot. Retrieved April 18, 2019.

Internal MISP references

UUID 768c99f3-ee28-47dc-bc33-06d50ac72dea which can be used as unique global reference for TrendMicro Msiexec Feb 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-18T00:00:00Z
date_published 2018-02-08T00:00:00Z
source MITRE
title Attack Using Windows Installer msiexec.exe leads to LokiBot

GitHub ATTACK Empire

Stepanic, D. (2018, September 2). attck_empire: Generate ATT&CK Navigator layer file from PowerShell Empire agent logs. Retrieved March 11, 2019.

Internal MISP references

UUID b3d6bb33-2b23-4c0a-b8fa-e002a5c7edfc which can be used as unique global reference for GitHub ATTACK Empire in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-11T00:00:00Z
date_published 2018-09-02T00:00:00Z
source MITRE
title attck_empire: Generate ATT&CK Navigator layer file from PowerShell Empire agent logs

lambert systemd 2022

Tony Lambert. (2022, November 13). ATT&CK T1501: Understanding systemd service persistence. Retrieved March 20, 2023.

Internal MISP references

UUID 196f0c77-4c98-57e7-ad79-eb43bdd2c848 which can be used as unique global reference for lambert systemd 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-20T00:00:00Z
date_published 2022-11-13T00:00:00Z
source MITRE
title ATT&CK T1501: Understanding systemd service persistence

TechNet Credential Theft

Microsoft. (2016, April 15). Attractive Accounts for Credential Theft. Retrieved June 3, 2016.

Internal MISP references

UUID 5c183c97-0ab2-4b75-8dbc-9db92a929ff4 which can be used as unique global reference for TechNet Credential Theft in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-03T00:00:00Z
date_published 2016-04-15T00:00:00Z
source MITRE
title Attractive Accounts for Credential Theft

AcidRain State Department 2022

Antony J. Blinken, US Department of State. (2022, May 10). Attribution of Russia’s Malicious Cyber Activity Against Ukraine. Retrieved March 25, 2024.

Internal MISP references

UUID 9d514c52-9def-5b11-aa06-fdf3ee9923ed which can be used as unique global reference for AcidRain State Department 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-25T00:00:00Z
date_published 2022-05-10T00:00:00Z
source MITRE
title Attribution of Russia’s Malicious Cyber Activity Against Ukraine

Audit OSX

Gagliardi, R. (n.d.). Audit in a OS X System. Retrieved September 23, 2021.

Internal MISP references

UUID c5181c95-0a94-4ea0-9940-04a9663d0069 which can be used as unique global reference for Audit OSX in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-23T00:00:00Z
source MITRE
title Audit in a OS X System

Microsoft Audit Logon Events

Microsoft. (2021, September 6). Audit logon events. Retrieved September 28, 2021.

Internal MISP references

UUID 050d6da7-a78c-489d-8bef-b06d802b55d7 which can be used as unique global reference for Microsoft Audit Logon Events in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-28T00:00:00Z
date_published 2021-09-06T00:00:00Z
source MITRE
title Audit logon events

Cloud Audit Logs

Google. (n.d.). Audit Logs. Retrieved June 1, 2020.

Internal MISP references

UUID 500bdcea-5f49-4949-80fb-5eec1ce5e09e which can be used as unique global reference for Cloud Audit Logs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-01T00:00:00Z
source MITRE
title Audit Logs

Microsoft Scheduled Task Events Win10

Microsoft. (2017, May 28). Audit Other Object Access Events. Retrieved June 27, 2019.

Internal MISP references

UUID 79e54b41-69ba-4738-86ef-88c4f540bce3 which can be used as unique global reference for Microsoft Scheduled Task Events Win10 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-27T00:00:00Z
date_published 2017-05-28T00:00:00Z
source MITRE
title Audit Other Object Access Events

auditpol

Jason Gerend, et al. (2017, October 16). auditpol. Retrieved September 1, 2021.

Internal MISP references

UUID 20d18ecf-d7d3-4433-9a3c-c28be71de4b1 which can be used as unique global reference for auditpol in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-01T00:00:00Z
date_published 2017-10-16T00:00:00Z
source MITRE
title auditpol

auditpol.exe_STRONTIC

STRONTIC. (n.d.). auditpol.exe. Retrieved September 9, 2021.

Internal MISP references

UUID c8a305b3-cd17-4415-a740-32787da703cd which can be used as unique global reference for auditpol.exe_STRONTIC in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-09T00:00:00Z
source MITRE
title auditpol.exe

Audit_Policy_Microsoft

Daniel Simpson. (2017, April 19). Audit Policy. Retrieved September 13, 2021.

Internal MISP references

UUID 9ff43f64-7fcb-4aa3-9599-9d00774d8da5 which can be used as unique global reference for Audit_Policy_Microsoft in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-13T00:00:00Z
date_published 2017-04-19T00:00:00Z
source MITRE
title Audit Policy

TechNet Audit Policy

Microsoft. (2016, April 15). Audit Policy Recommendations. Retrieved June 3, 2016.

Internal MISP references

UUID 406cd8ff-e539-4853-85ed-775726155cf1 which can be used as unique global reference for TechNet Audit Policy in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-03T00:00:00Z
date_published 2016-04-15T00:00:00Z
source MITRE
title Audit Policy Recommendations

Microsoft Audit Registry July 2012

Microsoft. (2012, July 2). Audit Registry. Retrieved January 31, 2018.

Internal MISP references

UUID 4e95ad81-cbc4-4f66-ba95-fb781d7d9c3c which can be used as unique global reference for Microsoft Audit Registry July 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-31T00:00:00Z
date_published 2012-07-02T00:00:00Z
source MITRE
title Audit Registry

audits linikatz

Wadhwa-Brown, Tim. (2022). audit.rules. Retrieved September 17, 2024.

Internal MISP references

UUID b9f940cf-74fb-5a33-992c-82bdb538adbb which can be used as unique global reference for audits linikatz in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-17T00:00:00Z
date_published 2022-01-01T00:00:00Z
source MITRE
title audit.rules

Security Affairs Elderwood Sept 2012

Paganini, P. (2012, September 9). Elderwood project, who is behind Op. Aurora and ongoing attacks?. Retrieved February 13, 2018.

Internal MISP references

UUID ebfc56c5-0490-4b91-b49f-548c00a59162 which can be used as unique global reference for Security Affairs Elderwood Sept 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-13T00:00:00Z
source MITRE
title Aurora and ongoing attacks?

Australia ‘Evil Twin’

Toulas, Bill. (2024, July 1). Australian charged for ‘Evil Twin’ WiFi attack on plane. Retrieved September 17, 2024.

Internal MISP references

UUID b50c354b-cdca-57e6-b8d6-a43ee334f091 which can be used as unique global reference for Australia ‘Evil Twin’ in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-17T00:00:00Z
date_published 2024-07-01T00:00:00Z
source MITRE
title Australian charged for ‘Evil Twin’ WiFi attack on plane

NIST Authentication

NIST. (n.d.). Authentication. Retrieved January 30, 2020.

Internal MISP references

UUID f3cfb9b9-62f4-4066-a2b9-7e6f25bd7a46 which can be used as unique global reference for NIST Authentication in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-01-30T00:00:00Z
source MITRE
title Authentication

MSDN Authentication Packages

Microsoft. (n.d.). Authentication Packages. Retrieved March 1, 2017.

Internal MISP references

UUID e9bb8434-9b6d-4301-bfe2-5c83ceabb020 which can be used as unique global reference for MSDN Authentication Packages in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-01T00:00:00Z
source MITRE
title Authentication Packages

Microsoft Authenticode

Microsoft. (n.d.). Authenticode. Retrieved January 31, 2018.

Internal MISP references

UUID 33efd1a3-ffe9-42b3-ae12-970ed11454bf which can be used as unique global reference for Microsoft Authenticode in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-31T00:00:00Z
source MITRE
title Authenticode

K8s Authorization Overview

Kubernetes. (n.d.). Authorization Overview. Retrieved June 24, 2021.

Internal MISP references

UUID 120f968a-c81f-4902-9b76-7544577b768d which can be used as unique global reference for K8s Authorization Overview in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-24T00:00:00Z
source MITRE
title Authorization Overview

SSH Authorized Keys

ssh.com. (n.d.). Authorized_keys File in SSH. Retrieved June 24, 2020.

Internal MISP references

UUID ff100b76-894e-4d7c-9b8d-5f0eedcf59cc which can be used as unique global reference for SSH Authorized Keys in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-24T00:00:00Z
source MITRE
title Authorized_keys File in SSH

Trend Micro njRAT 2018

Pascual, C. (2018, November 27). AutoIt-Compiled Worm Affecting Removable Media Delivers Fileless Version of BLADABINDI/njRAT Backdoor. Retrieved June 4, 2019.

Internal MISP references

UUID d8e7b428-84dd-4d96-b3f3-70e7ed7f8271 which can be used as unique global reference for Trend Micro njRAT 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-04T00:00:00Z
date_published 2018-11-27T00:00:00Z
source MITRE
title AutoIt-Compiled Worm Affecting Removable Media Delivers Fileless Version of BLADABINDI/njRAT Backdoor

Re-Open windows on Mac

Apple. (2016, December 6). Automatically re-open windows, apps, and documents on your Mac. Retrieved July 11, 2017.

Internal MISP references

UUID ed907f1e-71d6-45db-8ef3-75bec59c238b which can be used as unique global reference for Re-Open windows on Mac in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-11T00:00:00Z
date_published 2016-12-06T00:00:00Z
source MITRE
title Automatically re-open windows, apps, and documents on your Mac

TechNet Autoruns

Russinovich, M. (2016, January 4). Autoruns for Windows v13.51. Retrieved June 6, 2016.

Internal MISP references

UUID 709f4509-9d69-4033-8aa6-a947496a1703 which can be used as unique global reference for TechNet Autoruns in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-06T00:00:00Z
date_published 2016-01-04T00:00:00Z
source MITRE
title Autoruns for Windows v13.51

Autoruns for Windows

Mark Russinovich. (2019, June 28). Autoruns for Windows v13.96. Retrieved March 13, 2020.

Internal MISP references

UUID aaf66ad0-c444-48b5-875f-a0f66b82031c which can be used as unique global reference for Autoruns for Windows in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-13T00:00:00Z
date_published 2019-06-28T00:00:00Z
source MITRE
title Autoruns for Windows v13.96

Hornet Security Avaddon June 2020

Security Lab. (2020, June 5). Avaddon: From seeking affiliates to in-the-wild in 2 days. Retrieved August 19, 2021.

Internal MISP references

UUID 41377d56-2e7b-48a8-8561-681e04a65907 which can be used as unique global reference for Hornet Security Avaddon June 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-19T00:00:00Z
date_published 2020-06-05T00:00:00Z
source MITRE
title Avaddon: From seeking affiliates to in-the-wild in 2 days

Arxiv Avaddon Feb 2021

Yuste, J. Pastrana, S. (2021, February 9). Avaddon ransomware: an in-depth analysis and decryption of infected systems. Retrieved August 19, 2021.

Internal MISP references

UUID dbee8e7e-f477-4bd5-8225-84e0e222617e which can be used as unique global reference for Arxiv Avaddon Feb 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-19T00:00:00Z
date_published 2021-02-09T00:00:00Z
source MITRE
title Avaddon ransomware: an in-depth analysis and decryption of infected systems

CISA Phishing

CISA. (2021, February 1). Avoiding Social Engineering and Phishing Attacks. Retrieved September 8, 2023.

Internal MISP references

UUID 0c98bf66-f43c-5b09-ae43-d10c682f51e7 which can be used as unique global reference for CISA Phishing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-08T00:00:00Z
date_published 2021-02-01T00:00:00Z
source MITRE
title Avoiding Social Engineering and Phishing Attacks

Malwarebytes AvosLocker Jul 2021

Hasherezade. (2021, July 23). AvosLocker enters the ransomware scene, asks for partners. Retrieved January 11, 2023.

Internal MISP references

UUID 88dffb14-a7a7-5b36-b269-8283dec0f1a3 which can be used as unique global reference for Malwarebytes AvosLocker Jul 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-01-11T00:00:00Z
date_published 2021-07-23T00:00:00Z
source MITRE
title AvosLocker enters the ransomware scene, asks for partners

avoslocker_ransomware

Lakshmanan, R. (2022, May 2). AvosLocker Ransomware Variant Using New Trick to Disable Antivirus Protection. Retrieved May 17, 2022.

Internal MISP references

UUID ea2756ce-a183-4c80-af11-92374ad045b2 which can be used as unique global reference for avoslocker_ransomware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-17T00:00:00Z
date_published 2022-05-02T00:00:00Z
source MITRE
title AvosLocker Ransomware Variant Using New Trick to Disable Antivirus Protection

Cisco Talos Avos Jun 2022

Venere, G. Neal, C. (2022, June 21). Avos ransomware group expands with new attack arsenal. Retrieved January 11, 2023.

Internal MISP references

UUID 1170fdc2-6d8e-5b60-bf9e-ca915790e534 which can be used as unique global reference for Cisco Talos Avos Jun 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-01-11T00:00:00Z
date_published 2022-06-21T00:00:00Z
source MITRE
title Avos ransomware group expands with new attack arsenal

Awesome Executable Packing

Alexandre D'Hondt. (n.d.). Awesome Executable Packing. Retrieved March 11, 2022.

Internal MISP references

UUID 565bf600-5657-479b-9678-803e991c88a5 which can be used as unique global reference for Awesome Executable Packing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-11T00:00:00Z
source MITRE
title Awesome Executable Packing

ESET Kobalos Jan 2021

M.Leveille, M., Sanmillan, I. (2021, January). A WILD KOBALOS APPEARS Tricksy Linux malware goes after HPCs. Retrieved August 24, 2021.

Internal MISP references

UUID 745e963e-33fd-40d4-a8c6-1a9f321017f4 which can be used as unique global reference for ESET Kobalos Jan 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-24T00:00:00Z
date_published 2021-01-01T00:00:00Z
source MITRE
title A WILD KOBALOS APPEARS Tricksy Linux malware goes after HPCs

AWS Root User

Amazon. (n.d.). AWS Account Root User. Retrieved April 5, 2021.

Internal MISP references

UUID 5f315c21-f02f-4c9e-aac6-d648deff3ff9 which can be used as unique global reference for AWS Root User in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-05T00:00:00Z
source MITRE
title AWS Account Root User

GitHub AWS-ADFS-Credential-Generator

Damian Hickey. (2017, January 28). AWS-ADFS-Credential-Generator. Retrieved September 27, 2024.

Internal MISP references

UUID 340a3a20-0ee1-4fd8-87ab-10ac0d2a50c8 which can be used as unique global reference for GitHub AWS-ADFS-Credential-Generator in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-27T00:00:00Z
date_published 2017-01-28T00:00:00Z
source MITRE
title AWS-ADFS-Credential-Generator

AWS GetPasswordPolicy

Amazon Web Services. (n.d.). AWS API GetAccountPasswordPolicy. Retrieved June 8, 2021.

Internal MISP references

UUID dd44d565-b9d9-437e-a31a-a52c6a21e3b3 which can be used as unique global reference for AWS GetPasswordPolicy in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-08T00:00:00Z
source MITRE
title AWS API GetAccountPasswordPolicy

AWS Console Sign-in Events

Amazon. (n.d.). AWS Console Sign-in Events. Retrieved October 23, 2019.

Internal MISP references

UUID 72578d0b-f68a-40fa-9a5d-379a66792be8 which can be used as unique global reference for AWS Console Sign-in Events in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-23T00:00:00Z
source MITRE
title AWS Console Sign-in Events

AWS Describe DB Instances

Amazon Web Services. (n.d.). Retrieved May 28, 2021.

Internal MISP references

UUID 85bda17d-7b7c-4d0e-a0d2-2adb5f0a6b82 which can be used as unique global reference for AWS Describe DB Instances in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-05-28T00:00:00Z
source MITRE
title AWS Describe DB Instances

AWS Get Bucket ACL

Amazon Web Services. (n.d.). Retrieved May 28, 2021.

Internal MISP references

UUID 1eddbd32-8314-4f95-812a-550904eac2fa which can be used as unique global reference for AWS Get Bucket ACL in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-05-28T00:00:00Z
source MITRE
title AWS Get Bucket ACL

AWS Get Public Access Block

Amazon Web Services. (n.d.). Retrieved May 28, 2021.

Internal MISP references

UUID f2887980-569a-4bc2-949e-bd8ff266c43c which can be used as unique global reference for AWS Get Public Access Block in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-05-28T00:00:00Z
source MITRE
title AWS Get Public Access Block

AWS Head Bucket

Amazon Web Services. (n.d.). AWS HeadBucket. Retrieved February 14, 2022.

Internal MISP references

UUID 1388a78e-9f86-4927-a619-e0fcbac5b7a1 which can be used as unique global reference for AWS Head Bucket in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-14T00:00:00Z
source MITRE
title AWS HeadBucket

Rhino Security Labs AWS Privilege Escalation

Spencer Gietzen. (n.d.). AWS IAM Privilege Escalation – Methods and Mitigation. Retrieved May 27, 2022.

Internal MISP references

UUID 693e5783-4aa1-40ce-8080-cec01c3e7b59 which can be used as unique global reference for Rhino Security Labs AWS Privilege Escalation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-27T00:00:00Z
source MITRE
title AWS IAM Privilege Escalation – Methods and Mitigation

AWS Lambda Redirector

Adam Chester. (2020, February 25). AWS Lambda Redirector. Retrieved July 8, 2022.

Internal MISP references

UUID 9ba87a5d-a140-4959-9905-c4a80e684d56 which can be used as unique global reference for AWS Lambda Redirector in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-08T00:00:00Z
date_published 2020-02-25T00:00:00Z
source MITRE
title AWS Lambda Redirector

Sysdig AMBERSQUID September 18 2023

Alessandro Brucato. (2023, September 18). AWS’s Hidden Threat: AMBERSQUID Cloud-Native Cryptojacking Operation. Retrieved April 11, 2024.

Internal MISP references

UUID 7ffa880f-5854-4b8a-83f5-da42c1c39345 which can be used as unique global reference for Sysdig AMBERSQUID September 18 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-11T00:00:00Z
date_published 2023-09-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title AWS’s Hidden Threat: AMBERSQUID Cloud-Native Cryptojacking Operation

Rhino Security Labs AWS S3 Ransomware

Spencer Gietzen. (n.d.). AWS Simple Storage Service S3 Ransomware Part 2: Prevention and Defense. Retrieved March 21, 2023.

Internal MISP references

UUID 785c6b11-c5f0-5cb4-931b-cf75fcc368a1 which can be used as unique global reference for Rhino Security Labs AWS S3 Ransomware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-21T00:00:00Z
source MITRE
title AWS Simple Storage Service S3 Ransomware Part 2: Prevention and Defense

AWS Systems Manager Run Command

AWS. (n.d.). AWS Systems Manager Run Command. Retrieved March 13, 2023.

Internal MISP references

UUID ef66f17b-6a5b-5eb8-83de-943e2bddd114 which can be used as unique global reference for AWS Systems Manager Run Command in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-13T00:00:00Z
source MITRE
title AWS Systems Manager Run Command

Pylos Xenotime 2019

Slowik, J.. (2019, April 12). A XENOTIME to Remember: Veles in the Wild. Retrieved April 16, 2019.

Internal MISP references

UUID e2f246d8-c75e-4e0f-bba8-869d82be26da which can be used as unique global reference for Pylos Xenotime 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-16T00:00:00Z
date_published 2019-04-12T00:00:00Z
source MITRE
title A XENOTIME to Remember: Veles in the Wild

objective-see ay mami 2018

Patrick Wardle. (2018, January 11). Ay MaMi. Retrieved March 19, 2018.

Internal MISP references

UUID 1b1d656c-4fe6-47d1-9ce5-a70c33003507 which can be used as unique global reference for objective-see ay mami 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-19T00:00:00Z
date_published 2018-01-11T00:00:00Z
source MITRE
title Ay MaMi

Microsoft AZ CLI

Microsoft. (n.d.). az ad user. Retrieved October 6, 2019.

Internal MISP references

UUID cfd94553-272b-466b-becb-3859942bcaa5 which can be used as unique global reference for Microsoft AZ CLI in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-06T00:00:00Z
source MITRE
title az ad user

Intezer Russian APT Dec 2020

Kennedy, J. (2020, December 9). A Zebra in Gopher's Clothing: Russian APT Uses COVID-19 Lures to Deliver Zebrocy. Retrieved February 22, 2021.

Internal MISP references

UUID 88d8a3b7-d994-4fd2-9aa1-83b79bccda7e which can be used as unique global reference for Intezer Russian APT Dec 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-22T00:00:00Z
date_published 2020-12-09T00:00:00Z
source MITRE
title A Zebra in Gopher's Clothing: Russian APT Uses COVID-19 Lures to Deliver Zebrocy

az monitor diagnostic-settings

Microsoft. (n.d.). az monitor diagnostic-settings. Retrieved October 16, 2020.

Internal MISP references

UUID 6ddd92ee-1014-4b7a-953b-18ac396b100e which can be used as unique global reference for az monitor diagnostic-settings in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-16T00:00:00Z
source MITRE
title az monitor diagnostic-settings

Microsoft Azure AD Security Operations for Devices

Microsoft. (2020, September 16). Azure Active Directory security operations for devices. Retrieved February 21, 2023.

Internal MISP references

UUID eeba5eab-a9d8-55c0-b555-0414f65d2c2d which can be used as unique global reference for Microsoft Azure AD Security Operations for Devices in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-21T00:00:00Z
date_published 2020-09-16T00:00:00Z
source MITRE
title Azure Active Directory security operations for devices

Microsoft Azure Active Directory security operations guide

Microsoft . (2022, September 16). Azure Active Directory security operations guide. Retrieved February 21, 2023.

Internal MISP references

UUID b75a3f28-a028-50e6-b971-cc85e7d52e0c which can be used as unique global reference for Microsoft Azure Active Directory security operations guide in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-21T00:00:00Z
date_published 2022-09-16T00:00:00Z
source MITRE
title Azure Active Directory security operations guide

Azure AD Connect for Read Teamers

Adam Chester. (2019, February 18). Azure AD Connect for Red Teamers. Retrieved September 28, 2022.

Internal MISP references

UUID 0b9946ff-8c1c-4d93-8401-e1e4dd186305 which can be used as unique global reference for Azure AD Connect for Read Teamers in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-28T00:00:00Z
date_published 2019-02-18T00:00:00Z
source MITRE
title Azure AD Connect for Red Teamers

Microsoft - Azure PowerShell

Microsoft. (2014, December 12). Azure/azure-powershell. Retrieved March 24, 2023.

Internal MISP references

UUID 3b17b649-9efa-525f-aa49-cf6c9ad559d7 which can be used as unique global reference for Microsoft - Azure PowerShell in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-24T00:00:00Z
date_published 2014-12-12T00:00:00Z
source MITRE
title Azure/azure-powershell

Azure Blob Storage

Microsoft. (n.d.). Azure Blob Storage. Retrieved October 13, 2021.

Internal MISP references

UUID 7a392b85-872a-4a5a-984c-185a8e8f8a3f which can be used as unique global reference for Azure Blob Storage in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-13T00:00:00Z
source MITRE
title Azure Blob Storage

Microsoft Azure Instance Metadata 2021

Microsoft. (2021, February 21). Azure Instance Metadata Service (Windows). Retrieved April 2, 2021.

Internal MISP references

UUID 66e93b75-0067-4cdb-b695-8f8109ef26e0 which can be used as unique global reference for Microsoft Azure Instance Metadata 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-02T00:00:00Z
date_published 2021-02-21T00:00:00Z
source MITRE
title Azure Instance Metadata Service (Windows)

Microsoft Azure Policy

Microsoft. (2023, August 30). Azure Policy built-in policy definitions. Retrieved September 5, 2023.

Internal MISP references

UUID 761d102e-768a-5536-a098-0b1819029d33 which can be used as unique global reference for Microsoft Azure Policy in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-05T00:00:00Z
date_published 2023-08-30T00:00:00Z
source MITRE
title Azure Policy built-in policy definitions

SpecterOps Azure Privilege Escalation

Andy Robbins. (2021, October 12). Azure Privilege Escalation via Service Principal Abuse. Retrieved April 1, 2022.

Internal MISP references

UUID 5dba5a6d-465e-4489-bc4d-299a891b62f6 which can be used as unique global reference for SpecterOps Azure Privilege Escalation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-01T00:00:00Z
date_published 2021-10-12T00:00:00Z
source MITRE
title Azure Privilege Escalation via Service Principal Abuse

Azure Products

Microsoft. (n.d.). Azure products. Retrieved October 13, 2021.

Internal MISP references

UUID 12a72e05-ada4-4f77-8d6e-03024f88cab6 which can be used as unique global reference for Azure Products in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-13T00:00:00Z
source MITRE
title Azure products

Azure - Resource Manager API

Microsoft. (2019, May 20). Azure Resource Manager. Retrieved June 17, 2020.

Internal MISP references

UUID 223cc020-e88a-4236-9c34-64fe606a1729 which can be used as unique global reference for Azure - Resource Manager API in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-17T00:00:00Z
date_published 2019-05-20T00:00:00Z
source MITRE
title Azure Resource Manager

Mandiant Azure Run Command 2021

Adrien Bataille, Anders Vejlby, Jared Scott Wilson, and Nader Zaveri. (2021, December 14). Azure Run Command for Dummies. Retrieved March 13, 2023.

Internal MISP references

UUID e15d38de-bc15-525b-bd03-27c0edca768d which can be used as unique global reference for Mandiant Azure Run Command 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-13T00:00:00Z
date_published 2021-12-14T00:00:00Z
source MITRE
title Azure Run Command for Dummies

Microsoft Azure security baseline for Azure Active Directory

Microsoft. (2022, November 14). Azure security baseline for Azure Active Directory. Retrieved February 21, 2023.

Internal MISP references

UUID 2bc66dc9-2ed2-52ad-8ae2-5497be3b0c53 which can be used as unique global reference for Microsoft Azure security baseline for Azure Active Directory in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-21T00:00:00Z
date_published 2022-11-14T00:00:00Z
source MITRE
title Azure security baseline for Azure Active Directory

Microsoft - Azure Sentinel ADFSDomainTrustMods

Microsoft. (2020, December). Azure Sentinel Detections. Retrieved December 30, 2020.

Internal MISP references

UUID 34314090-33c2-4276-affa-3d0b527bbcef which can be used as unique global reference for Microsoft - Azure Sentinel ADFSDomainTrustMods in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-30T00:00:00Z
date_published 2020-12-01T00:00:00Z
source MITRE
title Azure Sentinel Detections

Azure Serial Console

Microsoft. (2022, October 17). Azure Serial Console. Retrieved June 2, 2023.

Internal MISP references

UUID fd75d136-e818-5233-b2c2-5d8ed033b9e6 which can be used as unique global reference for Azure Serial Console in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-02T00:00:00Z
date_published 2022-10-17T00:00:00Z
source MITRE
title Azure Serial Console

Microsoft Azure Storage Security, 2019

Amlekar, M., Brooks, C., Claman, L., et. al.. (2019, March 20). Azure Storage security guide. Retrieved October 4, 2019.

Internal MISP references

UUID 95bda448-bb13-4fa6-b663-e48a9d1b866f which can be used as unique global reference for Microsoft Azure Storage Security, 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-04T00:00:00Z
date_published 2019-03-20T00:00:00Z
source MITRE
title Azure Storage security guide

Azure - Stormspotter

Microsoft. (2020). Azure Stormspotter GitHub. Retrieved June 17, 2020.

Internal MISP references

UUID 42383ed1-9705-4313-8068-28a22a23f50e which can be used as unique global reference for Azure - Stormspotter in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-17T00:00:00Z
date_published 2020-01-01T00:00:00Z
source MITRE
title Azure Stormspotter GitHub

Medium Babuk February 2021

Sebdraven. (2021, February 8). Babuk is distributed packed. Retrieved August 11, 2021.

Internal MISP references

UUID 58759b1c-8e2c-44fa-8e37-8bf7325c330d which can be used as unique global reference for Medium Babuk February 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-11T00:00:00Z
date_published 2021-02-08T00:00:00Z
source MITRE
title Babuk is distributed packed

Sogeti CERT ESEC Babuk March 2021

Sogeti. (2021, March). Babuk Ransomware. Retrieved August 11, 2021.

Internal MISP references

UUID e85e3bd9-6ddc-4d0f-a16c-b525a75baa7e which can be used as unique global reference for Sogeti CERT ESEC Babuk March 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-11T00:00:00Z
date_published 2021-03-01T00:00:00Z
source MITRE
title Babuk Ransomware

Unit42 BabyShark Apr 2019

Lim, M.. (2019, April 26). BabyShark Malware Part Two – Attacks Continue Using KimJongRAT and PCRat . Retrieved October 7, 2019.

Internal MISP references

UUID c020569d-9c85-45fa-9f0b-97be5bdbab08 which can be used as unique global reference for Unit42 BabyShark Apr 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-07T00:00:00Z
date_published 2019-04-26T00:00:00Z
source MITRE
title BabyShark Malware Part Two – Attacks Continue Using KimJongRAT and PCRat

Symantec Briba May 2012

Ladley, F. (2012, May 15). Backdoor.Briba. Retrieved February 21, 2018.

Internal MISP references

UUID bcf0f82b-1b26-4c0c-905e-0dd8b88d0903 which can be used as unique global reference for Symantec Briba May 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-21T00:00:00Z
date_published 2012-05-15T00:00:00Z
source MITRE
title Backdoor.Briba

TrendMicro Squiblydoo Aug 2017

Bermejo, L., Giagone, R., Wu, R., and Yarochkin, F. (2017, August 7). Backdoor-carrying Emails Set Sights on Russian-speaking Businesses. Retrieved March 7, 2019.

Internal MISP references

UUID efeb475c-2a7c-4ab6-814d-3ee7866fa322 which can be used as unique global reference for TrendMicro Squiblydoo Aug 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-07T00:00:00Z
date_published 2017-08-07T00:00:00Z
source MITRE
title Backdoor-carrying Emails Set Sights on Russian-speaking Businesses

Symantec Darkmoon Aug 2005

Hayashi, K. (2005, August 18). Backdoor.Darkmoon. Retrieved February 23, 2018.

Internal MISP references

UUID 7088234d-a6fc-49ad-b4fd-2fe8ca333c1d which can be used as unique global reference for Symantec Darkmoon Aug 2005 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-23T00:00:00Z
date_published 2005-08-18T00:00:00Z
source MITRE
title Backdoor.Darkmoon

ESET BackdoorDiplomacy Jun 2021

Adam Burgher. (2021, June 10). BackdoorDiplomacy: Upgrading from Quarian to Turian. Retrieved September 1, 2021

Internal MISP references

UUID 127d4b10-8d61-4bdf-b5b9-7d86bbc065b6 which can be used as unique global reference for ESET BackdoorDiplomacy Jun 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-01T00:00:00Z
date_published 2021-06-10T00:00:00Z
source MITRE, Tidal Cyber
title BackdoorDiplomacy: Upgrading from Quarian to Turian

Backdooring an AWS account

Daniel Grzelak. (2016, July 9). Backdooring an AWS account. Retrieved May 27, 2022.

Internal MISP references

UUID 2c867527-1584-44f7-b5e5-8ca54ea79619 which can be used as unique global reference for Backdooring an AWS account in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-27T00:00:00Z
date_published 2016-07-09T00:00:00Z
source MITRE
title Backdooring an AWS account

Symantec Linfo May 2012

Zhou, R. (2012, May 15). Backdoor.Linfo. Retrieved February 23, 2018.

Internal MISP references

UUID e6b88cd4-a58e-4139-b266-48d0f5957407 which can be used as unique global reference for Symantec Linfo May 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-23T00:00:00Z
date_published 2012-05-15T00:00:00Z
source MITRE
title Backdoor.Linfo

Symantec Backdoor.Mivast

Stama, D.. (2015, February 6). Backdoor.Mivast. Retrieved February 15, 2016.

Internal MISP references

UUID 800780e3-7d00-4cfc-8458-74fe17da2f71 which can be used as unique global reference for Symantec Backdoor.Mivast in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-02-15T00:00:00Z
date_published 2015-02-06T00:00:00Z
source MITRE
title Backdoor.Mivast

Symantec Nerex May 2012

Ladley, F. (2012, May 15). Backdoor.Nerex. Retrieved February 23, 2018.

Internal MISP references

UUID 1613fd6b-4d62-464b-9cda-6f7d3f0192e1 which can be used as unique global reference for Symantec Nerex May 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-23T00:00:00Z
date_published 2012-05-15T00:00:00Z
source MITRE
title Backdoor.Nerex

Symantec Backdoor.Nidiran

Sponchioni, R.. (2016, March 11). Backdoor.Nidiran. Retrieved August 3, 2016.

Internal MISP references

UUID 01852772-c333-47a3-9e3f-e234a87f0b9b which can be used as unique global reference for Symantec Backdoor.Nidiran in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-08-03T00:00:00Z
date_published 2016-03-11T00:00:00Z
source MITRE
title Backdoor.Nidiran

Symantec Remsec IOCs

Symantec Security Response. (2016, August 8). Backdoor.Remsec indicators of compromise. Retrieved August 17, 2016.

Internal MISP references

UUID b00bf616-96e6-42c9-a56c-380047ad5acb which can be used as unique global reference for Symantec Remsec IOCs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-08-17T00:00:00Z
date_published 2016-08-08T00:00:00Z
source MITRE
title Backdoor.Remsec indicators of compromise

Symantec Ristol May 2012

Ladley, F. (2012, May 15). Backdoor.Ritsol. Retrieved February 23, 2018.

Internal MISP references

UUID 1c8b1762-8abd-479b-b78c-43d8c7be7c27 which can be used as unique global reference for Symantec Ristol May 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-23T00:00:00Z
date_published 2012-05-15T00:00:00Z
source MITRE
title Backdoor.Ritsol

Symantec Vasport May 2012

Zhou, R. (2012, May 15). Backdoor.Vasport. Retrieved February 22, 2018.

Internal MISP references

UUID 2dc7d7fb-3d13-4647-b15b-5e501946d606 which can be used as unique global reference for Symantec Vasport May 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-22T00:00:00Z
date_published 2012-05-15T00:00:00Z
source MITRE
title Backdoor.Vasport

FSecure Hupigon

FSecure. (n.d.). Backdoor - W32/Hupigon.EMV - Threat Description. Retrieved December 18, 2017.

Internal MISP references

UUID 08ceb57f-065e-45e9-98e9-d58a92caa755 which can be used as unique global reference for FSecure Hupigon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-18T00:00:00Z
source MITRE
title Backdoor - W32/Hupigon.EMV - Threat Description

Symantec Wiarp May 2012

Zhou, R. (2012, May 15). Backdoor.Wiarp. Retrieved February 22, 2018.

Internal MISP references

UUID 78285833-4b0d-4077-86d2-f34b010a5862 which can be used as unique global reference for Symantec Wiarp May 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-22T00:00:00Z
date_published 2012-05-15T00:00:00Z
source MITRE
title Backdoor.Wiarp

Microsoft Lamin Sept 2017

Microsoft. (2009, May 17). Backdoor:Win32/Lamin.A. Retrieved September 6, 2018.

Internal MISP references

UUID 84b8b159-6e85-4329-8903-aca156f4ed84 which can be used as unique global reference for Microsoft Lamin Sept 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-09-06T00:00:00Z
date_published 2009-05-17T00:00:00Z
source MITRE
title Backdoor:Win32/Lamin.A

Microsoft PoisonIvy 2017

McCormack, M. (2017, September 15). Backdoor:Win32/Poisonivy.E. Retrieved December 21, 2020.

Internal MISP references

UUID fc97a89c-c912-4b0c-b151-916695dbbca4 which can be used as unique global reference for Microsoft PoisonIvy 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-21T00:00:00Z
date_published 2017-09-15T00:00:00Z
source MITRE
title Backdoor:Win32/Poisonivy.E

Microsoft Win Defender Truvasys Sep 2017

Microsoft. (2017, September 15). Backdoor:Win32/Truvasys.A!dha. Retrieved November 30, 2017.

Internal MISP references

UUID 3c8ba6ef-8edc-44bf-9abe-655ba0f45912 which can be used as unique global reference for Microsoft Win Defender Truvasys Sep 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-30T00:00:00Z
date_published 2017-09-15T00:00:00Z
source MITRE
title Backdoor:Win32/Truvasys.A!dha

Microsoft Wingbird Nov 2017

Microsoft. (2017, November 9). Backdoor:Win32/Wingbird.A!dha. Retrieved November 27, 2017.

Internal MISP references

UUID 6c7e2b89-8f3a-443c-9b72-12934b9dc364 which can be used as unique global reference for Microsoft Wingbird Nov 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-27T00:00:00Z
date_published 2017-11-09T00:00:00Z
source MITRE
title Backdoor:Win32/Wingbird.A!dha

Microsoft BITS

Microsoft. (n.d.). Background Intelligent Transfer Service. Retrieved January 12, 2018.

Internal MISP references

UUID 3d925a69-35f3-4337-8e1e-275de4c1783e which can be used as unique global reference for Microsoft BITS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-12T00:00:00Z
source MITRE
title Background Intelligent Transfer Service

NCC Group Research Blog August 19 2022

NCC Group Research Blog. (2022, August 19). Back in Black: Unlocking a LockBit 3.0 Ransomware Attack. Retrieved May 7, 2023.

Internal MISP references

UUID 8c1fbe98-5fc1-4e67-9b96-b740ffc9b1ae which can be used as unique global reference for NCC Group Research Blog August 19 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2022-08-19T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Back in Black: Unlocking a LockBit 3.0 Ransomware Attack

Tech Republic - Restore AWS Snapshots

Hardiman, N.. (2012, March 20). Backing up and restoring snapshots on Amazon EC2 machines. Retrieved October 8, 2019.

Internal MISP references

UUID bfe848a3-c855-4bca-a6ea-44804d48c7eb which can be used as unique global reference for Tech Republic - Restore AWS Snapshots in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-08T00:00:00Z
date_published 2012-03-20T00:00:00Z
source MITRE
title Backing up and restoring snapshots on Amazon EC2 machines

Secureworks COBALT DICKENS August 2018

Counter Threat Unit Research Team. (2018, August 24). Back to School: COBALT DICKENS Targets Universities. Retrieved February 3, 2021.

Internal MISP references

UUID addbb46b-b2b5-4844-b4be-f6294cf51caa which can be used as unique global reference for Secureworks COBALT DICKENS August 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-03T00:00:00Z
date_published 2018-08-24T00:00:00Z
source MITRE
title Back to School: COBALT DICKENS Targets Universities

Cybereason Kimsuky November 2020

Dahan, A. et al. (2020, November 2). Back to the Future: Inside the Kimsuky KGH Spyware Suite. Retrieved November 6, 2020.

Internal MISP references

UUID ecc2f5ad-b2a8-470b-b919-cb184d12d00f which can be used as unique global reference for Cybereason Kimsuky November 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-06T00:00:00Z
date_published 2020-11-02T00:00:00Z
source MITRE, Tidal Cyber
title Back to the Future: Inside the Kimsuky KGH Spyware Suite

Proofpoint TA453 March 2021

Miller, J. et al. (2021, March 30). BadBlood: TA453 Targets US and Israeli Medical Research Personnel in Credential Phishing Campaigns. Retrieved May 4, 2021.

Internal MISP references

UUID 5ba4217c-813b-4cc5-b694-3a4dcad776e4 which can be used as unique global reference for Proofpoint TA453 March 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-05-04T00:00:00Z
date_published 2021-03-30T00:00:00Z
source MITRE
title BadBlood: TA453 Targets US and Israeli Medical Research Personnel in Credential Phishing Campaigns

Unit 42 BadPatch Oct 2017

Bar, T., Conant, S. (2017, October 20). BadPatch. Retrieved November 13, 2018.

Internal MISP references

UUID 9c294bf7-24ba-408a-90b8-5b9885838e1b which can be used as unique global reference for Unit 42 BadPatch Oct 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-13T00:00:00Z
date_published 2017-10-20T00:00:00Z
source MITRE
title BadPatch

ESET Bad Rabbit

M.Léveille, M-E.. (2017, October 24). Bad Rabbit: Not‑Petya is back with improved ransomware. Retrieved January 28, 2021.

Internal MISP references

UUID a9664f01-78f0-4461-a757-12f54ec99a56 which can be used as unique global reference for ESET Bad Rabbit in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-28T00:00:00Z
date_published 2017-10-24T00:00:00Z
source MITRE
title Bad Rabbit: Not‑Petya is back with improved ransomware

Secure List Bad Rabbit

Mamedov, O. Sinitsyn, F. Ivanov, A.. (2017, October 24). Bad Rabbit ransomware. Retrieved January 28, 2021.

Internal MISP references

UUID f4cec03a-ea94-4874-9bea-16189e967ff9 which can be used as unique global reference for Secure List Bad Rabbit in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-28T00:00:00Z
date_published 2017-10-24T00:00:00Z
source MITRE
title Bad Rabbit ransomware

BlackBerry Bahamut

The BlackBerry Research & Intelligence Team. (2020, October). BAHAMUT: Hack-for-Hire Masters of Phishing, Fake News, and Fake Apps. Retrieved February 8, 2021.

Internal MISP references

UUID 872c377b-724b-454c-8432-e38062a7c331 which can be used as unique global reference for BlackBerry Bahamut in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-08T00:00:00Z
date_published 2020-10-01T00:00:00Z
source MITRE
title BAHAMUT: Hack-for-Hire Masters of Phishing, Fake News, and Fake Apps

BaltimoreSun RobbinHood May 2019

Duncan, I., Campbell, C. (2019, May 7). Baltimore city government computer network hit by ransomware attack. Retrieved July 29, 2019.

Internal MISP references

UUID f578de81-ea6b-49d0-9a0a-111e07249cd8 which can be used as unique global reference for BaltimoreSun RobbinHood May 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-07-29T00:00:00Z
date_published 2019-05-07T00:00:00Z
source MITRE
title Baltimore city government computer network hit by ransomware attack

ESET Research Bandook July 7 2021

Fernando Tavella, Matías Porolli. (2021, July 7). Bandidos at large: A spying campaign in Latin America. Retrieved October 25, 2023.

Internal MISP references

UUID da6cac04-a318-4972-bd78-8272116b4ad7 which can be used as unique global reference for ESET Research Bandook July 7 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-25T00:00:00Z
date_published 2021-07-07T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Bandidos at large: A spying campaign in Latin America

CheckPoint Bandook Nov 2020

Check Point. (2020, November 26). Bandook: Signed & Delivered. Retrieved May 31, 2021.

Internal MISP references

UUID 352652a9-86c9-42e1-8ee0-968180c6a51e which can be used as unique global reference for CheckPoint Bandook Nov 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-05-31T00:00:00Z
date_published 2020-11-26T00:00:00Z
source MITRE
title Bandook: Signed & Delivered

Banker Google Chrome Extension Steals Creds

Marinho, R. (n.d.). (Banker(GoogleChromeExtension)).targeting. Retrieved November 18, 2017.

Internal MISP references

UUID 93f37adc-d060-4b35-9a4d-62d2ad61cdf3 which can be used as unique global reference for Banker Google Chrome Extension Steals Creds in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-18T00:00:00Z
source MITRE
title (Banker(GoogleChromeExtension)).targeting

Unit42 Banking Trojans Hooking 2022

Or Chechik. (2022, October 31). Banking Trojan Techniques: How Financially Motivated Malware Became Infrastructure. Retrieved September 27, 2023.

Internal MISP references

UUID 411c3df4-08e6-518a-953d-19988b663dc4 which can be used as unique global reference for Unit42 Banking Trojans Hooking 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-27T00:00:00Z
date_published 2022-10-31T00:00:00Z
source MITRE
title Banking Trojan Techniques: How Financially Motivated Malware Became Infrastructure

Linux manual bash invocation

ArchWiki. (2021, January 19). Bash. Retrieved February 25, 2021.

Internal MISP references

UUID 06185cbd-6635-46c7-9783-67bd8742b66f which can be used as unique global reference for Linux manual bash invocation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-25T00:00:00Z
date_published 2021-01-19T00:00:00Z
source MITRE
title Bash

DieNet Bash

die.net. (n.d.). bash(1) - Linux man page. Retrieved June 12, 2020.

Internal MISP references

UUID c5b362ce-6bae-46f7-b047-e3a0b2bf2580 which can be used as unique global reference for DieNet Bash in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-12T00:00:00Z
source MITRE
title bash(1) - Linux man page

Bash.exe - LOLBAS Project

LOLBAS. (2018, May 25). Bash.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 7d3efbc7-6abf-4f3f-aec8-686100bb90ad which can be used as unique global reference for Bash.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Bash.exe

Bashfuscator Command Obfuscators

LeFevre, A. (n.d.). Bashfuscator Command Obfuscators. Retrieved March 17, 2023.

Internal MISP references

UUID c0256889-3ff0-59de-b0d1-39a947a4c89d which can be used as unique global reference for Bashfuscator Command Obfuscators in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-17T00:00:00Z
source MITRE
title Bashfuscator Command Obfuscators

Microsoft Basic TxF Concepts

Microsoft. (n.d.). Basic TxF Concepts. Retrieved December 20, 2017.

Internal MISP references

UUID 72798536-a7e3-43e2-84e3-b5b8b54f0bca which can be used as unique global reference for Microsoft Basic TxF Concepts in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-20T00:00:00Z
source MITRE
title Basic TxF Concepts

eSentire | BatLoader Continues to Abuse Google Search Ads to Deliver Vidar Stealer and Ursnif

eSentire. (2023, March 9). BatLoader Continues to Abuse Google Search Ads to Deliver Vidar Stealer and Ursnif. Retrieved May 10, 2023.

Internal MISP references

UUID 1bf10604-708f-4c4f-abe5-816768873496 which can be used as unique global reference for eSentire | BatLoader Continues to Abuse Google Search Ads to Deliver Vidar Stealer and Ursnif in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-10T00:00:00Z
date_published 2023-03-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title BatLoader Continues to Abuse Google Search Ads to Deliver Vidar Stealer and Ursnif

BATLOADER: The Evasive Downloader Malware

Bethany Hardin, Lavine Oluoch, Tatiana Vollbrecht. (2022, November 14). BATLOADER: The Evasive Downloader Malware. Retrieved June 5, 2023.

Internal MISP references

UUID 53e12ade-99ed-51ee-b5c8-32180f144658 which can be used as unique global reference for BATLOADER: The Evasive Downloader Malware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-05T00:00:00Z
date_published 2022-11-14T00:00:00Z
source MITRE
title BATLOADER: The Evasive Downloader Malware

AdvIntel Bazar Call August 10 2022

AdvIntel. (2022, August 10). “BazarCall” Advisory: Essential Guide to Attack Vector that Revolutionized Data Breaches. Retrieved June 28, 2024.

Internal MISP references

UUID 5d3dff70-28c2-42a5-bf58-211fe6491fd2 which can be used as unique global reference for AdvIntel Bazar Call August 10 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-28T00:00:00Z
date_published 2022-08-10T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title “BazarCall” Advisory: Essential Guide to Attack Vector that Revolutionized Data Breaches

Palo Alto Networks BBSRAT

Lee, B. Grunzweig, J. (2015, December 22). BBSRAT Attacks Targeting Russian Organizations Linked to Roaming Tiger. Retrieved August 19, 2016.

Internal MISP references

UUID 8c5d61ba-24c5-4f6c-a208-e0a5d23ebb49 which can be used as unique global reference for Palo Alto Networks BBSRAT in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-08-19T00:00:00Z
date_published 2015-12-22T00:00:00Z
source MITRE
title BBSRAT Attacks Targeting Russian Organizations Linked to Roaming Tiger

Microsoft bcdedit 2021

Microsoft. (2021, May 27). bcdedit. Retrieved June 23, 2021.

Internal MISP references

UUID 40dedfcb-f666-4f2d-a518-5cd4ae2e273c which can be used as unique global reference for Microsoft bcdedit 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-23T00:00:00Z
date_published 2021-05-27T00:00:00Z
source MITRE
title bcdedit

Securelist BlackEnergy Nov 2014

Baumgartner, K. and Garnaeva, M.. (2014, November 3). BE2 custom plugins, router abuse, and target profiles. Retrieved March 24, 2016.

Internal MISP references

UUID c64696d0-ee42-41e5-92cb-13cf43fac0c9 which can be used as unique global reference for Securelist BlackEnergy Nov 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-03-24T00:00:00Z
date_published 2014-11-03T00:00:00Z
source MITRE
title BE2 custom plugins, router abuse, and target profiles

Securelist BlackEnergy Feb 2015

Baumgartner, K. and Garnaeva, M.. (2015, February 17). BE2 extraordinary plugins, Siemens targeting, dev fails. Retrieved March 24, 2016.

Internal MISP references

UUID ef043c07-6ae6-4cd2-82cf-7cbdb259f676 which can be used as unique global reference for Securelist BlackEnergy Feb 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-03-24T00:00:00Z
date_published 2015-02-17T00:00:00Z
source MITRE
title BE2 extraordinary plugins, Siemens targeting, dev fails

Crowdstrike DNC June 2016

Alperovitch, D.. (2016, June 15). Bears in the Midst: Intrusion into the Democratic National Committee. Retrieved August 3, 2016.

Internal MISP references

UUID 7f4edc06-ac67-4d71-b39c-5df9ce521bbb which can be used as unique global reference for Crowdstrike DNC June 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-08-03T00:00:00Z
date_published 2016-06-15T00:00:00Z
source MITRE, Tidal Cyber
title Bears in the Midst: Intrusion into the Democratic National Committee

Deep Instinct Black Basta August 2022

Vilkomir-Preisman, S. (2022, August 18). Beating Black Basta Ransomware. Retrieved March 8, 2023.

Internal MISP references

UUID 72b64d7d-f8eb-54d3-83c8-a883906ceea1 which can be used as unique global reference for Deep Instinct Black Basta August 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-08T00:00:00Z
date_published 2022-08-18T00:00:00Z
source MITRE
title Beating Black Basta Ransomware

Bienstock, D. - Defending O365 - 2019

Bienstock, D.. (2019). BECS and Beyond: Investigating and Defending O365. Retrieved September 13, 2019.

Internal MISP references

UUID 4866e6c3-c1b2-4131-bd8f-0ac228168a10 which can be used as unique global reference for Bienstock, D. - Defending O365 - 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-13T00:00:00Z
date_published 2019-01-01T00:00:00Z
source MITRE
title BECS and Beyond: Investigating and Defending O365

Kevin Mandia Statement to US Senate Committee on Intelligence

Kevin Mandia. (2017, March 30). Prepared Statement of Kevin Mandia, CEO of FireEye, Inc. before the United States Senate Select Committee on Intelligence. Retrieved April 19, 2019.

Internal MISP references

UUID c40a3f96-75f4-4b1c-98a5-cb38129c6dc4 which can be used as unique global reference for Kevin Mandia Statement to US Senate Committee on Intelligence in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-19T00:00:00Z
source MITRE
title before the United States Senate Select Committee on Intelligence

Microsoft Dofoil 2018

Windows Defender Research. (2018, March 7). Behavior monitoring combined with machine learning spoils a massive Dofoil coin mining campaign. Retrieved March 20, 2018.

Internal MISP references

UUID 85069317-2c25-448b-9ff4-504e429dc1bf which can be used as unique global reference for Microsoft Dofoil 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-20T00:00:00Z
date_published 2018-03-07T00:00:00Z
source MITRE
title Behavior monitoring combined with machine learning spoils a massive Dofoil coin mining campaign

Obsidian SSPR Abuse 2023

Noah Corradin and Shuyang Wang. (2023, August 1). Behind The Breach: Self-Service Password Reset (SSPR) Abuse in Azure AD. Retrieved March 28, 2024.

Internal MISP references

UUID 7f28f770-ef06-5923-b759-b731ceabe08a which can be used as unique global reference for Obsidian SSPR Abuse 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-28T00:00:00Z
date_published 2023-08-01T00:00:00Z
source MITRE
title Behind The Breach: Self-Service Password Reset (SSPR) Abuse in Azure AD

FireEye CARBANAK June 2017

Bennett, J., Vengerik, B. (2017, June 12). Behind the CARBANAK Backdoor. Retrieved June 11, 2018.

Internal MISP references

UUID 39105492-6044-460c-9dc9-3d4473ee862e which can be used as unique global reference for FireEye CARBANAK June 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-06-11T00:00:00Z
date_published 2017-06-12T00:00:00Z
source MITRE
title Behind the CARBANAK Backdoor

Expel Behind the Scenes

S. Lipton, L. Easterly, A. Randazzo and J. Hencinski. (2020, July 28). Behind the scenes in the Expel SOC: Alert-to-fix in AWS. Retrieved October 1, 2020.

Internal MISP references

UUID d538026c-da30-48d2-bc30-fde3776db1a8 which can be used as unique global reference for Expel Behind the Scenes in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-01T00:00:00Z
date_published 2020-07-28T00:00:00Z
source MITRE
title Behind the scenes in the Expel SOC: Alert-to-fix in AWS

Microsoft BEC Campaign

Carr, N., Sellmer, S. (2021, June 14). Behind the scenes of business email compromise: Using cross-domain threat data to disrupt a large BEC campaign. Retrieved June 15, 2021.

Internal MISP references

UUID 1de8c853-2b0c-439b-a31b-a2c4fa9f4206 which can be used as unique global reference for Microsoft BEC Campaign in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-15T00:00:00Z
date_published 2021-06-14T00:00:00Z
source MITRE
title Behind the scenes of business email compromise: Using cross-domain threat data to disrupt a large BEC campaign

Unit42 BendyBear Feb 2021

Harbison, M. (2021, February 9). BendyBear: Novel Chinese Shellcode Linked With Cyber Espionage Group BlackTech. Retrieved February 16, 2021.

Internal MISP references

UUID f5cbc08f-6f2c-4c81-9d68-07f61e16f138 which can be used as unique global reference for Unit42 BendyBear Feb 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-16T00:00:00Z
date_published 2021-02-09T00:00:00Z
source MITRE
title BendyBear: Novel Chinese Shellcode Linked With Cyber Espionage Group BlackTech

Google Cloud Storage Best Practices, 2019

Google. (2019, September 16). Best practices for Cloud Storage. Retrieved October 4, 2019.

Internal MISP references

UUID 752ad355-0f10-4c8d-bad8-42bf2fc75fa0 which can be used as unique global reference for Google Cloud Storage Best Practices, 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-04T00:00:00Z
date_published 2019-09-16T00:00:00Z
source MITRE
title Best practices for Cloud Storage

AWS Management Account Best Practices

AWS. (n.d.). Best practices for the management account. Retrieved October 16, 2024.

Internal MISP references

UUID f20b5870-d82d-5c50-893a-73248c8f5900 which can be used as unique global reference for AWS Management Account Best Practices in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-16T00:00:00Z
source MITRE
title Best practices for the management account

Shadowbunny VM Defense Evasion

Johann Rehberger. (2020, September 23). Beware of the Shadowbunny - Using virtual machines to persist and evade detections. Retrieved September 22, 2021.

Internal MISP references

UUID eef7cd8a-8cb6-4b24-ba49-9b17353d20b5 which can be used as unique global reference for Shadowbunny VM Defense Evasion in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-22T00:00:00Z
date_published 2020-09-23T00:00:00Z
source MITRE
title Beware of the Shadowbunny - Using virtual machines to persist and evade detections

Akamai Corona Zero-Day August 28 2024

Kyle Lefton, Larry Cashdollar, Aline Eliovich. (2024, August 28). Beware the Unpatchable: Corona Mirai Botnet Spreads via Zero-Day. Retrieved September 5, 2024.

Internal MISP references

UUID 140284f8-075c-4225-99dd-519ba5cebabe which can be used as unique global reference for Akamai Corona Zero-Day August 28 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-05T00:00:00Z
date_published 2024-08-28T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Beware the Unpatchable: Corona Mirai Botnet Spreads via Zero-Day

T1105: Trellix_search-ms

Mathanraj Thangaraju, Sijo Jacob. (2023, July 26). Beyond File Search: A Novel Method for Exploiting the "search-ms" URI Protocol Handler. Retrieved March 15, 2024.

Internal MISP references

UUID 7079d170-9ead-5be4-bbc8-13c3f082b3dd which can be used as unique global reference for T1105: Trellix_search-ms in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-15T00:00:00Z
date_published 2023-07-26T00:00:00Z
source MITRE
title Beyond File Search: A Novel Method for Exploiting the "search-ms" URI Protocol Handler

Hexacorn Office Test

Hexacorn. (2014, April 16). Beyond good ol’ Run key, Part 10. Retrieved July 3, 2017.

Internal MISP references

UUID 60d90852-ea00-404d-b613-9ad1589aff31 which can be used as unique global reference for Hexacorn Office Test in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-03T00:00:00Z
date_published 2014-04-16T00:00:00Z
source MITRE
title Beyond good ol’ Run key, Part 10

Hexacorn Logon Scripts

Hexacorn. (2014, November 14). Beyond good ol’ Run key, Part 18. Retrieved November 15, 2019.

Internal MISP references

UUID bdcdfe9e-1f22-4472-9a86-faefcb5c5618 which can be used as unique global reference for Hexacorn Logon Scripts in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-11-15T00:00:00Z
date_published 2014-11-14T00:00:00Z
source MITRE
title Beyond good ol’ Run key, Part 18

Hexacorn DLL Hijacking

Hexacorn. (2013, December 8). Beyond good ol’ Run key, Part 5. Retrieved August 14, 2024.

Internal MISP references

UUID bbe0690e-f368-5715-8a41-aa95836a5e4c which can be used as unique global reference for Hexacorn DLL Hijacking in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-14T00:00:00Z
date_published 2013-12-08T00:00:00Z
source MITRE
title Beyond good ol’ Run key, Part 5

Hexacorn Office Template Macros

Hexacorn. (2017, April 17). Beyond good ol’ Run key, Part 62. Retrieved July 3, 2017.

Internal MISP references

UUID 7d558a35-a5c0-4e4c-92bf-cb2435c41a95 which can be used as unique global reference for Hexacorn Office Template Macros in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-03T00:00:00Z
date_published 2017-04-17T00:00:00Z
source MITRE
title Beyond good ol’ Run key, Part 62

Bginfo.exe - LOLBAS Project

LOLBAS. (2018, May 25). Bginfo.exe. Retrieved December 4, 2023.

Internal MISP references

UUID ca1eaac2-7449-4a76-bec2-9dc5971fd808 which can be used as unique global reference for Bginfo.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Bginfo.exe

Cyble August 18 2022

Cybleinc. (2022, August 18). BianLian: New Ransomware variant on the rise. Retrieved May 18, 2023.

Internal MISP references

UUID 2de00d16-9b9e-4e03-925f-4fcdae4d6e1a which can be used as unique global reference for Cyble August 18 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-18T00:00:00Z
date_published 2022-08-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title BianLian: New Ransomware variant on the rise

BianLian Ransomware Gang Gives It a Go! | [redacted]

Ben Armstrong, Lauren Pearce, Brad Pittack, Danny Quist. (2022, September 1). BianLian Ransomware Gang Gives It a Go!. Retrieved May 18, 2023.

Internal MISP references

UUID fc1aa979-7dbc-4fff-a8d1-b35a3b2bec3d which can be used as unique global reference for BianLian Ransomware Gang Gives It a Go! | [redacted] in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-18T00:00:00Z
date_published 2022-09-01T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title BianLian Ransomware Gang Gives It a Go!

Group IB APT 41 June 2021

Rostovcev, N. (2021, June 10). Big airline heist APT41 likely behind a third-party attack on Air India. Retrieved August 26, 2021.

Internal MISP references

UUID a2bf43a0-c7da-4cb9-8f9a-b34fac92b625 which can be used as unique global reference for Group IB APT 41 June 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-26T00:00:00Z
date_published 2021-06-10T00:00:00Z
source MITRE
title Big airline heist APT41 likely behind a third-party attack on Air India

Crowdstrike Indrik November 2018

Frankoff, S., Hartley, B. (2018, November 14). Big Game Hunting: The Evolution of INDRIK SPIDER From Dridex Wire Fraud to BitPaymer Targeted Ransomware. Retrieved January 6, 2021.

Internal MISP references

UUID 0f85f611-90db-43ba-8b71-5d0d4ec8cdd5 which can be used as unique global reference for Crowdstrike Indrik November 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-06T00:00:00Z
date_published 2018-11-14T00:00:00Z
source MITRE, Tidal Cyber
title Big Game Hunting: The Evolution of INDRIK SPIDER From Dridex Wire Fraud to BitPaymer Targeted Ransomware

CrowdStrike Ryuk January 2019

Hanel, A. (2019, January 10). Big Game Hunting with Ryuk: Another Lucrative Targeted Ransomware. Retrieved May 12, 2020.

Internal MISP references

UUID df471757-2ce0-48a7-922f-a84c57704914 which can be used as unique global reference for CrowdStrike Ryuk January 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-12T00:00:00Z
date_published 2019-01-10T00:00:00Z
source MITRE, Tidal Cyber
title Big Game Hunting with Ryuk: Another Lucrative Targeted Ransomware

Elastic Binary Executed from Shared Memory Directory

Elastic. (n.d.). Binary Executed from Shared Memory Directory. Retrieved September 24, 2024.

Internal MISP references

UUID 025912f5-531c-5a14-b300-e42f00077264 which can be used as unique global reference for Elastic Binary Executed from Shared Memory Directory in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-24T00:00:00Z
source MITRE
title Binary Executed from Shared Memory Directory

OWASP Binary Planting

OWASP. (2013, January 30). Binary planting. Retrieved June 7, 2016.

Internal MISP references

UUID 86fc5a62-385e-4c56-9812-138db0808fba which can be used as unique global reference for OWASP Binary Planting in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-07T00:00:00Z
date_published 2013-01-30T00:00:00Z
source MITRE
title Binary planting

Wikipedia Binary-to-text Encoding

Wikipedia. (2016, December 26). Binary-to-text encoding. Retrieved March 1, 2017.

Internal MISP references

UUID 9b3820e8-f094-4e87-9ed6-ab0207d509fb which can be used as unique global reference for Wikipedia Binary-to-text Encoding in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-01T00:00:00Z
date_published 2016-12-26T00:00:00Z
source MITRE
title Binary-to-text encoding

Sucuri BIND9 August 2015

Cid, D.. (2015, August 2). BIND9 – Denial of Service Exploit in the Wild. Retrieved April 26, 2019.

Internal MISP references

UUID 5e108782-2f32-4704-be01-055d9e767216 which can be used as unique global reference for Sucuri BIND9 August 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-26T00:00:00Z
date_published 2015-08-02T00:00:00Z
source MITRE
title BIND9 – Denial of Service Exploit in the Wild

Wikipedia BIOS

Wikipedia. (n.d.). BIOS. Retrieved January 5, 2016.

Internal MISP references

UUID 0c4a2cb3-d663-47ee-87af-c5e9e68fe15f which can be used as unique global reference for Wikipedia BIOS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-05T00:00:00Z
source MITRE
title BIOS

Ge 2011

Ge, L. (2011, September 9). BIOS Threat is Showing up Again!. Retrieved November 14, 2014.

Internal MISP references

UUID dd6032fb-8913-4593-81b9-86d1239e01f4 which can be used as unique global reference for Ge 2011 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-14T00:00:00Z
date_published 2011-09-09T00:00:00Z
source MITRE
title BIOS Threat is Showing up Again!

Broadcom BirdyClient Microsoft Graph API 2024

Broadcom. (2024, May 2). BirdyClient malware leverages Microsoft Graph API for C&C communication. Retrieved July 1, 2024.

Internal MISP references

UUID a55197e2-3ed7-5b6f-8ab5-06218c2226a4 which can be used as unique global reference for Broadcom BirdyClient Microsoft Graph API 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-01T00:00:00Z
date_published 2024-05-02T00:00:00Z
source MITRE
title BirdyClient malware leverages Microsoft Graph API for C&C communication

Talos Bisonal Mar 2020

Mercer, W., et al. (2020, March 5). Bisonal: 10 years of play. Retrieved January 26, 2022.

Internal MISP references

UUID eaecccff-e0a0-4fa0-81e5-799b23c26b5a which can be used as unique global reference for Talos Bisonal Mar 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-26T00:00:00Z
date_published 2020-03-05T00:00:00Z
source MITRE
title Bisonal: 10 years of play

Talos Bisonal 10 Years March 2020

Warren Mercer, Paul Rascagneres, Vitor Ventura. (2020, March 6). Bisonal 10 Years of Play. Retrieved October 17, 2021.

Internal MISP references

UUID 6844e59b-d393-43df-9978-e3e3cc7b8db6 which can be used as unique global reference for Talos Bisonal 10 Years March 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-17T00:00:00Z
date_published 2020-03-06T00:00:00Z
source MITRE
title Bisonal 10 Years of Play

Unit 42 Bisonal July 2018

Hayashi, K., Ray, V. (2018, July 31). Bisonal Malware Used in Attacks Against Russia and South Korea. Retrieved August 7, 2018.

Internal MISP references

UUID 30b2ec12-b785-43fb-ab72-b37387046d15 which can be used as unique global reference for Unit 42 Bisonal July 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-07T00:00:00Z
date_published 2018-07-31T00:00:00Z
source MITRE
title Bisonal Malware Used in Attacks Against Russia and South Korea

Bitsadmin.exe - LOLBAS Project

LOLBAS. (2018, May 25). Bitsadmin.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 89bdc17b-553c-4245-acde-f6c56602e357 which can be used as unique global reference for Bitsadmin.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Bitsadmin.exe

Microsoft BITSAdmin

Microsoft. (n.d.). BITSAdmin Tool. Retrieved January 12, 2018.

Internal MISP references

UUID 5b8c2a8c-f01e-491a-aaf9-504ee7a1caed which can be used as unique global reference for Microsoft BITSAdmin in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-12T00:00:00Z
source MITRE
title BITSAdmin Tool

Cisco Talos Bitter Bangladesh May 2022

Raghuprasad, C . (2022, May 11). Bitter APT adds Bangladesh to their targets. Retrieved June 1, 2022.

Internal MISP references

UUID 097583ed-03b0-41cd-bf85-66d473f46439 which can be used as unique global reference for Cisco Talos Bitter Bangladesh May 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-01T00:00:00Z
date_published 2022-05-11T00:00:00Z
source MITRE
title Bitter APT adds Bangladesh to their targets

Forcepoint BITTER Pakistan Oct 2016

Dela Paz, R. (2016, October 21). BITTER: a targeted attack against Pakistan. Retrieved June 1, 2022.

Internal MISP references

UUID 9fc54fb0-b7d9-49dc-b6dd-ab4cb2cd34fa which can be used as unique global reference for Forcepoint BITTER Pakistan Oct 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-01T00:00:00Z
date_published 2016-10-21T00:00:00Z
source MITRE
title BITTER: a targeted attack against Pakistan

Camba RARSTONE

Camba, A. (2013, February 27). BKDR_RARSTONE: New RAT to Watch Out For. Retrieved January 8, 2016.

Internal MISP references

UUID bca93846-457d-4644-ba43-f9293982916f which can be used as unique global reference for Camba RARSTONE in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-08T00:00:00Z
date_published 2013-02-27T00:00:00Z
source MITRE
title BKDR_RARSTONE: New RAT to Watch Out For

TrendMicro BKDR_URSNIF.SM

Sioting, S. (2013, June 15). BKDR_URSNIF.SM. Retrieved June 5, 2019.

Internal MISP references

UUID aa791512-039e-4230-ab49-f184ca0e38c5 which can be used as unique global reference for TrendMicro BKDR_URSNIF.SM in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-05T00:00:00Z
date_published 2013-06-15T00:00:00Z
source MITRE
title BKDR_URSNIF.SM

Cyble September 28 2022

Cybleinc. (2023, September 28). Bl00dy – New Ransomware Strain Active in the Wild. Retrieved August 3, 2023.

Internal MISP references

UUID ae2daa9c-6741-4ab7-854d-bee1170b3d7a which can be used as unique global reference for Cyble September 28 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-03T00:00:00Z
date_published 2023-09-28T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Bl00dy – New Ransomware Strain Active in the Wild

Trend Micro Pikabot January 9 2024

Shinji Robert Arasawa, Joshua Aquino, Charles Steven Derion, Juhn Emmanuel Atanque, Francisrey Joshua Castillo, John Carlo Marquez, Henry Salcedo, John Rainier Navato, Arianne Dela Cruz, Raymart Yambot, Ian Kenefick. (2024, January 9). Black Basta-Affiliated Water Curupira’s Pikabot Spam Campaign. Retrieved January 11, 2024.

Internal MISP references

UUID dc7d882b-4e83-42da-8e2f-f557b675930a which can be used as unique global reference for Trend Micro Pikabot January 9 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-11T00:00:00Z
date_published 2024-01-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Black Basta-Affiliated Water Curupira’s Pikabot Spam Campaign

TrendMicro Pikabot 2024

Shinji Robert Arasawa, Joshua Aquino, Charles Steven Derion, Juhn Emmanuel Atanque, Francisrey Joshua Castillo, John Carlo Marquez, Henry Salcedo, John Rainier Navato, Arianne Dela Cruz, Raymart Yambot & Ian Kenefick. (2024, January 9). Black Basta-Affiliated Water Curupira’s Pikabot Spam Campaign. Retrieved July 17, 2024.

Internal MISP references

UUID a2a22246-d49e-5847-9d20-dac64f1df3ea which can be used as unique global reference for TrendMicro Pikabot 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-17T00:00:00Z
date_published 2024-01-09T00:00:00Z
source MITRE
title Black Basta-Affiliated Water Curupira’s Pikabot Spam Campaign

Check Point Black Basta October 2022

Check Point. (2022, October 20). BLACK BASTA AND THE UNNOTICED DELIVERY. Retrieved March 8, 2023.

Internal MISP references

UUID 7a00457b-ae72-5aea-904f-9ca7f4cb9fe9 which can be used as unique global reference for Check Point Black Basta October 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-08T00:00:00Z
date_published 2022-10-20T00:00:00Z
source MITRE
title BLACK BASTA AND THE UNNOTICED DELIVERY

BlackBasta

Antonio Cocomazzi and Antonio Pirozzi. (2022, November 3). Black Basta Ransomware | Attacks Deploy Custom EDR Evasion Tools Tied to FIN7 Threat Actor. Retrieved March 14, 2023.

Internal MISP references

UUID c7e55e37-d051-5111-8d0a-738656f88650 which can be used as unique global reference for BlackBasta in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-14T00:00:00Z
date_published 2022-11-03T00:00:00Z
source MITRE
title Black Basta Ransomware

Trend Micro Black Basta October 2022

Kenefick, I. et al. (2022, October 12). Black Basta Ransomware Gang Infiltrates Networks via QAKBOT, Brute Ratel, and Cobalt Strike. Retrieved February 6, 2023.

Internal MISP references

UUID 6e4a1565-4a30-5a6b-961c-226a6f1967ae which can be used as unique global reference for Trend Micro Black Basta October 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-06T00:00:00Z
date_published 2022-10-12T00:00:00Z
source MITRE
title Black Basta Ransomware Gang Infiltrates Networks via QAKBOT, Brute Ratel, and Cobalt Strike

Uptycs Black Basta ESXi June 2022

Sharma, S. and Hegde, N. (2022, June 7). Black basta Ransomware Goes Cross-Platform, Now Targets ESXi Systems. Retrieved March 8, 2023.

Internal MISP references

UUID a8145e38-c2a4-5021-824d-5a831299b9d9 which can be used as unique global reference for Uptycs Black Basta ESXi June 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-08T00:00:00Z
date_published 2022-06-07T00:00:00Z
source MITRE
title Black basta Ransomware Goes Cross-Platform, Now Targets ESXi Systems

Elliptic Black Basta November 29 2023

Elliptic Research. (2023, November 29). Black Basta ransomware victims have paid over $100 million. Retrieved May 14, 2024.

Internal MISP references

UUID dc7579c0-911d-417d-bba5-bc36e078b640 which can be used as unique global reference for Elliptic Black Basta November 29 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-14T00:00:00Z
date_published 2023-11-29T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Black Basta ransomware victims have paid over $100 million

BlackBerry Black Basta May 2022

Ballmer, D. (2022, May 6). Black Basta: Rebrand of Conti or Something New?. Retrieved March 7, 2023.

Internal MISP references

UUID 32a272fe-ac10-5478-88a0-b3dd366ec540 which can be used as unique global reference for BlackBerry Black Basta May 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-07T00:00:00Z
date_published 2022-05-06T00:00:00Z
source MITRE
title Black Basta: Rebrand of Conti or Something New?

WMI 6

Microsoft. (2022, June 13). BlackCat. Retrieved February 13, 2024.

Internal MISP references

UUID df07a086-0d38-570b-b0c5-9f5061212db7 which can be used as unique global reference for WMI 6 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-13T00:00:00Z
date_published 2022-06-13T00:00:00Z
source MITRE
title BlackCat

FBI BlackCat April 19 2022

FBI. (2022, April 19). BlackCat/ALPHV Ransomware Indicators of Compromise. Retrieved September 14, 2023.

Internal MISP references

UUID 2640b58c-8413-4691-80e1-33aec9b6c7f6 which can be used as unique global reference for FBI BlackCat April 19 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-14T00:00:00Z
date_published 2022-04-19T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title BlackCat/ALPHV Ransomware Indicators of Compromise

X-Force BlackCat May 30 2023

IBM Security X-Force Team. (2023, May 30). BlackCat (ALPHV) ransomware levels up for stealth, speed and exfiltration. Retrieved September 14, 2023.

Internal MISP references

UUID b80c1f70-9d05-4f4b-bdc2-6157c6837202 which can be used as unique global reference for X-Force BlackCat May 30 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-14T00:00:00Z
date_published 2023-05-30T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title BlackCat (ALPHV) ransomware levels up for stealth, speed and exfiltration

BlackBerry BlackCat Threat Overview

BlackBerry. (n.d.). BlackCat Malware (AKA ALPHV). Retrieved September 14, 2023.

Internal MISP references

UUID 59f98ae1-c62d-460f-8d2a-9ae287b59953 which can be used as unique global reference for BlackBerry BlackCat Threat Overview in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title BlackCat Malware (AKA ALPHV)

Huntress BlackCat

Carvey, H. (2024, February 28). BlackCat Ransomware Affiliate TTPs. Retrieved March 27, 2024.

Internal MISP references

UUID faa60cf9-0fc5-5728-90be-d0e11b48a921 which can be used as unique global reference for Huntress BlackCat in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-27T00:00:00Z
date_published 2024-02-28T00:00:00Z
source MITRE
title BlackCat Ransomware Affiliate TTPs

Sophos BlackCat Jul 2022

Brandt, Andrew. (2022, July 14). BlackCat ransomware attacks not merely a byproduct of bad luck. Retrieved December 20, 2022.

Internal MISP references

UUID 481a0106-d5b6-532c-8f5b-6c0c477185f4 which can be used as unique global reference for Sophos BlackCat Jul 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-12-20T00:00:00Z
date_published 2022-07-14T00:00:00Z
source MITRE
title BlackCat ransomware attacks not merely a byproduct of bad luck

ESEST Black Energy Jan 2016

Cherepanov, A.. (2016, January 3). BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry. Retrieved May 18, 2016.

Internal MISP references

UUID 4d626eb9-3722-4aa4-b95e-1650cc2865c2 which can be used as unique global reference for ESEST Black Energy Jan 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-05-18T00:00:00Z
date_published 2016-01-03T00:00:00Z
source MITRE
title BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry

ESET BlackEnergy Jan 2016

Cherepanov, A.. (2016, January 3). BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry . Retrieved June 10, 2020.

Internal MISP references

UUID a0103079-c966-46b6-8871-c01f7f0eea4c which can be used as unique global reference for ESET BlackEnergy Jan 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-10T00:00:00Z
date_published 2016-01-03T00:00:00Z
source MITRE
title BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry

F-Secure BlackEnergy 2014

F-Secure Labs. (2014). BlackEnergy & Quedagh: The convergence of crimeware and APT attacks. Retrieved March 24, 2016.

Internal MISP references

UUID 5f228fb5-d959-4c4a-bb8c-f9dc01d5af07 which can be used as unique global reference for F-Secure BlackEnergy 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-03-24T00:00:00Z
date_published 2014-01-01T00:00:00Z
source MITRE
title BlackEnergy & Quedagh: The convergence of crimeware and APT attacks

ESET BlackLotus March 01 2023

Martin Smolár. (2023, March 1). BlackLotus UEFI bootkit: Myth confirmed. Retrieved September 29, 2023.

Internal MISP references

UUID 1a4c134b-c701-400f-beee-e6b3cc835042 which can be used as unique global reference for ESET BlackLotus March 01 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-29T00:00:00Z
date_published 2023-03-01T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title BlackLotus UEFI bootkit: Myth confirmed

Securelist BlackOasis Oct 2017

Kaspersky Lab's Global Research & Analysis Team. (2017, October 16). BlackOasis APT and new targeted attacks leveraging zero-day exploit. Retrieved February 15, 2018.

Internal MISP references

UUID 66121c37-6b66-4ab2-9f63-1adb80dcec62 which can be used as unique global reference for Securelist BlackOasis Oct 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-15T00:00:00Z
date_published 2017-10-16T00:00:00Z
source MITRE, Tidal Cyber
title BlackOasis APT and new targeted attacks leveraging zero-day exploit

ReliaQuest May 28 2024

ReliaQuest Threat Research Team. (2024, May 28). BlackSuit Attack Analysis - ReliaQuest. Retrieved June 5, 2024.

Internal MISP references

UUID 2a67b1df-9a15-487e-a777-8a3fe46b0179 which can be used as unique global reference for ReliaQuest May 28 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-05T00:00:00Z
date_published 2024-05-28T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title BlackSuit Attack Analysis - ReliaQuest

HC3 Analyst Note BlackSuit Ransomware November 2023

Health Sector Cybersecurity Coordination Center (HC3). (2023, November 6). BlackSuit Ransomware. Retrieved June 7, 2024.

Internal MISP references

UUID d956f0c6-d90e-49e8-a64c-a46bfc177cc6 which can be used as unique global reference for HC3 Analyst Note BlackSuit Ransomware November 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-07T00:00:00Z
date_published 2023-11-06T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title BlackSuit Ransomware

Cyble May 12 2023

Cybleinc. (2023, May 12). BlackSuit Ransomware Strikes Windows and Linux Users. Retrieved January 1, 2024.

Internal MISP references

UUID 7e335494-86a7-49cd-a9f3-783d73c36d9d which can be used as unique global reference for Cyble May 12 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-01T00:00:00Z
date_published 2023-05-12T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title BlackSuit Ransomware Strikes Windows and Linux Users

Palo Alto Black-T October 2020

Quist, N. (2020, October 5). Black-T: New Cryptojacking Variant from TeamTNT. Retrieved September 22, 2021.

Internal MISP references

UUID d4351c8e-026d-4660-9344-166481ecf64a which can be used as unique global reference for Palo Alto Black-T October 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-22T00:00:00Z
date_published 2020-10-05T00:00:00Z
source MITRE
title Black-T: New Cryptojacking Variant from TeamTNT

BlackWater Malware Cloudflare Workers

Lawrence Abrams. (2020, March 14). BlackWater Malware Abuses Cloudflare Workers for C2 Communication. Retrieved July 8, 2022.

Internal MISP references

UUID 053895e8-da3f-4291-a728-2198fde774e7 which can be used as unique global reference for BlackWater Malware Cloudflare Workers in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-08T00:00:00Z
date_published 2020-03-14T00:00:00Z
source MITRE
title BlackWater Malware Abuses Cloudflare Workers for C2 Communication

NHS UK BLINDINGCAN Aug 2020

NHS Digital . (2020, August 20). BLINDINGCAN Remote Access Trojan. Retrieved August 20, 2020.

Internal MISP references

UUID acca4c89-acce-4916-88b6-f4dac7d8ab19 which can be used as unique global reference for NHS UK BLINDINGCAN Aug 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-20T00:00:00Z
date_published 2020-08-20T00:00:00Z
source MITRE
title BLINDINGCAN Remote Access Trojan

Azure Blob Snapshots

Microsoft Azure. (2021, December 29). Blob snapshots. Retrieved March 2, 2022.

Internal MISP references

UUID 152628ab-3244-4cc7-a68e-a220b652039b which can be used as unique global reference for Azure Blob Snapshots in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-02T00:00:00Z
date_published 2021-12-29T00:00:00Z
source MITRE
title Blob snapshots

objsee block blocking login items

Patrick Wardle. (2018, July 23). Block Blocking Login Items. Retrieved October 1, 2021.

Internal MISP references

UUID 76511800-8331-476b-ab4f-0daa587f5e22 which can be used as unique global reference for objsee block blocking login items in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-01T00:00:00Z
date_published 2018-07-23T00:00:00Z
source MITRE
title Block Blocking Login Items

Technospot Chrome Extensions GP

Mohta, A. (n.d.). Block Chrome Extensions using Google Chrome Group Policy Settings. Retrieved January 10, 2018.

Internal MISP references

UUID 76faf20c-27d3-4e67-8ab7-8480f8f88ae5 which can be used as unique global reference for Technospot Chrome Extensions GP in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-10T00:00:00Z
source MITRE
title Block Chrome Extensions using Google Chrome Group Policy Settings

Evi1cg Forfiles Nov 2017

Evi1cg. (2017, November 26). block cmd.exe ? try this :. Retrieved September 12, 2024.

Internal MISP references

UUID b292b85e-68eb-43c3-9b5b-222810e2f26a which can be used as unique global reference for Evi1cg Forfiles Nov 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2017-11-26T00:00:00Z
source MITRE
title block cmd.exe ? try this :

Fifield Blocking Resistent Communication through domain fronting 2015

David Fifield, Chang Lan, Rod Hynes, Percy Wegmann, and Vern Paxson. (2015). Blocking-resistant communication through domain fronting. Retrieved November 20, 2017.

Internal MISP references

UUID 52671075-c425-40c7-a49a-b75e44a0c58a which can be used as unique global reference for Fifield Blocking Resistent Communication through domain fronting 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-20T00:00:00Z
date_published 2015-01-01T00:00:00Z
source MITRE
title Blocking-resistant communication through domain fronting

GitHub Bloodhound

Robbins, A., Vazarkar, R., and Schroeder, W. (2016, April 17). Bloodhound: Six Degrees of Domain Admin. Retrieved March 5, 2019.

Internal MISP references

UUID e90b4941-5dff-4f38-b4dd-af3426fd621e which can be used as unique global reference for GitHub Bloodhound in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-05T00:00:00Z
date_published 2016-04-17T00:00:00Z
source MITRE
title Bloodhound: Six Degrees of Domain Admin

PwC Blue Callisto December 6 2022

PwC Threat Intelligence. (2022, December 6). Blue Callisto orbits around US Laboratories in 2022. Retrieved October 1, 2024.

Internal MISP references

UUID ab48a205-ca06-4328-96a4-876007024a7d which can be used as unique global reference for PwC Blue Callisto December 6 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-01T00:00:00Z
date_published 2022-12-06T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Blue Callisto orbits around US Laboratories in 2022

Blue Cloud of Death

Kunz, Bryce. (2018, May 11). Blue Cloud of Death: Red Teaming Azure. Retrieved October 23, 2019.

Internal MISP references

UUID 0c764280-9d8c-4fa4-9088-170f02550d4c which can be used as unique global reference for Blue Cloud of Death in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-23T00:00:00Z
date_published 2018-05-11T00:00:00Z
source MITRE
title Blue Cloud of Death: Red Teaming Azure

Blue Cloud of Death Video

Kunz, Bruce. (2018, October 14). Blue Cloud of Death: Red Teaming Azure. Retrieved November 21, 2019.

Internal MISP references

UUID 39b0adf6-c71e-4501-b8bb-fab82718486b which can be used as unique global reference for Blue Cloud of Death Video in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-11-21T00:00:00Z
date_published 2018-10-14T00:00:00Z
source MITRE
title Blue Cloud of Death: Red Teaming Azure

1 - appv

SEONGSU PARK. (2022, December 27). BlueNoroff introduces new methods bypassing MoTW. Retrieved February 6, 2024.

Internal MISP references

UUID acdf0a7f-f341-5bec-bfe0-f879827f0185 which can be used as unique global reference for 1 - appv in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-06T00:00:00Z
date_published 2022-12-27T00:00:00Z
source MITRE
title BlueNoroff introduces new methods bypassing MoTW

apple doco bonjour description

Apple Inc. (2013, April 23). Bonjour Overview. Retrieved October 11, 2021.

Internal MISP references

UUID b8538d67-ab91-41c2-9cc3-a7b00c6b372a which can be used as unique global reference for apple doco bonjour description in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-11T00:00:00Z
date_published 2013-04-23T00:00:00Z
source MITRE
title Bonjour Overview

Booby Trap Shortcut 2017

Weyne, F. (2017, April). Booby trap a shortcut with a backdoor. Retrieved October 3, 2023.

Internal MISP references

UUID 1a820fb8-3cff-584b-804f-9bad0592873b which can be used as unique global reference for Booby Trap Shortcut 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-03T00:00:00Z
date_published 2017-04-01T00:00:00Z
source MITRE
title Booby trap a shortcut with a backdoor

Microsoft Bootcfg

Gerend, J. et al. (2017, October 16). bootcfg. Retrieved August 30, 2021.

Internal MISP references

UUID 44ffaa60-4461-4463-a1b5-abc868368c0a which can be used as unique global reference for Microsoft Bootcfg in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-30T00:00:00Z
date_published 2017-10-16T00:00:00Z
source MITRE
title bootcfg

Imperva DDoS for Hire

Imperva. (n.d.). Booters, Stressers and DDoSers. Retrieved October 4, 2020.

Internal MISP references

UUID 86f87ec6-058e-45a7-9314-0579a2b4e8f2 which can be used as unique global reference for Imperva DDoS for Hire in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-04T00:00:00Z
source MITRE
title Booters, Stressers and DDoSers

Wikipedia Booting

Wikipedia. (n.d.). Booting. Retrieved November 13, 2019.

Internal MISP references

UUID 6d9c72cb-6cda-445e-89ea-7e695063d49a which can be used as unique global reference for Wikipedia Booting in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-11-13T00:00:00Z
source MITRE
title Booting

FireEye BOOTRASH SANS

Glyer, C.. (2017, June 22). Boot What?. Retrieved May 4, 2020.

Internal MISP references

UUID 835c9e5d-b291-43d9-9b8a-2978aa8c8cd3 which can be used as unique global reference for FireEye BOOTRASH SANS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-04T00:00:00Z
date_published 2017-06-22T00:00:00Z
source MITRE
title Boot What?

Unit42 LockerGoga 2019

Harbison, M. (2019, March 26). Born This Way? Origins of LockerGoga. Retrieved April 16, 2019.

Internal MISP references

UUID 8f058923-f2f7-4c0e-b90a-c7a0d5e62186 which can be used as unique global reference for Unit42 LockerGoga 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-16T00:00:00Z
date_published 2019-03-26T00:00:00Z
source MITRE
title Born This Way? Origins of LockerGoga

Threatexpress MetaTwin 2017

Vest, J. (2017, October 9). Borrowing Microsoft MetaData and Signatures to Hide Binary Payloads. Retrieved September 10, 2019.

Internal MISP references

UUID 156efefd-793f-4219-8904-ef160a45c9ec which can be used as unique global reference for Threatexpress MetaTwin 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-10T00:00:00Z
date_published 2017-10-09T00:00:00Z
source MITRE
title Borrowing Microsoft MetaData and Signatures to Hide Binary Payloads

Sandfly BPFDoor 2022

The Sandfly Security Team. (2022, May 11). BPFDoor - An Evasive Linux Backdoor Technical Analysis. Retrieved September 29, 2023.

Internal MISP references

UUID 01c8337f-614b-5f63-870f-5c880b390922 which can be used as unique global reference for Sandfly BPFDoor 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-29T00:00:00Z
date_published 2022-05-11T00:00:00Z
source MITRE
title BPFDoor - An Evasive Linux Backdoor Technical Analysis

Deep Instinct BPFDoor 2023

Shaul Vilkomir-Preisman and Eliran Nissan. (2023, May 10). BPFDoor Malware Evolves – Stealthy Sniffing Backdoor Ups Its Game. Retrieved September 19, 2024.

Internal MISP references

UUID c246b4da-75fb-5b41-ba9c-c0eb1b261e37 which can be used as unique global reference for Deep Instinct BPFDoor 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-19T00:00:00Z
date_published 2023-05-10T00:00:00Z
source MITRE
title BPFDoor Malware Evolves – Stealthy Sniffing Backdoor Ups Its Game

AADInternals - BPRT

Dr. Nestori Syynimaa. (2021, January 31). BPRT unleashed: Joining multiple devices to Azure AD and Intune. Retrieved March 4, 2022.

Internal MISP references

UUID 19af3fce-eb57-4e67-9678-1968e9ea9677 which can be used as unique global reference for AADInternals - BPRT in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-04T00:00:00Z
date_published 2021-01-31T00:00:00Z
source MITRE
title BPRT unleashed: Joining multiple devices to Azure AD and Intune

Brazking-Websockets

Shahar Tavor. (n.d.). BrazKing Android Malware Upgraded and Targeting Brazilian Banks. Retrieved March 24, 2023.

Internal MISP references

UUID fa813afd-b8f0-535b-9108-6d3d3989b6b9 which can be used as unique global reference for Brazking-Websockets in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-24T00:00:00Z
source MITRE
title BrazKing Android Malware Upgraded and Targeting Brazilian Banks

Morphisec 3 26 2024

Arnold Osipov. (2024, March 26). Breaking Boundaries Mispadu's Infiltration Beyond LATAM. Retrieved April 4, 2024.

Internal MISP references

UUID 38d88851-1b71-4ed7-88e3-2ee5c3876c06 which can be used as unique global reference for Morphisec 3 26 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-04T00:00:00Z
date_published 2024-03-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Breaking Boundaries Mispadu's Infiltration Beyond LATAM

MSTIC Nobelium Toolset May 2021

MSTIC. (2021, May 28). Breaking down NOBELIUM’s latest early-stage toolset. Retrieved August 4, 2021.

Internal MISP references

UUID 52464e69-ff9e-4101-9596-dd0c6404bf76 which can be used as unique global reference for MSTIC Nobelium Toolset May 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-04T00:00:00Z
date_published 2021-05-28T00:00:00Z
source MITRE
title Breaking down NOBELIUM’s latest early-stage toolset

Lee 2013

Lee, T., Hanzlik, D., Ahl, I. (2013, August 7). Breaking Down the China Chopper Web Shell - Part I. Retrieved March 27, 2015.

Internal MISP references

UUID 6d1e2b0a-fed2-490b-be25-6580dfb7d6aa which can be used as unique global reference for Lee 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-03-27T00:00:00Z
date_published 2013-08-07T00:00:00Z
source MITRE
title Breaking Down the China Chopper Web Shell - Part I

sentinelone-malvertising

Hegel, Tom. (2023, January 19). Breaking Down the SEO Poisoning Attack | How Attackers Are Hijacking Search Results. Retrieved February 21, 2023.

Internal MISP references

UUID 7989f0de-90b8-5e6d-bc20-1764610d1568 which can be used as unique global reference for sentinelone-malvertising in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-21T00:00:00Z
date_published 2023-01-19T00:00:00Z
source MITRE
title Breaking Down the SEO Poisoning Attack

OS X Keychain

Juuso Salonen. (2012, September 5). Breaking into the OS X keychain. Retrieved July 15, 2017.

Internal MISP references

UUID bde3ff9c-fbf9-49c4-b414-70dc8356d57d which can be used as unique global reference for OS X Keychain in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-15T00:00:00Z
date_published 2012-09-05T00:00:00Z
source MITRE
title Breaking into the OS X keychain

Brown Exploiting Linkers

Tim Brown. (2011, June 29). Breaking the links: Exploiting the linker. Retrieved March 29, 2021.

Internal MISP references

UUID 24674e91-5cbf-4023-98ae-a9f0968ad99a which can be used as unique global reference for Brown Exploiting Linkers in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-29T00:00:00Z
date_published 2011-06-29T00:00:00Z
source MITRE
title Breaking the links: Exploiting the linker

FireEye Outlook Dec 2019

McWhirt, M., Carr, N., Bienstock, D. (2019, December 4). Breaking the Rules: A Tough Outlook for Home Page Attacks (CVE-2017-11774). Retrieved June 23, 2020.

Internal MISP references

UUID f23a773f-9c50-4193-877d-97f7c13f48f1 which can be used as unique global reference for FireEye Outlook Dec 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-23T00:00:00Z
date_published 2019-12-04T00:00:00Z
source MITRE
title Breaking the Rules: A Tough Outlook for Home Page Attacks (CVE-2017-11774)

Cisco Talos Blog December 08 2022

Cisco Talos Blog. (2022, December 8). Breaking the silence - Recent Truebot activity. Retrieved May 8, 2023.

Internal MISP references

UUID bcf92374-48a3-480f-a679-9fd34b67bcdd which can be used as unique global reference for Cisco Talos Blog December 08 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-08T00:00:00Z
date_published 2022-12-08T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Breaking the silence - Recent Truebot activity

PaloAlto Preventing Opportunistic Attacks Apr 2016

Kiwi. (2016, April 6). Breakout Recap: Cybersecurity Best Practices Part 1 - Preventing Opportunistic Attacks. Retrieved October 3, 2018.

Internal MISP references

UUID 60fac434-2815-4568-b951-4bde55c2e3af which can be used as unique global reference for PaloAlto Preventing Opportunistic Attacks Apr 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-10-03T00:00:00Z
date_published 2016-04-06T00:00:00Z
source MITRE
title Breakout Recap: Cybersecurity Best Practices Part 1 - Preventing Opportunistic Attacks

Mandiant BYOL

Kirk, N. (2018, June 18). Bring Your Own Land (BYOL) – A Novel Red Teaming Technique. Retrieved October 4, 2021.

Internal MISP references

UUID 445efe8b-659a-4023-afc7-aa7cd21ee5a1 which can be used as unique global reference for Mandiant BYOL in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-04T00:00:00Z
date_published 2018-06-18T00:00:00Z
source MITRE
title Bring Your Own Land (BYOL) – A Novel Red Teaming Technique

Mandiant BYOL 2018

Kirk, N. (2018, June 18). Bring Your Own Land (BYOL) – A Novel Red Teaming Technique. Retrieved October 8, 2021.

Internal MISP references

UUID 104a1c1c-0899-4ff9-a5c4-73de702c467d which can be used as unique global reference for Mandiant BYOL 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-08T00:00:00Z
date_published 2018-06-18T00:00:00Z
source MITRE
title Bring Your Own Land (BYOL) – A Novel Red Teaming Technique

Comparitech Leak

Bischoff, P. (2020, October 15). Broadvoice database of more than 350 million customer records exposed online. Retrieved October 20, 2020.

Internal MISP references

UUID fa0eac56-45ea-4628-88cf-b843874b4a4d which can be used as unique global reference for Comparitech Leak in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
date_published 2020-10-15T00:00:00Z
source MITRE
title Broadvoice database of more than 350 million customer records exposed online

ThreatPost Broadvoice Leak

Seals, T. (2020, October 15). Broadvoice Leak Exposes 350M Records, Personal Voicemail Transcripts. Retrieved October 20, 2020.

Internal MISP references

UUID 91d20979-d4e7-4372-8a83-1e1512c8d3a9 which can be used as unique global reference for ThreatPost Broadvoice Leak in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
date_published 2020-10-15T00:00:00Z
source MITRE
title Broadvoice Leak Exposes 350M Records, Personal Voicemail Transcripts

Secureworks BRONZE BUTLER Oct 2017

Counter Threat Unit Research Team. (2017, October 12). BRONZE BUTLER Targets Japanese Enterprises. Retrieved January 4, 2018.

Internal MISP references

UUID c62d8d1a-cd1b-4b39-95b6-68f3f063dacf which can be used as unique global reference for Secureworks BRONZE BUTLER Oct 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-04T00:00:00Z
date_published 2017-10-12T00:00:00Z
source MITRE, Tidal Cyber
title BRONZE BUTLER Targets Japanese Enterprises

Secureworks BRONZE FLEETWOOD Profile

Secureworks CTU. (n.d.). BRONZE FLEETWOOD. Retrieved February 5, 2024.

Internal MISP references

UUID 4fbb113c-94b4-56fd-b292-1ccf84e1c8f3 which can be used as unique global reference for Secureworks BRONZE FLEETWOOD Profile in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-05T00:00:00Z
source MITRE
title BRONZE FLEETWOOD

Secureworks BRONZE HUNTLEY

Secureworks. (2021, January 1). BRONZE HUNTLEY Threat Profile. Retrieved May 5, 2021.

Internal MISP references

UUID 9558ebc5-4de3-4b1d-b32c-a170adbc3451 which can be used as unique global reference for Secureworks BRONZE HUNTLEY in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-05-05T00:00:00Z
date_published 2021-01-01T00:00:00Z
source MITRE
title BRONZE HUNTLEY Threat Profile

Secureworks BRONZE PRESIDENT December 2019

Counter Threat Unit Research Team. (2019, December 29). BRONZE PRESIDENT Targets NGOs. Retrieved April 13, 2021.

Internal MISP references

UUID 019889e0-a2ce-476f-9a31-2fc394de2821 which can be used as unique global reference for Secureworks BRONZE PRESIDENT December 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-13T00:00:00Z
date_published 2019-12-29T00:00:00Z
source MITRE, Tidal Cyber
title BRONZE PRESIDENT Targets NGOs

Dell SecureWorks BRONZE STARLIGHT Profile

SecureWorks. (n.d.). BRONZE STARLIGHT. Retrieved December 6, 2023.

Internal MISP references

UUID d2e8cd95-fcd5-58e4-859a-c4724ec94ab4 which can be used as unique global reference for Dell SecureWorks BRONZE STARLIGHT Profile in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-06T00:00:00Z
source MITRE
title BRONZE STARLIGHT

SecureWorks BRONZE STARLIGHT Ransomware Operations June 2022

Counter Threat Unit Research Team . (2022, June 23). BRONZE STARLIGHT RANSOMWARE OPERATIONS USE HUI LOADER. Retrieved December 7, 2023.

Internal MISP references

UUID 0b275cf9-a885-58cc-b859-112090a711e3 which can be used as unique global reference for SecureWorks BRONZE STARLIGHT Ransomware Operations June 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-07T00:00:00Z
date_published 2022-06-23T00:00:00Z
source MITRE
title BRONZE STARLIGHT RANSOMWARE OPERATIONS USE HUI LOADER

SecureWorks BRONZE UNION June 2017

Counter Threat Unit Research Team. (2017, June 27). BRONZE UNION Cyberespionage Persists Despite Disclosures. Retrieved July 13, 2017.

Internal MISP references

UUID 42adda47-f5d6-4d34-9b3d-3748a782f886 which can be used as unique global reference for SecureWorks BRONZE UNION June 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-13T00:00:00Z
date_published 2017-06-27T00:00:00Z
source MITRE, Tidal Cyber
title BRONZE UNION Cyberespionage Persists Despite Disclosures

Wikipedia Browser Extension

Wikipedia. (2017, October 8). Browser Extension. Retrieved January 11, 2018.

Internal MISP references

UUID 52aef082-3f8e-41b4-af95-6631ce4c9e91 which can be used as unique global reference for Wikipedia Browser Extension in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-11T00:00:00Z
date_published 2017-10-08T00:00:00Z
source MITRE
title Browser Extension

Mr. D0x BitB 2022

mr.d0x. (2022, March 15). Browser In The Browser (BITB) Attack. Retrieved March 8, 2023.

Internal MISP references

UUID 447f6b34-ac3a-58d9-af96-aa1d947a3e0e which can be used as unique global reference for Mr. D0x BitB 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-08T00:00:00Z
date_published 2022-03-15T00:00:00Z
source MITRE
title Browser In The Browser (BITB) Attack

Cobalt Strike Browser Pivot

Mudge, R. (n.d.). Browser Pivoting. Retrieved January 10, 2018.

Internal MISP references

UUID 0c1dd453-7281-4ee4-9c8f-bdc401cf48d7 which can be used as unique global reference for Cobalt Strike Browser Pivot in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-10T00:00:00Z
source MITRE
title Browser Pivoting

Symantec Buckeye

Symantec Security Response. (2016, September 6). Buckeye cyberespionage group shifts gaze from US to Hong Kong. Retrieved September 26, 2016.

Internal MISP references

UUID dbf3ce3e-bcf2-4e47-ad42-839e51967395 which can be used as unique global reference for Symantec Buckeye in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-09-26T00:00:00Z
date_published 2016-09-06T00:00:00Z
source MITRE, Tidal Cyber
title Buckeye cyberespionage group shifts gaze from US to Hong Kong

ESET Buhtrap and Buran April 2019

ESET Research. (2019, April 30). Buhtrap backdoor and Buran ransomware distributed via major advertising platform. Retrieved May 11, 2020.

Internal MISP references

UUID e308a957-fb5c-44e8-a846-be6daef4b940 which can be used as unique global reference for ESET Buhtrap and Buran April 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-11T00:00:00Z
date_published 2019-04-30T00:00:00Z
source MITRE
title Buhtrap backdoor and Buran ransomware distributed via major advertising platform

S1 Custom Shellcode Tool

Bunce, D. (2019, October 31). Building A Custom Tool For Shellcode Analysis. Retrieved October 4, 2021.

Internal MISP references

UUID f49bfd00-48d5-4d84-a7b7-cb23fcdf861b which can be used as unique global reference for S1 Custom Shellcode Tool in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-04T00:00:00Z
date_published 2019-10-31T00:00:00Z
source MITRE
title Building A Custom Tool For Shellcode Analysis

Data Driven Security DGA

Jacobs, J. (2014, October 2). Building a DGA Classifier: Part 2, Feature Engineering. Retrieved February 18, 2019.

Internal MISP references

UUID c92fb2ec-c144-42d4-bd42-179d3d737db0 which can be used as unique global reference for Data Driven Security DGA in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-18T00:00:00Z
date_published 2014-10-02T00:00:00Z
source MITRE
title Building a DGA Classifier: Part 2, Feature Engineering

CTD PPID Spoofing Macro Mar 2019

Tafani-Dereeper, C. (2019, March 12). Building an Office macro to spoof parent processes and command line arguments. Retrieved June 3, 2019.

Internal MISP references

UUID b06b72ba-dbd6-4190-941a-0cdd3d659ab6 which can be used as unique global reference for CTD PPID Spoofing Macro Mar 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-03T00:00:00Z
date_published 2019-03-12T00:00:00Z
source MITRE
title Building an Office macro to spoof parent processes and command line arguments

Trend Micro September 02 2022

Trend Micro. (2022, September 2). BumbleBee a New Modular Backdoor Evolved From BookWorm. Retrieved May 7, 2023.

Internal MISP references

UUID acb25abb-23c7-4b5d-849b-346388dde15c which can be used as unique global reference for Trend Micro September 02 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2022-09-02T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title BumbleBee a New Modular Backdoor Evolved From BookWorm

Proofpoint 2 12 2024

Axel F; Selena Larson; The Proofpoint Threat Research Team. (2024, February 12). Bumblebee Buzzes Back in Black . Retrieved February 14, 2024.

Internal MISP references

UUID 643968ec-bc01-4317-ba91-b2bafeb421c9 which can be used as unique global reference for Proofpoint 2 12 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-14T00:00:00Z
date_published 2024-02-12T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Bumblebee Buzzes Back in Black

Toxin Labs 3 4 2023

Toxin Labs. (2023, March 4). BumbleBee DocuSign Campaign. Retrieved February 19, 2024.

Internal MISP references

UUID 8404527a-9197-47ea-8bdf-c824b66ffede which can be used as unique global reference for Toxin Labs 3 4 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-19T00:00:00Z
date_published 2023-03-04T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title BumbleBee DocuSign Campaign

SEC Consult Bumblebee April 11 2023

Angelo Violetti. (2023, April 11). BumbleBee hunting with a Velociraptor. Retrieved May 6, 2023.

Internal MISP references

UUID c4cdaaeb-5776-4899-bdcf-8daf9d6ea615 which can be used as unique global reference for SEC Consult Bumblebee April 11 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-06T00:00:00Z
date_published 2023-04-11T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title BumbleBee hunting with a Velociraptor

Cybereason Bumblebee August 2022

Cybereason. (2022, August 17). Bumblebee Loader – The High Road to Enterprise Domain Control. Retrieved August 29, 2022.

Internal MISP references

UUID 64bfb605-af69-4df0-ae56-32fa997516bc which can be used as unique global reference for Cybereason Bumblebee August 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-29T00:00:00Z
date_published 2022-08-17T00:00:00Z
source MITRE
title Bumblebee Loader – The High Road to Enterprise Domain Control

Secureworks Bumblebee April 20 2023

Counter Threat Unit Research Team. (2023, April 20). Bumblebee Malware Distributed Via Trojanized Installer Downloads. Retrieved May 6, 2023.

Internal MISP references

UUID ac31c45d-ba78-4158-b163-723ab22c4dc4 which can be used as unique global reference for Secureworks Bumblebee April 20 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-06T00:00:00Z
date_published 2023-04-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Bumblebee Malware Distributed Via Trojanized Installer Downloads

Symantec Bumblebee June 2022

Kamble, V. (2022, June 28). Bumblebee: New Loader Rapidly Assuming Central Position in Cyber-crime Ecosystem. Retrieved August 24, 2022.

Internal MISP references

UUID 81bfabad-b5b3-4e45-ac1d-1e2e829fca33 which can be used as unique global reference for Symantec Bumblebee June 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-24T00:00:00Z
date_published 2022-06-28T00:00:00Z
source MITRE
title Bumblebee: New Loader Rapidly Assuming Central Position in Cyber-crime Ecosystem

Cyble September 07 2022

Cybleinc. (2022, September 7). Bumblebee Returns with New Infection Technique. Retrieved May 7, 2023.

Internal MISP references

UUID 9d194526-2d01-4f92-9055-39e66d26081a which can be used as unique global reference for Cyble September 07 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2022-09-07T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Bumblebee Returns with New Infection Technique

The DFIR Report Bumblebee September 26 2022

The DFIR Report. (2022, September 26). BumbleBee: Round Two. Retrieved May 7, 2023.

Internal MISP references

UUID 8b51d35c-7a2a-4f03-95b1-c0b319f73c05 which can be used as unique global reference for The DFIR Report Bumblebee September 26 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2022-09-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title BumbleBee: Round Two

The DFIR Report Bumblebee November 14 2022

The DFIR Report. (2022, November 14). BumbleBee Zeros in on Meterpreter. Retrieved May 7, 2023.

Internal MISP references

UUID 831e1b4e-6edd-498f-863c-606d2392b622 which can be used as unique global reference for The DFIR Report Bumblebee November 14 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2022-11-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title BumbleBee Zeros in on Meterpreter

objsee netwire backdoor 2019

Patrick Wardle. (2019, June 20). Burned by Fire(fox). Retrieved October 1, 2021.

Internal MISP references

UUID 866c5305-8629-4f09-8dfe-192c8573ffb0 which can be used as unique global reference for objsee netwire backdoor 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-01T00:00:00Z
date_published 2019-06-20T00:00:00Z
source MITRE
title Burned by Fire(fox)

401 TRG Winnti Umbrella May 2018

Hegel, T. (2018, May 3). Burning Umbrella: An Intelligence Report on the Winnti Umbrella and Associated State-Sponsored Attackers. Retrieved July 8, 2018.

Internal MISP references

UUID e3f1f2e4-dc1c-4d9c-925d-47013f44a69f which can be used as unique global reference for 401 TRG Winnti Umbrella May 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-08T00:00:00Z
date_published 2018-05-03T00:00:00Z
source MITRE
title Burning Umbrella: An Intelligence Report on the Winnti Umbrella and Associated State-Sponsored Attackers

Bypassing Gatekeeper

Thomas Reed. (2016, March 31). Bypassing Apple's Gatekeeper. Retrieved July 5, 2017.

Internal MISP references

UUID 957a0916-614e-4c7b-a6dd-1baa4fc6f93e which can be used as unique global reference for Bypassing Gatekeeper in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-05T00:00:00Z
date_published 2016-03-31T00:00:00Z
source MITRE
title Bypassing Apple's Gatekeeper

engima0x3 DNX Bypass

Nelson, M. (2017, November 17). Bypassing Application Whitelisting By Using dnx.exe. Retrieved May 25, 2017.

Internal MISP references

UUID e0186f1d-100d-4e52-b6f7-0a7e1c1a35f0 which can be used as unique global reference for engima0x3 DNX Bypass in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-05-25T00:00:00Z
date_published 2017-11-17T00:00:00Z
source MITRE
title Bypassing Application Whitelisting By Using dnx.exe

engima0x3 RCSI Bypass

Nelson, M. (2016, November 21). Bypassing Application Whitelisting By Using rcsi.exe. Retrieved May 26, 2017.

Internal MISP references

UUID 0b815bd9-6c7f-4bd8-9031-667fa6252f89 which can be used as unique global reference for engima0x3 RCSI Bypass in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-05-26T00:00:00Z
date_published 2016-11-21T00:00:00Z
source MITRE
title Bypassing Application Whitelisting By Using rcsi.exe

Exploit Monday WinDbg

Graeber, M. (2016, August 15). Bypassing Application Whitelisting by using WinDbg/CDB as a Shellcode Runner. Retrieved May 26, 2017.

Internal MISP references

UUID abd5f871-e12e-4355-af72-d4be79cb0291 which can be used as unique global reference for Exploit Monday WinDbg in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-05-26T00:00:00Z
date_published 2016-08-15T00:00:00Z
source MITRE
title Bypassing Application Whitelisting by using WinDbg/CDB as a Shellcode Runner

SubTee MSBuild

Smith, C. (2016, September 13). Bypassing Application Whitelisting using MSBuild.exe - Device Guard Example and Mitigations. Retrieved September 13, 2016.

Internal MISP references

UUID 82a762d0-c59f-456d-a7d3-1cab3fa02526 which can be used as unique global reference for SubTee MSBuild in MISP communities and other software using the MISP galaxy

Associated metadata
Metadata key Value
date_accessed 2016-09-13T00:00:00Z
date_published 2016-09-13T00:00:00Z
source MITRE
title Bypassing Application Whitelisting using MSBuild.exe - Device Guard Example and Mitigations

Bypassing CloudTrail in AWS Service Catalog

Nick Frichette. (2023, March 20). Bypassing CloudTrail in AWS Service Catalog, and Other Logging Research. Retrieved September 18, 2023.

Internal MISP references

UUID de50bd67-96bb-537c-b91d-e541a717b7a1 which can be used as unique global reference for Bypassing CloudTrail in AWS Service Catalog in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-18T00:00:00Z
date_published 2023-03-20T00:00:00Z
source MITRE
title Bypassing CloudTrail in AWS Service Catalog, and Other Logging Research

AADInternals - Conditional Access Bypass

Dr. Nestori Syynimaa. (2020, September 6). Bypassing conditional access by faking device compliance. Retrieved March 4, 2022.

Internal MISP references

UUID 832841a1-92d1-4fcc-90f7-afbabad84aec which can be used as unique global reference for AADInternals - Conditional Access Bypass in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-04T00:00:00Z
date_published 2020-09-06T00:00:00Z
source MITRE
title Bypassing conditional access by faking device compliance

MsitPros CHM Aug 2017

Moe, O. (2017, August 13). Bypassing Device guard UMCI using CHM – CVE-2017-8625. Retrieved October 3, 2018.

Internal MISP references

UUID d4e4cc8a-3246-463f-ba06-d68459d907d4 which can be used as unique global reference for MsitPros CHM Aug 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-10-03T00:00:00Z
date_published 2017-08-13T00:00:00Z
source MITRE
title Bypassing Device guard UMCI using CHM – CVE-2017-8625

TCC macOS bypass

Phil Stokes. (2021, July 1). Bypassing macOS TCC User Privacy Protections By Accident and Design. Retrieved March 21, 2024.

Internal MISP references

UUID 4fc68e85-cd7a-5a15-84e3-8fbea0b28fd5 which can be used as unique global reference for TCC macOS bypass in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-21T00:00:00Z
date_published 2021-07-01T00:00:00Z
source MITRE
title Bypassing macOS TCC User Privacy Protections By Accident and Design

enigma0x3 sdclt app paths

Nelson, M. (2017, March 14). Bypassing UAC using App Paths. Retrieved May 25, 2017.

Internal MISP references

UUID 2e69a4a7-dc7f-4b7d-99b2-190c60d7efd1 which can be used as unique global reference for enigma0x3 sdclt app paths in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-05-25T00:00:00Z
date_published 2017-03-14T00:00:00Z
source MITRE
title Bypassing UAC using App Paths

MDSec System Calls

MDSec Research. (2020, December). Bypassing User-Mode Hooks and Direct Invocation of System Calls for Red Teams. Retrieved September 29, 2021.

Internal MISP references

UUID b461e226-1317-4ce4-a195-ba4c4957db99 which can be used as unique global reference for MDSec System Calls in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-29T00:00:00Z
date_published 2020-12-01T00:00:00Z
source MITRE
title Bypassing User-Mode Hooks and Direct Invocation of System Calls for Red Teams

Hybrid Analysis Icacls1 June 2018

Hybrid Analysis. (2018, June 12). c9b65b764985dfd7a11d3faf599c56b8.exe. Retrieved August 19, 2018.

Internal MISP references

UUID 74df644a-06b8-4331-85a3-932358d65b62 which can be used as unique global reference for Hybrid Analysis Icacls1 June 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-19T00:00:00Z
date_published 2018-06-12T00:00:00Z
source MITRE
title c9b65b764985dfd7a11d3faf599c56b8.exe

Microsoft Credential Manager store

Microsoft. (2016, August 31). Cached and Stored Credentials Technical Overview. Retrieved November 24, 2020.

Internal MISP references

UUID c949a29b-bb31-4bd7-a967-ddd48c7efb8e which can be used as unique global reference for Microsoft Credential Manager store in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-24T00:00:00Z
date_published 2016-08-31T00:00:00Z
source MITRE
title Cached and Stored Credentials Technical Overview

Microsoft - Cached Creds

Microsoft. (2016, August 21). Cached and Stored Credentials Technical Overview. Retrieved February 21, 2020.

Internal MISP references

UUID 590ea63f-f800-47e4-8d39-df11a184ba84 which can be used as unique global reference for Microsoft - Cached Creds in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-21T00:00:00Z
date_published 2016-08-21T00:00:00Z
source MITRE
title Cached and Stored Credentials Technical Overview

Kaspersky CactusPete Aug 2020

Zykov, K. (2020, August 13). CactusPete APT group’s updated Bisonal backdoor. Retrieved May 5, 2021.

Internal MISP references

UUID 1c393964-e717-45ad-8eb6-5df5555d3c70 which can be used as unique global reference for Kaspersky CactusPete Aug 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-05-05T00:00:00Z
date_published 2020-08-13T00:00:00Z
source MITRE, Tidal Cyber
title CactusPete APT group’s updated Bisonal backdoor

Kroll CACTUS Ransomware May 10 2023

Laurie Iacono, Stephen Green, Dave Truman. (2023, May 10). CACTUS Ransomware: Prickly New Variant Evades Detection. Retrieved August 10, 2023.

Internal MISP references

UUID f50de2f6-465f-4cae-a79c-cc135ebfee4f which can be used as unique global reference for Kroll CACTUS Ransomware May 10 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-10T00:00:00Z
date_published 2023-05-10T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title CACTUS Ransomware: Prickly New Variant Evades Detection

ESET CaddyWiper March 2022

ESET. (2022, March 15). CaddyWiper: New wiper malware discovered in Ukraine. Retrieved March 23, 2022.

Internal MISP references

UUID 9fa97444-311f-40c1-8728-c5f91634c750 which can be used as unique global reference for ESET CaddyWiper March 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-23T00:00:00Z
date_published 2022-03-15T00:00:00Z
source MITRE
title CaddyWiper: New wiper malware discovered in Ukraine

Cadet Blizzard emerges as novel threat actor

Microsoft Threat Intelligence. (2023, June 14). Cadet Blizzard emerges as a novel and distinct Russian threat actor. Retrieved July 10, 2023.

Internal MISP references

UUID 7180c6a7-e6ea-54bf-bcd7-c5238bbc5f5b which can be used as unique global reference for Cadet Blizzard emerges as novel threat actor in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-10T00:00:00Z
date_published 2023-06-14T00:00:00Z
source MITRE
title Cadet Blizzard emerges as a novel and distinct Russian threat actor

Cado Denonia April 3 2022

jbowen. (2022, April 3). Cado Discovers Denonia: The First Malware Specifically Targeting Lambda. Retrieved April 11, 2024.

Internal MISP references

UUID b276c28d-1488-4a21-86d1-7acdfd77794b which can be used as unique global reference for Cado Denonia April 3 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-11T00:00:00Z
date_published 2022-04-03T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Cado Discovers Denonia: The First Malware Specifically Targeting Lambda

Cado Security Denonia

Matt Muir. (2022, April 6). Cado Discovers Denonia: The First Malware Specifically Targeting Lambda. Retrieved May 27, 2022.

Internal MISP references

UUID 584e7ace-ef33-423b-9801-4728a447cb34 which can be used as unique global reference for Cado Security Denonia in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-27T00:00:00Z
date_published 2022-04-06T00:00:00Z
source MITRE
title Cado Discovers Denonia: The First Malware Specifically Targeting Lambda

Caesars Scattered Spider September 13 2023

William Turton. (2023, September 13). Caesars Entertainment Paid Millions to Hackers in Attack. Retrieved September 14, 2023.

Internal MISP references

UUID 6915c003-7c8b-451c-8fb1-3541f00c14fb which can be used as unique global reference for Caesars Scattered Spider September 13 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-14T00:00:00Z
date_published 2023-09-13T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Caesars Entertainment Paid Millions to Hackers in Attack

Sekoia Calisto December 5 2022

Felix Aimé, Maxime A., Sekoia TDR. (2022, December 5). Calisto show interests into entities involved in Ukraine war support. Retrieved October 1, 2024.

Internal MISP references

UUID 02fed1d1-b8a9-4bca-9e96-2cffe6f7ba89 which can be used as unique global reference for Sekoia Calisto December 5 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-01T00:00:00Z
date_published 2022-12-05T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Calisto show interests into entities involved in Ukraine war support

Securelist Calisto July 2018

Kuzin, M., Zelensky S. (2018, July 20). Calisto Trojan for macOS. Retrieved September 7, 2018.

Internal MISP references

UUID a292d77b-9150-46ea-b217-f51e091fdb57 which can be used as unique global reference for Securelist Calisto July 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-09-07T00:00:00Z
date_published 2018-07-20T00:00:00Z
source MITRE
title Calisto Trojan for macOS

CERTFR-2023-CTI-009

CERT-FR. (2023, October 26). Campagnes d'attaques du mode opératoire APT28 depuis 2021. Retrieved October 26, 2023.

Internal MISP references

UUID 5365ac4c-fbb8-4389-989e-a64cb7693371 which can be used as unique global reference for CERTFR-2023-CTI-009 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-26T00:00:00Z
date_published 2023-10-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Campagnes d'attaques du mode opératoire APT28 depuis 2021

FSI Andariel Campaign Rifle July 2017

FSI. (2017, July 27). Campaign Rifle - Andariel, the Maiden of Anguish. Retrieved September 12, 2024.

Internal MISP references

UUID bde61ee9-16f9-4bd9-a847-5cc9df21335c which can be used as unique global reference for FSI Andariel Campaign Rifle July 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2017-07-27T00:00:00Z
source MITRE
title Campaign Rifle - Andariel, the Maiden of Anguish

Check Point Research January 5 2022

Check Point Research. (2022, January 5). Can You Trust a File's Digital Signature? New Zloader Campaign Exploits Microsoft's Signature Verification Putting Users at Risk. Retrieved May 11, 2023.

Internal MISP references

UUID d26dfc4d-e563-4262-b527-0fffb7228234 which can be used as unique global reference for Check Point Research January 5 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-11T00:00:00Z
date_published 2022-01-05T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Can You Trust a File's Digital Signature? New Zloader Campaign Exploits Microsoft's Signature Verification Putting Users at Risk

Polak NPPSPY 2004

Sergey Polak. (2004, August). Capturing Windows Passwords using the Network Provider API. Retrieved May 17, 2024.

Internal MISP references

UUID ab5872b0-a755-5d85-8750-0b22f00ccb37 which can be used as unique global reference for Polak NPPSPY 2004 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-17T00:00:00Z
date_published 2004-08-01T00:00:00Z
source MITRE
title Capturing Windows Passwords using the Network Provider API

KasperskyCarbanak

Kaspersky Lab's Global Research & Analysis Team. (2015, February). CARBANAK APT THE GREAT BANK ROBBERY. Retrieved March 27, 2017.

Internal MISP references

UUID 053a2bbb-5509-4aba-bbd7-ccc3d8074291 which can be used as unique global reference for KasperskyCarbanak in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-27T00:00:00Z
date_published 2015-02-01T00:00:00Z
source MITRE
title CARBANAK APT THE GREAT BANK ROBBERY

Kaspersky Carbanak

Kaspersky Lab's Global Research and Analysis Team. (2015, February). CARBANAK APT THE GREAT BANK ROBBERY. Retrieved August 23, 2018.

Internal MISP references

UUID 2f7e77db-fe39-4004-9945-3c8943708494 which can be used as unique global reference for Kaspersky Carbanak in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-23T00:00:00Z
date_published 2015-02-01T00:00:00Z
source MITRE, Tidal Cyber
title CARBANAK APT THE GREAT BANK ROBBERY

Forcepoint Carbanak Google C2

Griffin, N. (2017, January 17). CARBANAK GROUP USES GOOGLE FOR MALWARE COMMAND-AND-CONTROL. Retrieved February 15, 2017.

Internal MISP references

UUID 3da6084f-5e12-4472-afb9-82efd3e22cf6 which can be used as unique global reference for Forcepoint Carbanak Google C2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-02-15T00:00:00Z
date_published 2017-01-17T00:00:00Z
source MITRE
title CARBANAK GROUP USES GOOGLE FOR MALWARE COMMAND-AND-CONTROL

Trend Micro Carberp February 2014

Trend Micro. (2014, February 27). CARBERP. Retrieved July 29, 2020.

Internal MISP references

UUID 069e458f-d780-47f9-8ebe-21b195fe9b33 which can be used as unique global reference for Trend Micro Carberp February 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-07-29T00:00:00Z
date_published 2014-02-27T00:00:00Z
source MITRE
title CARBERP

Prevx Carberp March 2011

Giuliani, M., Allievi, A. (2011, February 28). Carberp - a modular information stealing trojan. Retrieved September 12, 2024.

Internal MISP references

UUID 8f95d81a-ea8c-44bf-950d-9eb868182d39 which can be used as unique global reference for Prevx Carberp March 2011 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2011-02-28T00:00:00Z
source MITRE
title Carberp - a modular information stealing trojan

Trusteer Carberp October 2010

Trusteer Fraud Prevention Center. (2010, October 7). Carberp Under the Hood of Carberp: Malware & Configuration Analysis. Retrieved July 15, 2020.

Internal MISP references

UUID f7af5be2-0cb4-4b41-9d08-2f652b6bac3c which can be used as unique global reference for Trusteer Carberp October 2010 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-07-15T00:00:00Z
date_published 2010-10-07T00:00:00Z
source MITRE
title Carberp Under the Hood of Carberp: Malware & Configuration Analysis

ESET Carbon Mar 2017

ESET. (2017, March 30). Carbon Paper: Peering into Turla’s second stage backdoor. Retrieved November 7, 2018.

Internal MISP references

UUID 5d2a3a81-e7b7-430d-b748-b773f89d3c77 which can be used as unique global reference for ESET Carbon Mar 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-07T00:00:00Z
date_published 2017-03-30T00:00:00Z
source MITRE
title Carbon Paper: Peering into Turla’s second stage backdoor

CrowdStrike Carbon Spider August 2021

Loui, E. and Reynolds, J. (2021, August 30). CARBON SPIDER Embraces Big Game Hunting, Part 1. Retrieved September 20, 2021.

Internal MISP references

UUID 36f0ddb0-94af-494c-ad10-9d3f75d1d810 which can be used as unique global reference for CrowdStrike Carbon Spider August 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-20T00:00:00Z
date_published 2021-08-30T00:00:00Z
source MITRE
title CARBON SPIDER Embraces Big Game Hunting, Part 1

PaloAlto CardinalRat Apr 2017

Grunzweig, J.. (2017, April 20). Cardinal RAT Active for Over Two Years. Retrieved December 8, 2018.

Internal MISP references

UUID 8d978b94-75c9-46a1-812a-bafe3396eda9 which can be used as unique global reference for PaloAlto CardinalRat Apr 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-12-08T00:00:00Z
date_published 2017-04-20T00:00:00Z
source MITRE
title Cardinal RAT Active for Over Two Years

Carl Hurd March 2019

Carl Hurd. (2019, March 26) VPNFilter Deep Dive. Retrieved March 28, 2019

Internal MISP references

UUID 8a4e28f9-b0ba-56ad-a957-b5913bf9a7d5 which can be used as unique global reference for Carl Hurd March 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-28T00:00:00Z
source MITRE
title Carl Hurd March 2019

ESET Casbaneiro Oct 2019

ESET Research. (2019, October 3). Casbaneiro: peculiarities of this banking Trojan that affects Brazil and Mexico. Retrieved September 23, 2021.

Internal MISP references

UUID a5cb3ee6-9a0b-4e90-bf32-be7177a858b1 which can be used as unique global reference for ESET Casbaneiro Oct 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-23T00:00:00Z
date_published 2019-10-03T00:00:00Z
source MITRE
title Casbaneiro: peculiarities of this banking Trojan that affects Brazil and Mexico

Microsoft Catalog Files and Signatures April 2017

Hudek, T. (2017, April 20). Catalog Files and Digital Signatures. Retrieved January 31, 2018.

Internal MISP references

UUID 5b6ae460-a1cf-4afe-a0c8-d6ea24741ebe which can be used as unique global reference for Microsoft Catalog Files and Signatures April 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-31T00:00:00Z
date_published 2017-04-20T00:00:00Z
source MITRE
title Catalog Files and Digital Signatures

Catch All Chrome Extension

Marinho, R. (n.d.). "Catch-All" Google Chrome Malicious Extension Steals All Posted Data. Retrieved November 16, 2017.

Internal MISP references

UUID eddd2ea8-89c1-40f9-b6e3-37cbdebd210e which can be used as unique global reference for Catch All Chrome Extension in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-16T00:00:00Z
source MITRE
title "Catch-All" Google Chrome Malicious Extension Steals All Posted Data

Akamai JS

Katz, O. (2020, October 26). Catch Me if You Can—JavaScript Obfuscation. Retrieved March 17, 2023.

Internal MISP references

UUID 379a177b-0c31-5840-ad54-3fdfc9904a88 which can be used as unique global reference for Akamai JS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-17T00:00:00Z
date_published 2020-10-26T00:00:00Z
source MITRE
title Catch Me if You Can—JavaScript Obfuscation

Categorisation_not_boundary

MDSec Research. (2017, July). Categorisation is not a Security Boundary. Retrieved September 20, 2019.

Internal MISP references

UUID 3c320f38-e691-46f7-a20d-58b024ea2fa2 which can be used as unique global reference for Categorisation_not_boundary in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-20T00:00:00Z
date_published 2017-07-01T00:00:00Z
source MITRE
title Categorisation is not a Security Boundary

CrowdStrike Flying Kitten

Dahl, M.. (2014, May 13). Cat Scratch Fever: CrowdStrike Tracks Newly Reported Iranian Actor as FLYING KITTEN. Retrieved May 27, 2020.

Internal MISP references

UUID ab669ded-e659-4313-b5ab-8c5362562f39 which can be used as unique global reference for CrowdStrike Flying Kitten in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-27T00:00:00Z
date_published 2014-05-13T00:00:00Z
source MITRE
title Cat Scratch Fever: CrowdStrike Tracks Newly Reported Iranian Actor as FLYING KITTEN

Telephone Attack Delivery

Selena Larson, Sam Scholten, Timothy Kromphardt. (2021, November 4). Caught Beneath the Landline: A 411 on Telephone Oriented Attack Delivery. Retrieved January 5, 2022.

Internal MISP references

UUID 9670da7b-0600-4072-9ecc-65a918b89ac5 which can be used as unique global reference for Telephone Attack Delivery in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-05T00:00:00Z
date_published 2021-11-04T00:00:00Z
source MITRE
title Caught Beneath the Landline: A 411 on Telephone Oriented Attack Delivery

Tetra Defense Sodinokibi March 2020

Tetra Defense. (2020, March). CAUSE AND EFFECT: SODINOKIBI RANSOMWARE ANALYSIS. Retrieved December 14, 2020.

Internal MISP references

UUID a6ef0302-7bf4-4c5c-a6fc-4bd1c3d67d50 which can be used as unique global reference for Tetra Defense Sodinokibi March 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-14T00:00:00Z
date_published 2020-03-01T00:00:00Z
source MITRE
title CAUSE AND EFFECT: SODINOKIBI RANSOMWARE ANALYSIS

CarbonBlack RobbinHood May 2019

Lee, S. (2019, May 17). CB TAU Threat Intelligence Notification: RobbinHood Ransomware Stops 181 Windows Services Before Encryption. Retrieved July 29, 2019.

Internal MISP references

UUID cb9e49fa-253a-447a-9c88-c6e507bae0bb which can be used as unique global reference for CarbonBlack RobbinHood May 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-07-29T00:00:00Z
date_published 2019-05-17T00:00:00Z
source MITRE
title CB TAU Threat Intelligence Notification: RobbinHood Ransomware Stops 181 Windows Services Before Encryption

Talos CCleanup 2017

Brumaghin, E. et al. (2017, September 18). CCleanup: A Vast Number of Machines at Risk. Retrieved March 9, 2018.

Internal MISP references

UUID f2522cf4-dc65-4dc5-87e3-9e88212fcfe9 which can be used as unique global reference for Talos CCleanup 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-09T00:00:00Z
date_published 2017-09-18T00:00:00Z
source MITRE
title CCleanup: A Vast Number of Machines at Risk

Cdb.exe - LOLBAS Project

LOLBAS. (2018, May 25). Cdb.exe. Retrieved December 4, 2023.

Internal MISP references

UUID e61b035f-6247-47e3-918c-2892815dfddf which can be used as unique global reference for Cdb.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Cdb.exe

Slowik Sandworm 2021

Joseph Slowik, DomainTools. (2021, March 3). Centreon to Exim and Back: On the Trail of Sandworm. Retrieved April 6, 2024.

Internal MISP references

UUID e1753588-bc53-5265-935e-cbbaf3e13a82 which can be used as unique global reference for Slowik Sandworm 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-06T00:00:00Z
date_published 2021-03-03T00:00:00Z
source MITRE
title Centreon to Exim and Back: On the Trail of Sandworm

ESET PLEAD Malware July 2018

Cherepanov, A.. (2018, July 9). Certificates stolen from Taiwanese tech‑companies misused in Plead malware campaign. Retrieved May 6, 2020.

Internal MISP references

UUID 2c28640d-e4ee-47db-a8f1-b34def7d2e9a which can be used as unique global reference for ESET PLEAD Malware July 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-06T00:00:00Z
date_published 2018-07-09T00:00:00Z
source MITRE
title Certificates stolen from Taiwanese tech‑companies misused in Plead malware campaign

Medium Certified Pre Owned

Schroeder, W. (2021, June 17). Certified Pre-Owned. Retrieved August 2, 2022.

Internal MISP references

UUID 04e53c69-3f29-4bb4-83c9-ff3a2db1526b which can be used as unique global reference for Medium Certified Pre Owned in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-02T00:00:00Z
date_published 2021-06-17T00:00:00Z
source MITRE
title Certified Pre-Owned

SpecterOps Certified Pre Owned

Schroeder, W. & Christensen, L. (2021, June 22). Certified Pre-Owned - Abusing Active Directory Certificate Services. Retrieved August 2, 2022.

Internal MISP references

UUID 73b6a6a6-c2b8-4aed-9cbc-d3bdcbb97698 which can be used as unique global reference for SpecterOps Certified Pre Owned in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-02T00:00:00Z
date_published 2021-06-22T00:00:00Z
source MITRE
title Certified Pre-Owned - Abusing Active Directory Certificate Services

GitHub Certify

HarmJ0y et al. (2021, June 9). Certify. Retrieved August 4, 2022.

Internal MISP references

UUID 27fce38b-07d6-43ed-a3da-174458c4acbe which can be used as unique global reference for GitHub Certify in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-04T00:00:00Z
date_published 2021-06-09T00:00:00Z
source MITRE
title Certify

CertOC.exe - LOLBAS Project

LOLBAS. (2021, October 7). CertOC.exe. Retrieved December 4, 2023.

Internal MISP references

UUID b906498e-2773-419b-8c6d-3e974925ac18 which can be used as unique global reference for CertOC.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-10-07T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title CertOC.exe

CertReq.exe - LOLBAS Project

LOLBAS. (2020, July 7). CertReq.exe. Retrieved December 4, 2023.

Internal MISP references

UUID be446484-8ecc-486e-8940-658c147f6978 which can be used as unique global reference for CertReq.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2020-07-07T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title CertReq.exe

GitHub CertStealer

TheWover. (2021, April 21). CertStealer. Retrieved August 2, 2022.

Internal MISP references

UUID da06ce8f-f950-4ae8-a62a-b59b236e91a3 which can be used as unique global reference for GitHub CertStealer in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-02T00:00:00Z
date_published 2021-04-21T00:00:00Z
source MITRE
title CertStealer

TechNet Certutil

Microsoft. (2012, November 14). Certutil. Retrieved July 3, 2017.

Internal MISP references

UUID 8d095aeb-c72c-49c1-8482-dbf4ce9203ce which can be used as unique global reference for TechNet Certutil in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-03T00:00:00Z
date_published 2012-11-14T00:00:00Z
source MITRE
title Certutil

LOLBAS Certutil

LOLBAS. (n.d.). Certutil.exe. Retrieved July 31, 2019.

Internal MISP references

UUID 4c875710-9b5d-47b5-bc9e-69ef95797c8f which can be used as unique global reference for LOLBAS Certutil in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-07-31T00:00:00Z
source MITRE
title Certutil.exe

FireEye CFR Watering Hole 2012

Kindlund, D. (2012, December 30). CFR Watering Hole Attack Details. Retrieved December 18, 2020.

Internal MISP references

UUID 6108ab77-e4fd-43f2-9d49-8ce9c219ca9c which can be used as unique global reference for FireEye CFR Watering Hole 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-18T00:00:00Z
date_published 2012-12-30T00:00:00Z
source MITRE
title CFR Watering Hole Attack Details

Twitter Cglyer Status Update APT3 eml

Glyer, C. (2018, April 14). @cglyer Status Update. Retrieved September 12, 2024.

Internal MISP references

UUID cfcb0839-0736-489f-9779-72e5c96cce3d which can be used as unique global reference for Twitter Cglyer Status Update APT3 eml in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2018-04-14T00:00:00Z
source MITRE
title @cglyer Status Update

Cybereason Chaes Nov 2020

Salem, E. (2020, November 17). CHAES: Novel Malware Targeting Latin American E-Commerce. Retrieved June 30, 2021.

Internal MISP references

UUID aaefa162-82a8-4b6d-b7be-fd31fafd9246 which can be used as unique global reference for Cybereason Chaes Nov 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-30T00:00:00Z
date_published 2020-11-17T00:00:00Z
source MITRE
title CHAES: Novel Malware Targeting Latin American E-Commerce

Symantec Chafer February 2018

Symantec. (2018, February 28). Chafer: Latest Attacks Reveal Heightened Ambitions. Retrieved May 22, 2020.

Internal MISP references

UUID 3daaa402-5477-4868-b8f1-a2f6e38f04ef which can be used as unique global reference for Symantec Chafer February 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-22T00:00:00Z
date_published 2018-02-28T00:00:00Z
source MITRE
title Chafer: Latest Attacks Reveal Heightened Ambitions

Securelist Remexi Jan 2019

Legezo, D. (2019, January 30). Chafer used Remexi malware to spy on Iran-based foreign diplomatic entities. Retrieved April 17, 2019.

Internal MISP references

UUID 07dfd8e7-4e51-4c6e-a4f6-aaeb74ff8845 which can be used as unique global reference for Securelist Remexi Jan 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-17T00:00:00Z
date_published 2019-01-30T00:00:00Z
source MITRE
title Chafer used Remexi malware to spy on Iran-based foreign diplomatic entities

change_rdp_port_conti

The DFIR Report. (2022, March 1). "Change RDP port" #ContiLeaks. Retrieved September 12, 2024.

Internal MISP references

UUID c0deb077-6c26-52f1-9e7c-d1fb535a02a0 which can be used as unique global reference for change_rdp_port_conti in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2022-03-01T00:00:00Z
source MITRE
title "Change RDP port" #ContiLeaks

Microsoft Change Normal Template

Microsoft. (n.d.). Change the Normal template (Normal.dotm). Retrieved July 3, 2017.

Internal MISP references

UUID 76bf3ce1-b94c-4b3d-9707-aca8a1ae5555 which can be used as unique global reference for Microsoft Change Normal Template in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-03T00:00:00Z
source MITRE
title Change the Normal template (Normal.dotm)

Microsoft Change Default Programs

Microsoft. (n.d.). Change which programs Windows 7 uses by default. Retrieved July 26, 2016.

Internal MISP references

UUID de515277-a280-40e5-ba34-3e8f16a5c703 which can be used as unique global reference for Microsoft Change Default Programs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-07-26T00:00:00Z
source MITRE
title Change which programs Windows 7 uses by default

Chaos Stolen Backdoor

Sebastian Feldmann. (2018, February 14). Chaos: a Stolen Backdoor Rising Again. Retrieved March 5, 2018.

Internal MISP references

UUID 8e6916c1-f102-4b54-b6a5-a58fed825c2e which can be used as unique global reference for Chaos Stolen Backdoor in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-05T00:00:00Z
date_published 2018-02-14T00:00:00Z
source MITRE
title Chaos: a Stolen Backdoor Rising Again

Wardle Persistence Chapter

Patrick Wardle. (n.d.). Chapter 0x2: Persistence. Retrieved April 13, 2022.

Internal MISP references

UUID 6272b9a2-d704-43f3-9e25-6c434bb5d1ef which can be used as unique global reference for Wardle Persistence Chapter in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-13T00:00:00Z
source MITRE
title Chapter 0x2: Persistence

cisco_deploy_rsa_keys

Cisco. (2023, February 17). Chapter: Deploying RSA Keys Within a PKI . Retrieved March 27, 2023.

Internal MISP references

UUID 132f387e-4ee3-51d3-a3b6-d61102ada152 which can be used as unique global reference for cisco_deploy_rsa_keys in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-27T00:00:00Z
date_published 2023-02-17T00:00:00Z
source MITRE
title Chapter: Deploying RSA Keys Within a PKI

Wikipedia Character Encoding

Wikipedia. (2017, February 19). Character Encoding. Retrieved March 1, 2017.

Internal MISP references

UUID 3e7df20f-5d11-4102-851f-04e89c25d12f which can be used as unique global reference for Wikipedia Character Encoding in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-01T00:00:00Z
date_published 2017-02-19T00:00:00Z
source MITRE
title Character Encoding

ClearSky Charming Kitten Dec 2017

ClearSky Cyber Security. (2017, December). Charming Kitten. Retrieved December 27, 2017.

Internal MISP references

UUID 23ab1ad2-e9d4-416a-926f-6220a59044ab which can be used as unique global reference for ClearSky Charming Kitten Dec 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-27T00:00:00Z
date_published 2017-12-01T00:00:00Z
source MITRE
title Charming Kitten

Certfa Charming Kitten January 2021

Certfa Labs. (2021, January 8). Charming Kitten’s Christmas Gift. Retrieved May 3, 2021.

Internal MISP references

UUID c38a8af6-3f9b-40c3-8122-a2a51eb50664 which can be used as unique global reference for Certfa Charming Kitten January 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-05-03T00:00:00Z
date_published 2021-01-08T00:00:00Z
source MITRE
title Charming Kitten’s Christmas Gift

Proofpoint TA2541 February 2022

Larson, S. and Wise, J. (2022, February 15). Charting TA2541's Flight. Retrieved September 12, 2023.

Internal MISP references

UUID db0b1425-8bd7-51b5-bae3-53c5ccccb8da which can be used as unique global reference for Proofpoint TA2541 February 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-12T00:00:00Z
date_published 2022-02-15T00:00:00Z
source MITRE
title Charting TA2541's Flight

JPCERT ChChes Feb 2017

Nakamura, Y.. (2017, February 17). ChChes - Malware that Communicates with C&C Servers Using Cookie Headers. Retrieved March 1, 2017.

Internal MISP references

UUID 657b43aa-ead2-41d3-911a-d714d9b28e19 which can be used as unique global reference for JPCERT ChChes Feb 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-01T00:00:00Z
date_published 2017-02-17T00:00:00Z
source MITRE
title ChChes - Malware that Communicates with C&C Servers Using Cookie Headers

Check Point Iranian Proxies December 4 2023

Check Point Research. (2023, December 4). Check Point Research Report: Iranian Hacktivist Proxies Escalate Activities Beyond Israel. Retrieved August 8, 2024.

Internal MISP references

UUID 60432d84-8f46-4934-951f-df8e0f297ff0 which can be used as unique global reference for Check Point Iranian Proxies December 4 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-08T00:00:00Z
date_published 2023-12-04T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Check Point Research Report: Iranian Hacktivist Proxies Escalate Activities Beyond Israel

EclecticLightChecksonEXECodeSigning

Howard Oakley. (2020, November 16). Checks on executable code in Catalina and Big Sur: a first draft. Retrieved September 21, 2022.

Internal MISP references

UUID 2885db46-4f8c-4c35-901c-7641c7701293 which can be used as unique global reference for EclecticLightChecksonEXECodeSigning in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-21T00:00:00Z
date_published 2020-11-16T00:00:00Z
source MITRE
title Checks on executable code in Catalina and Big Sur: a first draft

Mandiant Pulse Secure Zero-Day April 2021

Perez, D. et al. (2021, April 20). Check Your Pulse: Suspected APT Actors Leverage Authentication Bypass Techniques and Pulse Secure Zero-Day. Retrieved February 5, 2024.

Internal MISP references

UUID 0760480c-97be-5fc9-a6aa-f1df91a314a3 which can be used as unique global reference for Mandiant Pulse Secure Zero-Day April 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-05T00:00:00Z
date_published 2021-04-20T00:00:00Z
source MITRE
title Check Your Pulse: Suspected APT Actors Leverage Authentication Bypass Techniques and Pulse Secure Zero-Day

Anomali MUSTANG PANDA October 2019

Anomali Threat Research. (2019, October 7). China-Based APT Mustang Panda Targets Minority Groups, Public and Private Sector Organizations. Retrieved April 12, 2021.

Internal MISP references

UUID 70277fa4-60a8-475e-993a-c74241b76127 which can be used as unique global reference for Anomali MUSTANG PANDA October 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-12T00:00:00Z
date_published 2019-10-07T00:00:00Z
source MITRE, Tidal Cyber
title China-Based APT Mustang Panda Targets Minority Groups, Public and Private Sector Organizations

FireEye admin@338

FireEye Threat Intelligence. (2015, December 1). China-based Cyber Threat Group Uses Dropbox for Malware Communications and Targets Hong Kong Media Outlets. Retrieved December 4, 2015.

Internal MISP references

UUID f3470275-9652-440e-914d-ad4fc5165413 which can be used as unique global reference for FireEye admin@338 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-12-04T00:00:00Z
date_published 2015-12-01T00:00:00Z
source MITRE, Tidal Cyber
title China-based Cyber Threat Group Uses Dropbox for Malware Communications and Targets Hong Kong Media Outlets

IronNet BlackTech Oct 2021

Demboski, M., et al. (2021, October 26). China cyber attacks: the current threat landscape. Retrieved March 25, 2022.

Internal MISP references

UUID 98b2d114-4246-409d-934a-238682fd5ae6 which can be used as unique global reference for IronNet BlackTech Oct 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-25T00:00:00Z
date_published 2021-10-26T00:00:00Z
source MITRE
title China cyber attacks: the current threat landscape

Recorded Future RedEcho Feb 2021

Insikt Group. (2021, February 28). China-Linked Group RedEcho Targets the Indian Power Sector Amid Heightened Border Tensions. Retrieved March 22, 2021.

Internal MISP references

UUID 6da7eb8a-aab4-41ea-a0b7-5313d88cbe91 which can be used as unique global reference for Recorded Future RedEcho Feb 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-22T00:00:00Z
date_published 2021-02-28T00:00:00Z
source MITRE
title China-Linked Group RedEcho Targets the Indian Power Sector Amid Heightened Border Tensions

WSJ Salt Typhoon September 26 2024

Sarah Krouse, Robert McMillan, Dustin Volz. (2024, September 26). China-Linked Hackers Breach U.S. Internet Providers in New ‘Salt Typhoon’ Cyberattack. Retrieved October 24, 2024.

Internal MISP references

UUID 15b4c5c3-edf2-4f6b-b398-62767cfabf5a which can be used as unique global reference for WSJ Salt Typhoon September 26 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-24T00:00:00Z
date_published 2024-09-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title China-Linked Hackers Breach U.S. Internet Providers in New ‘Salt Typhoon’ Cyberattack

Sygnia Velvet Ant June 17 2024

Sygnia Team. (2024, June 17). China-Nexus Threat Group ‘Velvet Ant’ Abuses F5 Load Balancers for Persistence. Retrieved June 20, 2024.

Internal MISP references

UUID 5c313af4-61a8-449d-a6c7-f7ead6c72e19 which can be used as unique global reference for Sygnia Velvet Ant June 17 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-20T00:00:00Z
date_published 2024-06-17T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title China-Nexus Threat Group ‘Velvet Ant’ Abuses F5 Load Balancers for Persistence

Sygnia Velvet Ant July 1 2024

Sygnia. (2024, July 1). China-Nexus Threat Group ‘Velvet Ant’ Exploits Cisco Zero-Day (CVE-2024-20399) to Compromise Nexus Switch Devices. Retrieved July 3, 2024.

Internal MISP references

UUID a0cfeeb6-4617-4dea-80d2-290eaf2bcf5b which can be used as unique global reference for Sygnia Velvet Ant July 1 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-03T00:00:00Z
date_published 2024-07-01T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title China-Nexus Threat Group ‘Velvet Ant’ Exploits Cisco Zero-Day (CVE-2024-20399) to Compromise Nexus Switch Devices

EFF China GitHub Attack

Budington, B. (2015, April 2). China Uses Unencrypted Websites to Hijack Browsers in GitHub Attack. Retrieved September 1, 2023.

Internal MISP references

UUID b8405628-6366-5cc9-a9af-b97d5c9176dd which can be used as unique global reference for EFF China GitHub Attack in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-01T00:00:00Z
date_published 2015-04-02T00:00:00Z
source MITRE
title China Uses Unencrypted Websites to Hijack Browsers in GitHub Attack

PaloAlto 3102 Sept 2015

Falcone, R. & Miller-Osborn, J. (2015, September 23). Chinese Actors Use ‘3102’ Malware in Attacks on US Government and EU Media. Retrieved March 19, 2018.

Internal MISP references

UUID db340043-43a7-4b16-a570-92a0d879b2bf which can be used as unique global reference for PaloAlto 3102 Sept 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-19T00:00:00Z
date_published 2015-09-23T00:00:00Z
source MITRE
title Chinese Actors Use ‘3102’ Malware in Attacks on US Government and EU Media

ZScaler Hacking Team

Desai, D.. (2015, August 14). Chinese cyber espionage APT group leveraging recently leaked Hacking Team exploits to target a Financial Services Firm. Retrieved January 26, 2016.

Internal MISP references

UUID 83e6ab22-1f01-4c9b-90e5-0279af487805 which can be used as unique global reference for ZScaler Hacking Team in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-26T00:00:00Z
date_published 2015-08-14T00:00:00Z
source MITRE
title Chinese cyber espionage APT group leveraging recently leaked Hacking Team exploits to target a Financial Services Firm

Hacker News LuckyMouse June 2018

Khandelwal, S. (2018, June 14). Chinese Hackers Carried Out Country-Level Watering Hole Attack. Retrieved August 18, 2018.

Internal MISP references

UUID de78446a-cb46-4422-820b-9ddf07557b1a which can be used as unique global reference for Hacker News LuckyMouse June 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-18T00:00:00Z
date_published 2018-06-14T00:00:00Z
source MITRE
title Chinese Hackers Carried Out Country-Level Watering Hole Attack

The Hacker News Velvet Ant Cisco July 2 2024

Newsroom. (2024, July 2). Chinese Hackers Exploiting Cisco Switches Zero-Day to Deliver Malware. Retrieved July 3, 2024.

Internal MISP references

UUID e3949201-c949-4126-9e02-34bfad4713c0 which can be used as unique global reference for The Hacker News Velvet Ant Cisco July 2 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-03T00:00:00Z
date_published 2024-07-02T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Chinese Hackers Exploiting Cisco Switches Zero-Day to Deliver Malware

BleepingComputer Mustang Panda September 9 2024

Bill Toulas. (2024, September 9). Chinese hackers use new data theft malware in govt attacks. Retrieved September 13, 2024.

Internal MISP references

UUID 40774c9c-daca-4ea0-a504-ca73b11e4f29 which can be used as unique global reference for BleepingComputer Mustang Panda September 9 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-13T00:00:00Z
date_published 2024-09-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Chinese hackers use new data theft malware in govt attacks

The Record APT31 Router Hacks

Catalin Cimpanu. (2021, July 20). Chinese hacking group APT31 uses mesh of home routers to disguise attacks. Retrieved April 25, 2024.

Internal MISP references

UUID 41fc3724-85a0-4ad0-9494-47f89f3b079b which can be used as unique global reference for The Record APT31 Router Hacks in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-25T00:00:00Z
date_published 2021-07-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Chinese hacking group APT31 uses mesh of home routers to disguise attacks

ORB APT31

Cimpanu, Catalin. (2021, July 20). Chinese hacking group APT31 uses mesh of home routers to disguise attacks. Retrieved July 8, 2024.

Internal MISP references

UUID 67b5e2ef-21cc-52f6-95c9-88a8cdcbe74e which can be used as unique global reference for ORB APT31 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-08T00:00:00Z
date_published 2021-07-20T00:00:00Z
source MITRE
title Chinese hacking group APT31 uses mesh of home routers to disguise attacks

Dark Reading Codoso Feb 2015

Chickowski, E. (2015, February 10). Chinese Hacking Group Codoso Team Uses Forbes.com As Watering Hole. Retrieved September 13, 2018.

Internal MISP references

UUID c24035b1-2021-44ae-b01e-651e44526737 which can be used as unique global reference for Dark Reading Codoso Feb 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-09-13T00:00:00Z
date_published 2015-02-10T00:00:00Z
source MITRE
title Chinese Hacking Group Codoso Team Uses Forbes.com As Watering Hole

Recorded Future TAG-22 July 2021

INSIKT GROUP. (2021, July 8). Chinese State-Sponsored Activity Group TAG-22 Targets Nepal, the Philippines, and Taiwan Using Winnti and Other Tooling. Retrieved September 16, 2024.

Internal MISP references

UUID 258433e7-f829-4365-adbb-c5690159070f which can be used as unique global reference for Recorded Future TAG-22 July 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-16T00:00:00Z
date_published 2021-07-08T00:00:00Z
source MITRE
title Chinese State-Sponsored Activity Group TAG-22 Targets Nepal, the Philippines, and Taiwan Using Winnti and Other Tooling

Recorded Future Chinese Activity in Southeast Asia December 2021

Insikt Group. (2021, December 8). Chinese State-Sponsored Cyber Espionage Activity Supports Expansion of Regional Power and Influence in Southeast Asia. Retrieved September 19, 2022.

Internal MISP references

UUID 0809db3b-81a8-475d-920a-cb913b30f42e which can be used as unique global reference for Recorded Future Chinese Activity in Southeast Asia December 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-19T00:00:00Z
date_published 2021-12-08T00:00:00Z
source MITRE
title Chinese State-Sponsored Cyber Espionage Activity Supports Expansion of Regional Power and Influence in Southeast Asia

Recorded Future REDDELTA July 2020

Insikt Group. (2020, July 28). CHINESE STATE-SPONSORED GROUP ‘REDDELTA’ TARGETS THE VATICAN AND CATHOLIC ORGANIZATIONS. Retrieved April 13, 2021.

Internal MISP references

UUID e2bc037e-d483-4670-8281-70e51b16effe which can be used as unique global reference for Recorded Future REDDELTA July 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-13T00:00:00Z
date_published 2020-07-28T00:00:00Z
source MITRE
title CHINESE STATE-SPONSORED GROUP ‘REDDELTA’ TARGETS THE VATICAN AND CATHOLIC ORGANIZATIONS

Github CHIPSEC

Intel. (2017, March 18). CHIPSEC Platform Security Assessment Framework. Retrieved March 20, 2017.

Internal MISP references

UUID 47501334-56cb-453b-a9e3-33990d88018b which can be used as unique global reference for Github CHIPSEC in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-20T00:00:00Z
date_published 2017-03-18T00:00:00Z
source MITRE
title CHIPSEC Platform Security Assessment Framework

McAfee CHIPSEC Blog

Beek, C., Samani, R. (2017, March 8). CHIPSEC Support Against Vault 7 Disclosure Scanning. Retrieved March 13, 2017.

Internal MISP references

UUID b65ed687-c279-4f64-9dd2-839164cd269c which can be used as unique global reference for McAfee CHIPSEC Blog in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-13T00:00:00Z
date_published 2017-03-08T00:00:00Z
source MITRE
title CHIPSEC Support Against Vault 7 Disclosure Scanning

Chkrootkit Main

Murilo, N., Steding-Jessen, K. (2017, August 23). Chkrootkit. Retrieved April 9, 2018.

Internal MISP references

UUID 828fb4b9-17a6-4a87-ac2a-631643adb18d which can be used as unique global reference for Chkrootkit Main in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-09T00:00:00Z
date_published 2017-08-23T00:00:00Z
source MITRE
title Chkrootkit

Azure AD Hybrid Identity

Microsoft. (2022, August 26). Choose the right authentication method for your Azure Active Directory hybrid identity solution. Retrieved September 28, 2022.

Internal MISP references

UUID b019406c-6e39-41a2-a8b4-97f8d6482147 which can be used as unique global reference for Azure AD Hybrid Identity in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-28T00:00:00Z
date_published 2022-08-26T00:00:00Z
source MITRE
title Choose the right authentication method for your Azure Active Directory hybrid identity solution

Red Canary May 25 2022

Aedan Russell. (2022, May 25). ChromeLoader a pushy malvertiser. Retrieved September 26, 2024.

Internal MISP references

UUID bffc87ac-e51b-47e3-8a9f-547e762e95c2 which can be used as unique global reference for Red Canary May 25 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-26T00:00:00Z
date_published 2022-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title ChromeLoader a pushy malvertiser

Chrome Remote Desktop

Huntress. (n.d.). Retrieved March 14, 2024.

Internal MISP references

UUID c1b2d0e9-2396-5080-aea3-58a99c027d20 which can be used as unique global reference for Chrome Remote Desktop in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-14T00:00:00Z
source MITRE
title Chrome Remote Desktop

Truesec AB August 30 2024

Simon Hertzberg. (2024, August 30). Cicada 3301 - Ransomware-as-a-Service - Technical Analysis. Retrieved September 4, 2024.

Internal MISP references

UUID de2de0a9-17d2-41c2-838b-7850762b80ae which can be used as unique global reference for Truesec AB August 30 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-04T00:00:00Z
date_published 2024-08-30T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Cicada 3301 - Ransomware-as-a-Service - Technical Analysis

BleepingComputer Void Banshee September 16 2024

Sergiu Gatlan. (2024, September 20). CISA warns of Windows flaw used in infostealer malware attacks. Retrieved September 19, 2024.

Internal MISP references

UUID 2c9a2355-02c5-4718-ad6e-b2fac9ad4096 which can be used as unique global reference for BleepingComputer Void Banshee September 16 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-19T00:00:00Z
date_published 2024-09-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title CISA warns of Windows flaw used in infostealer malware attacks

show_ssh_users_cmd_cisco

Cisco. (2023, March 7). Cisco IOS Security Command Reference: Commands S to Z . Retrieved July 13, 2022.

Internal MISP references

UUID 11d34884-4559-57ad-8910-54e517c6493e which can be used as unique global reference for show_ssh_users_cmd_cisco in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-13T00:00:00Z
date_published 2023-03-07T00:00:00Z
source MITRE
title Cisco IOS Security Command Reference: Commands S to Z

Cisco IOS Shellcode

George Nosenko. (2015). CISCO IOS SHELLCODE: ALL-IN-ONE. Retrieved October 21, 2020.

Internal MISP references

UUID 55a45f9b-7be4-4f1b-8b19-a0addf9da8d8 which can be used as unique global reference for Cisco IOS Shellcode in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-21T00:00:00Z
date_published 2015-01-01T00:00:00Z
source MITRE
title CISCO IOS SHELLCODE: ALL-IN-ONE

Cisco IOS Software Integrity Assurance - AAA

Cisco. (n.d.). Cisco IOS Software Integrity Assurance - AAA. Retrieved October 19, 2020.

Internal MISP references

UUID 2d1b5021-91ad-43c9-8527-4978fa779168 which can be used as unique global reference for Cisco IOS Software Integrity Assurance - AAA in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
source MITRE
title Cisco IOS Software Integrity Assurance - AAA

Cisco IOS Software Integrity Assurance - Boot Information

Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Boot Information. Retrieved October 21, 2020.

Internal MISP references

UUID 5349863a-00c1-42bf-beac-4e7d053d6311 which can be used as unique global reference for Cisco IOS Software Integrity Assurance - Boot Information in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-21T00:00:00Z
source MITRE
title Cisco IOS Software Integrity Assurance - Boot Information

Cisco IOS Software Integrity Assurance - Change Control

Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Change Control. Retrieved October 21, 2020.

Internal MISP references

UUID 8fb532f2-c730-4b86-b8d2-2314ce559289 which can be used as unique global reference for Cisco IOS Software Integrity Assurance - Change Control in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-21T00:00:00Z
source MITRE
title Cisco IOS Software Integrity Assurance - Change Control

Cisco IOS Software Integrity Assurance - Image File Verification

Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Cisco IOS Image File Verification. Retrieved October 19, 2020.

Internal MISP references

UUID f1d736cb-63c1-43e8-a83b-ed86b7c27606 which can be used as unique global reference for Cisco IOS Software Integrity Assurance - Image File Verification in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
source MITRE
title Cisco IOS Software Integrity Assurance - Cisco IOS Image File Verification

Cisco IOS Software Integrity Assurance - Run-Time Memory Verification

Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Cisco IOS Run-Time Memory Integrity Verification. Retrieved October 19, 2020.

Internal MISP references

UUID 284608ea-3769-470e-950b-cbd67796b20f which can be used as unique global reference for Cisco IOS Software Integrity Assurance - Run-Time Memory Verification in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
source MITRE
title Cisco IOS Software Integrity Assurance - Cisco IOS Run-Time Memory Integrity Verification

Cisco IOS Software Integrity Assurance - Command History

Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Command History. Retrieved October 21, 2020.

Internal MISP references

UUID dbca06dd-1184-4d52-9ee8-b059e368033c which can be used as unique global reference for Cisco IOS Software Integrity Assurance - Command History in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-21T00:00:00Z
source MITRE
title Cisco IOS Software Integrity Assurance - Command History

Cisco IOS Software Integrity Assurance - Credentials Management

Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Credentials Management. Retrieved October 19, 2020.

Internal MISP references

UUID 9a7428e3-bd77-4c3e-ac90-c4e30d504ba6 which can be used as unique global reference for Cisco IOS Software Integrity Assurance - Credentials Management in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
source MITRE
title Cisco IOS Software Integrity Assurance - Credentials Management

Cisco IOS Software Integrity Assurance - Deploy Signed IOS

Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Deploy Signed IOS. Retrieved October 21, 2020.

Internal MISP references

UUID 71ea5591-6e46-4c58-a4e8-c629eba1b6c5 which can be used as unique global reference for Cisco IOS Software Integrity Assurance - Deploy Signed IOS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-21T00:00:00Z
source MITRE
title Cisco IOS Software Integrity Assurance - Deploy Signed IOS

Cisco IOS Software Integrity Assurance - Image File Integrity

Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Image File Integrity. Retrieved October 21, 2020.

Internal MISP references

UUID 90909bd4-15e8-48ee-8067-69f04736c583 which can be used as unique global reference for Cisco IOS Software Integrity Assurance - Image File Integrity in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-21T00:00:00Z
source MITRE
title Cisco IOS Software Integrity Assurance - Image File Integrity

Cisco IOS Software Integrity Assurance - Secure Boot

Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Secure Boot. Retrieved October 19, 2020.

Internal MISP references

UUID 4f6f686e-bcda-480a-88a1-ad7b00084c13 which can be used as unique global reference for Cisco IOS Software Integrity Assurance - Secure Boot in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
source MITRE
title Cisco IOS Software Integrity Assurance - Secure Boot

Cisco IOS Software Integrity Assurance - TACACS

Cisco. (n.d.). Cisco IOS Software Integrity Assurance - TACACS. Retrieved October 19, 2020.

Internal MISP references

UUID 54506dc2-6496-4edb-a5bf-fe64bf235ac0 which can be used as unique global reference for Cisco IOS Software Integrity Assurance - TACACS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
source MITRE
title Cisco IOS Software Integrity Assurance - TACACS

Cisco Traffic Mirroring

Cisco. (n.d.). Cisco IOS XR Interface and Hardware Component Configuration Guide for the Cisco CRS Router, Release 5.1.x. Retrieved October 19, 2020.

Internal MISP references

UUID 1a5c86ad-d3b1-408b-a6b4-14ca0e572020 which can be used as unique global reference for Cisco Traffic Mirroring in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
source MITRE
title Cisco IOS XR Interface and Hardware Component Configuration Guide for the Cisco CRS Router, Release 5.1.x

Talos - Cisco Attack 2022

Nick Biasini. (2022, August 10). Cisco Talos shares insights related to recent cyber attack on Cisco. Retrieved March 9, 2023.

Internal MISP references

UUID 143182ad-6a16-5a0d-a5c4-7dae721a9e26 which can be used as unique global reference for Talos - Cisco Attack 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-09T00:00:00Z
date_published 2022-08-10T00:00:00Z
source MITRE
title Cisco Talos shares insights related to recent cyber attack on Cisco

Citrix Bulletin CVE-2023-3519

Citrix. (2023, July 18). Citrix ADC and Citrix Gateway Security Bulletin for CVE-2023-3519, CVE-2023-3466, CVE-2023-3467. Retrieved July 24, 2023.

Internal MISP references

UUID 245ef1b7-778d-4df2-99a9-b51c95c57580 which can be used as unique global reference for Citrix Bulletin CVE-2023-3519 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-24T00:00:00Z
date_published 2023-07-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Citrix ADC and Citrix Gateway Security Bulletin for CVE-2023-3519, CVE-2023-3466, CVE-2023-3467

Malwarebytes Citrix Bleed November 24 2023

Pieter Arntz. (2023, November 24). Citrix Bleed widely exploited, warn government agencies. Retrieved November 30, 2023.

Internal MISP references

UUID fdc86cea-0015-48d1-934f-b22244de6306 which can be used as unique global reference for Malwarebytes Citrix Bleed November 24 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-11-30T00:00:00Z
date_published 2023-11-24T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Citrix Bleed widely exploited, warn government agencies

Cyble April 28 2023

Cybleinc. (2023, April 28). Citrix Users at Risk: AresLoader Spreading Through Disguised GitLab Repo. Retrieved May 7, 2023.

Internal MISP references

UUID 2d6bea2c-cc19-4ff7-873f-151f1ff354cb which can be used as unique global reference for Cyble April 28 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2023-04-28T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Citrix Users at Risk: AresLoader Spreading Through Disguised GitLab Repo

Cyble April 03 2023

Cybleinc. (2023, April 3). Cl0p Ransomware: Active Threat Plaguing Businesses Worldwide. Retrieved May 25, 2023.

Internal MISP references

UUID 8c7815c4-ed8d-47c3-84af-b7cdabd49652 which can be used as unique global reference for Cyble April 03 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-25T00:00:00Z
date_published 2023-04-03T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Cl0p Ransomware: Active Threat Plaguing Businesses Worldwide

Talent-Jump Clambling February 2020

Chen, T. and Chen, Z. (2020, February 17). CLAMBLING - A New Backdoor Base On Dropbox. Retrieved November 12, 2021.

Internal MISP references

UUID 51144a8a-0cd4-4d5d-826b-21c2dc8422be which can be used as unique global reference for Talent-Jump Clambling February 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-11-12T00:00:00Z
date_published 2020-02-17T00:00:00Z
source MITRE
title CLAMBLING - A New Backdoor Base On Dropbox

FireEye Clandestine Fox Part 2

Scott, M.. (2014, June 10). Clandestine Fox, Part Deux. Retrieved January 14, 2016.

Internal MISP references

UUID 82500741-984d-4039-8f53-b303845c2849 which can be used as unique global reference for FireEye Clandestine Fox Part 2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-14T00:00:00Z
date_published 2014-06-10T00:00:00Z
source MITRE
title Clandestine Fox, Part Deux

Microsoft Clear-EventLog

Microsoft. (n.d.). Clear-EventLog. Retrieved July 2, 2018.

Internal MISP references

UUID 35944ff0-2bbd-4055-8e8a-cfff27241a8a which can be used as unique global reference for Microsoft Clear-EventLog in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-02T00:00:00Z
source MITRE
title Clear-EventLog

Clearing quarantine attribute

Rich Trouton. (2012, November 20). Clearing the quarantine extended attribute from downloaded applications. Retrieved July 5, 2017.

Internal MISP references

UUID 4115ab53-751c-4016-9151-a55eab7d6ddf which can be used as unique global reference for Clearing quarantine attribute in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-05T00:00:00Z
date_published 2012-11-20T00:00:00Z
source MITRE
title Clearing the quarantine extended attribute from downloaded applications

Huntress NPPSPY 2022

Dray Agha. (2022, August 16). Cleartext Shenanigans: Gifting User Passwords to Adversaries With NPPSPY. Retrieved May 17, 2024.

Internal MISP references

UUID 833c22ac-4f65-521a-9eda-8d22e255577e which can be used as unique global reference for Huntress NPPSPY 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-17T00:00:00Z
date_published 2022-08-16T00:00:00Z
source MITRE
title Cleartext Shenanigans: Gifting User Passwords to Adversaries With NPPSPY

NPPSPY - Huntress

Dray Agha. (2022, August 16). Cleartext Shenanigans: Gifting User Passwords to Adversaries With NPPSPY. Retrieved March 30, 2023.

Internal MISP references

UUID df1f7379-38c3-5ca9-8333-d684022c000c which can be used as unique global reference for NPPSPY - Huntress in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-30T00:00:00Z
date_published 2022-08-16T00:00:00Z
source MITRE
title Cleartext Shenanigans: Gifting User Passwords to Adversaries With NPPSPY

Microsoft Learn ClickOnce and Authenticode

Microsoft. (2023, March 9). ClickOnce and Authenticode. Retrieved September 9, 2024.

Internal MISP references

UUID 5e5c02cf-02fe-591a-b597-778999ab31c4 which can be used as unique global reference for Microsoft Learn ClickOnce and Authenticode in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-09T00:00:00Z
date_published 2023-03-09T00:00:00Z
source MITRE
title ClickOnce and Authenticode

Burke/CISA ClickOnce BlackHat

William Joseph Burke III. (2019, August 7). CLICKONCE AND YOU’RE IN: When .appref-ms abuse is operating as intended. Retrieved September 9, 2024.

Internal MISP references

UUID 5a1b4ee9-1c22-5f12-9fd9-723cc0055f4b which can be used as unique global reference for Burke/CISA ClickOnce BlackHat in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-09T00:00:00Z
date_published 2019-08-07T00:00:00Z
source MITRE
title CLICKONCE AND YOU’RE IN: When .appref-ms abuse is operating as intended

Microsoft Learn ClickOnce

Microsoft. (2023, September 14). ClickOnce security and deployment. Retrieved September 9, 2024.

Internal MISP references

UUID 2e91b430-81e7-54e1-8e8c-763f71146e0c which can be used as unique global reference for Microsoft Learn ClickOnce in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-09T00:00:00Z
date_published 2023-09-14T00:00:00Z
source MITRE
title ClickOnce security and deployment

CL_Invocation.ps1 - LOLBAS Project

LOLBAS. (2018, May 25). CL_Invocation.ps1. Retrieved December 4, 2023.

Internal MISP references

UUID a53e093a-973c-491d-91e3-bc7804d87b8b which can be used as unique global reference for CL_Invocation.ps1 - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title CL_Invocation.ps1

clip_win_server

Microsoft, JasonGerend, et al. (2023, February 3). clip. Retrieved June 21, 2022.

Internal MISP references

UUID 8a961fa1-def0-5efe-8599-62e884d4ea22 which can be used as unique global reference for clip_win_server in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-21T00:00:00Z
date_published 2023-02-03T00:00:00Z
source MITRE
title clip

Red Canary Silver Sparrow Feb2021

Tony Lambert. (2021, February 18). Clipping Silver Sparrow’s wings: Outing macOS malware before it takes flight. Retrieved April 20, 2021.

Internal MISP references

UUID f08a856d-6c3e-49e2-b7ba-399831c637e5 which can be used as unique global reference for Red Canary Silver Sparrow Feb2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-20T00:00:00Z
date_published 2021-02-18T00:00:00Z
source MITRE
title Clipping Silver Sparrow’s wings: Outing macOS malware before it takes flight

CL_LoadAssembly.ps1 - LOLBAS Project

LOLBAS. (2021, September 26). CL_LoadAssembly.ps1. Retrieved December 4, 2023.

Internal MISP references

UUID 31a14027-1181-49b9-87bf-78a65a551312 which can be used as unique global reference for CL_LoadAssembly.ps1 - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-09-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title CL_LoadAssembly.ps1

CL_Mutexverifiers.ps1 - LOLBAS Project

LOLBAS. (2018, May 25). CL_Mutexverifiers.ps1. Retrieved December 4, 2023.

Internal MISP references

UUID 75b89502-21ed-4920-95cc-212eaf17f281 which can be used as unique global reference for CL_Mutexverifiers.ps1 - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title CL_Mutexverifiers.ps1

Google Cloud Mandiant UNC3886 2024

Punsaen Boonyakarn, Shawn Chew, Logeswaran Nadarajan, Mathew Potaczek, Jakub Jozwiak, and Alex Marvi. (2024, June 18). Cloaked and Covert: Uncovering UNC3886 Espionage Operations. Retrieved September 24, 2024.

Internal MISP references

UUID 77b32efe-b936-5541-b0fb-aa442a7d11b7 which can be used as unique global reference for Google Cloud Mandiant UNC3886 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-24T00:00:00Z
date_published 2024-06-18T00:00:00Z
source MITRE
title Cloaked and Covert: Uncovering UNC3886 Espionage Operations

Cybereason Clop Dec 2020

Cybereason Nocturnus. (2020, December 23). Cybereason vs. Clop Ransomware. Retrieved May 11, 2021.

Internal MISP references

UUID f54d682d-100e-41bb-96be-6a79ea422066 which can be used as unique global reference for Cybereason Clop Dec 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-05-11T00:00:00Z
source MITRE
title Clop Ransomware

Mcafee Clop Aug 2019

Mundo, A. (2019, August 1). Clop Ransomware. Retrieved May 10, 2021.

Internal MISP references

UUID 458141bd-7dd2-41fd-82e8-7ea2e4a477ab which can be used as unique global reference for Mcafee Clop Aug 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-05-10T00:00:00Z
date_published 2019-08-01T00:00:00Z
source MITRE
title Clop Ransomware

Bleeping Computer Clop February 2023

Sergiu Gatlan. (2023, February 10). Clop ransomware claims it breached 130 orgs using GoAnywhere zero-day. Retrieved May 8, 2023.

Internal MISP references

UUID ccfa7e78-1ee9-4d46-9f03-137eb12cf474 which can be used as unique global reference for Bleeping Computer Clop February 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-08T00:00:00Z
date_published 2023-02-10T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Clop ransomware claims it breached 130 orgs using GoAnywhere zero-day

Kaspersky Cloud Atlas December 2014

GReAT. (2014, December 10). Cloud Atlas: RedOctober APT is back in style. Retrieved May 8, 2020.

Internal MISP references

UUID 41a9b3e3-0953-4bde-9e1d-c2f51de1120e which can be used as unique global reference for Kaspersky Cloud Atlas December 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-08T00:00:00Z
date_published 2014-12-10T00:00:00Z
source MITRE
title Cloud Atlas: RedOctober APT is back in style

Kandji 4 8 2024

Adam Kohler; Christopher Lopez. (2024, April 8). CloudChat Infostealer How It Works, What It Does. Retrieved April 19, 2024.

Internal MISP references

UUID f2e74613-f578-4408-bc76-144ec671808b which can be used as unique global reference for Kandji 4 8 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-19T00:00:00Z
date_published 2024-04-08T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title CloudChat Infostealer How It Works, What It Does

Rhino Labs Cloud Backdoor September 2019

Rhino Labs. (2019, September). Cloud Container Attack Tool (CCAT). Retrieved September 12, 2019.

Internal MISP references

UUID ac31b781-dbe4-49c2-b7af-dfb23d435ce8 which can be used as unique global reference for Rhino Labs Cloud Backdoor September 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-12T00:00:00Z
date_published 2019-09-01T00:00:00Z
source MITRE
title Cloud Container Attack Tool (CCAT)

Google Cloud Storage

Google. (n.d.). Cloud Storage. Retrieved October 13, 2021.

Internal MISP references

UUID 5fe51b4e-9b82-4e97-bb65-73708349538a which can be used as unique global reference for Google Cloud Storage in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-13T00:00:00Z
source MITRE
title Cloud Storage

Office 265 Azure Domain Availability

Microsoft. (2017, January 23). (Cloud) Tip of the Day: Advanced way to check domain availability for Office 365 and Azure. Retrieved May 27, 2022.

Internal MISP references

UUID dddf33ea-d074-4bc4-98d2-39b7e843e37d which can be used as unique global reference for Office 265 Azure Domain Availability in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-27T00:00:00Z
date_published 2017-01-23T00:00:00Z
source MITRE
title (Cloud) Tip of the Day: Advanced way to check domain availability for Office 365 and Azure

Datadog S3 Lifecycle CloudTrail Logs

Stratus Red Team. (n.d.). CloudTrail Logs Impairment Through S3 Lifecycle Rule. Retrieved September 25, 2024.

Internal MISP references

UUID 08efef52-40f6-5c76-a1b6-76ac1b7f423b which can be used as unique global reference for Datadog S3 Lifecycle CloudTrail Logs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-25T00:00:00Z
source MITRE
title CloudTrail Logs Impairment Through S3 Lifecycle Rule

Mandiant Cloudy Logs 2023

Pany, D. & Hanley, C. (2023, May 3). Cloudy with a Chance of Bad Logs: Cloud Platform Log Configurations to Consider in Investigations. Retrieved October 16, 2023.

Internal MISP references

UUID a9835fe9-8227-5310-a728-1d09f19342b3 which can be used as unique global reference for Mandiant Cloudy Logs 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-16T00:00:00Z
date_published 2023-05-03T00:00:00Z
source MITRE
title Cloudy with a Chance of Bad Logs: Cloud Platform Log Configurations to Consider in Investigations

win_clsid_key

Microsoft. (2018, May 31). CLSID Key. Retrieved September 24, 2021.

Internal MISP references

UUID 239bb629-2733-4da3-87c2-47a7ab55433f which can be used as unique global reference for win_clsid_key in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-24T00:00:00Z
date_published 2018-05-31T00:00:00Z
source MITRE
title CLSID Key

Kube Cluster Admin

kubernetes. (2021, January 16). Cluster Administration. Retrieved October 13, 2021.

Internal MISP references

UUID 6c5f2465-1db3-46cc-8d2a-9763c21aa8cc which can be used as unique global reference for Kube Cluster Admin in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-13T00:00:00Z
date_published 2021-01-16T00:00:00Z
source MITRE
title Cluster Administration

Kube Cluster Info

kubernetes. (n.d.). cluster-info. Retrieved October 13, 2021.

Internal MISP references

UUID 0f8b5d79-2393-45a2-b6d4-df394e513e39 which can be used as unique global reference for Kube Cluster Info in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-13T00:00:00Z
source MITRE
title cluster-info

TechNet Cmd

Microsoft. (n.d.). Cmd. Retrieved April 18, 2016.

Internal MISP references

UUID dbfc01fe-c300-4c27-ab9a-a20508c1e04b which can be used as unique global reference for TechNet Cmd in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-18T00:00:00Z
source MITRE
title Cmd

Cmd.exe - LOLBAS Project

LOLBAS. (2019, June 26). Cmd.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 887aa9af-3f0e-42bb-8c40-39149f34b922 which can be used as unique global reference for Cmd.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2019-06-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Cmd.exe

Cmdkey.exe - LOLBAS Project

LOLBAS. (2018, May 25). Cmdkey.exe. Retrieved December 4, 2023.

Internal MISP references

UUID c9ca075a-8327-463d-96ec-adddf6f1a7bb which can be used as unique global reference for Cmdkey.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Cmdkey.exe

cmdl32.exe - LOLBAS Project

LOLBAS. (2021, August 26). cmdl32.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 2628e452-caa1-4058-a405-7c4657fa3245 which can be used as unique global reference for cmdl32.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-08-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title cmdl32.exe

Cmstp.exe - LOLBAS Project

LOLBAS. (2018, May 25). Cmstp.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 86c21dcd-464a-4870-8aae-25fcaccc889d which can be used as unique global reference for Cmstp.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Cmstp.exe

Twitter CMSTP Jan 2018

Tyrer, N. (2018, January 30). CMSTP.exe - remote .sct execution applocker bypass. Retrieved September 12, 2024.

Internal MISP references

UUID 3847149c-1463-4d94-be19-0a8cf1db0b58 which can be used as unique global reference for Twitter CMSTP Jan 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2018-01-30T00:00:00Z
source MITRE
title CMSTP.exe - remote .sct execution applocker bypass

Secureworks COBALT DICKENS September 2019

Counter Threat Unit Research Team. (2019, September 11). COBALT DICKENS Goes Back to School…Again. Retrieved February 3, 2021.

Internal MISP references

UUID 45815e4d-d678-4823-8315-583893e263e6 which can be used as unique global reference for Secureworks COBALT DICKENS September 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-03T00:00:00Z
date_published 2019-09-11T00:00:00Z
source MITRE
title COBALT DICKENS Goes Back to School…Again

Morphisec Cobalt Gang Oct 2018

Gorelik, M. (2018, October 08). Cobalt Group 2.0. Retrieved November 5, 2018.

Internal MISP references

UUID 0a0bdd4b-a680-4a38-967d-3ad92f04d619 which can be used as unique global reference for Morphisec Cobalt Gang Oct 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-05T00:00:00Z
date_published 2018-10-08T00:00:00Z
source MITRE
title Cobalt Group 2.0

Secureworks COBALT GYPSY Threat Profile

Secureworks. (n.d.). COBALT GYPSY Threat Profile. Retrieved April 14, 2021.

Internal MISP references

UUID f1c21834-7536-430b-8539-e68373718b4d which can be used as unique global reference for Secureworks COBALT GYPSY Threat Profile in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-14T00:00:00Z
source MITRE
title COBALT GYPSY Threat Profile

Secureworks COBALT ILLUSION Threat Profile

Secureworks. (n.d.). COBALT ILLUSION Threat Profile. Retrieved April 14, 2021.

Internal MISP references

UUID 8d9a5b77-2516-4ad5-9710-4c8165df2882 which can be used as unique global reference for Secureworks COBALT ILLUSION Threat Profile in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-14T00:00:00Z
source MITRE
title COBALT ILLUSION Threat Profile

PTSecurity Cobalt Dec 2016

Positive Technologies. (2016, December 16). Cobalt Snatch. Retrieved October 9, 2018.

Internal MISP references

UUID 2de4d38f-c99d-4149-89e6-0349a4902aa2 which can be used as unique global reference for PTSecurity Cobalt Dec 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-10-09T00:00:00Z
date_published 2016-12-16T00:00:00Z
source MITRE
title Cobalt Snatch

CobaltStrike Daddy May 2017

Mudge, R. (2017, May 23). Cobalt Strike 3.8 – Who’s Your Daddy?. Retrieved June 4, 2019.

Internal MISP references

UUID 056ef3cd-885d-41d6-9547-a2a575b03662 which can be used as unique global reference for CobaltStrike Daddy May 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-04T00:00:00Z
date_published 2017-05-23T00:00:00Z
source MITRE
title Cobalt Strike 3.8 – Who’s Your Daddy?

Cobalt Strike Manual 4.3 November 2020

Strategic Cyber LLC. (2020, November 5). Cobalt Strike: Advanced Threat Tactics for Penetration Testers. Retrieved April 13, 2021.

Internal MISP references

UUID eb7abdb2-b270-46ae-a950-5a93d09b3565 which can be used as unique global reference for Cobalt Strike Manual 4.3 November 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-13T00:00:00Z
date_published 2020-11-05T00:00:00Z
source MITRE
title Cobalt Strike: Advanced Threat Tactics for Penetration Testers

Malleable-C2-U42

Chris Navarrete Durgesh Sangvikar Andrew Guan Yu Fu Yanhui Jia Siddhart Shibiraj. (2022, March 16). Cobalt Strike Analysis and Tutorial: How Malleable C2 Profiles Make Cobalt Strike Difficult to Detect. Retrieved September 24, 2024.

Internal MISP references

UUID 49cf201e-d3da-5ba9-98df-edc50514a612 which can be used as unique global reference for Malleable-C2-U42 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-24T00:00:00Z
date_published 2022-03-16T00:00:00Z
source MITRE
title Cobalt Strike Analysis and Tutorial: How Malleable C2 Profiles Make Cobalt Strike Difficult to Detect

cobaltstrike manual

Strategic Cyber LLC. (2017, March 14). Cobalt Strike Manual. Retrieved May 24, 2017.

Internal MISP references

UUID 43277d05-0aa4-4cee-ac41-6f03a49851a9 which can be used as unique global reference for cobaltstrike manual in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-05-24T00:00:00Z
date_published 2017-03-14T00:00:00Z
source MITRE
title Cobalt Strike Manual

TrendMicro Cobalt Group Nov 2017

Giagone, R., Bermejo, L., and Yarochkin, F. (2017, November 20). Cobalt Strikes Again: Spam Runs Use Macros and CVE-2017-8759 Exploit Against Russian Banks. Retrieved March 7, 2019.

Internal MISP references

UUID 81847e06-fea0-4d90-8a9e-5bc99a2bf3f0 which can be used as unique global reference for TrendMicro Cobalt Group Nov 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-07T00:00:00Z
date_published 2017-11-20T00:00:00Z
source MITRE
title Cobalt Strikes Again: Spam Runs Use Macros and CVE-2017-8759 Exploit Against Russian Banks

PTSecurity Cobalt Group Aug 2017

Positive Technologies. (2017, August 16). Cobalt Strikes Back: An Evolving Multinational Threat to Finance. Retrieved September 5, 2018.

Internal MISP references

UUID f4ce1b4d-4f01-4083-8bc6-931cbac9ac38 which can be used as unique global reference for PTSecurity Cobalt Group Aug 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-09-05T00:00:00Z
date_published 2017-08-16T00:00:00Z
source MITRE, Tidal Cyber
title Cobalt Strikes Back: An Evolving Multinational Threat to Finance

Zscaler Cobian Aug 2017

Yadav, A., et al. (2017, August 31). Cobian RAT – A backdoored RAT. Retrieved November 13, 2018.

Internal MISP references

UUID 46541bb9-15cb-4a7c-a624-48a1c7e838e3 which can be used as unique global reference for Zscaler Cobian Aug 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-13T00:00:00Z
date_published 2017-08-31T00:00:00Z
source MITRE
title Cobian RAT – A backdoored RAT

MACOS Cocoa

Apple. (2015, September 16). Cocoa Application Layer. Retrieved June 25, 2020.

Internal MISP references

UUID 6ada4c6a-23dc-4469-a3a1-1d3b4935db97 which can be used as unique global reference for MACOS Cocoa in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-25T00:00:00Z
date_published 2015-09-16T00:00:00Z
source MITRE
title Cocoa Application Layer

code.exe - LOLBAS Project

LOLBAS. (2023, February 1). code.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 4a93063b-f3a3-4726-870d-b8f744651363 which can be used as unique global reference for code.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2023-02-01T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title code.exe

Dark Reading Code Spaces Cyber Attack

Brian Prince. (2014, June 20). Code Hosting Service Shuts Down After Cyber Attack. Retrieved March 21, 2023.

Internal MISP references

UUID e5a3028a-f4cc-537c-9ddd-769792ab33be which can be used as unique global reference for Dark Reading Code Spaces Cyber Attack in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-21T00:00:00Z
date_published 2014-06-20T00:00:00Z
source MITRE
title Code Hosting Service Shuts Down After Cyber Attack

Medium Ptrace JUL 2018

Jain, S. (2018, July 25). Code injection in running process using ptrace. Retrieved February 21, 2020.

Internal MISP references

UUID 6dbfe4b5-9430-431b-927e-e8e775874cd9 which can be used as unique global reference for Medium Ptrace JUL 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-21T00:00:00Z
date_published 2018-07-25T00:00:00Z
source MITRE
title Code injection in running process using ptrace

Wikipedia Code Signing

Wikipedia. (2015, November 10). Code Signing. Retrieved March 31, 2016.

Internal MISP references

UUID 363e860d-e14c-4fcd-985f-f76353018908 which can be used as unique global reference for Wikipedia Code Signing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-03-31T00:00:00Z
date_published 2015-11-10T00:00:00Z
source MITRE
title Code Signing

SpectorOps Code Signing Dec 2017

Graeber, M. (2017, December 22). Code Signing Certificate Cloning Attacks and Defenses. Retrieved April 3, 2018.

Internal MISP references

UUID 3efc5ae9-c63a-4a07-bbbd-d7324acdbaf5 which can be used as unique global reference for SpectorOps Code Signing Dec 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-03T00:00:00Z
date_published 2017-12-22T00:00:00Z
source MITRE
title Code Signing Certificate Cloning Attacks and Defenses

CoinLoader: A Sophisticated Malware Loader Campaign

Avira. (2019, November 28). CoinLoader: A Sophisticated Malware Loader Campaign. Retrieved June 5, 2023.

Internal MISP references

UUID 83469ab3-0199-5679-aa25-7b6885019552 which can be used as unique global reference for CoinLoader: A Sophisticated Malware Loader Campaign in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-05T00:00:00Z
date_published 2019-11-28T00:00:00Z
source MITRE
title CoinLoader: A Sophisticated Malware Loader Campaign

NYT-Colonial

Nicole Perlroth. (2021, May 13). Colonial Pipeline paid 75 Bitcoin, or roughly $5 million, to hackers.. Retrieved August 18, 2023.

Internal MISP references

UUID 58900911-ab4b-5157-968c-67fa69cc122d which can be used as unique global reference for NYT-Colonial in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-18T00:00:00Z
date_published 2021-05-13T00:00:00Z
source MITRE
title Colonial Pipeline paid 75 Bitcoin, or roughly $5 million, to hackers.

Colorcpl.exe - LOLBAS Project

LOLBAS. (2023, June 26). Colorcpl.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 53ff662d-a0b3-41bd-ab9e-a9bb8bbdea25 which can be used as unique global reference for Colorcpl.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2023-06-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Colorcpl.exe

mod_rewrite

Bluescreenofjeff.com. (2015, April 12). Combatting Incident Responders with Apache mod_rewrite. Retrieved February 13, 2024.

Internal MISP references

UUID 3568b09c-7368-5fc2-85b3-d16ee9b9c686 which can be used as unique global reference for mod_rewrite in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-13T00:00:00Z
date_published 2015-04-12T00:00:00Z
source MITRE
title Combatting Incident Responders with Apache mod_rewrite

sentinelone shlayer to zshlayer

Phil Stokes. (2020, September 8). Coming Out of Your Shell: From Shlayer to ZShlayer. Retrieved September 13, 2021.

Internal MISP references

UUID 17277b12-af29-475a-bc9a-0731bbe0bae2 which can be used as unique global reference for sentinelone shlayer to zshlayer in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-13T00:00:00Z
date_published 2020-09-08T00:00:00Z
source MITRE
title Coming Out of Your Shell: From Shlayer to ZShlayer

University of Birmingham C2

Gardiner, J., Cova, M., Nagaraja, S. (2014, February). Command & Control Understanding, Denying and Detecting. Retrieved April 20, 2016.

Internal MISP references

UUID 113ce14e-147f-4a86-8b83-7b49b43a4e88 which can be used as unique global reference for University of Birmingham C2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-20T00:00:00Z
date_published 2014-02-01T00:00:00Z
source MITRE
title Command & Control Understanding, Denying and Detecting

Microsoft Command-line Logging

Mathers, B. (2017, March 7). Command line process auditing. Retrieved April 21, 2017.

Internal MISP references

UUID 4a58170b-906c-4df4-ad1e-0e5bc15366fa which can be used as unique global reference for Microsoft Command-line Logging in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-04-21T00:00:00Z
date_published 2017-03-07T00:00:00Z
source MITRE
title Command line process auditing

Microsoft Netdom Trust Sept 2012

Microsoft. (2012, September 11). Command-Line Reference - Netdom Trust. Retrieved November 30, 2017.

Internal MISP references

UUID 380dc9fe-d490-4914-9595-05d765b27a85 which can be used as unique global reference for Microsoft Netdom Trust Sept 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-30T00:00:00Z
date_published 2012-09-11T00:00:00Z
source MITRE
title Command-Line Reference - Netdom Trust

Microsoft msxsl.exe

Microsoft. (n.d.). Command Line Transformation Utility (msxsl.exe). Retrieved July 3, 2018.

Internal MISP references

UUID a25d664c-d109-466f-9b6a-7e9ea8c57895 which can be used as unique global reference for Microsoft msxsl.exe in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-03T00:00:00Z
source MITRE
title Command Line Transformation Utility (msxsl.exe)

Kettle CSV DDE Aug 2014

Kettle, J. (2014, August 29). Comma Separated Vulnerabilities. Retrieved November 22, 2017.

Internal MISP references

UUID 2badfb63-19a3-4829-bbb5-7c3dfab877d5 which can be used as unique global reference for Kettle CSV DDE Aug 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-22T00:00:00Z
date_published 2014-08-29T00:00:00Z
source MITRE
title Comma Separated Vulnerabilities

Microsoft CLR Integration 2017

Microsoft. (2017, June 19). Common Language Runtime Integration. Retrieved July 8, 2019.

Internal MISP references

UUID 83fc7522-5eb1-4710-8391-090389948686 which can be used as unique global reference for Microsoft CLR Integration 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-07-08T00:00:00Z
date_published 2017-06-19T00:00:00Z
source MITRE
title Common Language Runtime Integration

Palo Alto Comnie

Grunzweig, J. (2018, January 31). Comnie Continues to Target Organizations in East Asia. Retrieved June 7, 2018.

Internal MISP references

UUID ff3cc105-2798-45de-8561-983bf57eb9d9 which can be used as unique global reference for Palo Alto Comnie in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-06-07T00:00:00Z
date_published 2018-01-31T00:00:00Z
source MITRE
title Comnie Continues to Target Organizations in East Asia

GDATA COM Hijacking

G DATA. (2014, October). COM Object hijacking: the discreet way of persistence. Retrieved August 13, 2016.

Internal MISP references

UUID 98e88505-b916-430d-aef6-616ba7ddd88e which can be used as unique global reference for GDATA COM Hijacking in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-08-13T00:00:00Z
date_published 2014-10-01T00:00:00Z
source MITRE
title COM Object hijacking: the discreet way of persistence

AP-NotPetya

FRANK BAJAK AND RAPHAEL SATTER. (2017, June 30). Companies still hobbled from fearsome cyberattack. Retrieved August 18, 2023.

Internal MISP references

UUID 7f1af58a-33fd-538f-b092-789a8776780c which can be used as unique global reference for AP-NotPetya in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-18T00:00:00Z
date_published 2017-06-30T00:00:00Z
source MITRE
title Companies still hobbled from fearsome cyberattack

Microsoft COM

Microsoft. (n.d.). Component Object Model (COM). Retrieved November 22, 2017.

Internal MISP references

UUID edcd917d-ca5b-4e5c-b3be-118e828abe97 which can be used as unique global reference for Microsoft COM in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-22T00:00:00Z
source MITRE
title Component Object Model (COM)

Unit 42 12 8 2022

Dror Alon. (2022, December 8). Compromised Cloud Compute Credentials Case Studies From the Wild. Retrieved April 17, 2024.

Internal MISP references

UUID e7a4a0cf-ffa2-48cc-9b21-a2333592c773 which can be used as unique global reference for Unit 42 12 8 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-17T00:00:00Z
date_published 2022-12-08T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Compromised Cloud Compute Credentials Case Studies From the Wild

Palo Alto Unit 42 Compromised Cloud Compute Credentials 2022

Dror Alon. (2022, December 8). Compromised Cloud Compute Credentials: Case Studies From the Wild. Retrieved March 9, 2023.

Internal MISP references

UUID af755ba2-97c2-5152-ab00-2e24740f69f3 which can be used as unique global reference for Palo Alto Unit 42 Compromised Cloud Compute Credentials 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-09T00:00:00Z
date_published 2022-12-08T00:00:00Z
source MITRE
title Compromised Cloud Compute Credentials: Case Studies From the Wild

US-CERT Alert TA15-314A Web Shells

US-CERT. (2015, November 13). Compromised Web Servers and Web Shells - Threat Awareness and Guidance. Retrieved June 8, 2016.

Internal MISP references

UUID 61ceb0c4-62f6-46cd-b42b-5736c869421f which can be used as unique global reference for US-CERT Alert TA15-314A Web Shells in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-08T00:00:00Z
date_published 2015-11-13T00:00:00Z
source MITRE
title Compromised Web Servers and Web Shells - Threat Awareness and Guidance

Comsvcs.dll - LOLBAS Project

LOLBAS. (2019, August 30). Comsvcs.dll. Retrieved December 4, 2023.

Internal MISP references

UUID 2eb2756d-5a49-4df3-9e2f-104c41c645cd which can be used as unique global reference for Comsvcs.dll - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2019-08-30T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Comsvcs.dll

Condi-Botnet-binaries

Joie Salvio and Roy Tay. (2023, June 20). Condi DDoS Botnet Spreads via TP-Link's CVE-2023-1389. Retrieved September 5, 2023.

Internal MISP references

UUID a92b0d6c-b3e8-56a4-b1b4-1d117e59db84 which can be used as unique global reference for Condi-Botnet-binaries in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-05T00:00:00Z
date_published 2023-06-20T00:00:00Z
source MITRE
title Condi DDoS Botnet Spreads via TP-Link's CVE-2023-1389

Okta Conditional Access Policies

Okta. (2023, November 30). Conditional Access Based on Device Security Posture. Retrieved January 2, 2024.

Internal MISP references

UUID c914578c-dcc2-539e-bb3d-50bf7a0e7101 which can be used as unique global reference for Okta Conditional Access Policies in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-02T00:00:00Z
date_published 2023-11-30T00:00:00Z
source MITRE
title Conditional Access Based on Device Security Posture

Microsoft Common Conditional Access Policies

Microsoft. (2022, December 14). Conditional Access templates. Retrieved February 21, 2023.

Internal MISP references

UUID 9ed9870b-d09a-511d-96f9-4956f26d46bf which can be used as unique global reference for Microsoft Common Conditional Access Policies in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-21T00:00:00Z
date_published 2022-12-14T00:00:00Z
source MITRE
title Conditional Access templates

Microsoft Token Protection 2023

Microsoft. (2023, October 23). Conditional Access: Token protection (preview). Retrieved January 2, 2024.

Internal MISP references

UUID aa4629cf-f11f-5921-9f72-5a8d3f752603 which can be used as unique global reference for Microsoft Token Protection 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-02T00:00:00Z
date_published 2023-10-23T00:00:00Z
source MITRE
title Conditional Access: Token protection (preview)

Trend Micro Conficker

Trend Micro. (2014, March 18). Conficker. Retrieved February 18, 2021.

Internal MISP references

UUID 62cf7f3a-9011-45eb-a7d9-91c76a2177e9 which can be used as unique global reference for Trend Micro Conficker in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-18T00:00:00Z
date_published 2014-03-18T00:00:00Z
source MITRE
title Conficker

ConfigSecurityPolicy.exe - LOLBAS Project

LOLBAS. (2020, September 4). ConfigSecurityPolicy.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 30b8a5d8-596c-4ab3-b3db-b799cc8923e1 which can be used as unique global reference for ConfigSecurityPolicy.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2020-09-04T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title ConfigSecurityPolicy.exe

Microsoft SAML Token Lifetimes

Microsoft. (2020, December 14). Configurable token lifetimes in Microsoft Identity Platform. Retrieved December 22, 2020.

Internal MISP references

UUID 8b810f7c-1f26-420b-9014-732f1469f145 which can be used as unique global reference for Microsoft SAML Token Lifetimes in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-22T00:00:00Z
date_published 2020-12-14T00:00:00Z
source MITRE
title Configurable token lifetimes in Microsoft Identity Platform

Apple Developer Configuration Profile

Apple. (2019, May 3). Configuration Profile Reference. Retrieved September 23, 2021.

Internal MISP references

UUID 8453f06d-5007-4e53-a9a2-1c0edb99be3d which can be used as unique global reference for Apple Developer Configuration Profile in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-23T00:00:00Z
date_published 2019-05-03T00:00:00Z
source MITRE
title Configuration Profile Reference

MDMProfileConfigMacOS

Apple. (2019, May 3). Configuration Profile Reference, Developer. Retrieved April 15, 2022.

Internal MISP references

UUID a7078eee-5478-4a93-9a7e-8db1d020e1da which can be used as unique global reference for MDMProfileConfigMacOS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-15T00:00:00Z
date_published 2019-05-03T00:00:00Z
source MITRE
title Configuration Profile Reference, Developer

Azure Storage Lifecycles

Microsoft Azure. (2024, July 3). Configure a lifecycle management policy. Retrieved September 25, 2024.

Internal MISP references

UUID 7ac4c481-7798-53b3-b7ad-bc09a40f99b7 which can be used as unique global reference for Azure Storage Lifecycles in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-25T00:00:00Z
date_published 2024-07-03T00:00:00Z
source MITRE
title Configure a lifecycle management policy

Azure Just in Time Access 2023

Microsoft. (2023, August 29). Configure and approve just-in-time access for Azure Managed Applications. Retrieved September 21, 2023.

Internal MISP references

UUID ee35e13f-ca39-5faf-81ae-230d33329a28 which can be used as unique global reference for Azure Just in Time Access 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-21T00:00:00Z
date_published 2023-08-29T00:00:00Z
source MITRE
title Configure and approve just-in-time access for Azure Managed Applications

capture_embedded_packet_on_software

Cisco. (2022, August 17). Configure and Capture Embedded Packet on Software. Retrieved July 13, 2022.

Internal MISP references

UUID 5d973180-a28a-5c8f-b13a-45d21331700f which can be used as unique global reference for capture_embedded_packet_on_software in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-13T00:00:00Z
date_published 2022-08-17T00:00:00Z
source MITRE
title Configure and Capture Embedded Packet on Software

Kubernetes Security Context

Kubernetes. (n.d.). Configure a Security Context for a Pod or Container. Retrieved March 8, 2023.

Internal MISP references

UUID bd91ec00-95bb-572f-9452-8040ec633e00 which can be used as unique global reference for Kubernetes Security Context in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-08T00:00:00Z
source MITRE
title Configure a Security Context for a Pod or Container

Microsoft SharePoint Logging

Microsoft. (2017, July 19). Configure audit settings for a site collection. Retrieved April 4, 2018.

Internal MISP references

UUID 9a6a08c0-94f2-4dbc-a0b3-01d5234e7753 which can be used as unique global reference for Microsoft SharePoint Logging in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-04T00:00:00Z
date_published 2017-07-19T00:00:00Z
source MITRE
title Configure audit settings for a site collection

TechNet RDP NLA

Microsoft. (n.d.). Configure Network Level Authentication for Remote Desktop Services Connections. Retrieved June 6, 2016.

Internal MISP references

UUID 39e28cae-a35a-4cf2-a281-c35f4ebd16ba which can be used as unique global reference for TechNet RDP NLA in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-06T00:00:00Z
source MITRE
title Configure Network Level Authentication for Remote Desktop Services Connections

Microsoft Security Alerts for Azure AD Roles

Microsoft. (2022, November 14). Configure security alerts for Azure AD roles in Privileged Identity Management. Retrieved February 21, 2023.

Internal MISP references

UUID 7bde8cd2-6c10-5342-9a4b-a45e84a861b6 which can be used as unique global reference for Microsoft Security Alerts for Azure AD Roles in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-21T00:00:00Z
date_published 2022-11-14T00:00:00Z
source MITRE
title Configure security alerts for Azure AD roles in Privileged Identity Management

Kubernetes Service Accounts

Kubernetes. (2022, February 26). Configure Service Accounts for Pods. Retrieved April 1, 2022.

Internal MISP references

UUID a74ffa28-8a2e-4bfd-bc66-969b463bebd9 which can be used as unique global reference for Kubernetes Service Accounts in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-01T00:00:00Z
date_published 2022-02-26T00:00:00Z
source MITRE
title Configure Service Accounts for Pods

Microsoft Learn ClickOnce Config

Microsoft. (2023, August 4). Configure the ClickOnce trust prompt behavior. Retrieved September 9, 2024.

Internal MISP references

UUID 3a75c7d6-b3f3-5f25-bbcb-e0a18982dfed which can be used as unique global reference for Microsoft Learn ClickOnce Config in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-09T00:00:00Z
date_published 2023-08-04T00:00:00Z
source MITRE
title Configure the ClickOnce trust prompt behavior

Windows RDP Sessions

Microsoft. (n.d.). Configure Timeout and Reconnection Settings for Remote Desktop Services Sessions. Retrieved December 11, 2017.

Internal MISP references

UUID ccd0d241-4ff7-4a15-b2b4-06945980c6bf which can be used as unique global reference for Windows RDP Sessions in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-11T00:00:00Z
source MITRE
title Configure Timeout and Reconnection Settings for Remote Desktop Services Sessions

Microsoft Configure LSA

Microsoft. (2013, July 31). Configuring Additional LSA Protection. Retrieved June 24, 2015.

Internal MISP references

UUID 4adfc72b-cd32-46a6-bdf4-a4c2c6cffa73 which can be used as unique global reference for Microsoft Configure LSA in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-06-24T00:00:00Z
date_published 2013-07-31T00:00:00Z
source MITRE
title Configuring Additional LSA Protection

Microsoft LSA Protection Mar 2014

Microsoft. (2014, March 12). Configuring Additional LSA Protection. Retrieved November 27, 2017.

Internal MISP references

UUID da3f1d7d-188f-4500-9bc6-3299ba043b5c which can be used as unique global reference for Microsoft LSA Protection Mar 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-27T00:00:00Z
date_published 2014-03-12T00:00:00Z
source MITRE
title Configuring Additional LSA Protection

Microsoft LSA

Microsoft. (2013, July 31). Configuring Additional LSA Protection. Retrieved February 13, 2015.

Internal MISP references

UUID 3ad49746-4e42-4663-a49e-ae64152b9463 which can be used as unique global reference for Microsoft LSA in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-02-13T00:00:00Z
date_published 2013-07-31T00:00:00Z
source MITRE
title Configuring Additional LSA Protection

Configuring Data Access audit logs

Google. (n.d.). Configuring Data Access audit logs. Retrieved October 16, 2020.

Internal MISP references

UUID bd310606-f472-4eda-a696-50a3a25f07b3 which can be used as unique global reference for Configuring Data Access audit logs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-16T00:00:00Z
source MITRE
title Configuring Data Access audit logs

cisco dhcp snooping

Cisco. (n.d.). Configuring DHCP Snooping. Retrieved September 17, 2024.

Internal MISP references

UUID cc5eda1b-5e64-52e8-b98f-8df2f3e10475 which can be used as unique global reference for cisco dhcp snooping in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-17T00:00:00Z
source MITRE
title Configuring DHCP Snooping

Microsoft SID Filtering Quarantining Jan 2009

Microsoft. (n.d.). Configuring SID Filter Quarantining on External Trusts. Retrieved November 30, 2017.

Internal MISP references

UUID 134169f1-7bd3-4d04-81a8-f01e1407a4b6 which can be used as unique global reference for Microsoft SID Filtering Quarantining Jan 2009 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-30T00:00:00Z
source MITRE
title Configuring SID Filter Quarantining on External Trusts

TechRepublic Wireless GPO FEB 2009

Schauland, D. (2009, February 24). Configuring Wireless settings via Group Policy. Retrieved July 26, 2018.

Internal MISP references

UUID b62415f8-76bd-4585-ae81-a4d04ccfc703 which can be used as unique global reference for TechRepublic Wireless GPO FEB 2009 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-26T00:00:00Z
date_published 2009-02-24T00:00:00Z
source MITRE
title Configuring Wireless settings via Group Policy

ZDNet Dtrack

Catalin Cimpanu. (2019, October 30). Confirmed: North Korean malware found on Indian nuclear plant's network. Retrieved January 20, 2021.

Internal MISP references

UUID 6e6e02da-b805-47d7-b410-343a1b5da042 which can be used as unique global reference for ZDNet Dtrack in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-20T00:00:00Z
date_published 2019-10-30T00:00:00Z
source MITRE
title Confirmed: North Korean malware found on Indian nuclear plant's network

Uptycs Confucius APT Jan 2021

Uptycs Threat Research Team. (2021, January 12). Confucius APT deploys Warzone RAT. Retrieved December 17, 2021.

Internal MISP references

UUID d74f2c25-cd53-4587-b087-7ba0b8427dc4 which can be used as unique global reference for Uptycs Confucius APT Jan 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-12-17T00:00:00Z
date_published 2021-01-12T00:00:00Z
source MITRE
title Confucius APT deploys Warzone RAT

TrendMicro Confucius APT Aug 2021

Lunghi, D. (2021, August 17). Confucius Uses Pegasus Spyware-related Lures to Target Pakistani Military. Retrieved December 26, 2021.

Internal MISP references

UUID 5c16aae9-d253-463b-8bbc-f14402ce77e4 which can be used as unique global reference for TrendMicro Confucius APT Aug 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-12-26T00:00:00Z
date_published 2021-08-17T00:00:00Z
source MITRE, Tidal Cyber
title Confucius Uses Pegasus Spyware-related Lures to Target Pakistani Military

Conhost.exe - LOLBAS Project

LOLBAS. (2022, April 5). Conhost.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 5ed807c1-15d1-48aa-b497-8cd74fe5b299 which can be used as unique global reference for Conhost.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2022-04-05T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Conhost.exe

EC2 Instance Connect

AWS. (2023, June 2). Connect using EC2 Instance Connect. Retrieved June 2, 2023.

Internal MISP references

UUID deefa5b7-5a28-524c-b500-bc5574aa9920 which can be used as unique global reference for EC2 Instance Connect in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-02T00:00:00Z
date_published 2023-06-02T00:00:00Z
source MITRE
title Connect using EC2 Instance Connect

Sophos News 2 23 2024

Andrew Brandt. (2024, February 23). ConnectWise ScreenConnect attacks deliver malware. Retrieved February 23, 2024.

Internal MISP references

UUID 3d342acf-a451-4473-82ac-8afee61bc984 which can be used as unique global reference for Sophos News 2 23 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-23T00:00:00Z
date_published 2024-02-23T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title ConnectWise ScreenConnect attacks deliver malware

Docker Docs Container

docker docs. (n.d.). Containers. Retrieved October 13, 2021.

Internal MISP references

UUID 3475b705-3ab8-401d-bee6-e187c43ad3c2 which can be used as unique global reference for Docker Docs Container in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-13T00:00:00Z
source MITRE
title Containers

DigitalShadows CDN

Swisscom & Digital Shadows. (2017, September 6). Content Delivery Networks (CDNs) Can Leave You Exposed – How You Might Be Affected And What You Can Do About It. Retrieved October 20, 2020.

Internal MISP references

UUID 183a070f-6c8c-46e3-915b-6edc58bb5e91 which can be used as unique global reference for DigitalShadows CDN in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
date_published 2017-09-06T00:00:00Z
source MITRE
title Content Delivery Networks (CDNs) Can Leave You Exposed – How You Might Be Affected And What You Can Do About It

Content trust in Azure Container Registry

Microsoft. (2019, September 5). Content trust in Azure Container Registry. Retrieved October 16, 2019.

Internal MISP references

UUID fcd211a1-ac81-4ebc-b395-c8fa2a4d614a which can be used as unique global reference for Content trust in Azure Container Registry in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-16T00:00:00Z
date_published 2019-09-05T00:00:00Z
source MITRE
title Content trust in Azure Container Registry

Content trust in Docker

Docker. (2019, October 10). Content trust in Docker. Retrieved October 16, 2019.

Internal MISP references

UUID 57691166-5a22-44a0-8724-6b3b19658c3b which can be used as unique global reference for Content trust in Docker in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-16T00:00:00Z
date_published 2019-10-10T00:00:00Z
source MITRE
title Content trust in Docker

Microsoft File Folder Exclusions

Microsoft. (2024, February 27). Contextual file and folder exclusions. Retrieved March 29, 2024.

Internal MISP references

UUID 7a511f0d-8feb-5370-87db-b33b96ea2367 which can be used as unique global reference for Microsoft File Folder Exclusions in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-29T00:00:00Z
date_published 2024-02-27T00:00:00Z
source MITRE
title Contextual file and folder exclusions

Arctic Wolf Akira 2023

Steven Campbell, Akshay Suthar, & Connor Belfiorre. (2023, July 26). Conti and Akira: Chained Together. Retrieved February 20, 2024.

Internal MISP references

UUID aa34f2a1-a398-5dc4-b898-cdc02afeca5d which can be used as unique global reference for Arctic Wolf Akira 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-20T00:00:00Z
date_published 2023-07-26T00:00:00Z
source MITRE
title Conti and Akira: Chained Together

Arctic Wolf Conti Akira July 26 2023

Steven Campbell, Akshay Suthar, Connor Belfiore, Arctic Wolf Labs Team. (2023, July 26). Conti and Akira: Chained Together. Retrieved March 13, 2024.

Internal MISP references

UUID 72e1b75b-edf7-45b0-9c14-14776a146d0e which can be used as unique global reference for Arctic Wolf Conti Akira July 26 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-13T00:00:00Z
date_published 2023-07-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Conti and Akira: Chained Together

DFIR Conti Bazar Nov 2021

DFIR Report. (2021, November 29). CONTInuing the Bazar Ransomware Story. Retrieved September 29, 2022.

Internal MISP references

UUID a6f1a15d-448b-41d4-81f0-ee445cba83bd which can be used as unique global reference for DFIR Conti Bazar Nov 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-29T00:00:00Z
date_published 2021-11-29T00:00:00Z
source MITRE
title CONTInuing the Bazar Ransomware Story

Cybereason Conti Jan 2021

Rochberger, L. (2021, January 12). Cybereason vs. Conti Ransomware. Retrieved February 17, 2021.

Internal MISP references

UUID 3c0e82a2-41ab-4e63-ac10-bd691c786234 which can be used as unique global reference for Cybereason Conti Jan 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-17T00:00:00Z
source MITRE
title Conti Ransomware

Cybleinc Conti January 2020

Cybleinc. (2021, January 21). Conti Ransomware Resurfaces, Targeting Government & Large Organizations. Retrieved April 13, 2021.

Internal MISP references

UUID 5ef0ad9d-f34d-4771-a595-7ee4994f6c91 which can be used as unique global reference for Cybleinc Conti January 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-13T00:00:00Z
date_published 2021-01-21T00:00:00Z
source MITRE
title Conti Ransomware Resurfaces, Targeting Government & Large Organizations

Microsoft Developer Support Power Apps Conditional Access

Microsoft Developer Support. (2020, May 9). Control Access to Power Apps and Power Automate with Azure AD Conditional Access Policies. Retrieved July 1, 2024.

Internal MISP references

UUID d198608c-2676-5f44-bbc8-5455c2b36cdb which can be used as unique global reference for Microsoft Developer Support Power Apps Conditional Access in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-01T00:00:00Z
date_published 2020-05-09T00:00:00Z
source MITRE
title Control Access to Power Apps and Power Automate with Azure AD Conditional Access Policies

Control.exe - LOLBAS Project

LOLBAS. (2018, May 25). Control.exe. Retrieved December 4, 2023.

Internal MISP references

UUID d0c821b9-7d37-4158-89fa-0dabe6e06800 which can be used as unique global reference for Control.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Control.exe

Wikipedia Control Flow Integrity

Wikipedia. (2018, January 11). Control-flow integrity. Retrieved March 12, 2018.

Internal MISP references

UUID a9b2f525-d812-4dea-b4a6-c0d057d5f071 which can be used as unique global reference for Wikipedia Control Flow Integrity in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-12T00:00:00Z
date_published 2018-01-11T00:00:00Z
source MITRE
title Control-flow integrity

Kubernetes API Control Access

The Kubernetes Authors. (n.d.). Controlling Access to The Kubernetes API. Retrieved March 29, 2021.

Internal MISP references

UUID fd4577b6-0085-44c0-b4c3-4d66dcb39fe7 which can be used as unique global reference for Kubernetes API Control Access in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-29T00:00:00Z
source MITRE
title Controlling Access to The Kubernetes API

TrendMicro CPL Malware Dec 2013

Bernardino, J. (2013, December 17). Control Panel Files Used As Malicious Attachments. Retrieved January 18, 2018.

Internal MISP references

UUID fd38f1fd-37e9-4173-b319-3f92c2743055 which can be used as unique global reference for TrendMicro CPL Malware Dec 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-18T00:00:00Z
date_published 2013-12-17T00:00:00Z
source MITRE
title Control Panel Files Used As Malicious Attachments

GitHub Conveigh

Robertson, K. (2016, August 28). Conveigh. Retrieved November 17, 2017.

Internal MISP references

UUID 4deb8c8e-2da1-4634-bf04-5ccf620a2143 which can be used as unique global reference for GitHub Conveigh in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-17T00:00:00Z
date_published 2016-08-28T00:00:00Z
source MITRE
title Conveigh

MITRE Copernicus

Butterworth, J. (2013, July 30). Copernicus: Question Your Assumptions about BIOS Security. Retrieved December 11, 2015.

Internal MISP references

UUID 55d139fe-f5e5-4b5e-9123-8133b459ea72 which can be used as unique global reference for MITRE Copernicus in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-12-11T00:00:00Z
date_published 2013-07-30T00:00:00Z
source MITRE
title Copernicus: Question Your Assumptions about BIOS Security

Secureworks COPPER FIELDSTONE Profile

Secureworks. (n.d.). COPPER FIELDSTONE. Retrieved October 6, 2021.

Internal MISP references

UUID d7f5f154-3638-47c1-8e1e-a30a6504a735 which can be used as unique global reference for Secureworks COPPER FIELDSTONE Profile in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-06T00:00:00Z
source MITRE
title COPPER FIELDSTONE

TechNet Copy

Microsoft. (n.d.). Copy. Retrieved April 26, 2016.

Internal MISP references

UUID 4e0d4b94-6b4c-4104-86e6-499b6aa7ba78 which can be used as unique global reference for TechNet Copy in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-26T00:00:00Z
source MITRE
title Copy

copy_cmd_cisco

Cisco. (2022, August 16). copy - Cisco IOS Configuration Fundamentals Command Reference . Retrieved July 13, 2022.

Internal MISP references

UUID 88138372-550f-5da5-be5e-b5ba0fe32f64 which can be used as unique global reference for copy_cmd_cisco in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-13T00:00:00Z
date_published 2022-08-16T00:00:00Z
source MITRE
title copy - Cisco IOS Configuration Fundamentals Command Reference

CopyKittens Nov 2015

Minerva Labs LTD and ClearSky Cyber Security. (2015, November 23). CopyKittens Attack Group. Retrieved September 11, 2017.

Internal MISP references

UUID 04e3ce40-5487-4931-98db-f55da83f412e which can be used as unique global reference for CopyKittens Nov 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-09-11T00:00:00Z
date_published 2015-11-23T00:00:00Z
source MITRE
title CopyKittens Attack Group

coregen.exe - LOLBAS Project

LOLBAS. (2020, October 9). coregen.exe. Retrieved December 4, 2023.

Internal MISP references

UUID f24d4cf5-9ca9-46bd-bd43-86b37e2a638a which can be used as unique global reference for coregen.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2020-10-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title coregen.exe

Apple Core Services

Apple. (n.d.). Core Services. Retrieved June 25, 2020.

Internal MISP references

UUID 0ef05e47-1305-4715-a677-67f1b55b24a3 which can be used as unique global reference for Apple Core Services in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-25T00:00:00Z
source MITRE
title Core Services

Microsoft IoT Compromises August 05 2019

MSRC Team. (2019, August 5). Corporate IoT - a path to intrusion. Retrieved August 24, 2023.

Internal MISP references

UUID 037ace78-e997-40f3-a891-916bc596a9c0 which can be used as unique global reference for Microsoft IoT Compromises August 05 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-24T00:00:00Z
date_published 2019-08-05T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Corporate IoT - a path to intrusion

Microsoft STRONTIUM Aug 2019

MSRC Team. (2019, August 5). Corporate IoT – a path to intrusion. Retrieved August 16, 2019.

Internal MISP references

UUID 7efd3c8d-5e69-4b6f-8edb-9186abdf0e1a which can be used as unique global reference for Microsoft STRONTIUM Aug 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-08-16T00:00:00Z
date_published 2019-08-05T00:00:00Z
source MITRE
title Corporate IoT – a path to intrusion

Palo Alto ARP

Palo Alto Networks. (2021, November 24). Cortex XDR Analytics Alert Reference: Uncommon ARP cache listing via arp.exe. Retrieved December 7, 2021.

Internal MISP references

UUID 96ce4324-57d2-422b-8403-f5d4f3ce410c which can be used as unique global reference for Palo Alto ARP in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-12-07T00:00:00Z
date_published 2021-11-24T00:00:00Z
source MITRE
title Cortex XDR Analytics Alert Reference: Uncommon ARP cache listing via arp.exe

WeLiveSecurity CosmicBeetle September 10 2024

Jakub Souček. (2024, September 10). CosmicBeetle steps up: Probation period at RansomHub. Retrieved September 13, 2024.

Internal MISP references

UUID 8debba29-4d6d-41d2-8772-f97c7d49056b which can be used as unique global reference for WeLiveSecurity CosmicBeetle September 10 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-13T00:00:00Z
date_published 2024-09-10T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title CosmicBeetle steps up: Probation period at RansomHub

F-Secure Cosmicduke

F-Secure Labs. (2014, July). COSMICDUKE Cosmu with a twist of MiniDuke. Retrieved July 3, 2014.

Internal MISP references

UUID d0d5ecbe-1051-4ceb-b558-b8b451178358 which can be used as unique global reference for F-Secure Cosmicduke in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-07-03T00:00:00Z
date_published 2014-07-01T00:00:00Z
source MITRE
title COSMICDUKE Cosmu with a twist of MiniDuke

Costin Raiu IAmTheKing October 2020

Costin Raiu. (2020, October 2). Costin Raiu Twitter IAmTheKing SlothfulMedia. Retrieved September 12, 2024.

Internal MISP references

UUID 2be88843-ed3a-460e-87c1-85aa50e827c8 which can be used as unique global reference for Costin Raiu IAmTheKing October 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2020-10-02T00:00:00Z
source MITRE
title Costin Raiu Twitter IAmTheKing SlothfulMedia

Google Iran Threats October 2021

Bash, A. (2021, October 14). Countering threats from Iran. Retrieved January 4, 2023.

Internal MISP references

UUID 6d568141-eb54-5001-b880-ae8ac1156746 which can be used as unique global reference for Google Iran Threats October 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-01-04T00:00:00Z
date_published 2021-10-14T00:00:00Z
source MITRE
title Countering threats from Iran

Github Covenant

cobbr. (2021, April 21). Covenant. Retrieved September 4, 2024.

Internal MISP references

UUID b717c3ae-8ae0-53c9-90ba-a34cf7694f3c which can be used as unique global reference for Github Covenant in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-04T00:00:00Z
date_published 2021-04-21T00:00:00Z
source MITRE
title Covenant

Cisco DNSMessenger March 2017

Brumaghin, E. and Grady, C.. (2017, March 2). Covert Channels and Poor Decisions: The Tale of DNSMessenger. Retrieved March 8, 2017.

Internal MISP references

UUID 49f22ba2-5aca-4204-858e-c2499a7050ae which can be used as unique global reference for Cisco DNSMessenger March 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-08T00:00:00Z
date_published 2017-03-02T00:00:00Z
source MITRE
title Covert Channels and Poor Decisions: The Tale of DNSMessenger

Juniper IcedID June 2020

Kimayong, P. (2020, June 18). COVID-19 and FMLA Campaigns used to install new IcedID banking malware. Retrieved July 14, 2020.

Internal MISP references

UUID 426886d0-cdf2-4af7-a0e4-366c1b0a1942 which can be used as unique global reference for Juniper IcedID June 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-07-14T00:00:00Z
date_published 2020-06-18T00:00:00Z
source MITRE
title COVID-19 and FMLA Campaigns used to install new IcedID banking malware

PTSecurity Higaisa 2020

PT ESC Threat Intelligence. (2020, June 4). COVID-19 and New Year greetings: an investigation into the tools and methods used by the Higaisa group. Retrieved March 2, 2021.

Internal MISP references

UUID cf8f3d9c-0d21-4587-a707-46848a15bd46 which can be used as unique global reference for PTSecurity Higaisa 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-02T00:00:00Z
date_published 2020-06-04T00:00:00Z
source MITRE, Tidal Cyber
title COVID-19 and New Year greetings: an investigation into the tools and methods used by the Higaisa group

F-Secure CozyDuke

F-Secure Labs. (2015, April 22). CozyDuke: Malware Analysis. Retrieved December 10, 2015.

Internal MISP references

UUID 08e1d233-0580-484e-b737-af091e2aa9ea which can be used as unique global reference for F-Secure CozyDuke in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-12-10T00:00:00Z
date_published 2015-04-22T00:00:00Z
source MITRE
title CozyDuke: Malware Analysis

TrendMicro CPL Malware Jan 2014

Mercês, F. (2014, January 27). CPL Malware - Malicious Control Panel Items. Retrieved January 18, 2018.

Internal MISP references

UUID 9549f9b6-b771-4500-bd82-426c7abdfd8f which can be used as unique global reference for TrendMicro CPL Malware Jan 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-18T00:00:00Z
date_published 2014-01-27T00:00:00Z
source MITRE
title CPL Malware - Malicious Control Panel Items

Trend Micro CPL

Merces, F. (2014). CPL Malware Malicious Control Panel Items. Retrieved November 1, 2017.

Internal MISP references

UUID d90a33aa-8f20-49cb-aa27-771249cb65eb which can be used as unique global reference for Trend Micro CPL in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-01T00:00:00Z
date_published 2014-01-01T00:00:00Z
source MITRE
title CPL Malware Malicious Control Panel Items

SANS Brute Ratel October 2022

Thomas, W. (2022, October 5). Cracked Brute Ratel C4 framework proliferates across the cybercriminal underground. Retrieved February 6, 2023.

Internal MISP references

UUID 9544e762-6f72-59e7-8384-5bbef13bfe96 which can be used as unique global reference for SANS Brute Ratel October 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-06T00:00:00Z
date_published 2022-10-05T00:00:00Z
source MITRE
title Cracked Brute Ratel C4 framework proliferates across the cybercriminal underground

Stealthbits Cracking AS-REP Roasting Jun 2019

Jeff Warren. (2019, June 27). Cracking Active Directory Passwords with AS-REP Roasting. Retrieved August 24, 2020.

Internal MISP references

UUID 3af06034-8384-4de8-9356-e9aaa35b95a2 which can be used as unique global reference for Stealthbits Cracking AS-REP Roasting Jun 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-24T00:00:00Z
date_published 2019-06-27T00:00:00Z
source MITRE
title Cracking Active Directory Passwords with AS-REP Roasting

AdSecurity Cracking Kerberos Dec 2015

Metcalf, S. (2015, December 31). Cracking Kerberos TGS Tickets Using Kerberoast – Exploiting Kerberos to Compromise the Active Directory Domain. Retrieved March 22, 2018.

Internal MISP references

UUID 1b018fc3-515a-4ec4-978f-6d5649ceb0c5 which can be used as unique global reference for AdSecurity Cracking Kerberos Dec 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-22T00:00:00Z
date_published 2015-12-31T00:00:00Z
source MITRE
title Cracking Kerberos TGS Tickets Using Kerberoast – Exploiting Kerberos to Compromise the Active Directory Domain

Dragos Crashoverride 2017

Dragos Inc.. (2017, June 13). CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Retrieved December 18, 2020.

Internal MISP references

UUID c8f624e3-2ba2-4564-bd1c-f06b9a6a8bce which can be used as unique global reference for Dragos Crashoverride 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-18T00:00:00Z
date_published 2017-06-13T00:00:00Z
source MITRE
title CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations

Unit 42 ATOM Crawling Taurus

Unit 42. (n.d.). Crawling Taurus. Retrieved September 14, 2023.

Internal MISP references

UUID 75098b2c-4928-4e3f-9bcc-b4f6b8de96f8 which can be used as unique global reference for Unit 42 ATOM Crawling Taurus in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Crawling Taurus

Microsoft Image

Microsoft. (2021, August 23). Create a managed image of a generalized VM in Azure. Retrieved October 13, 2021.

Internal MISP references

UUID 5317c625-d0be-45eb-9321-0cc9aa295cc9 which can be used as unique global reference for Microsoft Image in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-13T00:00:00Z
date_published 2021-08-23T00:00:00Z
source MITRE
title Create a managed image of a generalized VM in Azure

Microsoft Snapshot

Microsoft. (2021, September 16). Create a snapshot of a virtual hard disk. Retrieved October 13, 2021.

Internal MISP references

UUID 693549da-d9b9-4b67-a1bb-c8ea4a099842 which can be used as unique global reference for Microsoft Snapshot in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-13T00:00:00Z
date_published 2021-09-16T00:00:00Z
source MITRE
title Create a snapshot of a virtual hard disk

Microsoft Create Token

Brower, N., Lich, B. (2017, April 19). Create a token object. Retrieved December 19, 2017.

Internal MISP references

UUID d36d4f06-007e-4ff0-8660-4c65721d0b92 which can be used as unique global reference for Microsoft Create Token in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-19T00:00:00Z
date_published 2017-04-19T00:00:00Z
source MITRE
title Create a token object

GCP Create Cloud Identity Users

Google. (n.d.). Create Cloud Identity user accounts. Retrieved January 29, 2020.

Internal MISP references

UUID e91748b2-1432-4203-a1fe-100aa70458d2 which can be used as unique global reference for GCP Create Cloud Identity Users in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-01-29T00:00:00Z
source MITRE
title Create Cloud Identity user accounts

Createdump.exe - LOLBAS Project

LOLBAS. (2022, January 20). Createdump.exe. Retrieved December 4, 2023.

Internal MISP references

UUID f3ccacc1-3b42-4042-9a5c-f5b483a5e801 which can be used as unique global reference for Createdump.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2022-01-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Createdump.exe

Google Cloud Kubernetes IAM

Google Cloud. (n.d.). Create IAM policies. Retrieved July 14, 2023.

Internal MISP references

UUID e8ee3ac6-ae7c-5fd3-a339-b579a419dd96 which can be used as unique global reference for Google Cloud Kubernetes IAM in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-14T00:00:00Z
source MITRE
title Create IAM policies

Microsoft CreateMutexA

Microsoft. (2023, February 8). CreateMutexA function (synchapi.h). Retrieved September 19, 2024.

Internal MISP references

UUID 20939374-30c1-515a-b672-28a030bf0c64 which can be used as unique global reference for Microsoft CreateMutexA in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-19T00:00:00Z
date_published 2023-02-08T00:00:00Z
source MITRE
title CreateMutexA function (synchapi.h)

Microsoft CreateProcess

Microsoft. (n.d.). CreateProcess function. Retrieved September 12, 2024.

Internal MISP references

UUID aa336e3a-464d-48ce-bebb-760b73764610 which can be used as unique global reference for Microsoft CreateProcess in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
source MITRE
title CreateProcess function

Microsoft CLI Create Subscription

Microsoft . (n.d.). Create subscription. Retrieved August 4, 2023.

Internal MISP references

UUID 1331b524-7d6f-59d9-a2bd-78ff7b3e371f which can be used as unique global reference for Microsoft CLI Create Subscription in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-04T00:00:00Z
source MITRE
title Create subscription

Microsoft. (2021, October 28). Create symbolic links. Retrieved April 27, 2022.

Internal MISP references

UUID 06bfdf8f-8671-47f7-9d0c-baf234c7ae96 which can be used as unique global reference for create_sym_links in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-27T00:00:00Z
date_published 2021-10-28T00:00:00Z
source MITRE
title Create symbolic links

GCP - Creating and Starting a VM

Google. (2020, April 23). Creating and Starting a VM instance. Retrieved May 1, 2020.

Internal MISP references

UUID c1b87a56-115a-46d7-9117-80442091ac3c which can be used as unique global reference for GCP - Creating and Starting a VM in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-01T00:00:00Z
date_published 2020-04-23T00:00:00Z
source MITRE
title Creating and Starting a VM instance

AWS Create IAM User

AWS. (n.d.). Creating an IAM User in Your AWS Account. Retrieved January 29, 2020.

Internal MISP references

UUID bb474e88-b7bb-4b92-837c-95fe7bdd03f7 which can be used as unique global reference for AWS Create IAM User in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-01-29T00:00:00Z
source MITRE
title Creating an IAM User in Your AWS Account

GNU Fork

Free Software Foundation, Inc.. (2020, June 18). Creating a Process. Retrieved June 25, 2020.

Internal MISP references

UUID c46331cb-328a-46e3-89c4-e43fa345d6e8 which can be used as unique global reference for GNU Fork in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-25T00:00:00Z
date_published 2020-06-18T00:00:00Z
source MITRE
title Creating a Process

AppleDocs Launch Agent Daemons

Apple. (n.d.). Creating Launch Daemons and Agents. Retrieved July 10, 2017.

Internal MISP references

UUID 310d18f8-6f9a-48b7-af12-6b921209d1ab which can be used as unique global reference for AppleDocs Launch Agent Daemons in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-10T00:00:00Z
source MITRE
title Creating Launch Daemons and Agents

TechNet Logon Scripts

Microsoft. (2005, January 21). Creating logon scripts. Retrieved April 27, 2016.

Internal MISP references

UUID 896cf5dd-3fe7-44ab-bbaf-d8b2b9980dca which can be used as unique global reference for TechNet Logon Scripts in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-27T00:00:00Z
date_published 2005-01-21T00:00:00Z
source MITRE
title Creating logon scripts

Google Cloud Service Account Credentials

Google Cloud. (2022, March 31). Creating short-lived service account credentials. Retrieved April 1, 2022.

Internal MISP references

UUID c4befa09-3c7f-49f3-bfcc-4fcbb7bace22 which can be used as unique global reference for Google Cloud Service Account Credentials in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-01T00:00:00Z
date_published 2022-03-31T00:00:00Z
source MITRE
title Creating short-lived service account credentials

creatingXPCservices

Apple. (2016, September 9). Creating XPC Services. Retrieved April 19, 2022.

Internal MISP references

UUID 029acdee-95d6-47a7-86de-0f6b925cef9c which can be used as unique global reference for creatingXPCservices in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-19T00:00:00Z
date_published 2016-09-09T00:00:00Z
source MITRE
title Creating XPC Services

GitHub Creddump7

Flathers, R. (2018, February 19). creddump7. Retrieved April 11, 2018.

Internal MISP references

UUID 276975da-7b5f-49aa-975e-4ac9bc527cf2 which can be used as unique global reference for GitHub Creddump7 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-11T00:00:00Z
date_published 2018-02-19T00:00:00Z
source MITRE
title creddump7

Microsoft Midnight Blizzard Replay Attack

Microsoft Threat Intelligence. (2023, June 21). Credential Attacks. Retrieved September 12, 2024.

Internal MISP references

UUID 5af0008b-0ced-5d1d-bbc9-6c9d60835071 which can be used as unique global reference for Microsoft Midnight Blizzard Replay Attack in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2023-06-21T00:00:00Z
source MITRE
title Credential Attacks

Anomali Template Injection MAR 2018

Intel_Acquisition_Team. (2018, March 1). Credential Harvesting and Malicious File Delivery using Microsoft Office Template Injection. Retrieved July 20, 2018.

Internal MISP references

UUID 3cdeb2a2-9582-4725-a132-6503dbe04e1d which can be used as unique global reference for Anomali Template Injection MAR 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-20T00:00:00Z
date_published 2018-03-01T00:00:00Z
source MITRE
title Credential Harvesting and Malicious File Delivery using Microsoft Office Template Injection

Microsoft Credential Locker

Microsoft. (2013, October 23). Credential Locker Overview. Retrieved November 24, 2020.

Internal MISP references

UUID 77505354-bb08-464c-9176-d0015a62c7c9 which can be used as unique global reference for Microsoft Credential Locker in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-24T00:00:00Z
date_published 2013-10-23T00:00:00Z
source MITRE
title Credential Locker Overview

Microsoft CredEnumerate

Microsoft. (2018, December 5). CredEnumarateA function (wincred.h). Retrieved November 24, 2020.

Internal MISP references

UUID ec3e7b3f-99dd-4f2f-885b-09d66b01fe3e which can be used as unique global reference for Microsoft CredEnumerate in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-24T00:00:00Z
date_published 2018-12-05T00:00:00Z
source MITRE
title CredEnumarateA function (wincred.h)

SentinelLabs Intermittent Encryption September 08 2022

Aleksandar Milenkoski, Jim Walter. (2022, September 8). Crimeware Trends | Ransomware Developers Turn to Intermittent Encryption to Evade Detection. Retrieved August 10, 2023.

Internal MISP references

UUID 09cae6de-e026-43a5-a8bc-7ff8e8205232 which can be used as unique global reference for SentinelLabs Intermittent Encryption September 08 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-10T00:00:00Z
date_published 2022-09-08T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Crimeware Trends

TrendmicroHideoutsLease

Max Goncharov. (2015, July 15). Criminal Hideouts for Lease: Bulletproof Hosting Services. Retrieved March 6, 2017.

Internal MISP references

UUID 527de869-3c76-447c-98c4-c37a2acf75e2 which can be used as unique global reference for TrendmicroHideoutsLease in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-06T00:00:00Z
date_published 2015-07-15T00:00:00Z
source MITRE
title Criminal Hideouts for Lease: Bulletproof Hosting Services

doppelpaymer_crowdstrike

Hurley, S. (2021, December 7). Critical Hit: How DoppelPaymer Hunts and Kills Windows Processes. Retrieved January 26, 2022.

Internal MISP references

UUID 54b5d8af-21f0-4d1c-ada8-b87db85dd742 which can be used as unique global reference for doppelpaymer_crowdstrike in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-26T00:00:00Z
date_published 2021-12-07T00:00:00Z
source MITRE
title Critical Hit: How DoppelPaymer Hunts and Kills Windows Processes

CISA AA24-038A PRC Critical Infrastructure February 2024

CISA et al.. (2024, February 7). PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure. Retrieved May 15, 2024.

Internal MISP references

UUID bfa16dc6-f075-5bd3-9d9d-255df8789298 which can be used as unique global reference for CISA AA24-038A PRC Critical Infrastructure February 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-15T00:00:00Z
source MITRE
title Critical Infrastructure

Critical Vulnerabilities in PaperCut Print Management Software

Team Huntress. (2023, April 21). Critical Vulnerabilities in PaperCut Print Management Software. Retrieved May 8, 2023.

Internal MISP references

UUID 874f40f9-146d-4a52-93fd-9b2e7981b6da which can be used as unique global reference for Critical Vulnerabilities in PaperCut Print Management Software in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-08T00:00:00Z
date_published 2023-04-21T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Critical Vulnerabilities in PaperCut Print Management Software

Security Affairs SILENTTRINITY July 2019

Paganini, P. (2019, July 7). Croatia government agencies targeted with news SilentTrinity malware. Retrieved March 23, 2022.

Internal MISP references

UUID b4945fc0-b89b-445c-abfb-14959deba3d0 which can be used as unique global reference for Security Affairs SILENTTRINITY July 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-23T00:00:00Z
date_published 2019-07-07T00:00:00Z
source MITRE
title Croatia government agencies targeted with news SilentTrinity malware

Die.net Linux crontab Man Page

Paul Vixie. (n.d.). crontab(5) - Linux man page. Retrieved December 19, 2017.

Internal MISP references

UUID 0339c2ab-7a08-4976-90eb-1637c23c5644 which can be used as unique global reference for Die.net Linux crontab Man Page in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-19T00:00:00Z
source MITRE
title crontab(5) - Linux man page

Symantec Frutas Feb 2013

Bingham, J. (2013, February 11). Cross-Platform Frutas RAT Builder and Back Door. Retrieved April 23, 2019.

Internal MISP references

UUID 8d9f88be-9ddf-485b-9333-7e41704ec64f which can be used as unique global reference for Symantec Frutas Feb 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-23T00:00:00Z
date_published 2013-02-11T00:00:00Z
source MITRE
title Cross-Platform Frutas RAT Builder and Back Door

Bishop Fox Sliver Framework August 2019

Kervella, R. (2019, August 4). Cross-platform General Purpose Implant Framework Written in Golang. Retrieved July 30, 2021.

Internal MISP references

UUID 51e67e37-2d61-4228-999b-bec6f80cf106 which can be used as unique global reference for Bishop Fox Sliver Framework August 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-07-30T00:00:00Z
date_published 2019-08-04T00:00:00Z
source MITRE
title Cross-platform General Purpose Implant Framework Written in Golang

Okta Cross-Tenant Impersonation 2023

Okta Defensive Cyber Operations. (2023, August 31). Cross-Tenant Impersonation: Prevention and Detection. Retrieved February 15, 2024.

Internal MISP references

UUID d54188b5-86eb-52a0-8384-823c45431762 which can be used as unique global reference for Okta Cross-Tenant Impersonation 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-15T00:00:00Z
date_published 2023-08-31T00:00:00Z
source MITRE
title Cross-Tenant Impersonation: Prevention and Detection

Okta Cross-Tenant Impersonation

Okta Defensive Cyber Operations. (2023, August 31). Cross-Tenant Impersonation: Prevention and Detection. Retrieved March 4, 2024.

Internal MISP references

UUID 77dbd22f-ce57-50f7-9c6b-8dc874a4d80d which can be used as unique global reference for Okta Cross-Tenant Impersonation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-04T00:00:00Z
date_published 2023-08-31T00:00:00Z
source MITRE
title Cross-Tenant Impersonation: Prevention and Detection

Crowdstrike CrowdCast Oct 2013

Crowdstrike. (2013, October 16). CrowdCasts Monthly: You Have an Adversary Problem. Retrieved March 1, 2017.

Internal MISP references

UUID 2062a229-58b3-4610-99cb-8907e7fbb350 which can be used as unique global reference for Crowdstrike CrowdCast Oct 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-01T00:00:00Z
date_published 2013-10-16T00:00:00Z
source MITRE
title CrowdCasts Monthly: You Have an Adversary Problem

Crowdstrike Global Threat Report Feb 2018

CrowdStrike. (2018, February 26). CrowdStrike 2018 Global Threat Report. Retrieved October 10, 2018.

Internal MISP references

UUID 6c1ace5b-66b2-4c56-9301-822aad2c3c16 which can be used as unique global reference for Crowdstrike Global Threat Report Feb 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-10-10T00:00:00Z
date_published 2018-02-26T00:00:00Z
source MITRE
title CrowdStrike 2018 Global Threat Report

CrowdStrike GTR 2021 June 2021

CrowdStrike. (2021, June 7). CrowdStrike 2021 Global Threat Report. Retrieved September 29, 2021.

Internal MISP references

UUID ec58e524-6de5-4cbb-a5d3-984b9b652f26 which can be used as unique global reference for CrowdStrike GTR 2021 June 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-29T00:00:00Z
date_published 2021-06-07T00:00:00Z
source MITRE
title CrowdStrike 2021 Global Threat Report

CrowdStrike Adversary Carbon Spider

CrowdStrike. (2022, June 01). CrowdStrike Adversary Carbon Spider. Retrieved June 01, 2022.

Internal MISP references

UUID 9e28d375-c4a7-405f-9fff-7374c19f3af7 which can be used as unique global reference for CrowdStrike Adversary Carbon Spider in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-01T00:00:00Z
source Tidal Cyber
title CrowdStrike Adversary Carbon Spider

CrowdStrike Adversary Cozy Bear

CrowdStrike. (2022, May 4). CrowdStrike Adversary Cozy Bear. Retrieved May 4, 2022.

Internal MISP references

UUID 0998ad7a-b4aa-44af-a665-dc58a3a6f800 which can be used as unique global reference for CrowdStrike Adversary Cozy Bear in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-04T00:00:00Z
source Tidal Cyber
title CrowdStrike Adversary Cozy Bear

CrowdStrike Labyrinth Chollima Feb 2022

CrowdStrike. (2022, February 1). CrowdStrike Adversary Labyrinth Chollima. Retrieved February 1, 2022.

Internal MISP references

UUID ffe31bbf-a40d-4285-96a0-53c54298a680 which can be used as unique global reference for CrowdStrike Labyrinth Chollima Feb 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-01T00:00:00Z
date_published 2022-02-01T00:00:00Z
source MITRE
title CrowdStrike Adversary Labyrinth Chollima

CrowdStrike Adversary Ocean Buffalo

CrowdStrike. (2022, June 25). CrowdStrike Adversary Ocean Bufallo. Retrieved June 25, 2022.

Internal MISP references

UUID 466795cb-0269-4d0c-a48c-d71e9dfd9a3c which can be used as unique global reference for CrowdStrike Adversary Ocean Buffalo in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-25T00:00:00Z
source Tidal Cyber
title CrowdStrike Adversary Ocean Buffalo

CrowdStrike Adversary Venomous Bear

CrowdStrike. (2022, May 4). CrowdStrike Adversary Venomous Bear. Retrieved May 4, 2022.

Internal MISP references

UUID 8c04f2b8-74ba-44a5-9580-96eabdbbcda9 which can be used as unique global reference for CrowdStrike Adversary Venomous Bear in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-04T00:00:00Z
source Tidal Cyber
title CrowdStrike Adversary Venomous Bear

CrowdStrike Adversary Wizard Spider

CrowdStrike. (2022, June 23). CrowdStrike Adversary Wizard Spider. Retrieved June 23, 2022.

Internal MISP references

UUID 05f382c4-5163-49e0-a8a0-cf3a5992ef18 which can be used as unique global reference for CrowdStrike Adversary Wizard Spider in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-23T00:00:00Z
source Tidal Cyber
title CrowdStrike Adversary Wizard Spider

Crowdstrike DriveSlayer February 2022

Thomas, W. et al. (2022, February 25). CrowdStrike Falcon Protects from New Wiper Malware Used in Ukraine Cyberattacks. Retrieved March 25, 2022.

Internal MISP references

UUID 4f01e901-58f8-4fdb-ac8c-ef4b6bfd068e which can be used as unique global reference for Crowdstrike DriveSlayer February 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-25T00:00:00Z
date_published 2022-02-25T00:00:00Z
source MITRE
title CrowdStrike Falcon Protects from New Wiper Malware Used in Ukraine Cyberattacks

CrowdStrike Putter Panda

Crowdstrike Global Intelligence Team. (2014, June 9). CrowdStrike Intelligence Report: Putter Panda. Retrieved January 22, 2016.

Internal MISP references

UUID 413962d0-bd66-4000-a077-38c2677995d1 which can be used as unique global reference for CrowdStrike Putter Panda in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-22T00:00:00Z
date_published 2014-06-09T00:00:00Z
source MITRE, Tidal Cyber
title CrowdStrike Intelligence Report: Putter Panda

Softpedia MinerC

Cimpanu, C.. (2016, September 9). Cryptocurrency Mining Malware Discovered Targeting Seagate NAS Hard Drives. Retrieved September 12, 2024.

Internal MISP references

UUID 087b9bf1-bd9e-4cd6-a386-d9d2c812c927 which can be used as unique global reference for Softpedia MinerC in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2016-09-09T00:00:00Z
source MITRE
title Cryptocurrency Mining Malware Discovered Targeting Seagate NAS Hard Drives

Microsoft Cryptojacking 2023

Microsoft Threat Intelligence. (2023, July 25). Cryptojacking: Understanding and defending against cloud compute resource abuse. Retrieved September 5, 2023.

Internal MISP references

UUID e2dbc963-b913-5a44-bb61-88a3f0d8d8a3 which can be used as unique global reference for Microsoft Cryptojacking 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-05T00:00:00Z
date_published 2023-07-25T00:00:00Z
source MITRE
title Cryptojacking: Understanding and defending against cloud compute resource abuse

Microsoft CryptUnprotectData April 2018

Microsoft. (2018, April 12). CryptUnprotectData function. Retrieved June 18, 2019.

Internal MISP references

UUID 258088ae-96c2-4520-8eb5-1a7e540a9a24 which can be used as unique global reference for Microsoft CryptUnprotectData April 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-18T00:00:00Z
date_published 2018-04-12T00:00:00Z
source MITRE
title CryptUnprotectData function

Csc.exe - LOLBAS Project

LOLBAS. (2018, May 25). Csc.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 276c9e55-4673-426d-8f49-06edee2e3b30 which can be used as unique global reference for Csc.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Csc.exe

Cscript.exe - LOLBAS Project

LOLBAS. (2018, May 25). Cscript.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 428b6223-63b7-497f-b13a-e472b4583a9f which can be used as unique global reference for Cscript.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Cscript.exe

csi.exe - LOLBAS Project

LOLBAS. (2018, May 25). csi.exe. Retrieved December 4, 2023.

Internal MISP references

UUID b810ee91-de4e-4c7b-8fa8-24dca95133e5 which can be used as unique global reference for csi.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title csi.exe

OWASP CSV Injection

Albinowax Timo Goosen. (n.d.). CSV Injection. Retrieved February 7, 2022.

Internal MISP references

UUID 0cdde66c-a7ae-48a2-8ade-067643de304d which can be used as unique global reference for OWASP CSV Injection in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-07T00:00:00Z
source MITRE
title CSV Injection

Elastic CUBA Ransomware 2022

Daniel Stepanic, Derek Ditch, Seth Goodwin, Salim Bitam, Andrew Pease. (2022, September 7). CUBA Ransomware Campaign Analysis. Retrieved August 5, 2024.

Internal MISP references

UUID 79299d27-dbbf-56d0-87fd-15e3f9167cf8 which can be used as unique global reference for Elastic CUBA Ransomware 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-05T00:00:00Z
date_published 2022-09-07T00:00:00Z
source MITRE
title CUBA Ransomware Campaign Analysis

Microsoft Subkey

Microsoft. (n.d.). CurrentControlSet\Services Subkey Entries. Retrieved November 30, 2014.

Internal MISP references

UUID be233077-7bb4-48be-aecf-03258931527d which can be used as unique global reference for Microsoft Subkey in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-30T00:00:00Z
source MITRE
title CurrentControlSet\Services Subkey Entries

Microsoft - Customer Guidance on Recent Nation-State Cyber Attacks

MSRC. (2020, December 13). Customer Guidance on Recent Nation-State Cyber Attacks. Retrieved December 30, 2020.

Internal MISP references

UUID 47031992-841f-4ef4-87c6-bb4c077fb8dc which can be used as unique global reference for Microsoft - Customer Guidance on Recent Nation-State Cyber Attacks in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-30T00:00:00Z
date_published 2020-12-13T00:00:00Z
source MITRE
title Customer Guidance on Recent Nation-State Cyber Attacks

Microsoft SolarWinds Customer Guidance

MSRC. (2020, December 13). Customer Guidance on Recent Nation-State Cyber Attacks. Retrieved December 17, 2020.

Internal MISP references

UUID b486ae40-a854-4998-bf1b-aaf6ea2047ed which can be used as unique global reference for Microsoft SolarWinds Customer Guidance in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-17T00:00:00Z
date_published 2020-12-13T00:00:00Z
source MITRE
title Customer Guidance on Recent Nation-State Cyber Attacks

Bleeping Computer Bank Hack 2020

Ionut Ilascu. (2020, January 16). Customer-Owned Bank Informs 100k of Breach Exposing Account Balance, PII. Retrieved July 1, 2024.

Internal MISP references

UUID 027b281d-79d5-50aa-9ff3-d6f4e647d477 which can be used as unique global reference for Bleeping Computer Bank Hack 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-01T00:00:00Z
date_published 2020-01-16T00:00:00Z
source MITRE
title Customer-Owned Bank Informs 100k of Breach Exposing Account Balance, PII

Login Scripts Apple Dev

Apple. (2016, September 13). Customizing Login and Logout. Retrieved April 1, 2022.

Internal MISP references

UUID 9c0094b6-a8e3-4f4d-8d2e-33b408d44a06 which can be used as unique global reference for Login Scripts Apple Dev in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-01T00:00:00Z
date_published 2016-09-13T00:00:00Z
source MITRE
title Customizing Login and Logout

TechNet Screensaver GP

Microsoft. (n.d.). Customizing the Desktop. Retrieved December 5, 2017.

Internal MISP references

UUID 7cf8056e-6d3b-4930-9d2c-160d7d9636ac which can be used as unique global reference for TechNet Screensaver GP in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-05T00:00:00Z
source MITRE
title Customizing the Desktop

CustomShellHost.exe - LOLBAS Project

LOLBAS. (2021, November 14). CustomShellHost.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 96324ab1-7eb8-42dc-b19a-fa1d9f85e239 which can be used as unique global reference for CustomShellHost.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-11-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title CustomShellHost.exe

Mandiant Cutting Edge Part 2 January 2024

Lin, M. et al. (2024, January 31). Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation. Retrieved February 27, 2024.

Internal MISP references

UUID 5209d259-4293-58c0-bbdc-f30ff77d57f7 which can be used as unique global reference for Mandiant Cutting Edge Part 2 January 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-27T00:00:00Z
date_published 2024-01-31T00:00:00Z
source MITRE
title Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation

Mandiant Cutting Edge Part 3 February 2024

Lin, M. et al. (2024, February 27). Cutting Edge, Part 3: Investigating Ivanti Connect Secure VPN Exploitation and Persistence Attempts. Retrieved March 1, 2024.

Internal MISP references

UUID 49e5b125-5503-5cb0-9a56-a93f82b55753 which can be used as unique global reference for Mandiant Cutting Edge Part 3 February 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-01T00:00:00Z
date_published 2024-02-27T00:00:00Z
source MITRE
title Cutting Edge, Part 3: Investigating Ivanti Connect Secure VPN Exploitation and Persistence Attempts

Mandiant Cutting Edge January 2024

McLellan, T. et al. (2024, January 12). Cutting Edge: Suspected APT Targets Ivanti Connect Secure VPN in New Zero-Day Exploitation. Retrieved February 27, 2024.

Internal MISP references

UUID 9d9ec923-89c1-5155-ae6e-98d4776d4250 which can be used as unique global reference for Mandiant Cutting Edge January 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-27T00:00:00Z
date_published 2024-01-12T00:00:00Z
source MITRE
title Cutting Edge: Suspected APT Targets Ivanti Connect Secure VPN in New Zero-Day Exploitation

Symantec Naid in the Wild June 2012

Symantec Security Response. (2012, June 18). CVE-2012-1875 Exploited in the Wild - Part 1 (Trojan.Naid). Retrieved February 22, 2018.

Internal MISP references

UUID e1531171-709c-4043-9e3a-af9e37f3ac57 which can be used as unique global reference for Symantec Naid in the Wild June 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-22T00:00:00Z
date_published 2012-06-18T00:00:00Z
source MITRE
title CVE-2012-1875 Exploited in the Wild - Part 1 (Trojan.Naid)

NVD CVE-2014-7169

National Vulnerability Database. (2017, September 24). CVE-2014-7169 Detail. Retrieved April 3, 2018.

Internal MISP references

UUID c3aab918-51c6-4773-8677-a89b27a00eb1 which can be used as unique global reference for NVD CVE-2014-7169 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-03T00:00:00Z
date_published 2017-09-24T00:00:00Z
source MITRE
title CVE-2014-7169 Detail

NVD CVE-2016-6662

National Vulnerability Database. (2017, February 2). CVE-2016-6662 Detail. Retrieved April 3, 2018.

Internal MISP references

UUID 1813c26d-da68-4a82-a959-27351dd5e51b which can be used as unique global reference for NVD CVE-2016-6662 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-03T00:00:00Z
date_published 2017-02-02T00:00:00Z
source MITRE
title CVE-2016-6662 Detail

NVD CVE-2017-0176

National Vulnerability Database. (2017, June 22). CVE-2017-0176 Detail. Retrieved April 3, 2018.

Internal MISP references

UUID 82602351-0ab0-48d7-90dd-f4536b4d009b which can be used as unique global reference for NVD CVE-2017-0176 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-03T00:00:00Z
date_published 2017-06-22T00:00:00Z
source MITRE
title CVE-2017-0176 Detail

FireEye Attacks Leveraging HTA

Berry, A., Galang, L., Jiang, G., Leathery, J., Mohandas, R. (2017, April 11). CVE-2017-0199: In the Wild Attacks Leveraging HTA Handler. Retrieved October 27, 2017.

Internal MISP references

UUID 1876a476-b2ff-4605-a78b-89443d21b063 which can be used as unique global reference for FireEye Attacks Leveraging HTA in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-10-27T00:00:00Z
date_published 2017-04-11T00:00:00Z
source MITRE
title CVE-2017-0199: In the Wild Attacks Leveraging HTA Handler

Microsoft CVE-2017-8625 Aug 2017

Microsoft. (2017, August 8). CVE-2017-8625 - Internet Explorer Security Feature Bypass Vulnerability. Retrieved October 3, 2018.

Internal MISP references

UUID 402cb526-ef57-4d27-b96b-f98008abe716 which can be used as unique global reference for Microsoft CVE-2017-8625 Aug 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-10-03T00:00:00Z
date_published 2017-08-08T00:00:00Z
source MITRE
title CVE-2017-8625 - Internet Explorer Security Feature Bypass Vulnerability

NVD CVE-2019-3610

National Vulnerability Database. (2019, October 9). CVE-2019-3610 Detail. Retrieved April 14, 2021.

Internal MISP references

UUID 889b742e-7572-4aad-8944-7f071483b613 which can be used as unique global reference for NVD CVE-2019-3610 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-14T00:00:00Z
date_published 2019-10-09T00:00:00Z
source MITRE
title CVE-2019-3610 Detail

CVMServer Vuln

Mickey Jin. (2021, June 3). CVE-2021-30724: CVMServer Vulnerability in macOS and iOS. Retrieved October 12, 2021.

Internal MISP references

UUID 6f83da0c-d2ce-4923-ba32-c6886eb22587 which can be used as unique global reference for CVMServer Vuln in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-12T00:00:00Z
date_published 2021-06-03T00:00:00Z
source MITRE
title CVE-2021-30724: CVMServer Vulnerability in macOS and iOS

Crowdstrike Kubernetes Container Escape

Manoj Ahuje. (2022, January 31). CVE-2022-0185: Kubernetes Container Escape Using Linux Kernel Exploit. Retrieved July 6, 2022.

Internal MISP references

UUID 84d5f015-9014-417c-b2a9-f650fe19d448 which can be used as unique global reference for Crowdstrike Kubernetes Container Escape in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-06T00:00:00Z
date_published 2022-01-31T00:00:00Z
source MITRE
title CVE-2022-0185: Kubernetes Container Escape Using Linux Kernel Exploit

Trend Micro March 13 2024

Peter Girnus; Aliakbar Zahravi; Simon Zuckerbraun Read time. (2024, March 13). CVE-2024-21412 DarkGate Operators Exploit Microsoft Windows SmartScreen Bypass in Zero-Day Campaign. Retrieved March 14, 2024.

Internal MISP references

UUID 0574a0a7-694b-4858-b053-8f7911c8ce54 which can be used as unique global reference for Trend Micro March 13 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-14T00:00:00Z
date_published 2024-03-13T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title CVE-2024-21412 DarkGate Operators Exploit Microsoft Windows SmartScreen Bypass in Zero-Day Campaign

CyberArk Labs Safe Mode 2016

Naim, D.. (2016, September 15). CyberArk Labs: From Safe Mode to Domain Compromise. Retrieved June 23, 2021.

Internal MISP references

UUID bd9c14dd-0e2a-447b-a245-f548734d2400 which can be used as unique global reference for CyberArk Labs Safe Mode 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-23T00:00:00Z
date_published 2016-09-15T00:00:00Z
source MITRE
title CyberArk Labs: From Safe Mode to Domain Compromise

PJ Cyber Army of Russia 2023

PJ04857920. (2023, November 30). Cyber Army of Russia — DDoS Tool. Retrieved April 30, 2024.

Internal MISP references

UUID 3e42ff96-fc7e-418e-8d8b-076a1a47981e which can be used as unique global reference for PJ Cyber Army of Russia 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-30T00:00:00Z
date_published 2023-11-30T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Cyber Army of Russia — DDoS Tool

Cyware Ngrok May 2019

Cyware. (2019, May 29). Cyber attackers leverage tunneling service to drop Lokibot onto victims’ systems. Retrieved September 15, 2020.

Internal MISP references

UUID 583a01b6-cb4e-41e7-aade-ac2fd19bda4e which can be used as unique global reference for Cyware Ngrok May 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-15T00:00:00Z
date_published 2019-05-29T00:00:00Z
source MITRE
title Cyber attackers leverage tunneling service to drop Lokibot onto victims’ systems

The Record RansomHub June 3 2024

Jonathan Greig. (2024, June 3). Cyberattack on telecom giant Frontier claimed by RansomHub. Retrieved June 7, 2024.

Internal MISP references

UUID 1e474240-bd12-4472-8e69-1631b0e4c102 which can be used as unique global reference for The Record RansomHub June 3 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-07T00:00:00Z
date_published 2024-06-03T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Cyberattack on telecom giant Frontier claimed by RansomHub

Microsoft Phosphorus Oct 2020

Burt, T. (2020, October 28). Cyberattacks target international conference attendees. Retrieved March 8, 2021.

Internal MISP references

UUID 8986c21c-16a0-4a53-8e37-9935bbbfaa4b which can be used as unique global reference for Microsoft Phosphorus Oct 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-08T00:00:00Z
date_published 2020-10-28T00:00:00Z
source MITRE
title Cyberattacks target international conference attendees

Check Point Mid-Year Report 2022

Check Point Software. (2022, August 3). Cyber Attack Trends: Check Point's 2022 Mid-Year Report. Retrieved May 18, 2022.

Internal MISP references

UUID e929cd86-9903-481c-a841-ba387831cb77 which can be used as unique global reference for Check Point Mid-Year Report 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-18T00:00:00Z
date_published 2022-08-03T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Cyber Attack Trends: Check Point's 2022 Mid-Year Report

Talos Seduploader Oct 2017

Mercer, W., et al. (2017, October 22). "Cyber Conflict" Decoy Document Used in Real Cyber Conflict. Retrieved November 2, 2018.

Internal MISP references

UUID 2db77619-72df-461f-84bf-2d1c3499a5c0 which can be used as unique global reference for Talos Seduploader Oct 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-02T00:00:00Z
date_published 2017-10-22T00:00:00Z
source MITRE
title "Cyber Conflict" Decoy Document Used in Real Cyber Conflict

FBI. (2022, December 21). Cyber Criminals Impersonating Brands Using Search Engine Advertisement Services to Defraud Users. Retrieved February 21, 2023.

Internal MISP references

UUID deea5b42-bfab-50af-8d85-cc04fd317a82 which can be used as unique global reference for FBI-search in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-21T00:00:00Z
date_published 2022-12-21T00:00:00Z
source MITRE
title Cyber Criminals Impersonating Brands Using Search Engine Advertisement Services to Defraud Users

Resecurity GXC Team January 3 2024

Resecurity. (2024, January 3). Cybercriminals Implemented Artificial Intelligence (AI) for Invoice Fraud. Retrieved September 9, 2024.

Internal MISP references

UUID 6d55aa2c-3f52-4bff-8003-f78b386a4952 which can be used as unique global reference for Resecurity GXC Team January 3 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-09T00:00:00Z
date_published 2024-01-03T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Cybercriminals Implemented Artificial Intelligence (AI) for Invoice Fraud

Secureworks GOLD KINGSWOOD September 2018

CTU. (2018, September 27). Cybercriminals Increasingly Trying to Ensnare the Big Financial Fish. Retrieved September 20, 2021.

Internal MISP references

UUID cda529b2-e152-4ff0-a6b3-d0305b09fef9 which can be used as unique global reference for Secureworks GOLD KINGSWOOD September 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-20T00:00:00Z
date_published 2018-09-27T00:00:00Z
source MITRE
title Cybercriminals Increasingly Trying to Ensnare the Big Financial Fish

Cybereason OSX Pirrit

Amit Serper. (2016). Cybereason Lab Analysis OSX.Pirrit. Retrieved December 10, 2021.

Internal MISP references

UUID ebdf09ed-6eec-450f-aaea-067504ec25ca which can be used as unique global reference for Cybereason OSX Pirrit in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-12-10T00:00:00Z
date_published 2016-01-01T00:00:00Z
source MITRE
title Cybereason Lab Analysis OSX.Pirrit

Cybereason Quantum Ransomware May 9 2022

Cybereason Nocturnus. (2022, May 9). Cybereason vs. Quantum Locker Ransomware. Retrieved June 28, 2024.

Internal MISP references

UUID 19027620-216a-4921-8d78-f56377778a12 which can be used as unique global reference for Cybereason Quantum Ransomware May 9 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-28T00:00:00Z
date_published 2022-05-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Cybereason vs. Quantum Locker Ransomware

Zdnet Kimsuky Dec 2018

Cimpanu, C.. (2018, December 5). Cyber-espionage group uses Chrome extension to infect victims. Retrieved August 26, 2019.

Internal MISP references

UUID b17acdc3-0163-4c98-b5fb-a457a7e6b58d which can be used as unique global reference for Zdnet Kimsuky Dec 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-08-26T00:00:00Z
date_published 2018-12-05T00:00:00Z
source MITRE
title Cyber-espionage group uses Chrome extension to infect victims

FireEye APT32 May 2017

Carr, N.. (2017, May 14). Cyber Espionage is Alive and Well: APT32 and the Threat to Global Corporations. Retrieved June 18, 2017.

Internal MISP references

UUID b72d017b-a70f-4003-b3d9-90d79aca812d which can be used as unique global reference for FireEye APT32 May 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-06-18T00:00:00Z
date_published 2017-05-14T00:00:00Z
source MITRE, Tidal Cyber
title Cyber Espionage is Alive and Well: APT32 and the Threat to Global Corporations

Shadowserver Strategic Web Compromise

Adair, S., Moran, N. (2012, May 15). Cyber Espionage & Strategic Web Compromises – Trusted Websites Serving Dangerous Results. Retrieved March 13, 2018.

Internal MISP references

UUID cf531866-ac3c-4078-b847-5b4af7eb161f which can be used as unique global reference for Shadowserver Strategic Web Compromise in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-13T00:00:00Z
date_published 2012-05-15T00:00:00Z
source MITRE
title Cyber Espionage & Strategic Web Compromises – Trusted Websites Serving Dangerous Results

CyberKnow Tweet July 7 2022

Cyberknow20. (2022, July 7). CyberKnow Tweet July 7 2022. Retrieved October 10, 2023.

Internal MISP references

UUID a37564a4-ff83-4ce0-818e-80750172f302 which can be used as unique global reference for CyberKnow Tweet July 7 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-10T00:00:00Z
date_published 2022-07-07T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title CyberKnow Tweet July 7 2022

Cyber Safety Review Board: Lapsus

CISA. (2023, August). Cyber Safety Review Board: Lapsus. Retrieved January 5, 2024.

Internal MISP references

UUID 4b713738-d767-5243-b9af-4d7ac7b0b349 which can be used as unique global reference for Cyber Safety Review Board: Lapsus in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-05T00:00:00Z
date_published 2023-08-01T00:00:00Z
source MITRE
title Cyber Safety Review Board: Lapsus

CISA Scattered Spider Advisory November 2023

CISA. (2023, November 16). Cybersecurity Advisory: Scattered Spider (AA23-320A). Retrieved March 18, 2024.

Internal MISP references

UUID deae8b2c-39dd-5252-b846-88e1cab099c2 which can be used as unique global reference for CISA Scattered Spider Advisory November 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-18T00:00:00Z
date_published 2023-11-16T00:00:00Z
source MITRE
title Cybersecurity Advisory: Scattered Spider (AA23-320A)

NSA NCSC Turla OilRig

NSA/NCSC. (2019, October 21). Cybersecurity Advisory: Turla Group Exploits Iranian APT To Expand Coverage Of Victims. Retrieved October 16, 2020.

Internal MISP references

UUID 3e86a807-5188-4278-9a58-babd23b86410 which can be used as unique global reference for NSA NCSC Turla OilRig in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-16T00:00:00Z
date_published 2019-10-21T00:00:00Z
source MITRE
title Cybersecurity Advisory: Turla Group Exploits Iranian APT To Expand Coverage Of Victims

OPM Leak

Cybersecurity Resource Center. (n.d.). CYBERSECURITY INCIDENTS. Retrieved September 16, 2024.

Internal MISP references

UUID b67ed4e9-ed44-460a-bd59-c978bdfda32f which can be used as unique global reference for OPM Leak in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-16T00:00:00Z
source MITRE
title CYBERSECURITY INCIDENTS

ExpressVPN PATH env Windows 2021

ExpressVPN Security Team. (2021, November 16). Cybersecurity lessons: A PATH vulnerability in Windows. Retrieved September 28, 2023.

Internal MISP references

UUID 26096485-1dd6-512a-a2a1-27dbbfb6fde0 which can be used as unique global reference for ExpressVPN PATH env Windows 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-28T00:00:00Z
date_published 2021-11-16T00:00:00Z
source MITRE
title Cybersecurity lessons: A PATH vulnerability in Windows

SCILabs Malteiro 2021

SCILabs. (2021, December 23). Cyber Threat Profile Malteiro. Retrieved March 13, 2024.

Internal MISP references

UUID c6948dfc-b133-556b-a8ac-b3a4dba09c0e which can be used as unique global reference for SCILabs Malteiro 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-13T00:00:00Z
date_published 2021-12-23T00:00:00Z
source MITRE
title Cyber Threat Profile Malteiro

Cyber Threat Profile MALTEIRO – Sciblog

blog.scilabs.mx. (2021, December 23). Cyber Threat Profile MALTEIRO – Sciblog. Retrieved May 17, 2023.

Internal MISP references

UUID 1f46872c-6255-4ce0-a6c3-2bfa9e767765 which can be used as unique global reference for Cyber Threat Profile MALTEIRO – Sciblog in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-17T00:00:00Z
date_published 2021-12-23T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Cyber Threat Profile MALTEIRO – Sciblog

DoublePulsar Cyber Toufan

Kevin Beaumont. (2023, December 28). Cyber Toufan goes Oprah mode with free Linux system wipes of over 100 organisations. Retrieved August 8, 2024.

Internal MISP references

UUID 2fc1f6de-e01c-4225-bd29-8d547bf91e9e which can be used as unique global reference for DoublePulsar Cyber Toufan in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-08T00:00:00Z
date_published 2023-12-28T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Cyber Toufan goes Oprah mode with free Linux system wipes of over 100 organisations

NCSC. (2022, February 23). Cyclops Blink Malware Analysis Report. Retrieved March 3, 2022.

Internal MISP references

UUID 91ed6adf-f066-49e4-8ec7-1989bc6615a6 which can be used as unique global reference for NCSC Cyclops Blink February 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-03T00:00:00Z
date_published 2022-02-23T00:00:00Z
source MITRE
title Cyclops Blink Malware Analysis Report

Haquebord, F. et al. (2022, March 17). Cyclops Blink Sets Sights on Asus Routers. Retrieved March 17, 2022.

Internal MISP references

UUID 64e9a24f-f386-4774-9874-063e0ebfb8e1 which can be used as unique global reference for Trend Micro Cyclops Blink March 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-17T00:00:00Z
date_published 2022-03-17T00:00:00Z
source MITRE
title Cyclops Blink Sets Sights on Asus Routers

Cynet Ragnar Apr 2020

Gold, B. (2020, April 27). Cynet Detection Report: Ragnar Locker Ransomware. Retrieved June 29, 2020.

Internal MISP references

UUID aeb637ea-0b83-42a0-8f68-9fdc59aa462a which can be used as unique global reference for Cynet Ragnar Apr 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-29T00:00:00Z
date_published 2020-04-27T00:00:00Z
source MITRE
title Cynet Detection Report: Ragnar Locker Ransomware

Microsoft DACL May 2018

Microsoft. (2018, May 30). DACLs and ACEs. Retrieved August 19, 2018.

Internal MISP references

UUID 32a250ca-a7eb-4d7f-af38-f3e6a09540e2 which can be used as unique global reference for Microsoft DACL May 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-19T00:00:00Z
date_published 2018-05-30T00:00:00Z
source MITRE
title DACLs and ACEs

Apple Developer Doco Archive Launchd

Apple. (2016, September 13). Daemons and Services Programming Guide - Creating Launch Daemons and Agents. Retrieved February 24, 2021.

Internal MISP references

UUID 41311827-3d81-422a-9b07-ee8ddc2fc7f1 which can be used as unique global reference for Apple Developer Doco Archive Launchd in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-24T00:00:00Z
date_published 2016-09-13T00:00:00Z
source MITRE
title Daemons and Services Programming Guide - Creating Launch Daemons and Agents

Kubernetes DaemonSet

Kubernetes. (n.d.). DaemonSet. Retrieved February 15, 2024.

Internal MISP references

UUID 4e4668bd-9bef-597e-ad41-8afe1974b7f6 which can be used as unique global reference for Kubernetes DaemonSet in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-15T00:00:00Z
source MITRE
title DaemonSet

Symantec Daggerfly 2023

Threat Hunter Team. (2023, April 20). Daggerfly: APT Actor Targets Telecoms Company in Africa. Retrieved July 25, 2024.

Internal MISP references

UUID cb0a51f5-fe5b-5dd0-8f55-4e7536cb61a4 which can be used as unique global reference for Symantec Daggerfly 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-25T00:00:00Z
date_published 2023-04-20T00:00:00Z
source MITRE
title Daggerfly: APT Actor Targets Telecoms Company in Africa

Symantec Daggerfly 2024

Threat Hunter Team. (2024, July 23). Daggerfly: Espionage Group Makes Major Update to Toolset. Retrieved July 25, 2024.

Internal MISP references

UUID 1dadd09e-e7b0-50a1-ba3d-413780dbeb80 which can be used as unique global reference for Symantec Daggerfly 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-25T00:00:00Z
date_published 2024-07-23T00:00:00Z
source MITRE
title Daggerfly: Espionage Group Makes Major Update to Toolset

Picus Daixin Team October 24 2022

Huseyin Can Yuceel. (2022, October 24). Daixin Team Targets Healthcare Organizations with Ransomware Attacks. Retrieved December 1, 2023.

Internal MISP references

UUID eba3b1b9-d0a0-4c03-8c14-21f7bbcc8a02 which can be used as unique global reference for Picus Daixin Team October 24 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-01T00:00:00Z
date_published 2022-10-24T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Daixin Team Targets Healthcare Organizations with Ransomware Attacks

Medium Eli Salem GuLoader April 2021

Salem, E. (2021, April 19). Dancing With Shellcodes: Cracking the latest version of Guloader. Retrieved July 7, 2021.

Internal MISP references

UUID 87c5e84a-b96d-489d-aa10-db95b78c5a93 which can be used as unique global reference for Medium Eli Salem GuLoader April 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-07-07T00:00:00Z
date_published 2021-04-19T00:00:00Z
source MITRE
title Dancing With Shellcodes: Cracking the latest version of Guloader

Lookout Dark Caracal Jan 2018

Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018.

Internal MISP references

UUID c558f5db-a426-4041-b883-995ec56e7155 which can be used as unique global reference for Lookout Dark Caracal Jan 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-11T00:00:00Z
date_published 2018-01-18T00:00:00Z
source MITRE, Tidal Cyber
title Dark Caracal: Cyber-espionage at a Global Scale

Dark Clouds_Usenix_Mulazzani_08_2011

Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, and Edgar Weippl. (2011, August). Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space. Retrieved July 14, 2022.

Internal MISP references

UUID ee5d2c9c-c704-4f35-baeb-055a35dd04b5 which can be used as unique global reference for Dark Clouds_Usenix_Mulazzani_08_2011 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-14T00:00:00Z
date_published 2011-08-01T00:00:00Z
source MITRE
title Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space

TrendMicro DarkComet Sept 2014

TrendMicro. (2014, September 03). DARKCOMET. Retrieved November 6, 2018.

Internal MISP references

UUID fb365600-4961-43ed-8292-1c07cbc530ef which can be used as unique global reference for TrendMicro DarkComet Sept 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-06T00:00:00Z
date_published 2014-09-03T00:00:00Z
source MITRE
title DARKCOMET

DarkGate Loader delivered via Teams - Truesec

Jakob Nordenlund. (2023, September 6). DarkGate Loader delivered via Teams - Truesec. Retrieved October 20, 2023.

Internal MISP references

UUID 4222a06f-9528-4076-8037-a27012c2930c which can be used as unique global reference for DarkGate Loader delivered via Teams - Truesec in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-20T00:00:00Z
date_published 2023-09-06T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title DarkGate Loader delivered via Teams - Truesec

Bleeping Computer DarkGate October 14 2023

Sergiu Gatlan. (2023, October 14). DarkGate malware spreads through compromised Skype accounts. Retrieved October 20, 2023.

Internal MISP references

UUID 313e5558-d8f9-4457-9004-810d9fa5340c which can be used as unique global reference for Bleeping Computer DarkGate October 14 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-20T00:00:00Z
date_published 2023-10-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title DarkGate malware spreads through compromised Skype accounts

Trend Micro DarkGate October 12 2023

Trent Bessell, Ryan Maglaque, Aira Marcelo, Jack Walsh, David Walsh. (2023, October 12). DarkGate Opens Organizations for Attack via Skype, Teams. Retrieved October 20, 2023.

Internal MISP references

UUID 81650f5b-628b-4e76-80d6-2c15cf70d37a which can be used as unique global reference for Trend Micro DarkGate October 12 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-20T00:00:00Z
date_published 2023-10-12T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title DarkGate Opens Organizations for Attack via Skype, Teams

DarkGate - Threat Breakdown Journey

0xToxin. (n.d.). DarkGate - Threat Breakdown Journey. Retrieved October 20, 2023.

Internal MISP references

UUID 8a1ac4b8-05f6-4be9-a866-e3026bc92c7f which can be used as unique global reference for DarkGate - Threat Breakdown Journey in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title DarkGate - Threat Breakdown Journey

Kaspersky Tomiris Sep 2021

Kwiatkoswki, I. and Delcher, P. (2021, September 29). DarkHalo After SolarWinds: the Tomiris connection. Retrieved December 27, 2021.

Internal MISP references

UUID a881a7e4-a1df-4ad2-b67f-ef03caddb721 which can be used as unique global reference for Kaspersky Tomiris Sep 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-12-27T00:00:00Z
date_published 2021-09-29T00:00:00Z
source MITRE
title DarkHalo After SolarWinds: the Tomiris connection

Volexity SolarWinds

Cash, D. et al. (2020, December 14). Dark Halo Leverages SolarWinds Compromise to Breach Organizations. Retrieved December 29, 2020.

Internal MISP references

UUID 355cecf8-ef3e-4a6e-a652-3bf26fe46d88 which can be used as unique global reference for Volexity SolarWinds in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-29T00:00:00Z
date_published 2020-12-14T00:00:00Z
source MITRE
title Dark Halo Leverages SolarWinds Compromise to Breach Organizations

Securelist Darkhotel Aug 2015

Kaspersky Lab's Global Research & Analysis Team. (2015, August 10). Darkhotel's attacks in 2015. Retrieved November 2, 2018.

Internal MISP references

UUID 5a45be49-f5f1-4d5b-b7da-0a2f38194ec1 which can be used as unique global reference for Securelist Darkhotel Aug 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-02T00:00:00Z
date_published 2015-08-10T00:00:00Z
source MITRE, Tidal Cyber
title Darkhotel's attacks in 2015

Unit42 DarkHydrus Jan 2019

Lee, B., Falcone, R. (2019, January 18). DarkHydrus delivers new Trojan that can use Google Drive for C2 communications. Retrieved April 17, 2019.

Internal MISP references

UUID eb235504-d142-4c6d-9ffd-3c0b0dd23e80 which can be used as unique global reference for Unit42 DarkHydrus Jan 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-17T00:00:00Z
date_published 2019-01-18T00:00:00Z
source MITRE
title DarkHydrus delivers new Trojan that can use Google Drive for C2 communications

Unit 42 Phishery Aug 2018

Falcone, R. (2018, August 07). DarkHydrus Uses Phishery to Harvest Credentials in the Middle East. Retrieved August 10, 2018.

Internal MISP references

UUID ab9d59c1-8ea5-4f9c-b733-b16223ffe84a which can be used as unique global reference for Unit 42 Phishery Aug 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-10T00:00:00Z
date_published 2018-08-07T00:00:00Z
source MITRE
title DarkHydrus Uses Phishery to Harvest Credentials in the Middle East

Darkside Ransomware Cybereason

Cybereason Nocturnus. (2021, April 1). Cybereason vs. Darkside Ransomware. Retrieved August 18, 2021.

Internal MISP references

UUID eded380e-33e9-4fdc-8e1f-b51d650b9731 which can be used as unique global reference for Darkside Ransomware Cybereason in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-18T00:00:00Z
source MITRE
title Darkside Ransomware

DarkSide Ransomware Gang

Ramarcus Baylor. (2021, May 12). DarkSide Ransomware Gang: An Overview. Retrieved August 30, 2022.

Internal MISP references

UUID 5f8d49e8-22da-425f-b63b-a799b97ec2b5 which can be used as unique global reference for DarkSide Ransomware Gang in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-30T00:00:00Z
date_published 2021-05-12T00:00:00Z
source MITRE
title DarkSide Ransomware Gang: An Overview

Secureworks DarkTortilla Aug 2022

Secureworks Counter Threat Unit Research Team. (2022, August 17). DarkTortilla Malware Analysis. Retrieved November 3, 2022.

Internal MISP references

UUID 4b48cc22-55ac-5b61-b183-9008f7db37fd which can be used as unique global reference for Secureworks DarkTortilla Aug 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-11-03T00:00:00Z
date_published 2022-08-17T00:00:00Z
source MITRE
title DarkTortilla Malware Analysis

Securelist DarkVishnya Dec 2018

Golovanov, S. (2018, December 6). DarkVishnya: Banks attacked through direct connection to local network. Retrieved May 15, 2020.

Internal MISP references

UUID da9ac5a7-c644-45fa-ab96-30ac6bfc9f81 which can be used as unique global reference for Securelist DarkVishnya Dec 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-15T00:00:00Z
date_published 2018-12-06T00:00:00Z
source MITRE, Tidal Cyber
title DarkVishnya: Banks attacked through direct connection to local network

Prevailion DarkWatchman 2021

Smith, S., Stafford, M. (2021, December 14). DarkWatchman: A new evolution in fileless techniques. Retrieved January 10, 2022.

Internal MISP references

UUID 449e7b5c-7c62-4a63-a676-80026a597fc9 which can be used as unique global reference for Prevailion DarkWatchman 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-10T00:00:00Z
date_published 2021-12-14T00:00:00Z
source MITRE
title DarkWatchman: A new evolution in fileless techniques

SOCRadar APT42 December 12 2022

SOCRadar Research. (2022, December 12). Dark Web Profile: APT42 – Iranian Cyber Espionage Group. Retrieved August 30, 2024.

Internal MISP references

UUID 6077faed-b162-4850-969a-2abedc842198 which can be used as unique global reference for SOCRadar APT42 December 12 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-30T00:00:00Z
date_published 2022-12-12T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Dark Web Profile: APT42 – Iranian Cyber Espionage Group

SOCRadar Cyber Toufan Profile

SOCRadar. (2023, December 20). Dark Web Profile: Cyber Toufan Al-aqsa. Retrieved August 8, 2024.

Internal MISP references

UUID a9aa6361-8c4d-4456-bb3f-c64ca5260695 which can be used as unique global reference for SOCRadar Cyber Toufan Profile in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-08T00:00:00Z
date_published 2023-12-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Dark Web Profile: Cyber Toufan Al-aqsa

SOCRadar INC Ransom January 2024

SOCRadar. (2024, January 24). Dark Web Profile: INC Ransom. Retrieved June 5, 2024.

Internal MISP references

UUID 6c78b422-7d46-58a4-a403-421db0531147 which can be used as unique global reference for SOCRadar INC Ransom January 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-05T00:00:00Z
date_published 2024-01-24T00:00:00Z
source MITRE
title Dark Web Profile: INC Ransom

Moran 2014

Moran, N., Oppenheim, M., Engle, S., & Wartell, R.. (2014, September 3). Darwin’s Favorite APT Group [Blog]. Retrieved November 12, 2014.

Internal MISP references

UUID 15ef155b-7628-4b18-bc53-1d30be4eac5d which can be used as unique global reference for Moran 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-12T00:00:00Z
date_published 2014-09-03T00:00:00Z
source MITRE, Tidal Cyber
title Darwin’s Favorite APT Group [Blog]

AWS Data Perimeters

AWS. (n.d.). Data perimeters on AWS. Retrieved October 16, 2024.

Internal MISP references

UUID de628ad0-9608-5af0-8c93-21a1d5cd4998 which can be used as unique global reference for AWS Data Perimeters in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-16T00:00:00Z
source MITRE
title Data perimeters on AWS

DataSvcUtil.exe - LOLBAS Project

LOLBAS. (2020, December 1). DataSvcUtil.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 0c373780-3202-4036-8c83-f3d468155b35 which can be used as unique global reference for DataSvcUtil.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2020-12-01T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title DataSvcUtil.exe

Operation Emmental

botconf eu. (2014, December 31). David Sancho - Finding Holes in Banking 2FA: Operation Emmental. Retrieved January 4, 2024.

Internal MISP references

UUID 36443369-4fa9-4802-8b21-68cc382b949f which can be used as unique global reference for Operation Emmental in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-04T00:00:00Z
date_published 2014-12-31T00:00:00Z
source MITRE
title David Sancho - Finding Holes in Banking 2FA: Operation Emmental

Hijacking VNC

Z3RO. (2019, March 10). Day 70: Hijacking VNC (Enum, Brute, Access and Crack). Retrieved September 20, 2021.

Internal MISP references

UUID 7a58938f-058b-4c84-aa95-9c37dcdda1fb which can be used as unique global reference for Hijacking VNC in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-20T00:00:00Z
date_published 2019-03-10T00:00:00Z
source MITRE
title Day 70: Hijacking VNC (Enum, Brute, Access and Crack)

DBatLoader Actively Distributing Malwares Targeting European Businesses

Zscaler. (2023, March 27). DBatLoader Actively Distributing Malwares Targeting European Businesses. Retrieved May 7, 2023.

Internal MISP references

UUID 42ee2e91-4dac-41ce-b2ec-fde21c258a28 which can be used as unique global reference for DBatLoader Actively Distributing Malwares Targeting European Businesses in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2023-03-27T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title DBatLoader Actively Distributing Malwares Targeting European Businesses

Microsoft COM ACL

Microsoft. (n.d.). DCOM Security Enhancements in Windows XP Service Pack 2 and Windows Server 2003 Service Pack 1. Retrieved November 22, 2017.

Internal MISP references

UUID 88769217-57f1-46d4-977c-2cb2969db437 which can be used as unique global reference for Microsoft COM ACL in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-22T00:00:00Z
source MITRE
title DCOM Security Enhancements in Windows XP Service Pack 2 and Windows Server 2003 Service Pack 1

DCShadow Blog

Delpy, B. & LE TOUX, V. (n.d.). DCShadow. Retrieved March 20, 2018.

Internal MISP references

UUID 37514816-b8b3-499f-842b-2d8cce9e140b which can be used as unique global reference for DCShadow Blog in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-20T00:00:00Z
source MITRE
title DCShadow

GitHub DCSYNCMonitor

Spencer S. (2018, February 22). DCSYNCMonitor. Retrieved March 30, 2018.

Internal MISP references

UUID be03c794-d9f3-4678-8198-257abf6dcdbd which can be used as unique global reference for GitHub DCSYNCMonitor in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-30T00:00:00Z
date_published 2018-02-22T00:00:00Z
source MITRE
title DCSYNCMonitor

DD Man

Kerrisk, M. (2020, February 2). DD(1) User Commands. Retrieved February 21, 2020.

Internal MISP references

UUID f64bee0d-e37d-45d5-9968-58e622e89bfe which can be used as unique global reference for DD Man in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-21T00:00:00Z
date_published 2020-02-02T00:00:00Z
source MITRE
title DD(1) User Commands

Arbor SSLDoS April 2012

ASERT Team, Netscout Arbor. (2012, April 24). DDoS Attacks on SSL: Something Old, Something New. Retrieved April 22, 2019.

Internal MISP references

UUID b5de4376-0deb-45de-83a0-09df98480464 which can be used as unique global reference for Arbor SSLDoS April 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-22T00:00:00Z
date_published 2012-04-24T00:00:00Z
source MITRE
title DDoS Attacks on SSL: Something Old, Something New

CERT-EU DDoS March 2017

Meintanis, S., Revuelto, V., Socha, K.. (2017, March 10). DDoS Overview and Response Guide. Retrieved April 24, 2019.

Internal MISP references

UUID 64341348-f448-4e56-bf78-442b92e6d435 which can be used as unique global reference for CERT-EU DDoS March 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-24T00:00:00Z
date_published 2017-03-10T00:00:00Z
source MITRE
title DDoS Overview and Response Guide

Unit42 Sofacy Dec 2018

Lee, B., Falcone, R. (2018, December 12). Dear Joohn: The Sofacy Group’s Global Campaign. Retrieved April 19, 2019.

Internal MISP references

UUID 540c4c33-d4c2-4324-94cd-f57646666e32 which can be used as unique global reference for Unit42 Sofacy Dec 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-19T00:00:00Z
date_published 2018-12-12T00:00:00Z
source MITRE
title Dear Joohn: The Sofacy Group’s Global Campaign

Death by 1000 installers; it's all broken!

Patrick Wardle. (2017). Death by 1000 installers; it's all broken!. Retrieved August 8, 2019.

Internal MISP references

UUID 2ae99e9b-cd00-4e60-ba9e-bcc50e709e88 which can be used as unique global reference for Death by 1000 installers; it's all broken! in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-08-08T00:00:00Z
date_published 2017-01-01T00:00:00Z
source MITRE
title Death by 1000 installers; it's all broken!

SpecterOps Lateral Movement from Azure to On-Prem AD 2020

Andy Robbins. (2020, August 17). Death from Above: Lateral Movement from Azure to On-Prem AD. Retrieved March 13, 2023.

Internal MISP references

UUID eb97d3d6-21cb-5f27-9a78-1e8576acecdc which can be used as unique global reference for SpecterOps Lateral Movement from Azure to On-Prem AD 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-13T00:00:00Z
date_published 2020-08-17T00:00:00Z
source MITRE
title Death from Above: Lateral Movement from Azure to On-Prem AD

Microsoft PowerShell SilentlyContinue

Microsoft. (2023, March 2). $DebugPreference. Retrieved August 30, 2023.

Internal MISP references

UUID ece52a64-1c8d-547d-aedc-ff43d7418cd2 which can be used as unique global reference for Microsoft PowerShell SilentlyContinue in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-30T00:00:00Z
date_published 2023-03-02T00:00:00Z
source MITRE
title $DebugPreference

virtualization.info 2006

virtualization.info. (Interviewer) & Liguori, A. (Interviewee). (2006, August 11). Debunking Blue Pill myth [Interview transcript]. Retrieved November 13, 2014.

Internal MISP references

UUID 8ff8fb53-e468-4df7-b7e3-b344be1507ae which can be used as unique global reference for virtualization.info 2006 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-13T00:00:00Z
date_published 2006-08-11T00:00:00Z
source MITRE
title Debunking Blue Pill myth [Interview transcript]

TrendMicro Confucius APT Feb 2018

Lunghi, D and Horejsi, J. (2018, February 13). Deciphering Confucius: A Look at the Group's Cyberespionage Operations. Retrieved December 26, 2021.

Internal MISP references

UUID d1d5a708-75cb-4d41-b2a3-d035a14ac956 which can be used as unique global reference for TrendMicro Confucius APT Feb 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-12-26T00:00:00Z
date_published 2018-02-13T00:00:00Z
source MITRE, Tidal Cyber
title Deciphering Confucius: A Look at the Group's Cyberespionage Operations

Ciberseguridad Decoding malicious RTF files

Pedrero, R.. (2021, July). Decoding malicious RTF files. Retrieved November 16, 2021.

Internal MISP references

UUID 82d2451b-300f-4891-b1e7-ade53dff1126 which can be used as unique global reference for Ciberseguridad Decoding malicious RTF files in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-11-16T00:00:00Z
date_published 2021-07-01T00:00:00Z
source MITRE
title Decoding malicious RTF files

Nccgroup Gh0st April 2018

Pantazopoulos, N. (2018, April 17). Decoding network data from a Gh0st RAT variant. Retrieved November 2, 2018.

Internal MISP references

UUID 4476aa0a-b1ef-4ac6-9e44-5721a0b3e92b which can be used as unique global reference for Nccgroup Gh0st April 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-02T00:00:00Z
date_published 2018-04-17T00:00:00Z
source MITRE
title Decoding network data from a Gh0st RAT variant

Morphisec September 3 2024

Michael Gorelik. (2024, September 3). Decoding the Puzzle Cicada3301 Ransomware Threat Analysis. Retrieved September 5, 2024.

Internal MISP references

UUID 90549699-8815-45e8-820c-4f5a7fc584b8 which can be used as unique global reference for Morphisec September 3 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-05T00:00:00Z
date_published 2024-09-03T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Decoding the Puzzle Cicada3301 Ransomware Threat Analysis

MalwareBytes Template Injection OCT 2017

Segura, J. (2017, October 13). Decoy Microsoft Word document delivers malware through a RAT. Retrieved July 21, 2018.

Internal MISP references

UUID 7ef0ab1f-c7d6-46fe-b489-fab4db623e0a which can be used as unique global reference for MalwareBytes Template Injection OCT 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-21T00:00:00Z
date_published 2017-10-13T00:00:00Z
source MITRE
title Decoy Microsoft Word document delivers malware through a RAT

Crowdstrike PartyTicket March 2022

Crowdstrike. (2022, March 1). Decryptable PartyTicket Ransomware Reportedly Targeting Ukrainian Entities. Retrieved March 1, 2022.

Internal MISP references

UUID 8659fea7-7d65-4ee9-8ceb-cf41204b57e0 which can be used as unique global reference for Crowdstrike PartyTicket March 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-01T00:00:00Z
date_published 2022-03-01T00:00:00Z
source MITRE
title Decryptable PartyTicket Ransomware Reportedly Targeting Ukrainian Entities

Fortinet Emotet May 2017

Xiaopeng Zhang. (2017, May 3). Deep Analysis of New Emotet Variant – Part 1. Retrieved April 1, 2019.

Internal MISP references

UUID 2b8b6ab4-906f-4732-94f8-eaac5ec0151d which can be used as unique global reference for Fortinet Emotet May 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-01T00:00:00Z
date_published 2017-05-03T00:00:00Z
source MITRE
title Deep Analysis of New Emotet Variant – Part 1

Aqua TeamTNT August 2020

Kol, Roi. Morag, A. (2020, August 25). Deep Analysis of TeamTNT Techniques Using Container Images to Attack. Retrieved September 22, 2021.

Internal MISP references

UUID ca10ad0d-1a47-4006-8f76-c2246aee7752 which can be used as unique global reference for Aqua TeamTNT August 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-22T00:00:00Z
date_published 2020-08-25T00:00:00Z
source MITRE
title Deep Analysis of TeamTNT Techniques Using Container Images to Attack

Bitdefender FIN8 July 2021

Martin Zugec. (2021, July 27). Deep Dive Into a FIN8 Attack - A Forensic Investigation. Retrieved September 1, 2021.

Internal MISP references

UUID aee3179e-1536-40ab-9965-1c10bdaa6dff which can be used as unique global reference for Bitdefender FIN8 July 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-01T00:00:00Z
date_published 2021-07-27T00:00:00Z
source MITRE
title Deep Dive Into a FIN8 Attack - A Forensic Investigation

Cyble Ragnar Locker January 20 2022

Cybleinc. (2022, January 20). Deep dive into Ragnar_locker Ransomware Gang. Retrieved September 29, 2023.

Internal MISP references

UUID 390b3063-8d7b-4dee-b5f7-bfd0804f2e30 which can be used as unique global reference for Cyble Ragnar Locker January 20 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-29T00:00:00Z
date_published 2022-01-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Deep dive into Ragnar_locker Ransomware Gang

Sophos Pikabot June 12 2023

Karl Ackerman. (2023, June 12). Deep dive into the Pikabot cyber threat. Retrieved January 11, 2024.

Internal MISP references

UUID f10c37d8-2efe-4d9e-8987-8978beef7e9d which can be used as unique global reference for Sophos Pikabot June 12 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-11T00:00:00Z
date_published 2023-06-12T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Deep dive into the Pikabot cyber threat

Microsoft Deep Dive Solorigate January 2021

MSTIC, CDOC, 365 Defender Research Team. (2021, January 20). Deep dive into the Solorigate second-stage activation: From SUNBURST to TEARDROP and Raindrop . Retrieved January 22, 2021.

Internal MISP references

UUID ddd70eef-ab94-45a9-af43-c396c9e3fbc6 which can be used as unique global reference for Microsoft Deep Dive Solorigate January 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-22T00:00:00Z
date_published 2021-01-20T00:00:00Z
source MITRE
title Deep dive into the Solorigate second-stage activation: From SUNBURST to TEARDROP and Raindrop

AADInternals - Device Registration

Dr. Nestori Syynimaa. (2021, March 3). Deep-dive to Azure AD device join. Retrieved March 9, 2022.

Internal MISP references

UUID 978b408d-f9e9-422c-b2d7-741f6cc298d4 which can be used as unique global reference for AADInternals - Device Registration in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-09T00:00:00Z
date_published 2021-03-03T00:00:00Z
source MITRE
title Deep-dive to Azure AD device join

Alperovitch 2014

Alperovitch, D. (2014, July 7). Deep in Thought: Chinese Targeting of National Security Think Tanks. Retrieved November 12, 2014.

Internal MISP references

UUID 72e19be9-35dd-4199-bc07-bd9d0c664df6 which can be used as unique global reference for Alperovitch 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-12T00:00:00Z
date_published 2014-07-07T00:00:00Z
source MITRE, Tidal Cyber
title Deep in Thought: Chinese Targeting of National Security Think Tanks

DefaultPack.EXE - LOLBAS Project

LOLBAS. (2020, October 1). DefaultPack.EXE. Retrieved December 4, 2023.

Internal MISP references

UUID 106efc3e-5816-44ae-a384-5e026e68ab89 which can be used as unique global reference for DefaultPack.EXE - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2020-10-01T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title DefaultPack.EXE

Lastline DarkHotel Just In Time Decryption Nov 2015

Arunpreet Singh, Clemens Kolbitsch. (2015, November 5). Defeating Darkhotel Just-In-Time Decryption. Retrieved April 15, 2021.

Internal MISP references

UUID e43341ae-178f-43ba-9d66-f4d0380d2c59 which can be used as unique global reference for Lastline DarkHotel Just In Time Decryption Nov 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-15T00:00:00Z
date_published 2015-11-05T00:00:00Z
source MITRE
title Defeating Darkhotel Just-In-Time Decryption

piazza launch agent mitigation

Antonio Piazza (4n7m4n). (2021, November 23). Defeating Malicious Launch Persistence. Retrieved April 19, 2022.

Internal MISP references

UUID 8a3591f2-34b0-4914-bb42-d4621966faed which can be used as unique global reference for piazza launch agent mitigation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-19T00:00:00Z
date_published 2021-11-23T00:00:00Z
source MITRE
title Defeating Malicious Launch Persistence

Inversecos Timestomping 2022

Lina Lau. (2022, April 28). Defence Evasion Technique: Timestomping Detection – NTFS Forensics. Retrieved September 30, 2024.

Internal MISP references

UUID 48bc7943-0384-5b6e-a0c5-854b6a08203f which can be used as unique global reference for Inversecos Timestomping 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-30T00:00:00Z
date_published 2022-04-28T00:00:00Z
source MITRE
title Defence Evasion Technique: Timestomping Detection – NTFS Forensics

VectorSec ForFiles Aug 2017

vector_sec. (2017, August 11). Defenders watching launches of cmd? What about forfiles?. Retrieved September 12, 2024.

Internal MISP references

UUID 8088d15d-9512-4d12-a99a-c76ad9dc3390 which can be used as unique global reference for VectorSec ForFiles Aug 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2017-08-11T00:00:00Z
source MITRE
title Defenders watching launches of cmd? What about forfiles?

Black Hat 2015 App Shim

Pierce, Sean. (2015, November). Defending Against Malicious Application Compatibility Shims. Retrieved June 22, 2017.

Internal MISP references

UUID 19e3cddb-b077-40cf-92e0-131b12efa4f7 which can be used as unique global reference for Black Hat 2015 App Shim in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-06-22T00:00:00Z
date_published 2015-11-01T00:00:00Z
source MITRE
title Defending Against Malicious Application Compatibility Shims

TechNet O365 Outlook Rules

Koeller, B.. (2018, February 21). Defending Against Rules and Forms Injection. Retrieved November 5, 2019.

Internal MISP references

UUID c7f9bd2f-254a-4254-8a92-a3ab02455fcb which can be used as unique global reference for TechNet O365 Outlook Rules in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-11-05T00:00:00Z
date_published 2018-02-21T00:00:00Z
source MITRE
title Defending Against Rules and Forms Injection

Defending Against Scheduled Task Attacks in Windows Environments

Harshal Tupsamudre. (2022, June 20). Defending Against Scheduled Tasks. Retrieved July 5, 2022.

Internal MISP references

UUID 111d21df-5531-4927-a173-fac9cd7672b3 which can be used as unique global reference for Defending Against Scheduled Task Attacks in Windows Environments in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-05T00:00:00Z
date_published 2022-06-20T00:00:00Z
source MITRE
title Defending Against Scheduled Tasks

Rapid7 HAFNIUM Mar 2021

Eoin Miller. (2021, March 23). Defending Against the Zero Day: Analyzing Attacker Behavior Post-Exploitation of Microsoft Exchange. Retrieved October 27, 2022.

Internal MISP references

UUID cf05d229-c2ba-54f2-a79d-4b7c9185c663 which can be used as unique global reference for Rapid7 HAFNIUM Mar 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-10-27T00:00:00Z
date_published 2021-03-23T00:00:00Z
source MITRE
title Defending Against the Zero Day: Analyzing Attacker Behavior Post-Exploitation of Microsoft Exchange

Microsoft SQL Server

Microsoft Threat Intelligence. (2023, October 3). Defending new vectors: Threat actors attempt SQL Server to cloud lateral movement. Retrieved October 3, 2023.

Internal MISP references

UUID a904fde8-b8f9-5411-ab46-0dacf39cc81f which can be used as unique global reference for Microsoft SQL Server in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-03T00:00:00Z
date_published 2023-10-03T00:00:00Z
source MITRE
title Defending new vectors: Threat actors attempt SQL Server to cloud lateral movement

rundll32.exe defense evasion

Ariel silver. (2022, February 1). Defense Evasion Techniques. Retrieved April 8, 2022.

Internal MISP references

UUID 0f31f0ff-9ddb-4ea9-88d0-7b3b688764af which can be used as unique global reference for rundll32.exe defense evasion in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-08T00:00:00Z
date_published 2022-02-01T00:00:00Z
source MITRE
title Defense Evasion Techniques

def_ev_win_event_logging

Chandel, R. (2021, April 22). Defense Evasion: Windows Event Logging (T1562.002). Retrieved September 14, 2021.

Internal MISP references

UUID 166e3a8a-047a-4798-b6cb-5aa36903a764 which can be used as unique global reference for def_ev_win_event_logging in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-14T00:00:00Z
date_published 2021-04-22T00:00:00Z
source MITRE
title Defense Evasion: Windows Event Logging (T1562.002)

Kaspersky DeftTorero October 3 2022

Global Research & Analysis Team. (2022, October 3). DeftTorero: tactics, techniques and procedures of intrusions revealed. Retrieved October 25, 2023.

Internal MISP references

UUID f6b43988-4d8b-455f-865e-3150e43d4f11 which can be used as unique global reference for Kaspersky DeftTorero October 3 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-25T00:00:00Z
date_published 2022-10-03T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title DeftTorero: tactics, techniques and procedures of intrusions revealed

TechNet Del

Microsoft. (n.d.). Del. Retrieved April 22, 2016.

Internal MISP references

UUID 01fc44b9-0eb3-4fd2-b755-d611825374ae which can be used as unique global reference for TechNet Del in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-22T00:00:00Z
source MITRE
title Del

Hunters Domain Wide Delegation Google Workspace 2023

Yonatan Khanashvilli. (2023, November 28). DeleFriend: Severe design flaw in Domain Wide Delegation could leave Google Workspace vulnerable for takeover. Retrieved January 16, 2024.

Internal MISP references

UUID 290cebe1-a2fd-5ccd-8ef6-afa9d4c3c9df which can be used as unique global reference for Hunters Domain Wide Delegation Google Workspace 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-16T00:00:00Z
date_published 2023-11-28T00:00:00Z
source MITRE
title DeleFriend: Severe design flaw in Domain Wide Delegation could leave Google Workspace vulnerable for takeover

Azure Shared Access Signature

Delegate access with a shared access signature. (2019, December 18). Delegate access with a shared access signature. Retrieved March 2, 2022.

Internal MISP references

UUID f6ffe1ef-13f3-4225-b714-cfb89aaaf3fa which can be used as unique global reference for Azure Shared Access Signature in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-02T00:00:00Z
date_published 2019-12-18T00:00:00Z
source MITRE
title Delegate access with a shared access signature

Register Deloitte

Thomson, I. (2017, September 26). Deloitte is a sitting duck: Key systems with RDP open, VPN and proxy 'login details leaked'. Retrieved October 19, 2020.

Internal MISP references

UUID e6b10687-8666-4c9c-ac77-1988378e096d which can be used as unique global reference for Register Deloitte in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
date_published 2017-09-26T00:00:00Z
source MITRE
title Deloitte is a sitting duck: Key systems with RDP open, VPN and proxy 'login details leaked'

Talos Micropsia June 2017

Rascagneres, P., Mercer, W. (2017, June 19). Delphi Used To Score Against Palestine. Retrieved November 13, 2018.

Internal MISP references

UUID c727152c-079a-4ff9-a0e5-face919cf59b which can be used as unique global reference for Talos Micropsia June 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-13T00:00:00Z
date_published 2017-06-19T00:00:00Z
source MITRE
title Delphi Used To Score Against Palestine

TrendMicro EarthLusca 2022

Chen, J., et al. (2022). Delving Deep: An Analysis of Earth Lusca’s Operations. Retrieved July 1, 2022.

Internal MISP references

UUID f6e1bffd-e35b-4eae-b9bf-c16a82bf7004 which can be used as unique global reference for TrendMicro EarthLusca 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-01T00:00:00Z
date_published 2022-01-01T00:00:00Z
source MITRE
title Delving Deep: An Analysis of Earth Lusca’s Operations

Warren, R. (2017, August 2). Demiguise: virginkey.js. Retrieved January 17, 2019.

Internal MISP references

UUID 2e55d33a-fe75-4397-b6f0-a28d397b4c24 which can be used as unique global reference for Demiguise Guardrail Router Logo in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-01-17T00:00:00Z
date_published 2017-08-02T00:00:00Z
source MITRE
title Demiguise: virginkey.js

FireEye Hacking Team

FireEye Threat Intelligence. (2015, July 13). Demonstrating Hustle, Chinese APT Groups Quickly Use Zero-Day Vulnerability (CVE-2015-5119) Following Hacking Team Leak. Retrieved January 25, 2016.

Internal MISP references

UUID c1e798b8-6771-4ba7-af25-69c640321e40 which can be used as unique global reference for FireEye Hacking Team in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-25T00:00:00Z
date_published 2015-07-13T00:00:00Z
source MITRE
title Demonstrating Hustle, Chinese APT Groups Quickly Use Zero-Day Vulnerability (CVE-2015-5119) Following Hacking Team Leak

Demystifying Azure AD Service Principals

Bellavance, Ned. (2019, July 16). Demystifying Azure AD Service Principals. Retrieved January 19, 2020.

Internal MISP references

UUID 3e285884-2191-4773-9243-74100ce177c8 which can be used as unique global reference for Demystifying Azure AD Service Principals in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-01-19T00:00:00Z
date_published 2019-07-16T00:00:00Z
source MITRE
title Demystifying Azure AD Service Principals

demystifying_ryuk

Tran, T. (2020, November 24). Demystifying Ransomware Attacks Against Microsoft Defender Solution. Retrieved January 26, 2022.

Internal MISP references

UUID 3dc684c7-14de-4dc0-9f11-79160c4f5038 which can be used as unique global reference for demystifying_ryuk in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-26T00:00:00Z
date_published 2020-11-24T00:00:00Z
source MITRE
title Demystifying Ransomware Attacks Against Microsoft Defender Solution

DOJ Iran Indictments September 2020

DOJ. (2020, September 17). Department of Justice and Partner Departments and Agencies Conduct Coordinated Actions to Disrupt and Deter Iranian Malicious Cyber Activities Targeting the United States and the Broader International Community. Retrieved December 10, 2020.

Internal MISP references

UUID f30a77dd-d1d0-41b8-b82a-461dd6cd126f which can be used as unique global reference for DOJ Iran Indictments September 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-10T00:00:00Z
date_published 2020-09-17T00:00:00Z
source MITRE
title Department of Justice and Partner Departments and Agencies Conduct Coordinated Actions to Disrupt and Deter Iranian Malicious Cyber Activities Targeting the United States and the Broader International Community

Microsoft GitHub Device Guard CI Policies

Microsoft. (2017, June 16). Deploy code integrity policies: steps. Retrieved June 28, 2017.

Internal MISP references

UUID 9646af1a-19fe-44c9-96ca-3c8ec097c3db which can be used as unique global reference for Microsoft GitHub Device Guard CI Policies in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-06-28T00:00:00Z
date_published 2017-06-16T00:00:00Z
source MITRE
title Deploy code integrity policies: steps

Microsoft Deploying AD Federation

Microsoft. (n.d.). Deploying Active Directory Federation Services in Azure. Retrieved March 13, 2020.

Internal MISP references

UUID beeb460e-4dba-42fb-8109-0861cd0df562 which can be used as unique global reference for Microsoft Deploying AD Federation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-13T00:00:00Z
source MITRE
title Deploying Active Directory Federation Services in Azure

Apple Kernel Extension Deprecation

Apple. (n.d.). Deprecated Kernel Extensions and System Extension Alternatives. Retrieved November 4, 2020.

Internal MISP references

UUID 86053c5a-f2dd-4eb3-9dc2-6a6a4e1c2ae5 which can be used as unique global reference for Apple Kernel Extension Deprecation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-04T00:00:00Z
source MITRE
title Deprecated Kernel Extensions and System Extension Alternatives

Black Lotus Raptor Train September 18 2024

Black Lotus Labs. (2024, September 18). Derailing the Raptor Train. Retrieved September 19, 2024.

Internal MISP references

UUID 21e26577-887b-4b8c-a3f8-4ab8868bed69 which can be used as unique global reference for Black Lotus Raptor Train September 18 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-19T00:00:00Z
date_published 2024-09-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Derailing the Raptor Train

Amazon Describe Instance

Amazon. (n.d.). describe-instance-information. Retrieved March 3, 2020.

Internal MISP references

UUID c0b6a8a4-0d94-414d-b5ab-cf5485240dee which can be used as unique global reference for Amazon Describe Instance in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-03T00:00:00Z
source MITRE
title describe-instance-information

Amazon Describe Instances API

Amazon. (n.d.). DescribeInstances. Retrieved May 26, 2020.

Internal MISP references

UUID 95629746-43d2-4f41-87da-4bd44a43ef4a which can be used as unique global reference for Amazon Describe Instances API in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-26T00:00:00Z
source MITRE
title DescribeInstances

DescribeSecurityGroups - Amazon Elastic Compute Cloud

Amazon Web Services, Inc. . (2022). DescribeSecurityGroups. Retrieved January 28, 2022.

Internal MISP references

UUID aa953df5-40b5-42d2-9e33-a227a093497f which can be used as unique global reference for DescribeSecurityGroups - Amazon Elastic Compute Cloud in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-28T00:00:00Z
date_published 2022-01-01T00:00:00Z
source MITRE
title DescribeSecurityGroups

Microsoft RunOnceEx APR 2018

Microsoft. (2018, August 20). Description of the RunOnceEx Registry Key. Retrieved June 29, 2018.

Internal MISP references

UUID f80bb86f-ce75-4778-bdee-777cf37a6de7 which can be used as unique global reference for Microsoft RunOnceEx APR 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-06-29T00:00:00Z
date_published 2018-08-20T00:00:00Z
source MITRE
title Description of the RunOnceEx Registry Key

Designing Daemons Apple Dev

Apple. (n.d.). Retrieved October 12, 2021.

Internal MISP references

UUID 4baac228-1f6a-4c65-ae98-5a542600dfc6 which can be used as unique global reference for Designing Daemons Apple Dev in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-12T00:00:00Z
source MITRE
title Designing Daemons Apple Dev

Desk.cpl - LOLBAS Project

LOLBAS. (2022, April 21). Desk.cpl. Retrieved December 4, 2023.

Internal MISP references

UUID 487a54d9-9f90-478e-b305-bd041af55e12 which can be used as unique global reference for Desk.cpl - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2022-04-21T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Desk.cpl

Free Desktop Application Autostart Feb 2006

Free Desktop. (2006, February 13). Desktop Application Autostart Specification. Retrieved September 12, 2019.

Internal MISP references

UUID 0885434e-3908-4425-9597-ce6abe531ca5 which can be used as unique global reference for Free Desktop Application Autostart Feb 2006 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-12T00:00:00Z
date_published 2006-02-13T00:00:00Z
source MITRE
title Desktop Application Autostart Specification

Desktopimgdownldr.exe - LOLBAS Project

LOLBAS. (2020, June 28). Desktopimgdownldr.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 1df3aacf-76c4-472a-92c8-2a85ae9e2860 which can be used as unique global reference for Desktopimgdownldr.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2020-06-28T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Desktopimgdownldr.exe

CISA AA22-057A Destructive Malware February 2022

CISA. (2022, February 26). Destructive Malware Targeting Organizations in Ukraine. Retrieved March 25, 2022.

Internal MISP references

UUID 18684085-c156-4610-8b1f-cc9646f2c06e which can be used as unique global reference for CISA AA22-057A Destructive Malware February 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-25T00:00:00Z
date_published 2022-02-26T00:00:00Z
source MITRE
title Destructive Malware Targeting Organizations in Ukraine

Microsoft WhisperGate January 2022

MSTIC. (2022, January 15). Destructive malware targeting Ukrainian organizations. Retrieved March 10, 2022.

Internal MISP references

UUID e0c1fcd3-b7a8-42af-8984-873a6f969975 which can be used as unique global reference for Microsoft WhisperGate January 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-10T00:00:00Z
date_published 2022-01-15T00:00:00Z
source MITRE
title Destructive malware targeting Ukrainian organizations

S2W DarkGate January 16 2024

S2W. (2024, January 16). Detailed Analysis of DarkGate. Retrieved July 12, 2024.

Internal MISP references

UUID 62d6a280-06df-4b96-85c8-13174e496256 which can be used as unique global reference for S2W DarkGate January 16 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-12T00:00:00Z
date_published 2024-01-16T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Detailed Analysis of DarkGate

URI Unique

Australian Cyber Security Centre. National Security Agency. (2020, April 21). Detect and Prevent Web Shell Malware. Retrieved February 9, 2024.

Internal MISP references

UUID b91963c4-07ea-5e36-9cc8-8a2149ee7473 which can be used as unique global reference for URI Unique in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-09T00:00:00Z
date_published 2020-04-21T00:00:00Z
source MITRE
title Detect and Prevent Web Shell Malware

NSA and ASD Detect and Prevent Web Shells 2020

NSA and ASD. (2020, April 3). Detect and Prevent Web Shell Malware. Retrieved July 23, 2021.

Internal MISP references

UUID e9a882a5-1a88-4fdf-9349-205f4fa167c9 which can be used as unique global reference for NSA and ASD Detect and Prevent Web Shells 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-07-23T00:00:00Z
date_published 2020-04-03T00:00:00Z
source MITRE
title Detect and Prevent Web Shell Malware

Microsoft Detect Outlook Forms

Fox, C., Vangel, D. (2018, April 22). Detect and Remediate Outlook Rules and Custom Forms Injections Attacks in Office 365. Retrieved February 4, 2019.

Internal MISP references

UUID fd63775c-8482-477d-ab41-8c64ca17b602 which can be used as unique global reference for Microsoft Detect Outlook Forms in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-04T00:00:00Z
date_published 2018-04-22T00:00:00Z
source MITRE
title Detect and Remediate Outlook Rules and Custom Forms Injections Attacks in Office 365

ADDSecurity DCShadow Feb 2018

Lucand,G. (2018, February 18). Detect DCShadow, impossible?. Retrieved March 30, 2018.

Internal MISP references

UUID c1cd4767-b5a1-4821-8574-b5782a83920f which can be used as unique global reference for ADDSecurity DCShadow Feb 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-30T00:00:00Z
date_published 2018-02-18T00:00:00Z
source MITRE
title Detect DCShadow, impossible?

Lacework LLMJacking 2024

Lacework Labs. (2024, June 6). Detecting AI resource-hijacking with Composite Alerts. Retrieved September 25, 2024.

Internal MISP references

UUID 4742569e-80ed-5d70-948b-9457d9371ca8 which can be used as unique global reference for Lacework LLMJacking 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-25T00:00:00Z
date_published 2024-06-06T00:00:00Z
source MITRE
title Detecting AI resource-hijacking with Composite Alerts

Pace University Detecting DGA May 2017

Chen, L., Wang, T.. (2017, May 5). Detecting Algorithmically Generated Domains Using Data Visualization and N-Grams Methods . Retrieved April 26, 2019.

Internal MISP references

UUID 7a4e7e05-986b-4549-a021-8c3c729bd3cc which can be used as unique global reference for Pace University Detecting DGA May 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-26T00:00:00Z
date_published 2017-05-05T00:00:00Z
source MITRE
title Detecting Algorithmically Generated Domains Using Data Visualization and N-Grams Methods

MDSec Detecting DOTNET

MDSec Research. (n.d.). Detecting and Advancing In-Memory .NET Tradecraft. Retrieved October 4, 2021.

Internal MISP references

UUID a7952f0e-6690-48de-ad93-9922d6d6989c which can be used as unique global reference for MDSec Detecting DOTNET in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-04T00:00:00Z
source MITRE
title Detecting and Advancing In-Memory .NET Tradecraft

Cisco DoSdetectNetflow

Cisco. (n.d.). Detecting and Analyzing Network Threats With NetFlow. Retrieved April 25, 2019.

Internal MISP references

UUID ce447063-ec9a-4729-aaec-64ec123077ce which can be used as unique global reference for Cisco DoSdetectNetflow in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-25T00:00:00Z
source MITRE
title Detecting and Analyzing Network Threats With NetFlow

RSA2017 Detect and Respond Adair

Adair, S. (2017, February 17). Detecting and Responding to Advanced Threats within Exchange Environments. Retrieved March 20, 2017.

Internal MISP references

UUID 005a276c-3369-4d29-bf0e-c7fa4e7d90bb which can be used as unique global reference for RSA2017 Detect and Respond Adair in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-20T00:00:00Z
date_published 2017-02-17T00:00:00Z
source MITRE
title Detecting and Responding to Advanced Threats within Exchange Environments

Nmap Firewalls NIDS

Nmap. (n.d.). Chapter 10. Detecting and Subverting Firewalls and Intrusion Detection Systems. Retrieved October 20, 2020.

Internal MISP references

UUID c696ac8c-2c7a-4708-a369-0832a493e0a6 which can be used as unique global reference for Nmap Firewalls NIDS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
source MITRE
title Detecting and Subverting Firewalls and Intrusion Detection Systems

Medium Detecting Attempts to Steal Passwords from Memory

French, D. (2018, October 2). Detecting Attempts to Steal Passwords from Memory. Retrieved October 11, 2019.

Internal MISP references

UUID 63955204-3cf9-4628-88d2-361de4dae94f which can be used as unique global reference for Medium Detecting Attempts to Steal Passwords from Memory in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-11T00:00:00Z
date_published 2018-10-02T00:00:00Z
source MITRE
title Detecting Attempts to Steal Passwords from Memory

Merces BPFDOOR 2023

Fernando Merces. (2023, July 13). Detecting BPFDoor Backdoor Variants Abusing BPF Filters. Retrieved September 23, 2024.

Internal MISP references

UUID bf4f5736-0506-5ecf-a73e-86ab18c2b71b which can be used as unique global reference for Merces BPFDOOR 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-23T00:00:00Z
date_published 2023-07-13T00:00:00Z
source MITRE
title Detecting BPFDoor Backdoor Variants Abusing BPF Filters

Endurant CMSTP July 2018

Seetharaman, N. (2018, July 7). Detecting CMSTP-Enabled Code Execution and UAC Bypass With Sysmon.. Retrieved August 6, 2018.

Internal MISP references

UUID d67901a4-8774-42d3-98de-c20158f88eb6 which can be used as unique global reference for Endurant CMSTP July 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-06T00:00:00Z
date_published 2018-07-07T00:00:00Z
source MITRE
title Detecting CMSTP-Enabled Code Execution and UAC Bypass With Sysmon.

Red Canary COR_PROFILER May 2020

Brown, J. (2020, May 7). Detecting COR_PROFILER manipulation for persistence. Retrieved June 24, 2020.

Internal MISP references

UUID 3d8cb4d3-1cbe-416a-95b5-15003cbc2beb which can be used as unique global reference for Red Canary COR_PROFILER May 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-24T00:00:00Z
date_published 2020-05-07T00:00:00Z
source MITRE
title Detecting COR_PROFILER manipulation for persistence

NVisio Labs DDE Detection Oct 2017

NVISO Labs. (2017, October 11). Detecting DDE in MS Office documents. Retrieved November 21, 2017.

Internal MISP references

UUID 75ccde9a-2d51-4492-9a8a-02fce30f9167 which can be used as unique global reference for NVisio Labs DDE Detection Oct 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-21T00:00:00Z
date_published 2017-10-11T00:00:00Z
source MITRE
title Detecting DDE in MS Office documents

Zhang 2013

Zhang, H., Papadopoulos, C., & Massey, D. (2013, April). Detecting encrypted botnet traffic. Retrieved August 19, 2015.

Internal MISP references

UUID 29edb7ad-3b3a-4fdb-9c4e-bb99fc2a1c67 which can be used as unique global reference for Zhang 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-08-19T00:00:00Z
date_published 2013-04-01T00:00:00Z
source MITRE
title Detecting encrypted botnet traffic

ADSecurity Detecting Forged Tickets

Metcalf, S. (2015, May 03). Detecting Forged Kerberos Ticket (Golden Ticket & Silver Ticket) Use in Active Directory. Retrieved December 23, 2015.

Internal MISP references

UUID 4c328a1a-6a83-4399-86c5-d6e1586da8a3 which can be used as unique global reference for ADSecurity Detecting Forged Tickets in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-12-23T00:00:00Z
date_published 2015-05-03T00:00:00Z
source MITRE
title Detecting Forged Kerberos Ticket (Golden Ticket & Silver Ticket) Use in Active Directory

Microsoft Detecting Kerberoasting Feb 2018

Bani, M. (2018, February 23). Detecting Kerberoasting activity using Azure Security Center. Retrieved March 23, 2018.

Internal MISP references

UUID b36d82a8-82ca-4f22-85c0-ee82be3b6940 which can be used as unique global reference for Microsoft Detecting Kerberoasting Feb 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-23T00:00:00Z
date_published 2018-02-23T00:00:00Z
source MITRE
title Detecting Kerberoasting activity using Azure Security Center

Medium Detecting Lateral Movement

French, D. (2018, September 30). Detecting Lateral Movement Using Sysmon and Splunk. Retrieved October 11, 2019.

Internal MISP references

UUID 91bea3c2-df54-424e-8667-035e6e15fe38 which can be used as unique global reference for Medium Detecting Lateral Movement in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-11T00:00:00Z
date_published 2018-09-30T00:00:00Z
source MITRE
title Detecting Lateral Movement Using Sysmon and Splunk

macOS root VNC login without authentication

Nick Miles. (2017, November 30). Detecting macOS High Sierra root account without authentication. Retrieved September 20, 2021.

Internal MISP references

UUID 4dc6ea85-a41b-4218-a9ae-e1eea841f2f2 which can be used as unique global reference for macOS root VNC login without authentication in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-20T00:00:00Z
date_published 2017-11-30T00:00:00Z
source MITRE
title Detecting macOS High Sierra root account without authentication

Sans Virtual Jan 2016

Keragala, D. (2016, January 16). Detecting Malware and Sandbox Evasion Techniques. Retrieved April 17, 2019.

Internal MISP references

UUID 5d3d567c-dc25-44c1-8d2a-71ae00b60dbe which can be used as unique global reference for Sans Virtual Jan 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-17T00:00:00Z
date_published 2016-01-16T00:00:00Z
source MITRE
title Detecting Malware and Sandbox Evasion Techniques

Mandiant Azure AD Backdoors

Mike Burns. (2020, September 30). Detecting Microsoft 365 and Azure Active Directory Backdoors. Retrieved September 28, 2022.

Internal MISP references

UUID 7b4502ff-a45c-4ba7-b00e-ca9f6e9c2ac8 which can be used as unique global reference for Mandiant Azure AD Backdoors in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-28T00:00:00Z
date_published 2020-09-30T00:00:00Z
source MITRE
title Detecting Microsoft 365 and Azure Active Directory Backdoors

CounterCept PPID Spoofing Dec 2018

Loh, I. (2018, December 21). Detecting Parent PID Spoofing. Retrieved June 3, 2019.

Internal MISP references

UUID a1fdb8db-4c5f-4fb9-a013-b232cd8471f8 which can be used as unique global reference for CounterCept PPID Spoofing Dec 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-03T00:00:00Z
date_published 2018-12-21T00:00:00Z
source MITRE
title Detecting Parent PID Spoofing

CISA SolarWinds Cloud Detection

CISA. (2021, January 8). Detecting Post-Compromise Threat Activity in Microsoft Cloud Environments. Retrieved January 8, 2021.

Internal MISP references

UUID b8fd5fe3-dbfa-4f28-a9b5-39f1d7db9e62 which can be used as unique global reference for CISA SolarWinds Cloud Detection in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-08T00:00:00Z
date_published 2021-01-08T00:00:00Z
source MITRE
title Detecting Post-Compromise Threat Activity in Microsoft Cloud Environments

Detecting Rclone

Aaron Greetham. (2021, May 27). Detecting Rclone – An Effective Tool for Exfiltration. Retrieved August 30, 2022.

Internal MISP references

UUID 2e44290c-32f5-4e7f-96de-9874df79fe89 which can be used as unique global reference for Detecting Rclone in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-30T00:00:00Z
date_published 2021-05-27T00:00:00Z
source MITRE
title Detecting Rclone – An Effective Tool for Exfiltration

Medium Detecting WMI Persistence

French, D. (2018, October 9). Detecting & Removing an Attacker’s WMI Persistence. Retrieved October 11, 2019.

Internal MISP references

UUID 539e7cd0-d1e9-46ba-96fe-d8a1061c857e which can be used as unique global reference for Medium Detecting WMI Persistence in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-11T00:00:00Z
date_published 2018-10-09T00:00:00Z
source MITRE
title Detecting & Removing an Attacker’s WMI Persistence

Okta Scatter Swine 2022

Okta. (2022, August 25). Detecting Scatter Swine: Insights into a Relentless Phishing Campaign. Retrieved February 24, 2023.

Internal MISP references

UUID 66d1b6e2-c069-5832-b549-fc5f0edeed40 which can be used as unique global reference for Okta Scatter Swine 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-24T00:00:00Z
date_published 2022-08-25T00:00:00Z
source MITRE
title Detecting Scatter Swine: Insights into a Relentless Phishing Campaign

Splunk Supernova Jan 2021

Stoner, J. (2021, January 21). Detecting Supernova Malware: SolarWinds Continued. Retrieved February 22, 2021.

Internal MISP references

UUID 7e43bda5-0978-46aa-b3b3-66ffb62b9fdb which can be used as unique global reference for Splunk Supernova Jan 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-22T00:00:00Z
date_published 2021-01-21T00:00:00Z
source MITRE
title Detecting Supernova Malware: SolarWinds Continued

Microsoft Winnti Jan 2017

Cap, P., et al. (2017, January 25). Detecting threat actors in recent German industrial attacks with Windows Defender ATP. Retrieved February 8, 2017.

Internal MISP references

UUID 6b63fac9-4bde-4fc8-a016-e77c8485fab7 which can be used as unique global reference for Microsoft Winnti Jan 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-02-08T00:00:00Z
date_published 2017-01-25T00:00:00Z
source MITRE
title Detecting threat actors in recent German industrial attacks with Windows Defender ATP

Chokepoint preload rootkits

stderr. (2014, February 14). Detecting Userland Preload Rootkits. Retrieved December 20, 2017.

Internal MISP references

UUID 16c00830-eade-40e2-9ee6-6e1af4b58e5d which can be used as unique global reference for Chokepoint preload rootkits in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-20T00:00:00Z
date_published 2014-02-14T00:00:00Z
source MITRE
title Detecting Userland Preload Rootkits

Sygnia Golden SAML

Sygnia. (2020, December). Detection and Hunting of Golden SAML Attack. Retrieved January 6, 2021.

Internal MISP references

UUID 1a6673b0-2a30-481e-a2a4-9e17e2676c5d which can be used as unique global reference for Sygnia Golden SAML in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-06T00:00:00Z
date_published 2020-12-01T00:00:00Z
source MITRE
title Detection and Hunting of Golden SAML Attack

FireEye Exchange Zero Days March 2021

Bromiley, M. et al. (2021, March 4). Detection and Response to Exploitation of Microsoft Exchange Zero-Day Vulnerabilities. Retrieved March 9, 2021.

Internal MISP references

UUID 5e5452a4-c3f5-4802-bcb4-198612cc8282 which can be used as unique global reference for FireEye Exchange Zero Days March 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-09T00:00:00Z
date_published 2021-03-04T00:00:00Z
source MITRE
title Detection and Response to Exploitation of Microsoft Exchange Zero-Day Vulnerabilities

Microsoft DEV-0139 December 6 2022

Microsoft Threat Intelligence. (2022, December 6). DEV-0139 launches targeted attacks against the cryptocurrency industry. Retrieved September 30, 2024.

Internal MISP references

UUID f9c070f1-aa83-45a3-bffb-c90f4caf5926 which can be used as unique global reference for Microsoft DEV-0139 December 6 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-30T00:00:00Z
date_published 2022-12-06T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title DEV-0139 launches targeted attacks against the cryptocurrency industry

Microsoft DEV-0537

Microsoft. (2022, March 22). DEV-0537 criminal actor targeting organizations for data exfiltration and destruction. Retrieved March 23, 2022.

Internal MISP references

UUID 2f7a59f3-620d-4e2e-8595-af96cd4e16c3 which can be used as unique global reference for Microsoft DEV-0537 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-23T00:00:00Z
date_published 2022-03-22T00:00:00Z
source MITRE
title DEV-0537 criminal actor targeting organizations for data exfiltration and destruction

MSTIC DEV-0537 Mar 2022

MSTIC, DART, M365 Defender. (2022, March 24). DEV-0537 Criminal Actor Targeting Organizations for Data Exfiltration and Destruction. Retrieved May 17, 2022.

Internal MISP references

UUID a9ce7e34-6e7d-4681-9869-8e8f2b5b0390 which can be used as unique global reference for MSTIC DEV-0537 Mar 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-17T00:00:00Z
date_published 2022-03-24T00:00:00Z
source MITRE
title DEV-0537 Criminal Actor Targeting Organizations for Data Exfiltration and Destruction

Microsoft Royal ransomware November 2022

MSTIC. (2022, November 17). DEV-0569 finds new ways to deliver Royal ransomware, various payloads. Retrieved March 30, 2023.

Internal MISP references

UUID 91efc6bf-e15c-514a-96c1-e838268d222f which can be used as unique global reference for Microsoft Royal ransomware November 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-30T00:00:00Z
date_published 2022-11-17T00:00:00Z
source MITRE
title DEV-0569 finds new ways to deliver Royal ransomware, various payloads

MSTIC DEV-0832 October 25 2022

Microsoft Threat Intelligence. (2022, October 25). DEV-0832 (Vice Society) opportunistic ransomware campaigns impacting US education sector. Retrieved September 19, 2024.

Internal MISP references

UUID 5b667611-649d-44d5-86e0-a79527608b3c which can be used as unique global reference for MSTIC DEV-0832 October 25 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-19T00:00:00Z
date_published 2022-10-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title DEV-0832 (Vice Society) opportunistic ransomware campaigns impacting US education sector

Cisco IOS Forensics Developments

Felix 'FX' Lindner. (2008, February). Developments in Cisco IOS Forensics. Retrieved October 21, 2020.

Internal MISP references

UUID 95fdf251-f40d-4f7a-bb12-8762e9c961b9 which can be used as unique global reference for Cisco IOS Forensics Developments in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-21T00:00:00Z
date_published 2008-02-01T00:00:00Z
source MITRE
title Developments in Cisco IOS Forensics

DeviceCredentialDeployment.exe - LOLBAS Project

LOLBAS. (2021, August 16). DeviceCredentialDeployment.exe. Retrieved December 4, 2023.

Internal MISP references

UUID fef281e8-8138-4420-b11b-66d1e6a19805 which can be used as unique global reference for DeviceCredentialDeployment.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-08-16T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title DeviceCredentialDeployment.exe

GitHub mattifestation DeviceGuardBypass

Graeber, M. (2016, November 13). DeviceGuardBypassMitigationRules. Retrieved November 30, 2016.

Internal MISP references

UUID 4ecd64b4-8014-447a-91d2-a431f4adbfcd which can be used as unique global reference for GitHub mattifestation DeviceGuardBypass in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-11-30T00:00:00Z
date_published 2016-11-13T00:00:00Z
source MITRE
title DeviceGuardBypassMitigationRules

Devinit.exe - LOLBAS Project

LOLBAS. (2022, January 20). Devinit.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 27343583-c17d-4c11-a7e3-14d725756556 which can be used as unique global reference for Devinit.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2022-01-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Devinit.exe

Devtoolslauncher.exe - LOLBAS Project

LOLBAS. (2019, October 4). Devtoolslauncher.exe. Retrieved December 4, 2023.

Internal MISP references

UUID cb263978-019c-40c6-b6de-61db0e7a8941 which can be used as unique global reference for Devtoolslauncher.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2019-10-04T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Devtoolslauncher.exe

devtunnel.exe - LOLBAS Project

LOLBAS. (2023, September 16). devtunnel.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 657c8b4c-1eee-4997-8461-c7592eaed9e8 which can be used as unique global reference for devtunnel.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2023-09-16T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title devtunnel.exe

Dfshim.dll - LOLBAS Project

LOLBAS. (2018, May 25). Dfshim.dll. Retrieved December 4, 2023.

Internal MISP references

UUID 30503e42-6047-46a9-8189-e6caa5f4deb0 which can be used as unique global reference for Dfshim.dll - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Dfshim.dll

LOLBAS /Dfsvc.exe

LOLBAS. (n.d.). /Dfsvc.exe. Retrieved September 9, 2024.

Internal MISP references

UUID caef4593-a7ac-57f7-9e06-b6ace2c9623d which can be used as unique global reference for LOLBAS /Dfsvc.exe in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-09T00:00:00Z
source MITRE
title /Dfsvc.exe

Dfsvc.exe - LOLBAS Project

LOLBAS. (2018, May 25). Dfsvc.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 7f3a78c0-68b2-4a9d-ae6a-6e63e8ddac3f which can be used as unique global reference for Dfsvc.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Dfsvc.exe

dhcp_serv_op_events

Microsoft. (2006, August 31). DHCP Server Operational Events. Retrieved March 7, 2022.

Internal MISP references

UUID e2b1e810-2a78-4553-8927-38ed5fba0f38 which can be used as unique global reference for dhcp_serv_op_events in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-07T00:00:00Z
date_published 2006-08-31T00:00:00Z
source MITRE
title DHCP Server Operational Events

GitHub Diamorphine

Mello, V. (2018, March 8). Diamorphine - LMK rootkit for Linux Kernels 2.6.x/3.x/4.x (x86 and x86_64). Retrieved April 9, 2018.

Internal MISP references

UUID 92993055-d2e6-46b2-92a3-ad70b62e4cc0 which can be used as unique global reference for GitHub Diamorphine in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-09T00:00:00Z
date_published 2018-03-08T00:00:00Z
source MITRE
title Diamorphine - LMK rootkit for Linux Kernels 2.6.x/3.x/4.x (x86 and x86_64)

diantz.exe_lolbas

Living Off The Land Binaries, Scripts and Libraries (LOLBAS). (n.d.). Diantz.exe. Retrieved October 25, 2021.

Internal MISP references

UUID 66652db8-5594-414f-8a6b-83d708a0c1fa which can be used as unique global reference for diantz.exe_lolbas in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-25T00:00:00Z
source MITRE
title Diantz.exe

Fortinet Diavol July 2021

Neeamni, D., Rubinfeld, A.. (2021, July 1). Diavol - A New Ransomware Used By Wizard Spider?. Retrieved November 12, 2021.

Internal MISP references

UUID 28c650f2-8ce8-4c78-ab4a-cae56c1548ed which can be used as unique global reference for Fortinet Diavol July 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-11-12T00:00:00Z
date_published 2021-07-01T00:00:00Z
source MITRE
title Diavol - A New Ransomware Used By Wizard Spider?

DFIR Diavol Ransomware December 2021

DFIR Report. (2021, December 13). Diavol Ransomware. Retrieved March 9, 2022.

Internal MISP references

UUID eb89f18d-684c-4220-b2a8-967f1f8f9162 which can be used as unique global reference for DFIR Diavol Ransomware December 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-09T00:00:00Z
date_published 2021-12-13T00:00:00Z
source MITRE
title Diavol Ransomware

Überwachung APT28 Forfiles June 2015

Guarnieri, C. (2015, June 19). Digital Attack on German Parliament: Investigative Report on the Hack of the Left Party Infrastructure in Bundestag. Retrieved January 22, 2018.

Internal MISP references

UUID 3b85fff0-88d8-4df6-af0b-66e57492732e which can be used as unique global reference for Überwachung APT28 Forfiles June 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-22T00:00:00Z
date_published 2015-06-19T00:00:00Z
source MITRE
title Digital Attack on German Parliament: Investigative Report on the Hack of the Left Party Infrastructure in Bundestag

Microsoft DSE June 2017

Microsoft. (2017, June 1). Digital Signatures for Kernel Modules on Windows. Retrieved April 22, 2021.

Internal MISP references

UUID 451bdfe3-0b30-425c-97a0-44727b70c1da which can be used as unique global reference for Microsoft DSE June 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-22T00:00:00Z
date_published 2017-06-01T00:00:00Z
source MITRE
title Digital Signatures for Kernel Modules on Windows

Microsoft East Asia Threats September 2023

Microsoft Threat Intelligence. (2023, September). Digital threats from East Asia increase in breadth and effectiveness. Retrieved February 5, 2024.

Internal MISP references

UUID 31f2c61e-cefe-5df7-9c2b-780bf03c88ec which can be used as unique global reference for Microsoft East Asia Threats September 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-05T00:00:00Z
date_published 2023-09-01T00:00:00Z
source MITRE
title Digital threats from East Asia increase in breadth and effectiveness

ESET Turla Mosquito Jan 2018

ESET, et al. (2018, January). Diplomats in Eastern Europe bitten by a Turla mosquito. Retrieved July 3, 2018.

Internal MISP references

UUID cd177c2e-ef22-47be-9926-61e25fd5f33b which can be used as unique global reference for ESET Turla Mosquito Jan 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-03T00:00:00Z
date_published 2018-01-01T00:00:00Z
source MITRE
title Diplomats in Eastern Europe bitten by a Turla mosquito

TechNet Dir

Microsoft. (n.d.). Dir. Retrieved April 18, 2016.

Internal MISP references

UUID f1eb8631-6bea-4688-a5ff-a388b1fdceb0 which can be used as unique global reference for TechNet Dir in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-18T00:00:00Z
source MITRE
title Dir

Frisk DMA August 2016

Ulf Frisk. (2016, August 5). Direct Memory Attack the Kernel. Retrieved March 30, 2018.

Internal MISP references

UUID c504485b-2daa-4159-96da-481a0b97a979 which can be used as unique global reference for Frisk DMA August 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-30T00:00:00Z
date_published 2016-08-05T00:00:00Z
source MITRE
title Direct Memory Attack the Kernel

Redops Syscalls

Feichter, D. (2023, June 30). Direct Syscalls vs Indirect Syscalls. Retrieved September 27, 2023.

Internal MISP references

UUID dd8c2edd-b5ba-5a41-b65d-c3a2951d07b8 which can be used as unique global reference for Redops Syscalls in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-27T00:00:00Z
date_published 2023-06-30T00:00:00Z
source MITRE
title Direct Syscalls vs Indirect Syscalls

GitHub Disable DDEAUTO Oct 2017

Dormann, W. (2017, October 20). Disable DDEAUTO for Outlook, Word, OneNote, and Excel versions 2010, 2013, 2016. Retrieved February 3, 2018.

Internal MISP references

UUID eea0dd34-4efa-4093-bd11-a59d1601868f which can be used as unique global reference for GitHub Disable DDEAUTO Oct 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-03T00:00:00Z
date_published 2017-10-20T00:00:00Z
source MITRE
title Disable DDEAUTO for Outlook, Word, OneNote, and Excel versions 2010, 2013, 2016

Disable automount for ISO

wordmann. (2022, February 8). Disable Disc Imgage. Retrieved February 8, 2022.

Internal MISP references

UUID 2155591e-eacf-4575-b7a6-f031675ef1b3 which can be used as unique global reference for Disable automount for ISO in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-08T00:00:00Z
date_published 2022-02-08T00:00:00Z
source MITRE
title Disable Disc Imgage

Disable_Win_Event_Logging

dmcxblue. (n.d.). Disable Windows Event Logging. Retrieved September 10, 2021.

Internal MISP references

UUID 0fa5e507-33dc-40ea-b960-bcd9aa024ab1 which can be used as unique global reference for Disable_Win_Event_Logging in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-10T00:00:00Z
source MITRE
title Disable Windows Event Logging

GitHub MOTW

wdormann. (2019, August 29). Disable Windows Explorer file associations for Disc Image Mount. Retrieved April 16, 2022.

Internal MISP references

UUID 044aa74a-9320-496a-9d15-37d8b934c244 which can be used as unique global reference for GitHub MOTW in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-16T00:00:00Z
date_published 2019-08-29T00:00:00Z
source MITRE
title Disable Windows Explorer file associations for Disc Image Mount

Apple Disable SIP

Apple. (n.d.). Disabling and Enabling System Integrity Protection. Retrieved April 22, 2021.

Internal MISP references

UUID d7545e0c-f0b7-4be4-800b-06a02240385e which can be used as unique global reference for Apple Disable SIP in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-22T00:00:00Z
source MITRE
title Disabling and Enabling System Integrity Protection

Microsoft GPO Bluetooth FEB 2009

Microsoft. (2009, February 9). Disabling Bluetooth and Infrared Beaming. Retrieved July 26, 2018.

Internal MISP references

UUID 27573597-5269-4894-87fb-24afcdb8f30a which can be used as unique global reference for Microsoft GPO Bluetooth FEB 2009 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-26T00:00:00Z
date_published 2009-02-09T00:00:00Z
source MITRE
title Disabling Bluetooth and Infrared Beaming

ITSyndicate Disabling PHP functions

Kondratiev, A. (n.d.). Disabling dangerous PHP functions. Retrieved July 26, 2021.

Internal MISP references

UUID 6e91f485-5777-4a06-94a3-cdc4718a8e39 which can be used as unique global reference for ITSyndicate Disabling PHP functions in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-07-26T00:00:00Z
source MITRE
title Disabling dangerous PHP functions

disable_notif_synology_ransom

TheDFIRReport. (2022, March 1). Disabling notifications on Synology servers before ransom. Retrieved September 12, 2024.

Internal MISP references

UUID d53e8f89-df78-565b-a316-cf2644c5ed36 which can be used as unique global reference for disable_notif_synology_ransom in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2022-03-01T00:00:00Z
source MITRE
title Disabling notifications on Synology servers before ransom

Krebs Discord Bookmarks 2023

Brian Krebs. (2023, May 30). Discord Admins Hacked by Malicious Bookmarks. Retrieved January 2, 2024.

Internal MISP references

UUID 1d0a21f4-9a8e-5514-894a-3d55263ff973 which can be used as unique global reference for Krebs Discord Bookmarks 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-02T00:00:00Z
date_published 2023-05-30T00:00:00Z
source MITRE
title Discord Admins Hacked by Malicious Bookmarks

Diskshadow

Microsoft Windows Server. (2023, February 3). Diskshadow. Retrieved November 21, 2023.

Internal MISP references

UUID 9e8b57a5-7e31-5add-ac3e-8b9c0f7f27aa which can be used as unique global reference for Diskshadow in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-11-21T00:00:00Z
date_published 2023-02-03T00:00:00Z
source MITRE
title Diskshadow

Diskshadow.exe - LOLBAS Project

LOLBAS. (2018, May 25). Diskshadow.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 27a3f0b4-e699-4319-8b52-8eae4581faa2 which can be used as unique global reference for Diskshadow.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Diskshadow.exe

OpenAI-CTI

OpenAI. (2024, February 14). Disrupting malicious uses of AI by state-affiliated threat actors. Retrieved September 12, 2024.

Internal MISP references

UUID d8f576cb-0afc-54a7-a449-570c4311ef7a which can be used as unique global reference for OpenAI-CTI in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2024-02-14T00:00:00Z
source MITRE
title Disrupting malicious uses of AI by state-affiliated threat actors

Microsoft Star Blizzard August 2022

Microsoft Threat Intelligence. (2022, August 15). Disrupting SEABORGIUM’s ongoing phishing operations. Retrieved June 13, 2024.

Internal MISP references

UUID d5fc25ad-2337-55f5-9eac-050178a533d6 which can be used as unique global reference for Microsoft Star Blizzard August 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-13T00:00:00Z
date_published 2022-08-15T00:00:00Z
source MITRE
title Disrupting SEABORGIUM’s ongoing phishing operations

Bitdefender FunnyDream Campaign November 2020

Vrabie, V. (2020, November). Dissecting a Chinese APT Targeting South Eastern Asian Government Institutions. Retrieved September 19, 2022.

Internal MISP references

UUID b62a9f2c-02ca-4dfa-95fc-5dc6ad9568de which can be used as unique global reference for Bitdefender FunnyDream Campaign November 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-19T00:00:00Z
date_published 2020-11-01T00:00:00Z
source MITRE
title Dissecting a Chinese APT Targeting South Eastern Asian Government Institutions

FireEye NETWIRE March 2019

Maniath, S. and Kadam P. (2019, March 19). Dissecting a NETWIRE Phishing Campaign's Usage of Process Hollowing. Retrieved January 7, 2021.

Internal MISP references

UUID 404d4f7e-62de-4483-9320-a90fb255e783 which can be used as unique global reference for FireEye NETWIRE March 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-07T00:00:00Z
date_published 2019-03-19T00:00:00Z
source MITRE
title Dissecting a NETWIRE Phishing Campaign's Usage of Process Hollowing

Cybereason Dissecting DGAs

Sternfeld, U. (2016). Dissecting Domain Generation Algorithms: Eight Real World DGA Variants. Retrieved February 18, 2019.

Internal MISP references

UUID 9888cdb6-fe85-49b4-937c-75005ac9660d which can be used as unique global reference for Cybereason Dissecting DGAs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-18T00:00:00Z
date_published 2016-01-01T00:00:00Z
source MITRE
title Dissecting Domain Generation Algorithms: Eight Real World DGA Variants

FireEye POSHSPY April 2017

Dunwoody, M.. (2017, April 3). Dissecting One of APT29’s Fileless WMI and PowerShell Backdoors (POSHSPY). Retrieved April 5, 2017.

Internal MISP references

UUID b1271e05-80d7-4761-a13f-b6f0db7d7e5a which can be used as unique global reference for FireEye POSHSPY April 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-04-05T00:00:00Z
date_published 2017-04-03T00:00:00Z
source MITRE
title Dissecting One of APT29’s Fileless WMI and PowerShell Backdoors (POSHSPY)

Bleeping Computer Stealer Logs 2023

Flare. (2023, June 6). Dissecting the Dark Web Supply Chain: Stealer Logs in Context. Retrieved October 10, 2024.

Internal MISP references

UUID 3bcbc294-91f1-56af-9eb9-9ce556c09602 which can be used as unique global reference for Bleeping Computer Stealer Logs 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-10T00:00:00Z
date_published 2023-06-06T00:00:00Z
source MITRE
title Dissecting the Dark Web Supply Chain: Stealer Logs in Context

Microsoft DTC

Microsoft. (2011, January 12). Distributed Transaction Coordinator. Retrieved February 25, 2016.

Internal MISP references

UUID d2a1aab3-a4c9-4583-9cf8-170eeb77d828 which can be used as unique global reference for Microsoft DTC in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-02-25T00:00:00Z
date_published 2011-01-12T00:00:00Z
source MITRE
title Distributed Transaction Coordinator

Mandiant UNC4841 August 29 2023

Austin Larsen, John Palmisano, John Wolfram, Mathew Potaczek, Michael Raggi. (2023, August 29). Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation. Retrieved October 24, 2024.

Internal MISP references

UUID f990745d-06c1-4b0a-8394-66c7a3cf0818 which can be used as unique global reference for Mandiant UNC4841 August 29 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-24T00:00:00Z
date_published 2023-08-29T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation

Mandiant Search Order

Mandiant. (2010, August 31). DLL Search Order Hijacking Revisited. Retrieved December 5, 2014.

Internal MISP references

UUID 2f602a6c-0305-457c-b329-a17b55d8e094 which can be used as unique global reference for Mandiant Search Order in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-12-05T00:00:00Z
date_published 2010-08-31T00:00:00Z
source MITRE
title DLL Search Order Hijacking Revisited

FireEye DLL Search Order Hijacking

Nick Harbour. (2010, September 1). DLL Search Order Hijacking Revisited. Retrieved March 13, 2020.

Internal MISP references

UUID 0ba2675d-4d7f-406a-81fa-b87e62d7a539 which can be used as unique global reference for FireEye DLL Search Order Hijacking in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-13T00:00:00Z
date_published 2010-09-01T00:00:00Z
source MITRE
title DLL Search Order Hijacking Revisited

Stewart 2014

Stewart, A. (2014). DLL SIDE-LOADING: A Thorn in the Side of the Anti-Virus Industry. Retrieved November 12, 2014.

Internal MISP references

UUID 813905b5-7aa5-4bab-b2ac-eaafdea55805 which can be used as unique global reference for Stewart 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-12T00:00:00Z
date_published 2014-01-01T00:00:00Z
source MITRE
title DLL SIDE-LOADING: A Thorn in the Side of the Anti-Virus Industry

Dnscmd.exe - LOLBAS Project

LOLBAS. (2018, May 25). Dnscmd.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 3571ca9d-3388-4e74-8b30-dd92ef2b5f10 which can be used as unique global reference for Dnscmd.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Dnscmd.exe

Dnscmd Microsoft

Microsoft. (2023, February 3). Dnscmd Microsoft. Retrieved July 11, 2023.

Internal MISP references

UUID 24b1cb7b-357f-470f-9715-fa0ec3958cbb which can be used as unique global reference for Dnscmd Microsoft in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-11T00:00:00Z
date_published 2023-02-03T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Dnscmd Microsoft

DNS Dumpster

Hacker Target. (n.d.). DNS Dumpster. Retrieved October 20, 2020.

Internal MISP references

UUID 0bbe1e50-28af-4265-a493-4bb4fd693bad which can be used as unique global reference for DNS Dumpster in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
source MITRE
title DNS Dumpster

Talos DNSpionage Nov 2018

Mercer, W., Rascagneres, P. (2018, November 27). DNSpionage Campaign Targets Middle East. Retrieved October 9, 2020.

Internal MISP references

UUID d597ad7d-f808-4289-b42a-79807248c2d6 which can be used as unique global reference for Talos DNSpionage Nov 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-09T00:00:00Z
date_published 2018-11-27T00:00:00Z
source MITRE
title DNSpionage Campaign Targets Middle East

DNS-msft

Microsoft. (2022). DNS Policies Overview. Retrieved June 6, 2024.

Internal MISP references

UUID bb420420-d03c-53b9-8bd9-e4357df8930a which can be used as unique global reference for DNS-msft in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-06T00:00:00Z
date_published 2022-01-01T00:00:00Z
source MITRE
title DNS Policies Overview

Unit42 DNS Mar 2019

Hinchliffe, A. (2019, March 15). DNS Tunneling: how DNS can be (ab)used by malicious actors. Retrieved October 3, 2020.

Internal MISP references

UUID e41fde80-5ced-4f66-9852-392d1ef79520 which can be used as unique global reference for Unit42 DNS Mar 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-03T00:00:00Z
date_published 2019-03-15T00:00:00Z
source MITRE
title DNS Tunneling: how DNS can be (ab)used by malicious actors

DNS-CISA

CISA. (2016, September 29). DNS Zone Transfer AXFR Requests May Leak Domain Information. Retrieved June 5, 2024.

Internal MISP references

UUID bc24500a-500c-5e08-90ec-6fbb39b0b74c which can be used as unique global reference for DNS-CISA in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-05T00:00:00Z
date_published 2016-09-29T00:00:00Z
source MITRE
title DNS Zone Transfer AXFR Requests May Leak Domain Information

dnx.exe - LOLBAS Project

LOLBAS. (2018, May 25). dnx.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 50652a27-c47b-41d4-a2eb-2ebf74e5bd09 which can be used as unique global reference for dnx.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title dnx.exe

GTFOBins Docker

GTFOBins. (n.d.). docker. Retrieved February 15, 2024.

Internal MISP references

UUID c4fa5825-85f9-5ab1-a59d-a86b20ef0570 which can be used as unique global reference for GTFOBins Docker in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-15T00:00:00Z
source MITRE
title docker

Docker Daemon CLI

Docker. (n.d.). DockerD CLI. Retrieved March 29, 2021.

Internal MISP references

UUID ea86eae4-6ad4-4d79-9dd3-dd965a7feb5c which can be used as unique global reference for Docker Daemon CLI in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-29T00:00:00Z
source MITRE
title DockerD CLI

Docker API

Docker. (n.d.). Docker Engine API v1.41 Reference. Retrieved March 31, 2021.

Internal MISP references

UUID b8ec1e37-7286-40e8-9577-ff9c54801086 which can be used as unique global reference for Docker API in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-31T00:00:00Z
source MITRE
title Docker Engine API v1.41 Reference

Docker Build Image

Docker. ( null). Docker Engine API v1.41 Reference - Build an Image. Retrieved March 30, 2021.

Internal MISP references

UUID ee708b64-57f3-4b47-af05-1e26b698c21f which can be used as unique global reference for Docker Build Image in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-30T00:00:00Z
source MITRE
title Docker Engine API v1.41 Reference - Build an Image

Docker Containers API

Docker. (n.d.). Docker Engine API v1.41 Reference - Container. Retrieved March 29, 2021.

Internal MISP references

UUID 2351cb32-23d6-4557-9c52-e6e228402bab which can be used as unique global reference for Docker Containers API in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-29T00:00:00Z
source MITRE
title Docker Engine API v1.41 Reference - Container

Docker Exec

Docker. (n.d.). Docker Exec. Retrieved March 29, 2021.

Internal MISP references

UUID 5f1ace27-6584-4585-98de-52cb71d419c1 which can be used as unique global reference for Docker Exec in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-29T00:00:00Z
source MITRE
title Docker Exec

Docker Images

Docker. (n.d.). Docker Images. Retrieved April 6, 2021.

Internal MISP references

UUID 9b4d1e80-61e9-4557-a562-5eda66d0bbf7 which can be used as unique global reference for Docker Images in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-06T00:00:00Z
source MITRE
title Docker Images

Docker Overview

Docker. (n.d.). Docker Overview. Retrieved March 30, 2021.

Internal MISP references

UUID 52954bb1-16b0-4717-a72c-8a6dec97610b which can be used as unique global reference for Docker Overview in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-30T00:00:00Z
source MITRE
title Docker Overview

Docker Entrypoint

Docker. (n.d.). Docker run reference. Retrieved March 29, 2021.

Internal MISP references

UUID c80ad3fd-d7fc-4a7a-8565-da3feaa4a915 which can be used as unique global reference for Docker Entrypoint in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-29T00:00:00Z
source MITRE
title Docker run reference

TechNet Server Operator Scheduled Task

Microsoft. (2012, November 15). Domain controller: Allow server operators to schedule tasks. Retrieved December 18, 2017.

Internal MISP references

UUID a9497afa-42c8-499e-a6b6-4231b1c22f6e which can be used as unique global reference for TechNet Server Operator Scheduled Task in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-18T00:00:00Z
date_published 2012-11-15T00:00:00Z
source MITRE
title Domain controller: Allow server operators to schedule tasks

Cisco Umbrella DGA

Scarfo, A. (2016, October 10). Domain Generation Algorithms – Why so effective?. Retrieved February 18, 2019.

Internal MISP references

UUID 5dbe2bcb-40b9-4ff8-a37a-0893a7a6cb58 which can be used as unique global reference for Cisco Umbrella DGA in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-18T00:00:00Z
date_published 2016-10-10T00:00:00Z
source MITRE
title Domain Generation Algorithms – Why so effective?

Microsoft GetAllTrustRelationships

Microsoft. (n.d.). Domain.GetAllTrustRelationships Method. Retrieved February 14, 2019.

Internal MISP references

UUID 571086ce-42d3-4416-9521-315f694647a6 which can be used as unique global reference for Microsoft GetAllTrustRelationships in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-14T00:00:00Z
source MITRE
title Domain.GetAllTrustRelationships Method

ICANNDomainNameHijacking

ICANN Security and Stability Advisory Committee. (2005, July 12). Domain Name Hijacking: Incidents, Threats, Risks and Remediation. Retrieved March 6, 2017.

Internal MISP references

UUID 96c5ec6c-d53d-49c3-bca1-0b6abe0080e6 which can be used as unique global reference for ICANNDomainNameHijacking in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-06T00:00:00Z
date_published 2005-07-12T00:00:00Z
source MITRE
title Domain Name Hijacking: Incidents, Threats, Risks and Remediation

Palo Alto Unit 42 Domain Shadowing 2022

Janos Szurdi, Rebekah Houser and Daiping Liu. (2022, September 21). Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime. Retrieved March 7, 2023.

Internal MISP references

UUID ec460017-fd25-5975-b697-c8c11fee960d which can be used as unique global reference for Palo Alto Unit 42 Domain Shadowing 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-07T00:00:00Z
date_published 2022-09-21T00:00:00Z
source MITRE
title Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime

ASERT Donot March 2018

Schwarz, D., Sopko J. (2018, March 08). Donot Team Leverages New Modular Malware Framework in South Asia. Retrieved June 11, 2018.

Internal MISP references

UUID a1b987cc-7789-411c-9673-3cf6357b207c which can be used as unique global reference for ASERT Donot March 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-06-11T00:00:00Z
date_published 2018-03-08T00:00:00Z
source MITRE
title Donot Team Leverages New Modular Malware Framework in South Asia

mandiant-masking

Simonian, Nick. (2023, May 22). Don't @ Me: URL Obfuscation Through Schema Abuse. Retrieved January 17, 2024.

Internal MISP references

UUID d5ed4c98-6d37-5000-bba0-9aada295a50c which can be used as unique global reference for mandiant-masking in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-17T00:00:00Z
date_published 2023-05-22T00:00:00Z
source MITRE
title Don't @ Me: URL Obfuscation Through Schema Abuse

Mandiant URL Obfuscation 2023

Nick Simonian. (2023, May 22). Don't @ Me: URL Obfuscation Through Schema Abuse. Retrieved August 4, 2023.

Internal MISP references

UUID b63f5934-2ace-5326-89be-7a850469a563 which can be used as unique global reference for Mandiant URL Obfuscation 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-04T00:00:00Z
date_published 2023-05-22T00:00:00Z
source MITRE
title Don't @ Me: URL Obfuscation Through Schema Abuse

Schema-abuse

Nick Simonian. (2023, May 22). Don't @ Me: URL Obfuscation Through Schema Abuse. Retrieved February 13, 2024.

Internal MISP references

UUID 75b860d9-a48d-57de-ba1e-b0db970abb1b which can be used as unique global reference for Schema-abuse in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-13T00:00:00Z
date_published 2023-05-22T00:00:00Z
source MITRE
title Don't @ Me: URL Obfuscation Through Schema Abuse

Donut Github

TheWover. (2019, May 9). donut. Retrieved March 25, 2022.

Internal MISP references

UUID 5f28c41f-6903-4779-93d4-3de99e031b70 which can be used as unique global reference for Donut Github in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-25T00:00:00Z
date_published 2019-05-09T00:00:00Z
source MITRE
title donut

Introducing Donut

The Wover. (2019, May 9). Donut - Injecting .NET Assemblies as Shellcode. Retrieved October 4, 2021.

Internal MISP references

UUID 8fd099c6-e002-44d0-8b7f-65f290a42c07 which can be used as unique global reference for Introducing Donut in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-04T00:00:00Z
date_published 2019-05-09T00:00:00Z
source MITRE
title Donut - Injecting .NET Assemblies as Shellcode

Dotnet.exe - LOLBAS Project

LOLBAS. (2019, November 12). Dotnet.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 8abe21ad-88d1-4a5c-b79e-8216b4b06862 which can be used as unique global reference for Dotnet.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2019-11-12T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Dotnet.exe

cyberproof-double-bounce

Itkin, Liora. (2022, September 1). Double-bounced attacks with email spoofing . Retrieved February 24, 2023.

Internal MISP references

UUID 4406d688-c392-5244-b438-6995f38dfc61 which can be used as unique global reference for cyberproof-double-bounce in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-24T00:00:00Z
date_published 2022-09-01T00:00:00Z
source MITRE
title Double-bounced attacks with email spoofing

FireEye APT41 Aug 2019

Fraser, N., et al. (2019, August 7). Double DragonAPT41, a dual espionage and cyber crime operation APT41. Retrieved September 23, 2019.

Internal MISP references

UUID 20f8e252-0a95-4ebd-857c-d05b0cde0904 which can be used as unique global reference for FireEye APT41 Aug 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-23T00:00:00Z
date_published 2019-08-07T00:00:00Z
source MITRE, Tidal Cyber
title Double DragonAPT41, a dual espionage and cyber crime operation APT41

FireEye APT41 2019

FireEye. (2019). Double DragonAPT41, a dual espionage andcyber crime operationAPT41. Retrieved September 23, 2019.

Internal MISP references

UUID daa31f35-15a6-413b-9319-80d6921d1598 which can be used as unique global reference for FireEye APT41 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-23T00:00:00Z
date_published 2019-01-01T00:00:00Z
source MITRE
title Double DragonAPT41, a dual espionage andcyber crime operationAPT41

Malwarebytes IssacWiper CaddyWiper March 2022

Threat Intelligence Team. (2022, March 18). Double header: IsaacWiper and CaddyWiper . Retrieved April 11, 2022.

Internal MISP references

UUID 931aed95-a629-4f94-8762-aad580f5d3e2 which can be used as unique global reference for Malwarebytes IssacWiper CaddyWiper March 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-11T00:00:00Z
date_published 2022-03-18T00:00:00Z
source MITRE
title Double header: IsaacWiper and CaddyWiper

Crowdstrike-leaks

Crowdstrike. (2020, September 24). Double Trouble: Ransomware with Data Leak Extortion, Part 1. Retrieved December 6, 2023.

Internal MISP references

UUID a91c3252-94b8-52a8-bb0d-cadac6afa161 which can be used as unique global reference for Crowdstrike-leaks in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-06T00:00:00Z
date_published 2020-09-24T00:00:00Z
source MITRE
title Double Trouble: Ransomware with Data Leak Extortion, Part 1

tlseminar_downgrade_att

Team Cinnamon. (2017, February 3). Downgrade Attacks. Retrieved December 9, 2021.

Internal MISP references

UUID 8b5d46bf-fb4e-4ecd-b8a9-9c084c1864a3 which can be used as unique global reference for tlseminar_downgrade_att in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-12-09T00:00:00Z
date_published 2017-02-03T00:00:00Z
source MITRE
title Downgrade Attacks

LogRhythm Do You Trust Oct 2014

Foss, G. (2014, October 3). Do You Trust Your Computer?. Retrieved December 17, 2018.

Internal MISP references

UUID 88a84f9a-e077-4fdd-9936-30fc7b290476 which can be used as unique global reference for LogRhythm Do You Trust Oct 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-12-17T00:00:00Z
date_published 2014-10-03T00:00:00Z
source MITRE
title Do You Trust Your Computer?

VNC Vulnerabilities

Sergiu Gatlan. (2019, November 22). Dozens of VNC Vulnerabilities Found in Linux, Windows Solutions. Retrieved September 20, 2021.

Internal MISP references

UUID 3ec5440a-cb3b-4aa9-8e0e-0f92525ef51c which can be used as unique global reference for VNC Vulnerabilities in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-20T00:00:00Z
date_published 2019-11-22T00:00:00Z
source MITRE
title Dozens of VNC Vulnerabilities Found in Linux, Windows Solutions

Accenture Dragonfish Jan 2018

Accenture Security. (2018, January 27). DRAGONFISH DELIVERS NEW FORM OF ELISE MALWARE TARGETING ASEAN DEFENCE MINISTERS’ MEETING AND ASSOCIATES. Retrieved November 14, 2018.

Internal MISP references

UUID f692c6fa-7b3a-4d1d-9002-b1a59f7116f4 which can be used as unique global reference for Accenture Dragonfish Jan 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-14T00:00:00Z
date_published 2018-01-27T00:00:00Z
source MITRE
title DRAGONFISH DELIVERS NEW FORM OF ELISE MALWARE TARGETING ASEAN DEFENCE MINISTERS’ MEETING AND ASSOCIATES

Symantec Dragonfly

Symantec Security Response. (2014, June 30). Dragonfly: Cyberespionage Attacks Against Energy Suppliers. Retrieved April 8, 2016.

Internal MISP references

UUID 9514c5cd-2ed6-4dbf-aa9e-1c425e969226 which can be used as unique global reference for Symantec Dragonfly in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-08T00:00:00Z
date_published 2014-06-30T00:00:00Z
source MITRE, Tidal Cyber
title Dragonfly: Cyberespionage Attacks Against Energy Suppliers

Symantec Dragonfly 2.0 October 2017

Symantec. (2017, October 7). Dragonfly: Western energy sector targeted by sophisticated attack group. Retrieved April 19, 2022.

Internal MISP references

UUID a0439d4a-a3ea-4be5-9a01-f223ca259681 which can be used as unique global reference for Symantec Dragonfly 2.0 October 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-19T00:00:00Z
date_published 2017-10-07T00:00:00Z
source MITRE
title Dragonfly: Western energy sector targeted by sophisticated attack group

Symantec Dragonfly Sept 2017

Symantec Security Response. (2014, July 7). Dragonfly: Western energy sector targeted by sophisticated attack group. Retrieved September 9, 2017.

Internal MISP references

UUID 11bbeafc-ed5d-4d2b-9795-a0a9544fb64e which can be used as unique global reference for Symantec Dragonfly Sept 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-09-09T00:00:00Z
date_published 2014-07-07T00:00:00Z
source MITRE
title Dragonfly: Western energy sector targeted by sophisticated attack group

Kaspersky Dridex May 2017

Slepogin, N. (2017, May 25). Dridex: A History of Evolution. Retrieved May 31, 2019.

Internal MISP references

UUID 52c48bc3-2b53-4214-85c3-7e5dd036c969 which can be used as unique global reference for Kaspersky Dridex May 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-05-31T00:00:00Z
date_published 2017-05-25T00:00:00Z
source MITRE
title Dridex: A History of Evolution

Dell Dridex Oct 2015

Dell SecureWorks Counter Threat Unit Threat Intelligence. (2015, October 13). Dridex (Bugat v5) Botnet Takeover Operation. Retrieved May 31, 2019.

Internal MISP references

UUID f81ce947-d875-4631-9709-b54c8b5d25bc which can be used as unique global reference for Dell Dridex Oct 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-05-31T00:00:00Z
date_published 2015-10-13T00:00:00Z
source MITRE
title Dridex (Bugat v5) Botnet Takeover Operation

Red Canary Dridex Threat Report 2021

Red Canary. (2021, February 9). Dridex - Red Canary Threat Detection Report. Retrieved August 3, 2023.

Internal MISP references

UUID 3be25132-6655-5fa9-92cb-772d02f49d2b which can be used as unique global reference for Red Canary Dridex Threat Report 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-03T00:00:00Z
date_published 2021-02-09T00:00:00Z
source MITRE
title Dridex - Red Canary Threat Detection Report

volexity_0day_sophos_FW

Adair, S., Lancaster, T., Volexity Threat Research. (2022, June 15). DriftingCloud: Zero-Day Sophos Firewall Exploitation and an Insidious Breach. Retrieved July 1, 2022.

Internal MISP references

UUID 85bee18e-216d-4ea6-b34e-b071e3f63382 which can be used as unique global reference for volexity_0day_sophos_FW in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-01T00:00:00Z
date_published 2022-06-15T00:00:00Z
source MITRE
title DriftingCloud: Zero-Day Sophos Firewall Exploitation and an Insidious Breach

Google Drive Log Events

Google. (n.d.). Drive log events. Retrieved March 4, 2024.

Internal MISP references

UUID f546898e-3639-58f4-85a2-6268dfaab207 which can be used as unique global reference for Google Drive Log Events in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-04T00:00:00Z
source MITRE
title Drive log events

Microsoft Driverquery

Microsoft. (n.d.). driverquery. Retrieved March 28, 2023.

Internal MISP references

UUID 7302dc00-a75a-5787-a04c-88ef4922ac09 which can be used as unique global reference for Microsoft Driverquery in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-28T00:00:00Z
source MITRE
title driverquery

Dropbox Malware Sync

David Talbot. (2013, August 21). Dropbox and Similar Services Can Sync Malware. Retrieved May 31, 2023.

Internal MISP references

UUID 06ca63fa-8c6c-501c-96d3-5e7e45ca1e04 which can be used as unique global reference for Dropbox Malware Sync in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-31T00:00:00Z
date_published 2013-08-21T00:00:00Z
source MITRE
title Dropbox and Similar Services Can Sync Malware

Cyberreason Anchor December 2019

Dahan, A. et al. (2019, December 11). DROPPING ANCHOR: FROM A TRICKBOT INFECTION TO THE DISCOVERY OF THE ANCHOR MALWARE. Retrieved September 10, 2020.

Internal MISP references

UUID a8dc5598-9963-4a1d-a473-bee8d2c72c57 which can be used as unique global reference for Cyberreason Anchor December 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-10T00:00:00Z
date_published 2019-12-11T00:00:00Z
source MITRE
title DROPPING ANCHOR: FROM A TRICKBOT INFECTION TO THE DISCOVERY OF THE ANCHOR MALWARE

Samba DRSUAPI

SambaWiki. (n.d.). DRSUAPI. Retrieved December 4, 2017.

Internal MISP references

UUID 79e8f598-9962-4124-b884-eb10f86885af which can be used as unique global reference for Samba DRSUAPI in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-04T00:00:00Z
source MITRE
title DRSUAPI

dsdbutil.exe - LOLBAS Project

LOLBAS. (2023, May 31). dsdbutil.exe. Retrieved December 4, 2023.

Internal MISP references

UUID fc982faf-a37d-4d0b-949c-f7a27adc3030 which can be used as unique global reference for dsdbutil.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2023-05-31T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title dsdbutil.exe

TechNet Dsquery

Microsoft. (n.d.). Dsquery. Retrieved April 18, 2016.

Internal MISP references

UUID bbbb4a45-2963-4f04-901a-fb2752800e12 which can be used as unique global reference for TechNet Dsquery in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-18T00:00:00Z
source MITRE
title Dsquery

CyberBit Dtrack

Hod Gavriel. (2019, November 21). Dtrack: In-depth analysis of APT on a nuclear power plant. Retrieved January 20, 2021.

Internal MISP references

UUID 1ac944f4-868c-4312-8b5d-1580fd6542a0 which can be used as unique global reference for CyberBit Dtrack in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-20T00:00:00Z
date_published 2019-11-21T00:00:00Z
source MITRE
title Dtrack: In-depth analysis of APT on a nuclear power plant

Kaspersky Dtrack

Kaspersky Global Research and Analysis Team. (2019, September 23). DTrack: previously unknown spy-tool by Lazarus hits financial institutions and research centers. Retrieved January 20, 2021.

Internal MISP references

UUID 0122ee35-938d-493f-a3bb-bc75fc808f62 which can be used as unique global reference for Kaspersky Dtrack in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-20T00:00:00Z
date_published 2019-09-23T00:00:00Z
source MITRE
title DTrack: previously unknown spy-tool by Lazarus hits financial institutions and research centers

Crowdstrike Qakbot October 2020

CS. (2020, October 7). Duck Hunting with Falcon Complete: A Fowl Banking Trojan Evolves, Part 2. Retrieved September 27, 2021.

Internal MISP references

UUID 636a9b94-8260-45cc-bd74-a764cd8f50b0 which can be used as unique global reference for Crowdstrike Qakbot October 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-27T00:00:00Z
date_published 2020-10-07T00:00:00Z
source MITRE
title Duck Hunting with Falcon Complete: A Fowl Banking Trojan Evolves, Part 2

Dump64.exe - LOLBAS Project

LOLBAS. (2021, November 16). Dump64.exe. Retrieved December 4, 2023.

Internal MISP references

UUID b0186447-a6d5-40d7-a11d-ab2e9fb93087 which can be used as unique global reference for Dump64.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-11-16T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Dump64.exe

dump_pwd_dcsync

Metcalf, S. (2015, November 22). Dump Clear-Text Passwords for All Admins in the Domain Using Mimikatz DCSync. Retrieved November 15, 2021.

Internal MISP references

UUID bd1d7e75-feee-47fd-abfb-7e3dfc648a72 which can be used as unique global reference for dump_pwd_dcsync in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-11-15T00:00:00Z
date_published 2015-11-22T00:00:00Z
source MITRE
title Dump Clear-Text Passwords for All Admins in the Domain Using Mimikatz DCSync

ired mscache

Mantvydas Baranauskas. (2019, November 16). Dumping and Cracking mscash - Cached Domain Credentials. Retrieved February 21, 2020.

Internal MISP references

UUID 5b643e7d-1ace-4517-88c2-96115cac1209 which can be used as unique global reference for ired mscache in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-21T00:00:00Z
date_published 2019-11-16T00:00:00Z
source MITRE
title Dumping and Cracking mscash - Cached Domain Credentials

ired Dumping LSA Secrets

Mantvydas Baranauskas. (2019, November 16). Dumping LSA Secrets. Retrieved February 21, 2020.

Internal MISP references

UUID cf883397-11e9-4f94-977a-bbe46e3107f5 which can be used as unique global reference for ired Dumping LSA Secrets in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-21T00:00:00Z
date_published 2019-11-16T00:00:00Z
source MITRE
title Dumping LSA Secrets

DumpMinitool.exe - LOLBAS Project

LOLBAS. (2022, January 20). DumpMinitool.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 4634e025-c005-46fe-b97c-5d7dda455ba0 which can be used as unique global reference for DumpMinitool.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2022-01-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title DumpMinitool.exe

DuplicateToken function

Microsoft. (2021, October 12). DuplicateToken function (securitybaseapi.h). Retrieved January 8, 2024.

Internal MISP references

UUID fbf31bc2-7883-56fa-975f-d083288464dc which can be used as unique global reference for DuplicateToken function in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-08T00:00:00Z
date_published 2021-10-12T00:00:00Z
source MITRE
title DuplicateToken function (securitybaseapi.h)

Wikipedia Duqu

Wikipedia. (2017, December 29). Duqu. Retrieved April 10, 2018.

Internal MISP references

UUID 5cf0101e-c036-4c1c-b322-48f04e2aef0b which can be used as unique global reference for Wikipedia Duqu in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-10T00:00:00Z
date_published 2017-12-29T00:00:00Z
source MITRE
title Duqu

Dxcap.exe - LOLBAS Project

LOLBAS. (2018, May 25). Dxcap.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 7611eb7a-46b7-4c76-9728-67c1fbf20e17 which can be used as unique global reference for Dxcap.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Dxcap.exe

TheEvilBit DYLD_INSERT_LIBRARIES

Fitzl, C. (2019, July 9). DYLD_INSERT_LIBRARIES DYLIB injection in macOS / OSX. Retrieved March 26, 2020.

Internal MISP references

UUID bd27026c-81eb-480e-b092-f861472ac775 which can be used as unique global reference for TheEvilBit DYLD_INSERT_LIBRARIES in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-26T00:00:00Z
date_published 2019-07-09T00:00:00Z
source MITRE
title DYLD_INSERT_LIBRARIES DYLIB injection in macOS / OSX

Wardle Dylib Hijacking OSX 2015

Patrick Wardle. (2015, March 1). Dylib Hijacking on OS X. Retrieved March 29, 2021.

Internal MISP references

UUID c78d8c94-4fe3-4aa9-b879-f0b0e9d2714b which can be used as unique global reference for Wardle Dylib Hijacking OSX 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-29T00:00:00Z
date_published 2015-03-01T00:00:00Z
source MITRE
title Dylib Hijacking on OS X

Dragos DYMALLOY

Dragos. (n.d.). DYMALLOY. Retrieved August 20, 2020.

Internal MISP references

UUID d2785c6e-e0d1-4e90-a2d5-2c302176d5d3 which can be used as unique global reference for Dragos DYMALLOY in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-20T00:00:00Z
source MITRE
title DYMALLOY

MWRInfoSecurity Dynamic Hooking 2015

Hillman, M. (2015, August 8). Dynamic Hooking Techniques: User Mode. Retrieved December 20, 2017.

Internal MISP references

UUID 3cb6d0b1-4d6b-4f2d-bd7d-e4b2dcde081d which can be used as unique global reference for MWRInfoSecurity Dynamic Hooking 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-20T00:00:00Z
date_published 2015-08-08T00:00:00Z
source MITRE
title Dynamic Hooking Techniques: User Mode

rfc2131

Droms, R. (1997, March). Dynamic Host Configuration Protocol. Retrieved March 9, 2022.

Internal MISP references

UUID b16bd2d5-162b-44cb-a812-7becd6684021 which can be used as unique global reference for rfc2131 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-09T00:00:00Z
date_published 1997-03-01T00:00:00Z
source MITRE
title Dynamic Host Configuration Protocol

rfc3315

J. Bound, et al. (2003, July). Dynamic Host Configuration Protocol for IPv6 (DHCPv6). Retrieved June 27, 2022.

Internal MISP references

UUID 9349f864-79e9-4481-ad77-44099621795a which can be used as unique global reference for rfc3315 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-27T00:00:00Z
date_published 2003-07-01T00:00:00Z
source MITRE
title Dynamic Host Configuration Protocol for IPv6 (DHCPv6)

Microsoft DLL Redirection

Microsoft. (n.d.). Dynamic-Link Library Redirection. Retrieved December 5, 2014.

Internal MISP references

UUID ac60bb28-cb14-4ff9-bc05-df48273a28a9 which can be used as unique global reference for Microsoft DLL Redirection in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-12-05T00:00:00Z
source MITRE
title Dynamic-Link Library Redirection

Microsoft. (2018, May 31). Dynamic-Link Library Redirection. Retrieved March 13, 2020.

Internal MISP references

UUID 72458590-ee1b-4447-adb8-ca4f486d1db5 which can be used as unique global reference for Microsoft Dynamic-Link Library Redirection in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-13T00:00:00Z
date_published 2018-05-31T00:00:00Z
source MITRE
title Dynamic-Link Library Redirection

Microsoft. (n.d.). Dynamic-Link Library Search Order. Retrieved November 30, 2014.

Internal MISP references

UUID c157444d-bf2b-4806-b069-519122b7a459 which can be used as unique global reference for Microsoft DLL Search in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-30T00:00:00Z
source MITRE
title Dynamic-Link Library Search Order

Microsoft. (2018, May 31). Dynamic-Link Library Search Order. Retrieved November 30, 2014.

Internal MISP references

UUID 7b1f945b-2547-4bc6-98bf-30248bdf3587 which can be used as unique global reference for Microsoft Dynamic Link Library Search Order in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-30T00:00:00Z
date_published 2018-05-31T00:00:00Z
source MITRE
title Dynamic-Link Library Search Order

MSDN DLL Security

Microsoft. (n.d.). Dynamic-Link Library Security. Retrieved July 25, 2016.

Internal MISP references

UUID 5d1d1916-cef4-49d1-b8e2-a6d18fb297f6 which can be used as unique global reference for MSDN DLL Security in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-07-25T00:00:00Z
source MITRE
title Dynamic-Link Library Security

Microsoft DLL Security

Microsoft. (n.d.). Dynamic-Link Library Security. Retrieved November 27, 2017.

Internal MISP references

UUID 584490c7-b155-4f62-b68d-a5a2a1799e60 which can be used as unique global reference for Microsoft DLL Security in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-27T00:00:00Z
source MITRE
title Dynamic-Link Library Security

Microsoft. (n.d.). Dynamic-Link Library Security. Retrieved July 25, 2016.

Internal MISP references

UUID e087442a-0a53-4cc8-9fd6-772cbd0295d5 which can be used as unique global reference for Microsoft Dynamic-Link Library Security in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-07-25T00:00:00Z
source MITRE
title Dynamic-Link Library Security

Symantec Dyre June 2015

Symantec Security Response. (2015, June 23). Dyre: Emerging threat on financial fraud landscape. Retrieved August 23, 2018.

Internal MISP references

UUID a9780bb0-302f-44c2-8252-b53d94da24e6 which can be used as unique global reference for Symantec Dyre June 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-23T00:00:00Z
date_published 2015-06-23T00:00:00Z
source MITRE
title Dyre: Emerging threat on financial fraud landscape

EA Hacked via Slack - June 2021

Anthony Spadafora. (2021, June 11). EA hack reportedly used stolen cookies and Slack to target gaming giant. Retrieved May 31, 2022.

Internal MISP references

UUID 3362e1df-cfb9-4281-a0a1-9a3710d76945 which can be used as unique global reference for EA Hacked via Slack - June 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-31T00:00:00Z
date_published 2021-06-11T00:00:00Z
source MITRE
title EA hack reportedly used stolen cookies and Slack to target gaming giant

CrowdStrike StellarParticle January 2022

CrowdStrike. (2022, January 27). Early Bird Catches the Wormhole: Observations from the StellarParticle Campaign. Retrieved February 7, 2022.

Internal MISP references

UUID 149c1446-d6a1-4a63-9420-def9272d6cb9 which can be used as unique global reference for CrowdStrike StellarParticle January 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-07T00:00:00Z
date_published 2022-01-27T00:00:00Z
source MITRE
title Early Bird Catches the Wormhole: Observations from the StellarParticle Campaign

Trend Micro September 9 2024

Lenart Bermejo; Sunny Lu; Ted Lee Read time. (2024, September 9). Earth Preta Evolves its Attacks with New Malware and Strategies. Retrieved September 10, 2024.

Internal MISP references

UUID 0fdc9ee2-5be2-43e0-afb9-c9a94fde3867 which can be used as unique global reference for Trend Micro September 9 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-10T00:00:00Z
date_published 2024-09-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Earth Preta Evolves its Attacks with New Malware and Strategies

Trend Micro Muddy Water March 2021

Peretz, A. and Theck, E. (2021, March 5). Earth Vetala – MuddyWater Continues to Target Organizations in the Middle East. Retrieved March 18, 2021.

Internal MISP references

UUID 16b4b834-2f44-4bac-b810-f92080c41f09 which can be used as unique global reference for Trend Micro Muddy Water March 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-18T00:00:00Z
date_published 2021-03-05T00:00:00Z
source MITRE
title Earth Vetala – MuddyWater Continues to Target Organizations in the Middle East

Earthworm English Project Page

rootkiter. (2019, March 9). Earthworm. Retrieved July 7, 2023.

Internal MISP references

UUID 88170ef5-03ac-42f2-9b03-2ce204b5d45c which can be used as unique global reference for Earthworm English Project Page in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-07T00:00:00Z
date_published 2019-03-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Earthworm

ESET Ebury May 2024

Marc-Etienne M.Léveillé. (2024, May 1). Ebury is alive but unseen. Retrieved May 21, 2024.

Internal MISP references

UUID 7df9b7ed-ecac-5432-9fc2-8961fc315415 which can be used as unique global reference for ESET Ebury May 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-21T00:00:00Z
date_published 2024-05-01T00:00:00Z
source MITRE
title Ebury is alive but unseen

U.S. SEC. (n.d.). EDGAR - Search and Access. Retrieved August 27, 2021.

Internal MISP references

UUID 97958143-80c5-41f6-9fa6-4748e90e9f12 which can be used as unique global reference for SEC EDGAR Search in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-27T00:00:00Z
source MITRE
title EDGAR - Search and Access

Intrinsec Egregor Nov 2020

Bichet, J. (2020, November 12). Egregor – Prolock: Fraternal Twins ?. Retrieved January 6, 2021.

Internal MISP references

UUID e55604da-b419-411a-85cf-073f2d78e0c1 which can be used as unique global reference for Intrinsec Egregor Nov 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-06T00:00:00Z
date_published 2020-11-12T00:00:00Z
source MITRE
title Egregor – Prolock: Fraternal Twins ?

Cybereason Egregor Nov 2020

Rochberger, L. (2020, November 26). Cybereason vs. Egregor Ransomware. Retrieved December 30, 2020.

Internal MISP references

UUID c36b38d4-cfa2-4f1e-a410-6d629a24be62 which can be used as unique global reference for Cybereason Egregor Nov 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-30T00:00:00Z
source MITRE
title Egregor Ransomware

Cyble Egregor Oct 2020

Cybleinc. (2020, October 31). Egregor Ransomware – A Deep Dive Into Its Activities and Techniques. Retrieved December 29, 2020.

Internal MISP references

UUID 545a131d-88fc-4b34-923c-0b759b45fc7f which can be used as unique global reference for Cyble Egregor Oct 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-29T00:00:00Z
date_published 2020-10-31T00:00:00Z
source MITRE
title Egregor Ransomware – A Deep Dive Into Its Activities and Techniques

NHS Digital Egregor Nov 2020

NHS Digital. (2020, November 26). Egregor Ransomware The RaaS successor to Maze. Retrieved December 29, 2020.

Internal MISP references

UUID 92f74037-2a20-4667-820d-2ccc0e4dbd3d which can be used as unique global reference for NHS Digital Egregor Nov 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-29T00:00:00Z
date_published 2020-11-26T00:00:00Z
source MITRE
title Egregor Ransomware The RaaS successor to Maze

Security Boulevard Egregor Oct 2020

Meskauskas, T.. (2020, October 29). Egregor: Sekhmet’s Cousin. Retrieved January 6, 2021.

Internal MISP references

UUID cd37a000-9e15-45a3-a7c9-bb508c10e55d which can be used as unique global reference for Security Boulevard Egregor Oct 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-06T00:00:00Z
date_published 2020-10-29T00:00:00Z
source MITRE
title Egregor: Sekhmet’s Cousin

Cybersecurity and Infrastructure Security Agency. (2020, June 30). EINSTEIN Data Trends – 30-day Lookback. Retrieved October 25, 2023.

Internal MISP references

UUID b97e9a02-4cc5-4845-8058-0be4c566cd7c which can be used as unique global reference for U.S. CISA Trends June 30 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-25T00:00:00Z
date_published 2020-06-30T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title EINSTEIN Data Trends – 30-day Lookback

Dragos EKANS

Dragos. (2020, February 3). EKANS Ransomware and ICS Operations. Retrieved February 9, 2021.

Internal MISP references

UUID c8a018c5-caa3-4af1-b210-b65bbf94c8b2 which can be used as unique global reference for Dragos EKANS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-09T00:00:00Z
date_published 2020-02-03T00:00:00Z
source MITRE
title EKANS Ransomware and ICS Operations

Dark Reading July 9 2024

Nathan Eddy; Contributing Writer. (2024, July 9). Eldorado Ransomware Cruises Onto the Scene to Target VMware ESXi. Retrieved July 15, 2024.

Internal MISP references

UUID cec05996-84a1-4c07-86eb-d72f8c6d9362 which can be used as unique global reference for Dark Reading July 9 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-15T00:00:00Z
date_published 2024-07-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Eldorado Ransomware Cruises Onto the Scene to Target VMware ESXi

Group-IB July 3 2024

Nikolay Kichatov Cyber Intelligence Analyst; Group-IB. (2024, July 3). Eldorado Ransomware The New Golden Empire of Cybercrime . Retrieved July 15, 2024.

Internal MISP references

UUID 50148a85-314c-4b29-bdfc-913ab647dadf which can be used as unique global reference for Group-IB July 3 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-15T00:00:00Z
date_published 2024-07-03T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Eldorado Ransomware The New Golden Empire of Cybercrime

EldoS RawDisk ITpro

Edwards, M. (2007, March 14). EldoS Provides Raw Disk Access for Vista and XP. Retrieved March 26, 2019.

Internal MISP references

UUID a6cf3d1d-2310-42bb-9324-495b4e94d329 which can be used as unique global reference for EldoS RawDisk ITpro in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-26T00:00:00Z
date_published 2007-03-14T00:00:00Z
source MITRE
title EldoS Provides Raw Disk Access for Vista and XP

Microsoft Targeting Elections September 2020

Burt, T. (2020, September 10). New cyberattacks targeting U.S. elections. Retrieved March 24, 2021.

Internal MISP references

UUID 1d7070fd-01be-4776-bb21-13368a6173b1 which can be used as unique global reference for Microsoft Targeting Elections September 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-24T00:00:00Z
source MITRE, Tidal Cyber
title elections

Secureworks IRON RITUAL USAID Phish May 2021

Secureworks CTU. (2021, May 28). USAID-Themed Phishing Campaign Leverages U.S. Elections Lure. Retrieved February 24, 2022.

Internal MISP references

UUID 0d42c329-5847-4970-9580-2318a566df4e which can be used as unique global reference for Secureworks IRON RITUAL USAID Phish May 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-24T00:00:00Z
source MITRE
title Elections Lure

Electron Security

ElectronJS.org. (n.d.). Retrieved March 7, 2024.

Internal MISP references

UUID e44c8abf-77c1-5e19-93e6-99397d7eaa41 which can be used as unique global reference for Electron Security in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-07T00:00:00Z
source MITRE
title Electron Security

Dragos-Sandworm-Ukraine-2022

Dragos, Inc.. (2023, December 11). ELECTRUM Targeted Ukrainian Electric Entity Using Custom Tools and CaddyWiper Malware, October 2022. Retrieved March 28, 2024.

Internal MISP references

UUID a17aa1b1-cda4-5aeb-b401-f4fd47d29f93 which can be used as unique global reference for Dragos-Sandworm-Ukraine-2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-28T00:00:00Z
date_published 2023-12-11T00:00:00Z
source MITRE
title ELECTRUM Targeted Ukrainian Electric Entity Using Custom Tools and CaddyWiper Malware, October 2022

Dragos ELECTRUM

Dragos. (2017, January 1). ELECTRUM Threat Profile. Retrieved June 10, 2020.

Internal MISP references

UUID 494f7056-7a39-4fa0-958d-fb1172d01852 which can be used as unique global reference for Dragos ELECTRUM in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-10T00:00:00Z
date_published 2017-01-01T00:00:00Z
source MITRE
title ELECTRUM Threat Profile

Symantec Elfin Mar 2019

Security Response attack Investigation Team. (2019, March 27). Elfin: Relentless Espionage Group Targets Multiple Organizations in Saudi Arabia and U.S.. Retrieved April 10, 2019.

Internal MISP references

UUID 55671ede-f309-4924-a1b4-3d597517b27e which can be used as unique global reference for Symantec Elfin Mar 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-10T00:00:00Z
date_published 2019-03-27T00:00:00Z
source MITRE
title Elfin: Relentless Espionage Group Targets Multiple Organizations in Saudi Arabia and U.S.

Backtrace VDSO

backtrace. (2016, April 22). ELF SHARED LIBRARY INJECTION FORENSICS. Retrieved June 15, 2020.

Internal MISP references

UUID 1c8fa804-6579-4e68-a0b3-d16e0bee5654 which can be used as unique global reference for Backtrace VDSO in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-15T00:00:00Z
date_published 2016-04-22T00:00:00Z
source MITRE
title ELF SHARED LIBRARY INJECTION FORENSICS

Securelist Machete Aug 2014

Kaspersky Global Research and Analysis Team. (2014, August 20). El Machete. Retrieved September 13, 2019.

Internal MISP references

UUID fc7be240-bd15-4ec4-bc01-f8891d7210d9 which can be used as unique global reference for Securelist Machete Aug 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-13T00:00:00Z
date_published 2014-08-20T00:00:00Z
source MITRE, Tidal Cyber
title El Machete

Cylance Machete Mar 2017

The Cylance Threat Research Team. (2017, March 22). El Machete's Malware Attacks Cut Through LATAM. Retrieved September 13, 2019.

Internal MISP references

UUID 92a9a311-1e0b-4819-9856-2dfc8dbfc08d which can be used as unique global reference for Cylance Machete Mar 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-13T00:00:00Z
date_published 2017-03-22T00:00:00Z
source MITRE, Tidal Cyber
title El Machete's Malware Attacks Cut Through LATAM

Sophos News September 24 2020

Sophos News. (2020, September 24). Email-delivered MoDi RAT attack pastes PowerShell commands. Retrieved May 7, 2023.

Internal MISP references

UUID 8cfa3dc4-a6b4-4204-b1e5-5b325955936d which can be used as unique global reference for Sophos News September 24 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2020-09-24T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Email-delivered MoDi RAT attack pastes PowerShell commands

Power Automate Email Exfiltration Controls

Microsoft. (2022, February 15). Email exfiltration controls for connectors. Retrieved May 27, 2022.

Internal MISP references

UUID 79eeaadf-5c1e-4608-84a5-6c903966a7f3 which can be used as unique global reference for Power Automate Email Exfiltration Controls in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-27T00:00:00Z
date_published 2022-02-15T00:00:00Z
source MITRE
title Email exfiltration controls for connectors

HackersArise Email

Hackers Arise. (n.d.). Email Scraping and Maltego. Retrieved October 20, 2020.

Internal MISP references

UUID b6aefd99-fd97-4ca0-b717-f9dc147c9413 which can be used as unique global reference for HackersArise Email in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
source MITRE
title Email Scraping and Maltego

Elastic - Koadiac Detection with EQL

Stepanic, D.. (2020, January 13). Embracing offensive tooling: Building detections against Koadic using EQL. Retrieved November 30, 2020.

Internal MISP references

UUID 689b71f4-f8e5-455f-91c2-c599c8650f11 which can be used as unique global reference for Elastic - Koadiac Detection with EQL in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-30T00:00:00Z
date_published 2020-01-13T00:00:00Z
source MITRE
title Embracing offensive tooling: Building detections against Koadic using EQL

Nccgroup Emissary Panda May 2018

Pantazopoulos, N., Henry T. (2018, May 18). Emissary Panda – A potential new malicious tool. Retrieved June 25, 2018.

Internal MISP references

UUID e279c308-fabc-47d3-bdeb-296266c80988 which can be used as unique global reference for Nccgroup Emissary Panda May 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-06-25T00:00:00Z
date_published 2018-05-18T00:00:00Z
source MITRE
title Emissary Panda – A potential new malicious tool

Unit42 Emissary Panda May 2019

Falcone, R. and Lancaster, T. (2019, May 28). Emissary Panda Attacks Middle East Government Sharepoint Servers. Retrieved July 9, 2019.

Internal MISP references

UUID 3a3ec86c-88da-40ab-8e5f-a7d5102c026b which can be used as unique global reference for Unit42 Emissary Panda May 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-07-09T00:00:00Z
date_published 2019-05-28T00:00:00Z
source MITRE
title Emissary Panda Attacks Middle East Government Sharepoint Servers

Emissary Trojan Feb 2016

Falcone, R. and Miller-Osborn, J. (2016, February 3). Emissary Trojan Changelog: Did Operation Lotus Blossom Cause It to Evolve?. Retrieved February 15, 2016.

Internal MISP references

UUID 580ce22f-b76b-4a92-9fab-26ce8f449ab6 which can be used as unique global reference for Emissary Trojan Feb 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-02-15T00:00:00Z
date_published 2016-02-03T00:00:00Z
source MITRE
title Emissary Trojan Changelog: Did Operation Lotus Blossom Cause It to Evolve?

orangecyberdefense.com August 14 2024

orangecyberdefense.com. (2024, August 14). Emmenhtal a little-known loader distributing commodity infostealers worldwide. Retrieved August 25, 2024.

Internal MISP references

UUID 138a6cd4-36f9-41fd-a724-2b600dc6bf85 which can be used as unique global reference for orangecyberdefense.com August 14 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-25T00:00:00Z
date_published 2024-08-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Emmenhtal a little-known loader distributing commodity infostealers worldwide

Sophos Emotet Apr 2019

Brandt, A.. (2019, May 5). Emotet 101, stage 4: command and control. Retrieved April 16, 2019.

Internal MISP references

UUID 0bd01e6c-6fb5-4bae-9fe9-395de061c1da which can be used as unique global reference for Sophos Emotet Apr 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-16T00:00:00Z
date_published 2019-05-05T00:00:00Z
source MITRE
title Emotet 101, stage 4: command and control

Deep Instinct March 10 2023

Deep Instinct. (2023, March 10). Emotet Again! The First Malspam Wave of 2023 | Deep Instinct. Retrieved May 7, 2023.

Internal MISP references

UUID 8016eca2-f702-4081-83ba-06262c29e6c2 which can be used as unique global reference for Deep Instinct March 10 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2023-03-10T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Emotet Again! The First Malspam Wave of 2023

CIS Emotet Apr 2017

CIS. (2017, April 28). Emotet Changes TTPs and Arrives in United States. Retrieved January 17, 2019.

Internal MISP references

UUID 8dc7653f-84ef-4f0a-91f6-9b10ff50b756 which can be used as unique global reference for CIS Emotet Apr 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-01-17T00:00:00Z
date_published 2017-04-28T00:00:00Z
source MITRE
title Emotet Changes TTPs and Arrives in United States

Binary Defense Emotes Wi-Fi Spreader

Binary Defense. (n.d.). Emotet Evolves With new Wi-Fi Spreader. Retrieved September 8, 2023.

Internal MISP references

UUID 05e624ee-c53d-5cd1-8fd2-6b2d38344bfd which can be used as unique global reference for Binary Defense Emotes Wi-Fi Spreader in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-08T00:00:00Z
source MITRE
title Emotet Evolves With new Wi-Fi Spreader

ESET Emotet Nov 2018

ESET . (2018, November 9). Emotet launches major new spam campaign. Retrieved March 25, 2019.

Internal MISP references

UUID e954c9aa-4995-452c-927e-11d0a6e2f442 which can be used as unique global reference for ESET Emotet Nov 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-25T00:00:00Z
date_published 2018-11-09T00:00:00Z
source MITRE
title Emotet launches major new spam campaign

emotet_hc3_nov2023

Office of Information Security, Health Sector Cybersecurity Coordination Center. (2023, November 16). Emotet Malware: The Enduring and Persistent Threat to the Health Sector. Retrieved June 19, 2024.

Internal MISP references

UUID 36b41ab3-2a3d-5f5f-86ad-bc4cf810b4ba which can be used as unique global reference for emotet_hc3_nov2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-19T00:00:00Z
date_published 2023-11-16T00:00:00Z
source MITRE
title Emotet Malware: The Enduring and Persistent Threat to the Health Sector

Trend Micro Emotet 2020

Cybercrime & Digital Threat Team. (2020, February 13). Emotet Now Spreads via Wi-Fi. Retrieved February 16, 2022.

Internal MISP references

UUID 150327e6-db4b-4588-8cf2-ee131569150b which can be used as unique global reference for Trend Micro Emotet 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-16T00:00:00Z
date_published 2020-02-13T00:00:00Z
source MITRE
title Emotet Now Spreads via Wi-Fi

Talos Emotet Jan 2019

Brumaghin, E.. (2019, January 15). Emotet re-emerges after the holidays. Retrieved March 25, 2019.

Internal MISP references

UUID 83180391-89b6-4431-87f4-2703b47cb81b which can be used as unique global reference for Talos Emotet Jan 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-25T00:00:00Z
date_published 2019-01-15T00:00:00Z
source MITRE
title Emotet re-emerges after the holidays

Cybersécurité - INTRINSEC January 09 2023

Equipe cti. (2023, January 9). Emotet returns and deploys loaders. Retrieved May 7, 2023.

Internal MISP references

UUID 6d39aba3-ae77-4a95-8242-7dacae8c89d8 which can be used as unique global reference for Cybersécurité - INTRINSEC January 09 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2023-01-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Emotet returns and deploys loaders

emotet_trendmicro_mar2023

Kenefick, I. (2023, March 13). Emotet Returns, Now Adopts Binary Padding for Evasion. Retrieved June 19, 2024.

Internal MISP references

UUID 6f9050d9-e960-50dd-86a9-aee5fd100d9c which can be used as unique global reference for emotet_trendmicro_mar2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-19T00:00:00Z
date_published 2023-03-13T00:00:00Z
source MITRE
title Emotet Returns, Now Adopts Binary Padding for Evasion

Emotet shutdown

The DFIR Report. (2022, November 8). Emotet Strikes Again – LNK File Leads to Domain Wide Ransomware. Retrieved March 6, 2023.

Internal MISP references

UUID 02e6c7bf-f81c-53a3-b771-fd77d4cdb5a0 which can be used as unique global reference for Emotet shutdown in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-06T00:00:00Z
date_published 2022-11-08T00:00:00Z
source MITRE
title Emotet Strikes Again – LNK File Leads to Domain Wide Ransomware

Carbon Black Emotet Apr 2019

Lee, S.. (2019, April 24). Emotet Using WMI to Launch PowerShell Encoded Code. Retrieved May 24, 2019.

Internal MISP references

UUID db8fe753-d674-4668-9ee5-c1269085a7a1 which can be used as unique global reference for Carbon Black Emotet Apr 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-05-24T00:00:00Z
date_published 2019-04-24T00:00:00Z
source MITRE
title Emotet Using WMI to Launch PowerShell Encoded Code

DanielManea Emotet May 2017

Manea, D.. (2019, May 25). Emotet v4 Analysis. Retrieved April 16, 2019.

Internal MISP references

UUID 578e44f2-9ff5-4bed-8dee-a992711df8ce which can be used as unique global reference for DanielManea Emotet May 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-16T00:00:00Z
date_published 2019-05-25T00:00:00Z
source MITRE
title Emotet v4 Analysis

Empire Keychain Decrypt

Empire. (2018, March 8). Empire keychaindump_decrypt Module. Retrieved April 14, 2022.

Internal MISP references

UUID 41075230-73a2-4195-b716-379f9e5ae93b which can be used as unique global reference for Empire Keychain Decrypt in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-14T00:00:00Z
date_published 2018-03-08T00:00:00Z
source MITRE
title Empire keychaindump_decrypt Module

Github EmpireProject CreateHijacker Dylib

Wardle, P., Ross, C. (2018, April 8). EmpireProject Create Dylib Hijacker. Retrieved April 1, 2021.

Internal MISP references

UUID 2908418d-54cf-4245-92c6-63f616b04e91 which can be used as unique global reference for Github EmpireProject CreateHijacker Dylib in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-01T00:00:00Z
date_published 2018-04-08T00:00:00Z
source MITRE
title EmpireProject Create Dylib Hijacker

Github EmpireProject HijackScanner

Wardle, P., Ross, C. (2017, September 21). Empire Project Dylib Hijack Vulnerability Scanner. Retrieved April 1, 2021.

Internal MISP references

UUID c83e8833-9648-4178-b5be-6fa0af8f737f which can be used as unique global reference for Github EmpireProject HijackScanner in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-01T00:00:00Z
date_published 2017-09-21T00:00:00Z
source MITRE
title Empire Project Dylib Hijack Vulnerability Scanner

Microsoft ASR Nov 2017

Brower, N. & D'Souza-Wiltshire, I. (2017, November 9). Enable Attack surface reduction. Retrieved February 3, 2018.

Internal MISP references

UUID 1cb445f6-a366-4ae6-a698-53da6c61b4c9 which can be used as unique global reference for Microsoft ASR Nov 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-03T00:00:00Z
date_published 2017-11-09T00:00:00Z
source MITRE
title Enable Attack surface reduction

Microsoft TESTSIGNING Feb 2021

Microsoft. (2021, February 15). Enable Loading of Test Signed Drivers. Retrieved April 22, 2021.

Internal MISP references

UUID c04153f9-d4c7-4349-9bef-3f883eec0028 which can be used as unique global reference for Microsoft TESTSIGNING Feb 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-22T00:00:00Z
date_published 2021-02-15T00:00:00Z
source MITRE
title Enable Loading of Test Signed Drivers

Microsoft Disable DCOM

Microsoft. (n.d.). Enable or Disable DCOM. Retrieved November 22, 2017.

Internal MISP references

UUID 1aeac4da-f5fd-4fa3-9cc0-b1a50427c121 which can be used as unique global reference for Microsoft Disable DCOM in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-22T00:00:00Z
source MITRE
title Enable or Disable DCOM

Microsoft Disable Macros

Microsoft. (n.d.). Enable or disable macros in Office files. Retrieved September 13, 2018.

Internal MISP references

UUID cfe592a1-c06d-4555-a30f-c5d533dfd73e which can be used as unique global reference for Microsoft Disable Macros in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-09-13T00:00:00Z
source MITRE
title Enable or disable macros in Office files

Microsoft Remote

Microsoft. (n.d.). Enable the Remote Registry Service. Retrieved May 1, 2015.

Internal MISP references

UUID 331d59e3-ce7f-483c-b77d-001c8a9ae1df which can be used as unique global reference for Microsoft Remote in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-05-01T00:00:00Z
source MITRE
title Enable the Remote Registry Service

PCMag DoubleExtension

PCMag. (n.d.). Encyclopedia: double extension. Retrieved August 4, 2021.

Internal MISP references

UUID a729519d-8c9f-477c-b992-434076a9d294 which can be used as unique global reference for PCMag DoubleExtension in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-04T00:00:00Z
source MITRE
title Encyclopedia: double extension

Microsoft Entra ID App Passwords

Microsoft. (2023, October 23). Enforce Microsoft Entra multifactor authentication with legacy applications using app passwords. Retrieved May 28, 2024.

Internal MISP references

UUID 7787289d-f636-5a26-b182-cd1015879007 which can be used as unique global reference for Microsoft Entra ID App Passwords in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-28T00:00:00Z
date_published 2023-10-23T00:00:00Z
source MITRE
title Enforce Microsoft Entra multifactor authentication with legacy applications using app passwords

FireEye Periscope March 2018

FireEye. (2018, March 16). Suspected Chinese Cyber Espionage Group (TEMP.Periscope) Targeting U.S. Engineering and Maritime Industries. Retrieved April 11, 2018.

Internal MISP references

UUID 8edb5d2b-b5c4-4d9d-8049-43dd6ca9ab7f which can be used as unique global reference for FireEye Periscope March 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-11T00:00:00Z
source MITRE
title Engineering and Maritime Industries

NCCIC AR-17-20045 February 2017

NCCIC. (2017, February 10). Enhanced Analysis of GRIZZLY STEPPE Activity. Retrieved April 12, 2021.

Internal MISP references

UUID b930e838-649b-42ab-86dc-0443667276de which can be used as unique global reference for NCCIC AR-17-20045 February 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-12T00:00:00Z
date_published 2017-02-10T00:00:00Z
source MITRE
title Enhanced Analysis of GRIZZLY STEPPE Activity

ESET Sednit Part 1

ESET. (2016, October). En Route with Sednit - Part 1: Approaching the Target. Retrieved November 8, 2016.

Internal MISP references

UUID a2016103-ead7-46b3-bae5-aa97c45a12b7 which can be used as unique global reference for ESET Sednit Part 1 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-11-08T00:00:00Z
date_published 2016-10-01T00:00:00Z
source MITRE
title En Route with Sednit - Part 1: Approaching the Target

ESET Sednit Part 2

ESET. (2016, October). En Route with Sednit - Part 2: Observing the Comings and Goings. Retrieved November 21, 2016.

Internal MISP references

UUID aefb9eda-df5a-437f-af2a-ec1b6c04628b which can be used as unique global reference for ESET Sednit Part 2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-11-21T00:00:00Z
date_published 2016-10-01T00:00:00Z
source MITRE
title En Route with Sednit - Part 2: Observing the Comings and Goings

ESET Sednit Part 3

ESET. (2016, October). En Route with Sednit - Part 3: A Mysterious Downloader. Retrieved November 21, 2016.

Internal MISP references

UUID 7c2be444-a947-49bc-b5f6-8f6bec870c6a which can be used as unique global reference for ESET Sednit Part 3 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-11-21T00:00:00Z
date_published 2016-10-01T00:00:00Z
source MITRE
title En Route with Sednit - Part 3: A Mysterious Downloader

Google Ensuring Your Information is Safe

Google. (2011, June 1). Ensuring your information is safe online. Retrieved April 1, 2022.

Internal MISP references

UUID ad3eda19-08eb-4d59-a2c9-3b5ed8302205 which can be used as unique global reference for Google Ensuring Your Information is Safe in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-01T00:00:00Z
date_published 2011-06-01T00:00:00Z
source MITRE
title Ensuring your information is safe online

Fortinet Blog November 13 2018

Fortinet Blog. (2018, November 13). Enter The DarkGate - New Cryptocurrency Mining and Ransomware Campaign. Retrieved October 20, 2023.

Internal MISP references

UUID 1b9b5c48-d504-4c73-aedc-37e935c47f17 which can be used as unique global reference for Fortinet Blog November 13 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-20T00:00:00Z
date_published 2018-11-13T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Enter The DarkGate - New Cryptocurrency Mining and Ransomware Campaign

Ensilo Darkgate 2018

Adi Zeligson & Rotem Kerner. (2018, November 13). Enter The DarkGate - New Cryptocurrency Mining and Ransomware Campaign. Retrieved February 9, 2024.

Internal MISP references

UUID 31796564-4154-54c0-958a-7d6802dfefad which can be used as unique global reference for Ensilo Darkgate 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-09T00:00:00Z
date_published 2018-11-13T00:00:00Z
source MITRE
title Enter The DarkGate - New Cryptocurrency Mining and Ransomware Campaign

Splunk DarkGate

Splunk Threat Research Team. (2024, January 17). Enter The Gates: An Analysis of the DarkGate AutoIt Loader. Retrieved March 29, 2024.

Internal MISP references

UUID adc6384c-e0d7-547f-a1e3-2c57ff0525ae which can be used as unique global reference for Splunk DarkGate in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-29T00:00:00Z
date_published 2024-01-17T00:00:00Z
source MITRE
title Enter The Gates: An Analysis of the DarkGate AutoIt Loader

Splunk DarkGate January 17 2024

Splunk Threat Research Team. (2024, January 17). Enter The Gates: An Analysis of the DarkGate AutoIt Loader. Retrieved January 24, 2024.

Internal MISP references

UUID a45a920c-3bda-4442-8650-4ad78f950283 which can be used as unique global reference for Splunk DarkGate January 17 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-24T00:00:00Z
date_published 2024-01-17T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Enter The Gates: An Analysis of the DarkGate AutoIt Loader

Microsoft EnumDeviceDrivers

Microsoft. (2021, October 12). EnumDeviceDrivers function (psapi.h). Retrieved March 28, 2023.

Internal MISP references

UUID 647ffc70-8eab-5f2f-abf4-9bbf42554043 which can be used as unique global reference for Microsoft EnumDeviceDrivers in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-28T00:00:00Z
date_published 2021-10-12T00:00:00Z
source MITRE
title EnumDeviceDrivers function (psapi.h)

EK Clueless Agents

Riordan, J., Schneier, B. (1998, June 18). Environmental Key Generation towards Clueless Agents. Retrieved January 18, 2019.

Internal MISP references

UUID ef7409d2-af39-4ad8-8469-76f0165687bd which can be used as unique global reference for EK Clueless Agents in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-01-18T00:00:00Z
date_published 1998-06-18T00:00:00Z
source MITRE
title Environmental Key Generation towards Clueless Agents

Deloitte Environment Awareness

Torello, A. & Guibernau, F. (n.d.). Environment Awareness. Retrieved September 13, 2024.

Internal MISP references

UUID af842a1f-8f39-4b4f-b4d2-0bbb810e6c31 which can be used as unique global reference for Deloitte Environment Awareness in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-13T00:00:00Z
source MITRE
title Environment Awareness

Microsoft Environment Property

Microsoft. (2011, October 24). Environment Property. Retrieved July 27, 2016.

Internal MISP references

UUID 64598969-864d-4bc7-805e-c289cccb7bc6 which can be used as unique global reference for Microsoft Environment Property in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-07-27T00:00:00Z
date_published 2011-10-24T00:00:00Z
source MITRE
title Environment Property

MSDN Environment Property

Microsoft. (n.d.). Environment Property. Retrieved July 27, 2016.

Internal MISP references

UUID 79ea888c-2dd7-40cb-9149-e2469a35ea3a which can be used as unique global reference for MSDN Environment Property in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-07-27T00:00:00Z
source MITRE
title Environment Property

Kaspersky Equation QA

Kaspersky Lab's Global Research and Analysis Team. (2015, February). Equation Group: Questions and Answers. Retrieved December 21, 2015.

Internal MISP references

UUID 34674802-fbd9-4cdb-8611-c58665c430e5 which can be used as unique global reference for Kaspersky Equation QA in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-12-21T00:00:00Z
date_published 2015-02-01T00:00:00Z
source MITRE, Tidal Cyber
title Equation Group: Questions and Answers

erase_cmd_cisco

Cisco. (2022, August 16). erase - Cisco IOS Configuration Fundamentals Command Reference . Retrieved July 13, 2022.

Internal MISP references

UUID 4c90eba9-118e-5d50-ad58-27bcb0e1e228 which can be used as unique global reference for erase_cmd_cisco in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-13T00:00:00Z
date_published 2022-08-16T00:00:00Z
source MITRE
title erase - Cisco IOS Configuration Fundamentals Command Reference

Container Escape

0xn3va. (n.d.). Escaping. Retrieved May 27, 2022.

Internal MISP references

UUID 8248917a-9afd-4ec6-a086-1a97a68deff1 which can be used as unique global reference for Container Escape in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-27T00:00:00Z
source MITRE
title Escaping

Microsoft Esentutl

Microsoft. (2016, August 30). Esentutl. Retrieved September 3, 2019.

Internal MISP references

UUID 08fb9e84-495f-4710-bd1e-417eb8191a10 which can be used as unique global reference for Microsoft Esentutl in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-03T00:00:00Z
date_published 2016-08-30T00:00:00Z
source MITRE
title Esentutl

LOLBAS Esentutl

LOLBAS. (n.d.). Esentutl.exe. Retrieved September 3, 2019.

Internal MISP references

UUID 691b4907-3544-4ad0-989c-b5c845e0330f which can be used as unique global reference for LOLBAS Esentutl in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-03T00:00:00Z
source MITRE
title Esentutl.exe

ESET APT Activity Report Q4 2023-Q1 2024

ESET Research. (2024, May 14). ESET APT Activity Report Q4 2023-Q1 2024. Retrieved September 1, 2024.

Internal MISP references

UUID 896cc899-b667-4f9d-ba90-8650fb978535 which can be used as unique global reference for ESET APT Activity Report Q4 2023-Q1 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-01T00:00:00Z
date_published 2024-05-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title ESET APT Activity Report Q4 2023-Q1 2024

ESET Twitter Ida Pro Nov 2021

Cherepanov, Anton. (2019, November 10). ESETresearch discovered a trojanized IDA Pro installer. Retrieved September 12, 2024.

Internal MISP references

UUID 6d079207-a7c0-4023-b504-1010dd538221 which can be used as unique global reference for ESET Twitter Ida Pro Nov 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2019-11-10T00:00:00Z
source MITRE
title ESETresearch discovered a trojanized IDA Pro installer

ESET PowerPool Code October 2020

ESET Research. (2020, October 1). ESET Research Tweet Linking Slothfulmedia and PowerPool. Retrieved September 12, 2024.

Internal MISP references

UUID d583b409-35bd-45ea-8f2a-c0d566a6865b which can be used as unique global reference for ESET PowerPool Code October 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2020-10-01T00:00:00Z
source MITRE
title ESET Research Tweet Linking Slothfulmedia and PowerPool

ESET FinFisher Jan 2018

Kafka, F. (2018, January). ESET's Guide to Deobfuscating and Devirtualizing FinFisher. Retrieved August 12, 2019.

Internal MISP references

UUID be169308-19e8-4ee9-8ff6-e08eb9291ef8 which can be used as unique global reference for ESET FinFisher Jan 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-08-12T00:00:00Z
date_published 2018-01-01T00:00:00Z
source MITRE
title ESET's Guide to Deobfuscating and Devirtualizing FinFisher

ESET Trickbot Oct 2020

Boutin, J. (2020, October 12). ESET takes part in global operation to disrupt Trickbot. Retrieved March 15, 2021.

Internal MISP references

UUID c3320c11-4631-4e02-8025-5c1e5b54e521 which can be used as unique global reference for ESET Trickbot Oct 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-15T00:00:00Z
date_published 2020-10-12T00:00:00Z
source MITRE
title ESET takes part in global operation to disrupt Trickbot

WeLiveSecurity April 19 2022

Jean-Ian Boutin, Tomáš Procházka. (2022, April 19). ESET takes part in global operation to disrupt Zloader botnets | WeLiveSecurity. Retrieved May 10, 2023.

Internal MISP references

UUID f86845b9-03c4-446b-845f-b31b79b247ee which can be used as unique global reference for WeLiveSecurity April 19 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-10T00:00:00Z
date_published 2022-04-19T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title ESET takes part in global operation to disrupt Zloader botnets

Riskiq Remcos Jan 2018

Klijnsma, Y. (2018, January 23). Espionage Campaign Leverages Spear Phishing, RATs Against Turkish Defense Contractors. Retrieved November 6, 2018.

Internal MISP references

UUID a641a41c-dcd8-47e5-9b29-109dd2eb7f1e which can be used as unique global reference for Riskiq Remcos Jan 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-06T00:00:00Z
date_published 2018-01-23T00:00:00Z
source MITRE
title Espionage Campaign Leverages Spear Phishing, RATs Against Turkish Defense Contractors

EventLog_Core_Technologies

Core Technologies. (2021, May 24). Essential Windows Services: EventLog / Windows Event Log. Retrieved September 14, 2021.

Internal MISP references

UUID 2a1f452f-57b6-4764-b474-befa7787642d which can be used as unique global reference for EventLog_Core_Technologies in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-14T00:00:00Z
date_published 2021-05-24T00:00:00Z
source MITRE
title Essential Windows Services: EventLog / Windows Event Log

ISACA Malware Tricks

Kolbitsch, C. (2017, November 1). Evasive Malware Tricks: How Malware Evades Detection by Sandboxes. Retrieved March 30, 2021.

Internal MISP references

UUID a071bf02-066b-46e6-a554-f43d0c170807 which can be used as unique global reference for ISACA Malware Tricks in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-30T00:00:00Z
date_published 2017-11-01T00:00:00Z
source MITRE
title Evasive Malware Tricks: How Malware Evades Detection by Sandboxes

ThreatStream Evasion Analysis

Shelmire, A.. (2015, July 6). Evasive Maneuvers. Retrieved January 22, 2016.

Internal MISP references

UUID de6bc044-6275-4cab-80a1-feefebd3c1f0 which can be used as unique global reference for ThreatStream Evasion Analysis in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-22T00:00:00Z
date_published 2015-07-06T00:00:00Z
source MITRE
title Evasive Maneuvers

Anomali Evasive Maneuvers July 2015

Shelmire, A. (2015, July 06). Evasive Maneuvers by the Wekby group with custom ROP-packing and DNS covert channels. Retrieved November 15, 2018.

Internal MISP references

UUID 471ae30c-2753-468e-8e4d-6e7a3be599c9 which can be used as unique global reference for Anomali Evasive Maneuvers July 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-15T00:00:00Z
date_published 2015-07-06T00:00:00Z
source MITRE
title Evasive Maneuvers by the Wekby group with custom ROP-packing and DNS covert channels

ESET EvasivePanda 2023

Facundo Muñoz. (2023, April 26). Evasive Panda APT group delivers malware via updates for popular Chinese software. Retrieved July 25, 2024.

Internal MISP references

UUID 08026c7e-cc35-5d51-9536-a02febd1a891 which can be used as unique global reference for ESET EvasivePanda 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-25T00:00:00Z
date_published 2023-04-26T00:00:00Z
source MITRE
title Evasive Panda APT group delivers malware via updates for popular Chinese software

ESET EvasivePanda 2024

Ahn Ho, Facundo Muñoz, & Marc-Etienne M.Léveillé. (2024, March 7). Evasive Panda leverages Monlam Festival to target Tibetans. Retrieved July 25, 2024.

Internal MISP references

UUID 07e6b866-7119-50ad-8a6e-80c4e0d594bf which can be used as unique global reference for ESET EvasivePanda 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-25T00:00:00Z
date_published 2024-03-07T00:00:00Z
source MITRE
title Evasive Panda leverages Monlam Festival to target Tibetans

Unit42 OilRig Playbook 2023

Unit42. (2016, May 1). Evasive Serpens Unit 42 Playbook Viewer. Retrieved February 6, 2023.

Internal MISP references

UUID e38902bb-9bab-5beb-817b-668a67a76541 which can be used as unique global reference for Unit42 OilRig Playbook 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-06T00:00:00Z
date_published 2016-05-01T00:00:00Z
source MITRE
title Evasive Serpens Unit 42 Playbook Viewer

Microsoft EventLog.Clear

Microsoft. (n.d.). EventLog.Clear Method (). Retrieved July 2, 2018.

Internal MISP references

UUID b2711ad3-981c-4c77-bb64-643b547bfda6 which can be used as unique global reference for Microsoft EventLog.Clear in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-02T00:00:00Z
source MITRE
title EventLog.Clear Method ()

evt_log_tampering

svch0st. (2020, September 30). Event Log Tampering Part 1: Disrupting the EventLog Service. Retrieved September 14, 2021.

Internal MISP references

UUID 7757bbc6-8058-4584-a5aa-14b647d932a6 which can be used as unique global reference for evt_log_tampering in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-14T00:00:00Z
date_published 2020-09-30T00:00:00Z
source MITRE
title Event Log Tampering Part 1: Disrupting the EventLog Service

Microsoft ETW May 2018

Microsoft. (2018, May 30). Event Tracing. Retrieved September 6, 2018.

Internal MISP references

UUID 876f8690-1874-41c0-bd38-d3bd41c96acc which can be used as unique global reference for Microsoft ETW May 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-09-06T00:00:00Z
date_published 2018-05-30T00:00:00Z
source MITRE
title Event Tracing

Eventvwr.exe - LOLBAS Project

LOLBAS. (2018, November 1). Eventvwr.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 0c09812a-a936-4282-b574-35a00f631857 which can be used as unique global reference for Eventvwr.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-11-01T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Eventvwr.exe

Secure Ideas SMB Relay

Kuehn, E. (2018, April 11). Ever Run a Relay? Why SMB Relays Should Be On Your Mind. Retrieved February 7, 2019.

Internal MISP references

UUID ac4b2e91-f338-44c3-8950-435102136991 which can be used as unique global reference for Secure Ideas SMB Relay in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-07T00:00:00Z
date_published 2018-04-11T00:00:00Z
source MITRE
title Ever Run a Relay? Why SMB Relays Should Be On Your Mind

CSV Excel Macro Injection

Ishaq Mohammed . (2021, January 10). Everything about CSV Injection and CSV Excel Macro Injection. Retrieved February 7, 2022.

Internal MISP references

UUID 22c871ff-2701-4809-9f5b-fb29da7481e8 which can be used as unique global reference for CSV Excel Macro Injection in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-07T00:00:00Z
date_published 2021-01-10T00:00:00Z
source MITRE
title Everything about CSV Injection and CSV Excel Macro Injection

Avertium callback phishing

Avertium. (n.d.). EVERYTHING YOU NEED TO KNOW ABOUT CALLBACK PHISHING. Retrieved February 2, 2023.

Internal MISP references

UUID abeb1146-e5e5-5ecc-9b70-b348fba097f6 which can be used as unique global reference for Avertium callback phishing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-02T00:00:00Z
source MITRE
title EVERYTHING YOU NEED TO KNOW ABOUT CALLBACK PHISHING

Outpost24 April 5 2023

Alberto Marín. (2023, April 5). Everything you need to know about the LummaC2 stealer Leveraging IDA Python and Unicorn to deobfuscate Windows API hashing. Retrieved October 10, 2024.

Internal MISP references

UUID 60bd2e39-744c-44e7-b417-0ef0a768f7b6 which can be used as unique global reference for Outpost24 April 5 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-10T00:00:00Z
date_published 2023-04-05T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Everything you need to know about the LummaC2 stealer Leveraging IDA Python and Unicorn to deobfuscate Windows API hashing

Intezer Aurora Sept 2017

Rosenberg, J. (2017, September 20). Evidence Aurora Operation Still Active: Supply Chain Attack Through CCleaner. Retrieved February 13, 2018.

Internal MISP references

UUID b2999bd7-50d5-4d49-8893-8c0903d49104 which can be used as unique global reference for Intezer Aurora Sept 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-13T00:00:00Z
date_published 2017-09-20T00:00:00Z
source MITRE
title Evidence Aurora Operation Still Active: Supply Chain Attack Through CCleaner

Cyphort EvilBunny Dec 2014

Marschalek, M.. (2014, December 16). EvilBunny: Malware Instrumented By Lua. Retrieved June 28, 2019.

Internal MISP references

UUID a0218d0f-3378-4508-9d3c-a7cd3e00a156 which can be used as unique global reference for Cyphort EvilBunny Dec 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-28T00:00:00Z
date_published 2014-12-16T00:00:00Z
source MITRE
title EvilBunny: Malware Instrumented By Lua

Cyphort EvilBunny

Marschalek, Marion. (2014, December 16). EvilBunny: Malware Instrumented By Lua. Retrieved August 5, 2024.

Internal MISP references

UUID 21536444-7287-55f7-8e11-c97dcb85398d which can be used as unique global reference for Cyphort EvilBunny in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-05T00:00:00Z
date_published 2014-12-16T00:00:00Z
source MITRE
title EvilBunny: Malware Instrumented By Lua

Evil Clippy May 2019

Hegt, S. (2019, May 5). Evil Clippy: MS Office maldoc assistant. Retrieved September 17, 2020.

Internal MISP references

UUID aafa27e8-5df7-4fc6-9fe5-9a438f2b507a which can be used as unique global reference for Evil Clippy May 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-17T00:00:00Z
date_published 2019-05-05T00:00:00Z
source MITRE
title Evil Clippy: MS Office maldoc assistant

Cyble August 19 2022

Cybleinc. (2022, August 19). EvilCoder Project Selling Multiple Dangerous Tools Online. Retrieved May 10, 2023.

Internal MISP references

UUID 7b5617f8-5d0d-4185-97c7-82acf023f3c3 which can be used as unique global reference for Cyble August 19 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-10T00:00:00Z
date_published 2022-08-19T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title EvilCoder Project Selling Multiple Dangerous Tools Online

Evilginx 2 July 2018

Gretzky, K.. (2018, July 26). Evilginx 2 - Next Generation of Phishing 2FA Tokens. Retrieved October 14, 2019.

Internal MISP references

UUID 9099b5aa-25eb-4cb7-9e3a-da4c3244f15a which can be used as unique global reference for Evilginx 2 July 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-14T00:00:00Z
date_published 2018-07-26T00:00:00Z
source MITRE
title Evilginx 2 - Next Generation of Phishing 2FA Tokens

Evilginx Sources & Methods December 2023

Matthew Conway. (2023, December 14). Evilginx Phishing Proxy. Retrieved January 3, 2023.

Internal MISP references

UUID 13bdabb2-5956-492a-baf9-b0c3a0629806 which can be used as unique global reference for Evilginx Sources & Methods December 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-01-03T00:00:00Z
date_published 2023-12-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Evilginx Phishing Proxy

SentinelOne EvilQuest Ransomware Spyware 2020

Phil Stokes. (2020, July 8). “EvilQuest” Rolls Ransomware, Spyware & Data Theft Into One. Retrieved April 1, 2021.

Internal MISP references

UUID 4dc26c77-d0ce-4836-a4cc-0490b6d7f115 which can be used as unique global reference for SentinelOne EvilQuest Ransomware Spyware 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-01T00:00:00Z
date_published 2020-07-08T00:00:00Z
source MITRE
title “EvilQuest” Rolls Ransomware, Spyware & Data Theft Into One

Kaspersky evil twin

AO Kaspersky Lab. (n.d.). Evil twin attacks and how to prevent them. Retrieved September 17, 2024.

Internal MISP references

UUID 230f15c3-79dd-5272-88b5-e9d5de9556f1 which can be used as unique global reference for Kaspersky evil twin in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-17T00:00:00Z
source MITRE
title Evil twin attacks and how to prevent them

Cisco Synful Knock Evolution

Graham Holmes. (2015, October 8). Evolution of attacks on Cisco IOS devices. Retrieved October 19, 2020.

Internal MISP references

UUID 29301297-8343-4f75-8096-7fe229812f75 which can be used as unique global reference for Cisco Synful Knock Evolution in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
date_published 2015-10-08T00:00:00Z
source MITRE
title Evolution of attacks on Cisco IOS devices

SCILabs URSA/Mispadu Evolution 2023

SCILabs. (2023, May 23). Evolution of banking trojan URSA/Mispadu. Retrieved March 13, 2024.

Internal MISP references

UUID a7a0db8d-bc1c-5e89-8c42-a3a6cc2cf28d which can be used as unique global reference for SCILabs URSA/Mispadu Evolution 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-13T00:00:00Z
date_published 2023-05-23T00:00:00Z
source MITRE
title Evolution of banking trojan URSA/Mispadu

Securelist JSWorm

Fedor Sinitsyn. (2021, May 25). Evolution of JSWorm Ransomware. Retrieved August 18, 2021.

Internal MISP references

UUID c29ca9f2-1e48-4913-b10b-15e558868ed8 which can be used as unique global reference for Securelist JSWorm in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-18T00:00:00Z
date_published 2021-05-25T00:00:00Z
source MITRE
title Evolution of JSWorm Ransomware

S2 Grupo TrickBot June 2017

Salinas, M., Holguin, J. (2017, June). Evolution of Trickbot. Retrieved July 31, 2018.

Internal MISP references

UUID 28faff77-3e68-4f5c-974d-dc7c9d06ce5e which can be used as unique global reference for S2 Grupo TrickBot June 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-31T00:00:00Z
date_published 2017-06-01T00:00:00Z
source MITRE
title Evolution of Trickbot

Unit 42 Valak July 2020

Duncan, B. (2020, July 24). Evolution of Valak, from Its Beginnings to Mass Distribution. Retrieved August 31, 2020.

Internal MISP references

UUID 9a96da13-5795-49bc-ab82-dfd4f964d9d0 which can be used as unique global reference for Unit 42 Valak July 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-31T00:00:00Z
date_published 2020-07-24T00:00:00Z
source MITRE
title Evolution of Valak, from Its Beginnings to Mass Distribution

Microsoft - Device Registration

Microsoft 365 Defender Threat Intelligence Team. (2022, January 26). Evolved phishing: Device registration trick adds to phishers’ toolbox for victims without MFA. Retrieved March 4, 2022.

Internal MISP references

UUID 3f42fc18-2adc-46ef-ae0a-c2d530518435 which can be used as unique global reference for Microsoft - Device Registration in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-04T00:00:00Z
date_published 2022-01-26T00:00:00Z
source MITRE
title Evolved phishing: Device registration trick adds to phishers’ toolbox for victims without MFA

Amnesty OAuth Phishing Attacks, August 2019

Amnesty International. (2019, August 16). Evolving Phishing Attacks Targeting Journalists and Human Rights Defenders from the Middle-East and North Africa. Retrieved October 8, 2019.

Internal MISP references

UUID 0b0f9cf6-f0af-4f86-9699-a63ff36c49e2 which can be used as unique global reference for Amnesty OAuth Phishing Attacks, August 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-08T00:00:00Z
date_published 2019-08-16T00:00:00Z
source MITRE
title Evolving Phishing Attacks Targeting Journalists and Human Rights Defenders from the Middle-East and North Africa

RSAC 2015 Abu Dhabi Stefano Maccaglia

Maccaglia, S. (2015, November 4). Evolving Threats: dissection of a CyberEspionage attack. Retrieved April 4, 2018.

Internal MISP references

UUID a6cb597e-e25b-4f49-bbb0-d270b1ac53f2 which can be used as unique global reference for RSAC 2015 Abu Dhabi Stefano Maccaglia in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-04T00:00:00Z
date_published 2015-11-04T00:00:00Z
source MITRE
title Evolving Threats: dissection of a CyberEspionage attack

MSTIC. (2021, November 16). Evolving trends in Iranian threat actor activity – MSTIC presentation at CyberWarCon 2021. Retrieved January 12, 2023.

Internal MISP references

UUID 78d39ee7-1cd5-5cb8-844a-1c3649e367a1 which can be used as unique global reference for Microsoft Iranian Threat Actor Trends November 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-01-12T00:00:00Z
date_published 2021-11-16T00:00:00Z
source MITRE
title Evolving trends in Iranian threat actor activity – MSTIC presentation at CyberWarCon 2021

Palo Alto Unit 42 VBA Infostealer 2014

Vicky Ray and Rob Downs. (2014, October 29). Examining a VBA-Initiated Infostealer Campaign. Retrieved March 13, 2023.

Internal MISP references

UUID c3eccab6-b12b-513a-9a04-396f7b3dcf63 which can be used as unique global reference for Palo Alto Unit 42 VBA Infostealer 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-13T00:00:00Z
date_published 2014-10-29T00:00:00Z
source MITRE
title Examining a VBA-Initiated Infostealer Campaign

Trend Micro Black Basta May 2022

Gonzalez, I., Chavez I., et al. (2022, May 9). Examining the Black Basta Ransomware’s Infection Routine. Retrieved March 7, 2023.

Internal MISP references

UUID b0351b0a-112f-543f-8909-f4b4a9f23e2e which can be used as unique global reference for Trend Micro Black Basta May 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-07T00:00:00Z
date_published 2022-05-09T00:00:00Z
source MITRE
title Examining the Black Basta Ransomware’s Infection Routine

Mandiant Glyer APT 2010

Glyer, C. (2010). Examples of Recent APT Persistence Mechanism. Retrieved December 18, 2020.

Internal MISP references

UUID bb336a6f-d76e-4535-ba81-0c7932ae91e3 which can be used as unique global reference for Mandiant Glyer APT 2010 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-18T00:00:00Z
date_published 2010-01-01T00:00:00Z
source MITRE
title Examples of Recent APT Persistence Mechanism

Excel.exe - LOLBAS Project

LOLBAS. (2019, July 19). Excel.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 9a2458f7-63ca-4eca-8c61-b6098ec0798f which can be used as unique global reference for Excel.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2019-07-19T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Excel.exe

Microsoft Tim McMichael Exchange Mail Forwarding 2

McMichael, T.. (2015, June 8). Exchange and Office 365 Mail Forwarding. Retrieved October 8, 2019.

Internal MISP references

UUID b5bf8e12-0133-46ea-85e3-b48c9901b518 which can be used as unique global reference for Microsoft Tim McMichael Exchange Mail Forwarding 2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-08T00:00:00Z
date_published 2015-06-08T00:00:00Z
source MITRE
title Exchange and Office 365 Mail Forwarding

DFIR Phosphorus November 2021

DFIR Report. (2021, November 15). Exchange Exploit Leads to Domain Wide Ransomware. Retrieved January 5, 2023.

Internal MISP references

UUID 0156d408-a36d-5876-96fd-f0b0cf296ea2 which can be used as unique global reference for DFIR Phosphorus November 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-01-05T00:00:00Z
date_published 2021-11-15T00:00:00Z
source MITRE
title Exchange Exploit Leads to Domain Wide Ransomware

Mandiant UNC2596 Cuba Ransomware February 2022

Tyler McLellan, Joshua Shilko, Shambavi Sadayappan. (2022, February 23). (Ex)Change of Pace: UNC2596 Observed Leveraging Vulnerabilities to Deploy Cuba Ransomware. Retrieved May 19, 2023.

Internal MISP references

UUID c03c0f35-3b86-4733-8a2c-71524f0e3d17 which can be used as unique global reference for Mandiant UNC2596 Cuba Ransomware February 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-19T00:00:00Z
date_published 2022-02-23T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title (Ex)Change of Pace: UNC2596 Observed Leveraging Vulnerabilities to Deploy Cuba Ransomware

ExchangePowerShell Module

Microsoft. (2017, September 25). ExchangePowerShell. Retrieved June 10, 2022.

Internal MISP references

UUID 8af67c2a-15e2-48c9-9ec2-b62ffca0f677 which can be used as unique global reference for ExchangePowerShell Module in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-10T00:00:00Z
date_published 2017-09-25T00:00:00Z
source MITRE
title ExchangePowerShell

ESET Exchange Mar 2021

Faou, M., Tartare, M., Dupuy, T. (2021, March 10). Exchange servers under siege from at least 10 APT groups. Retrieved May 21, 2021.

Internal MISP references

UUID c83f1810-22bb-4def-ab2f-3f3d67703f47 which can be used as unique global reference for ESET Exchange Mar 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-05-21T00:00:00Z
date_published 2021-03-10T00:00:00Z
source MITRE, Tidal Cyber
title Exchange servers under siege from at least 10 APT groups

Executable Installers are Vulnerable

Stefan Kanthak. (2015, December 8). Executable installers are vulnerable^WEVIL (case 7): 7z*.exe allows remote code execution with escalation of privilege. Retrieved December 4, 2014.

Internal MISP references

UUID 5c2791d4-556d-426a-b305-44e23b50f013 which can be used as unique global reference for Executable Installers are Vulnerable in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-12-04T00:00:00Z
date_published 2015-12-08T00:00:00Z
source MITRE
title Executable installers are vulnerable^WEVIL (case 7): 7z*.exe allows remote code execution with escalation of privilege

Seclists Kanthak 7zip Installer

Kanthak, S. (2015, December 8). Executable installers are vulnerable^WEVIL (case 7): 7z*.exe allows remote code execution with escalation of privilege. Retrieved March 10, 2017.

Internal MISP references

UUID f2ebfc35-1bd9-4bc5-8a54-e2dea4e1caf5 which can be used as unique global reference for Seclists Kanthak 7zip Installer in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-10T00:00:00Z
date_published 2015-12-08T00:00:00Z
source MITRE
title Executable installers are vulnerable^WEVIL (case 7): 7z*.exe allows remote code execution with escalation of privilege

Redxorblue Remote Template Injection

Hawkins, J. (2018, July 18). Executing Macros From a DOCX With Remote Template Injection. Retrieved October 12, 2018.

Internal MISP references

UUID bce1cd78-b55e-40cf-8a90-64240db867ac which can be used as unique global reference for Redxorblue Remote Template Injection in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-10-12T00:00:00Z
date_published 2018-07-18T00:00:00Z
source MITRE
title Executing Macros From a DOCX With Remote Template Injection

Microsoft PSfromCsharp APR 2014

Babinec, K. (2014, April 28). Executing PowerShell scripts from C#. Retrieved April 22, 2019.

Internal MISP references

UUID 83e346d5-1894-4c46-98eb-88a61ce7f003 which can be used as unique global reference for Microsoft PSfromCsharp APR 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-22T00:00:00Z
date_published 2014-04-28T00:00:00Z
source MITRE
title Executing PowerShell scripts from C#

PAM Creds

Fernández, J. M. (2018, June 27). Exfiltrating credentials via PAM backdoors & DNS requests. Retrieved June 26, 2020.

Internal MISP references

UUID aa9d5bdd-2102-4322-8736-56db8e083fc0 which can be used as unique global reference for PAM Creds in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-26T00:00:00Z
date_published 2018-06-27T00:00:00Z
source MITRE
title Exfiltrating credentials via PAM backdoors & DNS requests

Microsoft Expand Utility

Microsoft. (2017, October 15). Expand. Retrieved February 19, 2019.

Internal MISP references

UUID bf73a375-87b7-4603-8734-9f3d8d11967e which can be used as unique global reference for Microsoft Expand Utility in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-19T00:00:00Z
date_published 2017-10-15T00:00:00Z
source MITRE
title Expand

LOLBAS Expand

LOLBAS. (n.d.). Expand.exe. Retrieved February 19, 2019.

Internal MISP references

UUID 689b058e-a4ec-45bf-b0f8-8885eb8d8b63 which can be used as unique global reference for LOLBAS Expand in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-19T00:00:00Z
source MITRE
title Expand.exe

polymorphic-medium

Shellseekercyber. (2024, January 7). Explainer: Packed Malware. Retrieved September 27, 2024.

Internal MISP references

UUID f7ffa0ee-80d4-5ed8-a432-23a33cbf2752 which can be used as unique global reference for polymorphic-medium in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-27T00:00:00Z
date_published 2024-01-07T00:00:00Z
source MITRE
title Explainer: Packed Malware

Proofpoint WinterVivern 2023

Michael Raggi & The Proofpoint Threat Research Team. (2023, March 30). Exploitation is a Dish Best Served Cold: Winter Vivern Uses Known Zimbra Vulnerability to Target Webmail Portals of NATO-Aligned Governments in Europe. Retrieved July 29, 2024.

Internal MISP references

UUID 45f638af-ad10-566e-9e4d-49385a79022f which can be used as unique global reference for Proofpoint WinterVivern 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-29T00:00:00Z
date_published 2023-03-30T00:00:00Z
source MITRE
title Exploitation is a Dish Best Served Cold: Winter Vivern Uses Known Zimbra Vulnerability to Target Webmail Portals of NATO-Aligned Governments in Europe

Mandiant CVE-2023-3519 Exploitation

James Nugent, Foti Castelan, Doug Bienstock, Justin Moore, Josh Murchie. (2023, July 21). Exploitation of Citrix Zero-Day by Possible Espionage Actors (CVE-2023-3519). Retrieved July 24, 2023.

Internal MISP references

UUID 4404ed65-3020-453d-8c51-2885018ba03b which can be used as unique global reference for Mandiant CVE-2023-3519 Exploitation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-24T00:00:00Z
date_published 2023-07-21T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Exploitation of Citrix Zero-Day by Possible Espionage Actors (CVE-2023-3519)

Exploit Database

Offensive Security. (n.d.). Exploit Database. Retrieved October 15, 2020.

Internal MISP references

UUID 38f7b3ea-9959-4dfb-8216-a745d071e7e2 which can be used as unique global reference for Exploit Database in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-15T00:00:00Z
source MITRE
title Exploit Database

Rhino Labs Cloud Image Backdoor Technique Sept 2019

Rhino Labs. (2019, August). Exploiting AWS ECR and ECS with the Cloud Container Attack Tool (CCAT). Retrieved September 12, 2019.

Internal MISP references

UUID 8fb46ed8-0c21-4b57-b2a6-89cb28f0abaf which can be used as unique global reference for Rhino Labs Cloud Image Backdoor Technique Sept 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-12T00:00:00Z
date_published 2019-08-01T00:00:00Z
source MITRE
title Exploiting AWS ECR and ECS with the Cloud Container Attack Tool (CCAT)

Azure AD PTA Vulnerabilities

Dr. Nestori Syynimaa. (2022, September 20). Exploiting Azure AD PTA vulnerabilities: Creating backdoor and harvesting credentials. Retrieved September 28, 2022.

Internal MISP references

UUID a0ddb60b-5445-46b3-94c5-b47e76de553d which can be used as unique global reference for Azure AD PTA Vulnerabilities in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-28T00:00:00Z
date_published 2022-09-20T00:00:00Z
source MITRE
title Exploiting Azure AD PTA vulnerabilities: Creating backdoor and harvesting credentials

Exploiting Smartphone USB

Zhaohui Wang & Angelos Stavrou. (n.d.). Exploiting Smart-Phone USB Connectivity For Fun And Profit. Retrieved May 25, 2022.

Internal MISP references

UUID 573796bd-4553-4ae1-884a-9af71b5de873 which can be used as unique global reference for Exploiting Smartphone USB in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-25T00:00:00Z
source MITRE
title Exploiting Smart-Phone USB Connectivity For Fun And Profit

versprite xpc vpn

VerSprite. (2018, January 24). Exploiting VyprVPN for MacOS. Retrieved April 20, 2022.

Internal MISP references

UUID 5e65d8cc-142b-4724-8a07-8e21558e0f64 which can be used as unique global reference for versprite xpc vpn in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-20T00:00:00Z
date_published 2018-01-24T00:00:00Z
source MITRE
title Exploiting VyprVPN for MacOS

Explorer.exe - LOLBAS Project

LOLBAS. (2020, June 24). Explorer.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 9ba3d54c-02d1-45bd-bfe8-939e84d9d44b which can be used as unique global reference for Explorer.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2020-06-24T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Explorer.exe

Palo Alto Unit 42 Google Workspace Domain Wide Delegation 2023

Zohar Zigdon. (2023, November 30). Exploring a Critical Risk in Google Workspace's Domain-Wide Delegation Feature. Retrieved January 16, 2024.

Internal MISP references

UUID cd76910f-1c15-50fb-a942-f19b6cc1ca69 which can be used as unique global reference for Palo Alto Unit 42 Google Workspace Domain Wide Delegation 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-16T00:00:00Z
date_published 2023-11-30T00:00:00Z
source MITRE
title Exploring a Critical Risk in Google Workspace's Domain-Wide Delegation Feature

Trend Micro Emotet Jan 2019

Trend Micro. (2019, January 16). Exploring Emotet's Activities . Retrieved March 25, 2019.

Internal MISP references

UUID a81f1dad-5841-4142-80c1-483b240fd67d which can be used as unique global reference for Trend Micro Emotet Jan 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-25T00:00:00Z
date_published 2019-01-16T00:00:00Z
source MITRE
title Exploring Emotet's Activities

SecurityTrails Google Hacking

Borges, E. (2019, March 5). Exploring Google Hacking Techniques. Retrieved September 12, 2024.

Internal MISP references

UUID 3e7fdeaf-24a7-4cb5-8ed3-6057c9035303 which can be used as unique global reference for SecurityTrails Google Hacking in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2019-03-05T00:00:00Z
source MITRE
title Exploring Google Hacking Techniques

Medium SSL Cert

Jain, M. (2019, September 16). Export & Download — SSL Certificate from Server (Site URL). Retrieved October 20, 2020.

Internal MISP references

UUID 6502425f-3435-4162-8c96-9e10a789d362 which can be used as unique global reference for Medium SSL Cert in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
date_published 2019-09-16T00:00:00Z
source MITRE
title Export & Download — SSL Certificate from Server (Site URL)

TrendMicro Exposed Redis 2020

David Fiser and Jaromir Horejsi. (2020, April 21). Exposed Redis Instances Abused for Remote Code Execution, Cryptocurrency Mining. Retrieved September 25, 2024.

Internal MISP references

UUID 58e61406-a8ca-52a8-be48-ef6066619a8a which can be used as unique global reference for TrendMicro Exposed Redis 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-25T00:00:00Z
date_published 2020-04-21T00:00:00Z
source MITRE
title Exposed Redis Instances Abused for Remote Code Execution, Cryptocurrency Mining

Magnet Forensics

Magnet Forensics. (2020, August 24). Expose Evidence of Timestomping with the NTFS Timestamp Mismatch Artifact. Retrieved June 20, 2024.

Internal MISP references

UUID 3971c8ac-4fdd-5e19-ac8a-b8d7abbaebe3 which can be used as unique global reference for Magnet Forensics in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-20T00:00:00Z
date_published 2020-08-24T00:00:00Z
source MITRE
title Expose Evidence of Timestomping with the NTFS Timestamp Mismatch Artifact

Google EXOTIC LILY March 2022

Stolyarov, V. (2022, March 17). Exposing initial access broker with ties to Conti. Retrieved August 18, 2022.

Internal MISP references

UUID 19d2cb48-bdb2-41fe-ba24-0769d7bd4d94 which can be used as unique global reference for Google EXOTIC LILY March 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-18T00:00:00Z
date_published 2022-03-17T00:00:00Z
source MITRE
title Exposing initial access broker with ties to Conti

Microsoft POLONIUM June 2022

Microsoft. (2022, June 2). Exposing POLONIUM activity and infrastructure targeting Israeli organizations. Retrieved July 1, 2022.

Internal MISP references

UUID 689ff1ab-9fed-4aa2-8e5e-78dac31e6fbd which can be used as unique global reference for Microsoft POLONIUM June 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-01T00:00:00Z
date_published 2022-06-02T00:00:00Z
source MITRE
title Exposing POLONIUM activity and infrastructure targeting Israeli organizations

External to DA, the OS X Way

Alex Rymdeko-Harvey, Steve Borosh. (2016, May 14). External to DA, the OS X Way. Retrieved September 12, 2024.

Internal MISP references

UUID b714e6a9-5c12-4a3b-89f9-d379c0284f06 which can be used as unique global reference for External to DA, the OS X Way in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2016-05-14T00:00:00Z
source MITRE
title External to DA, the OS X Way

Extexport.exe - LOLBAS Project

LOLBAS. (2018, May 25). Extexport.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 2aa09a10-a492-4753-bbd8-aacd31e4fee3 which can be used as unique global reference for Extexport.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Extexport.exe

Extrac32.exe - LOLBAS Project

LOLBAS. (2018, May 25). Extrac32.exe. Retrieved December 4, 2023.

Internal MISP references

UUID ae632afc-336c-488e-81f6-91ffe1829595 which can be used as unique global reference for Extrac32.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Extrac32.exe

Journey into IR ZeroAccess NTFS EA

Harrell, C. (2012, December 11). Extracting ZeroAccess from NTFS Extended Attributes. Retrieved June 3, 2016.

Internal MISP references

UUID e9dff187-fe7d-469d-81cb-30ad520dbd3d which can be used as unique global reference for Journey into IR ZeroAccess NTFS EA in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-03T00:00:00Z
date_published 2012-12-11T00:00:00Z
source MITRE
title Extracting ZeroAccess from NTFS Extended Attributes

Bizeul 2014

Bizeul, D., Fontarensky, I., Mouchoux, R., Perigaud, F., Pernet, C. (2014, July 11). Eye of the Tiger. Retrieved September 29, 2015.

Internal MISP references

UUID a4617ef4-e6d2-47e7-8f81-68e7380279bf which can be used as unique global reference for Bizeul 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-09-29T00:00:00Z
date_published 2014-07-11T00:00:00Z
source MITRE, Tidal Cyber
title Eye of the Tiger

Facad1ng

Spyboy. (2023). Facad1ng. Retrieved February 13, 2024.

Internal MISP references

UUID bd80f3d7-e653-5f8f-ba8a-00b8780ae935 which can be used as unique global reference for Facad1ng in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-13T00:00:00Z
date_published 2023-01-01T00:00:00Z
source MITRE
title Facad1ng

ThreatPost Social Media Phishing

O'Donnell, L. (2020, October 20). Facebook: A Top Launching Pad For Phishing Attacks. Retrieved October 20, 2020.

Internal MISP references

UUID 186c1213-d0c5-4eb6-aa0f-0fd61b07a1f7 which can be used as unique global reference for ThreatPost Social Media Phishing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
date_published 2020-10-20T00:00:00Z
source MITRE
title Facebook: A Top Launching Pad For Phishing Attacks

SentinelLabs reversing run-only applescripts 2021

Phil Stokes. (2021, January 11). FADE DEAD | Adventures in Reversing Malicious Run-Only AppleScripts. Retrieved September 29, 2022.

Internal MISP references

UUID 34dc9010-e800-420c-ace4-4f426c915d2f which can be used as unique global reference for SentinelLabs reversing run-only applescripts 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-29T00:00:00Z
date_published 2021-01-11T00:00:00Z
source MITRE
title FADE DEAD

Sentinel Labs

Phil Stokes. (2021, January 11). FADE DEAD | Adventures in Reversing Malicious Run-Only AppleScripts. Retrieved September 30, 2022.

Internal MISP references

UUID 785f7692-2be8-4f5d-921e-51efdfe0c0b9 which can be used as unique global reference for Sentinel Labs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-30T00:00:00Z
date_published 2021-01-11T00:00:00Z
source MITRE
title FADE DEAD

BleepingComputer Fake Chrome Errors June 17 2024

Bill Toulas. (2024, June 17). Fake Google Chrome errors trick you into running malicious PowerShell scripts. Retrieved June 20, 2024.

Internal MISP references

UUID 6efa70e3-d8eb-4260-b0ab-62335681e6fd which can be used as unique global reference for BleepingComputer Fake Chrome Errors June 17 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-20T00:00:00Z
date_published 2024-06-17T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Fake Google Chrome errors trick you into running malicious PowerShell scripts

ESET OceanLotus Mar 2019

Dumont, R. (2019, March 20). Fake or Fake: Keeping up with OceanLotus decoys. Retrieved April 1, 2019.

Internal MISP references

UUID b2745f5c-a181-48e1-b1cf-37a1ffe1fdf0 which can be used as unique global reference for ESET OceanLotus Mar 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-01T00:00:00Z
date_published 2019-03-20T00:00:00Z
source MITRE
title Fake or Fake: Keeping up with OceanLotus decoys

ZScaler BitB 2020

ZScaler. (2020, February 11). Fake Sites Stealing Steam Credentials. Retrieved March 8, 2023.

Internal MISP references

UUID c2f01a3b-a164-59b7-be5d-5eec4eb69ee5 which can be used as unique global reference for ZScaler BitB 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-08T00:00:00Z
date_published 2020-02-11T00:00:00Z
source MITRE
title Fake Sites Stealing Steam Credentials

FalconFeedsio Tweet October 9 2023

FalconFeedsio. (2023, October 9). FalconFeedsio Tweet October 9 2023. Retrieved October 10, 2023.

Internal MISP references

UUID e9810a28-f060-468b-b4ea-ffed9403ae8b which can be used as unique global reference for FalconFeedsio Tweet October 9 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-10T00:00:00Z
date_published 2023-10-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title FalconFeedsio Tweet October 9 2023

FalconFeedsio Tweet September 28 2023

FalconFeedsio. (2023, September 28). FalconFeedsio Tweet September 28 2023. Retrieved October 10, 2023.

Internal MISP references

UUID 78128031-bcbb-42c2-8bed-4613a10a02ca which can be used as unique global reference for FalconFeedsio Tweet September 28 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-10T00:00:00Z
date_published 2023-09-28T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title FalconFeedsio Tweet September 28 2023

falconoverwatch_blackcat_attack

Falcon OverWatch Team. (2022, March 23). Falcon OverWatch Threat Hunting Contributes to Seamless Protection Against Novel BlackCat Attack. Retrieved May 5, 2022.

Internal MISP references

UUID 9d0ff77c-09e9-4d58-86f4-e2398f298ca9 which can be used as unique global reference for falconoverwatch_blackcat_attack in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-05T00:00:00Z
date_published 2022-03-23T00:00:00Z
source MITRE
title Falcon OverWatch Threat Hunting Contributes to Seamless Protection Against Novel BlackCat Attack

CitizenLab Tropic Trooper Aug 2018

Alexander, G., et al. (2018, August 8). Familiar Feeling: A Malware Campaign Targeting the Tibetan Diaspora Resurfaces. Retrieved June 17, 2019.

Internal MISP references

UUID 5c662775-9703-4d01-844b-40a0e5c24fb9 which can be used as unique global reference for CitizenLab Tropic Trooper Aug 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-17T00:00:00Z
date_published 2018-08-08T00:00:00Z
source MITRE
title Familiar Feeling: A Malware Campaign Targeting the Tibetan Diaspora Resurfaces

ESET FamousSparrow September 23 2021

Tahseen Bin Taj, Matthieu Faou. (2021, September 23). FamousSparrow: A suspicious hotel guest. Retrieved October 24, 2024.

Internal MISP references

UUID f91d6d8e-22a4-4851-9444-7a066e6b7aa5 which can be used as unique global reference for ESET FamousSparrow September 23 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-24T00:00:00Z
date_published 2021-09-23T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title FamousSparrow: A suspicious hotel guest

CISA AA20-239A BeagleBoyz August 2020

DHS/CISA. (2020, August 26). FASTCash 2.0: North Korea's BeagleBoyz Robbing Banks. Retrieved September 29, 2021.

Internal MISP references

UUID a8a2e3f2-3967-4e82-a36a-2436c654fb3f which can be used as unique global reference for CISA AA20-239A BeagleBoyz August 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-29T00:00:00Z
date_published 2020-08-26T00:00:00Z
source MITRE, Tidal Cyber
title FASTCash 2.0: North Korea's BeagleBoyz Robbing Banks

Fast Flux - Welivesecurity

Albors, Josep. (2017, January 12). Fast Flux networks: What are they and how do they work?. Retrieved March 11, 2020.

Internal MISP references

UUID e232d739-663e-4878-b13b-9248cd81e657 which can be used as unique global reference for Fast Flux - Welivesecurity in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-11T00:00:00Z
date_published 2017-01-12T00:00:00Z
source MITRE
title Fast Flux networks: What are they and how do they work?

MehtaFastFluxPt1

Mehta, L. (2014, December 17). Fast Flux Networks Working and Detection, Part 1. Retrieved March 6, 2017.

Internal MISP references

UUID 5f169cae-6b59-4879-9a8f-93fdcea5cc58 which can be used as unique global reference for MehtaFastFluxPt1 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-06T00:00:00Z
date_published 2014-12-17T00:00:00Z
source MITRE
title Fast Flux Networks Working and Detection, Part 1

MehtaFastFluxPt2

Mehta, L. (2014, December 23). Fast Flux Networks Working and Detection, Part 2. Retrieved March 6, 2017.

Internal MISP references

UUID f8a98e55-c91e-4b5e-b6f3-0065ef07375d which can be used as unique global reference for MehtaFastFluxPt2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-06T00:00:00Z
date_published 2014-12-23T00:00:00Z
source MITRE
title Fast Flux Networks Working and Detection, Part 2

FBI-BEC

FBI. (2022). FBI 2022 Congressional Report on BEC and Real Estate Wire Fraud. Retrieved August 18, 2023.

Internal MISP references

UUID 3388bfec-7822-56dc-a384-95aa79f42fe8 which can be used as unique global reference for FBI-BEC in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-18T00:00:00Z
date_published 2022-01-01T00:00:00Z
source MITRE
title FBI 2022 Congressional Report on BEC and Real Estate Wire Fraud

FBI Flash FIN7 USB

The Record. (2022, January 7). FBI: FIN7 hackers target US companies with BadUSB devices to install ransomware. Retrieved January 14, 2022.

Internal MISP references

UUID 42dc957c-007b-4f90-88c6-1afd6d1032e8 which can be used as unique global reference for FBI Flash FIN7 USB in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-14T00:00:00Z
date_published 2022-01-07T00:00:00Z
source MITRE
title FBI: FIN7 hackers target US companies with BadUSB devices to install ransomware

FBI Lazarus Stake.com Theft Attribution September 2023

FBI National Press Office. (2023, September 6). FBI Identifies Lazarus Group Cyber Actors as Responsible for Theft of $41 Million from Stake.com. Retrieved September 13, 2023.

Internal MISP references

UUID d753c01c-c0f6-4382-ae79-5605a28c94d5 which can be used as unique global reference for FBI Lazarus Stake.com Theft Attribution September 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-13T00:00:00Z
date_published 2023-09-06T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title FBI Identifies Lazarus Group Cyber Actors as Responsible for Theft of $41 Million from Stake.com

VPNFilter Router

Tung, Liam. (2018, May 29). FBI to all router users: Reboot now to neuter Russia's VPNFilter malware. Retrieved March 7, 2024.

Internal MISP references

UUID 191bc704-3314-56c5-8f2d-dbbbb8afea2f which can be used as unique global reference for VPNFilter Router in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-07T00:00:00Z
date_published 2018-05-29T00:00:00Z
source MITRE
title FBI to all router users: Reboot now to neuter Russia's VPNFilter malware

Hakobyan 2009

Hakobyan, A. (2009, January 8). FDump - Dumping File Sectors Directly from Disk using Logical Offsets. Retrieved November 12, 2014.

Internal MISP references

UUID d92f6dc0-e902-4a4a-9083-8d1667a7003e which can be used as unique global reference for Hakobyan 2009 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-12T00:00:00Z
date_published 2009-01-08T00:00:00Z
source MITRE
title FDump - Dumping File Sectors Directly from Disk using Logical Offsets

Google Federating GC

Google. (n.d.). Federating Google Cloud with Active Directory. Retrieved March 13, 2020.

Internal MISP references

UUID 4e17ca9b-5c98-409b-9496-7c37fe9ee837 which can be used as unique global reference for Google Federating GC in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-13T00:00:00Z
source MITRE
title Federating Google Cloud with Active Directory

Kaspersky Ferocious Kitten Jun 2021

GReAT. (2021, June 16). Ferocious Kitten: 6 Years of Covert Surveillance in Iran. Retrieved September 22, 2021.

Internal MISP references

UUID b8f8020d-3f5c-4b5e-8761-6ecdd63fcd50 which can be used as unique global reference for Kaspersky Ferocious Kitten Jun 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-22T00:00:00Z
date_published 2021-06-16T00:00:00Z
source MITRE, Tidal Cyber
title Ferocious Kitten: 6 Years of Covert Surveillance in Iran

Fidelis njRAT June 2013

Fidelis Cybersecurity. (2013, June 28). Fidelis Threat Advisory #1009: "njRAT" Uncovered. Retrieved June 4, 2019.

Internal MISP references

UUID 6c985470-a923-48fd-82c9-9128b6d59bcb which can be used as unique global reference for Fidelis njRAT June 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-04T00:00:00Z
date_published 2013-06-28T00:00:00Z
source MITRE
title Fidelis Threat Advisory #1009: "njRAT" Uncovered

Fidelis INOCNATION

Fidelis Cybersecurity. (2015, December 16). Fidelis Threat Advisory #1020: Dissecting the Malware Involved in the INOCNATION Campaign. Retrieved March 24, 2016.

Internal MISP references

UUID 9d9c0c71-d5a2-41e4-aa90-d1046e0742c7 which can be used as unique global reference for Fidelis INOCNATION in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-03-24T00:00:00Z
date_published 2015-12-16T00:00:00Z
source MITRE
title Fidelis Threat Advisory #1020: Dissecting the Malware Involved in the INOCNATION Campaign

Securelist fileless attacks Feb 2017

Kaspersky Lab's Global Research and Analysis Team. (2017, February 8). Fileless attacks against enterprise networks. Retrieved February 8, 2017.

Internal MISP references

UUID b58d9c32-89c5-449a-88e7-1c7dd3f8380e which can be used as unique global reference for Securelist fileless attacks Feb 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-02-08T00:00:00Z
date_published 2017-02-08T00:00:00Z
source MITRE
title Fileless attacks against enterprise networks

Airbus Security Kovter Analysis

Dove, A. (2016, March 23). Fileless Malware – A Behavioural Analysis Of Kovter Persistence. Retrieved December 5, 2017.

Internal MISP references

UUID a8420828-9e00-45a1-90d7-a37f898204f9 which can be used as unique global reference for Airbus Security Kovter Analysis in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-05T00:00:00Z
date_published 2016-03-23T00:00:00Z
source MITRE
title Fileless Malware – A Behavioural Analysis Of Kovter Persistence

Sysdig Fileless Malware 23022

Nicholas Lang. (2022, May 3). Fileless malware mitigation. Retrieved September 24, 2024.

Internal MISP references

UUID d728b343-3256-55ff-9491-f66b98c16226 which can be used as unique global reference for Sysdig Fileless Malware 23022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-24T00:00:00Z
date_published 2022-05-03T00:00:00Z
source MITRE
title Fileless malware mitigation

Microsoft Fileless

Microsoft. (2023, February 6). Fileless threats. Retrieved March 23, 2023.

Internal MISP references

UUID 263fc1ab-f928-583f-986d-1e1bae9b3c85 which can be used as unique global reference for Microsoft Fileless in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-23T00:00:00Z
date_published 2023-02-06T00:00:00Z
source MITRE
title Fileless threats

enigma0x3 Fileless UAC Bypass

Nelson, M. (2016, August 15). "Fileless" UAC Bypass using eventvwr.exe and Registry Hijacking. Retrieved December 27, 2016.

Internal MISP references

UUID 74b16ca4-9494-4f10-97c5-103a8521818f which can be used as unique global reference for enigma0x3 Fileless UAC Bypass in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-12-27T00:00:00Z
date_published 2016-08-15T00:00:00Z
source MITRE
title "Fileless" UAC Bypass using eventvwr.exe and Registry Hijacking

enigma0x3 sdclt bypass

Nelson, M. (2017, March 17). "Fileless" UAC Bypass Using sdclt.exe. Retrieved May 25, 2017.

Internal MISP references

UUID 5e5597e2-ea05-41e0-8752-ca95a89a5aa3 which can be used as unique global reference for enigma0x3 sdclt bypass in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-05-25T00:00:00Z
date_published 2017-03-17T00:00:00Z
source MITRE
title "Fileless" UAC Bypass Using sdclt.exe

Microsoft File Mgmt

Microsoft. (2018, May 31). File Management (Local File Systems). Retrieved September 28, 2021.

Internal MISP references

UUID e6d84416-5808-4e7d-891b-ba67dada8726 which can be used as unique global reference for Microsoft File Mgmt in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-28T00:00:00Z
date_published 2018-05-31T00:00:00Z
source MITRE
title File Management (Local File Systems)

Microsoft File Streams

Microsoft. (n.d.). File Streams. Retrieved September 12, 2024.

Internal MISP references

UUID ef3f58da-e735-4b1d-914c-fafabb7439bf which can be used as unique global reference for Microsoft File Streams in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
source MITRE
title File Streams

file_upload_attacks_pt2

YesWeRHackers. (2021, June 16). File Upload Attacks (Part 2). Retrieved August 23, 2022.

Internal MISP references

UUID 4f7c7d6c-ad56-594f-bcb8-79523f436f2c which can be used as unique global reference for file_upload_attacks_pt2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-23T00:00:00Z
date_published 2021-06-16T00:00:00Z
source MITRE
title File Upload Attacks (Part 2)

Microsoft GPO Security Filtering

Microsoft. (2018, May 30). Filtering the Scope of a GPO. Retrieved March 13, 2019.

Internal MISP references

UUID 327caed7-a53f-4245-8774-a9f170932012 which can be used as unique global reference for Microsoft GPO Security Filtering in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-13T00:00:00Z
date_published 2018-05-30T00:00:00Z
source MITRE
title Filtering the Scope of a GPO

FireEye FIN10 June 2017

FireEye iSIGHT Intelligence. (2017, June 16). FIN10: Anatomy of a Cyber Extortion Operation. Retrieved June 25, 2017.

Internal MISP references

UUID 9d5c3956-7169-48d5-b4d0-f7a56a742adf which can be used as unique global reference for FireEye FIN10 June 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-06-25T00:00:00Z
date_published 2017-06-16T00:00:00Z
source MITRE, Tidal Cyber
title FIN10: Anatomy of a Cyber Extortion Operation

Mandiant FIN12 Group Profile October 07 2021

Joshua Shilko, Zach Riddle, Jennifer Brooks, Genevieve Stark, Adam Brunner, Kimberly Goody, Jeremy Kennelly. (2021, October 7). FIN12 Group Profile. Retrieved September 22, 2023.

Internal MISP references

UUID 7af84b3d-bbd6-449f-b29b-2f14591c9f05 which can be used as unique global reference for Mandiant FIN12 Group Profile October 07 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-22T00:00:00Z
date_published 2021-10-07T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title FIN12 Group Profile

Mandiant FIN12 Oct 2021

Shilko, J., et al. (2021, October 7). FIN12: The Prolific Ransomware Intrusion Threat Actor That Has Aggressively Pursued Healthcare Targets. Retrieved June 15, 2023.

Internal MISP references

UUID 4514d7cc-b999-5711-a398-d90e5d3570f2 which can be used as unique global reference for Mandiant FIN12 Oct 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-15T00:00:00Z
date_published 2021-10-07T00:00:00Z
source MITRE
title FIN12: The Prolific Ransomware Intrusion Threat Actor That Has Aggressively Pursued Healthcare Targets

CERTFR-2023-CTI-007

CERT-FR. (2023, September 18). FIN12: Un Groupe Cybercriminel aux Multiples Rançongiciel. Retrieved September 21, 2023.

Internal MISP references

UUID 0f4a03c5-79b3-418e-a77d-305d5a32caca which can be used as unique global reference for CERTFR-2023-CTI-007 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-21T00:00:00Z
date_published 2023-09-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title FIN12: Un Groupe Cybercriminel aux Multiples Rançongiciel

Mandiant FIN13 Aug 2022

Ta, V., et al. (2022, August 8). FIN13: A Cybercriminal Threat Actor Focused on Mexico. Retrieved February 9, 2023.

Internal MISP references

UUID ebd9d479-1954-5a4a-b7f0-d5372489733c which can be used as unique global reference for Mandiant FIN13 Aug 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-09T00:00:00Z
date_published 2022-08-08T00:00:00Z
source MITRE
title FIN13: A Cybercriminal Threat Actor Focused on Mexico

FireEye FIN4 Stealing Insider NOV 2014

Dennesen, K. et al.. (2014, November 30). FIN4: Stealing Insider Information for an Advantage in Stock Trading?. Retrieved December 17, 2018.

Internal MISP references

UUID b27f1040-46e5-411a-b238-0b40f6160680 which can be used as unique global reference for FireEye FIN4 Stealing Insider NOV 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-12-17T00:00:00Z
date_published 2014-11-30T00:00:00Z
source MITRE
title FIN4: Stealing Insider Information for an Advantage in Stock Trading?

Visa FIN6 Feb 2019

Visa Public. (2019, February). FIN6 Cybercrime Group Expands Threat to eCommerce Merchants. Retrieved September 16, 2019.

Internal MISP references

UUID 9e9e8811-1d8e-4400-8688-e634f859c4e0 which can be used as unique global reference for Visa FIN6 Feb 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-16T00:00:00Z
date_published 2019-02-01T00:00:00Z
source MITRE
title FIN6 Cybercrime Group Expands Threat to eCommerce Merchants

SentinelOne FrameworkPOS September 2019

Kremez, V. (2019, September 19). FIN6 “FrameworkPOS”: Point-of-Sale Malware Analysis & Internals. Retrieved September 8, 2020.

Internal MISP references

UUID 054d7827-3d0c-40a7-b2a0-1428ad7729ea which can be used as unique global reference for SentinelOne FrameworkPOS September 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-08T00:00:00Z
date_published 2019-09-19T00:00:00Z
source MITRE
title FIN6 “FrameworkPOS”: Point-of-Sale Malware Analysis & Internals

SecureList Griffon May 2019

Namestnikov, Y. and Aime, F. (2019, May 8). FIN7.5: the infamous cybercrime rig “FIN7” continues its activities. Retrieved October 11, 2019.

Internal MISP references

UUID 42e196e4-42a7-427d-a69b-d78fa6375f8c which can be used as unique global reference for SecureList Griffon May 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-11T00:00:00Z
date_published 2019-05-08T00:00:00Z
source MITRE
title FIN7.5: the infamous cybercrime rig “FIN7” continues its activities

Threatpost Lizar May 2021

Seals, T. (2021, May 14). FIN7 Backdoor Masquerades as Ethical Hacking Tool. Retrieved February 2, 2022.

Internal MISP references

UUID 1b89f62f-586d-4dee-b6dd-e5a5cd090a0e which can be used as unique global reference for Threatpost Lizar May 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-02T00:00:00Z
date_published 2021-05-14T00:00:00Z
source MITRE
title FIN7 Backdoor Masquerades as Ethical Hacking Tool

FireEye FIN7 April 2017

Carr, N., et al. (2017, April 24). FIN7 Evolution and the Phishing LNK. Retrieved April 24, 2017.

Internal MISP references

UUID 6ee27fdb-1753-4fdf-af72-3295b072ff10 which can be used as unique global reference for FireEye FIN7 April 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-04-24T00:00:00Z
date_published 2017-04-24T00:00:00Z
source MITRE
title FIN7 Evolution and the Phishing LNK

Mandiant FIN7 Apr 2022

Abdo, B., et al. (2022, April 4). FIN7 Power Hour: Adversary Archaeology and the Evolution of FIN7. Retrieved April 5, 2022.

Internal MISP references

UUID be9919c0-ca52-593b-aea0-c5e9a262b570 which can be used as unique global reference for Mandiant FIN7 Apr 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-05T00:00:00Z
date_published 2022-04-04T00:00:00Z
source MITRE
title FIN7 Power Hour: Adversary Archaeology and the Evolution of FIN7

Mandiant FIN7 April 4 2022

Bryce Abdo, Zander Work, Ioana Teaca, Brendan McKeague. (2022, April 4). FIN7 Power Hour: Adversary Archaeology and the Evolution of FIN7. Retrieved May 25, 2023.

Internal MISP references

UUID fbc3ea90-d3d4-440e-964d-6cd2e991df0c which can be used as unique global reference for Mandiant FIN7 April 4 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-25T00:00:00Z
date_published 2022-04-04T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title FIN7 Power Hour: Adversary Archaeology and the Evolution of FIN7

Gemini FIN7 Oct 2021

Gemini Advisory. (2021, October 21). FIN7 Recruits Talent For Push Into Ransomware. Retrieved February 2, 2022.

Internal MISP references

UUID bbaef178-8577-4398-8e28-604faf0950b4 which can be used as unique global reference for Gemini FIN7 Oct 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-02T00:00:00Z
date_published 2021-10-21T00:00:00Z
source MITRE
title FIN7 Recruits Talent For Push Into Ransomware

Flashpoint FIN 7 March 2019

Platt, J. and Reeves, J.. (2019, March). FIN7 Revisited: Inside Astra Panel and SQLRat Malware. Retrieved June 18, 2019.

Internal MISP references

UUID b09453a3-c0df-4e96-b399-e7b34e068e9d which can be used as unique global reference for Flashpoint FIN 7 March 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-18T00:00:00Z
date_published 2019-03-01T00:00:00Z
source MITRE
title FIN7 Revisited: Inside Astra Panel and SQLRat Malware

FireEye FIN7 March 2017

Miller, S., et al. (2017, March 7). FIN7 Spear Phishing Campaign Targets Personnel Involved in SEC Filings. Retrieved March 8, 2017.

Internal MISP references

UUID 7987bb91-ec41-42f8-bd2d-dabc26509a08 which can be used as unique global reference for FireEye FIN7 March 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-08T00:00:00Z
date_published 2017-03-07T00:00:00Z
source MITRE, Tidal Cyber
title FIN7 Spear Phishing Campaign Targets Personnel Involved in SEC Filings

Morphisec FIN7 June 2017

Gorelik, M.. (2017, June 9). FIN7 Takes Another Bite at the Restaurant Industry. Retrieved July 13, 2017.

Internal MISP references

UUID 3831173c-7c67-4f16-b652-ad992a7ce411 which can be used as unique global reference for Morphisec FIN7 June 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-13T00:00:00Z
date_published 2017-06-09T00:00:00Z
source MITRE
title FIN7 Takes Another Bite at the Restaurant Industry

Esentire 5 8 2024

Esentire Threat Response Unit. (2024, May 8). FIN7 Uses Trusted Brands and Sponsored Google Ads to Distribute MSIX…. Retrieved May 14, 2024.

Internal MISP references

UUID 67c3a7ed-e2e2-4566-aca7-61e766f177bf which can be used as unique global reference for Esentire 5 8 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-14T00:00:00Z
date_published 2024-05-08T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title FIN7 Uses Trusted Brands and Sponsored Google Ads to Distribute MSIX…

CyberScoop FIN7 Oct 2017

Waterman, S. (2017, October 16). Fin7 weaponization of DDE is just their latest slick move, say researchers. Retrieved November 21, 2017.

Internal MISP references

UUID e38adff1-7f53-4b0c-9d58-a4640b09b10d which can be used as unique global reference for CyberScoop FIN7 Oct 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-21T00:00:00Z
date_published 2017-10-16T00:00:00Z
source MITRE
title Fin7 weaponization of DDE is just their latest slick move, say researchers

Bitdefender FIN8 BADHATCH Report

Bitdefender. (2021, March 10). FIN8 Returns with Improved BADHATCH Toolkit. Retrieved October 30, 2023.

Internal MISP references

UUID 501b6391-e09e-47dc-9cfc-c8ed4c034aca which can be used as unique global reference for Bitdefender FIN8 BADHATCH Report in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-30T00:00:00Z
date_published 2021-03-10T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title FIN8 Returns with Improved BADHATCH Toolkit

BitDefender BADHATCH Mar 2021

Vrabie, V., et al. (2021, March 10). FIN8 Returns with Improved BADHATCH Toolkit. Retrieved September 8, 2021.

Internal MISP references

UUID 958cfc9a-901c-549d-96c2-956272b240e3 which can be used as unique global reference for BitDefender BADHATCH Mar 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-08T00:00:00Z
date_published 2021-03-10T00:00:00Z
source MITRE
title FIN8 Returns with Improved BADHATCH Toolkit

Bitdefender Sardonic Aug 2021

Budaca, E., et al. (2021, August 25). FIN8 Threat Actor Goes Agile with New Sardonic Backdoor. Retrieved August 9, 2023.

Internal MISP references

UUID 8e9d05c9-6783-5738-ac85-a444810a8074 which can be used as unique global reference for Bitdefender Sardonic Aug 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-09T00:00:00Z
date_published 2021-08-25T00:00:00Z
source MITRE
title FIN8 Threat Actor Goes Agile with New Sardonic Backdoor

Symantec FIN8 Jul 2023

Symantec Threat Hunter Team. (2023, July 18). FIN8 Uses Revamped Sardonic Backdoor to Deliver Noberus Ransomware. Retrieved August 9, 2023.

Internal MISP references

UUID 9b08b7f0-1a33-5d76-817f-448fac0d165a which can be used as unique global reference for Symantec FIN8 Jul 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-09T00:00:00Z
date_published 2023-07-18T00:00:00Z
source MITRE
title FIN8 Uses Revamped Sardonic Backdoor to Deliver Noberus Ransomware

DiginotarCompromise

Fisher, D. (2012, October 31). Final Report on DigiNotar Hack Shows Total Compromise of CA Servers. Retrieved March 6, 2017.

Internal MISP references

UUID 3c9b7b9a-d30a-4865-a96c-6e68d9e20452 which can be used as unique global reference for DiginotarCompromise in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-06T00:00:00Z
date_published 2012-10-31T00:00:00Z
source MITRE
title Final Report on DigiNotar Hack Shows Total Compromise of CA Servers

FireEye Financial Actors Moving into OT

Brubaker, N. Zafra, D. K. Lunden, K. Proska, K. Hildebrandt, C.. (2020, July 15). Financially Motivated Actors Are Expanding Access Into OT: Analysis of Kill Lists That Include OT Processes Used With Seven Malware Families. Retrieved February 15, 2021.

Internal MISP references

UUID 4bd514b8-1f79-4946-b001-110ce5cf29a9 which can be used as unique global reference for FireEye Financial Actors Moving into OT in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-15T00:00:00Z
date_published 2020-07-15T00:00:00Z
source MITRE
title Financially Motivated Actors Are Expanding Access Into OT: Analysis of Kill Lists That Include OT Processes Used With Seven Malware Families

MITRECND FindAPIHash

Jason (jxb5151). (2021, January 28). findapihash.py. Retrieved August 22, 2022.

Internal MISP references

UUID 2260f0a1-2a6c-4373-9e3a-624fd89446e3 which can be used as unique global reference for MITRECND FindAPIHash in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-22T00:00:00Z
date_published 2021-01-28T00:00:00Z
source MITRE
title findapihash.py

Expel IO Evil in AWS

A. Randazzo, B. Manahan and S. Lipton. (2020, April 28). Finding Evil in AWS. Retrieved June 25, 2020.

Internal MISP references

UUID 4c2424d6-670b-4db0-a752-868b4c954e29 which can be used as unique global reference for Expel IO Evil in AWS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-25T00:00:00Z
date_published 2020-04-28T00:00:00Z
source MITRE
title Finding Evil in AWS

Evil WMI

Chad Tilbury. (2023, May 22). Finding Evil WMI Event Consumers with Disk Forensics. Retrieved February 9, 2024.

Internal MISP references

UUID ee46fd07-3df3-50f6-b922-263f031ee23f which can be used as unique global reference for Evil WMI in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-09T00:00:00Z
date_published 2023-05-22T00:00:00Z
source MITRE
title Finding Evil WMI Event Consumers with Disk Forensics

SANS Decrypting SSL

Butler, M. (2013, November). Finding Hidden Threats by Decrypting SSL. Retrieved April 5, 2016.

Internal MISP references

UUID d251a79b-8516-41a7-b394-47a761d0ab3b which can be used as unique global reference for SANS Decrypting SSL in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-05T00:00:00Z
date_published 2013-11-01T00:00:00Z
source MITRE
title Finding Hidden Threats by Decrypting SSL

ADSecurity Finding Passwords in SYSVOL

Sean Metcalf. (2015, December 28). Finding Passwords in SYSVOL & Exploiting Group Policy Preferences. Retrieved February 17, 2020.

Internal MISP references

UUID 538def90-5de4-4b8c-b535-0e2570ba1841 which can be used as unique global reference for ADSecurity Finding Passwords in SYSVOL in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-17T00:00:00Z
date_published 2015-12-28T00:00:00Z
source MITRE
title Finding Passwords in SYSVOL & Exploiting Group Policy Preferences

Findstr.exe - LOLBAS Project

LOLBAS. (2018, May 25). Findstr.exe. Retrieved December 4, 2023.

Internal MISP references

UUID fc4b7b28-ac74-4a8f-a39d-ce55df5fca08 which can be used as unique global reference for Findstr.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Findstr.exe

FinFisher Citation

FinFisher. (n.d.). Retrieved September 12, 2024.

Internal MISP references

UUID 6ef0b8d8-ba98-49ce-807d-5a85d111b027 which can be used as unique global reference for FinFisher Citation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
source MITRE
title FinFisher Citation

FinFisher exposed

Microsoft Defender Security Research Team. (2018, March 1). FinFisher exposed: A researcher’s tale of defeating traps, tricks, and complex virtual machines. Retrieved January 27, 2022.

Internal MISP references

UUID b2f4541e-f981-4b25-abf4-1bec92b16faa which can be used as unique global reference for FinFisher exposed in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-27T00:00:00Z
date_published 2018-03-01T00:00:00Z
source MITRE
title FinFisher exposed: A researcher’s tale of defeating traps, tricks, and complex virtual machines

Microsoft FinFisher March 2018

Allievi, A.,Flori, E. (2018, March 01). FinFisher exposed: A researcher’s tale of defeating traps, tricks, and complex virtual machines. Retrieved July 9, 2018.

Internal MISP references

UUID 88c97a9a-ef14-4695-bde0-9de2b5f5343b which can be used as unique global reference for Microsoft FinFisher March 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-09T00:00:00Z
date_published 2018-03-01T00:00:00Z
source MITRE
title FinFisher exposed: A researcher’s tale of defeating traps, tricks, and complex virtual machines

Finger.exe - LOLBAS Project

LOLBAS. (2021, August 30). Finger.exe. Retrieved December 4, 2023.

Internal MISP references

UUID e32d01eb-d904-43dc-a7e2-bdcf42f3ebb2 which can be used as unique global reference for Finger.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-08-30T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Finger.exe

FireEye Cyber Threats to Media Industries

FireEye. (n.d.). Retrieved April 19, 2019.

Internal MISP references

UUID 7b9bd753-01b7-4923-9964-19c59123ace2 which can be used as unique global reference for FireEye Cyber Threats to Media Industries in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-19T00:00:00Z
source MITRE
title FireEye Cyber Threats to Media Industries

FireEye DLL Side-Loading

Amanda Steward. (2014). FireEye DLL Side-Loading: A Thorn in the Side of the Anti-Virus Industry. Retrieved March 13, 2020.

Internal MISP references

UUID 9d58bcbb-5b96-4e12-8ff2-e0b084c3eb8c which can be used as unique global reference for FireEye DLL Side-Loading in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-13T00:00:00Z
date_published 2014-01-01T00:00:00Z
source MITRE
title FireEye DLL Side-Loading: A Thorn in the Side of the Anti-Virus Industry

FireEye Shamoon Nov 2016

FireEye. (2016, November 30). FireEye Responds to Wave of Destructive Cyber Attacks in Gulf Region. Retrieved January 11, 2017.

Internal MISP references

UUID 44b2eb6b-4902-4ca0-80e5-7333d620e075 which can be used as unique global reference for FireEye Shamoon Nov 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-01-11T00:00:00Z
date_published 2016-11-30T00:00:00Z
source MITRE
title FireEye Responds to Wave of Destructive Cyber Attacks in Gulf Region

FireEye Ryuk and Trickbot January 2019

Goody, K., et al (2019, January 11). A Nasty Trick: From Credential Theft Malware to Business Disruption. Retrieved May 12, 2020.

Internal MISP references

UUID b29dc755-f1f0-4206-9ecf-29257a1909ee which can be used as unique global reference for FireEye Ryuk and Trickbot January 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-12T00:00:00Z
source MITRE
title FireEye Ryuk and Trickbot January 2019

DarkReading FireEye SolarWinds

Kelly Jackson Higgins. (2021, January 7). FireEye's Mandia: 'Severity-Zero Alert' Led to Discovery of SolarWinds Attack. Retrieved April 18, 2022.

Internal MISP references

UUID a662c764-8954-493f-88e5-e022e093a785 which can be used as unique global reference for DarkReading FireEye SolarWinds in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-18T00:00:00Z
date_published 2021-01-07T00:00:00Z
source MITRE
title FireEye's Mandia: 'Severity-Zero Alert' Led to Discovery of SolarWinds Attack

FireEye FinSpy Sept 2017

Jiang, G., et al. (2017, September 12). FireEye Uncovers CVE-2017-8759: Zero-Day Used in the Wild to Distribute FINSPY. Retrieved February 15, 2018.

Internal MISP references

UUID 142cf7a3-2ca2-4cf3-b95a-9f4b3bc1cdce which can be used as unique global reference for FireEye FinSpy Sept 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-15T00:00:00Z
date_published 2017-09-12T00:00:00Z
source MITRE
title FireEye Uncovers CVE-2017-8759: Zero-Day Used in the Wild to Distribute FINSPY

RiskIQ Cobalt Jan 2018

Klijnsma, Y.. (2018, January 16). First Activities of Cobalt Group in 2018: Spear Phishing Russian Banks. Retrieved October 10, 2018.

Internal MISP references

UUID 7d48b679-d44d-466e-b12b-16f0f9858d15 which can be used as unique global reference for RiskIQ Cobalt Jan 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-10-10T00:00:00Z
date_published 2018-01-16T00:00:00Z
source MITRE
title First Activities of Cobalt Group in 2018: Spear Phishing Russian Banks

Chrome Extension Crypto Miner

Brinkmann, M. (2017, September 19). First Chrome extension with JavaScript Crypto Miner detected. Retrieved November 16, 2017.

Internal MISP references

UUID ae28f530-40da-451e-89b8-b472340c3e0a which can be used as unique global reference for Chrome Extension Crypto Miner in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-16T00:00:00Z
date_published 2017-09-19T00:00:00Z
source MITRE
title First Chrome extension with JavaScript Crypto Miner detected

Aquasec Kubernetes Attack 2023

Michael Katchinskiy, Assaf Morag. (2023, April 21). First-Ever Attack Leveraging Kubernetes RBAC to Backdoor Clusters. Retrieved July 14, 2023.

Internal MISP references

UUID 6d6e2fc8-9806-5480-bfaa-a43a962a4980 which can be used as unique global reference for Aquasec Kubernetes Attack 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-14T00:00:00Z
date_published 2023-04-21T00:00:00Z
source MITRE
title First-Ever Attack Leveraging Kubernetes RBAC to Backdoor Clusters

ESET-Twitoor

ESET. (2016, August 24). First Twitter-controlled Android botnet discovered. Retrieved December 22, 2016.

Internal MISP references

UUID 845896a6-b21d-489d-b75c-1e35b3ec78e0 which can be used as unique global reference for ESET-Twitoor in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-12-22T00:00:00Z
date_published 2016-08-24T00:00:00Z
source MITRE
title First Twitter-controlled Android botnet discovered

Baldwin, M., Flores, J., Kess, B.. (2018, June 17). Five steps to securing your identity infrastructure. Retrieved October 4, 2019.

Internal MISP references

UUID 3a0c4458-c8ec-44f9-95cc-0eb136a927cb which can be used as unique global reference for Microsoft Azure AD Admin Consent in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-04T00:00:00Z
date_published 2018-06-17T00:00:00Z
source MITRE
title Five steps to securing your identity infrastructure

NTT Security Flagpro new December 2021

Hada, H. (2021, December 28). Flagpro The new malware used by BlackTech. Retrieved March 25, 2022.

Internal MISP references

UUID c0f523fa-7f3b-4c85-b48f-19ae770e9f3b which can be used as unique global reference for NTT Security Flagpro new December 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-25T00:00:00Z
date_published 2021-12-28T00:00:00Z
source MITRE
title Flagpro The new malware used by BlackTech

Kaspersky Flame Functionality

Gostev, A. (2012, May 30). Flame: Bunny, Frog, Munch and BeetleJuice…. Retrieved March 1, 2017.

Internal MISP references

UUID c7d030ad-0ecf-458f-85d4-93778d759dc1 which can be used as unique global reference for Kaspersky Flame Functionality in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-01T00:00:00Z
date_published 2012-05-30T00:00:00Z
source MITRE
title Flame: Bunny, Frog, Munch and BeetleJuice…

Crysys Skywiper

sKyWIper Analysis Team. (2012, May 31). sKyWIper (a.k.a. Flame a.k.a. Flamer): A complex malware for targeted attacks. Retrieved September 6, 2018.

Internal MISP references

UUID ea35f530-b0fd-4e27-a7a9-6ba41566154c which can be used as unique global reference for Crysys Skywiper in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-09-06T00:00:00Z
source MITRE
title Flamer): A complex malware for targeted attacks

Symantec Beetlejuice

Symantec Security Response. (2012, May 31). Flamer: A Recipe for Bluetoothache. Retrieved February 25, 2017.

Internal MISP references

UUID 691ada65-fe64-4917-b379-1db2573eea32 which can be used as unique global reference for Symantec Beetlejuice in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-02-25T00:00:00Z
date_published 2012-05-31T00:00:00Z
source MITRE
title Flamer: A Recipe for Bluetoothache

Microsoft Flax Typhoon August 24 2023

Microsoft Threat Intelligence. (2023, August 24). Flax Typhoon using legitimate software to quietly access Taiwanese organizations. Retrieved August 28, 2023.

Internal MISP references

UUID ec962b72-7b7f-4f7e-b6d6-7c5380b07201 which can be used as unique global reference for Microsoft Flax Typhoon August 24 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-28T00:00:00Z
date_published 2023-08-24T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Flax Typhoon using legitimate software to quietly access Taiwanese organizations

fltMC.exe - LOLBAS Project

LOLBAS. (2021, September 18). fltMC.exe. Retrieved December 4, 2023.

Internal MISP references

UUID cf9b4bd3-92f0-405b-85e7-95e65d548b79 which can be used as unique global reference for fltMC.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-09-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title fltMC.exe

IranThreats Kittens Dec 2017

Iran Threats . (2017, December 5). Flying Kitten to Rocket Kitten, A Case of Ambiguity and Shared Code. Retrieved May 28, 2020.

Internal MISP references

UUID 8338ad75-89f2-47d8-b85b-7cbf331bd7cd which can be used as unique global reference for IranThreats Kittens Dec 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-28T00:00:00Z
date_published 2017-12-05T00:00:00Z
source MITRE
title Flying Kitten to Rocket Kitten, A Case of Ambiguity and Shared Code

MSTIC FoggyWeb September 2021

Ramin Nafisi. (2021, September 27). FoggyWeb: Targeted NOBELIUM malware leads to persistent backdoor. Retrieved October 4, 2021.

Internal MISP references

UUID 1ef61100-c5e7-4725-8456-e508c5f6d68a which can be used as unique global reference for MSTIC FoggyWeb September 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-04T00:00:00Z
date_published 2021-09-27T00:00:00Z
source MITRE
title FoggyWeb: Targeted NOBELIUM malware leads to persistent backdoor

Following the CloudTrail: Generating strong AWS security signals with Sumo Logic

Dan Whalen. (2019, September 10). Following the CloudTrail: Generating strong AWS security signals with Sumo Logic. Retrieved October 16, 2020.

Internal MISP references

UUID 96560211-59b3-4eae-b8a3-2f988f6fdca3 which can be used as unique global reference for Following the CloudTrail: Generating strong AWS security signals with Sumo Logic in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-16T00:00:00Z
date_published 2019-09-10T00:00:00Z
source MITRE
title Following the CloudTrail: Generating strong AWS security signals with Sumo Logic

Group IB RTM August 2019

Skulkin, O. (2019, August 5). Following the RTM Forensic examination of a computer infected with a banking trojan. Retrieved May 11, 2020.

Internal MISP references

UUID 739da2f2-2aea-4f65-bc4d-ec6723f90520 which can be used as unique global reference for Group IB RTM August 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-11T00:00:00Z
date_published 2019-08-05T00:00:00Z
source MITRE
title Following the RTM Forensic examination of a computer infected with a banking trojan

TrendMicro BlackTech June 2017

Bermejo, L., et al. (2017, June 22). Following the Trail of BlackTech’s Cyber Espionage Campaigns. Retrieved May 5, 2020.

Internal MISP references

UUID abb9cb19-d30e-4048-b106-eb29a6dad7fc which can be used as unique global reference for TrendMicro BlackTech June 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-05T00:00:00Z
date_published 2017-06-22T00:00:00Z
source MITRE, Tidal Cyber
title Following the Trail of BlackTech’s Cyber Espionage Campaigns

FireEye FIN6 April 2016

FireEye Threat Intelligence. (2016, April). Follow the Money: Dissecting the Operations of the Cyber Crime Group FIN6. Retrieved June 1, 2016.

Internal MISP references

UUID 8c0997e1-b285-42dd-9492-75065eac8f8b which can be used as unique global reference for FireEye FIN6 April 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-01T00:00:00Z
date_published 2016-04-01T00:00:00Z
source MITRE, Tidal Cyber
title Follow the Money: Dissecting the Operations of the Cyber Crime Group FIN6

ESET FontOnLake Analysis 2021

Vladislav Hrčka. (2021, January 1). FontOnLake. Retrieved September 27, 2023.

Internal MISP references

UUID dbcced87-91ee-514f-98c8-29a85d967384 which can be used as unique global reference for ESET FontOnLake Analysis 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-27T00:00:00Z
date_published 2021-01-01T00:00:00Z
source MITRE
title FontOnLake

amnesty_nso_pegasus

Amnesty International Security Lab. (2021, July 18). Forensic Methodology Report: How to catch NSO Group’s Pegasus. Retrieved February 22, 2022.

Internal MISP references

UUID 9e40d93a-fe91-504a-a6f2-e6546067ba53 which can be used as unique global reference for amnesty_nso_pegasus in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-22T00:00:00Z
date_published 2021-07-18T00:00:00Z
source MITRE
title Forensic Methodology Report: How to catch NSO Group’s Pegasus

Microsoft Forfiles Aug 2016

Microsoft. (2016, August 31). Forfiles. Retrieved January 22, 2018.

Internal MISP references

UUID fd7eaa47-3512-4dbd-b881-bc679d06cd1b which can be used as unique global reference for Microsoft Forfiles Aug 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-22T00:00:00Z
date_published 2016-08-31T00:00:00Z
source MITRE
title Forfiles

Forfiles.exe - LOLBAS Project

LOLBAS. (2018, May 25). Forfiles.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 9e2c3833-b667-431c-a9e5-1b412583cc5a which can be used as unique global reference for Forfiles.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Forfiles.exe

Mandiant Log4Shell March 28 2022

Geoff Ackerman, Tufail Ahmed, James Maclachlan, Dallin Warne, John Wolfram, Brandon Wilbur. (2022, March 28). Forged in Fire: A Survey of MobileIron Log4Shell Exploitation. Retrieved November 1, 2023.

Internal MISP references

UUID 62d4d685-09c4-47b6-865c-4a6096e551cd which can be used as unique global reference for Mandiant Log4Shell March 28 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-11-01T00:00:00Z
date_published 2022-03-28T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Forged in Fire: A Survey of MobileIron Log4Shell Exploitation

Proofpoint March 24 2023

Proofpoint. (2023, March 24). Fork in the Ice: The New Era of IcedID | Proofpoint US. Retrieved May 10, 2023.

Internal MISP references

UUID 71d5e4ce-3785-48f9-9566-fe5151ad6dc2 which can be used as unique global reference for Proofpoint March 24 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-10T00:00:00Z
date_published 2023-03-24T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Fork in the Ice: The New Era of IcedID

Symantec Seaduke 2015

Symantec Security Response. (2015, July 13). “Forkmeiamfamous”: Seaduke, latest weapon in the Duke armory. Retrieved July 22, 2015.

Internal MISP references

UUID 5ec05c01-8767-44c1-9855-e1b0e5ee0002 which can be used as unique global reference for Symantec Seaduke 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-07-22T00:00:00Z
date_published 2015-07-13T00:00:00Z
source MITRE
title “Forkmeiamfamous”: Seaduke, latest weapon in the Duke armory

Register Uber

McCarthy, K. (2015, February 28). FORK ME! Uber hauls GitHub into court to find who hacked database of 50,000 drivers. Retrieved October 19, 2020.

Internal MISP references

UUID 89b85928-a962-4230-875c-63742b3c9d37 which can be used as unique global reference for Register Uber in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
date_published 2015-02-28T00:00:00Z
source MITRE
title FORK ME! Uber hauls GitHub into court to find who hacked database of 50,000 drivers

format_cmd_cisco

Cisco. (2022, August 16). format - Cisco IOS Configuration Fundamentals Command Reference. Retrieved July 13, 2022.

Internal MISP references

UUID 9442e08d-0858-5aa5-b642-a6b1e46018bc which can be used as unique global reference for format_cmd_cisco in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-13T00:00:00Z
date_published 2022-08-16T00:00:00Z
source MITRE
title format - Cisco IOS Configuration Fundamentals Command Reference

Quick Heal Blog February 17 2023

Quick Heal Blog. (2023, February 17). FormBook Malware Returns: New Variant Uses Steganography and In-Memory Loading of multiple stages to steal data. Retrieved May 7, 2023.

Internal MISP references

UUID 02233ce3-abb2-4aed-95b8-56b65c68a665 which can be used as unique global reference for Quick Heal Blog February 17 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2023-02-17T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title FormBook Malware Returns: New Variant Uses Steganography and In-Memory Loading of multiple stages to steal data

Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation

ALEXANDER MARVI, BRAD SLAYBAUGH, DAN EBREO, TUFAIL AHMED, MUHAMMAD UMAIR, TINA JOHNSON. (2023, March 16). Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation. Retrieved May 15, 2023.

Internal MISP references

UUID a43dd8ce-23d6-5768-8522-6973dc45e1ac which can be used as unique global reference for Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-15T00:00:00Z
date_published 2023-03-16T00:00:00Z
source MITRE
title Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation

Mandiant Fortinet Zero Day

Marvi, A. et al.. (2023, March 16). Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation. Retrieved March 22, 2023.

Internal MISP references

UUID 7bdc5bbb-ebbd-5eb8-bd10-9087c883aea7 which can be used as unique global reference for Mandiant Fortinet Zero Day in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-22T00:00:00Z
date_published 2023-03-16T00:00:00Z
source MITRE
title Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation

macOS Foundation

Apple. (n.d.). Foundation. Retrieved July 1, 2020.

Internal MISP references

UUID ea194268-0a8f-4494-be09-ef5f679f68fe which can be used as unique global reference for macOS Foundation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-07-01T00:00:00Z
source MITRE
title Foundation

SentinelOne Lazarus macOS July 2020

Stokes, P. (2020, July 27). Four Distinct Families of Lazarus Malware Target Apple’s macOS Platform. Retrieved August 7, 2020.

Internal MISP references

UUID 489c52a2-34cc-47ff-b42b-9d48f83b9e90 which can be used as unique global reference for SentinelOne Lazarus macOS July 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-07T00:00:00Z
date_published 2020-07-27T00:00:00Z
source MITRE
title Four Distinct Families of Lazarus Malware Target Apple’s macOS Platform

DOJ Russia Targeting Critical Infrastructure March 2022

Department of Justice. (2022, March 24). Four Russian Government Employees Charged in Two Historical Hacking Campaigns Targeting Critical Infrastructure Worldwide. Retrieved April 5, 2022.

Internal MISP references

UUID 768a0ec6-b767-4044-acad-82834508640f which can be used as unique global reference for DOJ Russia Targeting Critical Infrastructure March 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-05T00:00:00Z
date_published 2022-03-24T00:00:00Z
source MITRE
title Four Russian Government Employees Charged in Two Historical Hacking Campaigns Targeting Critical Infrastructure Worldwide

ClearkSky Fox Kitten February 2020

ClearSky. (2020, February 16). Fox Kitten – Widespread Iranian Espionage-Offensive Campaign. Retrieved December 21, 2020.

Internal MISP references

UUID a5ad6321-897a-4adc-9cdd-034a2538e3d6 which can be used as unique global reference for ClearkSky Fox Kitten February 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-21T00:00:00Z
date_published 2020-02-16T00:00:00Z
source MITRE, Tidal Cyber
title Fox Kitten – Widespread Iranian Espionage-Offensive Campaign

FSISAC FraudNetDoS September 2012

FS-ISAC. (2012, September 17). Fraud Alert – Cyber Criminals Targeting Financial Institution Employee Credentials to Conduct Wire Transfer Fraud. Retrieved September 23, 2024.

Internal MISP references

UUID 9c8772eb-6d1d-4742-a2db-a5e1006effaa which can be used as unique global reference for FSISAC FraudNetDoS September 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-23T00:00:00Z
date_published 2012-09-17T00:00:00Z
source MITRE
title Fraud Alert – Cyber Criminals Targeting Financial Institution Employee Credentials to Conduct Wire Transfer Fraud

MalwareBytes Ngrok February 2020

Segura, J. (2020, February 26). Fraudsters cloak credit card skimmer with fake content delivery network, ngrok server. Retrieved September 15, 2020.

Internal MISP references

UUID 531206c7-11ec-46bf-a35c-0464244a58c9 which can be used as unique global reference for MalwareBytes Ngrok February 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-15T00:00:00Z
date_published 2020-02-26T00:00:00Z
source MITRE
title Fraudsters cloak credit card skimmer with fake content delivery network, ngrok server

Akami Frog4Shell 2024

Ori David. (2024, February 1). Frog4Shell — FritzFrog Botnet Adds One-Days to Its Arsenal. Retrieved September 24, 2024.

Internal MISP references

UUID c67a2ccb-7abf-5409-a216-503e661a6b1c which can be used as unique global reference for Akami Frog4Shell 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-24T00:00:00Z
date_published 2024-02-01T00:00:00Z
source MITRE
title Frog4Shell — FritzFrog Botnet Adds One-Days to Its Arsenal

ESET ComRAT May 2020

Faou, M. (2020, May). From Agent.btz to ComRAT v4: A ten-year journey. Retrieved June 15, 2020.

Internal MISP references

UUID cd9043b8-4d14-449b-a6b2-2e9b99103bb0 which can be used as unique global reference for ESET ComRAT May 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-15T00:00:00Z
date_published 2020-05-01T00:00:00Z
source MITRE
title From Agent.btz to ComRAT v4: A ten-year journey

Azure AD to AD

Sean Metcalf. (2020, May 27). From Azure AD to Active Directory (via Azure) – An Unanticipated Attack Path. Retrieved September 28, 2022.

Internal MISP references

UUID 087d07a9-0d33-4253-b7c1-d55be13c0467 which can be used as unique global reference for Azure AD to AD in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-28T00:00:00Z
date_published 2020-05-27T00:00:00Z
source MITRE
title From Azure AD to Active Directory (via Azure) – An Unanticipated Attack Path

blackmatter_blackcat

Pereira, T. Huey, C. (2022, March 17). From BlackMatter to BlackCat: Analyzing two attacks from one affiliate. Retrieved May 5, 2022.

Internal MISP references

UUID 605b58ea-9544-49b8-b3c8-0a97b2b155dc which can be used as unique global reference for blackmatter_blackcat in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-05T00:00:00Z
date_published 2022-03-17T00:00:00Z
source MITRE
title From BlackMatter to BlackCat: Analyzing two attacks from one affiliate

Proofpoint June 17 2024

Tommy Madjar, Dusty Miller, Selena Larson, The Proofpoint Threat Research Team. (2024, June 17). From Clipboard to Compromise A PowerShell Self-Pwn . Retrieved June 20, 2024.

Internal MISP references

UUID a65d7492-04a4-46d4-85ed-134786c6828b which can be used as unique global reference for Proofpoint June 17 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-20T00:00:00Z
date_published 2024-06-17T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title From Clipboard to Compromise A PowerShell Self-Pwn

proofpoint-selfpwn

Tommy Madjar, Dusty Miller, Selena Larson. (2024, June 17). From Clipboard to Compromise: A PowerShell Self-Pwn. Retrieved August 2, 2024.

Internal MISP references

UUID 8f00ffc0-7094-5fd9-8ed4-9c129fd93c05 which can be used as unique global reference for proofpoint-selfpwn in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-02T00:00:00Z
date_published 2024-06-17T00:00:00Z
source MITRE
title From Clipboard to Compromise: A PowerShell Self-Pwn

Unit42 Malware Roundup December 29 2023

Samantha Stallings, Brad Duncan. (2023, December 29). From DarkGate to AsyncRAT: Malware Detected and Shared As Unit 42 Timely Threat Intelligence. Retrieved January 11, 2024.

Internal MISP references

UUID a18e19b5-9046-4c2c-bd94-2cd5061064bf which can be used as unique global reference for Unit42 Malware Roundup December 29 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-11T00:00:00Z
date_published 2023-12-29T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title From DarkGate to AsyncRAT: Malware Detected and Shared As Unit 42 Timely Threat Intelligence

Reaqta Mavinject

Reaqta. (2017, December 16). From False Positive to True Positive: the story of Mavinject.exe, the Microsoft Injector. Retrieved September 22, 2021.

Internal MISP references

UUID 5c0e0c84-2992-4098-8913-66a20ca61bf4 which can be used as unique global reference for Reaqta Mavinject in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-22T00:00:00Z
date_published 2017-12-16T00:00:00Z
source MITRE
title From False Positive to True Positive: the story of Mavinject.exe, the Microsoft Injector

IBM MegaCortex

Del Fierro, C. Kessem, L.. (2020, January 8). From Mega to Giga: Cross-Version Comparison of Top MegaCortex Modifications. Retrieved February 15, 2021.

Internal MISP references

UUID 3d70d9b7-88e4-411e-a59a-bc862da965a7 which can be used as unique global reference for IBM MegaCortex in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-15T00:00:00Z
date_published 2020-01-08T00:00:00Z
source MITRE
title From Mega to Giga: Cross-Version Comparison of Top MegaCortex Modifications

BiZone Lizar May 2021

BI.ZONE Cyber Threats Research Team. (2021, May 13). From pentest to APT attack: cybercriminal group FIN7 disguises its malware as an ethical hacker’s toolkit. Retrieved February 2, 2022.

Internal MISP references

UUID 315f47e1-69e5-4dcb-94b2-59583e91dd26 which can be used as unique global reference for BiZone Lizar May 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-02T00:00:00Z
date_published 2021-05-13T00:00:00Z
source MITRE
title From pentest to APT attack: cybercriminal group FIN7 disguises its malware as an ethical hacker’s toolkit

Kaspersky StoneDrill 2017

Kaspersky Lab. (2017, March 7). From Shamoon to StoneDrill: Wipers attacking Saudi organizations and beyond. Retrieved March 14, 2019.

Internal MISP references

UUID e2637cb3-c449-4609-af7b-ac78a900cc8b which can be used as unique global reference for Kaspersky StoneDrill 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-14T00:00:00Z
date_published 2017-03-07T00:00:00Z
source MITRE
title From Shamoon to StoneDrill: Wipers attacking Saudi organizations and beyond

Proofpoint TA427 April 2024

Lesnewich, G. et al. (2024, April 16). From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering. Retrieved May 3, 2024.

Internal MISP references

UUID 620f5ff7-26c0-55c4-9b1b-c56ad2e1316b which can be used as unique global reference for Proofpoint TA427 April 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-03T00:00:00Z
date_published 2024-04-16T00:00:00Z
source MITRE
title From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering

SentinelOne Agrius 2021

Amitai Ben & Shushan Ehrlich. (2021, May). From Wiper to Ransomware: The Evolution of Agrius. Retrieved May 21, 2024.

Internal MISP references

UUID b5b433a1-5d12-5644-894b-c42d995c9ba5 which can be used as unique global reference for SentinelOne Agrius 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-21T00:00:00Z
date_published 2021-05-01T00:00:00Z
source MITRE
title From Wiper to Ransomware: The Evolution of Agrius

FsiAnyCpu.exe - LOLBAS Project

LOLBAS. (2021, September 26). FsiAnyCpu.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 87031d31-b6d7-4860-b11b-5a0dc8774d92 which can be used as unique global reference for FsiAnyCpu.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-09-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title FsiAnyCpu.exe

Fsi.exe - LOLBAS Project

LOLBAS. (2021, September 26). Fsi.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 4e14e87f-2ad9-4959-8cb2-8585b67931c0 which can be used as unique global reference for Fsi.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-09-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Fsi.exe

fsutil_behavior

Microsoft. (2021, September 27). fsutil behavior. Retrieved January 14, 2022.

Internal MISP references

UUID 07712696-b1fd-4704-b157-9e420840fb2c which can be used as unique global reference for fsutil_behavior in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-14T00:00:00Z
date_published 2021-09-27T00:00:00Z
source MITRE
title fsutil behavior

Fsutil.exe - LOLBAS Project

LOLBAS. (2021, August 16). Fsutil.exe. Retrieved December 4, 2023.

Internal MISP references

UUID e2305dac-4245-4fac-8813-69cb210e9cd3 which can be used as unique global reference for Fsutil.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-08-16T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Fsutil.exe

Microsoft FTP

Microsoft. (2021, July 21). ftp. Retrieved February 25, 2022.

Internal MISP references

UUID 970f8d16-f5b7-44e2-b81f-738b931c60d9 which can be used as unique global reference for Microsoft FTP in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-25T00:00:00Z
date_published 2021-07-21T00:00:00Z
source MITRE
title ftp

Linux FTP

N/A. (n.d.). ftp(1) - Linux man page. Retrieved February 25, 2022.

Internal MISP references

UUID 021ea6bc-abff-48de-a6bb-315dbbfa6147 which can be used as unique global reference for Linux FTP in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-25T00:00:00Z
source MITRE
title ftp(1) - Linux man page

Ftp.exe - LOLBAS Project

LOLBAS. (2018, December 10). Ftp.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 3b51993d-6062-4138-bfc6-a2c0fc5d039a which can be used as unique global reference for Ftp.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-12-10T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Ftp.exe

Microsoft WMI Filters

Microsoft. (2008, September 11). Fun with WMI Filters in Group Policy. Retrieved March 13, 2019.

Internal MISP references

UUID 2894c3bf-6f8d-4338-8206-4dc873e3bb8d which can be used as unique global reference for Microsoft WMI Filters in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-13T00:00:00Z
date_published 2008-09-11T00:00:00Z
source MITRE
title Fun with WMI Filters in Group Policy

Cybersecurity Advisory SVR TTP May 2021

NCSC, CISA, FBI, NSA. (2021, May 7). Further TTPs associated with SVR cyber actors. Retrieved July 29, 2021.

Internal MISP references

UUID e18c1b56-f29d-4ea9-a425-a6af8ac6a347 which can be used as unique global reference for Cybersecurity Advisory SVR TTP May 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-07-29T00:00:00Z
date_published 2021-05-07T00:00:00Z
source MITRE
title Further TTPs associated with SVR cyber actors

RiskIQ Cobalt Nov 2017

Klijnsma, Y.. (2017, November 28). Gaffe Reveals Full List of Targets in Spear Phishing Attack Using Cobalt Strike Against Financial Institutions. Retrieved October 10, 2018.

Internal MISP references

UUID ebf961c5-bd68-42f3-8fd3-000946c7ae9c which can be used as unique global reference for RiskIQ Cobalt Nov 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-10-10T00:00:00Z
date_published 2017-11-28T00:00:00Z
source MITRE
title Gaffe Reveals Full List of Targets in Spear Phishing Attack Using Cobalt Strike Against Financial Institutions

Unit 42 PingPull Jun 2022

Unit 42. (2022, June 13). GALLIUM Expands Targeting Across Telecommunications, Government and Finance Sectors With New PingPull Tool. Retrieved August 7, 2022.

Internal MISP references

UUID ac6491ab-6ef1-4091-8a15-50e2cbafe157 which can be used as unique global reference for Unit 42 PingPull Jun 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-07T00:00:00Z
date_published 2022-06-13T00:00:00Z
source MITRE
title GALLIUM Expands Targeting Across Telecommunications, Government and Finance Sectors With New PingPull Tool

Microsoft GALLIUM December 2019

MSTIC. (2019, December 12). GALLIUM: Targeting global telecom. Retrieved January 13, 2021.

Internal MISP references

UUID 5bc76b47-ff68-4031-a347-f2dc0daba203 which can be used as unique global reference for Microsoft GALLIUM December 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-13T00:00:00Z
date_published 2019-12-12T00:00:00Z
source MITRE, Tidal Cyber
title GALLIUM: Targeting global telecom

Symantec Gallmaker Oct 2018

Symantec Security Response. (2018, October 10). Gallmaker: New Attack Group Eschews Malware to Live off the Land. Retrieved November 27, 2018.

Internal MISP references

UUID f47b3e2b-acdd-4487-88b9-de5cbe45cf33 which can be used as unique global reference for Symantec Gallmaker Oct 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-27T00:00:00Z
date_published 2018-10-10T00:00:00Z
source MITRE, Tidal Cyber
title Gallmaker: New Attack Group Eschews Malware to Live off the Land

TrendMicro Gamaredon April 2020

Kakara, H., Maruyama, E. (2020, April 17). Gamaredon APT Group Use Covid-19 Lure in Campaigns. Retrieved May 19, 2020.

Internal MISP references

UUID 3800cfc2-0260-4b36-b629-7a336b9f9f10 which can be used as unique global reference for TrendMicro Gamaredon April 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-19T00:00:00Z
date_published 2020-04-17T00:00:00Z
source MITRE
title Gamaredon APT Group Use Covid-19 Lure in Campaigns

ESET Gamaredon June 2020

Boutin, J. (2020, June 11). Gamaredon group grows its game. Retrieved June 16, 2020.

Internal MISP references

UUID 6532664d-2311-4b38-8960-f43762471729 which can be used as unique global reference for ESET Gamaredon June 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-16T00:00:00Z
date_published 2020-06-11T00:00:00Z
source MITRE
title Gamaredon group grows its game

CERT-EE Gamaredon January 2021

CERT-EE. (2021, January 27). Gamaredon Infection: From Dropper to Entry. Retrieved February 17, 2022.

Internal MISP references

UUID fec320ed-29c1-40db-ad2e-701fda428922 which can be used as unique global reference for CERT-EE Gamaredon January 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-17T00:00:00Z
date_published 2021-01-27T00:00:00Z
source MITRE
title Gamaredon Infection: From Dropper to Entry

Kaspersky Winnti June 2015

Tarakanov, D. (2015, June 22). Games are over: Winnti is now targeting pharmaceutical companies. Retrieved January 14, 2016.

Internal MISP references

UUID 86504950-0f4f-42bc-b003-24f60ae97c99 which can be used as unique global reference for Kaspersky Winnti June 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-14T00:00:00Z
date_published 2015-06-22T00:00:00Z
source MITRE
title Games are over: Winnti is now targeting pharmaceutical companies

WeLiveSecurity Gapz and Redyms Mar 2013

Matrosov, A. (2013, March 19). Gapz and Redyms droppers based on Power Loader code. Retrieved December 16, 2017.

Internal MISP references

UUID b8d328b7-2eb3-4851-8d44-2e1bad7710c2 which can be used as unique global reference for WeLiveSecurity Gapz and Redyms Mar 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-16T00:00:00Z
date_published 2013-03-19T00:00:00Z
source MITRE
title Gapz and Redyms droppers based on Power Loader code

theevilbit gatekeeper bypass 2021

Csaba Fitzl. (2021, June 29). GateKeeper - Not a Bypass (Again). Retrieved September 22, 2021.

Internal MISP references

UUID d00f373d-2133-47c3-9b0a-104ecc9a6869 which can be used as unique global reference for theevilbit gatekeeper bypass 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-22T00:00:00Z
date_published 2021-06-29T00:00:00Z
source MITRE
title GateKeeper - Not a Bypass (Again)

Kaspersky Gauss Whitepaper

Kaspersky Lab. (2012, August). Gauss: Abnormal Distribution. Retrieved January 17, 2019.

Internal MISP references

UUID 4bf39390-f3ca-4132-841e-b35abefe7dee which can be used as unique global reference for Kaspersky Gauss Whitepaper in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-01-17T00:00:00Z
date_published 2012-08-01T00:00:00Z
source MITRE
title Gauss: Abnormal Distribution

Kaspersky MoleRATs April 2019

GReAT. (2019, April 10). Gaza Cybergang Group1, operation SneakyPastes. Retrieved May 13, 2020.

Internal MISP references

UUID 38216a34-5ffd-4e79-80b1-7270743b728e which can be used as unique global reference for Kaspersky MoleRATs April 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-13T00:00:00Z
date_published 2019-04-10T00:00:00Z
source MITRE
title Gaza Cybergang Group1, operation SneakyPastes

ESET Gazer Aug 2017

ESET. (2017, August). Gazing at Gazer: Turla’s new second stage backdoor. Retrieved September 14, 2017.

Internal MISP references

UUID 9d1c40af-d4bc-4d4a-b667-a17378942685 which can be used as unique global reference for ESET Gazer Aug 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-09-14T00:00:00Z
date_published 2017-08-01T00:00:00Z
source MITRE
title Gazing at Gazer: Turla’s new second stage backdoor

file_sig_table

Kessler, G. (2022, December 9). GCK'S FILE SIGNATURES TABLE. Retrieved August 23, 2022.

Internal MISP references

UUID 4bc3a8af-d0c1-514d-9edd-dcebb3344db8 which can be used as unique global reference for file_sig_table in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-23T00:00:00Z
date_published 2022-12-09T00:00:00Z
source MITRE
title GCK'S FILE SIGNATURES TABLE

Google Cloud Add Metadata

Google Cloud. (2022, March 31). gcloud compute instances add-metadata. Retrieved April 1, 2022.

Internal MISP references

UUID eba4b850-8784-4da2-b87d-54b5bd0f58d6 which can be used as unique global reference for Google Cloud Add Metadata in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-01T00:00:00Z
date_published 2022-03-31T00:00:00Z
source MITRE
title gcloud compute instances add-metadata

Google Compute Instances

Google. (n.d.). gcloud compute instances list. Retrieved May 26, 2020.

Internal MISP references

UUID ae09e791-a00c-487b-b0e5-7768df0679a3 which can be used as unique global reference for Google Compute Instances in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-26T00:00:00Z
source MITRE
title gcloud compute instances list

GCP SSH Key Add

Google. (n.d.). gcloud compute os-login ssh-keys add. Retrieved October 1, 2020.

Internal MISP references

UUID 372b6cfd-abdc-41b7-be78-4b1dc0426044 which can be used as unique global reference for GCP SSH Key Add in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-01T00:00:00Z
source MITRE
title gcloud compute os-login ssh-keys add

Google Cloud - IAM Servie Accounts List API

Google. (2020, June 23). gcloud iam service-accounts list. Retrieved August 4, 2020.

Internal MISP references

UUID 3ffad706-1dac-41dd-b197-06f22fec3b30 which can be used as unique global reference for Google Cloud - IAM Servie Accounts List API in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-04T00:00:00Z
date_published 2020-06-23T00:00:00Z
source MITRE
title gcloud iam service-accounts list

ESET Gelsemium June 2021

Dupuy, T. and Faou, M. (2021, June). Gelsemium. Retrieved November 30, 2021.

Internal MISP references

UUID ea28cf8c-8c92-48cb-b499-ffb7ff0e3cf5 which can be used as unique global reference for ESET Gelsemium June 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-11-30T00:00:00Z
date_published 2021-06-01T00:00:00Z
source MITRE
title Gelsemium

TechNet Scheduled Task Events

Microsoft. (n.d.). General Task Registration. Retrieved December 12, 2017.

Internal MISP references

UUID 344703ac-f67c-465b-8c56-c9617675a00b which can be used as unique global reference for TechNet Scheduled Task Events in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-12T00:00:00Z
source MITRE
title General Task Registration

Ebowla: Genetic Malware

Morrow, T., Pitts, J. (2016, October 28). Genetic Malware: Designing Payloads for Specific Targets. Retrieved January 18, 2019.

Internal MISP references

UUID 8c65dbc1-33ad-470c-b172-7497c6fd2480 which can be used as unique global reference for Ebowla: Genetic Malware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-01-18T00:00:00Z
date_published 2016-10-28T00:00:00Z
source MITRE
title Genetic Malware: Designing Payloads for Specific Targets

Proofpoint NETWIRE December 2020

Proofpoint. (2020, December 2). Geofenced NetWire Campaigns. Retrieved January 7, 2021.

Internal MISP references

UUID 5a974fc5-31bb-44b5-9834-ef98175402ec which can be used as unique global reference for Proofpoint NETWIRE December 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-07T00:00:00Z
date_published 2020-12-02T00:00:00Z
source MITRE
title Geofenced NetWire Campaigns

Hartrell cd00r 2002

Hartrell, Greg. (2002, August). Get a handle on cd00r: The invisible backdoor. Retrieved October 13, 2018.

Internal MISP references

UUID 739e6517-10f5-484d-8000-8818d63e7341 which can be used as unique global reference for Hartrell cd00r 2002 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-10-13T00:00:00Z
date_published 2002-08-01T00:00:00Z
source MITRE
title Get a handle on cd00r: The invisible backdoor

Kubectl Exec Get Shell

The Kubernetes Authors. (n.d.). Get a Shell to a Running Container. Retrieved March 29, 2021.

Internal MISP references

UUID ffb9c0ca-533f-4911-8c0c-a2653410a76d which can be used as unique global reference for Kubectl Exec Get Shell in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-29T00:00:00Z
source MITRE
title Get a Shell to a Running Container

Microsoft getglobaladdresslist

Microsoft. (n.d.). Get-GlobalAddressList. Retrieved October 6, 2019.

Internal MISP references

UUID a4948a80-d11c-44ed-ae63-e3f5660463f9 which can be used as unique global reference for Microsoft getglobaladdresslist in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-06T00:00:00Z
source MITRE
title Get-GlobalAddressList

Jay GetHooks Sept 2011

Satiro, J. (2011, September 14). GetHooks. Retrieved December 12, 2017.

Internal MISP references

UUID 228ac239-3a97-446f-8e1c-d5c0f580710c which can be used as unique global reference for Jay GetHooks Sept 2011 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-12T00:00:00Z
date_published 2011-09-14T00:00:00Z
source MITRE
title GetHooks

Microsoft Get-InboxRule

Microsoft. (n.d.). Get-InboxRule. Retrieved June 10, 2021.

Internal MISP references

UUID c6a1b00c-22d4-407a-a515-fbce5c197606 which can be used as unique global reference for Microsoft Get-InboxRule in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-10T00:00:00Z
source MITRE
title Get-InboxRule

Microsoft Msolrole

Microsoft. (n.d.). Get-MsolRole. Retrieved October 6, 2019.

Internal MISP references

UUID e36f4e3a-61c9-4fdc-98de-d51a2b3b4865 which can be used as unique global reference for Microsoft Msolrole in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-06T00:00:00Z
source MITRE
title Get-MsolRole

Microsoft msolrolemember

Microsoft. (n.d.). Get-MsolRoleMember. Retrieved October 6, 2019.

Internal MISP references

UUID ca28494c-d834-4afc-9237-ab78dcfc427b which can be used as unique global reference for Microsoft msolrolemember in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-06T00:00:00Z
source MITRE
title Get-MsolRoleMember

JumpCloud Conditional Access Policies

JumpCloud. (n.d.). Get Started: Conditional Access Policies. Retrieved January 2, 2024.

Internal MISP references

UUID 585b4ed7-1f1b-5e7f-bf2b-3732e07309af which can be used as unique global reference for JumpCloud Conditional Access Policies in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-02T00:00:00Z
source MITRE
title Get Started: Conditional Access Policies

rowland linux at 2019

Craig Rowland. (2019, July 25). Getting an Attacker IP Address from a Malicious Linux At Job. Retrieved October 15, 2021.

Internal MISP references

UUID 85056eba-c587-4619-b5e4-dff9680be7b3 which can be used as unique global reference for rowland linux at 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-15T00:00:00Z
date_published 2019-07-25T00:00:00Z
source MITRE
title Getting an Attacker IP Address from a Malicious Linux At Job

Elastic GuLoader December 5 2023

Daniel Stepanic. (2023, December 5). Getting gooey with GULOADER: deobfuscating the downloader. Retrieved February 27, 2024.

Internal MISP references

UUID 291fb8ac-a3d6-48a0-9c78-09e358634012 which can be used as unique global reference for Elastic GuLoader December 5 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-27T00:00:00Z
date_published 2023-12-05T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Getting gooey with GULOADER: deobfuscating the downloader

BlackHatRobinSage

Ryan, T. (2010). “Getting In Bed with Robin Sage.”. Retrieved March 6, 2017.

Internal MISP references

UUID 82068e93-a3f8-4d05-9358-6fe76a0055bb which can be used as unique global reference for BlackHatRobinSage in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-06T00:00:00Z
date_published 2010-01-01T00:00:00Z
source MITRE
title “Getting In Bed with Robin Sage.”

AADInternals Root Access to Azure VMs

Dr. Nestori Syynimaa. (2020, June 4). Getting root access to Azure VMs as a Azure AD Global Administrator. Retrieved March 13, 2023.

Internal MISP references

UUID 7080ae79-bec4-5886-9a43-6039d0cfd32f which can be used as unique global reference for AADInternals Root Access to Azure VMs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-13T00:00:00Z
date_published 2020-06-04T00:00:00Z
source MITRE
title Getting root access to Azure VMs as a Azure AD Global Administrator

Wardle Dylib Hijack Vulnerable Apps

Patrick Wardle. (2019, July 2). Getting Root with Benign AppStore Apps. Retrieved March 31, 2021.

Internal MISP references

UUID 128b4e3f-bb58-45e0-b8d9-bff9fc3ec3df which can be used as unique global reference for Wardle Dylib Hijack Vulnerable Apps in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-31T00:00:00Z
date_published 2019-07-02T00:00:00Z
source MITRE
title Getting Root with Benign AppStore Apps

Lua main page

Lua. (2024, June 25). Getting started. Retrieved August 5, 2024.

Internal MISP references

UUID 6d9298d3-ad9f-5b19-949c-84bef49f5f6c which can be used as unique global reference for Lua main page in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-05T00:00:00Z
date_published 2024-06-25T00:00:00Z
source MITRE
title Getting started

2 - appv

Microsoft. (2022, November 3). Getting started with App-V for Windows client. Retrieved February 6, 2024.

Internal MISP references

UUID 8305a718-e79f-5bf7-8af3-b117cf106c81 which can be used as unique global reference for 2 - appv in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-06T00:00:00Z
date_published 2022-11-03T00:00:00Z
source MITRE
title Getting started with App-V for Windows client

MSDN VBA in Office

Austin, J. (2017, June 6). Getting Started with VBA in Office. Retrieved July 3, 2017.

Internal MISP references

UUID 9c44416d-1f3d-4d99-b497-4615ed6f5546 which can be used as unique global reference for MSDN VBA in Office in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-03T00:00:00Z
date_published 2017-06-06T00:00:00Z
source MITRE
title Getting Started with VBA in Office

Windows Getting Started Drivers

Viviano, A. (2021, August 17). Getting started with Windows drivers: User mode and kernel mode. Retrieved September 24, 2021.

Internal MISP references

UUID 1b93e7ba-6afa-45ff-a9e2-3586cdae822c which can be used as unique global reference for Windows Getting Started Drivers in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-24T00:00:00Z
date_published 2021-08-17T00:00:00Z
source MITRE
title Getting started with Windows drivers: User mode and kernel mode

Bloxham

Bloxham, B. (n.d.). Getting Windows to Play with Itself [PowerPoint slides]. Retrieved November 12, 2014.

Internal MISP references

UUID b212d16f-5347-49ab-8339-432b4fd1ef50 which can be used as unique global reference for Bloxham in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-12T00:00:00Z
source MITRE
title Getting Windows to Play with Itself [PowerPoint slides]

Microsoft GetWindowLong function

Microsoft. (n.d.). GetWindowLong function. Retrieved December 16, 2017.

Internal MISP references

UUID 4366217a-2325-4056-ab68-f5f4d2a0703c which can be used as unique global reference for Microsoft GetWindowLong function in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-16T00:00:00Z
source MITRE
title GetWindowLong function

Microsoft GFlags Mar 2017

Microsoft. (2017, May 23). GFlags Overview. Retrieved December 18, 2017.

Internal MISP references

UUID 9c11c382-b420-4cf9-9db2-eaa7b60aee2d which can be used as unique global reference for Microsoft GFlags Mar 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-18T00:00:00Z
date_published 2017-05-23T00:00:00Z
source MITRE
title GFlags Overview

GfxDownloadWrapper.exe - LOLBAS Project

LOLBAS. (2019, December 27). GfxDownloadWrapper.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 5d97b7d7-428e-4408-a4d3-00f52cf4bf15 which can be used as unique global reference for GfxDownloadWrapper.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2019-12-27T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GfxDownloadWrapper.exe

Kaspersky September 30 2021

Mark Lechtik. (2021, September 30). GhostEmperor From ProxyLogon to kernel mode. Retrieved October 24, 2024.

Internal MISP references

UUID 8851f554-05c6-4fb0-807e-2ef0bc28e131 which can be used as unique global reference for Kaspersky September 30 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-24T00:00:00Z
date_published 2021-09-30T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GhostEmperor From ProxyLogon to kernel mode

GhostToken GCP flaw

Sergiu Gatlan. (2023, April 21). GhostToken GCP flaw let attackers backdoor Google accounts. Retrieved September 18, 2023.

Internal MISP references

UUID 3f87bd65-4194-5be6-93a1-acde6eaef547 which can be used as unique global reference for GhostToken GCP flaw in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-18T00:00:00Z
date_published 2023-04-21T00:00:00Z
source MITRE
title GhostToken GCP flaw let attackers backdoor Google accounts

GitHub ADRecon

adrecon. (n.d.). GitHub ADRecon. Retrieved March 5, 2024.

Internal MISP references

UUID 8ef4bcee-673d-4bab-8e18-947f45c6fc77 which can be used as unique global reference for GitHub ADRecon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-05T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub ADRecon

GitHub BeichenDream BadPotato

BeichenDream. (n.d.). GitHub BeichenDream BadPotato. Retrieved August 28, 2023.

Internal MISP references

UUID e7f1d932-4bcd-4a78-b975-f4ebbce8c05e which can be used as unique global reference for GitHub BeichenDream BadPotato in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-28T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub BeichenDream BadPotato

GitHub Chisel

jpillora. (n.d.). GitHub Chisel. Retrieved October 20, 2023.

Internal MISP references

UUID 4a60fb46-06b7-44ea-a9f6-8d6fa81e9363 which can be used as unique global reference for GitHub Chisel in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub Chisel

GitHub cybershujin Threat-Actors-use-of-Artifical-Intelligence

cybershujin. (n.d.). GitHub cybershujin Threat-Actors-use-of-Artifical-Intelligence. Retrieved September 9, 2024.

Internal MISP references

UUID b595af7e-ff84-49fa-8e07-cd2abe9e1d65 which can be used as unique global reference for GitHub cybershujin Threat-Actors-use-of-Artifical-Intelligence in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub cybershujin Threat-Actors-use-of-Artifical-Intelligence

Github evilginx2

Gretzky, Kuba. (2019, April 10). Retrieved October 8, 2019.

Internal MISP references

UUID 322e5d90-5095-47ea-b0e2-e7e5fb45fcca which can be used as unique global reference for Github evilginx2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-08T00:00:00Z
source MITRE
title Github evilginx2

GitHub evilginx2 - Duplicate

kgretzky. (n.d.). GitHub evilginx2. Retrieved December 14, 2023.

Internal MISP references

UUID eea178f4-80bd-49d1-84b1-f80671e9a3e4 which can be used as unique global reference for GitHub evilginx2 - Duplicate in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub evilginx2

GitHub Flangvik SharpExfiltrate

Flangvik. (n.d.). GitHub Flangvik SharpExfiltrate. Retrieved June 18, 2024.

Internal MISP references

UUID 7f0c0c86-c042-4a69-982a-c8c70ec1199c which can be used as unique global reference for GitHub Flangvik SharpExfiltrate in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub Flangvik SharpExfiltrate

GitHub Malleable C2

Mudge, R. (2014, July 14). Github Malleable-C2-Profiles safebrowsing.profile. Retrieved June 18, 2017.

Internal MISP references

UUID 0a609b90-dbaf-47bc-a642-1d180ca56498 which can be used as unique global reference for GitHub Malleable C2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-06-18T00:00:00Z
date_published 2014-07-14T00:00:00Z
source MITRE
title Github Malleable-C2-Profiles safebrowsing.profile

GitHub masscan

robertdavidgraham. (n.d.). GitHub masscan. Retrieved March 13, 2024.

Internal MISP references

UUID 7ae0b5c6-c9e5-4922-9e98-6483c81a8b42 which can be used as unique global reference for GitHub masscan in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-13T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub masscan

GitHub meganz MEGAcmd

meganz. (n.d.). GitHub meganz MEGAcmd. Retrieved June 18, 2024.

Internal MISP references

UUID 6e4d67f5-cca1-4298-b21c-d7511aa264ae which can be used as unique global reference for GitHub meganz MEGAcmd in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub meganz MEGAcmd

GitHub meganz MEGAsync

GitHub. (n.d.). GitHub - meganz/MEGAsync: Easy automated syncing between your computers and your MEGA Cloud Drive. Retrieved June 22, 2023.

Internal MISP references

UUID 6e59c47d-597c-4687-942f-9f1cf1db75d5 which can be used as unique global reference for GitHub meganz MEGAsync in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-22T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub - meganz/MEGAsync: Easy automated syncing between your computers and your MEGA Cloud Drive

GitHub - NYAN-x-CAT/AsyncRAT-C-Sharp: Open-Source Remote Administration Tool For Windows C

GitHub. (n.d.). GitHub - NYAN-x-CAT/AsyncRAT-C-Sharp: Open-Source Remote Administration Tool For Windows C#. Retrieved May 7, 2023.

Internal MISP references

UUID 6747f2cf-61bd-4d26-9bc1-10ce7a8e3e39 which can be used as unique global reference for GitHub - NYAN-x-CAT/AsyncRAT-C-Sharp: Open-Source Remote Administration Tool For Windows C# in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub - NYAN-x-CAT/AsyncRAT-C-Sharp: Open-Source Remote Administration Tool For Windows C#

GitHub ohpe Juicy Potato

ohpe. (n.d.). GitHub ohpe Juicy Potato. Retrieved August 28, 2023.

Internal MISP references

UUID 16d0dd05-763a-4503-aa88-c8867d8f202d which can be used as unique global reference for GitHub ohpe Juicy Potato in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-28T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub ohpe Juicy Potato

GitHub outflanknl Dumpert

outflanknl. (n.d.). GitHub outflanknl Dumpert. Retrieved September 5, 2024.

Internal MISP references

UUID ab375812-def9-4491-a69f-62755fb26910 which can be used as unique global reference for GitHub outflanknl Dumpert in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-05T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub outflanknl Dumpert

code_persistence_zsh

Leo Pitt. (2020, November 11). Github - PersistentJXA/BashProfilePersist.js. Retrieved January 11, 2021.

Internal MISP references

UUID b76d3ed0-e484-4ed1-aa6b-892a6f34e478 which can be used as unique global reference for code_persistence_zsh in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-11T00:00:00Z
date_published 2020-11-11T00:00:00Z
source MITRE
title Github - PersistentJXA/BashProfilePersist.js

Github PowerShell Empire

Schroeder, W., Warner, J., Nelson, M. (n.d.). Github PowerShellEmpire. Retrieved April 28, 2016.

Internal MISP references

UUID 017ec673-454c-492a-a65b-10d3a20dfdab which can be used as unique global reference for Github PowerShell Empire in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-28T00:00:00Z
source MITRE
title Github PowerShellEmpire

GitHub Pupy

Nicolas Verdier. (n.d.). Retrieved January 29, 2018.

Internal MISP references

UUID 69d5cb59-6545-4405-8ca6-733db99d3ee9 which can be used as unique global reference for GitHub Pupy in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-29T00:00:00Z
source MITRE
title GitHub Pupy

GitHub purple-team-attack-automation - Available Modules

praetorian-inc. (n.d.). GitHub purple-team-attack-automation - Available Modules. Retrieved September 8, 2023.

Internal MISP references

UUID 9bca14cc-1302-49b3-b905-cdf48dedc32b which can be used as unique global reference for GitHub purple-team-attack-automation - Available Modules in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-08T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub purple-team-attack-automation - Available Modules

GitHub random_c2_profile

threatexpress. (n.d.). GitHub random_c2_profile. Retrieved September 21, 2023.

Internal MISP references

UUID dcb30328-6aa4-461b-8333-451d6af4b384 which can be used as unique global reference for GitHub random_c2_profile in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-21T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub random_c2_profile

GitHub ransomware_map

cert-orangecyberdefense. (n.d.). GitHub ransomware_map. Retrieved March 13, 2024.

Internal MISP references

UUID d995f4b2-3262-4c37-855a-61aef7d7b8a8 which can be used as unique global reference for GitHub ransomware_map in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-13T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub ransomware_map

GitHub rsockstun

llkat. (n.d.). GitHub rsockstun. Retrieved December 14, 2023.

Internal MISP references

UUID 1644457f-75d6-4064-a11b-9217249fa5e6 which can be used as unique global reference for GitHub rsockstun in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub rsockstun

GitHub secretsdump

fortra. (n.d.). GitHub secretsdump. Retrieved November 16, 2023.

Internal MISP references

UUID c29a90a7-016f-49b7-a970-334290964f19 which can be used as unique global reference for GitHub secretsdump in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-11-16T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub secretsdump

GitHub securesocketfunneling ssf

securesocketfunneling. (n.d.). GitHub securesocketfunneling ssf. Retrieved July 10, 2024.

Internal MISP references

UUID 077ab224-9406-4be7-8467-2a6da8dc786d which can be used as unique global reference for GitHub securesocketfunneling ssf in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-10T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub securesocketfunneling ssf

GitHub SharpChromium

djhohnstein. (n.d.). GitHub SharpChromium. Retrieved December 14, 2023.

Internal MISP references

UUID ca1956a5-72f2-43ad-a17f-a52ca97bd84e which can be used as unique global reference for GitHub SharpChromium in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub SharpChromium

GitHub SharpHound

BloodHoundAD. (n.d.). GitHub SharpHound. Retrieved March 7, 2024.

Internal MISP references

UUID e1c405b4-b591-4469-848c-7a7dd69151c0 which can be used as unique global reference for GitHub SharpHound in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-07T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub SharpHound

GitHub SharpRoast

GhostPack. (n.d.). GitHub SharpRoast. Retrieved September 22, 2023.

Internal MISP references

UUID 43a2e05d-4662-4a5c-9c99-3165f0d71169 which can be used as unique global reference for GitHub SharpRoast in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-22T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub SharpRoast

GitHub SILENTTRINITY March 2022

Salvati, M (2019, August 6). SILENTTRINITY. Retrieved March 23, 2022.

Internal MISP references

UUID cff66280-c592-4e3c-a56c-32a9620cf95c which can be used as unique global reference for GitHub SILENTTRINITY March 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-23T00:00:00Z
source MITRE
title GitHub SILENTTRINITY March 2022

GitHub SoftEtherVPN SoftEtherVPN_Stable

SoftEtherVPN. (n.d.). GitHub SoftEtherVPN SoftEtherVPN_Stable. Retrieved August 28, 2023.

Internal MISP references

UUID f9d28db2-499f-407c-94d2-652b9ed5f928 which can be used as unique global reference for GitHub SoftEtherVPN SoftEtherVPN_Stable in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-28T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub SoftEtherVPN SoftEtherVPN_Stable

GitHub Terminator

ZeroMemoryEx. (n.d.). GitHub Terminator. Retrieved March 13, 2024.

Internal MISP references

UUID c2556bcf-9cc9-4f46-8a0f-8f8d801dfdbf which can be used as unique global reference for GitHub Terminator in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-13T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub Terminator

GitHub wavestone-cdt EDRSandBlast

wavestone-cdt. (n.d.). GitHub wavestone-cdt EDRSandBlast. Retrieved September 5, 2024.

Internal MISP references

UUID 228dd3e1-1952-447c-a500-31663a2efe45 which can be used as unique global reference for GitHub wavestone-cdt EDRSandBlast in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-05T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub wavestone-cdt EDRSandBlast

GitHub xmrig-proxy

xmrig. (n.d.). GitHub xmrig-proxy. Retrieved October 25, 2023.

Internal MISP references

UUID bd2a5de0-f55f-4eeb-a11f-8ec1e9f2ae2b which can be used as unique global reference for GitHub xmrig-proxy in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub xmrig-proxy

GitHub Gitrob

Michael Henriksen. (2018, June 9). Gitrob: Putting the Open Source in OSINT. Retrieved October 19, 2020.

Internal MISP references

UUID 1dee0842-15cc-4835-b8a8-938e0c94807b which can be used as unique global reference for GitHub Gitrob in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
date_published 2018-06-09T00:00:00Z
source MITRE
title Gitrob: Putting the Open Source in OSINT

FireEye DNS Hijack 2019

Hirani, M., Jones, S., Read, B. (2019, January 10). Global DNS Hijacking Campaign: DNS Record Manipulation at Scale. Retrieved October 9, 2020.

Internal MISP references

UUID 2c696e90-11eb-4196-9946-b5c4c11ccddc which can be used as unique global reference for FireEye DNS Hijack 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-09T00:00:00Z
date_published 2019-01-10T00:00:00Z
source MITRE
title Global DNS Hijacking Campaign: DNS Record Manipulation at Scale

McAfee Night Dragon

McAfee® Foundstone® Professional Services and McAfee Labs™. (2011, February 10). Global Energy Cyberattacks: “Night Dragon”. Retrieved February 19, 2018.

Internal MISP references

UUID 242d2933-ca2b-4511-803a-454727a3acc5 which can be used as unique global reference for McAfee Night Dragon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-19T00:00:00Z
date_published 2011-02-10T00:00:00Z
source MITRE
title Global Energy Cyberattacks: “Night Dragon”

GMER Rootkits

GMER. (n.d.). GMER. Retrieved December 12, 2017.

Internal MISP references

UUID f43e9881-4919-4ccc-b2ed-929d7838b2b4 which can be used as unique global reference for GMER Rootkits in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-12T00:00:00Z
source MITRE
title GMER

Gnome Remote Desktop grd-settings

Pascal Nowack. (n.d.). Retrieved September 21, 2021.

Internal MISP references

UUID 8f494ff3-b02b-470b-a57d-d2275989f541 which can be used as unique global reference for Gnome Remote Desktop grd-settings in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-21T00:00:00Z
source MITRE
title Gnome Remote Desktop grd-settings

Gnome Remote Desktop gschema

Pascal Nowack. (n.d.). Retrieved September 21, 2021.

Internal MISP references

UUID c7c749d5-b1b0-4a0f-8d14-eef47cfa1279 which can be used as unique global reference for Gnome Remote Desktop gschema in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-21T00:00:00Z
source MITRE
title Gnome Remote Desktop gschema

MITRE Trustworthy Firmware Measurement

Upham, K. (2014, March). Going Deep into the BIOS with MITRE Firmware Security Research. Retrieved January 5, 2016.

Internal MISP references

UUID 25f52172-293e-4b23-9239-201a0ddbcdf1 which can be used as unique global reference for MITRE Trustworthy Firmware Measurement in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-05T00:00:00Z
date_published 2014-03-01T00:00:00Z
source MITRE
title Going Deep into the BIOS with MITRE Firmware Security Research

Secureworks Gold Blackburn Mar 2022

Secureworks Counter Threat Unit. (2022, March 1). Gold Blackburn Threat Profile. Retrieved June 15, 2023.

Internal MISP references

UUID b6b27fa9-488c-5b6d-8e12-fe8371846cd3 which can be used as unique global reference for Secureworks Gold Blackburn Mar 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-15T00:00:00Z
date_published 2022-03-01T00:00:00Z
source MITRE
title Gold Blackburn Threat Profile

Secureworks GOLD CABIN

Secureworks. (n.d.). GOLD CABIN Threat Profile. Retrieved March 17, 2021.

Internal MISP references

UUID 778babec-e7d3-4341-9e33-aab361f2b98a which can be used as unique global reference for Secureworks GOLD CABIN in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-17T00:00:00Z
source MITRE, Tidal Cyber
title GOLD CABIN Threat Profile

McAfee Gold Dragon

Sherstobitoff, R., Saavedra-Morales, J. (2018, February 02). Gold Dragon Widens Olympics Malware Attacks, Gains Permanent Presence on Victims’ Systems. Retrieved June 6, 2018.

Internal MISP references

UUID 4bdfa92b-cbbd-43e6-aa3e-422561ff8d7a which can be used as unique global reference for McAfee Gold Dragon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-06-06T00:00:00Z
date_published 2018-02-02T00:00:00Z
source MITRE
title Gold Dragon Widens Olympics Malware Attacks, Gains Permanent Presence on Victims’ Systems

Cyberark Golden SAML

Reiner, S. (2017, November 21). Golden SAML: Newly Discovered Attack Technique Forges Authentication to Cloud Apps. Retrieved December 17, 2020.

Internal MISP references

UUID 58083370-8126-47d3-827c-1910ed3f4b2a which can be used as unique global reference for Cyberark Golden SAML in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-17T00:00:00Z
date_published 2017-11-21T00:00:00Z
source MITRE
title Golden SAML: Newly Discovered Attack Technique Forges Authentication to Cloud Apps

Trustwave GoldenSpy2 June 2020

Trustwave SpiderLabs. (2020, June 26). GoldenSpy: Chapter Two – The Uninstaller. Retrieved July 23, 2020.

Internal MISP references

UUID 5031e82e-66e8-4ae0-be47-53daa87ddf94 which can be used as unique global reference for Trustwave GoldenSpy2 June 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-07-23T00:00:00Z
date_published 2020-06-26T00:00:00Z
source MITRE
title GoldenSpy: Chapter Two – The Uninstaller

Secureworks GOLD IONIC April 2024

Counter Threat Unit Research Team. (2024, April 15). GOLD IONIC DEPLOYS INC RANSOMWARE. Retrieved June 5, 2024.

Internal MISP references

UUID e723e7b3-496f-5ab4-abaf-83859e7e912d which can be used as unique global reference for Secureworks GOLD IONIC April 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-05T00:00:00Z
date_published 2024-04-15T00:00:00Z
source MITRE
title GOLD IONIC DEPLOYS INC RANSOMWARE

Secureworks GOLD KINGSWOOD Threat Profile

Secureworks. (n.d.). GOLD KINGSWOOD. Retrieved October 18, 2021.

Internal MISP references

UUID 36035bbb-1609-4461-be27-ef4a920b814c which can be used as unique global reference for Secureworks GOLD KINGSWOOD Threat Profile in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-18T00:00:00Z
source MITRE
title GOLD KINGSWOOD

MSTIC NOBELIUM Mar 2021

Nafisi, R., Lelli, A. (2021, March 4). GoldMax, GoldFinder, and Sibot: Analyzing NOBELIUM’s layered persistence. Retrieved March 8, 2021.

Internal MISP references

UUID 8688a0a9-d644-4b96-81bb-031f1f898652 which can be used as unique global reference for MSTIC NOBELIUM Mar 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-08T00:00:00Z
date_published 2021-03-04T00:00:00Z
source MITRE
title GoldMax, GoldFinder, and Sibot: Analyzing NOBELIUM’s layered persistence

Secureworks GOLD NIAGARA Threat Profile

CTU. (n.d.). GOLD NIAGARA. Retrieved September 21, 2021.

Internal MISP references

UUID b11276cb-f6dd-4e91-90cd-9c287fb3e6b1 which can be used as unique global reference for Secureworks GOLD NIAGARA Threat Profile in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-21T00:00:00Z
source MITRE
title GOLD NIAGARA

Secureworks Gold Prelude Profile

Secureworks. (n.d.). GOLD PRELUDE . Retrieved March 22, 2024.

Internal MISP references

UUID b16ae37d-5244-5c1e-92a9-e494b5a9ef49 which can be used as unique global reference for Secureworks Gold Prelude Profile in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-22T00:00:00Z
source MITRE
title GOLD PRELUDE

Secureworks GOLD SAHARA

Secureworks. (n.d.). GOLD SAHARA. Retrieved February 20, 2024.

Internal MISP references

UUID 3abb7995-4a62-56a6-9492-942965edf0a0 which can be used as unique global reference for Secureworks GOLD SAHARA in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-20T00:00:00Z
source MITRE
title GOLD SAHARA

Secureworks GOLD SOUTHFIELD

Secureworks. (n.d.). GOLD SOUTHFIELD. Retrieved October 6, 2020.

Internal MISP references

UUID 01d1ffaa-16b3-41c4-bb5a-afe2b41f1142 which can be used as unique global reference for Secureworks GOLD SOUTHFIELD in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-06T00:00:00Z
source MITRE
title GOLD SOUTHFIELD

Google Chrome Remote Desktop

Google. (n.d.). Retrieved March 14, 2024.

Internal MISP references

UUID 70c87a07-38eb-53d2-8b63-013eb3ce62c8 which can be used as unique global reference for Google Chrome Remote Desktop in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-14T00:00:00Z
source MITRE
title Google Chrome Remote Desktop

Google Cloud Identity API Documentation

Google. (n.d.). Retrieved March 16, 2021.

Internal MISP references

UUID 67f2719e-74fd-4bc1-9eeb-07d3095a5191 which can be used as unique global reference for Google Cloud Identity API Documentation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-16T00:00:00Z
source MITRE
title Google Cloud Identity API Documentation

GCPBucketBrute

Spencer Gietzen. (2019, February 26). Google Cloud Platform (GCP) Bucket Enumeration and Privilege Escalation. Retrieved March 4, 2022.

Internal MISP references

UUID d956e1f6-37ca-4352-b275-84c174888b88 which can be used as unique global reference for GCPBucketBrute in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-04T00:00:00Z
date_published 2019-02-26T00:00:00Z
source MITRE
title Google Cloud Platform (GCP) Bucket Enumeration and Privilege Escalation

ExploitDB GoogleHacking

Offensive Security. (n.d.). Google Hacking Database. Retrieved October 23, 2020.

Internal MISP references

UUID 29714b88-a1ff-4684-a3b0-35c3a2c78947 which can be used as unique global reference for ExploitDB GoogleHacking in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-23T00:00:00Z
source MITRE
title Google Hacking Database

Freejacked

Clark, Michael. (2023, August 14). Google’s Vertex AI Platform Gets Freejacked. Retrieved February 28, 2024.

Internal MISP references

UUID c7007fa4-bc07-59aa-820e-ffeea1486ed6 which can be used as unique global reference for Freejacked in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-28T00:00:00Z
date_published 2023-08-14T00:00:00Z
source MITRE
title Google’s Vertex AI Platform Gets Freejacked

Google Workspace Global Access List

Google. (n.d.). Retrieved March 16, 2021.

Internal MISP references

UUID 5104f0ea-1fb6-4260-a9b6-95922b3a8e5b which can be used as unique global reference for Google Workspace Global Access List in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-16T00:00:00Z
source MITRE
title Google Workspace Global Access List

OWN-CERT Google App Script 2024

L'Hutereau Arnaud. (n.d.). Google Workspace Malicious App Script analysis. Retrieved October 2, 2024.

Internal MISP references

UUID 1f837b2d-6b45-57ed-8d34-a78ce88cb998 which can be used as unique global reference for OWN-CERT Google App Script 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-02T00:00:00Z
source MITRE
title Google Workspace Malicious App Script analysis

Trend Micro January 09 2023

Trend Micro. (2023, January 9). Gootkit Loader Actively Targets Australian Healthcare Industry. Retrieved May 7, 2023.

Internal MISP references

UUID 903861d2-cd45-4bda-bc70-2a44c6d49aa6 which can be used as unique global reference for Trend Micro January 09 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2023-01-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Gootkit Loader Actively Targets Australian Healthcare Industry

Sophos Gootloader

Szappanos, G. & Brandt, A. (2021, March 1). “Gootloader” expands its payload delivery options. Retrieved September 30, 2022.

Internal MISP references

UUID 63357292-0f08-4405-a45a-34b606ab7110 which can be used as unique global reference for Sophos Gootloader in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-30T00:00:00Z
date_published 2021-03-01T00:00:00Z
source MITRE
title “Gootloader” expands its payload delivery options

SentinelOne Gootloader June 2021

Pirozzi, A. (2021, June 16). Gootloader: ‘Initial Access as a Service’ Platform Expands Its Search for High Value Targets. Retrieved May 28, 2024.

Internal MISP references

UUID 8512c5fd-2ddc-5de4-bb7d-8012402efbb5 which can be used as unique global reference for SentinelOne Gootloader June 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-28T00:00:00Z
date_published 2021-06-16T00:00:00Z
source MITRE
title Gootloader: ‘Initial Access as a Service’ Platform Expands Its Search for High Value Targets

SentinelLabs Gootloader June 2021

Antonio Pirozzi. (2021, June 16). Gootloader: ‘Initial Access as a Service’ Platform Expands Its Search for High Value Targets. Retrieved May 7, 2023.

Internal MISP references

UUID 1ab5b9c2-4e91-420f-9a27-661588d0bd71 which can be used as unique global reference for SentinelLabs Gootloader June 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2021-06-16T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Gootloader: ‘Initial Access as a Service’ Platform Expands Its Search for High Value Targets

Cybereason Gootloader February 2023

Loïc Castel, Jakes Jansen, Nitin Grover. (2023, February 14). GootLoader - SEO Poisoning and Large Payloads Leading to Compromise. Retrieved May 18, 2023.

Internal MISP references

UUID 098bf58f-3868-4892-bb4d-c78ce8817a02 which can be used as unique global reference for Cybereason Gootloader February 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-18T00:00:00Z
date_published 2023-02-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GootLoader - SEO Poisoning and Large Payloads Leading to Compromise

GoTo Resolve

GoTo. (n.d.). GoTo Resolve. Retrieved October 11, 2024.

Internal MISP references

UUID f1a13cad-b77e-4c38-925c-038a4fcec8d3 which can be used as unique global reference for GoTo Resolve in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-11T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GoTo Resolve

SentinelOne 1 16 2023

Jim Walter. (2023, January 16). Gotta Catch 'Em All . Retrieved January 1, 2024.

Internal MISP references

UUID 1482155f-e70d-434c-ade0-23543a4124fe which can be used as unique global reference for SentinelOne 1 16 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-01T00:00:00Z
date_published 2023-01-16T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Gotta Catch 'Em All

Unit 42 CARROTBAT January 2020

McCabe, A. (2020, January 23). The Fractured Statue Campaign: U.S. Government Agency Targeted in Spear-Phishing Attacks. Retrieved June 2, 2020.

Internal MISP references

UUID b65442ca-18ca-42e0-8be0-7c2b66c26d02 which can be used as unique global reference for Unit 42 CARROTBAT January 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-02T00:00:00Z
source MITRE
title Government Agency Targeted in Spear-Phishing Attacks

Secureworks BRONZE SILHOUETTE May 2023

Counter Threat Unit Research Team. (2023, May 24). Chinese Cyberespionage Group BRONZE SILHOUETTE Targets U.S. Government and Defense Organizations. Retrieved July 27, 2023.

Internal MISP references

UUID 77624549-e170-5894-9219-a15b4aa31726 which can be used as unique global reference for Secureworks BRONZE SILHOUETTE May 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-27T00:00:00Z
source MITRE
title Government and Defense Organizations

Google_WinRAR_vuln_2023

Morgan, K. (2023, October 18). Government-backed actors exploiting WinRAR vulnerability. Retrieved July 19, 2024.

Internal MISP references

UUID 009ac8a4-7e2b-543e-82aa-ce3cc9f0c35e which can be used as unique global reference for Google_WinRAR_vuln_2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-19T00:00:00Z
date_published 2023-10-18T00:00:00Z
source MITRE
title Government-backed actors exploiting WinRAR vulnerability

Google TAG CVE-2023-38831 October 18 2023

Kate Morgan. (2023, October 18). Government-backed actors exploiting WinRAR vulnerability. Retrieved July 10, 2024.

Internal MISP references

UUID 6e8fb629-4bb8-4557-9d42-385060be598f which can be used as unique global reference for Google TAG CVE-2023-38831 October 18 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-10T00:00:00Z
date_published 2023-10-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Government-backed actors exploiting WinRAR vulnerability

DOJ KVBotnet 2024

US Department of Justice. (2024, January 31). U.S. Government Disrupts Botnet People’s Republic of China Used to Conceal Hacking of Critical Infrastructure. Retrieved June 10, 2024.

Internal MISP references

UUID 55cf0ced-0de3-5af8-b3e6-3c33bb445593 which can be used as unique global reference for DOJ KVBotnet 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-10T00:00:00Z
source MITRE
title Government Disrupts Botnet People’s Republic of China Used to Conceal Hacking of Critical Infrastructure

FireEye HAWKBALL Jun 2019

Patil, S. and Williams, M.. (2019, June 5). Government Sector in Central Asia Targeted With New HAWKBALL Backdoor Delivered via Microsoft Office Vulnerabilities. Retrieved June 20, 2019.

Internal MISP references

UUID c88150b1-8c0a-4fc5-b5b7-11e242af1c43 which can be used as unique global reference for FireEye HAWKBALL Jun 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-20T00:00:00Z
date_published 2019-06-05T00:00:00Z
source MITRE
title Government Sector in Central Asia Targeted With New HAWKBALL Backdoor Delivered via Microsoft Office Vulnerabilities

CISA AA20-296A Berserk Bear December 2020

CISA. (2020, December 1). Russian State-Sponsored Advanced Persistent Threat Actor Compromises U.S. Government Targets. Retrieved December 9, 2021.

Internal MISP references

UUID c7bc4b25-2043-4f43-8320-590f82d0e09a which can be used as unique global reference for CISA AA20-296A Berserk Bear December 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-12-09T00:00:00Z
source MITRE, Tidal Cyber
title Government Targets

Obscuresecurity Get-GPPPassword

Campbell, C. (2012, May 24). GPP Password Retrieval with PowerShell. Retrieved April 11, 2018.

Internal MISP references

UUID 54351cf9-8d2a-47fb-92d5-fe64b628ab06 which can be used as unique global reference for Obscuresecurity Get-GPPPassword in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-11T00:00:00Z
date_published 2012-05-24T00:00:00Z
source MITRE
title GPP Password Retrieval with PowerShell

Microsoft gpresult

Microsoft. (2017, October 16). gpresult. Retrieved August 6, 2021.

Internal MISP references

UUID 88af38e8-e437-4153-80af-a1be8c6a8629 which can be used as unique global reference for Microsoft gpresult in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-06T00:00:00Z
date_published 2017-10-16T00:00:00Z
source MITRE
title gpresult

Gpscript.exe - LOLBAS Project

LOLBAS. (2018, May 25). Gpscript.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 619f57d9-d93b-4e9b-aae0-6ce89d91deb6 which can be used as unique global reference for Gpscript.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Gpscript.exe

ESET Grandoreiro April 2020

ESET. (2020, April 28). Grandoreiro: How engorged can an EXE get?. Retrieved November 13, 2020.

Internal MISP references

UUID d6270492-986b-4fb6-bdbc-2e364947847c which can be used as unique global reference for ESET Grandoreiro April 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-13T00:00:00Z
date_published 2020-04-28T00:00:00Z
source MITRE
title Grandoreiro: How engorged can an EXE get?

IBM Grandoreiro April 2020

Abramov, D. (2020, April 13). Grandoreiro Malware Now Targeting Banks in Spain. Retrieved November 12, 2020.

Internal MISP references

UUID a2d4bca5-d57d-4a77-95c6-409f90115e2f which can be used as unique global reference for IBM Grandoreiro April 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-12T00:00:00Z
date_published 2020-04-13T00:00:00Z
source MITRE
title Grandoreiro Malware Now Targeting Banks in Spain

Guardian Grand Theft Auto Leak 2022

Keza MacDonald, Keith Stuart and Alex Hern. (2022, September 19). Grand Theft Auto 6 leak: who hacked Rockstar and what was stolen?. Retrieved August 30, 2024.

Internal MISP references

UUID ec648a9b-025a-52a0-a98a-7ba04388d52e which can be used as unique global reference for Guardian Grand Theft Auto Leak 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-30T00:00:00Z
date_published 2022-09-19T00:00:00Z
source MITRE
title Grand Theft Auto 6 leak: who hacked Rockstar and what was stolen?

AWS PassRole

AWS. (n.d.). Granting a user permissions to pass a role to an AWS service. Retrieved July 10, 2023.

Internal MISP references

UUID 01e0c198-dd59-5dd1-b632-73cb316eafe0 which can be used as unique global reference for AWS PassRole in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-10T00:00:00Z
source MITRE
title Granting a user permissions to pass a role to an AWS service

Microsoft Azure Storage Shared Access Signature

Microsoft. (2023, June 7). Grant limited access to Azure Storage resources using shared access signatures (SAS). Retrieved March 4, 2024.

Internal MISP references

UUID 9031357f-04ac-5c07-a59d-97b9e32edf79 which can be used as unique global reference for Microsoft Azure Storage Shared Access Signature in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-04T00:00:00Z
date_published 2023-06-07T00:00:00Z
source MITRE
title Grant limited access to Azure Storage resources using shared access signatures (SAS)

CopyFromScreen .NET

Microsoft. (n.d.). Graphics.CopyFromScreen Method. Retrieved March 24, 2020.

Internal MISP references

UUID b9733af4-ffb4-416e-884e-d51649aecbce which can be used as unique global reference for CopyFromScreen .NET in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-24T00:00:00Z
source MITRE
title Graphics.CopyFromScreen Method

Talos GravityRAT

Mercer, W., Rascagneres, P. (2018, April 26). GravityRAT - The Two-Year Evolution Of An APT Targeting India. Retrieved May 16, 2018.

Internal MISP references

UUID 2d7a1d72-cc9a-4b0b-a89a-e24ca836879b which can be used as unique global reference for Talos GravityRAT in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-05-16T00:00:00Z
date_published 2018-04-26T00:00:00Z
source MITRE
title GravityRAT - The Two-Year Evolution Of An APT Targeting India

FireEye PowerShell Logging

Dunwoody, M. (2016, February 11). Greater Visibility Through PowerShell Logging. Retrieved September 28, 2021.

Internal MISP references

UUID 02ee8297-60e8-42bf-8791-2461ebc29207 which can be used as unique global reference for FireEye PowerShell Logging in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-28T00:00:00Z
date_published 2016-02-11T00:00:00Z
source MITRE
title Greater Visibility Through PowerShell Logging

FireEye PowerShell Logging 2016

Dunwoody, M. (2016, February 11). GREATER VISIBILITY THROUGH POWERSHELL LOGGING. Retrieved February 16, 2016.

Internal MISP references

UUID eb1e9dc7-b935-42ae-bbde-d2fdda5953db which can be used as unique global reference for FireEye PowerShell Logging 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-02-16T00:00:00Z
date_published 2016-02-11T00:00:00Z
source MITRE
title GREATER VISIBILITY THROUGH POWERSHELL LOGGING

Glitch-Cat Green Lambert ATTCK Oct 2021

Sandvik, Runa. (2021, October 18). Green Lambert and ATT&CK. Retrieved March 21, 2022.

Internal MISP references

UUID f22d033c-4474-4bd7-b194-c7a4d9819a2b which can be used as unique global reference for Glitch-Cat Green Lambert ATTCK Oct 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-21T00:00:00Z
date_published 2021-10-18T00:00:00Z
source MITRE
title Green Lambert and ATT&CK

GreenMwizi - Kenyan scamming campaign using Twitter bots

blog.bushidotoken.net. (n.d.). GreenMwizi - Kenyan scamming campaign using Twitter bots. Retrieved May 7, 2023.

Internal MISP references

UUID 3b09696a-1345-4283-a59b-e9a13124ef59 which can be used as unique global reference for GreenMwizi - Kenyan scamming campaign using Twitter bots in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GreenMwizi - Kenyan scamming campaign using Twitter bots

ESET GreyEnergy Oct 2018

Cherepanov, A. (2018, October). GREYENERGY A successor to BlackEnergy. Retrieved November 15, 2018.

Internal MISP references

UUID f3e70f41-6c22-465c-b872-a7ec5e6a3e67 which can be used as unique global reference for ESET GreyEnergy Oct 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-15T00:00:00Z
date_published 2018-10-01T00:00:00Z
source MITRE
title GREYENERGY A successor to BlackEnergy

GRIZZLY STEPPE JAR

Department of Homeland Security and Federal Bureau of Investigation. (2016, December 29). GRIZZLY STEPPE – Russian Malicious Cyber Activity. Retrieved January 11, 2017.

Internal MISP references

UUID 4b26d274-497f-49bc-a2a5-b93856a49893 which can be used as unique global reference for GRIZZLY STEPPE JAR in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-01-11T00:00:00Z
date_published 2016-12-29T00:00:00Z
source MITRE
title GRIZZLY STEPPE – Russian Malicious Cyber Activity

Citizen Lab Group5

Scott-Railton, J., et al. (2016, August 2). Group5: Syria and the Iranian Connection. Retrieved September 26, 2016.

Internal MISP references

UUID ffbec5e8-947a-4363-b7e1-812dfd79935a which can be used as unique global reference for Citizen Lab Group5 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-09-26T00:00:00Z
date_published 2016-08-02T00:00:00Z
source MITRE, Tidal Cyber
title Group5: Syria and the Iranian Connection

Group-IB Threat Intelligence Tweet October 9 2023

GroupIB_TI. (2023, October 9). Group-IB Threat Intelligence Tweet October 9 2023. Retrieved October 10, 2023.

Internal MISP references

UUID 2df546ed-6577-44b2-9b26-0a17c3622df7 which can be used as unique global reference for Group-IB Threat Intelligence Tweet October 9 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-10T00:00:00Z
date_published 2023-10-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Group-IB Threat Intelligence Tweet October 9 2023

TechNet Group Policy Basics

srachui. (2012, February 13). Group Policy Basics – Part 1: Understanding the Structure of a Group Policy Object. Retrieved March 5, 2019.

Internal MISP references

UUID 9b9c8c6c-c272-424e-a594-a34b7bf62477 which can be used as unique global reference for TechNet Group Policy Basics in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-05T00:00:00Z
date_published 2012-02-13T00:00:00Z
source MITRE
title Group Policy Basics – Part 1: Understanding the Structure of a Group Policy Object

Microsoft GPP 2016

Microsoft. (2016, August 31). Group Policy Preferences. Retrieved March 9, 2020.

Internal MISP references

UUID fa3beaf1-81e7-411b-849a-24cffaf7c552 which can be used as unique global reference for Microsoft GPP 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-09T00:00:00Z
date_published 2016-08-31T00:00:00Z
source MITRE
title Group Policy Preferences

groups man page

MacKenzie, D. and Youngman, J. (n.d.). groups(1) - Linux man page. Retrieved January 11, 2024.

Internal MISP references

UUID 3d3c9756-4700-5db3-b8bc-8d2958df6a42 which can be used as unique global reference for groups man page in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-11T00:00:00Z
source MITRE
title groups(1) - Linux man page

Venafi SSH Key Abuse

Blachman, Y. (2020, April 22). Growing Abuse of SSH Keys: Commodity Malware Campaigns Now Equipped with SSH Capabilities. Retrieved June 24, 2020.

Internal MISP references

UUID cba14230-13bc-47ad-8f3f-d798217657bd which can be used as unique global reference for Venafi SSH Key Abuse in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-24T00:00:00Z
date_published 2020-04-22T00:00:00Z
source MITRE
title Growing Abuse of SSH Keys: Commodity Malware Campaigns Now Equipped with SSH Capabilities

Wikibooks Grsecurity

Wikibooks. (2018, August 19). Grsecurity/The RBAC System. Retrieved June 4, 2020.

Internal MISP references

UUID 8a7abfa0-97e8-4cac-9d76-c886e9666a16 which can be used as unique global reference for Wikibooks Grsecurity in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-04T00:00:00Z
date_published 2018-08-19T00:00:00Z
source MITRE
title Grsecurity/The RBAC System

TrueSec Gsecdump

TrueSec. (n.d.). gsecdump v2.0b5. Retrieved September 29, 2015.

Internal MISP references

UUID ba1d07ed-2e18-4f5f-9d44-082530946f14 which can be used as unique global reference for TrueSec Gsecdump in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-09-29T00:00:00Z
source MITRE
title gsecdump v2.0b5

GTFOBins Suid

Emilio Pinna, Andrea Cardaci. (n.d.). GTFOBins. Retrieved January 28, 2022.

Internal MISP references

UUID 0b7d8e81-da8e-4f6a-a1b7-4ed81e441b4d which can be used as unique global reference for GTFOBins Suid in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-28T00:00:00Z
source MITRE
title GTFOBins

GTFObins at

Emilio Pinna, Andrea Cardaci. (n.d.). gtfobins at. Retrieved September 28, 2021.

Internal MISP references

UUID 3fad6618-5a85-4f7a-be2b-0600269d7768 which can be used as unique global reference for GTFObins at in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-28T00:00:00Z
source MITRE
title gtfobins at

AWS GuardDuty EC2 finding types

AWS. (n.d.). GuardDuty EC2 finding types. Retrieved September 25, 2024.

Internal MISP references

UUID 249f1a90-d6ed-503c-998c-a9d1650509d2 which can be used as unique global reference for AWS GuardDuty EC2 finding types in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-25T00:00:00Z
source MITRE
title GuardDuty EC2 finding types

AWS GuardDuty IAM finding types

AWS. (n.d.). GuardDuty IAM finding types. Retrieved September 24, 2024.

Internal MISP references

UUID 215a79b4-c25b-5b09-912a-6b68914bb1ba which can be used as unique global reference for AWS GuardDuty IAM finding types in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-24T00:00:00Z
source MITRE
title GuardDuty IAM finding types

AWS GuardDuty RDS Protection

AWS. (n.d.). GuardDuty RDS Protection. Retrieved September 24, 2024.

Internal MISP references

UUID 4c6101f0-25d9-5ed1-98a2-a0c468e3ff1a which can be used as unique global reference for AWS GuardDuty RDS Protection in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-24T00:00:00Z
source MITRE
title GuardDuty RDS Protection

Fortinet Moses Staff February 15 2022

Rotem Sde-Or. (2022, February 15). Guard Your Drive from DriveGuard: Moses Staff Campaigns Against Israeli Organizations Span Several Months. Retrieved October 23, 2023.

Internal MISP references

UUID 4a435edb-18ae-4c31-beff-2b8f2e6cad34 which can be used as unique global reference for Fortinet Moses Staff February 15 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-23T00:00:00Z
date_published 2022-02-15T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Guard Your Drive from DriveGuard: Moses Staff Campaigns Against Israeli Organizations Span Several Months

Microsoft Log4j Vulnerability Exploitation December 2021

Microsoft Threat Intelligence. (2021, December 11). Guidance for preventing, detecting, and hunting for exploitation of the Log4j 2 vulnerability. Retrieved December 7, 2023.

Internal MISP references

UUID 456ed22f-0de1-5ee4-bb8a-29e3baedc7b1 which can be used as unique global reference for Microsoft Log4j Vulnerability Exploitation December 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-07T00:00:00Z
date_published 2021-12-11T00:00:00Z
source MITRE
title Guidance for preventing, detecting, and hunting for exploitation of the Log4j 2 vulnerability

Unit 42 NETWIRE April 2020

Duncan, B. (2020, April 3). GuLoader: Malspam Campaign Installing NetWire RAT. Retrieved January 7, 2021.

Internal MISP references

UUID b42f119d-144a-470a-b9fe-ccbf80a78fbb which can be used as unique global reference for Unit 42 NETWIRE April 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-07T00:00:00Z
date_published 2020-04-03T00:00:00Z
source MITRE
title GuLoader: Malspam Campaign Installing NetWire RAT

Cloud Hack Tricks GWS Apps Script

HackTricks Cloud. (n.d.). GWS - App Scripts. Retrieved July 1, 2024.

Internal MISP references

UUID 32569f13-e383-576c-813c-52490450464d which can be used as unique global reference for Cloud Hack Tricks GWS Apps Script in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-01T00:00:00Z
source MITRE
title GWS - App Scripts

H0lyGh0st - North Korean Threat Group Strikes Back With New Ransomware

www.picussecurity.com. (n.d.). H0lyGh0st - North Korean Threat Group Strikes Back With New Ransomware. Retrieved May 19, 2023.

Internal MISP references

UUID 3f66ef62-ac0d-4ece-9a4b-917ae70f1617 which can be used as unique global reference for H0lyGh0st - North Korean Threat Group Strikes Back With New Ransomware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-19T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title H0lyGh0st - North Korean Threat Group Strikes Back With New Ransomware

Cisco H1N1 Part 1

Reynolds, J.. (2016, September 13). H1N1: Technical analysis reveals new capabilities. Retrieved September 26, 2016.

Internal MISP references

UUID 03a2faca-1a47-4f68-9f26-3fa98145f2ab which can be used as unique global reference for Cisco H1N1 Part 1 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-09-26T00:00:00Z
date_published 2016-09-13T00:00:00Z
source MITRE
title H1N1: Technical analysis reveals new capabilities

Cisco H1N1 Part 2

Reynolds, J.. (2016, September 14). H1N1: Technical analysis reveals new capabilities – part 2. Retrieved September 26, 2016.

Internal MISP references

UUID b53e55dc-078d-4535-a99f-c979ad8ca6e6 which can be used as unique global reference for Cisco H1N1 Part 2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-09-26T00:00:00Z
date_published 2016-09-14T00:00:00Z
source MITRE
title H1N1: Technical analysis reveals new capabilities – part 2

Wired Magecart S3 Buckets, 2019

Barrett, B.. (2019, July 11). Hack Brief: A Card-Skimming Hacker Group Hit 17K Domains—and Counting. Retrieved October 4, 2019.

Internal MISP references

UUID 47fb06ed-b4ce-454c-9bbe-21b28309f351 which can be used as unique global reference for Wired Magecart S3 Buckets, 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-04T00:00:00Z
date_published 2019-07-11T00:00:00Z
source MITRE
title Hack Brief: A Card-Skimming Hacker Group Hit 17K Domains—and Counting

Wired Uber Breach

Andy Greenberg. (2017, January 21). Hack Brief: Uber Paid Off Hackers to Hide a 57-Million User Data Breach. Retrieved May 14, 2021.

Internal MISP references

UUID 3bdf88b3-8f41-4945-9292-e299bab4f98e which can be used as unique global reference for Wired Uber Breach in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-05-14T00:00:00Z
date_published 2017-01-21T00:00:00Z
source MITRE
title Hack Brief: Uber Paid Off Hackers to Hide a 57-Million User Data Breach

Trendmicro NPM Compromise

Trendmicro. (2018, November 29). Hacker Infects Node.js Package to Steal from Bitcoin Wallets. Retrieved April 10, 2019.

Internal MISP references

UUID 69eac1b0-1c50-4534-99e0-2d0fd738ab8f which can be used as unique global reference for Trendmicro NPM Compromise in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-10T00:00:00Z
date_published 2018-11-29T00:00:00Z
source MITRE
title Hacker Infects Node.js Package to Steal from Bitcoin Wallets

Data Destruction - Threat Post

Mimoso, M.. (2014, June 18). Hacker Puts Hosting Service Code Spaces Out of Business. Retrieved December 15, 2020.

Internal MISP references

UUID 97d16d3a-98a0-4a7d-9f74-8877c8088ddf which can be used as unique global reference for Data Destruction - Threat Post in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-15T00:00:00Z
date_published 2014-06-18T00:00:00Z
source MITRE
title Hacker Puts Hosting Service Code Spaces Out of Business

GWS Apps Script Abuse 2021

Sergiu Gatlan. (2021, February 18). Hackers abuse Google Apps Script to steal credit cards, bypass CSP. Retrieved July 1, 2024.

Internal MISP references

UUID 590687ce-0d66-584d-a6bf-8e7288f00d1e which can be used as unique global reference for GWS Apps Script Abuse 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-01T00:00:00Z
date_published 2021-02-18T00:00:00Z
source MITRE
title Hackers abuse Google Apps Script to steal credit cards, bypass CSP

Bleeping Computer - Scriptrunner.exe

Bill Toulas. (2023, January 4). Hackers abuse Windows error reporting tool to deploy malware. Retrieved July 8, 2024.

Internal MISP references

UUID f7ab464d-255b-5d92-a878-c16c905c057b which can be used as unique global reference for Bleeping Computer - Scriptrunner.exe in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-08T00:00:00Z
date_published 2023-01-04T00:00:00Z
source MITRE
title Hackers abuse Windows error reporting tool to deploy malware

Bloomberg Scattered Spider May 8 2024

Katrina Manson. (2024, May 8). Hackers Behind MGM Attack Targeting Financial Sector in New Campaign. Retrieved May 22, 2024.

Internal MISP references

UUID 2bf7e84a-805d-48aa-b911-8cd8a9dbf1cf which can be used as unique global reference for Bloomberg Scattered Spider May 8 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-22T00:00:00Z
date_published 2024-05-08T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Hackers Behind MGM Attack Targeting Financial Sector in New Campaign

Salesforce zero-day in facebook phishing attack

Bill Toulas. (2023, August 2). Hackers exploited Salesforce zero-day in Facebook phishing attack. Retrieved September 18, 2023.

Internal MISP references

UUID cbd360bb-f4b6-5326-8861-b05f3a2a8737 which can be used as unique global reference for Salesforce zero-day in facebook phishing attack in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-18T00:00:00Z
date_published 2023-08-02T00:00:00Z
source MITRE
title Hackers exploited Salesforce zero-day in Facebook phishing attack

Fortune Dragonfly 2.0 Sept 2017

Hackett, R. (2017, September 6). Hackers Have Penetrated Energy Grid, Symantec Warns. Retrieved June 6, 2018.

Internal MISP references

UUID b56c5b41-b8e0-4fef-a6d8-183bb283dc7c which can be used as unique global reference for Fortune Dragonfly 2.0 Sept 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-06-06T00:00:00Z
date_published 2017-09-06T00:00:00Z
source MITRE
title Hackers Have Penetrated Energy Grid, Symantec Warns

Wired Cyber Army of Russia April 17 2024

Andy Greenberg. (2024, April 17). Hackers Linked to Russia’s Military Claim Credit for Sabotaging US Water Utilities. Retrieved April 30, 2024.

Internal MISP references

UUID 53583baf-4e09-4d19-9348-6110206b88be which can be used as unique global reference for Wired Cyber Army of Russia April 17 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-30T00:00:00Z
date_published 2024-04-17T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Hackers Linked to Russia’s Military Claim Credit for Sabotaging US Water Utilities

Huntress API Hash

Brennan, M. (2022, February 16). Hackers No Hashing: Randomizing API Hashes to Evade Cobalt Strike Shellcode Detection. Retrieved August 22, 2022.

Internal MISP references

UUID e9f91661-29e3-408e-bfdd-c7df22f3f400 which can be used as unique global reference for Huntress API Hash in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-22T00:00:00Z
date_published 2022-02-16T00:00:00Z
source MITRE
title Hackers No Hashing: Randomizing API Hashes to Evade Cobalt Strike Shellcode Detection

BleepingComputer Agent Tesla steal wifi passwords

Sergiu Gatlan. (2020, April 16). Hackers steal WiFi passwords using upgraded Agent Tesla malware. Retrieved September 8, 2023.

Internal MISP references

UUID 93b5ecd2-35a3-5bd8-9d6e-87bace012546 which can be used as unique global reference for BleepingComputer Agent Tesla steal wifi passwords in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-08T00:00:00Z
date_published 2020-04-16T00:00:00Z
source MITRE
title Hackers steal WiFi passwords using upgraded Agent Tesla malware

SWAT-hospital

Giles, Bruce. (2024, January 4). Hackers threaten to send SWAT teams to Fred Hutch patients' homes. Retrieved January 5, 2024.

Internal MISP references

UUID ce8bc906-875a-53bd-8b9c-b2191e369e4e which can be used as unique global reference for SWAT-hospital in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-05T00:00:00Z
date_published 2024-01-04T00:00:00Z
source MITRE
title Hackers threaten to send SWAT teams to Fred Hutch patients' homes

PCMag FakeLogin

Kan, M. (2019, October 24). Hackers Try to Phish United Nations Staffers With Fake Login Pages. Retrieved October 20, 2020.

Internal MISP references

UUID f652524c-7950-4a8a-9860-0e658a9581d8 which can be used as unique global reference for PCMag FakeLogin in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
date_published 2019-10-24T00:00:00Z
source MITRE
title Hackers Try to Phish United Nations Staffers With Fake Login Pages

BleepingComputer Velvet Ant June 17 2024

Bill Toulas. (2024, June 17). Hackers use F5 BIG-IP malware to stealthily steal data for years. Retrieved June 20, 2024.

Internal MISP references

UUID 70235e47-f8bb-4d16-9933-9f4923f08f5d which can be used as unique global reference for BleepingComputer Velvet Ant June 17 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-20T00:00:00Z
date_published 2024-06-17T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Hackers use F5 BIG-IP malware to stealthily steal data for years

Krebs-Bazaar

Brian Krebs. (2016, October 31). Hackforums Shutters Booter Service Bazaar. Retrieved May 15, 2017.

Internal MISP references

UUID b46efda2-18e0-451e-b945-28421c2d5274 which can be used as unique global reference for Krebs-Bazaar in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-05-15T00:00:00Z
date_published 2016-10-31T00:00:00Z
source MITRE
title Hackforums Shutters Booter Service Bazaar

BleepingComputer Molerats Dec 2020

Ilascu, I. (2020, December 14). Hacking group’s new malware abuses Google and Facebook services. Retrieved December 28, 2020.

Internal MISP references

UUID 307108c8-9c72-4f31-925b-0b9bd4b31e7b which can be used as unique global reference for BleepingComputer Molerats Dec 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-28T00:00:00Z
date_published 2020-12-14T00:00:00Z
source MITRE
title Hacking group’s new malware abuses Google and Facebook services

Microsoft Hacking Team Breach

Microsoft Secure Team. (2016, June 1). Hacking Team Breach: A Cyber Jurassic Park. Retrieved March 5, 2019.

Internal MISP references

UUID 8daac742-6467-40db-9fe5-87efd2a96f09 which can be used as unique global reference for Microsoft Hacking Team Breach in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-05T00:00:00Z
date_published 2016-06-01T00:00:00Z
source MITRE
title Hacking Team Breach: A Cyber Jurassic Park

Intel HackingTeam UEFI Rootkit

Intel Security. (2005, July 16). HackingTeam's UEFI Rootkit Details. Retrieved March 20, 2017.

Internal MISP references

UUID 1c476cb2-8ce0-4559-8037-646d0ea09398 which can be used as unique global reference for Intel HackingTeam UEFI Rootkit in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-20T00:00:00Z
date_published 2005-07-16T00:00:00Z
source MITRE
title HackingTeam's UEFI Rootkit Details

TrendMicro Hacking Team UEFI

Lin, P. (2015, July 13). Hacking Team Uses UEFI BIOS Rootkit to Keep RCS 9 Agent in Target Systems. Retrieved December 11, 2015.

Internal MISP references

UUID 24796535-d516-45e9-bcc7-8f03a3f3cd73 which can be used as unique global reference for TrendMicro Hacking Team UEFI in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-12-11T00:00:00Z
date_published 2015-07-13T00:00:00Z
source MITRE
title Hacking Team Uses UEFI BIOS Rootkit to Keep RCS 9 Agent in Target Systems

TempertonDarkHotel

Temperton, J. (2015, August 10). Hacking Team zero-day used in new Darkhotel attacks. Retrieved March 9, 2017.

Internal MISP references

UUID 4de7960b-bd62-452b-9e64-b52a0d580858 which can be used as unique global reference for TempertonDarkHotel in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-09T00:00:00Z
date_published 2015-08-10T00:00:00Z
source MITRE
title Hacking Team zero-day used in new Darkhotel attacks

FireEye Hacking FIN4 Video Dec 2014

Vengerik, B. & Dennesen, K.. (2014, December 5). Hacking the Street? FIN4 Likely Playing the Market. Retrieved January 15, 2019.

Internal MISP references

UUID 6dcfe3fb-c310-49cf-a657-f2cec65c5499 which can be used as unique global reference for FireEye Hacking FIN4 Video Dec 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-01-15T00:00:00Z
date_published 2014-12-05T00:00:00Z
source MITRE
title Hacking the Street? FIN4 Likely Playing the Market

FireEye Hacking FIN4 Dec 2014

Vengerik, B. et al.. (2014, December 5). Hacking the Street? FIN4 Likely Playing the Market. Retrieved December 17, 2018.

Internal MISP references

UUID c3ac1c2a-21cc-42a9-a214-88f302371766 which can be used as unique global reference for FireEye Hacking FIN4 Dec 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-12-17T00:00:00Z
date_published 2014-12-05T00:00:00Z
source MITRE
title Hacking the Street? FIN4 Likely Playing the Market

Malwarebytes OSINT Leaky Buckets - Hioureas

Vasilios Hioureas. (2019, September 13). Hacking with AWS: incorporating leaky buckets into your OSINT workflow. Retrieved February 14, 2022.

Internal MISP references

UUID 67ebcf71-828e-4202-b842-f071140883f8 which can be used as unique global reference for Malwarebytes OSINT Leaky Buckets - Hioureas in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-14T00:00:00Z
date_published 2019-09-13T00:00:00Z
source MITRE
title Hacking with AWS: incorporating leaky buckets into your OSINT workflow

Microsoft Gsecdump

Vincent Tiu. (2017, September 15). HackTool:Win32/Gsecdump. Retrieved January 10, 2024.

Internal MISP references

UUID e9c12a7f-ce8a-5f20-8283-509e16532d9b which can be used as unique global reference for Microsoft Gsecdump in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-10T00:00:00Z
date_published 2017-09-15T00:00:00Z
source MITRE
title HackTool:Win32/Gsecdump

Microsoft HAFNIUM March 2020

MSTIC. (2021, March 2). HAFNIUM targeting Exchange Servers with 0-day exploits. Retrieved March 3, 2021.

Internal MISP references

UUID 6a986c46-79a3-49c6-94d2-d9b1f5db08f3 which can be used as unique global reference for Microsoft HAFNIUM March 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-03T00:00:00Z
date_published 2021-03-02T00:00:00Z
source MITRE, Tidal Cyber
title HAFNIUM targeting Exchange Servers with 0-day exploits

haking9 libpcap network sniffing

Luis Martin Garcia. (2008, February 1). Hakin9 Issue 2/2008 Vol 3 No.2 VoIP Abuse: Storming SIP Security. Retrieved October 18, 2022.

Internal MISP references

UUID 2803d0b8-78ee-4b19-aad3-daf84cd292b5 which can be used as unique global reference for haking9 libpcap network sniffing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-10-18T00:00:00Z
date_published 2008-02-01T00:00:00Z
source MITRE
title Hakin9 Issue 2/2008 Vol 3 No.2 VoIP Abuse: Storming SIP Security

FireEye APT29

FireEye Labs. (2015, July). HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group. Retrieved September 17, 2015.

Internal MISP references

UUID 78ead31e-7450-46e8-89cf-461ae1981994 which can be used as unique global reference for FireEye APT29 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-09-17T00:00:00Z
date_published 2015-07-01T00:00:00Z
source MITRE
title HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group

FireEye Hancitor

Anubhav, A., Jallepalli, D. (2016, September 23). Hancitor (AKA Chanitor) observed using multiple attack approaches. Retrieved August 13, 2020.

Internal MISP references

UUID 65a07c8c-5b29-445f-8f01-6e577df4ea62 which can be used as unique global reference for FireEye Hancitor in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-13T00:00:00Z
date_published 2016-09-23T00:00:00Z
source MITRE
title Hancitor (AKA Chanitor) observed using multiple attack approaches

NCC Group Fivehands June 2021

Matthews, M. and Backhouse, W. (2021, June 15). Handy guide to a new Fivehands ransomware variant. Retrieved June 24, 2021.

Internal MISP references

UUID 33955c35-e8cd-4486-b1ab-6f992319c81c which can be used as unique global reference for NCC Group Fivehands June 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-24T00:00:00Z
date_published 2021-06-15T00:00:00Z
source MITRE
title Handy guide to a new Fivehands ransomware variant

Apple Developer Doco Hardened Runtime

Apple Inc.. (2021, January 1). Hardened Runtime: Manage security protections and resource access for your macOS apps.. Retrieved March 24, 2021.

Internal MISP references

UUID b41de1e5-63ab-4556-a61f-3baca1873283 which can be used as unique global reference for Apple Developer Doco Hardened Runtime in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-24T00:00:00Z
date_published 2021-01-01T00:00:00Z
source MITRE
title Hardened Runtime: Manage security protections and resource access for your macOS apps.

FireEye APT34 July 2019

Bromiley, M., et al.. (2019, July 18). Hard Pass: Declining APT34’s Invite to Join Their Professional Network. Retrieved August 26, 2019.

Internal MISP references

UUID 09a00ded-1afc-4555-894e-a151162796eb which can be used as unique global reference for FireEye APT34 July 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-08-26T00:00:00Z
date_published 2019-07-18T00:00:00Z
source MITRE
title Hard Pass: Declining APT34’s Invite to Join Their Professional Network

GitHub Hashjacking

Dunning, J. (2016, August 1). Hashjacking. Retrieved December 21, 2017.

Internal MISP references

UUID d31f6612-c552-45e1-bf6b-889fe619ab5f which can be used as unique global reference for GitHub Hashjacking in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-21T00:00:00Z
date_published 2016-08-01T00:00:00Z
source MITRE
title Hashjacking

FireEye HawkEye Malware July 2017

Swapnil Patil, Yogesh Londhe. (2017, July 25). HawkEye Credential Theft Malware Distributed in Recent Phishing Campaign. Retrieved June 18, 2019.

Internal MISP references

UUID 7ad228a8-5450-45ec-86fc-ea038f7c6ef7 which can be used as unique global reference for FireEye HawkEye Malware July 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-18T00:00:00Z
date_published 2017-07-25T00:00:00Z
source MITRE
title HawkEye Credential Theft Malware Distributed in Recent Phishing Campaign

Specter Ops - Cloud Credential Storage

Maddalena, C.. (2018, September 12). Head in the Clouds. Retrieved October 4, 2019.

Internal MISP references

UUID 95d6d1ce-ceba-48ee-88c4-0fb30058bd80 which can be used as unique global reference for Specter Ops - Cloud Credential Storage in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-04T00:00:00Z
date_published 2018-09-12T00:00:00Z
source MITRE
title Head in the Clouds

Securelist Dtrack

Konstantin Zykov. (2019, September 23). Hello! My name is Dtrack. Retrieved January 20, 2021.

Internal MISP references

UUID 49bd8841-a4b5-4ced-adfa-0ad0c8625ccd which can be used as unique global reference for Securelist Dtrack in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-20T00:00:00Z
date_published 2019-09-23T00:00:00Z
source MITRE
title Hello! My name is Dtrack

Securelist Dtrack2

KONSTANTIN ZYKOV. (2019, September 23). Hello! My name is Dtrack. Retrieved September 30, 2022.

Internal MISP references

UUID a011b68a-30e0-4204-9bf3-fa73f2a238b4 which can be used as unique global reference for Securelist Dtrack2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-30T00:00:00Z
date_published 2019-09-23T00:00:00Z
source MITRE
title Hello! My name is Dtrack

Baggett 2012

Baggett, M. (2012, November 8). Help eliminate unquoted path vulnerabilities. Retrieved December 4, 2014.

Internal MISP references

UUID 9b234329-5e05-4035-af38-dd8ab20fd68e which can be used as unique global reference for Baggett 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-12-04T00:00:00Z
date_published 2012-11-08T00:00:00Z
source MITRE
title Help eliminate unquoted path vulnerabilities

Help eliminate unquoted path

Mark Baggett. (2012, November 8). Help eliminate unquoted path vulnerabilities. Retrieved November 8, 2012.

Internal MISP references

UUID 23ad5a8c-cbe1-4f40-8757-f1784a4003a1 which can be used as unique global reference for Help eliminate unquoted path in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2012-11-08T00:00:00Z
date_published 2012-11-08T00:00:00Z
source MITRE
title Help eliminate unquoted path vulnerabilities

Default VBS macros Blocking

Kellie Eickmeyer. (2022, February 7). Helping users stay safe: Blocking internet macros by default in Office. Retrieved February 7, 2022.

Internal MISP references

UUID d86883dd-3766-4971-91c7-b205ed13cc37 which can be used as unique global reference for Default VBS macros Blocking in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-07T00:00:00Z
date_published 2022-02-07T00:00:00Z
source MITRE
title Helping users stay safe: Blocking internet macros by default in Office

Twitter CMSTP Usage Jan 2018

Carr, N. (2018, January 31). Here is some early bad cmstp.exe... Retrieved September 12, 2024.

Internal MISP references

UUID 836621f3-83e1-4c55-8e3b-740fc9ba1e46 which can be used as unique global reference for Twitter CMSTP Usage Jan 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2018-01-31T00:00:00Z
source MITRE
title Here is some early bad cmstp.exe..

ESET Hermetic Wiper February 2022

ESET. (2022, February 24). HermeticWiper: New data wiping malware hits Ukraine. Retrieved March 25, 2022.

Internal MISP references

UUID 07ef66e8-195b-4afe-a518-ce9e77220038 which can be used as unique global reference for ESET Hermetic Wiper February 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-25T00:00:00Z
date_published 2022-02-24T00:00:00Z
source MITRE
title HermeticWiper: New data wiping malware hits Ukraine

SentinelOne Hermetic Wiper February 2022

Guerrero-Saade, J. (2022, February 23). HermeticWiper | New Destructive Malware Used In Cyber Attacks on Ukraine. Retrieved March 25, 2022.

Internal MISP references

UUID 96825555-1936-4ee3-bb25-423dc16a9116 which can be used as unique global reference for SentinelOne Hermetic Wiper February 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-25T00:00:00Z
date_published 2022-02-23T00:00:00Z
source MITRE
title HermeticWiper

Dragos Hexane

Dragos. (n.d.). Hexane. Retrieved October 27, 2019.

Internal MISP references

UUID 11838e67-5032-4352-ad1f-81ba0398a14f which can be used as unique global reference for Dragos Hexane in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-27T00:00:00Z
source MITRE
title Hexane

Sourceforge Heyoka 2022

Sourceforge. (n.d.). Heyoka POC Exfiltration Tool. Retrieved October 11, 2022.

Internal MISP references

UUID f6677391-cb7a-4abc-abb7-3a8cd47fbc90 which can be used as unique global reference for Sourceforge Heyoka 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-10-11T00:00:00Z
source MITRE
title Heyoka POC Exfiltration Tool

Hh.exe - LOLBAS Project

LOLBAS. (2018, May 25). Hh.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 4e09bfcf-f5be-46c5-9ebf-8742ac8d1edc which can be used as unique global reference for Hh.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Hh.exe

CrowdStrike BloodHound April 2018

Red Team Labs. (2018, April 24). Hidden Administrative Accounts: BloodHound to the Rescue. Retrieved October 28, 2020.

Internal MISP references

UUID fa99f290-e42c-4311-9f6d-c519c9ab89fe which can be used as unique global reference for CrowdStrike BloodHound April 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-28T00:00:00Z
date_published 2018-04-24T00:00:00Z
source MITRE
title Hidden Administrative Accounts: BloodHound to the Rescue

McAfee Bankshot

Sherstobitoff, R. (2018, March 08). Hidden Cobra Targets Turkish Financial Sector With New Bankshot Implant. Retrieved May 18, 2018.

Internal MISP references

UUID c748dc6c-8c19-4a5c-840f-3d47955a6c78 which can be used as unique global reference for McAfee Bankshot in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-05-18T00:00:00Z
date_published 2018-03-08T00:00:00Z
source MITRE
title Hidden Cobra Targets Turkish Financial Sector With New Bankshot Implant

Pfammatter - Hidden Inbox Rules

Damian Pfammatter. (2018, September 17). Hidden Inbox Rules in Microsoft Exchange. Retrieved October 12, 2021.

Internal MISP references

UUID 8a00b664-5a75-4365-9069-a32e0ed20a80 which can be used as unique global reference for Pfammatter - Hidden Inbox Rules in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-12T00:00:00Z
date_published 2018-09-17T00:00:00Z
source MITRE
title Hidden Inbox Rules in Microsoft Exchange

Hidden VNC

Hutchins, Marcus. (2015, September 13). Hidden VNC for Beginners. Retrieved November 28, 2023.

Internal MISP references

UUID 1d50ce73-ad6a-5286-8ef9-0b2bfed321dc which can be used as unique global reference for Hidden VNC in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-11-28T00:00:00Z
date_published 2015-09-13T00:00:00Z
source MITRE
title Hidden VNC for Beginners

Intezer HiddenWasp Map 2019

Sanmillan, I. (2019, May 29). HiddenWasp Malware Stings Targeted Linux Systems. Retrieved June 24, 2019.

Internal MISP references

UUID dfef8451-031b-42a6-8b78-d25950cc9d23 which can be used as unique global reference for Intezer HiddenWasp Map 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-24T00:00:00Z
date_published 2019-05-29T00:00:00Z
source MITRE
title HiddenWasp Malware Stings Targeted Linux Systems

Apple Support Hide a User Account

Apple. (2020, November 30). Hide a user account in macOS. Retrieved December 10, 2021.

Internal MISP references

UUID e901df3b-76a6-41a5-9083-b28065e75aa2 which can be used as unique global reference for Apple Support Hide a User Account in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-12-10T00:00:00Z
date_published 2020-11-30T00:00:00Z
source MITRE
title Hide a user account in macOS

Malwarebytes Wow6432Node 2016

Arntz, P. (2016, March 30). Hiding in Plain Sight. Retrieved August 3, 2020.

Internal MISP references

UUID d4eba34c-d76b-45b4-bcaf-0f13459daaad which can be used as unique global reference for Malwarebytes Wow6432Node 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-03T00:00:00Z
date_published 2016-03-30T00:00:00Z
source MITRE
title Hiding in Plain Sight

FireEye APT17

FireEye Labs/FireEye Threat Intelligence. (2015, May 14). Hiding in Plain Sight: FireEye and Microsoft Expose Obfuscation Tactic. Retrieved January 22, 2016.

Internal MISP references

UUID a303f97a-72dd-4833-bac7-a421addc3242 which can be used as unique global reference for FireEye APT17 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-22T00:00:00Z
date_published 2015-05-14T00:00:00Z
source MITRE, Tidal Cyber
title Hiding in Plain Sight: FireEye and Microsoft Expose Obfuscation Tactic

ATTACK IQ

Federico Quattrin, Nick Desler, Tin Tam, & Matthew Rutkoske. (2023, March 16). Hiding in Plain Sight: Monitoring and Testing for Living-Off-the-Land Binaries. Retrieved July 15, 2024.

Internal MISP references

UUID 38ed8950-413b-56b5-98c3-ae6420850dc4 which can be used as unique global reference for ATTACK IQ in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-15T00:00:00Z
date_published 2023-03-16T00:00:00Z
source MITRE
title Hiding in Plain Sight: Monitoring and Testing for Living-Off-the-Land Binaries

Crowdstrike Hiding in Plain Sight 2018

Crowdstrike. (2018, July 18). Hiding in Plain Sight: Using the Office 365 Activities API to Investigate Business Email Compromises. Retrieved January 19, 2020.

Internal MISP references

UUID 8612fb31-5806-47ca-ba43-265a590b61fb which can be used as unique global reference for Crowdstrike Hiding in Plain Sight 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-01-19T00:00:00Z
date_published 2018-07-18T00:00:00Z
source MITRE
title Hiding in Plain Sight: Using the Office 365 Activities API to Investigate Business Email Compromises

Hiding Malicious Code with Module Stomping

Aliz Hammond. (2019, August 15). Hiding Malicious Code with "Module Stomping": Part 1. Retrieved July 14, 2022.

Internal MISP references

UUID 88983d22-980d-4442-858a-3b70ec485b94 which can be used as unique global reference for Hiding Malicious Code with Module Stomping in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-14T00:00:00Z
date_published 2019-08-15T00:00:00Z
source MITRE
title Hiding Malicious Code with "Module Stomping": Part 1

SpectorOps Hiding Reg Jul 2017

Reitz, B. (2017, July 14). Hiding Registry keys with PSReflect. Retrieved August 9, 2018.

Internal MISP references

UUID 877a5ae4-ec5f-4f53-b69d-ba74ff9e1619 which can be used as unique global reference for SpectorOps Hiding Reg Jul 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-09T00:00:00Z
date_published 2017-07-14T00:00:00Z
source MITRE
title Hiding Registry keys with PSReflect

FireEye SUNBURST Backdoor December 2020

FireEye. (2020, December 13). Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor. Retrieved January 4, 2021.

Internal MISP references

UUID d006ed03-a8af-4887-9356-3481d81d43e4 which can be used as unique global reference for FireEye SUNBURST Backdoor December 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-04T00:00:00Z
date_published 2020-12-13T00:00:00Z
source MITRE, Tidal Cyber
title Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor

Redirectors_Domain_Fronting

Mudge, R. (2017, February 6). High-reputation Redirectors and Domain Fronting. Retrieved July 11, 2022.

Internal MISP references

UUID 42c81d97-b6ee-458e-bff3-e8c4de882cd6 which can be used as unique global reference for Redirectors_Domain_Fronting in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-11T00:00:00Z
date_published 2017-02-06T00:00:00Z
source MITRE
title High-reputation Redirectors and Domain Fronting

Synack Secure Kernel Extension Broken

Wardle, P. (2017, September 8). High Sierra’s ‘Secure Kernel Extension Loading’ is Broken. Retrieved April 6, 2018.

Internal MISP references

UUID 647f6be8-fe95-4045-8778-f7d7ff00c96c which can be used as unique global reference for Synack Secure Kernel Extension Broken in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-06T00:00:00Z
date_published 2017-09-08T00:00:00Z
source MITRE
title High Sierra’s ‘Secure Kernel Extension Loading’ is Broken

modePUSH Azure Storage Explorer September 14 2024

Britton Manahan. (2024, September 14). Highway Blobbery: Data Theft using Azure Storage Explorer. Retrieved September 19, 2024.

Internal MISP references

UUID a4c50b03-f0d7-4d29-a9de-e550be61390c which can be used as unique global reference for modePUSH Azure Storage Explorer September 14 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-19T00:00:00Z
date_published 2024-09-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Highway Blobbery: Data Theft using Azure Storage Explorer

Unit 42 Hildegard Malware

Chen, J. et al. (2021, February 3). Hildegard: New TeamTNT Cryptojacking Malware Targeting Kubernetes. Retrieved April 5, 2021.

Internal MISP references

UUID 0941cf0e-75d8-4c96-bc42-c99d809e75f9 which can be used as unique global reference for Unit 42 Hildegard Malware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-05T00:00:00Z
date_published 2021-02-03T00:00:00Z
source MITRE
title Hildegard: New TeamTNT Cryptojacking Malware Targeting Kubernetes

Drakonia HInvoke

drakonia. (2022, August 10). HInvoke and avoiding PInvoke. Retrieved August 22, 2022.

Internal MISP references

UUID 11d936fd-aba0-4eed-8007-aca71c340c59 which can be used as unique global reference for Drakonia HInvoke in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-22T00:00:00Z
date_published 2022-08-10T00:00:00Z
source MITRE
title HInvoke and avoiding PInvoke

Hive Ransomware Analysis | Kroll

Stephen Green, Elio Biasiotto. (2023, February 2). Hive Ransomware Analysis | Kroll. Retrieved May 7, 2023.

Internal MISP references

UUID f5e43446-04ea-4dcd-be3a-22f8b10b8aa1 which can be used as unique global reference for Hive Ransomware Analysis | Kroll in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2023-02-02T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Hive Ransomware Analysis

Bitdefender Hunters International November 9 2023

Martin Zugec. (2023, November 9). Hive Ransomware's Offspring: Hunters International Takes the Stage. Retrieved October 4, 2024.

Internal MISP references

UUID ae0a88d6-bd46-4b22-bfb1-25003bfe83d7 which can be used as unique global reference for Bitdefender Hunters International November 9 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-04T00:00:00Z
date_published 2023-11-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Hive Ransomware's Offspring: Hunters International Takes the Stage

microsoft_services_registry_tree

Microsoft. (2021, August 5). HKLM\SYSTEM\CurrentControlSet\Services Registry Tree. Retrieved August 25, 2021.

Internal MISP references

UUID 171cfdf1-d91c-4df3-831e-89b6237e3c8b which can be used as unique global reference for microsoft_services_registry_tree in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-25T00:00:00Z
date_published 2021-08-05T00:00:00Z
source MITRE
title HKLM\SYSTEM\CurrentControlSet\Services Registry Tree

Microsoft CurrentControlSet Services

Microsoft. (2017, April 20). HKLM\SYSTEM\CurrentControlSet\Services Registry Tree. Retrieved March 16, 2020.

Internal MISP references

UUID cb9b5391-773f-4b56-8c41-d4f548c7b835 which can be used as unique global reference for Microsoft CurrentControlSet Services in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-16T00:00:00Z
date_published 2017-04-20T00:00:00Z
source MITRE
title HKLM\SYSTEM\CurrentControlSet\Services Registry Tree

Accenture Hogfish April 2018

Accenture Security. (2018, April 23). Hogfish Redleaves Campaign. Retrieved July 2, 2018.

Internal MISP references

UUID c8e9fee1-9981-499f-a62f-ffe59f4bb1e7 which can be used as unique global reference for Accenture Hogfish April 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-02T00:00:00Z
date_published 2018-04-23T00:00:00Z
source MITRE
title Hogfish Redleaves Campaign

Proofpoint Router Malvertising

Kafeine. (2016, December 13). Home Routers Under Attack via Malvertising on Windows, Android Devices. Retrieved January 16, 2019.

Internal MISP references

UUID b964139f-7c02-451d-8d22-a87975e60aa2 which can be used as unique global reference for Proofpoint Router Malvertising in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-01-16T00:00:00Z
date_published 2016-12-13T00:00:00Z
source MITRE
title Home Routers Under Attack via Malvertising on Windows, Android Devices

Trustwave Honeypot SkidMap 2023

Radoslaw Zdonczyk. (2023, July 30). Honeypot Recon: New Variant of SkidMap Targeting Redis. Retrieved September 29, 2023.

Internal MISP references

UUID 300505ae-bb7a-503d-84c5-9ff021eb6f3a which can be used as unique global reference for Trustwave Honeypot SkidMap 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-29T00:00:00Z
date_published 2023-07-30T00:00:00Z
source MITRE
title Honeypot Recon: New Variant of SkidMap Targeting Redis

Microsoft Hook Overview

Microsoft. (n.d.). Hooks Overview. Retrieved December 12, 2017.

Internal MISP references

UUID 54997a52-f78b-4af4-8916-787bcb215ce1 which can be used as unique global reference for Microsoft Hook Overview in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-12T00:00:00Z
source MITRE
title Hooks Overview

SpectorOps Host-Based Jul 2017

Atkinson, J. (2017, July 18). Host-based Threat Modeling & Indicator Design. Retrieved March 21, 2018.

Internal MISP references

UUID 5fbf3a1d-eac2-44b8-a0a9-70feca168647 which can be used as unique global reference for SpectorOps Host-Based Jul 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-21T00:00:00Z
date_published 2017-07-18T00:00:00Z
source MITRE
title Host-based Threat Modeling & Indicator Design

Crowdstrike AWS User Federation Persistence

Vaishnav Murthy and Joel Eng. (2023, January 30). How Adversaries Can Persist with AWS User Federation. Retrieved March 10, 2023.

Internal MISP references

UUID 8c4f806c-b6f2-5bde-8525-05da6692e59c which can be used as unique global reference for Crowdstrike AWS User Federation Persistence in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-10T00:00:00Z
date_published 2023-01-30T00:00:00Z
source MITRE
title How Adversaries Can Persist with AWS User Federation

Andy Greenberg June 2017

Andy Greenberg. (2017, June 28). How an Entire Nation Became Russia's Test Lab for Cyberwar. Retrieved September 27, 2023.

Internal MISP references

UUID 6a013c48-3b58-5b87-9af5-0b7d01f27c48 which can be used as unique global reference for Andy Greenberg June 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-27T00:00:00Z
date_published 2017-06-28T00:00:00Z
source MITRE
title How an Entire Nation Became Russia's Test Lab for Cyberwar

Perez Sitemap XML 2023

Adi Perez. (2023, February 22). How Attackers Can Misuse Sitemaps to Enumerate Users and Discover Sensitive Information. Retrieved July 18, 2024.

Internal MISP references

UUID b52dcca4-19cb-5b95-9c5e-8b5c81fd986f which can be used as unique global reference for Perez Sitemap XML 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-18T00:00:00Z
date_published 2023-02-22T00:00:00Z
source MITRE
title How Attackers Can Misuse Sitemaps to Enumerate Users and Discover Sensitive Information

Symantec Digital Certificates

Shinotsuka, H. (2013, February 22). How Attackers Steal Private Keys from Digital Certificates. Retrieved March 31, 2016.

Internal MISP references

UUID 4b4f0171-827d-45c3-8c89-66ea801e77e8 which can be used as unique global reference for Symantec Digital Certificates in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-03-31T00:00:00Z
date_published 2013-02-22T00:00:00Z
source MITRE
title How Attackers Steal Private Keys from Digital Certificates

ADSecurity Silver Tickets

Sean Metcalf. (2015, November 17). How Attackers Use Kerberos Silver Tickets to Exploit Systems. Retrieved February 27, 2020.

Internal MISP references

UUID 5185560e-b8f0-4c40-8c90-cb12348a0f7f which can be used as unique global reference for ADSecurity Silver Tickets in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-27T00:00:00Z
date_published 2015-11-17T00:00:00Z
source MITRE
title How Attackers Use Kerberos Silver Tickets to Exploit Systems

Amazon S3 Security, 2019

Amazon. (2019, May 17). How can I secure the files in my Amazon S3 bucket?. Retrieved October 4, 2019.

Internal MISP references

UUID 4c434ca5-2544-45e0-82d9-71343d8aa960 which can be used as unique global reference for Amazon S3 Security, 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-04T00:00:00Z
date_published 2019-05-17T00:00:00Z
source MITRE
title How can I secure the files in my Amazon S3 bucket?

Microsoft Connection Manager Oct 2009

Microsoft. (2009, October 8). How Connection Manager Works. Retrieved April 11, 2018.

Internal MISP references

UUID 0b0880a8-82cc-4e23-afd9-95d099c753a4 which can be used as unique global reference for Microsoft Connection Manager Oct 2009 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-11T00:00:00Z
date_published 2009-10-08T00:00:00Z
source MITRE
title How Connection Manager Works

Kaspersky-masking

Dedenok, Roman. (2023, December 12). How cybercriminals disguise URLs. Retrieved January 17, 2024.

Internal MISP references

UUID 811eb587-effd-50ad-abb4-83221cc5d567 which can be used as unique global reference for Kaspersky-masking in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-17T00:00:00Z
date_published 2023-12-12T00:00:00Z
source MITRE
title How cybercriminals disguise URLs

dns_changer_trojans

Abendan, O. (2012, June 14). How DNS Changer Trojans Direct Users to Threats. Retrieved October 28, 2021.

Internal MISP references

UUID 082a0fde-d9f9-45f2-915d-f14c77b62254 which can be used as unique global reference for dns_changer_trojans in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-28T00:00:00Z
date_published 2012-06-14T00:00:00Z
source MITRE
title How DNS Changer Trojans Direct Users to Threats

Entrust Enable CAPI2 Aug 2017

Entrust Datacard. (2017, August 16). How do I enable CAPI 2.0 logging in Windows Vista, Windows 7 and Windows 2008 Server?. Retrieved January 31, 2018.

Internal MISP references

UUID ad6dfcab-792a-4b4d-8ada-aa418e2ea1aa which can be used as unique global reference for Entrust Enable CAPI2 Aug 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-31T00:00:00Z
date_published 2017-08-16T00:00:00Z
source MITRE
title How do I enable CAPI 2.0 logging in Windows Vista, Windows 7 and Windows 2008 Server?

Apple Culprit Access

rjben. (2012, May 30). How do you find the culprit when unauthorized access to a computer is a problem?. Retrieved August 3, 2022.

Internal MISP references

UUID 9254d3f5-7fc1-4710-b885-b0ddb3a3dca9 which can be used as unique global reference for Apple Culprit Access in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-03T00:00:00Z
date_published 2012-05-30T00:00:00Z
source MITRE
title How do you find the culprit when unauthorized access to a computer is a problem?

SFX - Encrypted/Encoded File

Jai Minton. (2023, March 31). How Falcon OverWatch Investigates Malicious Self-Extracting Archives, Decoy Files and Their Hidden Payloads. Retrieved March 29, 2024.

Internal MISP references

UUID 55171e0e-6b6d-568c-941a-85adcafceb43 which can be used as unique global reference for SFX - Encrypted/Encoded File in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-29T00:00:00Z
date_published 2023-03-31T00:00:00Z
source MITRE
title How Falcon OverWatch Investigates Malicious Self-Extracting Archives, Decoy Files and Their Hidden Payloads

DOJ FIN7 Aug 2018

Department of Justice. (2018, August 01). HOW FIN7 ATTACKED AND STOLE DATA. Retrieved August 24, 2018.

Internal MISP references

UUID 6a588eff-2b79-41c3-9834-613a628a0355 which can be used as unique global reference for DOJ FIN7 Aug 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-24T00:00:00Z
date_published 2018-08-01T00:00:00Z
source MITRE
title HOW FIN7 ATTACKED AND STOLE DATA

Charles McLellan March 2016

Charles McLellan. (2016, March 4). How hackers attacked Ukraine's power grid: Implications for Industrial IoT security. Retrieved September 27, 2023.

Internal MISP references

UUID a9156c24-42ad-5f15-a18e-2382f84d702e which can be used as unique global reference for Charles McLellan March 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-27T00:00:00Z
date_published 2016-03-04T00:00:00Z
source MITRE
title How hackers attacked Ukraine's power grid: Implications for Industrial IoT security

Cyware Social Media

Cyware Hacker News. (2019, October 2). How Hackers Exploit Social Media To Break Into Your Company. Retrieved October 20, 2020.

Internal MISP references

UUID e6136a63-81fe-4363-8d98-f7d1e85a0f2b which can be used as unique global reference for Cyware Social Media in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
date_published 2019-10-02T00:00:00Z
source MITRE
title How Hackers Exploit Social Media To Break Into Your Company

SpyCloud Stealers Chrome Bypass October 2 2024

James. (2024, October 2). How Infostealers Are Bypassing New Chrome Security Feature to Steal User Session Cookies. Retrieved October 13, 2024.

Internal MISP references

UUID 9e680ab4-5d8d-46a1-a1e8-2ca2914bb93f which can be used as unique global reference for SpyCloud Stealers Chrome Bypass October 2 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-13T00:00:00Z
date_published 2024-10-02T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title How Infostealers Are Bypassing New Chrome Security Feature to Steal User Session Cookies

ICS Mutexes 2015

Lenny Zeltser. (2015, March 9). How Malware Generates Mutex Names to Evade Detection. Retrieved September 19, 2024.

Internal MISP references

UUID 31352deb-6c9d-5f1d-be73-60ccd0ccae93 which can be used as unique global reference for ICS Mutexes 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-19T00:00:00Z
date_published 2015-03-09T00:00:00Z
source MITRE
title How Malware Generates Mutex Names to Evade Detection

malware_hides_service

Lawrence Abrams. (2004, September 10). How Malware hides and is installed as a Service. Retrieved August 30, 2021.

Internal MISP references

UUID c5982f65-1782-452a-9667-a8732d31e89a which can be used as unique global reference for malware_hides_service in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-30T00:00:00Z
date_published 2004-09-10T00:00:00Z
source MITRE
title How Malware hides and is installed as a Service

S1 macOs Persistence

Stokes, P. (2019, July 17). How Malware Persists on macOS. Retrieved March 27, 2020.

Internal MISP references

UUID ce952a0d-9c0d-4a51-9564-7cc5d9e43e2c which can be used as unique global reference for S1 macOs Persistence in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-27T00:00:00Z
date_published 2019-07-17T00:00:00Z
source MITRE
title How Malware Persists on macOS

sentinelone macos persist Jun 2019

Stokes, Phil. (2019, June 17). HOW MALWARE PERSISTS ON MACOS. Retrieved September 10, 2019.

Internal MISP references

UUID 81a49043-cac5-40e0-a626-fd242d21c56d which can be used as unique global reference for sentinelone macos persist Jun 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-10T00:00:00Z
date_published 2019-06-17T00:00:00Z
source MITRE
title HOW MALWARE PERSISTS ON MACOS

Kaspersky Autofill

Golubev, S. (n.d.). How malware steals autofill data from browsers. Retrieved March 28, 2023.

Internal MISP references

UUID 561ff84d-17ce-511c-af0c-059310f3c129 which can be used as unique global reference for Kaspersky Autofill in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-28T00:00:00Z
source MITRE
title How malware steals autofill data from browsers

Microsoft Threat Actor Naming

diannegali, schmurky, Dansimp, chrisda, Stacyrch140. (2023, April 20). How Microsoft names threat actors. Retrieved June 22, 2023.

Internal MISP references

UUID de9cda86-0b23-4bc8-b524-e74fecf99448 which can be used as unique global reference for Microsoft Threat Actor Naming in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-22T00:00:00Z
date_published 2023-04-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title How Microsoft names threat actors

Microsoft Threat Actor Naming July 2023

Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.

Internal MISP references

UUID 78a8137d-694e-533d-aed3-6bd48fc0cd4a which can be used as unique global reference for Microsoft Threat Actor Naming July 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-11-17T00:00:00Z
date_published 2023-07-12T00:00:00Z
source MITRE
title How Microsoft names threat actors

TheEclecticLightCompany apple notarization

How Notarization Works. (2020, August 28). How notarization works. Retrieved September 13, 2021.

Internal MISP references

UUID 80c840ab-782a-4f15-bc7b-2d2ab4e51702 which can be used as unique global reference for TheEclecticLightCompany apple notarization in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-13T00:00:00Z
date_published 2020-08-28T00:00:00Z
source MITRE
title How notarization works

SentinelOne AppleScript

Phil Stokes. (2020, March 16). How Offensive Actors Use AppleScript For Attacking macOS. Retrieved July 17, 2020.

Internal MISP references

UUID bb6aafcb-ed30-404a-a9d9-b90503a0ec7c which can be used as unique global reference for SentinelOne AppleScript in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-07-17T00:00:00Z
date_published 2020-03-16T00:00:00Z
source MITRE
title How Offensive Actors Use AppleScript For Attacking macOS

SecureWorld - How Secure Is Your Slack Channel - Dec 2021

Drew Todd. (2021, December 28). How Secure Is Your Slack Channel?. Retrieved May 31, 2022.

Internal MISP references

UUID 78199414-7b5e-45d8-8bda-d6f5a7c3988b which can be used as unique global reference for SecureWorld - How Secure Is Your Slack Channel - Dec 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-31T00:00:00Z
date_published 2021-12-28T00:00:00Z
source MITRE
title How Secure Is Your Slack Channel?

Windows OS Hub RDP

Windows OS Hub. (2021, November 10). How to Allow Multiple RDP Sessions in Windows 10 and 11?. Retrieved March 28, 2022.

Internal MISP references

UUID 335480f8-8f40-4da7-b083-6a4b158496c1 which can be used as unique global reference for Windows OS Hub RDP in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-28T00:00:00Z
date_published 2021-11-10T00:00:00Z
source MITRE
title How to Allow Multiple RDP Sessions in Windows 10 and 11?

Xpn Argue Like Cobalt 2019

Chester, A. (2019, January 28). How to Argue like Cobalt Strike. Retrieved November 19, 2021.

Internal MISP references

UUID 724464f6-1a86-46e3-9a81-192b136c73ba which can be used as unique global reference for Xpn Argue Like Cobalt 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-11-19T00:00:00Z
date_published 2019-01-28T00:00:00Z
source MITRE
title How to Argue like Cobalt Strike

Seqrite DoubleExtension

Seqrite. (n.d.). How to avoid dual attack and vulnerable files with double extension?. Retrieved July 27, 2021.

Internal MISP references

UUID 77af0be9-174a-4330-8122-d0bd0c754973 which can be used as unique global reference for Seqrite DoubleExtension in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-07-27T00:00:00Z
source MITRE
title How to avoid dual attack and vulnerable files with double extension?

BOA Telephone Scams

Bank of America. (n.d.). How to avoid telephone scams. Retrieved September 8, 2023.

Internal MISP references

UUID ee1abe19-f38b-5127-8377-f13f57f2abcb which can be used as unique global reference for BOA Telephone Scams in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-08T00:00:00Z
source MITRE
title How to avoid telephone scams

Okta Block Anonymizing Services

Moussa Diallo and Brett Winterford. (2024, April 26). How to Block Anonymizing Services using Okta. Retrieved May 28, 2024.

Internal MISP references

UUID 5790f25c-d1a5-5fb9-b213-0d84a6570c4c which can be used as unique global reference for Okta Block Anonymizing Services in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-28T00:00:00Z
date_published 2024-04-26T00:00:00Z
source MITRE
title How to Block Anonymizing Services using Okta

bypass_webproxy_filtering

Fehrman, B. (2017, April 13). How to Bypass Web-Proxy Filtering. Retrieved September 20, 2019.

Internal MISP references

UUID fab84597-99a0-4560-8c8c-11fd8c01d5fa which can be used as unique global reference for bypass_webproxy_filtering in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-20T00:00:00Z
date_published 2017-04-13T00:00:00Z
source MITRE
title How to Bypass Web-Proxy Filtering

Systemd Remote Control

Aaron Kili. (2018, January 16). How to Control Systemd Services on Remote Linux Server. Retrieved July 26, 2021.

Internal MISP references

UUID 0461b58e-400e-4e3e-b7c4-eed7a9b0fdd6 which can be used as unique global reference for Systemd Remote Control in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-07-26T00:00:00Z
date_published 2018-01-16T00:00:00Z
source MITRE
title How to Control Systemd Services on Remote Linux Server

Microsoft Admin Shares

Microsoft. (n.d.). How to create and delete hidden or administrative shares on client computers. Retrieved November 20, 2014.

Internal MISP references

UUID 68d23cb0-b812-4d77-a3aa-34e24a923a50 which can be used as unique global reference for Microsoft Admin Shares in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-20T00:00:00Z
source MITRE
title How to create and delete hidden or administrative shares on client computers

Delpy Mimikatz Crendential Manager

Delpy, B. (2017, December 12). howto ~ credential manager saved credentials. Retrieved November 23, 2020.

Internal MISP references

UUID 24c6027b-e0d2-4c0c-83af-4536a631ea85 which can be used as unique global reference for Delpy Mimikatz Crendential Manager in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-23T00:00:00Z
date_published 2017-12-12T00:00:00Z
source MITRE
title howto ~ credential manager saved credentials

Stealthbits Overpass-the-Hash

Warren, J. (2019, February 26). How to Detect Overpass-the-Hash Attacks. Retrieved February 4, 2021.

Internal MISP references

UUID e0bf051c-21ab-4454-a6b0-31ae29b6e162 which can be used as unique global reference for Stealthbits Overpass-the-Hash in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-04T00:00:00Z
date_published 2019-02-26T00:00:00Z
source MITRE
title How to Detect Overpass-the-Hash Attacks

Stealthbits Detect PtT 2019

Jeff Warren. (2019, February 19). How to Detect Pass-the-Ticket Attacks. Retrieved February 27, 2020.

Internal MISP references

UUID 5bdb759e-949d-4470-a4e4-925b6579da54 which can be used as unique global reference for Stealthbits Detect PtT 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-27T00:00:00Z
date_published 2019-02-19T00:00:00Z
source MITRE
title How to Detect Pass-the-Ticket Attacks

WindowsIR Anti-Forensic Techniques

Carvey, H. (2013, July 23). HowTo: Determine/Detect the use of Anti-Forensics Techniques. Retrieved June 3, 2016.

Internal MISP references

UUID 646211a7-77be-4e5a-bd02-eeb70d67113d which can be used as unique global reference for WindowsIR Anti-Forensic Techniques in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-03T00:00:00Z
date_published 2013-07-23T00:00:00Z
source MITRE
title HowTo: Determine/Detect the use of Anti-Forensics Techniques

Microsoft Disable Autorun

Microsoft. (n.d.). How to disable the Autorun functionality in Windows. Retrieved April 20, 2016.

Internal MISP references

UUID 64bcc943-29be-4dd8-92c8-8a5dd94cbda4 which can be used as unique global reference for Microsoft Disable Autorun in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-20T00:00:00Z
source MITRE
title How to disable the Autorun functionality in Windows

Superuser Linux Password Policies

Matutiae, M. (2014, August 6). How to display password policy information for a user (Ubuntu)?. Retrieved April 5, 2018.

Internal MISP references

UUID c0bbc881-594a-408c-86a2-211ce6279231 which can be used as unique global reference for Superuser Linux Password Policies in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-05T00:00:00Z
date_published 2014-08-06T00:00:00Z
source MITRE
title How to display password policy information for a user (Ubuntu)?

Confluence Linux Command Line

Confluence Support. (2021, September 8). How to enable command line audit logging in linux. Retrieved September 23, 2021.

Internal MISP references

UUID 9ac72e5a-0b00-4936-9a78-bf2694d956c9 which can be used as unique global reference for Confluence Linux Command Line in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-23T00:00:00Z
date_published 2021-09-08T00:00:00Z
source MITRE
title How to enable command line audit logging in linux

Atlassian Confluence Logging

Atlassian. (2018, January 9). How to Enable User Access Logging. Retrieved April 4, 2018.

Internal MISP references

UUID cd3ca4ce-c512-4612-94cc-3cf4d4dbba56 which can be used as unique global reference for Atlassian Confluence Logging in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-04T00:00:00Z
date_published 2018-01-09T00:00:00Z
source MITRE
title How to Enable User Access Logging

Remote Shell Execution in Python

Abdou Rockikz. (2020, July). How to Execute Shell Commands in a Remote Machine in Python. Retrieved July 26, 2021.

Internal MISP references

UUID 4ea54256-42f9-4b35-8f9e-e595ab9be9ce which can be used as unique global reference for Remote Shell Execution in Python in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-07-26T00:00:00Z
date_published 2020-07-01T00:00:00Z
source MITRE
title How to Execute Shell Commands in a Remote Machine in Python

Find Wi-Fi Password on Mac

Ruslana Lishchuk. (2021, March 26). How to Find a Saved Wi-Fi Password on a Mac. Retrieved September 8, 2023.

Internal MISP references

UUID 695f3d20-7a46-5a4a-aef0-0a05a5e35304 which can be used as unique global reference for Find Wi-Fi Password on Mac in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-08T00:00:00Z
date_published 2021-03-26T00:00:00Z
source MITRE
title How to Find a Saved Wi-Fi Password on a Mac

Stack Overflow

Stack Overflow. (n.d.). How to find the location of the Scheduled Tasks folder. Retrieved June 19, 2024.

Internal MISP references

UUID cf995fb6-33ac-51ea-a9ce-c18d9cfd56f1 which can be used as unique global reference for Stack Overflow in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-19T00:00:00Z
source MITRE
title How to find the location of the Scheduled Tasks folder

Microsoft Web Root OCT 2016

Microsoft. (2016, October 20). How to: Find the Web Application Root. Retrieved July 27, 2018.

Internal MISP references

UUID bce1230a-5303-4e58-97c9-3e65ecd714d3 which can be used as unique global reference for Microsoft Web Root OCT 2016 in MISP communities and other software using the MISP galaxy

Associated metadata
Metadata key Value
date_accessed 2018-07-27T00:00:00Z
date_published 2016-10-20T00:00:00Z
source MITRE
title How to: Find the Web Application Root

Microsoft Replication ACL

Microsoft. (n.d.). How to grant the "Replicating Directory Changes" permission for the Microsoft Metadirectory Services ADMA service account. Retrieved December 4, 2017.

Internal MISP references

UUID 1b17e5ec-6f09-4668-949a-59be2d1f1b65 which can be used as unique global reference for Microsoft Replication ACL in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-04T00:00:00Z
source MITRE
title How to grant the "Replicating Directory Changes" permission for the Microsoft Metadirectory Services ADMA service account

Hide GDM User Accounts

Ji Mingkui. (2021, June 17). How to Hide All The User Accounts in Ubuntu 20.04, 21.04 Login Screen. Retrieved March 15, 2022.

Internal MISP references

UUID 88c3c460-3792-4881-ae7d-031c8901610d which can be used as unique global reference for Hide GDM User Accounts in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-15T00:00:00Z
date_published 2021-06-17T00:00:00Z
source MITRE
title How to Hide All The User Accounts in Ubuntu 20.04, 21.04 Login Screen

Elastic COM Hijacking

Ewing, P. Strom, B. (2016, September 15). How to Hunt: Detecting Persistence & Evasion with the COM. Retrieved September 15, 2016.

Internal MISP references

UUID bb325d97-5f69-4645-82d8-fdd6badecd9d which can be used as unique global reference for Elastic COM Hijacking in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-09-15T00:00:00Z
date_published 2016-09-15T00:00:00Z
source MITRE
title How to Hunt: Detecting Persistence & Evasion with the COM

Elastic Masquerade Ball

Ewing, P. (2016, October 31). How to Hunt: The Masquerade Ball. Retrieved October 31, 2016.

Internal MISP references

UUID 29c17b60-f947-4482-afa6-c80ca5819d10 which can be used as unique global reference for Elastic Masquerade Ball in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-10-31T00:00:00Z
date_published 2016-10-31T00:00:00Z
source MITRE
title How to Hunt: The Masquerade Ball

Linux Loadable Kernel Module Insert and Remove LKMs

Henderson, B. (2006, September 24). How To Insert And Remove LKMs. Retrieved April 9, 2018.

Internal MISP references

UUID 044d0df8-61e4-4a29-8a24-0bd1227d4317 which can be used as unique global reference for Linux Loadable Kernel Module Insert and Remove LKMs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-09T00:00:00Z
date_published 2006-09-24T00:00:00Z
source MITRE
title How To Insert And Remove LKMs

DigiCert Install SSL Cert

DigiCert. (n.d.). How to Install an SSL Certificate. Retrieved April 19, 2021.

Internal MISP references

UUID a1d7d368-6092-4421-99de-44e458deee21 which can be used as unique global reference for DigiCert Install SSL Cert in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-19T00:00:00Z
source MITRE
title How to Install an SSL Certificate

HowToGeek ShowExtension

Chris Hoffman. (2017, March 8). How to Make Windows Show File Extensions. Retrieved August 4, 2021.

Internal MISP references

UUID 51584201-40a4-4e39-ad23-14453e1eea46 which can be used as unique global reference for HowToGeek ShowExtension in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-04T00:00:00Z
date_published 2017-03-08T00:00:00Z
source MITRE
title How to Make Windows Show File Extensions

AWS Monitor API Calls to EC2 Security Groups

Jeff Levine. (2017, January 3). How to Monitor AWS Account Configuration Changes and API Calls to Amazon EC2 Security Groups. Retrieved September 24, 2024.

Internal MISP references

UUID c61d45fa-d6ec-5c8f-83ca-474ac43376f6 which can be used as unique global reference for AWS Monitor API Calls to EC2 Security Groups in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-24T00:00:00Z
date_published 2017-01-03T00:00:00Z
source MITRE
title How to Monitor AWS Account Configuration Changes and API Calls to Amazon EC2 Security Groups

Microsoft RDP Removal

Microsoft. (2021, September 24). How to remove entries from the Remote Desktop Connection Computer box. Retrieved June 15, 2022.

Internal MISP references

UUID 367d3f80-9b13-44fa-938a-744a95518571 which can be used as unique global reference for Microsoft RDP Removal in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-15T00:00:00Z
date_published 2021-09-24T00:00:00Z
source MITRE
title How to remove entries from the Remote Desktop Connection Computer box

Startup Items Eclectic

hoakley. (2021, September 16). How to run an app or tool at startup. Retrieved October 5, 2021.

Internal MISP references

UUID 397be6f9-a109-4185-85f7-8d994fb31eaa which can be used as unique global reference for Startup Items Eclectic in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-05T00:00:00Z
date_published 2021-09-16T00:00:00Z
source MITRE
title How to run an app or tool at startup

Podman Systemd

Valentin Rothberg. (2022, March 16). How to run pods as systemd services with Podman. Retrieved February 15, 2024.

Internal MISP references

UUID 1657c650-7739-5ba3-8c95-b35cb74ee79f which can be used as unique global reference for Podman Systemd in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-15T00:00:00Z
date_published 2022-03-16T00:00:00Z
source MITRE
title How to run pods as systemd services with Podman

CrowdStrike Endpoint Security Testing Oct 2021

Radu Vlad, Liviu Arsene. (2021, October 15). How to Test Endpoint Security Efficacy and What to Expect. Retrieved March 7, 2024.

Internal MISP references

UUID 4cecfe1f-c1d2-4a71-ac17-0effd5f045df which can be used as unique global reference for CrowdStrike Endpoint Security Testing Oct 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-07T00:00:00Z
date_published 2021-10-15T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title How to Test Endpoint Security Efficacy and What to Expect

Microsoft Disable VBA Jan 2020

Microsoft. (2020, January 23). How to turn off Visual Basic for Applications when you deploy Office. Retrieved September 17, 2020.

Internal MISP references

UUID 104db93c-c5cd-431c-ac79-d76cb1694d7c which can be used as unique global reference for Microsoft Disable VBA Jan 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-17T00:00:00Z
date_published 2020-01-23T00:00:00Z
source MITRE
title How to turn off Visual Basic for Applications when you deploy Office

Microsoft Regsvr32

Microsoft. (2015, August 14). How to use the Regsvr32 tool and troubleshoot Regsvr32 error messages. Retrieved June 22, 2016.

Internal MISP references

UUID 723ec577-5ea8-4ced-b6c3-b7aaabe1d7e8 which can be used as unique global reference for Microsoft Regsvr32 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-22T00:00:00Z
date_published 2015-08-14T00:00:00Z
source MITRE
title How to use the Regsvr32 tool and troubleshoot Regsvr32 error messages

Microsoft SAM

Microsoft. (2006, October 30). How to use the SysKey utility to secure the Windows Security Accounts Manager database. Retrieved August 3, 2016.

Internal MISP references

UUID bde9acb0-c1c3-44e1-b3b1-cfc0898baead which can be used as unique global reference for Microsoft SAM in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-08-03T00:00:00Z
date_published 2006-10-30T00:00:00Z
source MITRE
title How to use the SysKey utility to secure the Windows Security Accounts Manager database

AWS Traffic Mirroring

Amazon Web Services. (n.d.). How Traffic Mirroring works. Retrieved March 17, 2022.

Internal MISP references

UUID 6b77a2f3-39b8-4574-8dee-cde7ba9debff which can be used as unique global reference for AWS Traffic Mirroring in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-17T00:00:00Z
source MITRE
title How Traffic Mirroring works

Symantec Hydraq Persistence Jan 2010

Fitzgerald, P. (2010, January 26). How Trojan.Hydraq Stays On Your Computer. Retrieved February 22, 2018.

Internal MISP references

UUID b3ef4b78-2ed6-4cf4-afcc-4e4cb09d806a which can be used as unique global reference for Symantec Hydraq Persistence Jan 2010 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-22T00:00:00Z
date_published 2010-01-26T00:00:00Z
source MITRE
title How Trojan.Hydraq Stays On Your Computer

Microsoft UAC Nov 2018

Montemayor, D. et al.. (2018, November 15). How User Account Control works. Retrieved June 3, 2019.

Internal MISP references

UUID abda4184-18f9-4799-9c1f-3ba484473e35 which can be used as unique global reference for Microsoft UAC Nov 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-03T00:00:00Z
date_published 2018-11-15T00:00:00Z
source MITRE
title How User Account Control works

TechNet How UAC Works

Lich, B. (2016, May 31). How User Account Control Works. Retrieved June 3, 2016.

Internal MISP references

UUID bbf8d1a3-115e-4bc8-be43-47ce3b295d45 which can be used as unique global reference for TechNet How UAC Works in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-03T00:00:00Z
date_published 2016-05-31T00:00:00Z
source MITRE
title How User Account Control Works

PWC WellMess July 2020

PWC. (2020, July 16). How WellMess malware has been used to target COVID-19 vaccines. Retrieved September 24, 2020.

Internal MISP references

UUID 22794e37-3c55-444a-b659-e5a1a6bc2da0 which can be used as unique global reference for PWC WellMess July 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-24T00:00:00Z
date_published 2020-07-16T00:00:00Z
source MITRE
title How WellMess malware has been used to target COVID-19 vaccines

Google Election Threats October 2020

Huntley, S. (2020, October 16). How We're Tackling Evolving Online Threats. Retrieved March 24, 2021.

Internal MISP references

UUID 8538a963-3e67-47fe-9afd-216b93a2be00 which can be used as unique global reference for Google Election Threats October 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-24T00:00:00Z
date_published 2020-10-16T00:00:00Z
source MITRE
title How We're Tackling Evolving Online Threats

Microsoft Credential Guard April 2017

Lich, B., Tobin, J. (2017, April 5). How Windows Defender Credential Guard works. Retrieved November 27, 2017.

Internal MISP references

UUID aa52db88-5d03-42ae-b371-6210d7079a84 which can be used as unique global reference for Microsoft Credential Guard April 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-27T00:00:00Z
date_published 2017-04-05T00:00:00Z
source MITRE
title How Windows Defender Credential Guard works

NPPSPY Video

Grzegorz Tworek. (2021, December 14). How winlogon.exe shares the cleartext password with custom DLLs. Retrieved March 30, 2023.

Internal MISP references

UUID 6533d5df-7388-5c59-8c63-0923de34b61d which can be used as unique global reference for NPPSPY Video in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-30T00:00:00Z
date_published 2021-12-14T00:00:00Z
source MITRE
title How winlogon.exe shares the cleartext password with custom DLLs

BleepingComputer HPE January 24 2024

Lawrence Abrams. (2024, January 24). HPE: Russian hackers breached its security team’s email accounts. Retrieved February 5, 2024.

Internal MISP references

UUID fc77948f-332a-4e59-8c93-f430cbbbf68f which can be used as unique global reference for BleepingComputer HPE January 24 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-05T00:00:00Z
date_published 2024-01-24T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title HPE: Russian hackers breached its security team’s email accounts

Cylance Sodinokibi July 2019

Cylance. (2019, July 3). hreat Spotlight: Sodinokibi Ransomware. Retrieved August 4, 2020.

Internal MISP references

UUID 3ad8def7-3a8a-49bb-8f47-dea2e570c99e which can be used as unique global reference for Cylance Sodinokibi July 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-04T00:00:00Z
date_published 2019-07-03T00:00:00Z
source MITRE
title hreat Spotlight: Sodinokibi Ransomware

Wikipedia HTML Application

Wikipedia. (2017, October 14). HTML Application. Retrieved October 27, 2017.

Internal MISP references

UUID f1f76055-91f8-4977-9392-bed347e4f181 which can be used as unique global reference for Wikipedia HTML Application in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-10-27T00:00:00Z
date_published 2017-10-14T00:00:00Z
source MITRE
title HTML Application

MSDN HTML Applications

Microsoft. (n.d.). HTML Applications. Retrieved October 27, 2017.

Internal MISP references

UUID 2de103a8-8d72-40f9-b366-b908364dd090 which can be used as unique global reference for MSDN HTML Applications in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-10-27T00:00:00Z
source MITRE
title HTML Applications

Microsoft HTML Help ActiveX

Microsoft. (n.d.). HTML Help ActiveX Control Overview. Retrieved October 3, 2018.

Internal MISP references

UUID ae5728bd-571a-451f-9ba3-3198067135b4 which can be used as unique global reference for Microsoft HTML Help ActiveX in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-10-03T00:00:00Z
source MITRE
title HTML Help ActiveX Control Overview

Outlflank HTML Smuggling 2018

Hegt, S. (2018, August 14). HTML smuggling explained. Retrieved May 20, 2021.

Internal MISP references

UUID 9a99f431-4d15-47f8-a31b-4f98671cd95d which can be used as unique global reference for Outlflank HTML Smuggling 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-05-20T00:00:00Z
date_published 2018-08-14T00:00:00Z
source MITRE
title HTML smuggling explained

CrowdStrike Linux Rootkit

Kurtz, G. (2012, November 19). HTTP iframe Injecting Linux Rootkit. Retrieved December 21, 2017.

Internal MISP references

UUID eb3590bf-ff12-4ccd-bf9d-cf8eacd82135 which can be used as unique global reference for CrowdStrike Linux Rootkit in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-21T00:00:00Z
date_published 2012-11-19T00:00:00Z
source MITRE
title HTTP iframe Injecting Linux Rootkit

Wikipedia HPKP

Wikipedia. (2017, February 28). HTTP Public Key Pinning. Retrieved March 31, 2017.

Internal MISP references

UUID 2da110e7-d3a8-433f-87c3-eb744adf811b which can be used as unique global reference for Wikipedia HPKP in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-31T00:00:00Z
date_published 2017-02-28T00:00:00Z
source MITRE
title HTTP Public Key Pinning

Cobalt Strike Arguments 2019

Mudge, R. (2019, January 2). https://blog.cobaltstrike.com/2019/01/02/cobalt-strike-3-13-why-do-we-argue/. Retrieved November 19, 2021.

Internal MISP references

UUID e845f741-eabe-469b-97c1-f51a2aeb18b0 which can be used as unique global reference for Cobalt Strike Arguments 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-11-19T00:00:00Z
date_published 2019-01-02T00:00:00Z
source MITRE
title https://blog.cobaltstrike.com/2019/01/02/cobalt-strike-3-13-why-do-we-argue/

Talos Discord Webhook Abuse

Nick Biasini, Edmund Brumaghin, Chris Neal, and Paul Eubanks. (2021, April 7). https://blog.talosintelligence.com/collab-app-abuse/. Retrieved July 20, 2023.

Internal MISP references

UUID affa93d8-5c8b-557d-80b4-1366df13d77a which can be used as unique global reference for Talos Discord Webhook Abuse in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-20T00:00:00Z
date_published 2021-04-07T00:00:00Z
source MITRE
title https://blog.talosintelligence.com/collab-app-abuse/

Red Canary Emotet Feb 2019

Donohue, B.. (2019, February 13). https://redcanary.com/blog/stopping-emotet-before-it-moves-laterally/. Retrieved March 25, 2019.

Internal MISP references

UUID 132915dc-d906-4c23-b1e3-885af817b840 which can be used as unique global reference for Red Canary Emotet Feb 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-25T00:00:00Z
date_published 2019-02-13T00:00:00Z
source MITRE
title https://redcanary.com/blog/stopping-emotet-before-it-moves-laterally/

TechNet Removable Media Control

Microsoft. (2007, August 31). https://technet.microsoft.com/en-us/library/cc771759(v=ws.10).aspx. Retrieved April 20, 2016.

Internal MISP references

UUID db86cd0a-1188-4079-afed-1f986166a2e7 which can be used as unique global reference for TechNet Removable Media Control in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-20T00:00:00Z
date_published 2007-08-31T00:00:00Z
source MITRE
title https://technet.microsoft.com/en-us/library/cc771759(v=ws.10).aspx

Chromium HSTS

Chromium. (n.d.). HTTP Strict Transport Security. Retrieved May 24, 2023.

Internal MISP references

UUID 1ad03be3-d863-5a55-a371-42b6d3b7ed31 which can be used as unique global reference for Chromium HSTS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-24T00:00:00Z
source MITRE
title HTTP Strict Transport Security

CISA AA20-301A Kimsuky

CISA, FBI, CNMF. (2020, October 27). https://us-cert.cisa.gov/ncas/alerts/aa20-301a. Retrieved November 4, 2020.

Internal MISP references

UUID 685aa213-7902-46fb-b90a-64be5c851f73 which can be used as unique global reference for CISA AA20-301A Kimsuky in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-04T00:00:00Z
date_published 2020-10-27T00:00:00Z
source MITRE
title https://us-cert.cisa.gov/ncas/alerts/aa20-301a

FireEye Targeted Attacks Middle East Banks

Singh, S., Yin, H. (2016, May 22). https://www.fireeye.com/blog/threat-research/2016/05/targeted_attacksaga.html. Retrieved April 5, 2018.

Internal MISP references

UUID fedb3a9d-4f9e-495c-ac92-d5457688608d which can be used as unique global reference for FireEye Targeted Attacks Middle East Banks in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-05T00:00:00Z
date_published 2016-05-22T00:00:00Z
source MITRE
title https://www.fireeye.com/blog/threat-research/2016/05/targeted_attacksaga.html

Forbes Dyre May 2017

Brewster, T. (2017, May 4). https://www.forbes.com/sites/thomasbrewster/2017/05/04/dyre-hackers-stealing-millions-from-american-coporates/#601c77842a0a. Retrieved June 15, 2020.

Internal MISP references

UUID 8fb3ef2f-3652-4563-8921-2c601d1b9bc9 which can be used as unique global reference for Forbes Dyre May 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-15T00:00:00Z
date_published 2017-05-04T00:00:00Z
source MITRE
title https://www.forbes.com/sites/thomasbrewster/2017/05/04/dyre-hackers-stealing-millions-from-american-coporates/#601c77842a0a

Microsoft Subscription Hijacking 2022

Dor Edry. (2022, August 24). Hunt for compromised Azure subscriptions using Microsoft Defender for Cloud Apps. Retrieved September 5, 2023.

Internal MISP references

UUID e5944e4c-76c6-55d1-97ec-8367b7f98c28 which can be used as unique global reference for Microsoft Subscription Hijacking 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-05T00:00:00Z
date_published 2022-08-24T00:00:00Z
source MITRE
title Hunt for compromised Azure subscriptions using Microsoft Defender for Cloud Apps

Harries JustForFun 2022

Jamie Harries. (2022, May 25). Hunting a Global Telecommunications Threat: DecisiveArchitect and Its Custom Implant JustForFun. Retrieved September 23, 2024.

Internal MISP references

UUID e7b7aee0-486e-5936-9b01-446dce22f917 which can be used as unique global reference for Harries JustForFun 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-23T00:00:00Z
date_published 2022-05-25T00:00:00Z
source MITRE
title Hunting a Global Telecommunications Threat: DecisiveArchitect and Its Custom Implant JustForFun

crowdstrike bpf socket filters

Jamie Harries. (2022, May 25). Hunting a Global Telecommunications Threat: DecisiveArchitect and Its Custom Implant JustForFun. Retrieved October 18, 2022.

Internal MISP references

UUID f68a59a1-cb07-4f58-b755-25c91938b611 which can be used as unique global reference for crowdstrike bpf socket filters in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-10-18T00:00:00Z
date_published 2022-05-25T00:00:00Z
source MITRE
title Hunting a Global Telecommunications Threat: DecisiveArchitect and Its Custom Implant JustForFun

Koczwara Beacon Hunting Sep 2021

Koczwara, M. (2021, September 7). Hunting Cobalt Strike C2 with Shodan. Retrieved October 12, 2021.

Internal MISP references

UUID e3984769-f6d7-43dd-8179-7df9d441512e which can be used as unique global reference for Koczwara Beacon Hunting Sep 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-12T00:00:00Z
date_published 2021-09-07T00:00:00Z
source MITRE
title Hunting Cobalt Strike C2 with Shodan

Fireeye Hunting COM June 2019

Hamilton, C. (2019, June 4). Hunting COM Objects. Retrieved June 10, 2019.

Internal MISP references

UUID 84311e46-cea1-486a-a737-c4a4946ab837 which can be used as unique global reference for Fireeye Hunting COM June 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-10T00:00:00Z
date_published 2019-06-04T00:00:00Z
source MITRE
title Hunting COM Objects

Berba hunting linux systemd

Pepe Berba. (2022, January 30). Hunting for Persistence in Linux (Part 3): Systemd, Timers, and Cron. Retrieved March 20, 2023.

Internal MISP references

UUID 7dfd6a67-3935-506a-8661-1caa7eb508e2 which can be used as unique global reference for Berba hunting linux systemd in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-20T00:00:00Z
date_published 2022-01-30T00:00:00Z
source MITRE
title Hunting for Persistence in Linux (Part 3): Systemd, Timers, and Cron

Elastic HuntingNMemory June 2017

Desimone, J. (2017, June 13). Hunting in Memory. Retrieved December 7, 2017.

Internal MISP references

UUID 8cd58716-4ff1-4ba2-b980-32c52cf7dee8 which can be used as unique global reference for Elastic HuntingNMemory June 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-07T00:00:00Z
date_published 2017-06-13T00:00:00Z
source MITRE
title Hunting in Memory

LogPoint Hunting LockBit

LogPoint. (n.d.). Hunting LockBit Variations using Logpoint. Retrieved May 19, 2023.

Internal MISP references

UUID 22aa7792-6296-4f16-826f-d0f1c55ddb2a which can be used as unique global reference for LogPoint Hunting LockBit in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-19T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Hunting LockBit Variations using Logpoint

Joint Cybersecurity Advisory AA23-129A Snake Malware May 2023

FBI et al. (2023, May 9). Hunting Russian Intelligence “Snake” Malware. Retrieved June 8, 2023.

Internal MISP references

UUID 1931b80a-effb-59ec-acae-c0f17efb8cad which can be used as unique global reference for Joint Cybersecurity Advisory AA23-129A Snake Malware May 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-08T00:00:00Z
date_published 2023-05-09T00:00:00Z
source MITRE
title Hunting Russian Intelligence “Snake” Malware

Falcon Sandbox smp: 28553b3a9d

Hybrid Analysis. (2018, July 11). HybridAnalsysis of sample 28553b3a9d2ad4361d33d29ac4bf771d008e0073cec01b5561c6348a608f8dd7. Retrieved September 8, 2023.

Internal MISP references

UUID f27ab4cb-1666-501a-aa96-537d2b2d1f08 which can be used as unique global reference for Falcon Sandbox smp: 28553b3a9d in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-08T00:00:00Z
date_published 2018-07-11T00:00:00Z
source MITRE
title HybridAnalsysis of sample 28553b3a9d2ad4361d33d29ac4bf771d008e0073cec01b5561c6348a608f8dd7

Wikipedia Hypervisor

Wikipedia. (2016, May 23). Hypervisor. Retrieved June 11, 2016.

Internal MISP references

UUID 1a6ae877-ef30-4d40-abd0-fde308f1a1f0 which can be used as unique global reference for Wikipedia Hypervisor in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-11T00:00:00Z
date_published 2016-05-23T00:00:00Z
source MITRE
title Hypervisor

FireEye ADFS

Bierstock, D., Baker, A. (2019, March 21). I am AD FS and So Can You. Retrieved December 17, 2020.

Internal MISP references

UUID 6891eaf4-6857-4106-860c-1708d2a3bd33 which can be used as unique global reference for FireEye ADFS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-17T00:00:00Z
date_published 2019-03-21T00:00:00Z
source MITRE
title I am AD FS and So Can You

AWS IAM Conditions

AWS. (n.d.). IAM JSON policy elements: Condition. Retrieved January 2, 2024.

Internal MISP references

UUID 0fabd95b-a8cc-5a03-9a48-ffac8e5c5e28 which can be used as unique global reference for AWS IAM Conditions in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-02T00:00:00Z
source MITRE
title IAM JSON policy elements: Condition

AWS EKS IAM Roles for Service Accounts

Amazon Web Services. (n.d.). IAM roles for service accounts. Retrieved July 14, 2023.

Internal MISP references

UUID b2452f0e-93b0-55b7-add8-8338d171f0bf which can be used as unique global reference for AWS EKS IAM Roles for Service Accounts in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-14T00:00:00Z
source MITRE
title IAM roles for service accounts

Kaspersky IAmTheKing October 2020

Ivan Kwiatkowski, Pierre Delcher, Felix Aime. (2020, October 15). IAmTheKing and the SlothfulMedia malware family. Retrieved October 15, 2020.

Internal MISP references

UUID fe4050f3-1a73-4e98-9bf1-e8fb73a23b7a which can be used as unique global reference for Kaspersky IAmTheKing October 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-15T00:00:00Z
date_published 2020-10-15T00:00:00Z
source MITRE
title IAmTheKing and the SlothfulMedia malware family

Amazon IAM Groups

Amazon. (n.d.). IAM user groups. Retrieved October 13, 2021.

Internal MISP references

UUID 16f6b02a-912b-42c6-8d32-4e4f11fa70ec which can be used as unique global reference for Amazon IAM Groups in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-13T00:00:00Z
source MITRE
title IAM user groups

IAPP

IAPP. (n.d.). Retrieved March 5, 2024.

Internal MISP references

UUID a7dac249-f34a-557c-94ea-b16723f7a4f7 which can be used as unique global reference for IAPP in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-05T00:00:00Z
source MITRE
title IAPP

CrowdStrike IceApple May 2022

CrowdStrike. (2022, May). ICEAPPLE: A NOVEL INTERNET INFORMATION SERVICES (IIS) POST-EXPLOITATION FRAMEWORK. Retrieved June 27, 2022.

Internal MISP references

UUID 325988b8-1c7d-4296-83d6-bfcbe533b75e which can be used as unique global reference for CrowdStrike IceApple May 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-27T00:00:00Z
date_published 2022-05-01T00:00:00Z
source MITRE
title ICEAPPLE: A NOVEL INTERNET INFORMATION SERVICES (IIS) POST-EXPLOITATION FRAMEWORK

Trendmicro_IcedID

Kenefick , I. (2022, December 23). IcedID Botnet Distributors Abuse Google PPC to Distribute Malware. Retrieved July 24, 2024.

Internal MISP references

UUID d7584086-0a3c-5047-af06-760a295442eb which can be used as unique global reference for Trendmicro_IcedID in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-24T00:00:00Z
date_published 2022-12-23T00:00:00Z
source MITRE
title IcedID Botnet Distributors Abuse Google PPC to Distribute Malware

ICIT China's Espionage Jul 2016

Scott, J. and Spaniel, D. (2016, July 28). ICIT Brief - China’s Espionage Dynasty: Economic Death by a Thousand Cuts. Retrieved June 7, 2018.

Internal MISP references

UUID 1a824860-6978-454d-963a-a56414a4312b which can be used as unique global reference for ICIT China's Espionage Jul 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-06-07T00:00:00Z
date_published 2016-07-28T00:00:00Z
source MITRE
title ICIT Brief - China’s Espionage Dynasty: Economic Death by a Thousand Cuts

CISA ICS Advisory ICSA-10-272-01

CISA. (2010, September 10). ICS Advisory (ICSA-10-272-01). Retrieved December 7, 2020.

Internal MISP references

UUID 25b3c18c-e017-4773-91dd-b489220d4fcb which can be used as unique global reference for CISA ICS Advisory ICSA-10-272-01 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-07T00:00:00Z
date_published 2010-09-10T00:00:00Z
source MITRE
title ICS Advisory (ICSA-10-272-01)

US-CERT Ukraine Feb 2016

US-CERT. (2016, February 25). ICS Alert (IR-ALERT-H-16-056-01) Cyber-Attack Against Ukrainian Critical Infrastructure. Retrieved June 10, 2020.

Internal MISP references

UUID 403ea040-8c08-423f-99cb-d7e7852c16e4 which can be used as unique global reference for US-CERT Ukraine Feb 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-10T00:00:00Z
date_published 2016-02-25T00:00:00Z
source MITRE
title ICS Alert (IR-ALERT-H-16-056-01) Cyber-Attack Against Ukrainian Critical Infrastructure

Dragos Threat Report 2020

Dragos. (n.d.). ICS Cybersecurity Year in Review 2020. Retrieved February 25, 2021.

Internal MISP references

UUID 8bb3147c-3178-4449-9978-f1248b1bcb0a which can be used as unique global reference for Dragos Threat Report 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-25T00:00:00Z
source MITRE
title ICS Cybersecurity Year in Review 2020

id man page

MacKenzie, D. and Robbins, A. (n.d.). id(1) - Linux man page. Retrieved January 11, 2024.

Internal MISP references

UUID 158f088c-4d51-567d-bc58-be0b9a087c9a which can be used as unique global reference for id man page in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-11T00:00:00Z
source MITRE
title id(1) - Linux man page

Cisco Advisory SNMP v3 Authentication Vulnerabilities

Cisco. (2008, June 10). Identifying and Mitigating Exploitation of the SNMP Version 3 Authentication Vulnerabilities. Retrieved October 19, 2020.

Internal MISP references

UUID ed7897e5-21f0-49fa-9b26-c397eaebc88a which can be used as unique global reference for Cisco Advisory SNMP v3 Authentication Vulnerabilities in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
date_published 2008-06-10T00:00:00Z
source MITRE
title Identifying and Mitigating Exploitation of the SNMP Version 3 Authentication Vulnerabilities

Resource and Data Forks

Flylib. (n.d.). Identifying Resource and Data Forks. Retrieved October 12, 2021.

Internal MISP references

UUID b8eaf053-40e0-414e-a89e-409dbf218554 which can be used as unique global reference for Resource and Data Forks in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-12T00:00:00Z
source MITRE
title Identifying Resource and Data Forks

AWS Identity Federation

Amazon. (n.d.). Identity Federation in AWS. Retrieved March 13, 2020.

Internal MISP references

UUID b55ac071-483b-4802-895f-ea4eaac1de92 which can be used as unique global reference for AWS Identity Federation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-13T00:00:00Z
source MITRE
title Identity Federation in AWS

Microsoft GetNCCChanges

Microsoft. (n.d.). IDL_DRSGetNCChanges (Opnum 3). Retrieved December 4, 2017.

Internal MISP references

UUID 410570e4-b578-4838-a25d-f03d92fcf3cb which can be used as unique global reference for Microsoft GetNCCChanges in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-04T00:00:00Z
source MITRE
title IDL_DRSGetNCChanges (Opnum 3)

Ie4uinit.exe - LOLBAS Project

LOLBAS. (2018, May 25). Ie4uinit.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 01f9a368-5933-47a1-85a9-e5883a5ca266 which can be used as unique global reference for Ie4uinit.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Ie4uinit.exe

Ieadvpack.dll - LOLBAS Project

LOLBAS. (2018, May 25). Ieadvpack.dll. Retrieved December 4, 2023.

Internal MISP references

UUID 79943a49-23d6-499b-a022-7c2f8bd68aee which can be used as unique global reference for Ieadvpack.dll - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Ieadvpack.dll

iediagcmd.exe - LOLBAS Project

LOLBAS. (2022, March 29). iediagcmd.exe. Retrieved December 4, 2023.

Internal MISP references

UUID de238a18-2275-497e-adcf-453a016a24c4 which can be used as unique global reference for iediagcmd.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2022-03-29T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title iediagcmd.exe

Wikipedia 802.1x

Wikipedia. (2018, March 30). IEEE 802.1X. Retrieved April 11, 2018.

Internal MISP references

UUID 5d382527-ffbd-486e-adbe-d60508567281 which can be used as unique global reference for Wikipedia 802.1x in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-11T00:00:00Z
date_published 2018-03-30T00:00:00Z
source MITRE
title IEEE 802.1X

Ieexec.exe - LOLBAS Project

LOLBAS. (2018, May 25). Ieexec.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 91f31525-585d-4b71-83d7-9b7c2feacd34 which can be used as unique global reference for Ieexec.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Ieexec.exe

Ieframe.dll - LOLBAS Project

LOLBAS. (2018, May 25). Ieframe.dll. Retrieved December 4, 2023.

Internal MISP references

UUID aab9c80d-1f1e-47ba-954d-65e7400054df which can be used as unique global reference for Ieframe.dll - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Ieframe.dll

Wikipedia Ifconfig

Wikipedia. (2016, January 26). ifconfig. Retrieved April 17, 2016.

Internal MISP references

UUID 7bb238d4-4571-4cd0-aab2-76797570724a which can be used as unique global reference for Wikipedia Ifconfig in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-17T00:00:00Z
date_published 2016-01-26T00:00:00Z
source MITRE
title ifconfig

EFF Manul Aug 2016

Galperin, E., Et al.. (2016, August). I Got a Letter From the Government the Other Day.... Retrieved April 25, 2018.

Internal MISP references

UUID 311a3863-3897-4ddf-a251-d0467a56675f which can be used as unique global reference for EFF Manul Aug 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-25T00:00:00Z
date_published 2016-08-01T00:00:00Z
source MITRE
title I Got a Letter From the Government the Other Day...

IIS Backdoor 2011

Julien. (2011, February 2). IIS Backdoor. Retrieved June 3, 2021.

Internal MISP references

UUID fd450382-cca0-40c4-8144-cc90a3b0011b which can be used as unique global reference for IIS Backdoor 2011 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-03T00:00:00Z
date_published 2011-02-02T00:00:00Z
source MITRE
title IIS Backdoor

Microsoft IIS Modules Overview 2007

Microsoft. (2007, November 24). IIS Modules Overview. Retrieved June 17, 2021.

Internal MISP references

UUID c8db6bfd-3a08-43b3-b33b-91a32e9bd694 which can be used as unique global reference for Microsoft IIS Modules Overview 2007 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-17T00:00:00Z
date_published 2007-11-24T00:00:00Z
source MITRE
title IIS Modules Overview

Proofpoint TA456 Defense Contractor July 2021

Miller, J. et. al. (2021, July 28). I Knew You Were Trouble: TA456 Targets Defense Contractor with Alluring Social Media Persona. Retrieved March 11, 2024.

Internal MISP references

UUID 0cc015d9-96d0-534e-a34a-221267250f90 which can be used as unique global reference for Proofpoint TA456 Defense Contractor July 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-11T00:00:00Z
date_published 2021-07-28T00:00:00Z
source MITRE
title I Knew You Were Trouble: TA456 Targets Defense Contractor with Alluring Social Media Persona

Ilasm.exe - LOLBAS Project

LOLBAS. (2020, March 17). Ilasm.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 347a1f01-02ce-488e-9100-862971c1833f which can be used as unique global reference for Ilasm.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2020-03-17T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Ilasm.exe

anomali-rocke-tactics

Anomali Threat Research. (2019, October 15). Illicit Cryptomining Threat Actor Rocke Changes Tactics, Now More Difficult to Detect. Retrieved December 17, 2020.

Internal MISP references

UUID 2308c5ca-04a4-43c5-b92b-ffa6a60ae3a9 which can be used as unique global reference for anomali-rocke-tactics in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-17T00:00:00Z
date_published 2019-10-15T00:00:00Z
source MITRE
title Illicit Cryptomining Threat Actor Rocke Changes Tactics, Now More Difficult to Detect

Microsoft Dev Blog IFEO Mar 2010

Shanbhag, M. (2010, March 24). Image File Execution Options (IFEO). Retrieved December 18, 2017.

Internal MISP references

UUID 4c62c2cb-bee2-4fc0-aa81-65d66e71a5c2 which can be used as unique global reference for Microsoft Dev Blog IFEO Mar 2010 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-18T00:00:00Z
date_published 2010-03-24T00:00:00Z
source MITRE
title Image File Execution Options (IFEO)

IMEWDBLD.exe - LOLBAS Project

LOLBAS. (2020, March 5). IMEWDBLD.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 9d1d6bc1-61cf-4465-b3cb-b6af36769027 which can be used as unique global reference for IMEWDBLD.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2020-03-05T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title IMEWDBLD.exe

Imminent Unit42 Dec2019

Unit 42. (2019, December 2). Imminent Monitor – a RAT Down Under. Retrieved May 5, 2020.

Internal MISP references

UUID 28f858c6-4c00-4c0c-bb27-9e000ba22690 which can be used as unique global reference for Imminent Unit42 Dec2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-05T00:00:00Z
date_published 2019-12-02T00:00:00Z
source MITRE
title Imminent Monitor – a RAT Down Under

Core Security Impacket

Core Security. (n.d.). Impacket. Retrieved November 2, 2017.

Internal MISP references

UUID 9b88d7d6-5cf3-40d5-b624-ddf01508cb95 which can be used as unique global reference for Core Security Impacket in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-02T00:00:00Z
source MITRE
title Impacket

Impacket Tools

SecureAuth. (n.d.). Retrieved January 15, 2019.

Internal MISP references

UUID cdaf72ce-e8f7-42ae-b815-14a7fd47e292 which can be used as unique global reference for Impacket Tools in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-01-15T00:00:00Z
source MITRE
title Impacket Tools

EK Impeding Malware Analysis

Song, C., et al. (2012, August 7). Impeding Automated Malware Analysis with Environment-sensitive Malware. Retrieved January 18, 2019.

Internal MISP references

UUID c3e6c8da-1399-419c-96f5-7dade6fccd29 which can be used as unique global reference for EK Impeding Malware Analysis in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-01-18T00:00:00Z
date_published 2012-08-07T00:00:00Z
source MITRE
title Impeding Automated Malware Analysis with Environment-sensitive Malware

Microsoft Impersonation and EWS in Exchange

Microsoft. (2022, September 13). Impersonation and EWS in Exchange. Retrieved July 10, 2023.

Internal MISP references

UUID d7755dbd-0b38-5776-b63a-d792a4d027a4 which can be used as unique global reference for Microsoft Impersonation and EWS in Exchange in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-10T00:00:00Z
date_published 2022-09-13T00:00:00Z
source MITRE
title Impersonation and EWS in Exchange

Microsoft Implementing CPL

M. (n.d.). Implementing Control Panel Items. Retrieved January 18, 2018.

Internal MISP references

UUID 63c5c654-e885-4427-a644-068f4057f35f which can be used as unique global reference for Microsoft Implementing CPL in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-18T00:00:00Z
source MITRE
title Implementing Control Panel Items

TechNet Least Privilege

Microsoft. (2016, April 16). Implementing Least-Privilege Administrative Models. Retrieved June 3, 2016.

Internal MISP references

UUID 21e595be-d028-4013-b3d0-811c08581709 which can be used as unique global reference for TechNet Least Privilege in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-03T00:00:00Z
date_published 2016-04-16T00:00:00Z
source MITRE
title Implementing Least-Privilege Administrative Models

Dragos IT ICS Ransomware

Slowik, J.. (2019, April 10). Implications of IT Ransomware for ICS Environments. Retrieved January 28, 2021.

Internal MISP references

UUID 60187301-8d70-4023-8e6d-59cbb1468f0d which can be used as unique global reference for Dragos IT ICS Ransomware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-28T00:00:00Z
date_published 2019-04-10T00:00:00Z
source MITRE
title Implications of IT Ransomware for ICS Environments

Microsoft SolarWinds Steps

Lambert, J. (2020, December 13). Important steps for customers to protect themselves from recent nation-state cyberattacks. Retrieved December 17, 2020.

Internal MISP references

UUID 33e84eb1-4835-404b-8c1a-40695c04cdb4 which can be used as unique global reference for Microsoft SolarWinds Steps in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-17T00:00:00Z
date_published 2020-12-13T00:00:00Z
source MITRE
title Important steps for customers to protect themselves from recent nation-state cyberattacks

White House Imposing Costs RU Gov April 2021

White House. (2021, April 15). Imposing Costs for Harmful Foreign Activities by the Russian Government. Retrieved April 16, 2021.

Internal MISP references

UUID c2bf9e2f-cd0a-411d-84bc-61454a369c6b which can be used as unique global reference for White House Imposing Costs RU Gov April 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-16T00:00:00Z
date_published 2021-04-15T00:00:00Z
source MITRE
title Imposing Costs for Harmful Foreign Activities by the Russian Government

Malicious Driver Reporting Center

Azure Edge and Platform Security Team & Microsoft 365 Defender Research Team. (2021, December 8). Improve kernel security with the new Microsoft Vulnerable and Malicious Driver Reporting Center. Retrieved April 6, 2022.

Internal MISP references

UUID fde77ea9-2b4d-40d7-99c5-433bfdbcb994 which can be used as unique global reference for Malicious Driver Reporting Center in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-06T00:00:00Z
date_published 2021-12-08T00:00:00Z
source MITRE
title Improve kernel security with the new Microsoft Vulnerable and Malicious Driver Reporting Center

Unit 42 Inception November 2018

Lancaster, T. (2018, November 5). Inception Attackers Target Europe with Year-old Office Vulnerability. Retrieved May 8, 2020.

Internal MISP references

UUID 5cb98fce-f386-4878-b69c-5c6440ad689c which can be used as unique global reference for Unit 42 Inception November 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-08T00:00:00Z
date_published 2018-11-05T00:00:00Z
source MITRE, Tidal Cyber
title Inception Attackers Target Europe with Year-old Office Vulnerability

Symantec Inception Framework March 2018

Symantec. (2018, March 14). Inception Framework: Alive and Well, and Hiding Behind Proxies. Retrieved May 8, 2020.

Internal MISP references

UUID 166f5c44-7d8c-45d5-8d9f-3b8bd21a2af3 which can be used as unique global reference for Symantec Inception Framework March 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-08T00:00:00Z
date_published 2018-03-14T00:00:00Z
source MITRE, Tidal Cyber
title Inception Framework: Alive and Well, and Hiding Behind Proxies

Expel AWS Attacker

Brian Bahtiarian, David Blanton, Britton Manahan and Kyle Pellett. (2022, April 5). Incident report: From CLI to console, chasing an attacker in AWS. Retrieved April 7, 2022.

Internal MISP references

UUID 089f6f4e-370c-49cb-a35c-c80be0fd39de which can be used as unique global reference for Expel AWS Attacker in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-07T00:00:00Z
date_published 2022-04-05T00:00:00Z
source MITRE
title Incident report: From CLI to console, chasing an attacker in AWS

Dark Reading Microsoft 365 Attacks 2021

Kelly Sheridan. (2021, August 5). Incident Responders Explore Microsoft 365 Attacks in the Wild. Retrieved March 17, 2023.

Internal MISP references

UUID f26d3aa4-6966-53c4-b9d1-848420377eae which can be used as unique global reference for Dark Reading Microsoft 365 Attacks 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-17T00:00:00Z
date_published 2021-08-05T00:00:00Z
source MITRE
title Incident Responders Explore Microsoft 365 Attacks in the Wild

Nicole Hoffman. (2023, July 26). Incident Response trends Q2 2023: Data theft extortion rises, while healthcare is still most-targeted vertical. Retrieved August 4, 2023.

Internal MISP references

UUID f5367abc-e776-41a0-b8e5-6dc60079c081 which can be used as unique global reference for Cisco Talos Q2 Trends July 26 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-04T00:00:00Z
date_published 2023-07-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Incident Response trends Q2 2023: Data theft extortion rises, while healthcare is still most-targeted vertical

SentinelOne September 21 2023

SentinelOne. (2023, September 21). Inc. Ransom. Retrieved January 1, 2024.

Internal MISP references

UUID 7e793738-c132-47bf-90aa-1f0659564d16 which can be used as unique global reference for SentinelOne September 21 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-01T00:00:00Z
date_published 2023-09-21T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Inc. Ransom

Bleeping Computer INC Ransomware March 2024

Toulas, B. (2024, March 27). INC Ransom threatens to leak 3TB of NHS Scotland stolen data. Retrieved June 5, 2024.

Internal MISP references

UUID fbfd6be8-acc7-5ed4-b2b7-9248c2c27682 which can be used as unique global reference for Bleeping Computer INC Ransomware March 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-05T00:00:00Z
date_published 2024-03-27T00:00:00Z
source MITRE
title INC Ransom threatens to leak 3TB of NHS Scotland stolen data

U.S. CISA Increased Truebot Activity July 6 2023

Cybersecurity and Infrastructure Security Agency. (2023, July 6). Increased Truebot Activity Infects U.S. and Canada Based Networks. Retrieved July 6, 2023.

Internal MISP references

UUID 6f9b8f72-c55f-4268-903e-1f8a82efa5bb which can be used as unique global reference for U.S. CISA Increased Truebot Activity July 6 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-06T00:00:00Z
date_published 2023-07-06T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Increased Truebot Activity Infects U.S. and Canada Based Networks

Increasing Linux kernel integrity

Boelen, M. (2015, October 7). Increase kernel integrity with disabled Linux kernel modules loading. Retrieved June 4, 2020.

Internal MISP references

UUID 23b12551-0bec-4f7d-8468-f372a8ba521b which can be used as unique global reference for Increasing Linux kernel integrity in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-04T00:00:00Z
date_published 2015-10-07T00:00:00Z
source MITRE
title Increase kernel integrity with disabled Linux kernel modules loading

TechNet Scheduling Priority

Microsoft. (2013, May 8). Increase scheduling priority. Retrieved December 18, 2017.

Internal MISP references

UUID b785ceda-fea9-4e96-87d8-38cfd1f8b5bd which can be used as unique global reference for TechNet Scheduling Priority in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-18T00:00:00Z
date_published 2013-05-08T00:00:00Z
source MITRE
title Increase scheduling priority

Revil Independence Day

Loman, M. et al. (2021, July 4). Independence Day: REvil uses supply chain exploit to attack hundreds of businesses. Retrieved September 30, 2021.

Internal MISP references

UUID d7c4f03e-7dc0-4196-866b-c1a8eb943f77 which can be used as unique global reference for Revil Independence Day in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-30T00:00:00Z
date_published 2021-07-04T00:00:00Z
source MITRE
title Independence Day: REvil uses supply chain exploit to attack hundreds of businesses

Fortinet Agent Tesla June 2017

Zhang, X. (2017, June 28). In-Depth Analysis of A New Variant of .NET Malware AgentTesla. Retrieved November 5, 2018.

Internal MISP references

UUID 24e5c321-c418-4010-b158-0ada2dbb4f7f which can be used as unique global reference for Fortinet Agent Tesla June 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-05T00:00:00Z
date_published 2017-06-28T00:00:00Z
source MITRE
title In-Depth Analysis of A New Variant of .NET Malware AgentTesla

NCC Group Team9 June 2020

Pantazopoulos, N. (2020, June 2). In-depth analysis of the new Team9 malware family. Retrieved December 1, 2020.

Internal MISP references

UUID 0ea8f87d-e19d-438d-b05b-30f2ccd0ea3b which can be used as unique global reference for NCC Group Team9 June 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-01T00:00:00Z
date_published 2020-06-02T00:00:00Z
source MITRE
title In-depth analysis of the new Team9 malware family

Trend Micro APT Attack Tools

Wilhoit, K. (2013, March 4). In-Depth Look: APT Attack Tools of the Trade. Retrieved December 2, 2015.

Internal MISP references

UUID dac5cda3-97bc-4e38-b54f-554a75a18c5b which can be used as unique global reference for Trend Micro APT Attack Tools in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-12-02T00:00:00Z
date_published 2013-03-04T00:00:00Z
source MITRE
title In-Depth Look: APT Attack Tools of the Trade

Symantec Suckfly May 2016

DiMaggio, J. (2016, May 17). Indian organizations targeted in Suckfly attacks. Retrieved August 3, 2016.

Internal MISP references

UUID 59fd16cd-426f-472d-a5df-e7c1484a6481 which can be used as unique global reference for Symantec Suckfly May 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-08-03T00:00:00Z
date_published 2016-05-17T00:00:00Z
source MITRE
title Indian organizations targeted in Suckfly attacks

Joint CSA AvosLocker Mar 2022

FBI, FinCEN, Treasury. (2022, March 17). Indicators of Compromise Associated with AvosLocker Ransomware. Retrieved January 11, 2023.

Internal MISP references

UUID 8ad57a0d-d74f-5802-ab83-4ddac1beb083 which can be used as unique global reference for Joint CSA AvosLocker Mar 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-01-11T00:00:00Z
date_published 2022-03-17T00:00:00Z
source MITRE
title Indicators of Compromise Associated with AvosLocker Ransomware

FBI Flash Diavol January 2022

FBI. (2022, January 19). Indicators of Compromise Associated with Diavol. Retrieved March 9, 2022.

Internal MISP references

UUID a1691741-9ecd-4b20-8cc9-b9bdfc1592b5 which can be used as unique global reference for FBI Flash Diavol January 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-09T00:00:00Z
date_published 2022-01-19T00:00:00Z
source MITRE
title Indicators of Compromise Associated with Diavol

FBI Ragnar Locker 2020

FBI. (2020, November 19). Indicators of Compromise Associated with Ragnar Locker Ransomware. Retrieved September 12, 2024.

Internal MISP references

UUID 38b9b8a3-6fd3-4650-9192-14ee3f302705 which can be used as unique global reference for FBI Ragnar Locker 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2020-11-19T00:00:00Z
source MITRE
title Indicators of Compromise Associated with Ragnar Locker Ransomware

FBI FLASH APT39 September 2020

FBI. (2020, September 17). Indicators of Compromise Associated with Rana Intelligence Computing, also known as Advanced Persistent Threat 39, Chafer, Cadelspy, Remexi, and ITG07. Retrieved December 10, 2020.

Internal MISP references

UUID 76869199-e9fa-41b4-b045-41015e6daaec which can be used as unique global reference for FBI FLASH APT39 September 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-10T00:00:00Z
date_published 2020-09-17T00:00:00Z
source MITRE
title Indicators of Compromise Associated with Rana Intelligence Computing, also known as Advanced Persistent Threat 39, Chafer, Cadelspy, Remexi, and ITG07

US District Court Indictment GRU Oct 2018

Brady, S . (2018, October 3). Indictment - United States vs Aleksei Sergeyevich Morenets, et al.. Retrieved October 1, 2020.

Internal MISP references

UUID 56aeab4e-b046-4426-81a8-c3b2323492f0 which can be used as unique global reference for US District Court Indictment GRU Oct 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-01T00:00:00Z
date_published 2018-10-03T00:00:00Z
source MITRE
title Indictment - United States vs Aleksei Sergeyevich Morenets, et al.

Checkpoint IndigoZebra July 2021

CheckPoint Research. (2021, July 1). IndigoZebra APT continues to attack Central Asia with evolving tools. Retrieved September 24, 2021.

Internal MISP references

UUID cf4a8c8c-eab1-421f-b313-344aed03b42d which can be used as unique global reference for Checkpoint IndigoZebra July 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-24T00:00:00Z
date_published 2021-07-01T00:00:00Z
source MITRE, Tidal Cyber
title IndigoZebra APT continues to attack Central Asia with evolving tools

HackerNews IndigoZebra July 2021

Lakshmanan, R.. (2021, July 1). IndigoZebra APT Hacking Campaign Targets the Afghan Government. Retrieved September 24, 2021.

Internal MISP references

UUID fcf8265a-3084-4162-87d0-9e77c0a5cff0 which can be used as unique global reference for HackerNews IndigoZebra July 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-24T00:00:00Z
date_published 2021-07-01T00:00:00Z
source MITRE
title IndigoZebra APT Hacking Campaign Targets the Afghan Government

3 - appv

Raj Chandel. (2022, March 17). Indirect Command Execution: Defense Evasion (T1202). Retrieved February 6, 2024.

Internal MISP references

UUID c07f1b2b-ae56-5a1a-b607-1f3bc7e119cf which can be used as unique global reference for 3 - appv in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-06T00:00:00Z
date_published 2022-03-17T00:00:00Z
source MITRE
title Indirect Command Execution: Defense Evasion (T1202)

Check Point Meteor Aug 2021

Check Point Research Team. (2021, August 14). Indra - Hackers Behind Recent Attacks on Iran. Retrieved February 17, 2022.

Internal MISP references

UUID bb79207f-3ab4-4b86-8b1c-d587724efb7c which can be used as unique global reference for Check Point Meteor Aug 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-17T00:00:00Z
date_published 2021-08-14T00:00:00Z
source MITRE
title Indra - Hackers Behind Recent Attacks on Iran

Crowdstrike EvilCorp March 2021

Podlosky, A., Feeley, B. (2021, March 17). INDRIK SPIDER Supersedes WastedLocker with Hades Ransomware to Circumvent OFAC Sanctions. Retrieved September 15, 2021.

Internal MISP references

UUID 4b77d313-ef3c-4d2f-bfde-609fa59a8f55 which can be used as unique global reference for Crowdstrike EvilCorp March 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-15T00:00:00Z
date_published 2021-03-17T00:00:00Z
source MITRE, Tidal Cyber
title INDRIK SPIDER Supersedes WastedLocker with Hades Ransomware to Circumvent OFAC Sanctions

Industroyer2 ESET April 2022

ESET. (2022, April 12). Industroyer2: Industroyer reloaded. Retrieved March 30, 2023.

Internal MISP references

UUID 3ec01405-3240-5679-924f-f1194bca9a72 which can be used as unique global reference for Industroyer2 ESET April 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-30T00:00:00Z
date_published 2022-04-12T00:00:00Z
source MITRE
title Industroyer2: Industroyer reloaded

Industroyer2 Blackhat ESET

Anton Cherepanov, Robert Lipovsky. (2022, August). Industroyer2: Sandworm's Cyberwarfare Targets Ukraine's Power Grid. Retrieved April 6, 2023.

Internal MISP references

UUID d9e8ca96-8646-5dd9-bede-56305385b2e4 which can be used as unique global reference for Industroyer2 Blackhat ESET in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-04-06T00:00:00Z
date_published 2022-08-01T00:00:00Z
source MITRE
title Industroyer2: Sandworm's Cyberwarfare Targets Ukraine's Power Grid

Industroyer2 Mandiant April 2022

Daniel Kapellmann Zafra, Raymond Leong, Chris Sistrunk, Ken Proska, Corey Hildebrandt, Keith Lunden, Nathan Brubaker. (2022, April 25). INDUSTROYER.V2: Old Malware Learns New Tricks. Retrieved March 30, 2023.

Internal MISP references

UUID 48edeadc-f1e7-5fda-be96-1c41f78fc65a which can be used as unique global reference for Industroyer2 Mandiant April 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-30T00:00:00Z
date_published 2022-04-25T00:00:00Z
source MITRE
title INDUSTROYER.V2: Old Malware Learns New Tricks

Sixdub PowerPick Jan 2016

Warner, J.. (2015, January 6). Inexorable PowerShell – A Red Teamer’s Tale of Overcoming Simple AppLocker Policies. Retrieved December 8, 2018.

Internal MISP references

UUID 52190592-5809-4e7b-a19c-fc87b245025c which can be used as unique global reference for Sixdub PowerPick Jan 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-12-08T00:00:00Z
date_published 2015-01-06T00:00:00Z
source MITRE
title Inexorable PowerShell – A Red Teamer’s Tale of Overcoming Simple AppLocker Policies

Infdefaultinstall.exe - LOLBAS Project

LOLBAS. (2018, May 25). Infdefaultinstall.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 5e83d17c-dbdd-4a6c-a395-4f921b68ebec which can be used as unique global reference for Infdefaultinstall.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Infdefaultinstall.exe

Trend Micro Exposed Docker APIs

Oliveira, A. (2019, May 30). Infected Containers Target Docker via Exposed APIs. Retrieved April 6, 2021.

Internal MISP references

UUID 24ae5092-42ea-4c83-bdf7-c0e5026d9559 which can be used as unique global reference for Trend Micro Exposed Docker APIs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-06T00:00:00Z
date_published 2019-05-30T00:00:00Z
source MITRE
title Infected Containers Target Docker via Exposed APIs

SentinelOne MacMa Nov 2021

Stokes, P. (2021, November 15). Infect If Needed | A Deeper Dive Into Targeted Backdoor macOS.Macma. Retrieved June 30, 2022.

Internal MISP references

UUID 5033e741-834c-49d6-bc89-f64b9508f8b5 which can be used as unique global reference for SentinelOne MacMa Nov 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-30T00:00:00Z
date_published 2021-11-15T00:00:00Z
source MITRE
title Infect If Needed

SentinelOne Macma 2021

Phil Stokes. (2021, November 15). Infect If Needed | A Deeper Dive Into Targeted Backdoor macOS.Macma. Retrieved July 26, 2024.

Internal MISP references

UUID 4994f4e6-4ae4-58b8-8cf8-ab62b2c92d79 which can be used as unique global reference for SentinelOne Macma 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-26T00:00:00Z
date_published 2021-11-15T00:00:00Z
source MITRE
title Infect If Needed

SANS Information Security Reading Room Securing SNMP Securing SNMP

Michael Stump. (2003). Information Security Reading Room Securing SNMP: A Look atNet-SNMP (SNMPv3). Retrieved October 19, 2020.

Internal MISP references

UUID 616c9177-ca57-45f3-a613-d6450a94697d which can be used as unique global reference for SANS Information Security Reading Room Securing SNMP Securing SNMP in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
date_published 2003-01-01T00:00:00Z
source MITRE
title Information Security Reading Room Securing SNMP: A Look atNet-SNMP (SNMPv3)

InfoSec Handlers Diary Blog - SANS Internet Storm Center

SANS Internet Storm Center. (n.d.). InfoSec Handlers Diary Blog - SANS Internet Storm Center. Retrieved May 7, 2023.

Internal MISP references

UUID 227fd123-65ed-48da-af8b-3f7674f33e12 which can be used as unique global reference for InfoSec Handlers Diary Blog - SANS Internet Storm Center in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title InfoSec Handlers Diary Blog - SANS Internet Storm Center

Symantec Catchamas April 2018

Balanza, M. (2018, April 02). Infostealer.Catchamas. Retrieved July 10, 2018.

Internal MISP references

UUID 155cc2df-adf4-4b5f-a377-272947e5757e which can be used as unique global reference for Symantec Catchamas April 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-10T00:00:00Z
date_published 2018-04-02T00:00:00Z
source MITRE
title Infostealer.Catchamas

TrendMicro Ursnif File Dec 2014

Caragay, R. (2014, December 11). Info-Stealing File Infector Hits US, UK. Retrieved June 5, 2019.

Internal MISP references

UUID 889a21f2-e00b-44c2-aa8c-a33f5615678a which can be used as unique global reference for TrendMicro Ursnif File Dec 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-05T00:00:00Z
date_published 2014-12-11T00:00:00Z
source MITRE
title Info-Stealing File Infector Hits US, UK

ThreatConnect Infrastructure Dec 2020

ThreatConnect. (2020, December 15). Infrastructure Research and Hunting: Boiling the Domain Ocean. Retrieved October 12, 2021.

Internal MISP references

UUID 96d479df-d312-4af7-a47d-2597a66291f1 which can be used as unique global reference for ThreatConnect Infrastructure Dec 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-12T00:00:00Z
date_published 2020-12-15T00:00:00Z
source MITRE
title Infrastructure Research and Hunting: Boiling the Domain Ocean

elastic.co 6 21 2023

Colson Wilhoit. (2023, June 21). Initial research exposing JOKERSPY — Elastic Security Labs. Retrieved April 19, 2024.

Internal MISP references

UUID 42c40ec8-f46a-48fa-bd97-818e3d3d320e which can be used as unique global reference for elastic.co 6 21 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-19T00:00:00Z
date_published 2023-06-21T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Initial research exposing JOKERSPY — Elastic Security Labs

Init Man Page

Kerrisk, M. (2021, March 22). INIT_MODULE(2). Retrieved September 28, 2021.

Internal MISP references

UUID ab9c01ad-905e-4f73-b64f-1c6a5fb9a375 which can be used as unique global reference for Init Man Page in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-28T00:00:00Z
date_published 2021-03-22T00:00:00Z
source MITRE
title INIT_MODULE(2)

Proofpoint RTF Injection

Raggi, M. (2021, December 1). Injection is the New Black: Novel RTF Template Inject Technique Poised for Widespread Adoption Beyond APT Actors . Retrieved December 9, 2021.

Internal MISP references

UUID 8deb6edb-293f-4b9d-882a-541675864eb5 which can be used as unique global reference for Proofpoint RTF Injection in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-12-09T00:00:00Z
date_published 2021-12-01T00:00:00Z
source MITRE
title Injection is the New Black: Novel RTF Template Inject Technique Poised for Widespread Adoption Beyond APT Actors

HighTech Bridge Inline Hooking Sept 2011

Mariani, B. (2011, September 6). Inline Hooking in Windows. Retrieved December 12, 2017.

Internal MISP references

UUID 39ad1769-3dfb-4572-ab82-1e0c4f869ec8 which can be used as unique global reference for HighTech Bridge Inline Hooking Sept 2011 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-12T00:00:00Z
date_published 2011-09-06T00:00:00Z
source MITRE
title Inline Hooking in Windows

Stuart ELF Memory

Stuart. (2018, March 31). In-Memory-Only ELF Execution (Without tmpfs). Retrieved October 4, 2021.

Internal MISP references

UUID 402745e1-a65a-4fa1-a86d-99b37221095c which can be used as unique global reference for Stuart ELF Memory in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-04T00:00:00Z
date_published 2018-03-31T00:00:00Z
source MITRE
title In-Memory-Only ELF Execution (Without tmpfs)

ASERT InnaputRAT April 2018

ASERT Team. (2018, April 04). Innaput Actors Utilize Remote Access Trojan Since 2016, Presumably Targeting Victim Files. Retrieved July 9, 2018.

Internal MISP references

UUID 29c6575f-9e47-48cb-8162-15280002a6d5 which can be used as unique global reference for ASERT InnaputRAT April 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-09T00:00:00Z
date_published 2018-04-04T00:00:00Z
source MITRE
title Innaput Actors Utilize Remote Access Trojan Since 2016, Presumably Targeting Victim Files

Microsoft Holmium June 2020

Microsoft Threat Protection Intelligence Team. (2020, June 18). Inside Microsoft Threat Protection: Mapping attack chains from cloud to endpoint. Retrieved June 22, 2020.

Internal MISP references

UUID c249bfcf-25c4-4502-b5a4-17783d581163 which can be used as unique global reference for Microsoft Holmium June 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-22T00:00:00Z
date_published 2020-06-18T00:00:00Z
source MITRE
title Inside Microsoft Threat Protection: Mapping attack chains from cloud to endpoint

Metabase Q Mispadu Trojan 2023

Garcia, F., Regalado, D. (2023, March 7). Inside Mispadu massive infection campaign in LATAM. Retrieved March 15, 2024.

Internal MISP references

UUID 960ae534-6de5-5bcc-b600-db0c2de64305 which can be used as unique global reference for Metabase Q Mispadu Trojan 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-15T00:00:00Z
date_published 2023-03-07T00:00:00Z
source MITRE
title Inside Mispadu massive infection campaign in LATAM

RiskIQ British Airways September 2018

Klijnsma, Y. (2018, September 11). Inside the Magecart Breach of British Airways: How 22 Lines of Code Claimed 380,000 Victims. Retrieved September 9, 2020.

Internal MISP references

UUID f6c0f295-c034-4957-8cd9-e2f4b89b5671 which can be used as unique global reference for RiskIQ British Airways September 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-09T00:00:00Z
date_published 2018-09-11T00:00:00Z
source MITRE
title Inside the Magecart Breach of British Airways: How 22 Lines of Code Claimed 380,000 Victims

Arbor AnnualDoSreport Jan 2018

Philippe Alcoy, Steinthor Bjarnason, Paul Bowen, C.F. Chui, Kirill Kasavchnko, and Gary Sockrider of Netscout Arbor. (2018, January). Insight into the Global Threat Landscape - Netscout Arbor's 13th Annual Worldwide Infrastructure Security Report. Retrieved April 22, 2019.

Internal MISP references

UUID cede4c72-718b-48c2-8a59-1f91555f6cf6 which can be used as unique global reference for Arbor AnnualDoSreport Jan 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-22T00:00:00Z
date_published 2018-01-01T00:00:00Z
source MITRE
title Insight into the Global Threat Landscape - Netscout Arbor's 13th Annual Worldwide Infrastructure Security Report

FireEye APT33 Sept 2017

O'Leary, J., et al. (2017, September 20). Insights into Iranian Cyber Espionage: APT33 Targets Aerospace and Energy Sectors and has Ties to Destructive Malware. Retrieved February 15, 2018.

Internal MISP references

UUID 70610469-db0d-45ab-a790-6e56309a39ec which can be used as unique global reference for FireEye APT33 Sept 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-15T00:00:00Z
date_published 2017-09-20T00:00:00Z
source MITRE, Tidal Cyber
title Insights into Iranian Cyber Espionage: APT33 Targets Aerospace and Energy Sectors and has Ties to Destructive Malware

Microsoft Installation Procedures

Microsoft. (2021, January 7). Installation Procedure Tables Group. Retrieved December 27, 2023.

Internal MISP references

UUID 8fbe8a88-683c-5640-840c-1389b9c9972d which can be used as unique global reference for Microsoft Installation Procedures in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-27T00:00:00Z
date_published 2021-01-07T00:00:00Z
source MITRE
title Installation Procedure Tables Group

Installer Package Scripting Rich Trouton

Rich Trouton. (2019, August 9). Installer Package Scripting: Making your deployments easier, one ! at a time. Retrieved September 27, 2022.

Internal MISP references

UUID 7a877b67-ac4b-4d82-860a-75b5f0b8daae which can be used as unique global reference for Installer Package Scripting Rich Trouton in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-27T00:00:00Z
date_published 2019-08-09T00:00:00Z
source MITRE
title Installer Package Scripting: Making your deployments easier, one ! at a time

Microsoft Install Password Filter n.d

Microsoft. (n.d.). Installing and Registering a Password Filter DLL. Retrieved November 21, 2017.

Internal MISP references

UUID 6e440b5d-e09a-4d65-b874-2c5babaa609d which can be used as unique global reference for Microsoft Install Password Filter n.d in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-21T00:00:00Z
source MITRE
title Installing and Registering a Password Filter DLL

Microsoft Unsigned Driver Apr 2017

Microsoft. (2017, April 20). Installing an Unsigned Driver during Development and Test. Retrieved April 22, 2021.

Internal MISP references

UUID 5964ff2e-0860-4e00-8103-89ba6466314c which can be used as unique global reference for Microsoft Unsigned Driver Apr 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-22T00:00:00Z
date_published 2017-04-20T00:00:00Z
source MITRE
title Installing an Unsigned Driver during Development and Test

LOLBAS Installutil

LOLBAS. (n.d.). Installutil.exe. Retrieved July 31, 2019.

Internal MISP references

UUID 7dfb2c45-862a-4c25-a65a-55abea4b0e44 which can be used as unique global reference for LOLBAS Installutil in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-07-31T00:00:00Z
source MITRE
title Installutil.exe

MSDN InstallUtil

Microsoft. (n.d.). Installutil.exe (Installer Tool). Retrieved July 1, 2016.

Internal MISP references

UUID 54d962fc-4ca6-4f5f-b383-ec87d711a764 which can be used as unique global reference for MSDN InstallUtil in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-07-01T00:00:00Z
source MITRE
title Installutil.exe (Installer Tool)

AWS Instance Identity Documents

Amazon. (n.d.). Instance identity documents. Retrieved April 2, 2021.

Internal MISP references

UUID efff0080-59fc-4ba7-ac91-771358f68405 which can be used as unique global reference for AWS Instance Identity Documents in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-02T00:00:00Z
source MITRE
title Instance identity documents

AWS Instance Metadata API

AWS. (n.d.). Instance Metadata and User Data. Retrieved July 18, 2019.

Internal MISP references

UUID 54a17f92-d73d-469f-87b3-34fb633bd9ed which can be used as unique global reference for AWS Instance Metadata API in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-07-18T00:00:00Z
source MITRE
title Instance Metadata and User Data

RedLock Instance Metadata API 2018

Higashi, Michael. (2018, May 15). Instance Metadata API: A Modern Day Trojan Horse. Retrieved July 16, 2019.

Internal MISP references

UUID f85fa206-d5bf-41fc-a521-01ad6281bee7 which can be used as unique global reference for RedLock Instance Metadata API 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-07-16T00:00:00Z
date_published 2018-05-15T00:00:00Z
source MITRE
title Instance Metadata API: A Modern Day Trojan Horse

Nick Tyrer GitHub

Tyrer, N. (n.d.). Instructions. Retrieved August 10, 2020.

Internal MISP references

UUID f4f89926-71eb-4130-a644-8240d2bab721 which can be used as unique global reference for Nick Tyrer GitHub in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-10T00:00:00Z
source MITRE
title Instructions

Intel Hardware-based Security Technologies

Intel. (2013). Intel Hardware-based Security Technologies for Intelligent Retail Devices. Retrieved May 19, 2020.

Internal MISP references

UUID bffb9e71-ba97-4010-9ad7-29eb330a350c which can be used as unique global reference for Intel Hardware-based Security Technologies in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-19T00:00:00Z
date_published 2013-01-01T00:00:00Z
source MITRE
title Intel Hardware-based Security Technologies for Intelligent Retail Devices

Red Canary Intelligence Insights July 20 2023

The Red Canary Team. (2023, July 20). Intelligence Insights: July 2023. Retrieved July 28, 2023.

Internal MISP references

UUID ad1d3f99-e5bf-41c6-871b-dd2c9d540341 which can be used as unique global reference for Red Canary Intelligence Insights July 20 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-28T00:00:00Z
date_published 2023-07-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Intelligence Insights: July 2023

checkpoint_interactive_map_apt-c-23

Kayal, A. (2018, August 26). Interactive Mapping of APT-C-23. Retrieved March 4, 2024.

Internal MISP references

UUID 24dd2641-839b-5a0e-b5ca-ea121ea70992 which can be used as unique global reference for checkpoint_interactive_map_apt-c-23 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-04T00:00:00Z
date_published 2018-08-26T00:00:00Z
source MITRE
title Interactive Mapping of APT-C-23

Microsoft ISAPI Extension All Incoming 2017

Microsoft. (2017, June 16). Intercepting All Incoming IIS Requests. Retrieved June 3, 2021.

Internal MISP references

UUID 7d182eee-eaa8-4b6f-803d-8eb64e338663 which can be used as unique global reference for Microsoft ISAPI Extension All Incoming 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-03T00:00:00Z
date_published 2017-06-16T00:00:00Z
source MITRE
title Intercepting All Incoming IIS Requests

Clymb3r Function Hook Passwords Sept 2013

Bialek, J. (2013, September 15). Intercepting Password Changes With Function Hooking. Retrieved November 21, 2017.

Internal MISP references

UUID 4889912b-4512-45c7-83d3-70ae47c5a4a0 which can be used as unique global reference for Clymb3r Function Hook Passwords Sept 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-21T00:00:00Z
date_published 2013-09-15T00:00:00Z
source MITRE
title Intercepting Password Changes With Function Hooking

Microsoft ICMP

Microsoft. (n.d.). Internet Control Message Protocol (ICMP) Basics. Retrieved December 1, 2014.

Internal MISP references

UUID 47612548-dad1-4bf3-aa6f-a53aefa06f6a which can be used as unique global reference for Microsoft ICMP in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-12-01T00:00:00Z
source MITRE
title Internet Control Message Protocol (ICMP) Basics

Linux IPC

N/A. (2021, April 1). Inter Process Communication (IPC). Retrieved March 11, 2022.

Internal MISP references

UUID 05293061-ce09-49b5-916a-bb7353acfdfa which can be used as unique global reference for Linux IPC in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-11T00:00:00Z
date_published 2021-04-01T00:00:00Z
source MITRE
title Inter Process Communication (IPC)

HackerNews - 3 SaaS App Cyber Attacks - April 2022

Hananel Livneh. (2022, April 7). Into the Breach: Breaking Down 3 SaaS App Cyber Attacks in 2022. Retrieved May 31, 2022.

Internal MISP references

UUID e4ff75cd-b8fd-4fba-a2da-379a073003ab which can be used as unique global reference for HackerNews - 3 SaaS App Cyber Attacks - April 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-31T00:00:00Z
date_published 2022-04-07T00:00:00Z
source MITRE
title Into the Breach: Breaking Down 3 SaaS App Cyber Attacks in 2022

RedCanary Mockingbird May 2020

Lambert, T. (2020, May 7). Introducing Blue Mockingbird. Retrieved May 26, 2020.

Internal MISP references

UUID 596bfbb3-72e0-4d4c-a1a9-b8d54455ffd0 which can be used as unique global reference for RedCanary Mockingbird May 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-26T00:00:00Z
date_published 2020-05-07T00:00:00Z
source MITRE, Tidal Cyber
title Introducing Blue Mockingbird

Fidelis Hi-Zor

Fidelis Threat Research Team. (2016, January 27). Introducing Hi-Zor RAT. Retrieved March 24, 2016.

Internal MISP references

UUID 0c9ff201-283a-4527-8cb8-6f0d05a4f724 which can be used as unique global reference for Fidelis Hi-Zor in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-03-24T00:00:00Z
date_published 2016-01-27T00:00:00Z
source MITRE
title Introducing Hi-Zor RAT

Roadtools

Dirk-jan Mollema. (2020, April 16). Introducing ROADtools - The Azure AD exploration framework. Retrieved January 31, 2022.

Internal MISP references

UUID 803f3512-1831-4535-8b16-b89fae20f944 which can be used as unique global reference for Roadtools in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-31T00:00:00Z
date_published 2020-04-16T00:00:00Z
source MITRE
title Introducing ROADtools - The Azure AD exploration framework

Talos ROKRAT

Mercer, W., Rascagneres, P. (2017, April 03). Introducing ROKRAT. Retrieved May 21, 2018.

Internal MISP references

UUID 1bd78a2f-2bc6-426f-ac9f-16bf3fdf4cdf which can be used as unique global reference for Talos ROKRAT in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-05-21T00:00:00Z
date_published 2017-04-03T00:00:00Z
source MITRE
title Introducing ROKRAT

Microsoft Open XML July 2017

Microsoft. (2014, July 9). Introducing the Office (2007) Open XML File Formats. Retrieved July 20, 2018.

Internal MISP references

UUID 8145f894-6477-4629-81de-1dd26070ee0a which can be used as unique global reference for Microsoft Open XML July 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-20T00:00:00Z
date_published 2014-07-09T00:00:00Z
source MITRE
title Introducing the Office (2007) Open XML File Formats

Securelist WhiteBear Aug 2017

Kaspersky Lab's Global Research & Analysis Team. (2017, August 30). Introducing WhiteBear. Retrieved September 21, 2017.

Internal MISP references

UUID 44626060-3d9b-480e-b4ea-7dac27878e5e which can be used as unique global reference for Securelist WhiteBear Aug 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-09-21T00:00:00Z
date_published 2017-08-30T00:00:00Z
source MITRE
title Introducing WhiteBear

MalwareBytes ADS July 2015

Arntz, P. (2015, July 22). Introduction to Alternate Data Streams. Retrieved March 21, 2018.

Internal MISP references

UUID b552cf89-1880-48de-9088-c755c38821c1 which can be used as unique global reference for MalwareBytes ADS July 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-21T00:00:00Z
date_published 2015-07-22T00:00:00Z
source MITRE
title Introduction to Alternate Data Streams

Apple AppleScript

Apple. (2016, January 25). Introduction to AppleScript Language Guide. Retrieved March 28, 2020.

Internal MISP references

UUID b23abcb8-3004-4a42-8ada-58cdbd65e171 which can be used as unique global reference for Apple AppleScript in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-28T00:00:00Z
date_published 2016-01-25T00:00:00Z
source MITRE
title Introduction to AppleScript Language Guide

Microsoft Outlook Files

Microsoft. (n.d.). Introduction to Outlook Data Files (.pst and .ost). Retrieved February 19, 2020.

Internal MISP references

UUID 29f4cc6b-1fa5-434d-ab4f-6bb169e2287a which can be used as unique global reference for Microsoft Outlook Files in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-19T00:00:00Z
source MITRE
title Introduction to Outlook Data Files (.pst and .ost)

Microsoft Intro Print Processors

Microsoft. (2023, June 26). Introduction to print processors. Retrieved September 27, 2023.

Internal MISP references

UUID ba04b0d0-1c39-5f48-824c-110ee7affbf3 which can be used as unique global reference for Microsoft Intro Print Processors in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-27T00:00:00Z
date_published 2023-06-26T00:00:00Z
source MITRE
title Introduction to print processors

Microsoft Services

Microsoft. (2017, March 30). Introduction to Windows Service Applications. Retrieved September 28, 2021.

Internal MISP references

UUID 444c8983-47ef-45b4-a3a6-5566f4fa2732 which can be used as unique global reference for Microsoft Services in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-28T00:00:00Z
date_published 2017-03-30T00:00:00Z
source MITRE
title Introduction to Windows Service Applications

Red Canary NETWIRE January 2020

Lambert, T. (2020, January 29). Intro to Netwire. Retrieved January 7, 2021.

Internal MISP references

UUID 563249e1-edda-48fc-ac90-f198dd71619e which can be used as unique global reference for Red Canary NETWIRE January 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-07T00:00:00Z
date_published 2020-01-29T00:00:00Z
source MITRE
title Intro to Netwire

Discord Intro to Webhooks

D. (n.d.). Intro to Webhooks. Retrieved July 20, 2023.

Internal MISP references

UUID bf5b3773-29cc-539a-a0f0-a6d1d63dee2d which can be used as unique global reference for Discord Intro to Webhooks in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-20T00:00:00Z
source MITRE
title Intro to Webhooks

GitHub Inveigh

Robertson, K. (2015, April 2). Inveigh: Windows PowerShell ADIDNS/LLMNR/mDNS/NBNS spoofer/man-in-the-middle tool. Retrieved March 11, 2019.

Internal MISP references

UUID cca306e5-f9da-4782-a06f-ba3ad70e34ca which can be used as unique global reference for GitHub Inveigh in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-11T00:00:00Z
date_published 2015-04-02T00:00:00Z
source MITRE
title Inveigh: Windows PowerShell ADIDNS/LLMNR/mDNS/NBNS spoofer/man-in-the-middle tool

Google Cloud October 24 2024

Mandiant. (2024, October 24). Investigating FortiManager Zero-Day Exploitation (CVE-2024-47575) . Retrieved October 25, 2024.

Internal MISP references

UUID 71ffc061-2231-4841-bcee-c30f713f08a1 which can be used as unique global reference for Google Cloud October 24 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-25T00:00:00Z
date_published 2024-10-24T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Investigating FortiManager Zero-Day Exploitation (CVE-2024-47575)

Summit Route Malicious AMIs

Piper, S.. (2018, September 24). Investigating Malicious AMIs. Retrieved March 30, 2021.

Internal MISP references

UUID e93e16fc-4ae4-4f1f-9d80-dc48c1c30e25 which can be used as unique global reference for Summit Route Malicious AMIs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-30T00:00:00Z
date_published 2018-09-24T00:00:00Z
source MITRE
title Investigating Malicious AMIs

Huntress INC Ransom Group August 2023

Team Huntress. (2023, August 11). Investigating New INC Ransom Group Activity. Retrieved June 5, 2024.

Internal MISP references

UUID d315547d-26e3-5130-a794-658eecf1e0df which can be used as unique global reference for Huntress INC Ransom Group August 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-05T00:00:00Z
date_published 2023-08-11T00:00:00Z
source MITRE
title Investigating New INC Ransom Group Activity

Huntress INC Ransomware August 11 2023

Team Huntress. (2023, August 11). Investigating New INC Ransom Group Activity. Retrieved October 4, 2024.

Internal MISP references

UUID 37c82ff5-f565-445b-9fa5-bb172b5f425c which can be used as unique global reference for Huntress INC Ransomware August 11 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-04T00:00:00Z
date_published 2023-08-11T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Investigating New INC Ransom Group Activity

inv_ps_attacks

Hastings, M. (2014, July 16). Investigating PowerShell Attacks. Retrieved December 1, 2021.

Internal MISP references

UUID 07d9d2c6-dd79-42a5-9024-ba0e66b1913b which can be used as unique global reference for inv_ps_attacks in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-12-01T00:00:00Z
date_published 2014-07-16T00:00:00Z
source MITRE
title Investigating PowerShell Attacks

Kazanciyan 2014

Kazanciyan, R. & Hastings, M. (2014). Defcon 22 Presentation. Investigating PowerShell Attacks [slides]. Retrieved November 3, 2014.

Internal MISP references

UUID bd3f04cd-04ef-41f0-9a15-d9f0a3ed1db9 which can be used as unique global reference for Kazanciyan 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-03T00:00:00Z
source MITRE
title Investigating PowerShell Attacks [slides]

Beek Use of VHD Dec 2020

Beek, C. (2020, December 3). Investigating the Use of VHD Files By Cybercriminals. Retrieved February 22, 2021.

Internal MISP references

UUID 7a1131ab-e4b1-4569-8e28-3650312cc804 which can be used as unique global reference for Beek Use of VHD Dec 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-22T00:00:00Z
date_published 2020-12-03T00:00:00Z
source MITRE
title Investigating the Use of VHD Files By Cybercriminals

ESET InvisiMole June 2018

Hromcová, Z. (2018, June 07). InvisiMole: Surprisingly equipped spyware, undercover since 2013. Retrieved July 10, 2018.

Internal MISP references

UUID 629fa1d8-06cb-405c-a2f7-c511b54cd727 which can be used as unique global reference for ESET InvisiMole June 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-10T00:00:00Z
date_published 2018-06-07T00:00:00Z
source MITRE
title InvisiMole: Surprisingly equipped spyware, undercover since 2013

ESET InvisiMole June 2020

Hromcova, Z. and Cherpanov, A. (2020, June). INVISIMOLE: THE HIDDEN PART OF THE STORY. Retrieved July 16, 2020.

Internal MISP references

UUID d10cfda8-8fd8-4ada-8c61-dba6065b0bac which can be used as unique global reference for ESET InvisiMole June 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-07-16T00:00:00Z
date_published 2020-06-01T00:00:00Z
source MITRE
title INVISIMOLE: THE HIDDEN PART OF THE STORY

GitHub OmerYa Invisi-Shell

Yair, O. (2019, August 19). Invisi-Shell. Retrieved June 24, 2020.

Internal MISP references

UUID 26c1b8f4-ff59-409e-b616-04eee38a8a9f which can be used as unique global reference for GitHub OmerYa Invisi-Shell in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-24T00:00:00Z
date_published 2019-08-19T00:00:00Z
source MITRE
title Invisi-Shell

Invoke-DOSfuscation

Bohannon, D. (2018, March 19). Invoke-DOSfuscation. Retrieved March 17, 2023.

Internal MISP references

UUID d2f7fe4a-1a3a-5b26-8247-4f05c96974bf which can be used as unique global reference for Invoke-DOSfuscation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-17T00:00:00Z
date_published 2018-03-19T00:00:00Z
source MITRE
title Invoke-DOSfuscation

PowerSploit Invoke Kerberoast

Schroeder, W. & Hart M. (2016, October 31). Invoke-Kerberoast. Retrieved March 23, 2018.

Internal MISP references

UUID 8db88e6f-3d45-4896-87e9-75b24c8628f3 which can be used as unique global reference for PowerSploit Invoke Kerberoast in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-23T00:00:00Z
date_published 2016-10-31T00:00:00Z
source MITRE
title Invoke-Kerberoast

Empire InvokeKerberoast Oct 2016

EmpireProject. (2016, October 31). Invoke-Kerberoast.ps1. Retrieved March 22, 2018.

Internal MISP references

UUID a358bf8f-166e-4726-adfd-415e953d4ffe which can be used as unique global reference for Empire InvokeKerberoast Oct 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-22T00:00:00Z
date_published 2016-10-31T00:00:00Z
source MITRE
title Invoke-Kerberoast.ps1

Github PowerSploit Ninjacopy

Bialek, J. (2015, December 16). Invoke-NinjaCopy.ps1. Retrieved June 2, 2016.

Internal MISP references

UUID e92aed6b-348b-4dab-8292-fee0698e4a85 which can be used as unique global reference for Github PowerSploit Ninjacopy in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-02T00:00:00Z
date_published 2015-12-16T00:00:00Z
source MITRE
title Invoke-NinjaCopy.ps1

Invoke-Obfuscation

Bohannon, D. (2016, September 24). Invoke-Obfuscation. Retrieved March 17, 2023.

Internal MISP references

UUID 4cc6a80f-d758-524b-9519-5b839d4918bd which can be used as unique global reference for Invoke-Obfuscation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-17T00:00:00Z
date_published 2016-09-24T00:00:00Z
source MITRE
title Invoke-Obfuscation

GitHub Invoke-Obfuscation

Bohannon, D.. (2017, March 13). Invoke-Obfuscation - PowerShell Obfuscator. Retrieved June 18, 2017.

Internal MISP references

UUID 956b3d80-4e19-4cab-a65f-ad86f233aa12 which can be used as unique global reference for GitHub Invoke-Obfuscation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-06-18T00:00:00Z
date_published 2017-03-13T00:00:00Z
source MITRE
title Invoke-Obfuscation - PowerShell Obfuscator

GitHub Invoke-PSImage

Adams, B. (2017, December 17). Invoke-PSImage. Retrieved April 10, 2018.

Internal MISP references

UUID dd210b79-bd5f-4282-9542-4d1ae2f16438 which can be used as unique global reference for GitHub Invoke-PSImage in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-10T00:00:00Z
date_published 2017-12-17T00:00:00Z
source MITRE
title Invoke-PSImage

GitHub PSImage

Barrett Adams . (n.d.). Invoke-PSImage . Retrieved September 30, 2022.

Internal MISP references

UUID 449c873c-c5af-45b8-8bd7-505d2181a05c which can be used as unique global reference for GitHub PSImage in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-30T00:00:00Z
source MITRE
title Invoke-PSImage

GitHub - PowerSploit Invoke-Shellcode

PowerShellMafia. (2016, December 14). Invoke-Shellcode. Retrieved May 25, 2023.

Internal MISP references

UUID cf75a442-c6c0-4e83-87bf-8bb42839452b which can be used as unique global reference for GitHub - PowerSploit Invoke-Shellcode in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-25T00:00:00Z
date_published 2016-12-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Invoke-Shellcode

Wikipedia Xen

Xen. (n.d.). In Wikipedia. Retrieved November 13, 2014.

Internal MISP references

UUID 4ce05edd-da25-4559-8489-b78cdd2c0f3d which can be used as unique global reference for Wikipedia Xen in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-13T00:00:00Z
source MITRE
title In Wikipedia

ORB Mandiant

Raggi, Michael. (2024, May 22). IOC Extinction? China-Nexus Cyber Espionage Actors Use ORB Networks to Raise Cost on Defenders. Retrieved July 8, 2024.

Internal MISP references

UUID 3852fe26-53ad-504f-9328-7e249d121ebd which can be used as unique global reference for ORB Mandiant in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-08T00:00:00Z
date_published 2024-05-22T00:00:00Z
source MITRE
title IOC Extinction? China-Nexus Cyber Espionage Actors Use ORB Networks to Raise Cost on Defenders

iOS URL Scheme

Ostorlab. (n.d.). iOS URL Scheme Hijacking. Retrieved February 9, 2024.

Internal MISP references

UUID 9910b0aa-f276-54da-a4df-fd47b42efb10 which can be used as unique global reference for iOS URL Scheme in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-09T00:00:00Z
source MITRE
title iOS URL Scheme Hijacking

TechNet Ipconfig

Microsoft. (n.d.). Ipconfig. Retrieved April 17, 2016.

Internal MISP references

UUID 8a6e6f59-70fb-48bf-96d2-318dd92df995 which can be used as unique global reference for TechNet Ipconfig in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-17T00:00:00Z
source MITRE
title Ipconfig

cisco_ip_ssh_pubkey_ch_cmd

Cisco. (2021, August 23). ip ssh pubkey-chain. Retrieved July 13, 2022.

Internal MISP references

UUID c6ffe974-f304-598c-bc4d-5da607c73802 which can be used as unique global reference for cisco_ip_ssh_pubkey_ch_cmd in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-13T00:00:00Z
date_published 2021-08-23T00:00:00Z
source MITRE
title ip ssh pubkey-chain

Symantec Chafer Dec 2015

Symantec Security Response. (2015, December 7). Iran-based attackers use back door threats to spy on Middle Eastern targets. Retrieved April 17, 2019.

Internal MISP references

UUID 0a6166a3-5649-4117-97f4-7b8b5b559929 which can be used as unique global reference for Symantec Chafer Dec 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-17T00:00:00Z
date_published 2015-12-07T00:00:00Z
source MITRE
title Iran-based attackers use back door threats to spy on Middle Eastern targets

U.S. CISA Pioneer Kitten August 28 2024

Cybersecurity and Infrastructure Security Agency. (2024, August 28). Iran-based Cyber Actors Enabling Ransomware Attacks on US Organizations. Retrieved August 29, 2024.

Internal MISP references

UUID 783f4aee-84d9-43dc-accc-99fee6b1ff92 which can be used as unique global reference for U.S. CISA Pioneer Kitten August 28 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-29T00:00:00Z
date_published 2024-08-28T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Iran-based Cyber Actors Enabling Ransomware Attacks on US Organizations

CISA AA20-259A Iran-Based Actor September 2020

CISA. (2020, September 15). Iran-Based Threat Actor Exploits VPN Vulnerabilities. Retrieved December 21, 2020.

Internal MISP references

UUID 1bbc9446-9214-4fcd-bc7c-bf528370b4f8 which can be used as unique global reference for CISA AA20-259A Iran-Based Actor September 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-21T00:00:00Z
date_published 2020-09-15T00:00:00Z
source MITRE
title Iran-Based Threat Actor Exploits VPN Vulnerabilities

U.S. CISA Iran Voter Data November 3 2020

Cybersecurity and Infrastructure Security Agency. (2020, November 3). Iranian Advanced Persistent Threat Actor Identified Obtaining Voter Registration Data. Retrieved October 25, 2023.

Internal MISP references

UUID be89be75-c33f-4c58-8bf0-979c1debaad7 which can be used as unique global reference for U.S. CISA Iran Voter Data November 3 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-25T00:00:00Z
date_published 2020-11-03T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Iranian Advanced Persistent Threat Actor Identified Obtaining Voter Registration Data

ClearSky MuddyWater June 2019

ClearSky. (2019, June). Iranian APT group ‘MuddyWater’ Adds Exploits to Their Arsenal. Retrieved May 14, 2020.

Internal MISP references

UUID 9789d60b-a417-42dc-b690-24ccb77b8658 which can be used as unique global reference for ClearSky MuddyWater June 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-14T00:00:00Z
date_published 2019-06-01T00:00:00Z
source MITRE
title Iranian APT group ‘MuddyWater’ Adds Exploits to Their Arsenal

Talos MuddyWater Jan 2022

Malhortra, A and Ventura, V. (2022, January 31). Iranian APT MuddyWater targets Turkish users via malicious PDFs, executables. Retrieved June 22, 2022.

Internal MISP references

UUID a2d79c6a-16d6-4dbd-b8a5-845dcc36212d which can be used as unique global reference for Talos MuddyWater Jan 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-22T00:00:00Z
date_published 2022-01-31T00:00:00Z
source MITRE
title Iranian APT MuddyWater targets Turkish users via malicious PDFs, executables

Google TAG APT42 August 14 2024

Google Threat Analysis Group. (2024, August 14). Iranian backed group steps up phishing campaigns against Israel, U.S.. Retrieved August 30, 2024.

Internal MISP references

UUID 669836b5-4069-49af-a919-2cb32bf94d4b which can be used as unique global reference for Google TAG APT42 August 14 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-30T00:00:00Z
date_published 2024-08-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Iranian backed group steps up phishing campaigns against Israel, U.S.

BitDefender Chafer May 2020

Rusu, B. (2020, May 21). Iranian Chafer APT Targeted Air Transportation and Government in Kuwait and Saudi Arabia. Retrieved May 22, 2020.

Internal MISP references

UUID 24ea6a5d-2593-4639-8616-72988bf2fa07 which can be used as unique global reference for BitDefender Chafer May 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-22T00:00:00Z
date_published 2020-05-21T00:00:00Z
source MITRE
title Iranian Chafer APT Targeted Air Transportation and Government in Kuwait and Saudi Arabia

U.S. CISA Iranian Actors Critical Infrastructure October 16 2024

Cybersecurity and Infrastructure Security Agency. (2024, October 16). Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations. Retrieved October 17, 2024.

Internal MISP references

UUID a70a4487-eaae-43b3-bfe0-0677fd911959 which can be used as unique global reference for U.S. CISA Iranian Actors Critical Infrastructure October 16 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-17T00:00:00Z
date_published 2024-10-16T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations

RecordedFuture IranianResponse 2020

INSIKT GROUP. (2020, January 7). Iranian Cyber Response to Death of IRGC Head Would Likely Use Reported TTPs and Previous Access. Retrieved May 22, 2024.

Internal MISP references

UUID a83365fb-aae4-57ca-9d11-1ad14d27976f which can be used as unique global reference for RecordedFuture IranianResponse 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-22T00:00:00Z
date_published 2020-01-07T00:00:00Z
source MITRE
title Iranian Cyber Response to Death of IRGC Head Would Likely Use Reported TTPs and Previous Access

DHS CISA AA22-055A MuddyWater February 2022

FBI, CISA, CNMF, NCSC-UK. (2022, February 24). Iranian Government-Sponsored Actors Conduct Cyber Operations Against Global Government and Commercial Networks. Retrieved September 27, 2022.

Internal MISP references

UUID e76570e1-43ab-4819-80bc-895ede67a205 which can be used as unique global reference for DHS CISA AA22-055A MuddyWater February 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-27T00:00:00Z
date_published 2022-02-24T00:00:00Z
source MITRE
title Iranian Government-Sponsored Actors Conduct Cyber Operations Against Global Government and Commercial Networks

U.S. CISA Advisory November 25 2022

Cybersecurity and Infrastructure Security Agency. (2022, November 25). Iranian Government-Sponsored APT Actors Compromise Federal Network, Deploy Crypto Miner, Credential Harvester. Retrieved October 25, 2023.

Internal MISP references

UUID daae1f54-8471-4620-82d5-023d04144acd which can be used as unique global reference for U.S. CISA Advisory November 25 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-25T00:00:00Z
date_published 2022-11-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Iranian Government-Sponsored APT Actors Compromise Federal Network, Deploy Crypto Miner, Credential Harvester

U.S. CISA Iranian Government Actors November 19 2021

Cybersecurity and Infrastructure Security Agency. (2021, November 19). Iranian Government-Sponsored APT Cyber Actors Exploiting Microsoft Exchange and Fortinet Vulnerabilities in Furtherance of Malicious Activities. Retrieved October 25, 2023.

Internal MISP references

UUID d7014279-bc6a-43d4-953a-a6bc1d97a13b which can be used as unique global reference for U.S. CISA Iranian Government Actors November 19 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-25T00:00:00Z
date_published 2021-11-19T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Iranian Government-Sponsored APT Cyber Actors Exploiting Microsoft Exchange and Fortinet Vulnerabilities in Furtherance of Malicious Activities

NEWSCASTER2014

Lennon, M. (2014, May 29). Iranian Hackers Targeted US Officials in Elaborate Social Media Attack Operation. Retrieved March 1, 2017.

Internal MISP references

UUID 9abb4bbb-bad3-4d22-b235-c8a35465f2ce which can be used as unique global reference for NEWSCASTER2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-01T00:00:00Z
date_published 2014-05-29T00:00:00Z
source MITRE
title Iranian Hackers Targeted US Officials in Elaborate Social Media Attack Operation

CYBERCOM Iranian Intel Cyber January 2022

Cyber National Mission Force. (2022, January 12). Iranian intel cyber suite of malware uses open source tools. Retrieved September 30, 2022.

Internal MISP references

UUID 671e1559-c7dc-4cb4-a9a1-21776f2ae56a which can be used as unique global reference for CYBERCOM Iranian Intel Cyber January 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-30T00:00:00Z
date_published 2022-01-12T00:00:00Z
source MITRE
title Iranian intel cyber suite of malware uses open source tools

U.S. CISA IRGC Actors September 14 2022

Cybersecurity and Infrastructure Security Agency. (2022, September 14). Iranian Islamic Revolutionary Guard Corps-Affiliated Cyber Actors Exploiting Vulnerabilities for Data Extortion and Disk Encryption for Ransom Operations. Retrieved October 25, 2023.

Internal MISP references

UUID 728b20b0-f702-4dbe-afea-50270648a3a2 which can be used as unique global reference for U.S. CISA IRGC Actors September 14 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-25T00:00:00Z
date_published 2022-09-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Iranian Islamic Revolutionary Guard Corps-Affiliated Cyber Actors Exploiting Vulnerabilities for Data Extortion and Disk Encryption for Ransom Operations

Secureworks Cobalt Gypsy Feb 2017

Counter Threat Unit Research Team. (2017, February 15). Iranian PupyRAT Bites Middle Eastern Organizations. Retrieved December 27, 2017.

Internal MISP references

UUID f9de25b4-5539-4a33-84b5-f26a84544859 which can be used as unique global reference for Secureworks Cobalt Gypsy Feb 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-27T00:00:00Z
date_published 2017-02-15T00:00:00Z
source MITRE
title Iranian PupyRAT Bites Middle Eastern Organizations

ClearSky OilRig Jan 2017

ClearSky Cybersecurity. (2017, January 5). Iranian Threat Agent OilRig Delivers Digitally Signed Malware, Impersonates University of Oxford. Retrieved May 3, 2017.

Internal MISP references

UUID f19f9ad4-bb31-443b-9c26-87946469a0c3 which can be used as unique global reference for ClearSky OilRig Jan 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-05-03T00:00:00Z
date_published 2017-01-05T00:00:00Z
source MITRE
title Iranian Threat Agent OilRig Delivers Digitally Signed Malware, Impersonates University of Oxford

FireEye MuddyWater Mar 2018

Singh, S. et al.. (2018, March 13). Iranian Threat Group Updates Tactics, Techniques and Procedures in Spear Phishing Campaign. Retrieved April 11, 2018.

Internal MISP references

UUID 82cddfa6-9463-49bb-8bdc-0c7d6b0e1472 which can be used as unique global reference for FireEye MuddyWater Mar 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-11T00:00:00Z
date_published 2018-03-13T00:00:00Z
source MITRE
title Iranian Threat Group Updates Tactics, Techniques and Procedures in Spear Phishing Campaign

Check Point APT34 April 2021

Check Point. (2021, April 8). Iran’s APT34 Returns with an Updated Arsenal. Retrieved May 5, 2021.

Internal MISP references

UUID 593e8f9f-88ec-4bdc-90c3-1a320fa8a041 which can be used as unique global reference for Check Point APT34 April 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-05-05T00:00:00Z
date_published 2021-04-08T00:00:00Z
source MITRE
title Iran’s APT34 Returns with an Updated Arsenal

Microsoft Iran Cyber 2023

Microsoft Threat Intelligence. (2023, May 2). Iran turning to cyber-enabled influence operations for greater effect. Retrieved May 21, 2024.

Internal MISP references

UUID 08053c85-68ba-538b-b2f6-7ea0df654900 which can be used as unique global reference for Microsoft Iran Cyber 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-21T00:00:00Z
date_published 2023-05-02T00:00:00Z
source MITRE
title Iran turning to cyber-enabled influence operations for greater effect

Dark Reading APT39 JAN 2019

Higgins, K. (2019, January 30). Iran Ups its Traditional Cyber Espionage Tradecraft. Retrieved May 22, 2020.

Internal MISP references

UUID b310dfa4-f4ee-4a0c-82af-b0fdef1a1f58 which can be used as unique global reference for Dark Reading APT39 JAN 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-22T00:00:00Z
date_published 2019-01-30T00:00:00Z
source MITRE
title Iran Ups its Traditional Cyber Espionage Tradecraft

U.S. CISA IRGC-Affiliated PLC Activity December 2023

Cybersecurity and Infrastructure Security Agency. (2023, December 1). IRGC-Affiliated Cyber Actors Exploit PLCs in Multiple Sectors, Including U.S. Water and Wastewater Systems Facilities. Retrieved December 5, 2023.

Internal MISP references

UUID 51a18523-5276-4a67-8644-2bc6997d043c which can be used as unique global reference for U.S. CISA IRGC-Affiliated PLC Activity December 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-05T00:00:00Z
date_published 2023-12-01T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title IRGC-Affiliated Cyber Actors Exploit PLCs in Multiple Sectors, Including U.S. Water and Wastewater Systems Facilities

Secureworks IRON HEMLOCK Profile

Secureworks CTU. (n.d.). IRON HEMLOCK. Retrieved February 22, 2022.

Internal MISP references

UUID 36191a48-4661-42ea-b194-2915c9b184f3 which can be used as unique global reference for Secureworks IRON HEMLOCK Profile in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-22T00:00:00Z
source MITRE
title IRON HEMLOCK

Secureworks IRON HUNTER Profile

Secureworks CTU. (n.d.). IRON HUNTER. Retrieved February 22, 2022.

Internal MISP references

UUID af5cb7da-61e0-49dc-8132-c019ce5ea6d3 which can be used as unique global reference for Secureworks IRON HUNTER Profile in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-22T00:00:00Z
source MITRE
title IRON HUNTER

Secureworks IRON LIBERTY

Secureworks. (n.d.). IRON LIBERTY. Retrieved October 15, 2020.

Internal MISP references

UUID b82ba824-4543-41ec-a686-6479d5f67b4d which can be used as unique global reference for Secureworks IRON LIBERTY in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-15T00:00:00Z
source MITRE
title IRON LIBERTY

Unit 42 IronNetInjector February 2021

Reichel, D. (2021, February 19). IronNetInjector: Turla’s New Malware Loading Tool. Retrieved February 24, 2021.

Internal MISP references

UUID f04c89f7-d951-4ebc-a5e4-2cc69476c43f which can be used as unique global reference for Unit 42 IronNetInjector February 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-24T00:00:00Z
date_published 2021-02-19T00:00:00Z
source MITRE
title IronNetInjector: Turla’s New Malware Loading Tool

Secureworks IRON RITUAL Profile

Secureworks CTU. (n.d.). IRON RITUAL. Retrieved February 24, 2022.

Internal MISP references

UUID c1ff66d6-3ea3-4347-8a8b-447cd8b48dab which can be used as unique global reference for Secureworks IRON RITUAL Profile in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-24T00:00:00Z
source MITRE
title IRON RITUAL

Trend Micro Iron Tiger April 2021

Lunghi, D. and Lu, K. (2021, April 9). Iron Tiger APT Updates Toolkit With Evolved SysUpdate Malware. Retrieved November 12, 2021.

Internal MISP references

UUID d0890d4f-e7ca-4280-a54e-d147f6dd72aa which can be used as unique global reference for Trend Micro Iron Tiger April 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-11-12T00:00:00Z
date_published 2021-04-09T00:00:00Z
source MITRE
title Iron Tiger APT Updates Toolkit With Evolved SysUpdate Malware

Lunghi Iron Tiger Linux

Daniel Lunghi. (2023, March 1). Iron Tiger’s SysUpdate Reappears, Adds Linux Targeting. Retrieved March 20, 2023.

Internal MISP references

UUID 1acc2a21-4456-5fbc-9732-87550cea8b53 which can be used as unique global reference for Lunghi Iron Tiger Linux in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-20T00:00:00Z
date_published 2023-03-01T00:00:00Z
source MITRE
title Iron Tiger’s SysUpdate Reappears, Adds Linux Targeting

Secureworks IRON TILDEN Profile

Secureworks CTU. (n.d.). IRON TILDEN. Retrieved February 24, 2022.

Internal MISP references

UUID 45969d87-02c1-4074-b708-59f4c3e39426 which can be used as unique global reference for Secureworks IRON TILDEN Profile in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-24T00:00:00Z
source MITRE
title IRON TILDEN

Secureworks IRON TWILIGHT Profile

Secureworks CTU. (n.d.). IRON TWILIGHT. Retrieved February 28, 2022.

Internal MISP references

UUID 2fc5b9dc-3745-4760-b116-5cc5abb9101d which can be used as unique global reference for Secureworks IRON TWILIGHT Profile in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-28T00:00:00Z
source MITRE
title IRON TWILIGHT

Secureworks IRON TWILIGHT Active Measures March 2017

Secureworks CTU. (2017, March 30). IRON TWILIGHT Supports Active Measures. Retrieved February 28, 2022.

Internal MISP references

UUID 0d28c882-5175-4bcf-9c82-e6c4394326b6 which can be used as unique global reference for Secureworks IRON TWILIGHT Active Measures March 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-28T00:00:00Z
date_published 2017-03-30T00:00:00Z
source MITRE, Tidal Cyber
title IRON TWILIGHT Supports Active Measures

Secureworks IRON VIKING

Secureworks. (2020, May 1). IRON VIKING Threat Profile. Retrieved June 10, 2020.

Internal MISP references

UUID 900753b3-c5a2-4fb5-ab7b-d38df867077b which can be used as unique global reference for Secureworks IRON VIKING in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-10T00:00:00Z
date_published 2020-05-01T00:00:00Z
source MITRE
title IRON VIKING Threat Profile

ESET Hermetic Wizard March 2022

ESET. (2022, March 1). IsaacWiper and HermeticWizard: New wiper and worm targetingUkraine. Retrieved April 10, 2022.

Internal MISP references

UUID e0337ce9-2ca9-4877-b116-8c4d9d864df0 which can be used as unique global reference for ESET Hermetic Wizard March 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-10T00:00:00Z
date_published 2022-03-01T00:00:00Z
source MITRE
title IsaacWiper and HermeticWizard: New wiper and worm targetingUkraine

Microsoft ISAPICGIRestriction 2016

Microsoft. (2016, September 26). ISAPI/CGI Restrictions . Retrieved June 3, 2021.

Internal MISP references

UUID 7d42501b-5a6e-4916-aa58-64ce6c00501e which can be used as unique global reference for Microsoft ISAPICGIRestriction 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-03T00:00:00Z
date_published 2016-09-26T00:00:00Z
source MITRE
title ISAPI/CGI Restrictions

Microsoft ISAPI Extension Overview 2017

Microsoft. (2017, June 16). ISAPI Extension Overview. Retrieved June 3, 2021.

Internal MISP references

UUID d00a692f-b990-4757-8acd-56818462ac0c which can be used as unique global reference for Microsoft ISAPI Extension Overview 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-03T00:00:00Z
date_published 2017-06-16T00:00:00Z
source MITRE
title ISAPI Extension Overview

Microsoft ISAPI Filter Overview 2017

Microsoft. (2017, June 16). ISAPI Filter Overview. Retrieved June 3, 2021.

Internal MISP references

UUID 2fdbf1ba-0480-4d70-9981-3b5967656472 which can be used as unique global reference for Microsoft ISAPI Filter Overview 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-03T00:00:00Z
date_published 2017-06-16T00:00:00Z
source MITRE
title ISAPI Filter Overview

welivesecurity TCC

Marc-Etienne M.Léveillé. (2022, July 19). I see what you did there: A look at the CloudMensis macOS spyware. Retrieved March 21, 2024.

Internal MISP references

UUID cf42e04a-3593-51ff-bb0b-60d681dc4cd6 which can be used as unique global reference for welivesecurity TCC in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-21T00:00:00Z
date_published 2022-07-19T00:00:00Z
source MITRE
title I see what you did there: A look at the CloudMensis macOS spyware

iSight Sandworm Oct 2014

Ward, S.. (2014, October 14). iSIGHT discovers zero-day vulnerability CVE-2014-4114 used in Russian cyber-espionage campaign. Retrieved June 10, 2020.

Internal MISP references

UUID 31262b8d-27fb-4976-9d53-4fb39b5b835a which can be used as unique global reference for iSight Sandworm Oct 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-10T00:00:00Z
date_published 2014-10-14T00:00:00Z
source MITRE
title iSIGHT discovers zero-day vulnerability CVE-2014-4114 used in Russian cyber-espionage campaign

CrySyS Blog TeamSpy

CrySyS Lab. (2013, March 20). TeamSpy – Obshie manevri. Ispolzovat’ tolko s razreshenija S-a. Retrieved April 11, 2018.

Internal MISP references

UUID f21ea3e2-7983-44d2-b78f-80d84bbc4f52 which can be used as unique global reference for CrySyS Blog TeamSpy in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-11T00:00:00Z
source MITRE
title Ispolzovat’ tolko s razreshenija S-a

NYTStuxnet

William J. Broad, John Markoff, and David E. Sanger. (2011, January 15). Israeli Test on Worm Called Crucial in Iran Nuclear Delay. Retrieved March 1, 2017.

Internal MISP references

UUID 38b0cf78-88d0-487f-b2b0-81264f457dd0 which can be used as unique global reference for NYTStuxnet in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-01T00:00:00Z
date_published 2011-01-15T00:00:00Z
source MITRE
title Israeli Test on Worm Called Crucial in Iran Nuclear Delay

Microsoft Issues with BITS July 2011

Microsoft. (2011, July 19). Issues with BITS. Retrieved January 12, 2018.

Internal MISP references

UUID c67ddc5e-9e6c-40c0-9876-ee191cda7658 which can be used as unique global reference for Microsoft Issues with BITS July 2011 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-12T00:00:00Z
date_published 2011-07-19T00:00:00Z
source MITRE
title Issues with BITS

Ready.gov IT DRP

Ready.gov. (n.d.). IT Disaster Recovery Plan. Retrieved March 15, 2019.

Internal MISP references

UUID 66da7fcb-421b-4e2f-b575-222f465d5901 which can be used as unique global reference for Ready.gov IT DRP in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-15T00:00:00Z
source MITRE
title IT Disaster Recovery Plan

Security Intelligence ITG08 April 2020

Villadsen, O. (2020, April 7). ITG08 (aka FIN6) Partners With TrickBot Gang, Uses Anchor Framework. Retrieved October 8, 2020.

Internal MISP references

UUID 32569f59-14fb-4581-8a42-3bf49fb189e9 which can be used as unique global reference for Security Intelligence ITG08 April 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-08T00:00:00Z
date_published 2020-04-07T00:00:00Z
source MITRE
title ITG08 (aka FIN6) Partners With TrickBot Gang, Uses Anchor Framework

Talos Frankenstein June 2019

Adamitis, D. et al. (2019, June 4). It's alive: Threat actors cobble together open-source pieces into monstrous Frankenstein campaign. Retrieved May 11, 2020.

Internal MISP references

UUID a6faa495-db01-43e8-9db3-d446570802bc which can be used as unique global reference for Talos Frankenstein June 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-11T00:00:00Z
date_published 2019-06-04T00:00:00Z
source MITRE
title It's alive: Threat actors cobble together open-source pieces into monstrous Frankenstein campaign

AdSecurity Forging Trust Tickets

Metcalf, S. (2015, July 15). It’s All About Trust – Forging Kerberos Trust Tickets to Spoof Access across Active Directory Trusts. Retrieved February 14, 2019.

Internal MISP references

UUID 09d3ccc1-cd8a-4675-88c0-84110f5b8e8b which can be used as unique global reference for AdSecurity Forging Trust Tickets in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-14T00:00:00Z
date_published 2015-07-15T00:00:00Z
source MITRE
title It’s All About Trust – Forging Kerberos Trust Tickets to Spoof Access across Active Directory Trusts

It’s Always DarkGate Before the Dawn

Micah Babinski. (2020, October 16). It’s Always DarkGate Before the Dawn. Retrieved October 20, 2023.

Internal MISP references

UUID 0c7c6dfa-2ba9-4f74-aeca-d97dd3a3a1cc which can be used as unique global reference for It’s Always DarkGate Before the Dawn in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-20T00:00:00Z
date_published 2020-10-16T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title It’s Always DarkGate Before the Dawn

CitizenLab KeyBoy Nov 2016

Hulcoop, A., et al. (2016, November 17). It’s Parliamentary KeyBoy and the targeting of the Tibetan Community. Retrieved June 13, 2019.

Internal MISP references

UUID a9394372-3981-4f41-ad66-9db343e773b1 which can be used as unique global reference for CitizenLab KeyBoy Nov 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-13T00:00:00Z
date_published 2016-11-17T00:00:00Z
source MITRE
title It’s Parliamentary KeyBoy and the targeting of the Tibetan Community

Twitter ItsReallyNick Status Update APT32 PubPrn

Carr, N. (2017, December 22). ItsReallyNick Status Update. Retrieved September 12, 2024.

Internal MISP references

UUID 2ca502a2-664c-4b85-9d6c-1bc96dfb8332 which can be used as unique global reference for Twitter ItsReallyNick Status Update APT32 PubPrn in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2017-12-22T00:00:00Z
source MITRE
title ItsReallyNick Status Update

Volexity Ivanti Global Exploitation January 2024

Gurkok, C. et al. (2024, January 15). Ivanti Connect Secure VPN Exploitation Goes Global. Retrieved February 27, 2024.

Internal MISP references

UUID b96fa4f2-864d-5d88-9a29-b117da8f8c5c which can be used as unique global reference for Volexity Ivanti Global Exploitation January 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-27T00:00:00Z
date_published 2024-01-15T00:00:00Z
source MITRE
title Ivanti Connect Secure VPN Exploitation Goes Global

Trend Micro IXESHE 2012

Sancho, D., et al. (2012, May 22). IXESHE An APT Campaign. Retrieved June 7, 2019.

Internal MISP references

UUID fcea0121-cd45-4b05-8c3f-f8dad8c790b3 which can be used as unique global reference for Trend Micro IXESHE 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-07T00:00:00Z
date_published 2012-05-22T00:00:00Z
source MITRE
title IXESHE An APT Campaign

James TermServ DLL

James. (2019, July 14). @James_inthe_box. Retrieved September 12, 2024.

Internal MISP references

UUID 5a9e4f0f-83d6-4f18-a358-a9ad450c2734 which can be used as unique global reference for James TermServ DLL in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2019-07-14T00:00:00Z
source MITRE
title @James_inthe_box

Jamfsoftware 3 29 2024

March. (2024, March 29). Jamf Threat Labs dissects infostealer malware. Retrieved April 5, 2024.

Internal MISP references

UUID 8b8fedb6-0922-441a-8e17-6bd92055a9b0 which can be used as unique global reference for Jamfsoftware 3 29 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-05T00:00:00Z
date_published 2024-03-29T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Jamf Threat Labs dissects infostealer malware

Symantec Cicada November 2020

Symantec. (2020, November 17). Japan-Linked Organizations Targeted in Long-Running and Sophisticated Attack Campaign. Retrieved December 17, 2020.

Internal MISP references

UUID 28a7bbd8-d664-4234-9311-2befe0238b5b which can be used as unique global reference for Symantec Cicada November 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-17T00:00:00Z
date_published 2020-11-17T00:00:00Z
source MITRE
title Japan-Linked Organizations Targeted in Long-Running and Sophisticated Attack Campaign

Carbon Black JCry May 2019

Lee, S.. (2019, May 14). JCry Ransomware. Retrieved June 18, 2019.

Internal MISP references

UUID deb97163-323a-493a-9c73-b41c8c5e5cd1 which can be used as unique global reference for Carbon Black JCry May 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-18T00:00:00Z
date_published 2019-05-14T00:00:00Z
source MITRE
title JCry Ransomware

ClearSky CopyKittens March 2017

ClearSky Cyber Security. (2017, March 30). Jerusalem Post and other Israeli websites compromised by Iranian threat agent CopyKitten. Retrieved August 21, 2017.

Internal MISP references

UUID f5a42615-0e4e-4d43-937d-05d2efe636cf which can be used as unique global reference for ClearSky CopyKittens March 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-08-21T00:00:00Z
date_published 2017-03-30T00:00:00Z
source MITRE, Tidal Cyber
title Jerusalem Post and other Israeli websites compromised by Iranian threat agent CopyKitten

Joe Sandbox 23893f035f8564dfea5030b9fdd54120d96072bb

Joe Sandbox. (n.d.). Joe Sandbox 23893f035f8564dfea5030b9fdd54120d96072bb. Retrieved October 20, 2023.

Internal MISP references

UUID c2a10cde-2c20-4090-9e8d-ca60edf07a2e which can be used as unique global reference for Joe Sandbox 23893f035f8564dfea5030b9fdd54120d96072bb in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Joe Sandbox 23893f035f8564dfea5030b9fdd54120d96072bb

Joe Slowik August 2019

Joe Slowik. (2019, August 15) CRASHOVERRIDE: Reassessing the 2016 Ukraine Electric Power Event as a Protection-Focused Attack. Retrieved October 22, 2019

Internal MISP references

UUID 7297ee41-b26e-5762-8b0f-7dcdf780f86a which can be used as unique global reference for Joe Slowik August 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-22T00:00:00Z
source MITRE
title Joe Slowik August 2019

US District Court of DC Phosphorus Complaint 2019

US District Court of DC. (2019, March 14). MICROSOFT CORPORATION v. JOHN DOES 1-2, CONTROLLING A COMPUTER NETWORK AND THEREBY INJURING PLAINTIFF AND ITS CUSTOMERS. Retrieved March 8, 2021.

Internal MISP references

UUID 8f73a709-fb7e-4d9e-9743-4ba39ea26ea8 which can be used as unique global reference for US District Court of DC Phosphorus Complaint 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-08T00:00:00Z
source MITRE
title JOHN DOES 1-2, CONTROLLING A COMPUTER NETWORK AND THEREBY INJURING PLAINTIFF AND ITS CUSTOMERS

NCSC Joint Report Public Tools

The Australian Cyber Security Centre (ACSC), the Canadian Centre for Cyber Security (CCCS), the New Zealand National Cyber Security Centre (NZ NCSC), CERT New Zealand, the UK National Cyber Security Centre (UK NCSC) and the US National Cybersecurity and Communications Integration Center (NCCIC). (2018, October 11). Joint report on publicly available hacking tools. Retrieved March 11, 2019.

Internal MISP references

UUID 601d88c5-4789-4fa8-a9ab-abc8137f061c which can be used as unique global reference for NCSC Joint Report Public Tools in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-11T00:00:00Z
date_published 2018-10-11T00:00:00Z
source MITRE
title Joint report on publicly available hacking tools

USG Joint Statement SolarWinds January 2021

FBI, CISA, ODNI, NSA. (2022, January 5). Joint Statement by the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the Office of the Director of National Intelligence (ODNI), and the National Security Agency (NSA). Retrieved March 26, 2023.

Internal MISP references

UUID 336a6549-a95d-5763-bbaf-5ef0d3141800 which can be used as unique global reference for USG Joint Statement SolarWinds January 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-26T00:00:00Z
date_published 2022-01-05T00:00:00Z
source MITRE
title Joint Statement by the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the Office of the Director of National Intelligence (ODNI), and the National Security Agency (NSA)

Jsc.exe - LOLBAS Project

LOLBAS. (2019, May 31). Jsc.exe. Retrieved December 4, 2023.

Internal MISP references

UUID ae25ff74-05eb-46d7-9c60-4c149b7c7f1f which can be used as unique global reference for Jsc.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2019-05-31T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Jsc.exe

Juniper Netscreen of the Dead

Graeme Neilson . (2009, August). Juniper Netscreen of the Dead. Retrieved October 20, 2020.

Internal MISP references

UUID 3b87bd85-c6dd-4bd9-9427-33b5bd84db4a which can be used as unique global reference for Juniper Netscreen of the Dead in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
date_published 2009-08-01T00:00:00Z
source MITRE
title Juniper Netscreen of the Dead

Microsoft PS JEA

Microsoft. (2022, November 17). Just Enough Administration. Retrieved March 27, 2023.

Internal MISP references

UUID 09c99ca2-5f10-5f78-9ba3-5e0e79ce8d96 which can be used as unique global reference for Microsoft PS JEA in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-27T00:00:00Z
date_published 2022-11-17T00:00:00Z
source MITRE
title Just Enough Administration

U.S. Justice Department GRU Botnet February 2024

Office of Public Affairs. (2024, February 15). Justice Department Conducts Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate of the General Staff (GRU). Retrieved February 29, 2024.

Internal MISP references

UUID 26a554dc-39c0-4638-902d-7e84fe01b961 which can be used as unique global reference for U.S. Justice Department GRU Botnet February 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-29T00:00:00Z
date_published 2024-02-15T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Justice Department Conducts Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate of the General Staff (GRU)

Justice GRU 2024

Office of Public Affairs. (2024, February 15). Justice Department Conducts Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate of the General Staff (GRU). Retrieved March 28, 2024.

Internal MISP references

UUID 957488f8-c2a8-54b0-a3cb-7b510640a2c4 which can be used as unique global reference for Justice GRU 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-28T00:00:00Z
date_published 2024-02-15T00:00:00Z
source MITRE
title Justice Department Conducts Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate of the General Staff (GRU)

Azure AD Recon

Dr. Nestori Syynimaa. (2020, June 13). Just looking: Azure Active Directory reconnaissance as an outsider. Retrieved February 1, 2022.

Internal MISP references

UUID 16565eaf-44fb-44f4-b490-40dc1160ff2b which can be used as unique global reference for Azure AD Recon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-01T00:00:00Z
date_published 2020-06-13T00:00:00Z
source MITRE
title Just looking: Azure Active Directory reconnaissance as an outsider

Azure Active Directory Reconnaisance

Dr. Nestori Syynimaa. (2020, June 13). Just looking: Azure Active Directory reconnaissance as an outsider. Retrieved May 27, 2022.

Internal MISP references

UUID 42dad2a3-5b33-4be4-a19b-58a27fb3ee5d which can be used as unique global reference for Azure Active Directory Reconnaisance in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-27T00:00:00Z
date_published 2020-06-13T00:00:00Z
source MITRE
title Just looking: Azure Active Directory reconnaissance as an outsider

intezer-kaiji-malware

Paul Litvak. (2020, May 4). Kaiji: New Chinese Linux malware turning to Golang. Retrieved December 17, 2020.

Internal MISP references

UUID ef1fbb40-da6f-41d0-a44a-9ff444e2ad89 which can be used as unique global reference for intezer-kaiji-malware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-17T00:00:00Z
date_published 2020-05-04T00:00:00Z
source MITRE
title Kaiji: New Chinese Linux malware turning to Golang

Kali Redsnarf

NCC Group PLC. (2016, November 1). Kali Redsnarf. Retrieved December 11, 2017.

Internal MISP references

UUID 459fcde2-7ac3-4640-a5bc-cd8750e54962 which can be used as unique global reference for Kali Redsnarf in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-11T00:00:00Z
date_published 2016-11-01T00:00:00Z
source MITRE
title Kali Redsnarf

TrustedSignal Service Failure

Hull, D. (2014, May 3). Kansa: Service related collectors and analysis. Retrieved October 10, 2019.

Internal MISP references

UUID 58d5bc0b-8548-4c3a-8302-e07df3b961ff which can be used as unique global reference for TrustedSignal Service Failure in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-10T00:00:00Z
date_published 2014-05-03T00:00:00Z
source MITRE
title Kansa: Service related collectors and analysis

Hull, D.. (2014, May 3). Kansa: Service related collectors and analysis. Retrieved October 10, 2019.

Internal MISP references

UUID d854f84a-4d70-4ef4-9197-d8f5396feabb which can be used as unique global reference for Kansa Service related collectors in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-10T00:00:00Z
date_published 2014-05-03T00:00:00Z
source MITRE
title Kansa: Service related collectors and analysis

CISA Karakurt 2022

Cybersecurity Infrastructure and Defense Agency. (2022, June 2). Karakurt Data Extortion Group. Retrieved March 10, 2023.

Internal MISP references

UUID 5a9a79fa-532b-582b-9741-cb732803cd22 which can be used as unique global reference for CISA Karakurt 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-10T00:00:00Z
date_published 2022-06-02T00:00:00Z
source MITRE
title Karakurt Data Extortion Group

U.S. CISA Karakurt December 12 2023

Cybersecurity and Infrastructure Security Agency. (2023, December 12). Karakurt Data Extortion Group. Retrieved May 1, 2024.

Internal MISP references

UUID ca7ae918-5fbb-472a-b9fa-8e0eaee93af7 which can be used as unique global reference for U.S. CISA Karakurt December 12 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-01T00:00:00Z
date_published 2023-12-12T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Karakurt Data Extortion Group

Kaspersky October 24 2023

GReAT. (2023, October 24). Kaspersky crimeware report GoPIX, Lumar, and Rhysida.. Retrieved October 10, 2024.

Internal MISP references

UUID 0f9fca8c-4ab8-41e8-b034-3a1f41f5cb0d which can be used as unique global reference for Kaspersky October 24 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-10T00:00:00Z
date_published 2023-10-24T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Kaspersky crimeware report GoPIX, Lumar, and Rhysida.

Kaspersky Lab SynAck May 2018

Bettencourt, J. (2018, May 7). Kaspersky Lab finds new variant of SynAck ransomware using sophisticated Doppelgänging technique. Retrieved May 24, 2018.

Internal MISP references

UUID bbb9bcb5-cd44-4dcb-a7e5-f6c4cf93f74f which can be used as unique global reference for Kaspersky Lab SynAck May 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-05-24T00:00:00Z
date_published 2018-05-07T00:00:00Z
source MITRE
title Kaspersky Lab finds new variant of SynAck ransomware using sophisticated Doppelgänging technique

Unit 42 Kazuar May 2017

Levene, B, et al. (2017, May 03). Kazuar: Multiplatform Espionage Backdoor with API Access. Retrieved July 17, 2018.

Internal MISP references

UUID 07e64ee6-3d3e-49e4-bb06-ff5897e26ea9 which can be used as unique global reference for Unit 42 Kazuar May 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-17T00:00:00Z
date_published 2017-05-03T00:00:00Z
source MITRE
title Kazuar: Multiplatform Espionage Backdoor with API Access

Citizen Lab Stealth Falcon May 2016

Marczak, B. and Scott-Railton, J.. (2016, May 29). Keep Calm and (Don’t) Enable Macros: A New Threat Actor Targets UAE Dissidents. Retrieved June 8, 2016.

Internal MISP references

UUID 11f46b1e-a141-4d25-bff0-e955251be7f5 which can be used as unique global reference for Citizen Lab Stealth Falcon May 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-08T00:00:00Z
date_published 2016-05-29T00:00:00Z
source MITRE, Tidal Cyber
title Keep Calm and (Don’t) Enable Macros: A New Threat Actor Targets UAE Dissidents

Github KeeThief

Lee, C., Schoreder, W. (n.d.). KeeThief. Retrieved February 8, 2021.

Internal MISP references

UUID 3b6231fb-5b52-4a3a-a21f-0881901d0037 which can be used as unique global reference for Github KeeThief in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-08T00:00:00Z
source MITRE
title KeeThief

Kekeo

Benjamin Delpy. (n.d.). Kekeo. Retrieved October 4, 2021.

Internal MISP references

UUID 0b69f0f5-dd4a-4926-9369-8253a0c3ddea which can be used as unique global reference for Kekeo in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-04T00:00:00Z
source MITRE
title Kekeo

Harmj0y Kerberoast Nov 2016

Schroeder, W. (2016, November 1). Kerberoasting Without Mimikatz. Retrieved March 23, 2018.

Internal MISP references

UUID 6f1f8bc3-421e-46ff-88e3-48fcc6f7b76a which can be used as unique global reference for Harmj0y Kerberoast Nov 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-23T00:00:00Z
date_published 2016-11-01T00:00:00Z
source MITRE
title Kerberoasting Without Mimikatz

ADSecurity Kerberos Ring Decoder

Sean Metcalf. (2014, September 12). Kerberos, Active Directory’s Secret Decoder Ring. Retrieved February 27, 2020.

Internal MISP references

UUID 5f78a554-2d5c-49af-8c6c-6e10f9aec997 which can be used as unique global reference for ADSecurity Kerberos Ring Decoder in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-27T00:00:00Z
date_published 2014-09-12T00:00:00Z
source MITRE
title Kerberos, Active Directory’s Secret Decoder Ring

macOS kerberos framework MIT

Massachusetts Institute of Technology. (2007, October 27). Kerberos for Macintosh Preferences Documentation. Retrieved October 6, 2021.

Internal MISP references

UUID 8e09346b-03ce-4627-a365-f2f63089d1e0 which can be used as unique global reference for macOS kerberos framework MIT in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-06T00:00:00Z
date_published 2007-10-27T00:00:00Z
source MITRE
title Kerberos for Macintosh Preferences Documentation

Microsoft Kerberos Golden Ticket

Microsoft. (2015, March 24). Kerberos Golden Ticket Check (Updated). Retrieved February 27, 2020.

Internal MISP references

UUID 2d8790db-b088-40d0-be99-acd3e695c7a6 which can be used as unique global reference for Microsoft Kerberos Golden Ticket in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-27T00:00:00Z
date_published 2015-03-24T00:00:00Z
source MITRE
title Kerberos Golden Ticket Check (Updated)

CERT-EU Golden Ticket Protection

Abolins, D., Boldea, C., Socha, K., Soria-Machado, M. (2016, April 26). Kerberos Golden Ticket Protection. Retrieved July 13, 2017.

Internal MISP references

UUID 268f9cfa-71f4-4cb1-96f3-c61e71892d30 which can be used as unique global reference for CERT-EU Golden Ticket Protection in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-13T00:00:00Z
date_published 2016-04-26T00:00:00Z
source MITRE
title Kerberos Golden Ticket Protection

AdSecurity Kerberos GT Aug 2015

Metcalf, S. (2015, August 7). Kerberos Golden Tickets are Now More Golden. Retrieved December 1, 2017.

Internal MISP references

UUID aac51d49-9a72-4456-8539-8a5f5d0ef7d7 which can be used as unique global reference for AdSecurity Kerberos GT Aug 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-01T00:00:00Z
date_published 2015-08-07T00:00:00Z
source MITRE
title Kerberos Golden Tickets are Now More Golden

ADSecurity Kerberos and KRBTGT

Sean Metcalf. (2014, November 10). Kerberos & KRBTGT: Active Directory’s Domain Kerberos Service Account. Retrieved January 30, 2020.

Internal MISP references

UUID 6e61f3e1-35e6-44f4-9bc4-60b2bcb71b15 which can be used as unique global reference for ADSecurity Kerberos and KRBTGT in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-01-30T00:00:00Z
date_published 2014-11-10T00:00:00Z
source MITRE
title Kerberos & KRBTGT: Active Directory’s Domain Kerberos Service Account

Microsoft Kerberos Preauth 2014

Sanyal, M.. (2014, March 18). Kerberos Pre-Authentication: Why It Should Not Be Disabled. Retrieved August 25, 2020.

Internal MISP references

UUID 328953ed-93c7-46c0-9a05-53dc44d294fe which can be used as unique global reference for Microsoft Kerberos Preauth 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-25T00:00:00Z
date_published 2014-03-18T00:00:00Z
source MITRE
title Kerberos Pre-Authentication: Why It Should Not Be Disabled

Linux Kerberos Tickets

Trevor Haskell. (2020, April 1). Kerberos Tickets on Linux Red Teams. Retrieved October 4, 2021.

Internal MISP references

UUID 5aea042f-4eb1-4092-89be-3db695053470 which can be used as unique global reference for Linux Kerberos Tickets in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-04T00:00:00Z
date_published 2020-04-01T00:00:00Z
source MITRE
title Kerberos Tickets on Linux Red Teams

Kernel Self Protection Project

Kernel.org. (2020, February 6). Kernel Self-Protection. Retrieved June 4, 2020.

Internal MISP references

UUID b75466f2-c20e-4c4a-b71b-e91fb39cfcd3 which can be used as unique global reference for Kernel Self Protection Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-04T00:00:00Z
date_published 2020-02-06T00:00:00Z
source MITRE
title Kernel Self-Protection

Rapid7 KeyBoy Jun 2013

Guarnieri, C., Schloesser M. (2013, June 7). KeyBoy, Targeted Attacks against Vietnam and India. Retrieved June 14, 2019.

Internal MISP references

UUID e549add8-1dfd-40d6-8974-35e1a38a707b which can be used as unique global reference for Rapid7 KeyBoy Jun 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-14T00:00:00Z
date_published 2013-06-07T00:00:00Z
source MITRE
title KeyBoy, Targeted Attacks against Vietnam and India

Keychain Items Apple Dev API

Apple. (n.d.). Keychain Items. Retrieved April 12, 2022.

Internal MISP references

UUID 4e499819-b910-4c07-a8b4-a7d40f2c0ac4 which can be used as unique global reference for Keychain Items Apple Dev API in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-12T00:00:00Z
source MITRE
title Keychain Items

Keychain Services Apple

Apple. (n.d.). Keychain Services. Retrieved April 11, 2022.

Internal MISP references

UUID 0754f48d-dad8-480c-953c-256be4dfcfc3 which can be used as unique global reference for Keychain Services Apple in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-11T00:00:00Z
source MITRE
title Keychain Services

Wikipedia keychain

Wikipedia. (n.d.). Keychain (software). Retrieved July 5, 2017.

Internal MISP references

UUID 8aac5356-31cb-4e0b-a766-9aa07d977acd which can be used as unique global reference for Wikipedia keychain in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-05T00:00:00Z
source MITRE
title Keychain (software)

Keyctl-unmask

Mark Manning. (2020, July 23). Keyctl-unmask: "Going Florida" on The State Of Containerizing Linux Keyrings. Retrieved July 6, 2022.

Internal MISP references

UUID 75db8c88-e547-4d1b-8f22-6ace2b3d7ad4 which can be used as unique global reference for Keyctl-unmask in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-06T00:00:00Z
date_published 2020-07-23T00:00:00Z
source MITRE
title Keyctl-unmask: "Going Florida" on The State Of Containerizing Linux Keyrings

Google Cloud Encryption Key Rotation

Google. (n.d.). Key rotation. Retrieved October 18, 2019.

Internal MISP references

UUID 4ba76434-f5ca-4a1d-b111-9292f6debfdb which can be used as unique global reference for Google Cloud Encryption Key Rotation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-18T00:00:00Z
source MITRE
title Key rotation

KillDisk Ransomware

Catalin Cimpanu. (2016, December 29). KillDisk Disk-Wiping Malware Adds Ransomware Component. Retrieved January 12, 2021.

Internal MISP references

UUID 9d22f13d-af6d-47b5-93ed-5e4b85b94978 which can be used as unique global reference for KillDisk Ransomware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-12T00:00:00Z
date_published 2016-12-29T00:00:00Z
source MITRE
title KillDisk Disk-Wiping Malware Adds Ransomware Component

Trend Micro KillDisk 1

Fernando Merces, Byron Gelera, Martin Co. (2018, June 7). KillDisk Variant Hits Latin American Finance Industry. Retrieved January 12, 2021.

Internal MISP references

UUID 8ae31db0-2744-4366-9747-55fc4679dbf5 which can be used as unique global reference for Trend Micro KillDisk 1 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-12T00:00:00Z
date_published 2018-06-07T00:00:00Z
source MITRE
title KillDisk Variant Hits Latin American Finance Industry

Trend Micro KillDisk 2

Gilbert Sison, Rheniel Ramos, Jay Yaneza, Alfredo Oliveira. (2018, January 15). KillDisk Variant Hits Latin American Financial Groups. Retrieved January 12, 2021.

Internal MISP references

UUID 62d9a4c9-e669-4dd4-a584-4f3e3e54f97f which can be used as unique global reference for Trend Micro KillDisk 2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-12T00:00:00Z
date_published 2018-01-15T00:00:00Z
source MITRE
title KillDisk Variant Hits Latin American Financial Groups

Killing IOS diversity myth

Ang Cui, Jatin Kataria, Salvatore J. Stolfo. (2011, August). Killing the myth of Cisco IOS diversity: recent advances in reliable shellcode design. Retrieved October 20, 2020.

Internal MISP references

UUID 19d7ccc6-76ed-4b12-af50-f810fbc22037 which can be used as unique global reference for Killing IOS diversity myth in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
date_published 2011-08-01T00:00:00Z
source MITRE
title Killing the myth of Cisco IOS diversity: recent advances in reliable shellcode design

Killing the myth of Cisco IOS rootkits

Sebastian 'topo' Muñiz. (2008, May). Killing the myth of Cisco IOS rootkits. Retrieved October 20, 2020.

Internal MISP references

UUID 538070d6-fbdb-4cc9-8ddf-c331e4375cfb which can be used as unique global reference for Killing the myth of Cisco IOS rootkits in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
date_published 2008-05-01T00:00:00Z
source MITRE
title Killing the myth of Cisco IOS rootkits

Vedere Labs Killnet 2022

Vedere Labs. (2022, June 2). Killnet: Analysis of Attacks from a Prominent Pro-Russian Hacktivist Group. Retrieved October 9, 2023.

Internal MISP references

UUID 628a9288-ae87-4deb-92ce-081ba88c15be which can be used as unique global reference for Vedere Labs Killnet 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-09T00:00:00Z
date_published 2022-06-02T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Killnet: Analysis of Attacks from a Prominent Pro-Russian Hacktivist Group

Flashpoint Glossary Killnet

Flashpoint. (n.d.). Killnet: Inside the World’s Most Prominent Pro-Kremlin Hacktivist Collective. Retrieved October 10, 2023.

Internal MISP references

UUID 502cc03b-350b-4e2d-9436-364c43a0a203 which can be used as unique global reference for Flashpoint Glossary Killnet in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-10T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Killnet: Inside the World’s Most Prominent Pro-Kremlin Hacktivist Collective

Malwarebytes Kimsuky June 2021

Jazi, H. (2021, June 1). Kimsuky APT continues to target South Korean government using AppleSeed backdoor. Retrieved June 10, 2021.

Internal MISP references

UUID 9a497c56-f1d3-4889-8c1a-14b013f14668 which can be used as unique global reference for Malwarebytes Kimsuky June 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-10T00:00:00Z
date_published 2021-06-01T00:00:00Z
source MITRE, Tidal Cyber
title Kimsuky APT continues to target South Korean government using AppleSeed backdoor

Kimsuky Malwarebytes

Hossein Jazi. (2021, June 1). Kimsuky APT continues to target South Korean government using AppleSeed backdoor. Retrieved January 10, 2024.

Internal MISP references

UUID 8b0dd1d7-dc9c-50d3-a47e-20304591ac40 which can be used as unique global reference for Kimsuky Malwarebytes in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-10T00:00:00Z
date_published 2021-06-01T00:00:00Z
source MITRE
title Kimsuky APT continues to target South Korean government using AppleSeed backdoor

VirusBulletin Kimsuky October 2019

Kim, J. et al. (2019, October). KIMSUKY GROUP: TRACKING THE KING OF THE SPEAR PHISHING. Retrieved November 2, 2020.

Internal MISP references

UUID e9a8db17-8b10-44c2-a0e1-88e6bcfb67f1 which can be used as unique global reference for VirusBulletin Kimsuky October 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-02T00:00:00Z
date_published 2019-10-01T00:00:00Z
source MITRE
title KIMSUKY GROUP: TRACKING THE KING OF THE SPEAR PHISHING

EST Kimsuky April 2019

Alyac. (2019, April 3). Kimsuky Organization Steals Operation Stealth Power. Retrieved August 13, 2019.

Internal MISP references

UUID 8e52db6b-5ac3-448a-93f6-96a21787a346 which can be used as unique global reference for EST Kimsuky April 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-08-13T00:00:00Z
date_published 2019-04-03T00:00:00Z
source MITRE
title Kimsuky Organization Steals Operation Stealth Power

ThreatConnect Kimsuky September 2020

ThreatConnect. (2020, September 28). Kimsuky Phishing Operations Putting In Work. Retrieved October 30, 2020.

Internal MISP references

UUID 45d64462-2bed-46e8-ac52-9d4914608a93 which can be used as unique global reference for ThreatConnect Kimsuky September 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-30T00:00:00Z
date_published 2020-09-28T00:00:00Z
source MITRE
title Kimsuky Phishing Operations Putting In Work

BRI Kimsuky April 2019

BRI. (2019, April). Kimsuky unveils APT campaign 'Smoke Screen' aimed at Korea and America. Retrieved October 7, 2019.

Internal MISP references

UUID b72dd3a1-62ca-4a05-96a8-c4bddb17db50 which can be used as unique global reference for BRI Kimsuky April 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-07T00:00:00Z
date_published 2019-04-01T00:00:00Z
source MITRE
title Kimsuky unveils APT campaign 'Smoke Screen' aimed at Korea and America

Mandiant Sabbath Ransomware November 29 2021

Tyler McLellan, Brandan Schondorfer. (2021, November 29). Kitten.gif: Meet the Sabbath Ransomware Affiliate Program, Again. Retrieved October 3, 2024.

Internal MISP references

UUID ab3a20a5-2df1-4f8e-989d-baa96ffaca74 which can be used as unique global reference for Mandiant Sabbath Ransomware November 29 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-03T00:00:00Z
date_published 2021-11-29T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Kitten.gif: Meet the Sabbath Ransomware Affiliate Program, Again

Microsoft Klist

Microsoft. (2021, March 3). klist. Retrieved October 14, 2021.

Internal MISP references

UUID f500340f-23fc-406a-97ef-0de787ef8cec which can be used as unique global reference for Microsoft Klist in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-14T00:00:00Z
date_published 2021-03-03T00:00:00Z
source MITRE
title klist

FireEye Know Your Enemy FIN8 Aug 2016

Elovitz, S. & Ahl, I. (2016, August 18). Know Your Enemy: New Financially-Motivated & Spear-Phishing Group. Retrieved February 26, 2018.

Internal MISP references

UUID 0119687c-b46b-4b5f-a6d8-affa14258392 which can be used as unique global reference for FireEye Know Your Enemy FIN8 Aug 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-26T00:00:00Z
date_published 2016-08-18T00:00:00Z
source MITRE
title Know Your Enemy: New Financially-Motivated & Spear-Phishing Group

Github Koadic

Magius, J., et al. (2017, July 19). Koadic. Retrieved September 27, 2024.

Internal MISP references

UUID 54cbf1bd-9aed-4f82-8c15-6e88dd5d8d64 which can be used as unique global reference for Github Koadic in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-27T00:00:00Z
date_published 2017-07-19T00:00:00Z
source MITRE
title Koadic

ESET Kobalos Feb 2021

M.Leveille, M., Sanmillan, I. (2021, February 2). Kobalos – A complex Linux threat to high performance computing infrastructure. Retrieved August 24, 2021.

Internal MISP references

UUID 883a9417-f7f6-4aa6-8708-8c320d4e0a7a which can be used as unique global reference for ESET Kobalos Feb 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-24T00:00:00Z
date_published 2021-02-02T00:00:00Z
source MITRE
title Kobalos – A complex Linux threat to high performance computing infrastructure

Talos Konni May 2017

Rascagneres, P. (2017, May 03). KONNI: A Malware Under The Radar For Years. Retrieved November 5, 2018.

Internal MISP references

UUID 4cb69c58-4e47-4fb9-9eef-8a0b5447a553 which can be used as unique global reference for Talos Konni May 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-05T00:00:00Z
date_published 2017-05-03T00:00:00Z
source MITRE
title KONNI: A Malware Under The Radar For Years

Malwarebytes KONNI Evolves Jan 2022

Santos, R. (2022, January 26). KONNI evolves into stealthier RAT. Retrieved April 13, 2022.

Internal MISP references

UUID 5dbb84dc-a991-4fa7-8528-639b1430ca02 which can be used as unique global reference for Malwarebytes KONNI Evolves Jan 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-13T00:00:00Z
date_published 2022-01-26T00:00:00Z
source MITRE
title KONNI evolves into stealthier RAT

Talos Group123

Mercer, W., Rascagneres, P. (2018, January 16). Korea In The Crosshairs. Retrieved May 21, 2018.

Internal MISP references

UUID bf8b2bf0-cca3-437b-a640-715f9cc945f7 which can be used as unique global reference for Talos Group123 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-05-21T00:00:00Z
date_published 2018-01-16T00:00:00Z
source MITRE
title Korea In The Crosshairs

Kube Kubectl

kubernetes. (n.d.). kubectl. Retrieved October 13, 2021.

Internal MISP references

UUID 5aae1cd7-4e24-40a5-90d8-1f6431851a8f which can be used as unique global reference for Kube Kubectl in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-13T00:00:00Z
source MITRE
title kubectl

Kubernetes Kubelet

The Kubernetes Authors. (n.d.). Kubelet. Retrieved March 29, 2021.

Internal MISP references

UUID 57527fb9-d076-4ce1-afb5-e7bdb9c9d74c which can be used as unique global reference for Kubernetes Kubelet in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-29T00:00:00Z
source MITRE
title Kubelet

Kubernetes CronJob

The Kubernetes Authors. (n.d.). Kubernetes CronJob. Retrieved March 29, 2021.

Internal MISP references

UUID 354d242c-227e-4827-b559-dc1650d37acd which can be used as unique global reference for Kubernetes CronJob in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-29T00:00:00Z
source MITRE
title Kubernetes CronJob

Kubernetes Hardening Guide

National Security Agency, Cybersecurity and Infrastructure Security Agency. (2022, March). Kubernetes Hardening Guide. Retrieved April 1, 2022.

Internal MISP references

UUID e423b14c-dd39-4b36-9b95-96efbcaf0a12 which can be used as unique global reference for Kubernetes Hardening Guide in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-01T00:00:00Z
date_published 2022-03-01T00:00:00Z
source MITRE
title Kubernetes Hardening Guide

Kubernetes Jobs

The Kubernetes Authors. (n.d.). Kubernetes Jobs. Retrieved March 30, 2021.

Internal MISP references

UUID 21a4388d-dbf8-487b-a2a2-67927b099e4a which can be used as unique global reference for Kubernetes Jobs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-30T00:00:00Z
source MITRE
title Kubernetes Jobs

AppSecco Kubernetes Namespace Breakout 2020

Abhisek Datta. (2020, March 18). Kubernetes Namespace Breakout using Insecure Host Path Volume — Part 1. Retrieved January 16, 2024.

Internal MISP references

UUID 85852b3e-f6a3-5406-9dd5-a649358a53de which can be used as unique global reference for AppSecco Kubernetes Namespace Breakout 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-16T00:00:00Z
date_published 2020-03-18T00:00:00Z
source MITRE
title Kubernetes Namespace Breakout using Insecure Host Path Volume — Part 1

Kubernetes Dashboard

The Kubernetes Authors. (n.d.). Kubernetes Web UI (Dashboard). Retrieved March 29, 2021.

Internal MISP references

UUID 02f23351-df83-4aae-a0bd-614ed91bc683 which can be used as unique global reference for Kubernetes Dashboard in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-29T00:00:00Z
source MITRE
title Kubernetes Web UI (Dashboard)

Intezer App Service Phishing

Paul Litvak. (2020, October 8). Kud I Enter Your Server? New Vulnerabilities in Microsoft Azure. Retrieved August 18, 2022.

Internal MISP references

UUID e86abbd9-f349-4d90-8ec9-899fe1637f94 which can be used as unique global reference for Intezer App Service Phishing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-18T00:00:00Z
date_published 2020-10-08T00:00:00Z
source MITRE
title Kud I Enter Your Server? New Vulnerabilities in Microsoft Azure

Alintanahin 2014

Alintanahin, K. (2014, March 13). Kunming Attack Leads to Gh0st RAT Variant. Retrieved November 12, 2014.

Internal MISP references

UUID 1c5ee0d2-4d6c-4a5f-9790-79bfb7abc53f which can be used as unique global reference for Alintanahin 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-12T00:00:00Z
date_published 2014-03-13T00:00:00Z
source MITRE
title Kunming Attack Leads to Gh0st RAT Variant

Wits End and Shady PowerShell Profiles

DeRyke, A.. (2019, June 7). Lab Notes: Persistence and Privilege Elevation using the Powershell Profile. Retrieved July 8, 2019.

Internal MISP references

UUID 8fcbd99a-1fb8-4ca3-9efd-a98734d4397d which can be used as unique global reference for Wits End and Shady PowerShell Profiles in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-07-08T00:00:00Z
date_published 2019-06-07T00:00:00Z
source MITRE
title Lab Notes: Persistence and Privilege Elevation using the Powershell Profile

Sysdig Cryptojacking Proxyjacking 2023

Miguel Hernandez. (2023, August 17). LABRAT: Stealthy Cryptojacking and Proxyjacking Campaign Targeting GitLab . Retrieved September 25, 2024.

Internal MISP references

UUID aa0820ed-62ae-578a-adbe-e6597551f069 which can be used as unique global reference for Sysdig Cryptojacking Proxyjacking 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-25T00:00:00Z
date_published 2023-08-17T00:00:00Z
source MITRE
title LABRAT: Stealthy Cryptojacking and Proxyjacking Campaign Targeting GitLab

Lacework AI Resource Hijacking 2024

Detecting AI resource-hijacking with Composite Alerts. (2024, June 6). Lacework Labs. Retrieved July 1, 2024.

Internal MISP references

UUID 920e7b38-6f0f-522c-9e73-9e81da1343f7 which can be used as unique global reference for Lacework AI Resource Hijacking 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-01T00:00:00Z
date_published 2024-06-06T00:00:00Z
source MITRE
title Lacework Labs

AWS Lambda Execution Role

AWS. (n.d.). Lambda execution role. Retrieved February 28, 2024.

Internal MISP references

UUID 18e41da7-8dd3-569b-a54d-253aa8cd22ff which can be used as unique global reference for AWS Lambda Execution Role in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-28T00:00:00Z
source MITRE
title Lambda execution role

NCC Group LAPSUS Apr 2022

Brown, D., et al. (2022, April 28). LAPSUS$: Recent techniques, tactics and procedures. Retrieved December 22, 2022.

Internal MISP references

UUID d2e7c69d-8a10-51ca-af7b-22d08f4dfe45 which can be used as unique global reference for NCC Group LAPSUS Apr 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-12-22T00:00:00Z
date_published 2022-04-28T00:00:00Z
source MITRE
title LAPSUS$: Recent techniques, tactics and procedures

BBC LAPSUS Apr 2022

BBC. (2022, April 1). LAPSUS: Two UK Teenagers Charged with Hacking for Gang. Retrieved June 9, 2022.

Internal MISP references

UUID 6c9f4312-6c9d-401c-b20f-12ce50c94a96 which can be used as unique global reference for BBC LAPSUS Apr 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-09T00:00:00Z
date_published 2022-04-01T00:00:00Z
source MITRE
title LAPSUS: Two UK Teenagers Charged with Hacking for Gang

Enigma Excel DCOM Sept 2017

Nelson, M. (2017, September 11). Lateral Movement using Excel.Application and DCOM. Retrieved November 21, 2017.

Internal MISP references

UUID 953dc856-d906-4d87-a421-4e708f30208c which can be used as unique global reference for Enigma Excel DCOM Sept 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-21T00:00:00Z
date_published 2017-09-11T00:00:00Z
source MITRE
title Lateral Movement using Excel.Application and DCOM

Enigma Outlook DCOM Lateral Movement Nov 2017

Nelson, M. (2017, November 16). Lateral Movement using Outlook's CreateObject Method and DotNetToJScript. Retrieved November 21, 2017.

Internal MISP references

UUID 48c8b8c4-1ce2-4fbc-a95d-dc8b39304200 which can be used as unique global reference for Enigma Outlook DCOM Lateral Movement Nov 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-21T00:00:00Z
date_published 2017-11-16T00:00:00Z
source MITRE
title Lateral Movement using Outlook's CreateObject Method and DotNetToJScript

Enigma MMC20 COM Jan 2017

Nelson, M. (2017, January 5). Lateral Movement using the MMC20 Application COM Object. Retrieved November 21, 2017.

Internal MISP references

UUID ecc1023d-ef37-46e3-8dce-8fd5bb6a10dc which can be used as unique global reference for Enigma MMC20 COM Jan 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-21T00:00:00Z
date_published 2017-01-05T00:00:00Z
source MITRE
title Lateral Movement using the MMC20 Application COM Object

Enigma DCOM Lateral Movement Jan 2017

Nelson, M. (2017, January 23). Lateral Movement via DCOM: Round 2. Retrieved November 21, 2017.

Internal MISP references

UUID 62a14d3b-c61b-4c96-ad28-0519745121e3 which can be used as unique global reference for Enigma DCOM Lateral Movement Jan 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-21T00:00:00Z
date_published 2017-01-23T00:00:00Z
source MITRE
title Lateral Movement via DCOM: Round 2

Jacobsen 2014

Jacobsen, K. (2014, May 16). Lateral Movement with PowerShell[slides]. Retrieved November 12, 2014.

Internal MISP references

UUID f9ca049c-5cab-4d80-a84b-1695365871e3 which can be used as unique global reference for Jacobsen 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-12T00:00:00Z
date_published 2014-05-16T00:00:00Z
source MITRE
title Lateral Movement with PowerShell[slides]

Bitsight Latrodectus June 2024

Batista, J. (2024, June 17). Latrodectus, are you coming back?. Retrieved September 13, 2024.

Internal MISP references

UUID 9a942e75-3541-5b8d-acde-8f2a3447184a which can be used as unique global reference for Bitsight Latrodectus June 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-13T00:00:00Z
date_published 2024-06-17T00:00:00Z
source MITRE
title Latrodectus, are you coming back?

Latrodectus APR 2024

Proofpoint Threat Research and Team Cymru S2 Threat Research. (2024, April 4). Latrodectus: This Spider Bytes Like Ice . Retrieved May 31, 2024.

Internal MISP references

UUID 23f46e51-cfb9-516f-88a6-824893293deb which can be used as unique global reference for Latrodectus APR 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-31T00:00:00Z
date_published 2024-04-04T00:00:00Z
source MITRE
title Latrodectus: This Spider Bytes Like Ice

Launchctl Man

SS64. (n.d.). launchctl. Retrieved March 28, 2020.

Internal MISP references

UUID 26bd50ba-c359-4804-b574-7ec731b37fa6 which can be used as unique global reference for Launchctl Man in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-28T00:00:00Z
source MITRE
title launchctl

LaunchDaemon Hijacking

Bradley Kemp. (2021, May 10). LaunchDaemon Hijacking: privilege escalation and persistence via insecure folder permissions. Retrieved July 26, 2021.

Internal MISP references

UUID 51d1e4d9-265a-48ca-834b-4daa1f386bb4 which can be used as unique global reference for LaunchDaemon Hijacking in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-07-26T00:00:00Z
date_published 2021-05-10T00:00:00Z
source MITRE
title LaunchDaemon Hijacking: privilege escalation and persistence via insecure folder permissions

launchd Keywords for plists

Dennis German. (2020, November 20). launchd Keywords for plists. Retrieved October 7, 2021.

Internal MISP references

UUID 1bcd2a93-93e7-48d8-ad25-6f09e94123aa which can be used as unique global reference for launchd Keywords for plists in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-07T00:00:00Z
date_published 2020-11-20T00:00:00Z
source MITRE
title launchd Keywords for plists

Launch Services Apple Developer

Apple. (n.d.). Launch Services. Retrieved October 5, 2021.

Internal MISP references

UUID 9973ceb1-2fee-451b-a512-c544671ee9fd which can be used as unique global reference for Launch Services Apple Developer in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-05T00:00:00Z
source MITRE
title Launch Services

Launch Service Keys Developer Apple

Apple. (2018, June 4). Launch Services Keys. Retrieved October 5, 2021.

Internal MISP references

UUID d75fd3e6-c1cd-4555-b131-80e34f51f09d which can be used as unique global reference for Launch Service Keys Developer Apple in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-05T00:00:00Z
date_published 2018-06-04T00:00:00Z
source MITRE
title Launch Services Keys

Launch-VsDevShell.ps1 - LOLBAS Project

LOLBAS. (2022, June 13). Launch-VsDevShell.ps1. Retrieved December 4, 2023.

Internal MISP references

UUID 6e81ff6a-a386-495e-bd4b-cf698b02bce8 which can be used as unique global reference for Launch-VsDevShell.ps1 - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2022-06-13T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Launch-VsDevShell.ps1

MalwareBytes Lazarus-Andariel Conceals Code April 2021

Jazi, H. (2021, April 19). Lazarus APT conceals malicious code within BMP image to drop its RAT . Retrieved September 29, 2021.

Internal MISP references

UUID c531a8dc-ea08-46db-a6d4-754bd1b9d545 which can be used as unique global reference for MalwareBytes Lazarus-Andariel Conceals Code April 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-29T00:00:00Z
date_published 2021-04-19T00:00:00Z
source MITRE
title Lazarus APT conceals malicious code within BMP image to drop its RAT

Lazarus RATANKBA

Lei, C., et al. (2018, January 24). Lazarus Campaign Targeting Cryptocurrencies Reveals Remote Controller Tool, an Evolved RATANKBA, and More. Retrieved May 22, 2018.

Internal MISP references

UUID e3f9853f-29b0-4219-a488-a6ecfa16b09f which can be used as unique global reference for Lazarus RATANKBA in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-05-22T00:00:00Z
date_published 2018-01-24T00:00:00Z
source MITRE
title Lazarus Campaign Targeting Cryptocurrencies Reveals Remote Controller Tool, an Evolved RATANKBA, and More

ATT Lazarus TTP Evolution

Fernando Martinez. (2021, July 6). Lazarus campaign TTPs and evolution. Retrieved September 22, 2021.

Internal MISP references

UUID 594c59ff-c4cb-4164-a62d-120e282b2538 which can be used as unique global reference for ATT Lazarus TTP Evolution in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-22T00:00:00Z
date_published 2021-07-06T00:00:00Z
source MITRE
title Lazarus campaign TTPs and evolution

TrendMicro Lazarus Nov 2018

Trend Micro. (2018, November 20). Lazarus Continues Heists, Mounts Attacks on Financial Organizations in Latin America. Retrieved December 3, 2018.

Internal MISP references

UUID 4c697316-c13a-4243-be18-c0e059e4168c which can be used as unique global reference for TrendMicro Lazarus Nov 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-12-03T00:00:00Z
date_published 2018-11-20T00:00:00Z
source MITRE
title Lazarus Continues Heists, Mounts Attacks on Financial Organizations in Latin America

F-Secure Lazarus Cryptocurrency Aug 2020

F-Secure Labs. (2020, August 18). Lazarus Group Campaign Targeting the Cryptocurrency Vertical. Retrieved September 1, 2020.

Internal MISP references

UUID f7facaae-e768-42eb-8e0e-2bfd0a636076 which can be used as unique global reference for F-Secure Lazarus Cryptocurrency Aug 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-01T00:00:00Z
date_published 2020-08-18T00:00:00Z
source MITRE
title Lazarus Group Campaign Targeting the Cryptocurrency Vertical

ESET Lazarus KillDisk April 2018

Kálnai, P., Cherepanov A. (2018, April 03). Lazarus KillDisks Central American casino. Retrieved May 17, 2018.

Internal MISP references

UUID 454704b7-9ede-4d30-acfd-2cf16a89bcb3 which can be used as unique global reference for ESET Lazarus KillDisk April 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-05-17T00:00:00Z
date_published 2018-04-03T00:00:00Z
source MITRE
title Lazarus KillDisks Central American casino

Lazarus KillDisk

Kálnai, P., Cherepanov A. (2018, April 03). Lazarus KillDisks Central American casino. Retrieved May 17, 2018.

Internal MISP references

UUID 6f931476-29e6-4bba-ba1b-37ab742f4b49 which can be used as unique global reference for Lazarus KillDisk in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-05-17T00:00:00Z
date_published 2018-04-03T00:00:00Z
source MITRE
title Lazarus KillDisks Central American casino

SentinelOne 9 26 2022

Dinesh Devadoss, Phil Stokes. (2022, September 26). Lazarus "Operation In(ter)ception" Targets macOS Users Dreaming of Jobs in Crypto. Retrieved March 8, 2024.

Internal MISP references

UUID 973a110c-f1cd-46cd-b92b-5c7d8e7492b1 which can be used as unique global reference for SentinelOne 9 26 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-08T00:00:00Z
date_published 2022-09-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Lazarus "Operation In(ter)ception" Targets macOS Users Dreaming of Jobs in Crypto

McAfee Lazarus Resurfaces Feb 2018

Sherstobitoff, R. (2018, February 12). Lazarus Resurfaces, Targets Global Banks and Bitcoin Users. Retrieved February 19, 2018.

Internal MISP references

UUID 4e4cb57d-764a-4233-8fc6-d049a1caabe9 which can be used as unique global reference for McAfee Lazarus Resurfaces Feb 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-19T00:00:00Z
date_published 2018-02-12T00:00:00Z
source MITRE
title Lazarus Resurfaces, Targets Global Banks and Bitcoin Users

Kaspersky ThreatNeedle Feb 2021

Vyacheslav Kopeytsev and Seongsu Park. (2021, February 25). Lazarus targets defense industry with ThreatNeedle. Retrieved October 27, 2021.

Internal MISP references

UUID ba6a5fcc-9391-42c0-8b90-57b729525f41 which can be used as unique global reference for Kaspersky ThreatNeedle Feb 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-27T00:00:00Z
date_published 2021-02-25T00:00:00Z
source MITRE
title Lazarus targets defense industry with ThreatNeedle

Kaspersky Lazarus Under The Hood Blog 2017

GReAT. (2017, April 3). Lazarus Under the Hood. Retrieved April 17, 2019.

Internal MISP references

UUID a1e1ab6a-8db0-4593-95ec-78784607dfa0 which can be used as unique global reference for Kaspersky Lazarus Under The Hood Blog 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-17T00:00:00Z
date_published 2017-04-03T00:00:00Z
source MITRE, Tidal Cyber
title Lazarus Under the Hood

Kaspersky Lazarus Under The Hood APR 2017

GReAT. (2017, April 3). Lazarus Under the Hood. Retrieved October 3, 2018.

Internal MISP references

UUID 312b30b1-3bd6-46ea-8f77-504f442499bc which can be used as unique global reference for Kaspersky Lazarus Under The Hood APR 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-10-03T00:00:00Z
date_published 2017-04-03T00:00:00Z
source MITRE
title Lazarus Under the Hood

Secureworks Emotet Nov 2018

Mclellan, M.. (2018, November 19). Lazy Passwords Become Rocket Fuel for Emotet SMB Spreader. Retrieved March 25, 2019.

Internal MISP references

UUID 1ef76c14-f796-409a-9542-762f1e72f9b7 which can be used as unique global reference for Secureworks Emotet Nov 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-25T00:00:00Z
date_published 2018-11-19T00:00:00Z
source MITRE
title Lazy Passwords Become Rocket Fuel for Emotet SMB Spreader

MalwareBytes LazyScripter Feb 2021

Jazi, H. (2021, February). LazyScripter: From Empire to double RAT. Retrieved November 24, 2021.

Internal MISP references

UUID 078837a7-82cd-4e26-9135-43b612e911fe which can be used as unique global reference for MalwareBytes LazyScripter Feb 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-11-24T00:00:00Z
date_published 2021-02-01T00:00:00Z
source MITRE, Tidal Cyber
title LazyScripter: From Empire to double RAT

Ldifde.exe - LOLBAS Project

LOLBAS. (2022, August 31). Ldifde.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 45d41df9-328c-4ea3-b0fb-fc9f43bdabe5 which can be used as unique global reference for Ldifde.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2022-08-31T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Ldifde.exe

Ldifde Microsoft

Microsoft. (2016, August 31). Ldifde Microsoft. Retrieved July 11, 2023.

Internal MISP references

UUID c47ed0e0-f3e3-41de-9ea7-64fe4e343d9d which can be used as unique global reference for Ldifde Microsoft in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-11T00:00:00Z
date_published 2016-08-31T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Ldifde Microsoft

Symantec Leafminer July 2018

Symantec Security Response. (2018, July 25). Leafminer: New Espionage Campaigns Targeting Middle Eastern Regions. Retrieved August 28, 2018.

Internal MISP references

UUID 01130af7-a2d4-435e-8790-49933e041451 which can be used as unique global reference for Symantec Leafminer July 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-28T00:00:00Z
date_published 2018-07-25T00:00:00Z
source MITRE, Tidal Cyber
title Leafminer: New Espionage Campaigns Targeting Middle Eastern Regions

Proofpoint TA505 Mar 2018

Proofpoint Staff. (2018, March 7). Leaked Ammyy Admin Source Code Turned into Malware. Retrieved May 28, 2019.

Internal MISP references

UUID 44e48c77-59dd-4851-8455-893513b7cf45 which can be used as unique global reference for Proofpoint TA505 Mar 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-05-28T00:00:00Z
date_published 2018-03-07T00:00:00Z
source MITRE
title Leaked Ammyy Admin Source Code Turned into Malware

Unit 42 Leaked Environment Variables 2024

Margaret Kelley, Sean Johnstone, William Gamazo, and Nathaniel Quist. (2024, August 15). Leaked Environment Variables Allow Large-Scale Extortion Operation in Cloud Environments. Retrieved September 25, 2024.

Internal MISP references

UUID ad8c7a1b-e31b-5b76-bf3e-bc45e87b2887 which can be used as unique global reference for Unit 42 Leaked Environment Variables 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-25T00:00:00Z
date_published 2024-08-15T00:00:00Z
source MITRE
title Leaked Environment Variables Allow Large-Scale Extortion Operation in Cloud Environments

Microsoft Purview Data Loss Prevention

Microsoft. (2024, January 9). Learn about data loss prevention. Retrieved March 4, 2024.

Internal MISP references

UUID 0d8044c0-27ac-51bc-b08f-14ab352ed0b6 which can be used as unique global reference for Microsoft Purview Data Loss Prevention in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-04T00:00:00Z
date_published 2024-01-09T00:00:00Z
source MITRE
title Learn about data loss prevention

Medium DnsTunneling

Galobardes, R. (2018, October 30). Learn how easy is to bypass firewalls using DNS tunneling (and also how to block it). Retrieved March 15, 2020.

Internal MISP references

UUID f31de733-406c-4348-b3fe-bdc30d707277 which can be used as unique global reference for Medium DnsTunneling in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-15T00:00:00Z
date_published 2018-10-30T00:00:00Z
source MITRE
title Learn how easy is to bypass firewalls using DNS tunneling (and also how to block it)

Learn XPC Exploitation

Wojciech Reguła. (2020, June 29). Learn XPC exploitation. Retrieved October 12, 2021.

Internal MISP references

UUID da995792-b78b-4db5-85d8-99fda96c6826 which can be used as unique global reference for Learn XPC Exploitation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-12T00:00:00Z
date_published 2020-06-29T00:00:00Z
source MITRE
title Learn XPC exploitation

ClearSky Lebanese Cedar Jan 2021

ClearSky Cyber Security. (2021, January). “Lebanese Cedar” APT Global Lebanese Espionage Campaign Leveraging Web Servers. Retrieved February 10, 2021.

Internal MISP references

UUID 53944d48-caa9-4912-b42d-94a3789ed15b which can be used as unique global reference for ClearSky Lebanese Cedar Jan 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-10T00:00:00Z
date_published 2021-01-01T00:00:00Z
source MITRE
title “Lebanese Cedar” APT Global Lebanese Espionage Campaign Leveraging Web Servers

Mandiant UNC3313 Feb 2022

Tomcik, R. et al. (2022, February 24). Left On Read: Telegram Malware Spotted in Latest Iranian Cyber Espionage Activity. Retrieved August 18, 2022.

Internal MISP references

UUID ac1a1262-1254-4ab2-a940-2d08b6558e9e which can be used as unique global reference for Mandiant UNC3313 Feb 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-18T00:00:00Z
date_published 2022-02-24T00:00:00Z
source MITRE
title Left On Read: Telegram Malware Spotted in Latest Iranian Cyber Espionage Activity

LemonDuck

Manoj Ahuje. (2022, April 21). LemonDuck Targets Docker for Cryptomining Operations. Retrieved June 30, 2022.

Internal MISP references

UUID 3a7ea56a-3b19-4b69-a206-6eb7c4ae609d which can be used as unique global reference for LemonDuck in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-30T00:00:00Z
date_published 2022-04-21T00:00:00Z
source MITRE
title LemonDuck Targets Docker for Cryptomining Operations

Twitter Leoloobeek Scheduled Task

Loobeek, L. (2017, December 8). leoloobeek Status. Retrieved September 12, 2024.

Internal MISP references

UUID efdbaba5-1713-4ae1-bb82-4b4706f03b87 which can be used as unique global reference for Twitter Leoloobeek Scheduled Task in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2017-12-08T00:00:00Z
source MITRE
title leoloobeek Status

TLDRSec AWS Attacks

Clint Gibler and Scott Piper. (2021, January 4). Lesser Known Techniques for Attacking AWS Environments. Retrieved March 4, 2024.

Internal MISP references

UUID b8de9dd2-3c57-5417-a24f-0260dff6afc6 which can be used as unique global reference for TLDRSec AWS Attacks in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-04T00:00:00Z
date_published 2021-01-04T00:00:00Z
source MITRE
title Lesser Known Techniques for Attacking AWS Environments

SpectorOps Medium ClickOnce

Nick Powers. (2023, June 7). Less SmartScreen More Caffeine: (Ab)Using ClickOnce for Trusted Code Execution. Retrieved September 9, 2024.

Internal MISP references

UUID 2244bfaa-2a1c-53db-854b-dc5f06d725ec which can be used as unique global reference for SpectorOps Medium ClickOnce in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-09T00:00:00Z
date_published 2023-06-07T00:00:00Z
source MITRE
title Less SmartScreen More Caffeine: (Ab)Using ClickOnce for Trusted Code Execution

Let's Encrypt FAQ

Let's Encrypt. (2020, April 23). Let's Encrypt FAQ. Retrieved October 15, 2020.

Internal MISP references

UUID 96e1ccb9-bd5c-4716-8848-4c30e6eac4ad which can be used as unique global reference for Let's Encrypt FAQ in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-15T00:00:00Z
date_published 2020-04-23T00:00:00Z
source MITRE
title Let's Encrypt FAQ

OSX Malware Detection

Patrick Wardle. (2016, February 29). Let's Play Doctor: Practical OS X Malware Detection & Analysis. Retrieved July 10, 2017.

Internal MISP references

UUID 0df0e28a-3c0b-4418-9f5a-77fffe37ac8a which can be used as unique global reference for OSX Malware Detection in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-10T00:00:00Z
date_published 2016-02-29T00:00:00Z
source MITRE
title Let's Play Doctor: Practical OS X Malware Detection & Analysis

xorrior emond Jan 2018

Ross, Chris. (2018, January 17). Leveraging Emond on macOS For Persistence. Retrieved September 10, 2019.

Internal MISP references

UUID b49649ec-28f0-4d30-ab6c-13b12fca36e8 which can be used as unique global reference for xorrior emond Jan 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-10T00:00:00Z
date_published 2018-01-17T00:00:00Z
source MITRE
title Leveraging Emond on macOS For Persistence

Cyberreason DCOM DDE Lateral Movement Nov 2017

Tsukerman, P. (2017, November 8). Leveraging Excel DDE for lateral movement via DCOM. Retrieved November 21, 2017.

Internal MISP references

UUID 6edb3d7d-6b74-4dc4-a866-b81b19810f97 which can be used as unique global reference for Cyberreason DCOM DDE Lateral Movement Nov 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-21T00:00:00Z
date_published 2017-11-08T00:00:00Z
source MITRE
title Leveraging Excel DDE for lateral movement via DCOM

Ignacio Udev research 2024

Eder P. Ignacio. (2024, February 21). Leveraging Linux udev for persistence. Retrieved September 26, 2024.

Internal MISP references

UUID 464bb564-c500-55ba-a060-190d95943805 which can be used as unique global reference for Ignacio Udev research 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-26T00:00:00Z
date_published 2024-02-21T00:00:00Z
source MITRE
title Leveraging Linux udev for persistence

Proofpoint Leviathan Oct 2017

Axel F, Pierre T. (2017, October 16). Leviathan: Espionage actor spearphishes maritime and defense targets. Retrieved February 15, 2018.

Internal MISP references

UUID f8c2b67b-c097-4b48-8d95-266a45b7dd4d which can be used as unique global reference for Proofpoint Leviathan Oct 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-15T00:00:00Z
date_published 2017-10-16T00:00:00Z
source MITRE
title Leviathan: Espionage actor spearphishes maritime and defense targets

LIBC

Kerrisk, M. (2016, December 12). libc(7) — Linux manual page. Retrieved June 25, 2020.

Internal MISP references

UUID a3fe6ea5-c443-473a-bb13-b4fd8f4923fd which can be used as unique global reference for LIBC in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-25T00:00:00Z
date_published 2016-12-12T00:00:00Z
source MITRE
title libc(7) — Linux manual page

libzip

D. Baron, T. Klausner. (2020). libzip. Retrieved February 20, 2020.

Internal MISP references

UUID e7008738-101c-4903-a9fc-b0bd28d66069 which can be used as unique global reference for libzip in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-20T00:00:00Z
date_published 2020-01-01T00:00:00Z
source MITRE
title libzip

Symantec Darkmoon Sept 2014

Payet, L. (2014, September 19). Life on Mars: How attackers took advantage of hope for alien existance in new Darkmoon campaign. Retrieved September 13, 2018.

Internal MISP references

UUID 3362a507-03c3-4236-b484-8144248b5cac which can be used as unique global reference for Symantec Darkmoon Sept 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-09-13T00:00:00Z
date_published 2014-09-19T00:00:00Z
source MITRE
title Life on Mars: How attackers took advantage of hope for alien existance in new Darkmoon campaign

Wikipedia LLMNR

Wikipedia. (2016, July 7). Link-Local Multicast Name Resolution. Retrieved November 17, 2017.

Internal MISP references

UUID e06d8b82-f61d-49fc-8120-b6d9e5864cc8 which can be used as unique global reference for Wikipedia LLMNR in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-17T00:00:00Z
date_published 2016-07-07T00:00:00Z
source MITRE
title Link-Local Multicast Name Resolution

IzyKnows auditd threat detection 2022

IzySec. (2022, January 26). Linux auditd for Threat Detection. Retrieved September 29, 2023.

Internal MISP references

UUID 8a2f5c37-df28-587e-81b8-4bf7bb796854 which can be used as unique global reference for IzyKnows auditd threat detection 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-29T00:00:00Z
date_published 2022-01-26T00:00:00Z
source MITRE
title Linux auditd for Threat Detection

Fysbis Dr Web Analysis

Doctor Web. (2014, November 21). Linux.BackDoor.Fysbis.1. Retrieved December 7, 2017.

Internal MISP references

UUID f1eb4818-fda6-46f2-9d5a-5469a5ed44fc which can be used as unique global reference for Fysbis Dr Web Analysis in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-07T00:00:00Z
date_published 2014-11-21T00:00:00Z
source MITRE
title Linux.BackDoor.Fysbis.1

GDSecurity Linux injection

McNamara, R. (2017, September 5). Linux Based Inter-Process Code Injection Without Ptrace(2). Retrieved December 20, 2017.

Internal MISP references

UUID 834966eb-d07a-42ea-83db-d6e71b39214c which can be used as unique global reference for GDSecurity Linux injection in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-20T00:00:00Z
date_published 2017-09-05T00:00:00Z
source MITRE
title Linux Based Inter-Process Code Injection Without Ptrace(2)

GDS Linux Injection

McNamara, R. (2017, September 5). Linux Based Inter-Process Code Injection Without Ptrace(2). Retrieved February 21, 2020.

Internal MISP references

UUID 3e7f5991-25b4-43e9-9f0b-a5c668fb0657 which can be used as unique global reference for GDS Linux Injection in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-21T00:00:00Z
date_published 2017-09-05T00:00:00Z
source MITRE
title Linux Based Inter-Process Code Injection Without Ptrace(2)

Linux/Cdorked.A We Live Security Analysis

Pierre-Marc Bureau. (2013, April 26). Linux/Cdorked.A: New Apache backdoor being used in the wild to serve Blackhole. Retrieved September 10, 2017.

Internal MISP references

UUID f76fce2e-2884-4b50-a7d7-55f08b84099c which can be used as unique global reference for Linux/Cdorked.A We Live Security Analysis in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-09-10T00:00:00Z
date_published 2013-04-26T00:00:00Z
source MITRE
title Linux/Cdorked.A: New Apache backdoor being used in the wild to serve Blackhole

Avast Linux Trojan Cron Persistence

Threat Intelligence Team. (2015, January 6). Linux DDoS Trojan hiding itself with an embedded rootkit. Retrieved January 8, 2018.

Internal MISP references

UUID 148fe0e1-8487-4d49-8966-f14e144372f5 which can be used as unique global reference for Avast Linux Trojan Cron Persistence in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-08T00:00:00Z
date_published 2015-01-06T00:00:00Z
source MITRE
title Linux DDoS Trojan hiding itself with an embedded rootkit

Elastic Linux Persistence 2024

Ruben Groenewoud. (2024, August 29). Linux Detection Engineering - A Sequel on Persistence Mechanisms. Retrieved October 16, 2024.

Internal MISP references

UUID cbed8c8c-9aec-5692-89cc-6dbb53b86f00 which can be used as unique global reference for Elastic Linux Persistence 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-16T00:00:00Z
date_published 2024-08-29T00:00:00Z
source MITRE
title Linux Detection Engineering - A Sequel on Persistence Mechanisms

BH Linux Inject

Colgan, T. (2015, August 15). Linux-Inject. Retrieved February 21, 2020.

Internal MISP references

UUID bdbb2a83-fc3b-439f-896a-75bffada4d51 which can be used as unique global reference for BH Linux Inject in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-21T00:00:00Z
date_published 2015-08-15T00:00:00Z
source MITRE
title Linux-Inject

PAM Backdoor

zephrax. (2018, August 3). linux-pam-backdoor. Retrieved June 25, 2020.

Internal MISP references

UUID da1ffaf1-39f9-4516-8c04-4a4301e13585 which can be used as unique global reference for PAM Backdoor in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-25T00:00:00Z
date_published 2018-08-03T00:00:00Z
source MITRE
title linux-pam-backdoor

Linux Password and Shadow File Formats

The Linux Documentation Project. (n.d.). Linux Password and Shadow File Formats. Retrieved February 19, 2020.

Internal MISP references

UUID 7c574609-4b0d-44e7-adc3-8a3d67e10e9f which can be used as unique global reference for Linux Password and Shadow File Formats in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-19T00:00:00Z
source MITRE
title Linux Password and Shadow File Formats

nixCraft - John the Ripper

Vivek Gite. (2014, September 17). Linux Password Cracking: Explain unshadow and john Commands (John the Ripper Tool). Retrieved February 19, 2020.

Internal MISP references

UUID 5e093b21-8bbd-4ad4-9fe2-cbb04207f1d3 which can be used as unique global reference for nixCraft - John the Ripper in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-19T00:00:00Z
date_published 2014-09-17T00:00:00Z
source MITRE
title Linux Password Cracking: Explain unshadow and john Commands (John the Ripper Tool)

Polop Linux PrivEsc Gitbook

Carlos Polop. (2023, March 5). Linux Privilege Escalation. Retrieved March 31, 2023.

Internal MISP references

UUID a73a2819-61bd-5bd2-862d-5eeed344909f which can be used as unique global reference for Polop Linux PrivEsc Gitbook in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-31T00:00:00Z
date_published 2023-03-05T00:00:00Z
source MITRE
title Linux Privilege Escalation

Man LD.SO

Kerrisk, M. (2020, June 13). Linux Programmer's Manual. Retrieved June 15, 2020.

Internal MISP references

UUID a8a16cf6-0482-4e98-a39a-496491f985df which can be used as unique global reference for Man LD.SO in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-15T00:00:00Z
date_published 2020-06-13T00:00:00Z
source MITRE
title Linux Programmer's Manual

setuid man page

Michael Kerrisk. (2017, September 15). Linux Programmer's Manual. Retrieved September 21, 2018.

Internal MISP references

UUID c07e9d6c-18f2-4246-a265-9bec7d833bba which can be used as unique global reference for setuid man page in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-09-21T00:00:00Z
date_published 2017-09-15T00:00:00Z
source MITRE
title Linux Programmer's Manual

BleepingComputer 12 3 2023

Lawrence Abrams. (2023, December 3). Linux version of Qilin ransomware focuses on VMware ESXi. Retrieved January 10, 2024.

Internal MISP references

UUID 8cb73f97-0256-472d-88b7-92b6d63578fd which can be used as unique global reference for BleepingComputer 12 3 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-10T00:00:00Z
date_published 2023-12-03T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Linux version of Qilin ransomware focuses on VMware ESXi

Uninformed Needle

skape. (2003, January 19). Linux x86 run-time process manipulation. Retrieved December 20, 2017.

Internal MISP references

UUID 5ac2d917-756f-48d0-ab32-648b45a29083 which can be used as unique global reference for Uninformed Needle in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-20T00:00:00Z
date_published 2003-01-19T00:00:00Z
source MITRE
title Linux x86 run-time process manipulation

List Blobs

Microsoft - List Blobs. (n.d.). Retrieved October 4, 2021.

Internal MISP references

UUID f9aa697a-83dd-4bae-bc11-006be51ce477 which can be used as unique global reference for List Blobs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-04T00:00:00Z
source MITRE
title List Blobs

ListObjectsV2

Amazon - ListObjectsV2. Retrieved October 4, 2021.

Internal MISP references

UUID 727c2077-f922-4314-908a-356c42564181 which can be used as unique global reference for ListObjectsV2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-04T00:00:00Z
source MITRE
title ListObjectsV2

Wikipedia File Header Signatures

Wikipedia. (2016, March 31). List of file signatures. Retrieved April 22, 2016.

Internal MISP references

UUID 00de69c8-78b1-4de3-a4dc-f5be3dbca212 which can be used as unique global reference for Wikipedia File Header Signatures in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-22T00:00:00Z
date_published 2016-03-31T00:00:00Z
source MITRE
title List of file signatures

Wikipedia OSI

Wikipedia. (n.d.). List of network protocols (OSI model). Retrieved December 4, 2014.

Internal MISP references

UUID d1080030-12c7-4223-92ab-fb764acf111d which can be used as unique global reference for Wikipedia OSI in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-12-04T00:00:00Z
source MITRE
title List of network protocols (OSI model)

Hexacorn Listplanting

Hexacorn. (2019, April 25). Listplanting – yet another code injection trick. Retrieved August 14, 2024.

Internal MISP references

UUID fc035d68-8d20-5c1f-8b59-db2fa8d88b7b which can be used as unique global reference for Hexacorn Listplanting in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-14T00:00:00Z
date_published 2019-04-25T00:00:00Z
source MITRE
title Listplanting – yet another code injection trick

AWS List Roles

Amazon. (n.d.). List Roles. Retrieved August 11, 2020.

Internal MISP references

UUID 42ff02f9-45d0-466b-a5fa-e19c8187b529 which can be used as unique global reference for AWS List Roles in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-11T00:00:00Z
source MITRE
title List Roles

Google Cloud Secrets

Google Cloud. (n.d.). List secrets and view secret details. Retrieved September 25, 2023.

Internal MISP references

UUID 4a9e631d-3588-5585-b00a-316a934e6009 which can be used as unique global reference for Google Cloud Secrets in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-25T00:00:00Z
source MITRE
title List secrets and view secret details

Peripheral Discovery Linux

Shahriar Shovon. (2018, March). List USB Devices Linux. Retrieved March 11, 2022.

Internal MISP references

UUID 427b3a1b-88ea-4027-bae6-7fb45490b81d which can be used as unique global reference for Peripheral Discovery Linux in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-11T00:00:00Z
date_published 2018-03-01T00:00:00Z
source MITRE
title List USB Devices Linux

AWS List Users

Amazon. (n.d.). List Users. Retrieved August 11, 2020.

Internal MISP references

UUID 517e3d27-36da-4810-b256-3f47147b36e3 which can be used as unique global reference for AWS List Users in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-11T00:00:00Z
source MITRE
title List Users

Sophos PowerShell command audit

jak. (2020, June 27). Live Discover - PowerShell command audit. Retrieved August 21, 2020.

Internal MISP references

UUID 441f289c-7fdc-4cf1-9379-960be75c7202 which can be used as unique global reference for Sophos PowerShell command audit in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-21T00:00:00Z
date_published 2020-06-27T00:00:00Z
source MITRE
title Live Discover - PowerShell command audit

Dell TG-1314

Dell SecureWorks Counter Threat Unit Special Operations Team. (2015, May 28). Living off the Land. Retrieved January 26, 2016.

Internal MISP references

UUID 79fc7568-b6ff-460b-9200-56d7909ed157 which can be used as unique global reference for Dell TG-1314 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-26T00:00:00Z
date_published 2015-05-28T00:00:00Z
source MITRE, Tidal Cyber
title Living off the Land

Symantec Living off the Land

Wueest, C., Anand, H. (2017, July). Living off the land and fileless attack techniques. Retrieved April 10, 2018.

Internal MISP references

UUID 4bad4659-f501-4eb6-b3ca-0359e3ba824e which can be used as unique global reference for Symantec Living off the Land in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-10T00:00:00Z
date_published 2017-07-01T00:00:00Z
source MITRE
title Living off the land and fileless attack techniques

LOLBAS Main Site

LOLBAS. (n.d.). Living Off The Land Binaries and Scripts (and also Libraries). Retrieved February 10, 2020.

Internal MISP references

UUID 615f6fa5-3059-49fc-9fa4-5ca0aeff4331 which can be used as unique global reference for LOLBAS Main Site in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-10T00:00:00Z
source MITRE
title Living Off The Land Binaries and Scripts (and also Libraries)

LOLBAS Project

Oddvar Moe et al. (2022, February). Living Off The Land Binaries, Scripts and Libraries. Retrieved March 7, 2022.

Internal MISP references

UUID 14b1d3ab-8508-4946-9913-17e667956064 which can be used as unique global reference for LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-07T00:00:00Z
date_published 2022-02-01T00:00:00Z
source MITRE
title Living Off The Land Binaries, Scripts and Libraries

FireEye 2019 Apple Remote Desktop

Jake Nicastro, Willi Ballenthin. (2019, October 9). Living off the Orchard: Leveraging Apple Remote Desktop for Good and Evil. Retrieved August 16, 2021.

Internal MISP references

UUID bbc72952-988e-4c3c-ab5e-75b64e9e33f5 which can be used as unique global reference for FireEye 2019 Apple Remote Desktop in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-16T00:00:00Z
date_published 2019-10-09T00:00:00Z
source MITRE
title Living off the Orchard: Leveraging Apple Remote Desktop for Good and Evil

LKM loading kernel restrictions

Pingios, A.. (2018, February 7). LKM loading kernel restrictions. Retrieved June 4, 2020.

Internal MISP references

UUID 10ccae99-c6f5-4b83-89c9-06a9e35280fc which can be used as unique global reference for LKM loading kernel restrictions in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-04T00:00:00Z
date_published 2018-02-07T00:00:00Z
source MITRE
title LKM loading kernel restrictions

Rapid7 LLMNR Spoofer

Francois, R. (n.d.). LLMNR Spoofer. Retrieved November 17, 2017.

Internal MISP references

UUID 229b04b6-98ca-4e6f-9917-a26cfe0a7f0d which can be used as unique global reference for Rapid7 LLMNR Spoofer in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-17T00:00:00Z
source MITRE
title LLMNR Spoofer

Wikipedia Loadable Kernel Module

Wikipedia. (2018, March 17). Loadable kernel module. Retrieved April 9, 2018.

Internal MISP references

UUID e6d9f967-4f45-44d2-8a19-69741745f917 which can be used as unique global reference for Wikipedia Loadable Kernel Module in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-09T00:00:00Z
date_published 2018-03-17T00:00:00Z
source MITRE
title Loadable kernel module

Microsoft LoadLibrary

Microsoft. (2018, December 5). LoadLibraryA function (libloaderapi.h). Retrieved September 28, 2021.

Internal MISP references

UUID dfaf5bfa-61a7-45f8-a50e-0d8bc6cb2189 which can be used as unique global reference for Microsoft LoadLibrary in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-28T00:00:00Z
date_published 2018-12-05T00:00:00Z
source MITRE
title LoadLibraryA function (libloaderapi.h)

Microsoft Local Accounts Feb 2019

Microsoft. (2018, December 9). Local Accounts. Retrieved February 11, 2019.

Internal MISP references

UUID 6ae7487c-cb61-4f10-825f-4ef9ef050b7c which can be used as unique global reference for Microsoft Local Accounts Feb 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-11T00:00:00Z
date_published 2018-12-09T00:00:00Z
source MITRE
title Local Accounts

Sternsecurity LLMNR-NBTNS

Sternstein, J. (2013, November). Local Network Attacks: LLMNR and NBT-NS Poisoning. Retrieved November 17, 2017.

Internal MISP references

UUID 422a6043-78c2-43ef-8e87-7d7a8878f94a which can be used as unique global reference for Sternsecurity LLMNR-NBTNS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-17T00:00:00Z
date_published 2013-11-01T00:00:00Z
source MITRE
title Local Network Attacks: LLMNR and NBT-NS Poisoning

Sophos Geolocation 2016

Wisniewski, C. (2016, May 3). Location-based threats: How cybercriminals target you based on where you live. Retrieved April 1, 2021.

Internal MISP references

UUID a3b7540d-20cc-4d94-8321-9fd730486f8c which can be used as unique global reference for Sophos Geolocation 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-01T00:00:00Z
date_published 2016-05-03T00:00:00Z
source MITRE
title Location-based threats: How cybercriminals target you based on where you live

ASEC BLOG November 08 2022

Sanseo. (2022, November 8). LockBit 3.0 Being Distributed via Amadey Bot - ASEC BLOG. Retrieved May 15, 2023.

Internal MISP references

UUID 36144a43-ccac-4380-8595-76116dcb6706 which can be used as unique global reference for ASEC BLOG November 08 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-15T00:00:00Z
date_published 2022-11-08T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title LockBit 3.0 Being Distributed via Amadey Bot - ASEC BLOG

VMWare LockBit 3.0 October 2022

Dana Behling. (2022, October 15). LockBit 3.0 Ransomware Unlocked. Retrieved May 19, 2023.

Internal MISP references

UUID b625f291-0152-468c-a130-ec8fb0c6ad21 which can be used as unique global reference for VMWare LockBit 3.0 October 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-19T00:00:00Z
date_published 2022-10-15T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title LockBit 3.0 Ransomware Unlocked

Sentinel Labs LockBit 3.0 July 2022

Jim Walter, Aleksandar Milenkoski. (2022, July 21). LockBit 3.0 Update | Unpicking the Ransomware’s Latest Anti-Analysis and Evasion Techniques. Retrieved May 19, 2023.

Internal MISP references

UUID 9a73b140-b483-4274-a134-ed1bb15ac31c which can be used as unique global reference for Sentinel Labs LockBit 3.0 July 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-19T00:00:00Z
date_published 2022-07-21T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title LockBit 3.0 Update

Cyble LockBit 3.0 July 2022

Cybleinc. (2022, July 5). Lockbit 3.0 –  Ransomware group launches new version. Retrieved May 19, 2023.

Internal MISP references

UUID 9b9bd080-e727-4c41-bb2a-abff48b0fedc which can be used as unique global reference for Cyble LockBit 3.0 July 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-19T00:00:00Z
date_published 2022-07-05T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Lockbit 3.0 –  Ransomware group launches new version

Cary Esentutl

Cary, M. (2018, December 6). Locked File Access Using ESENTUTL.exe. Retrieved September 5, 2019.

Internal MISP references

UUID aa1211c6-e490-444a-8aab-7626e0700dd0 which can be used as unique global reference for Cary Esentutl in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-05T00:00:00Z
date_published 2018-12-06T00:00:00Z
source MITRE
title Locked File Access Using ESENTUTL.exe

Group IB Ransomware September 2020

Group IB. (2020, September). LOCK LIKE A PRO. Retrieved September 27, 2021.

Internal MISP references

UUID 52d0e16f-9a20-442f-9a17-686e51d7e32b which can be used as unique global reference for Group IB Ransomware September 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-27T00:00:00Z
date_published 2020-09-01T00:00:00Z
source MITRE
title LOCK LIKE A PRO

AWS Cloud Trail Backup API

Amazon. (2020). Logging AWS Backup API Calls with AWS CloudTrail. Retrieved April 27, 2020.

Internal MISP references

UUID 17222170-5454-4a7d-804b-23753ec841eb which can be used as unique global reference for AWS Cloud Trail Backup API in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-04-27T00:00:00Z
date_published 2020-01-01T00:00:00Z
source MITRE
title Logging AWS Backup API Calls with AWS CloudTrail

AWS Logging IAM Calls

AWS. (n.d.). Logging IAM and AWS STS API calls with AWS CloudTrail. Retrieved April 1, 2022.

Internal MISP references

UUID 2aa0682b-f553-4c2b-ae9e-112310bcb8d0 which can be used as unique global reference for AWS Logging IAM Calls in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-01T00:00:00Z
source MITRE
title Logging IAM and AWS STS API calls with AWS CloudTrail

Login Items AE

Apple. (n.d.). Login Items AE. Retrieved October 4, 2021.

Internal MISP references

UUID d15943dd-d11c-4af2-a3ac-9ebe168a7526 which can be used as unique global reference for Login Items AE in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-04T00:00:00Z
source MITRE
title Login Items AE

LoginWindowScripts Apple Dev

Apple. (n.d.). LoginWindowScripts. Retrieved April 1, 2022.

Internal MISP references

UUID 340eb8df-cc22-4b59-8dca-32ec52fd6818 which can be used as unique global reference for LoginWindowScripts Apple Dev in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-01T00:00:00Z
source MITRE
title LoginWindowScripts

LogMeIn Homepage

LogMeIn. (n.d.). LogMeIn Homepage. Retrieved November 16, 2023.

Internal MISP references

UUID e113b544-82ad-4099-ab4e-7fc8b78f54bd which can be used as unique global reference for LogMeIn Homepage in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-11-16T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title LogMeIn Homepage

LogonUserW function

Microsoft. (2023, March 10). LogonUserW function (winbase.h). Retrieved January 8, 2024.

Internal MISP references

UUID bf8cce5c-be5e-59c7-9ff2-e478f30ce712 which can be used as unique global reference for LogonUserW function in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-08T00:00:00Z
date_published 2023-03-10T00:00:00Z
source MITRE
title LogonUserW function (winbase.h)

ESET LoJax Sept 2018

ESET. (2018, September). LOJAX First UEFI rootkit found in the wild, courtesy of the Sednit group. Retrieved July 2, 2019.

Internal MISP references

UUID bb938fea-2b2e-41d3-a55c-40ea34c00d21 which can be used as unique global reference for ESET LoJax Sept 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-07-02T00:00:00Z
date_published 2018-09-01T00:00:00Z
source MITRE
title LOJAX First UEFI rootkit found in the wild, courtesy of the Sednit group

Morphisec Lokibot April 2020

Cheruku, H. (2020, April 15). LOKIBOT WITH AUTOIT OBFUSCATOR + FRENCHY SHELLCODE. Retrieved May 14, 2020.

Internal MISP references

UUID e938bab1-7dc1-4a78-b1e2-ab2aa0a83eb0 which can be used as unique global reference for Morphisec Lokibot April 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-14T00:00:00Z
date_published 2020-04-15T00:00:00Z
source MITRE
title LOKIBOT WITH AUTOIT OBFUSCATOR + FRENCHY SHELLCODE

t1105_lolbas

LOLBAS. (n.d.). LOLBAS Mapped to T1105. Retrieved March 11, 2022.

Internal MISP references

UUID 80e649f5-6c74-4d66-a452-4f4cd51501da which can be used as unique global reference for t1105_lolbas in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-11T00:00:00Z
source MITRE
title LOLBAS Mapped to T1105

Lolbin Ssh.exe Use As Proxy

frack113, Nasreddine Bencherchali. (2023, January 26). Lolbin Ssh.exe Use As Proxy. Retrieved May 25, 2023.

Internal MISP references

UUID c7af164d-549d-44de-b491-542ef2eb4334 which can be used as unique global reference for Lolbin Ssh.exe Use As Proxy in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-25T00:00:00Z
date_published 2023-01-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Lolbin Ssh.exe Use As Proxy

Huntress INC Ransomware May 2024

Carvey, H. (2024, May 1). LOLBin to INC Ransomware. Retrieved June 5, 2024.

Internal MISP references

UUID 3ebccffe-d56d-594a-9548-740cf88a453b which can be used as unique global reference for Huntress INC Ransomware May 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-05T00:00:00Z
date_published 2024-05-01T00:00:00Z
source MITRE
title LOLBin to INC Ransomware

Qualys LolZarus

Pradhan, A. (2022, February 8). LolZarus: Lazarus Group Incorporating Lolbins into Campaigns. Retrieved March 22, 2022.

Internal MISP references

UUID 784f1f5a-f7f2-45e8-84bd-b600f2b74b33 which can be used as unique global reference for Qualys LolZarus in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-22T00:00:00Z
date_published 2022-02-08T00:00:00Z
source MITRE
title LolZarus: Lazarus Group Incorporating Lolbins into Campaigns

Bitdefender Trickbot C2 infra Nov 2020

Liviu Arsene, Radu Tudorica. (2020, November 23). TrickBot is Dead. Long Live TrickBot!. Retrieved September 28, 2021.

Internal MISP references

UUID 1a281862-efc8-4566-8d06-ba463e22225d which can be used as unique global reference for Bitdefender Trickbot C2 infra Nov 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-28T00:00:00Z
source MITRE
title Long Live TrickBot!

Proofpoint LookBack Malware Aug 2019

Raggi, M. Schwarz, D.. (2019, August 1). LookBack Malware Targets the United States Utilities Sector with Phishing Attacks Impersonating Engineering Licensing Boards. Retrieved February 25, 2021.

Internal MISP references

UUID 77887f82-7815-4a91-8c8a-f77dc8a9ba53 which can be used as unique global reference for Proofpoint LookBack Malware Aug 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-25T00:00:00Z
date_published 2019-08-01T00:00:00Z
source MITRE
title LookBack Malware Targets the United States Utilities Sector with Phishing Attacks Impersonating Engineering Licensing Boards

Sans Mutexes 2012

Lenny Zeltser. (2012, July 24). Looking at Mutex Objects for Malware Discovery & Indicators of Compromise. Retrieved September 19, 2024.

Internal MISP references

UUID bfdddac2-7732-5e39-a79e-d0629f20fb60 which can be used as unique global reference for Sans Mutexes 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-19T00:00:00Z
date_published 2012-07-24T00:00:00Z
source MITRE
title Looking at Mutex Objects for Malware Discovery & Indicators of Compromise

Fidelis DarkComet

Fidelis Cybersecurity. (2015, August 4). Looking at the Sky for a DarkComet. Retrieved April 5, 2016.

Internal MISP references

UUID 6043b34d-dec3-415b-8329-05f698f320e3 which can be used as unique global reference for Fidelis DarkComet in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-05T00:00:00Z
date_published 2015-08-04T00:00:00Z
source MITRE
title Looking at the Sky for a DarkComet

Arctic Wolf Fog Ransomware June 4 2024

Stefan Hostetler, Steven Campbell, Christopher Prest, Connor Belfiore, Markus Neis, Joe Wedderspoon, Rick McQuown, Arctic Wolf Labs Team. (2024, June 4). Lost in the Fog: A New Ransomware Threat. Retrieved July 29, 2024.

Internal MISP references

UUID 86111971-cd37-4a87-bcaa-3e0f6326da5c which can be used as unique global reference for Arctic Wolf Fog Ransomware June 4 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-29T00:00:00Z
date_published 2024-06-04T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Lost in the Fog: A New Ransomware Threat

BlackHat Process Doppelgänging Dec 2017

Liberman, T. & Kogan, E. (2017, December 7). Lost in Transaction: Process Doppelgänging. Retrieved December 20, 2017.

Internal MISP references

UUID b0752c3a-1777-4209-938d-5382de6a49f5 which can be used as unique global reference for BlackHat Process Doppelgänging Dec 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-20T00:00:00Z
date_published 2017-12-07T00:00:00Z
source MITRE
title Lost in Transaction: Process Doppelgänging

ESET LoudMiner June 2019

Malik, M. (2019, June 20). LoudMiner: Cross-platform mining in cracked VST software. Retrieved May 18, 2020.

Internal MISP references

UUID f1e4ff9e-cb6c-46cc-898e-5f170bb5f634 which can be used as unique global reference for ESET LoudMiner June 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-18T00:00:00Z
date_published 2019-06-20T00:00:00Z
source MITRE
title LoudMiner: Cross-platform mining in cracked VST software

GitHub Mimikatz Issue 92 June 2017

Warren, J. (2017, June 22). lsadump::changentlm and lsadump::setntlm work, but generate Windows events #92. Retrieved December 4, 2017.

Internal MISP references

UUID 099c3492-1813-4874-9901-e24b081f7e12 which can be used as unique global reference for GitHub Mimikatz Issue 92 June 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-04T00:00:00Z
date_published 2017-06-22T00:00:00Z
source MITRE
title lsadump::changentlm and lsadump::setntlm work, but generate Windows events #92

Deep Instinct LSASS

Gilboa, A. (2021, February 16). LSASS Memory Dumps are Stealthier than Ever Before - Part 2. Retrieved December 27, 2023.

Internal MISP references

UUID 4a37ea4e-c512-5e41-8e4e-27911b3a4617 which can be used as unique global reference for Deep Instinct LSASS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-27T00:00:00Z
date_published 2021-02-16T00:00:00Z
source MITRE
title LSASS Memory Dumps are Stealthier than Ever Before - Part 2

lsmod man

Kerrisk, M. (2022, December 18). lsmod(8) — Linux manual page. Retrieved March 28, 2023.

Internal MISP references

UUID c2f88274-9da4-5d24-b68d-302ee5990dd5 which can be used as unique global reference for lsmod man in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-28T00:00:00Z
date_published 2022-12-18T00:00:00Z
source MITRE
title lsmod(8) — Linux manual page

Lua state

Lua. (n.d.). lua_State. Retrieved August 5, 2024.

Internal MISP references

UUID 603c033d-a3b3-5132-8574-7476a8f40815 which can be used as unique global reference for Lua state in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-05T00:00:00Z
source MITRE
title lua_State

Unit 42 Lucifer June 2020

Hsu, K. et al. (2020, June 24). Lucifer: New Cryptojacking and DDoS Hybrid Malware Exploiting High and Critical Vulnerabilities to Infect Windows Devices. Retrieved November 16, 2020.

Internal MISP references

UUID 3977a87a-2eab-4a67-82b2-10c9dc7e4554 which can be used as unique global reference for Unit 42 Lucifer June 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-16T00:00:00Z
date_published 2020-06-24T00:00:00Z
source MITRE
title Lucifer: New Cryptojacking and DDoS Hybrid Malware Exploiting High and Critical Vulnerabilities to Infect Windows Devices

Securelist LuckyMouse June 2018

Legezo, D. (2018, June 13). LuckyMouse hits national data center to organize country-level waterholing campaign. Retrieved August 18, 2018.

Internal MISP references

UUID f974708b-598c-46a9-aac9-c5fbdd116c2a which can be used as unique global reference for Securelist LuckyMouse June 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-18T00:00:00Z
date_published 2018-06-13T00:00:00Z
source MITRE
title LuckyMouse hits national data center to organize country-level waterholing campaign

lucr-3: Getting SaaS-y in the cloud

Ian Ahl. (2023, September 20). LUCR-3: Scattered Spider Getting SaaS-y In The Cloud. Retrieved September 20, 2023.

Internal MISP references

UUID 033e7c95-cded-5e51-9a9f-1c6038b0509f which can be used as unique global reference for lucr-3: Getting SaaS-y in the cloud in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-20T00:00:00Z
date_published 2023-09-20T00:00:00Z
source MITRE
title LUCR-3: Scattered Spider Getting SaaS-y In The Cloud

Permiso Scattered Spider 2023

Ian Ahl. (2023, September 20). LUCR-3: SCATTERED SPIDER GETTING SAAS-Y IN THE CLOUD. Retrieved September 25, 2023.

Internal MISP references

UUID 020b97ab-466d-52e6-b1f1-6f9f8ffdabf0 which can be used as unique global reference for Permiso Scattered Spider 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-25T00:00:00Z
date_published 2023-09-20T00:00:00Z
source MITRE
title LUCR-3: SCATTERED SPIDER GETTING SAAS-Y IN THE CLOUD

Kaspersky LuminousMoth July 2021

Lechtik, M, and etl. (2021, July 14). LuminousMoth APT: Sweeping attacks for the chosen few. Retrieved October 20, 2022.

Internal MISP references

UUID e21c6931-fba8-52b0-b6f0-1c8222881fbd which can be used as unique global reference for Kaspersky LuminousMoth July 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-10-20T00:00:00Z
date_published 2021-07-14T00:00:00Z
source MITRE
title LuminousMoth APT: Sweeping attacks for the chosen few

Bitdefender LuminousMoth July 2021

Botezatu, B and etl. (2021, July 21). LuminousMoth - PlugX, File Exfiltration and Persistence Revisited. Retrieved October 20, 2022.

Internal MISP references

UUID 6b1ce8bb-4e77-59f3-87ff-78f4a1a10ad3 which can be used as unique global reference for Bitdefender LuminousMoth July 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-10-20T00:00:00Z
date_published 2021-07-21T00:00:00Z
source MITRE
title LuminousMoth - PlugX, File Exfiltration and Persistence Revisited

Unit42 Luna Moth

Kristopher Russo. (n.d.). Luna Moth Callback Phishing Campaign. Retrieved February 2, 2023.

Internal MISP references

UUID ec52bcc9-6a56-5b94-8534-23c8e7ce740f which can be used as unique global reference for Unit42 Luna Moth in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-02T00:00:00Z
source MITRE
title Luna Moth Callback Phishing Campaign

sygnia Luna Month

Oren Biderman, Tomer Lahiyani, Noam Lifshitz, Ori Porag. (n.d.). LUNA MOTH: THE THREAT ACTORS BEHIND RECENT FALSE SUBSCRIPTION SCAMS. Retrieved February 2, 2023.

Internal MISP references

UUID 3e1c2a64-8446-538d-a148-2de87991955a which can be used as unique global reference for sygnia Luna Month in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-02T00:00:00Z
source MITRE
title LUNA MOTH: THE THREAT ACTORS BEHIND RECENT FALSE SUBSCRIPTION SCAMS

Sygnia Luna Moth July 1 2022

Oren Biderman, Tomer Lahiyani, Noam Lifshitz, Ori Porag. (2022, July 1). Luna Moth Ransomware: The Threat Actors Behind Recent False Subscription Scams. Retrieved June 28, 2024.

Internal MISP references

UUID 115590b2-ab57-432c-900e-000627464a11 which can be used as unique global reference for Sygnia Luna Moth July 1 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-28T00:00:00Z
date_published 2022-07-01T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Luna Moth Ransomware: The Threat Actors Behind Recent False Subscription Scams

Zscaler Lyceum DnsSystem June 2022

Shivtarkar, N. and Kumar, A. (2022, June 9). Lyceum .NET DNS Backdoor. Retrieved June 23, 2022.

Internal MISP references

UUID eb78de14-8044-4466-8954-9ca44a17e895 which can be used as unique global reference for Zscaler Lyceum DnsSystem June 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-23T00:00:00Z
date_published 2022-06-09T00:00:00Z
source MITRE
title Lyceum .NET DNS Backdoor

Kaspersky Lyceum October 2021

Kayal, A. et al. (2021, October). LYCEUM REBORN: COUNTERINTELLIGENCE IN THE MIDDLE EAST. Retrieved June 14, 2022.

Internal MISP references

UUID b3d13a82-c24e-4b47-b47a-7221ad449859 which can be used as unique global reference for Kaspersky Lyceum October 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-14T00:00:00Z
date_published 2021-10-01T00:00:00Z
source MITRE
title LYCEUM REBORN: COUNTERINTELLIGENCE IN THE MIDDLE EAST

CoinTicker 2019

Thomas Reed. (2018, October 29). Mac cryptocurrency ticker app installs backdoors. Retrieved April 23, 2019.

Internal MISP references

UUID 99c53143-6f93-44c9-a874-c1b9e4506fb4 which can be used as unique global reference for CoinTicker 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-23T00:00:00Z
date_published 2018-10-29T00:00:00Z
source MITRE
title Mac cryptocurrency ticker app installs backdoors

ESET Machete July 2019

ESET. (2019, July). MACHETE JUST GOT SHARPER Venezuelan government institutions under attack. Retrieved September 13, 2019.

Internal MISP references

UUID 408d5e33-fcb6-4d21-8be9-7aa5a8bd3385 which can be used as unique global reference for ESET Machete July 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-13T00:00:00Z
date_published 2019-07-01T00:00:00Z
source MITRE, Tidal Cyber
title MACHETE JUST GOT SHARPER Venezuelan government institutions under attack

synack 2016 review

Patrick Wardle. (2017, January 1). Mac Malware of 2016. Retrieved September 21, 2018.

Internal MISP references

UUID 9845ef95-bcc5-4430-8008-1e4a28e13c33 which can be used as unique global reference for synack 2016 review in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-09-21T00:00:00Z
date_published 2017-01-01T00:00:00Z
source MITRE
title Mac Malware of 2016

objsee mac malware 2017

Patrick Wardle. (n.d.). Mac Malware of 2017. Retrieved September 21, 2018.

Internal MISP references

UUID 08227ae5-4086-4c31-83d9-459c3a097754 which can be used as unique global reference for objsee mac malware 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-09-21T00:00:00Z
source MITRE
title Mac Malware of 2017

Unit42 CookieMiner Jan 2019

Chen, y., et al. (2019, January 31). Mac Malware Steals Cryptocurrency Exchanges’ Cookies. Retrieved July 22, 2020.

Internal MISP references

UUID 4605c51d-b36e-4c29-abda-2a97829f6019 which can be used as unique global reference for Unit42 CookieMiner Jan 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-07-22T00:00:00Z
date_published 2019-01-31T00:00:00Z
source MITRE
title Mac Malware Steals Cryptocurrency Exchanges’ Cookies

Unit 42 Mac Crypto Cookies January 2019

Chen, Y., Hu, W., Xu, Z., et. al. (2019, January 31). Mac Malware Steals Cryptocurrency Exchanges’ Cookies. Retrieved October 14, 2019.

Internal MISP references

UUID 0a88e730-8ed2-4983-8f11-2cb2e4abfe3e which can be used as unique global reference for Unit 42 Mac Crypto Cookies January 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-14T00:00:00Z
date_published 2019-01-31T00:00:00Z
source MITRE
title Mac Malware Steals Cryptocurrency Exchanges’ Cookies

MacKeeper Bundlore Apr 2019

Sushko, O. (2019, April 17). macOS Bundlore: Mac Virus Bypassing macOS Security Features. Retrieved June 30, 2020.

Internal MISP references

UUID 4d631c9a-4fd5-43a4-8b78-4219bd371e87 which can be used as unique global reference for MacKeeper Bundlore Apr 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-30T00:00:00Z
date_published 2019-04-17T00:00:00Z
source MITRE
title macOS Bundlore: Mac Virus Bypassing macOS Security Features

SentinelOne Cuckoo Stealer May 2024

Stokes, P. (2024, May 9). macOS Cuckoo Stealer | Ensuring Detection and Defense as New Samples Rapidly Emerge. Retrieved August 20, 2024.

Internal MISP references

UUID b5e0add8-bda6-5cae-85c7-58f7cab1579c which can be used as unique global reference for SentinelOne Cuckoo Stealer May 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-20T00:00:00Z
date_published 2024-05-09T00:00:00Z
source MITRE
title macOS Cuckoo Stealer

MalwareUnicorn macOS Dylib Injection MachO

Amanda Rousseau. (2020, April 4). MacOS Dylib Injection Workshop. Retrieved March 29, 2021.

Internal MISP references

UUID 61aae3a4-317e-4117-a02a-27885709fb07 which can be used as unique global reference for MalwareUnicorn macOS Dylib Injection MachO in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-29T00:00:00Z
date_published 2020-04-04T00:00:00Z
source MITRE
title MacOS Dylib Injection Workshop

macOS Hierarchical File System Overview

Tenon. (n.d.). Retrieved October 12, 2021.

Internal MISP references

UUID 4b8b110a-fc40-4094-a70d-15530bc05fec which can be used as unique global reference for macOS Hierarchical File System Overview in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-12T00:00:00Z
source MITRE
title macOS Hierarchical File System Overview

Add List Remove Login Items Apple Script

kaloprominat. (2013, July 30). macos: manage add list remove login items apple script. Retrieved October 5, 2021.

Internal MISP references

UUID 13773d75-6fc1-4289-bf45-6ee147279052 which can be used as unique global reference for Add List Remove Login Items Apple Script in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-05T00:00:00Z
date_published 2013-07-30T00:00:00Z
source MITRE
title macos: manage add list remove login items apple script

SentinelOne 9 11 2023

Phil Stokes. (2023, September 11). macOS MetaStealer . Retrieved January 1, 2024.

Internal MISP references

UUID 0d015be9-34ba-4c59-9cea-80b76ee89dd0 which can be used as unique global reference for SentinelOne 9 11 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-01T00:00:00Z
date_published 2023-09-11T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title macOS MetaStealer

macOS MS office sandbox escape

Cedric Owens. (2021, May 22). macOS MS Office Sandbox Brain Dump. Retrieved August 20, 2021.

Internal MISP references

UUID 759e81c1-a250-440e-8b52-178bcf5451b9 which can be used as unique global reference for macOS MS office sandbox escape in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-20T00:00:00Z
date_published 2021-05-22T00:00:00Z
source MITRE
title macOS MS Office Sandbox Brain Dump

MDSec macOS JXA and VSCode

Dominic Chell. (2021, January 1). macOS Post-Exploitation Shenanigans with VSCode Extensions. Retrieved April 20, 2021.

Internal MISP references

UUID 979cac34-d447-4e42-b17e-8ab2630bcfec which can be used as unique global reference for MDSec macOS JXA and VSCode in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-20T00:00:00Z
date_published 2021-01-01T00:00:00Z
source MITRE
title macOS Post-Exploitation Shenanigans with VSCode Extensions

SentinelOne macOS Red Team

Phil Stokes. (2019, December 5). macOS Red Team: Calling Apple APIs Without Building Binaries. Retrieved July 17, 2020.

Internal MISP references

UUID 4b05bd7c-22a3-4168-850c-8168700b17ba which can be used as unique global reference for SentinelOne macOS Red Team in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-07-17T00:00:00Z
date_published 2019-12-05T00:00:00Z
source MITRE
title macOS Red Team: Calling Apple APIs Without Building Binaries

Lockboxx ARD 2019

Dan Borges. (2019, July 21). MacOS Red Teaming 206: ARD (Apple Remote Desktop Protocol). Retrieved September 10, 2021.

Internal MISP references

UUID 159f8495-5354-4b93-84cb-a25e56fcff3e which can be used as unique global reference for Lockboxx ARD 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-10T00:00:00Z
date_published 2019-07-21T00:00:00Z
source MITRE
title MacOS Red Teaming 206: ARD (Apple Remote Desktop Protocol)

nixCraft macOS PATH variables

Vivek Gite. (2023, August 22). MacOS – Set / Change $PATH Variable Command. Retrieved September 28, 2023.

Internal MISP references

UUID 83daecf1-8708-56da-aaad-1e7e95c4ea43 which can be used as unique global reference for nixCraft macOS PATH variables in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-28T00:00:00Z
date_published 2023-08-22T00:00:00Z
source MITRE
title MacOS – Set / Change $PATH Variable Command

SensePost MacroLess DDE Oct 2017

Stalmans, E., El-Sherei, S. (2017, October 9). Macro-less Code Exec in MSWord. Retrieved November 21, 2017.

Internal MISP references

UUID 1036fbbb-f731-458a-b38c-42431612c0ad which can be used as unique global reference for SensePost MacroLess DDE Oct 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-21T00:00:00Z
date_published 2017-10-09T00:00:00Z
source MITRE
title Macro-less Code Exec in MSWord

Macro Malware Targets Macs

Yerko Grbic. (2017, February 14). Macro Malware Targets Macs. Retrieved July 8, 2017.

Internal MISP references

UUID d63f3f6a-4486-48a4-b2f8-c2a8d571731a which can be used as unique global reference for Macro Malware Targets Macs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-08T00:00:00Z
date_published 2017-02-14T00:00:00Z
source MITRE
title Macro Malware Targets Macs

alientvault macspy

PETER EWANE. (2017, June 9). MacSpy: OS X RAT as a Service. Retrieved September 21, 2018.

Internal MISP references

UUID 80bb8646-1eb0-442a-aa51-ee3efaf75915 which can be used as unique global reference for alientvault macspy in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-09-21T00:00:00Z
date_published 2017-06-09T00:00:00Z
source MITRE
title MacSpy: OS X RAT as a Service

Reed thiefquest fake ransom

Thomas Reed. (2020, July 7). Mac ThiefQuest malware may not be ransomware after all. Retrieved March 18, 2021.

Internal MISP references

UUID b265ef93-c1fb-440d-a9e0-89cf25a3de05 which can be used as unique global reference for Reed thiefquest fake ransom in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-18T00:00:00Z
date_published 2020-07-07T00:00:00Z
source MITRE
title Mac ThiefQuest malware may not be ransomware after all

reed thiefquest ransomware analysis

Thomas Reed. (2020, July 7). Mac ThiefQuest malware may not be ransomware after all. Retrieved March 22, 2021.

Internal MISP references

UUID 47b49df4-34f1-4a89-9983-e8bc19aadf8c which can be used as unique global reference for reed thiefquest ransomware analysis in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-22T00:00:00Z
date_published 2020-07-07T00:00:00Z
source MITRE
title Mac ThiefQuest malware may not be ransomware after all

Malwarebytes 9 6 2023

Jerome Segura. (2023, September 6). Mac users targeted in new malvertising campaign delivering Atomic Stealer. Retrieved April 19, 2024.

Internal MISP references

UUID 5f2f6a12-26c5-4c74-98ad-48b67379a716 which can be used as unique global reference for Malwarebytes 9 6 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-19T00:00:00Z
date_published 2023-09-06T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Mac users targeted in new malvertising campaign delivering Atomic Stealer

Objective See Green Lambert for OSX Oct 2021

Sandvik, Runa. (2021, October 1). Made In America: Green Lambert for OS X. Retrieved March 21, 2022.

Internal MISP references

UUID fad94973-eafa-4fdb-b7aa-22c21d894f81 which can be used as unique global reference for Objective See Green Lambert for OSX Oct 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-21T00:00:00Z
date_published 2021-10-01T00:00:00Z
source MITRE
title Made In America: Green Lambert for OS X

Trend Micro FIN6 October 2019

Chen, J. (2019, October 10). Magecart Card Skimmers Injected Into Online Shops. Retrieved September 9, 2020.

Internal MISP references

UUID edb9395d-c8a2-46a5-8bf4-91b1d8fe6e3b which can be used as unique global reference for Trend Micro FIN6 October 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-09T00:00:00Z
date_published 2019-10-10T00:00:00Z
source MITRE
title Magecart Card Skimmers Injected Into Online Shops

Unit 42 Magic Hound Feb 2017

Lee, B. and Falcone, R. (2017, February 15). Magic Hound Campaign Attacks Saudi Targets. Retrieved December 27, 2017.

Internal MISP references

UUID f1ef9868-3ddb-4289-aa92-481c35517920 which can be used as unique global reference for Unit 42 Magic Hound Feb 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-27T00:00:00Z
date_published 2017-02-15T00:00:00Z
source MITRE
title Magic Hound Campaign Attacks Saudi Targets

AMD Magic Packet

AMD. (1995, November 1). Magic Packet Technical White Paper. Retrieved February 17, 2021.

Internal MISP references

UUID 06d36dea-e13d-48c4-b6d6-0c175c379f5b which can be used as unique global reference for AMD Magic Packet in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-17T00:00:00Z
date_published 1995-11-01T00:00:00Z
source MITRE
title Magic Packet Technical White Paper

MagicWeb

Microsoft Threat Intelligence Center, Microsoft Detection and Response Team, Microsoft 365 Defender Research Team . (2022, August 24). MagicWeb: NOBELIUM’s post-compromise trick to authenticate as anyone. Retrieved September 28, 2022.

Internal MISP references

UUID 5b728693-37e8-4100-ac82-b70945113e07 which can be used as unique global reference for MagicWeb in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-28T00:00:00Z
date_published 2022-08-24T00:00:00Z
source MITRE
title MagicWeb: NOBELIUM’s post-compromise trick to authenticate as anyone

MAGNET GOBLIN

Check Point Research. (2024, March 8). MAGNET GOBLIN TARGETS PUBLICLY FACING SERVERS USING 1-DAY VULNERABILITIES. Retrieved March 27, 2024.

Internal MISP references

UUID 955b6449-4cd5-5512-a5f3-2bcb91def3ef which can be used as unique global reference for MAGNET GOBLIN in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-27T00:00:00Z
date_published 2024-03-08T00:00:00Z
source MITRE
title MAGNET GOBLIN TARGETS PUBLICLY FACING SERVERS USING 1-DAY VULNERABILITIES

FireEye FIN7 Oct 2019

Carr, N, et all. (2019, October 10). Mahalo FIN7: Responding to the Criminal Operators’ New Tools and Techniques. Retrieved October 11, 2019.

Internal MISP references

UUID df8886d1-fbd7-4c24-8ab1-6261923dee96 which can be used as unique global reference for FireEye FIN7 Oct 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-11T00:00:00Z
date_published 2019-10-10T00:00:00Z
source MITRE
title Mahalo FIN7: Responding to the Criminal Operators’ New Tools and Techniques

Microsoft Mail Flow Rules 2023

Microsoft. (2023, February 22). Mail flow rules (transport rules) in Exchange Online. Retrieved March 13, 2023.

Internal MISP references

UUID 421093d7-6ac8-5ebc-9a04-1c65bdce0980 which can be used as unique global reference for Microsoft Mail Flow Rules 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-13T00:00:00Z
date_published 2023-02-22T00:00:00Z
source MITRE
title Mail flow rules (transport rules) in Exchange Online

GitHub MailSniper

Bullock, B., . (2018, November 20). MailSniper. Retrieved October 4, 2019.

Internal MISP references

UUID 50595548-b0c6-49d1-adab-43c8969ae716 which can be used as unique global reference for GitHub MailSniper in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-04T00:00:00Z
date_published 2018-11-20T00:00:00Z
source MITRE
title MailSniper

mailx man page

Michael Kerrisk. (2021, August 27). mailx(1p) — Linux manual page. Retrieved June 10, 2022.

Internal MISP references

UUID 6813a1a2-fbe0-4809-aad7-734997e59bea which can be used as unique global reference for mailx man page in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-10T00:00:00Z
date_published 2021-08-27T00:00:00Z
source MITRE
title mailx(1p) — Linux manual page

enigma0x3 normal.dotm

Nelson, M. (2014, January 23). Maintaining Access with normal.dotm. Retrieved July 3, 2017.

Internal MISP references

UUID b8339d48-699d-4043-8197-1f0435a8dca5 which can be used as unique global reference for enigma0x3 normal.dotm in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-03T00:00:00Z
date_published 2014-01-23T00:00:00Z
source MITRE
title Maintaining Access with normal.dotm

NetSPI Startup Stored Procedures

Sutherland, S. (2016, March 7). Maintaining Persistence via SQL Server – Part 1: Startup Stored Procedures. Retrieved September 12, 2024.

Internal MISP references

UUID afe89472-ac42-4a0d-b398-5ed6a5dee74f which can be used as unique global reference for NetSPI Startup Stored Procedures in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2016-03-07T00:00:00Z
source MITRE
title Maintaining Persistence via SQL Server – Part 1: Startup Stored Procedures

Cofense-redirect

Raymond, Nathaniel. (2023, August 16). Major Energy Company Targeted in Large QR Code Phishing Campaign. Retrieved January 17, 2024.

Internal MISP references

UUID 450da173-3573-5502-ab53-6d6b9955714d which can be used as unique global reference for Cofense-redirect in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-17T00:00:00Z
date_published 2023-08-16T00:00:00Z
source MITRE
title Major Energy Company Targeted in Large QR Code Phishing Campaign

QR-cofense

Nathaniel Raymond. (2023, August 16). Major Energy Company Targeted in Large QR Code Phishing Campaign. Retrieved February 13, 2024.

Internal MISP references

UUID eda8270f-c76f-5d01-b45f-74246945ec50 which can be used as unique global reference for QR-cofense in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-13T00:00:00Z
date_published 2023-08-16T00:00:00Z
source MITRE
title Major Energy Company Targeted in Large QR Code Phishing Campaign

Makecab.exe - LOLBAS Project

LOLBAS. (2018, May 25). Makecab.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 6473e36b-b5ad-4254-b46d-38c53ccbe446 which can be used as unique global reference for Makecab.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Makecab.exe

Infoblox Lokibot January 2019

Hoang, M. (2019, January 31). Malicious Activity Report: Elements of Lokibot Infostealer. Retrieved May 15, 2020.

Internal MISP references

UUID 17ab0f84-a062-4c4f-acf9-e0b8f81c3cda which can be used as unique global reference for Infoblox Lokibot January 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-15T00:00:00Z
date_published 2019-01-31T00:00:00Z
source MITRE
title Malicious Activity Report: Elements of Lokibot Infostealer

U.S. CISA PaperCut May 2023

Cybersecurity and Infrastructure Security Agency. (2023, May 11). Malicious Actors Exploit CVE-2023-27350 in PaperCut MF and NG. Retrieved May 17, 2023.

Internal MISP references

UUID b5ef2b97-7cc7-470b-ae97-a45dc4af32a6 which can be used as unique global reference for U.S. CISA PaperCut May 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-17T00:00:00Z
date_published 2023-05-11T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Malicious Actors Exploit CVE-2023-27350 in PaperCut MF and NG

GoBotKR

Zuzana Hromcová. (2019, July 8). Malicious campaign targets South Korean users with backdoor‑laced torrents. Retrieved March 31, 2022.

Internal MISP references

UUID 7d70675c-5520-4c81-8880-912ce918c4b5 which can be used as unique global reference for GoBotKR in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-31T00:00:00Z
date_published 2019-07-08T00:00:00Z
source MITRE
title Malicious campaign targets South Korean users with backdoor‑laced torrents

ICEBRG Chrome Extensions

De Tore, M., Warner, J. (2018, January 15). MALICIOUS CHROME EXTENSIONS ENABLE CRIMINALS TO IMPACT OVER HALF A MILLION USERS AND GLOBAL BUSINESSES. Retrieved January 17, 2018.

Internal MISP references

UUID 459bfd4a-7a9b-4d65-b574-acb221428dad which can be used as unique global reference for ICEBRG Chrome Extensions in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-17T00:00:00Z
date_published 2018-01-15T00:00:00Z
source MITRE
title MALICIOUS CHROME EXTENSIONS ENABLE CRIMINALS TO IMPACT OVER HALF A MILLION USERS AND GLOBAL BUSINESSES

McAfee Malicious Doc Targets Pyeongchang Olympics

Saavedra-Morales, J., Sherstobitoff, R. (2018, January 6). Malicious Document Targets Pyeongchang Olympics. Retrieved April 10, 2018.

Internal MISP references

UUID e6b5c261-86c1-4b6b-8a5e-c6a454554588 which can be used as unique global reference for McAfee Malicious Doc Targets Pyeongchang Olympics in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-10T00:00:00Z
date_published 2018-01-06T00:00:00Z
source MITRE
title Malicious Document Targets Pyeongchang Olympics

Fortinet Fareit

Salvio, J., Joven, R. (2016, December 16). Malicious Macro Bypasses UAC to Elevate Privilege for Fareit Malware. Retrieved December 27, 2016.

Internal MISP references

UUID d06223d7-2d86-41c6-af23-50865a1810c0 which can be used as unique global reference for Fortinet Fareit in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-12-27T00:00:00Z
date_published 2016-12-16T00:00:00Z
source MITRE
title Malicious Macro Bypasses UAC to Elevate Privilege for Fareit Malware

Microsoft OAuth Spam 2022

Microsoft. (2023, September 22). Malicious OAuth applications abuse cloud email services to spread spam. Retrieved March 13, 2023.

Internal MISP references

UUID 086c06a0-3960-5fa8-b034-cef37a3aee90 which can be used as unique global reference for Microsoft OAuth Spam 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-13T00:00:00Z
date_published 2023-09-22T00:00:00Z
source MITRE
title Malicious OAuth applications abuse cloud email services to spread spam

Zscaler Kasidet

Yadav, A., et al. (2016, January 29). Malicious Office files dropping Kasidet and Dridex. Retrieved March 24, 2016.

Internal MISP references

UUID 63077223-4711-4c1e-9fb2-3995c7e03cf2 which can be used as unique global reference for Zscaler Kasidet in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-03-24T00:00:00Z
date_published 2016-01-29T00:00:00Z
source MITRE
title Malicious Office files dropping Kasidet and Dridex

SilentBreak Outlook Rules

Landers, N. (2015, December 4). Malicious Outlook Rules. Retrieved February 4, 2019.

Internal MISP references

UUID a2ad0658-7c12-4f58-b7bf-6300eacb4a8f which can be used as unique global reference for SilentBreak Outlook Rules in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-04T00:00:00Z
date_published 2015-12-04T00:00:00Z
source MITRE
title Malicious Outlook Rules

Webroot PHP 2011

Brandt, Andrew. (2011, February 22). Malicious PHP Scripts on the Rise. Retrieved October 3, 2018.

Internal MISP references

UUID 6d0da707-2328-4b43-a112-570c1fd5dec1 which can be used as unique global reference for Webroot PHP 2011 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-10-03T00:00:00Z
date_published 2011-02-22T00:00:00Z
source MITRE
title Malicious PHP Scripts on the Rise

Malware Analysis Report 10135536-G

US-CERT. (2018, February 6). Malware Analysis Report 10135536-G. Retrieved August 15, 2024.

Internal MISP references

UUID a1a4f554-8320-53ec-abe0-ae9675b2f1d4 which can be used as unique global reference for Malware Analysis Report 10135536-G in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-15T00:00:00Z
date_published 2018-02-06T00:00:00Z
source MITRE
title Malware Analysis Report 10135536-G

CISA ComRAT Oct 2020

CISA. (2020, October 29). Malware Analysis Report (AR20-303A). Retrieved December 9, 2020.

Internal MISP references

UUID 6ba168aa-ca07-4856-911f-fa48da54e471 which can be used as unique global reference for CISA ComRAT Oct 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-09T00:00:00Z
date_published 2020-10-29T00:00:00Z
source MITRE
title Malware Analysis Report (AR20-303A)

Malware Analysis Report ComRAT

CISA. (2020, October 29). Malware Analysis Report (AR20-303A) MAR-10310246-2.v1 – PowerShell Script: ComRAT. Retrieved September 30, 2022.

Internal MISP references

UUID 9d81e2c8-09d5-4542-9c60-13a22a5a0073 which can be used as unique global reference for Malware Analysis Report ComRAT in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-30T00:00:00Z
date_published 2020-10-29T00:00:00Z
source MITRE
title Malware Analysis Report (AR20-303A) MAR-10310246-2.v1 – PowerShell Script: ComRAT

CISA Zebrocy Oct 2020

CISA. (2020, October 29). Malware Analysis Report (AR20-303B). Retrieved December 9, 2020.

Internal MISP references

UUID b7518c4d-6c10-43d2-8e57-d354fb8d4a99 which can be used as unique global reference for CISA Zebrocy Oct 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-09T00:00:00Z
date_published 2020-10-29T00:00:00Z
source MITRE
title Malware Analysis Report (AR20-303B)

CISA Supernova Jan 2021

CISA. (2021, January 27). Malware Analysis Report (AR21-027A). Retrieved February 22, 2021.

Internal MISP references

UUID ce300d75-8351-4d7c-b280-7d5fbe17f9bb which can be used as unique global reference for CISA Supernova Jan 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-22T00:00:00Z
date_published 2021-01-27T00:00:00Z
source MITRE
title Malware Analysis Report (AR21-027A)

UK NCSC Jaguar Tooth April 18 2023

National Cyber Security Centre. (2023, April 18). Malware Analysis Report: Jaguar Tooth. Retrieved August 23, 2023.

Internal MISP references

UUID 954e0cb9-9a93-4cac-af84-c6989b973fac which can be used as unique global reference for UK NCSC Jaguar Tooth April 18 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-23T00:00:00Z
date_published 2023-04-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Malware Analysis Report: Jaguar Tooth

US-CERT SHARPKNOT June 2018

US-CERT. (2018, March 09). Malware Analysis Report (MAR) - 10135536.11.WHITE. Retrieved June 13, 2018.

Internal MISP references

UUID b6bb568f-de15-4ace-8075-c08e7835fea2 which can be used as unique global reference for US-CERT SHARPKNOT June 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-06-13T00:00:00Z
date_published 2018-03-09T00:00:00Z
source MITRE
title Malware Analysis Report (MAR) - 10135536.11.WHITE

US-CERT Bankshot Dec 2017

US-CERT. (2017, December 13). Malware Analysis Report (MAR) - 10135536-B. Retrieved July 17, 2018.

Internal MISP references

UUID af2a708d-f96f-49e7-9351-1ea703e614a0 which can be used as unique global reference for US-CERT Bankshot Dec 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-17T00:00:00Z
date_published 2017-12-13T00:00:00Z
source MITRE
title Malware Analysis Report (MAR) - 10135536-B

MAR10135536-B

US-CERT. (2017, December 13). Malware Analysis Report (MAR) - 10135536-B. Retrieved August 15, 2024.

Internal MISP references

UUID 869fbc47-55f8-5bab-bc62-e507b6be5a16 which can be used as unique global reference for MAR10135536-B in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-15T00:00:00Z
date_published 2017-12-13T00:00:00Z
source MITRE
title Malware Analysis Report (MAR) - 10135536-B

US-CERT Volgmer 2 Nov 2017

US-CERT. (2017, November 01). Malware Analysis Report (MAR) - 10135536-D. Retrieved July 16, 2018.

Internal MISP references

UUID a3a5c26c-0d57-4ffc-ae28-3fe828e08fcb which can be used as unique global reference for US-CERT Volgmer 2 Nov 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-16T00:00:00Z
date_published 2017-11-01T00:00:00Z
source MITRE
title Malware Analysis Report (MAR) - 10135536-D

MAR10135536-F

US-CERT. (2018, February 5). Malware Analysis Report (MAR) - 10135536-F. Retrieved August 15, 2024.

Internal MISP references

UUID f8089086-bbd5-5b39-95f7-6f09bc30eabf which can be used as unique global reference for MAR10135536-F in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-15T00:00:00Z
date_published 2018-02-05T00:00:00Z
source MITRE
title Malware Analysis Report (MAR) - 10135536-F

US-CERT HARDRAIN March 2018

US-CERT. (2018, February 05). Malware Analysis Report (MAR) - 10135536-F. Retrieved June 11, 2018.

Internal MISP references

UUID ffc17fa5-e7d3-4592-b47b-e12ced0e62a4 which can be used as unique global reference for US-CERT HARDRAIN March 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-06-11T00:00:00Z
date_published 2018-02-05T00:00:00Z
source MITRE
title Malware Analysis Report (MAR) - 10135536-F

US-CERT BADCALL

US-CERT. (2018, February 06). Malware Analysis Report (MAR) - 10135536-G. Retrieved June 7, 2018.

Internal MISP references

UUID aeb4ff70-fa98-474c-8337-9e50d07ee378 which can be used as unique global reference for US-CERT BADCALL in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-06-07T00:00:00Z
date_published 2018-02-06T00:00:00Z
source MITRE
title Malware Analysis Report (MAR) - 10135536-G

CISA MAR SLOTHFULMEDIA October 2020

DHS/CISA, Cyber National Mission Force. (2020, October 1). Malware Analysis Report (MAR) MAR-10303705-1.v1 – Remote Access Trojan: SLOTHFULMEDIA. Retrieved October 2, 2020.

Internal MISP references

UUID 57c3256c-0d24-4647-9037-fefe1c88ad61 which can be used as unique global reference for CISA MAR SLOTHFULMEDIA October 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-02T00:00:00Z
date_published 2020-10-01T00:00:00Z
source MITRE
title Malware Analysis Report (MAR) MAR-10303705-1.v1 – Remote Access Trojan: SLOTHFULMEDIA

Kroll RawPOS Jan 2017

Nesbit, B. and Ackerman, D. (2017, January). Malware Analysis Report - RawPOS Malware: Deconstructing an Intruder’s Toolkit. Retrieved October 4, 2017.

Internal MISP references

UUID cbbfffb9-c378-4e57-a2af-e76e6014ed57 which can be used as unique global reference for Kroll RawPOS Jan 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-10-04T00:00:00Z
date_published 2017-01-01T00:00:00Z
source MITRE
title Malware Analysis Report - RawPOS Malware: Deconstructing an Intruder’s Toolkit

VMRay OSAMiner dynamic analysis 2021

VMRAY. (2021, January 14). Malware Analysis Spotlight: OSAMiner Uses Run-Only AppleScripts to Evade Detection. Retrieved October 4, 2022.

Internal MISP references

UUID 47a5d32d-e6a5-46c2-898a-e45dc42371be which can be used as unique global reference for VMRay OSAMiner dynamic analysis 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-10-04T00:00:00Z
date_published 2021-01-14T00:00:00Z
source MITRE
title Malware Analysis Spotlight: OSAMiner Uses Run-Only AppleScripts to Evade Detection

Rapid7 Fake W2 July 2024

Elkins, T. (2024, July 24). Malware Campaign Lures Users With Fake W2 Form. Retrieved September 13, 2024.

Internal MISP references

UUID 10b5e150-26fa-5024-bd89-87f432b8d5f0 which can be used as unique global reference for Rapid7 Fake W2 July 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-13T00:00:00Z
date_published 2024-07-24T00:00:00Z
source MITRE
title Malware Campaign Lures Users With Fake W2 Form

Kandji Cuckoo April 2024

Kohler, A. and Lopez, C. (2024, April 30). Malware: Cuckoo Behaves Like Cross Between Infostealer and Spyware. Retrieved August 20, 2024.

Internal MISP references

UUID 90c4e23a-e6e7-511d-911c-1f8b64253aff which can be used as unique global reference for Kandji Cuckoo April 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-20T00:00:00Z
date_published 2024-04-30T00:00:00Z
source MITRE
title Malware: Cuckoo Behaves Like Cross Between Infostealer and Spyware

Arch Linux Package Systemd Compromise BleepingComputer 10JUL2018

Catalin Cimpanu. (2018, July 10). Malware Found in Arch Linux AUR Package Repository. Retrieved April 23, 2019.

Internal MISP references

UUID 0654dabf-e885-45bf-8a8e-2b512ff4bf46 which can be used as unique global reference for Arch Linux Package Systemd Compromise BleepingComputer 10JUL2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-23T00:00:00Z
date_published 2018-07-10T00:00:00Z
source MITRE
title Malware Found in Arch Linux AUR Package Repository

Alperovitch Malware

Alperovitch, D. (2014, October 31). Malware-Free Intrusions. Retrieved November 4, 2014.

Internal MISP references

UUID b6635fd7-40ec-4481-bb0a-c1d3391854a7 which can be used as unique global reference for Alperovitch Malware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-04T00:00:00Z
date_published 2014-10-31T00:00:00Z
source MITRE
title Malware-Free Intrusions

Chrome Extension C2 Malware

Kjaer, M. (2016, July 18). Malware in the browser: how you might get hacked by a Chrome extension. Retrieved September 12, 2024.

Internal MISP references

UUID b0fdf9c7-614b-4269-ba3e-7d8b02aa8502 which can be used as unique global reference for Chrome Extension C2 Malware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2016-07-18T00:00:00Z
source MITRE
title Malware in the browser: how you might get hacked by a Chrome extension

FireEye Kevin Mandia Guardrails

Shoorbajee, Z. (2018, June 1). Playing nice? FireEye CEO says U.S. malware is more restrained than adversaries'. Retrieved January 17, 2019.

Internal MISP references

UUID 0c518eec-a94e-42a7-8eb7-527ae3e279b6 which can be used as unique global reference for FireEye Kevin Mandia Guardrails in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-01-17T00:00:00Z
source MITRE
title malware is more restrained than adversaries'

Karl Greenberg. (2023, April 20). Malware is proliferating, but detection measures bear fruit: Mandiant. Retrieved September 21, 2023.

Internal MISP references

UUID 1347e21e-e77d-464d-bbbe-dc4d3f2b07a1 which can be used as unique global reference for TechRepublic M-Trends 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-21T00:00:00Z
date_published 2023-04-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Malware is proliferating, but detection measures bear fruit: Mandiant

CTU BITS Malware June 2016

Counter Threat Unit Research Team. (2016, June 6). Malware Lingers with BITS. Retrieved January 12, 2018.

Internal MISP references

UUID db98b15c-399d-4a4c-8fa6-5a4ff38c3853 which can be used as unique global reference for CTU BITS Malware June 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-12T00:00:00Z
date_published 2016-06-06T00:00:00Z
source MITRE
title Malware Lingers with BITS

CyberBit System Calls

Gavriel, H. (2018, November 27). Malware Mitigation when Direct System Calls are Used. Retrieved September 29, 2021.

Internal MISP references

UUID c13cf528-2a7d-4a32-aee2-db5db2f30298 which can be used as unique global reference for CyberBit System Calls in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-29T00:00:00Z
date_published 2018-11-27T00:00:00Z
source MITRE
title Malware Mitigation when Direct System Calls are Used

Malware Monday VBE

Bromiley, M. (2016, December 27). Malware Monday: VBScript and VBE Files. Retrieved March 17, 2023.

Internal MISP references

UUID 9b52a72b-938a-5eb6-a3b7-5a925657f0a3 which can be used as unique global reference for Malware Monday VBE in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-17T00:00:00Z
date_published 2016-12-27T00:00:00Z
source MITRE
title Malware Monday: VBScript and VBE Files

RSAC 2015 San Francisco Patrick Wardle

Wardle, P. (2015, April). Malware Persistence on OS X Yosemite. Retrieved April 6, 2018.

Internal MISP references

UUID 7e3f3dda-c407-4b06-a6b0-8b72c4dad6e6 which can be used as unique global reference for RSAC 2015 San Francisco Patrick Wardle in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-06T00:00:00Z
date_published 2015-04-01T00:00:00Z
source MITRE
title Malware Persistence on OS X Yosemite

Malware Persistence on OS X

Patrick Wardle. (2015). Malware Persistence on OS X Yosemite. Retrieved July 10, 2017.

Internal MISP references

UUID d4e3b066-c439-4284-ba28-3b8bd8ec270e which can be used as unique global reference for Malware Persistence on OS X in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-10T00:00:00Z
date_published 2015-01-01T00:00:00Z
source MITRE
title Malware Persistence on OS X Yosemite

FireEye Hijacking July 2010

Harbour, N. (2010, July 15). Malware Persistence without the Windows Registry. Retrieved November 17, 2020.

Internal MISP references

UUID 536f9987-f3b6-4d5f-8a6b-32a0c651500d which can be used as unique global reference for FireEye Hijacking July 2010 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-17T00:00:00Z
date_published 2010-07-15T00:00:00Z
source MITRE
title Malware Persistence without the Windows Registry

Mondok Windows PiggyBack BITS May 2007

Mondok, M. (2007, May 11). Malware piggybacks on Windows’ Background Intelligent Transfer Service. Retrieved January 12, 2018.

Internal MISP references

UUID 7dd03a92-11b8-4b8a-9d34-082ecf09a6e4 which can be used as unique global reference for Mondok Windows PiggyBack BITS May 2007 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-12T00:00:00Z
date_published 2007-05-11T00:00:00Z
source MITRE
title Malware piggybacks on Windows’ Background Intelligent Transfer Service

Conficker Nuclear Power Plant

Cimpanu, C. (2016, April 26). Malware Shuts Down German Nuclear Power Plant on Chernobyl's 30th Anniversary. Retrieved February 18, 2021.

Internal MISP references

UUID 83b8c3c4-d67a-48bd-8614-1c703a8d969b which can be used as unique global reference for Conficker Nuclear Power Plant in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-18T00:00:00Z
date_published 2016-04-26T00:00:00Z
source MITRE
title Malware Shuts Down German Nuclear Power Plant on Chernobyl's 30th Anniversary

MMPC ISAPI Filter 2012

MMPC. (2012, October 3). Malware signed with the Adobe code signing certificate. Retrieved June 3, 2021.

Internal MISP references

UUID ef412bcd-54be-4972-888c-f5a2cdfb8d02 which can be used as unique global reference for MMPC ISAPI Filter 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-03T00:00:00Z
date_published 2012-10-03T00:00:00Z
source MITRE
title Malware signed with the Adobe code signing certificate

Leonardo Turla Penquin May 2020

Leonardo. (2020, May 29). MALWARE TECHNICAL INSIGHT TURLA “Penquin_x64”. Retrieved March 11, 2021.

Internal MISP references

UUID 09d8bb54-6fa5-4842-98aa-6e9656a19092 which can be used as unique global reference for Leonardo Turla Penquin May 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-11T00:00:00Z
date_published 2020-05-29T00:00:00Z
source MITRE
title MALWARE TECHNICAL INSIGHT TURLA “Penquin_x64”

Malware System Language Check

Pierre-Marc Bureau. (2009, January 15). Malware Trying to Avoid Some Countries. Retrieved August 18, 2021.

Internal MISP references

UUID 3d4c5366-038a-453e-b803-a172b95da5f7 which can be used as unique global reference for Malware System Language Check in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-18T00:00:00Z
date_published 2009-01-15T00:00:00Z
source MITRE
title Malware Trying to Avoid Some Countries

JPCert TSCookie March 2018

Tomonaga, S. (2018, March 6). Malware “TSCookie”. Retrieved May 6, 2020.

Internal MISP references

UUID ff1717f7-0d2e-4947-87d7-44576affe9f8 which can be used as unique global reference for JPCert TSCookie March 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-06T00:00:00Z
date_published 2018-03-06T00:00:00Z
source MITRE
title Malware “TSCookie”

Symantec BITS May 2007

Florio, E. (2007, May 9). Malware Update with Windows Update. Retrieved January 12, 2018.

Internal MISP references

UUID e5962c87-0d42-46c2-8757-91f264fc570f which can be used as unique global reference for Symantec BITS May 2007 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-12T00:00:00Z
date_published 2007-05-09T00:00:00Z
source MITRE
title Malware Update with Windows Update

JPCert BlackTech Malware September 2019

Tomonaga, S.. (2019, September 18). Malware Used by BlackTech after Network Intrusion. Retrieved May 6, 2020.

Internal MISP references

UUID 26f44bde-f723-4854-8acc-3d95e5fa764a which can be used as unique global reference for JPCert BlackTech Malware September 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-06T00:00:00Z
date_published 2019-09-18T00:00:00Z
source MITRE
title Malware Used by BlackTech after Network Intrusion

Unit 42 Rocke January 2019

Xingyu, J.. (2019, January 17). Malware Used by Rocke Group Evolves to Evade Detection by Cloud Security Products. Retrieved May 26, 2020.

Internal MISP references

UUID facf686b-a5a9-4c85-bb46-f56a434d3d78 which can be used as unique global reference for Unit 42 Rocke January 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-26T00:00:00Z
date_published 2019-01-17T00:00:00Z
source MITRE
title Malware Used by Rocke Group Evolves to Evade Detection by Cloud Security Products

Azure Subscription Policies

Microsoft Azure. (2024, March 21). Manage Azure subscription policies. Retrieved September 25, 2024.

Internal MISP references

UUID e20ff2ea-df45-545a-bc99-32e35027472e which can be used as unique global reference for Azure Subscription Policies in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-25T00:00:00Z
date_published 2024-03-21T00:00:00Z
source MITRE
title Manage Azure subscription policies

Manage-bde.wsf - LOLBAS Project

LOLBAS. (2018, May 25). Manage-bde.wsf. Retrieved December 4, 2023.

Internal MISP references

UUID 74d5483e-2268-464c-a048-bb1f25bbfc4f which can be used as unique global reference for Manage-bde.wsf - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Manage-bde.wsf

Microsoft Manage Device Identities

Microsoft. (2022, February 18). Manage device identities by using the Azure portal. Retrieved April 13, 2022.

Internal MISP references

UUID 91aa3a4a-a852-40db-b6ec-68504670cfa6 which can be used as unique global reference for Microsoft Manage Device Identities in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-13T00:00:00Z
date_published 2022-02-18T00:00:00Z
source MITRE
title Manage device identities by using the Azure portal

Microsoft MOF May 2018

Satran, M. (2018, May 30). Managed Object Format (MOF). Retrieved January 24, 2020.

Internal MISP references

UUID 1d1da9ad-c995-4040-8103-b51af9d8bac3 which can be used as unique global reference for Microsoft MOF May 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-01-24T00:00:00Z
date_published 2018-05-30T00:00:00Z
source MITRE
title Managed Object Format (MOF)

Microsoft Inbox Rules

Microsoft. (n.d.). Manage email messages by using rules. Retrieved June 11, 2021.

Internal MISP references

UUID 91ce21f7-4cd5-4a75-a533-45d052a11c5d which can be used as unique global reference for Microsoft Inbox Rules in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-11T00:00:00Z
source MITRE
title Manage email messages by using rules

Google Workspace External Sharing

Google. (n.d.). Manage external sharing for your organization. Retrieved March 4, 2024.

Internal MISP references

UUID 0cc85d20-f47c-52da-8391-83d630e744b9 which can be used as unique global reference for Google Workspace External Sharing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-04T00:00:00Z
source MITRE
title Manage external sharing for your organization

Google Cloud Just in Time Access 2023

Google Cloud. (n.d.). Manage just-in-time privileged access to projects. Retrieved September 21, 2023.

Internal MISP references

UUID 797c6051-9dff-531b-8438-d306bdf46720 which can be used as unique global reference for Google Cloud Just in Time Access 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-21T00:00:00Z
source MITRE
title Manage just-in-time privileged access to projects

Microsoft Manage Mail Flow Rules 2023

Microsoft. (2023, February 22). Manage mail flow rules in Exchange Online. Retrieved March 13, 2023.

Internal MISP references

UUID 1d5d7353-7d9d-522a-a0aa-6f4aa0886ca1 which can be used as unique global reference for Microsoft Manage Mail Flow Rules 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-13T00:00:00Z
date_published 2023-02-22T00:00:00Z
source MITRE
title Manage mail flow rules in Exchange Online

Office 365 Partner Relationships

Microsoft. (2022, March 4). Manage partner relationships. Retrieved May 27, 2022.

Internal MISP references

UUID 3d794f31-c3b4-4e0b-8558-b944d6616676 which can be used as unique global reference for Office 365 Partner Relationships in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-27T00:00:00Z
date_published 2022-03-04T00:00:00Z
source MITRE
title Manage partner relationships

Microsoft 365 External Sharing

Microsoft. (2023, October 11). Manage sharing settings for SharePoint and OneDrive in Microsoft 365. Retrieved March 4, 2024.

Internal MISP references

UUID 69154fdc-3540-5c31-8285-f7795db45d7f which can be used as unique global reference for Microsoft 365 External Sharing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-04T00:00:00Z
date_published 2023-10-11T00:00:00Z
source MITRE
title Manage sharing settings for SharePoint and OneDrive in Microsoft 365

TechNet Trusted Publishers

Microsoft. (n.d.). Manage Trusted Publishers. Retrieved March 31, 2016.

Internal MISP references

UUID e355ae20-4ada-49f3-a097-744838d6ff7d which can be used as unique global reference for TechNet Trusted Publishers in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-03-31T00:00:00Z
source MITRE
title Manage Trusted Publishers

Microsoft Enable Cred Guard April 2017

Lich, B., Tobin, J., Hall, J. (2017, April 5). Manage Windows Defender Credential Guard. Retrieved November 27, 2017.

Internal MISP references

UUID dc95771b-db84-43ae-b9ee-6f0ef3f1c93d which can be used as unique global reference for Microsoft Enable Cred Guard April 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-27T00:00:00Z
date_published 2017-04-05T00:00:00Z
source MITRE
title Manage Windows Defender Credential Guard

Outlook File Sizes

N. O'Bryan. (2018, May 30). Managing Outlook Cached Mode and OST File Sizes. Retrieved February 19, 2020.

Internal MISP references

UUID 6fbbb53f-cd4b-4ce1-942d-5cadb907cf86 which can be used as unique global reference for Outlook File Sizes in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-19T00:00:00Z
date_published 2018-05-30T00:00:00Z
source MITRE
title Managing Outlook Cached Mode and OST File Sizes

AWS Storage Lifecycles

AWS. (n.d.). Managing the lifecycle of objects. Retrieved September 25, 2024.

Internal MISP references

UUID 2eec4264-6139-5b81-8190-2ea438594412 which can be used as unique global reference for AWS Storage Lifecycles in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-25T00:00:00Z
source MITRE
title Managing the lifecycle of objects

Microsoft Managing WebDAV Security

Microsoft. (n.d.). Managing WebDAV Security (IIS 6.0). Retrieved December 21, 2017.

Internal MISP references

UUID eeb7cd82-b116-4989-b3fa-968a23f839f3 which can be used as unique global reference for Microsoft Managing WebDAV Security in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-21T00:00:00Z
source MITRE
title Managing WebDAV Security (IIS 6.0)

Mandiant. (2011, January 27). Mandiant M-Trends 2011. Retrieved January 10, 2016.

Internal MISP references

UUID 563be052-29ac-4625-927d-84e475ef848e which can be used as unique global reference for Mandiant M Trends 2011 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-10T00:00:00Z
date_published 2011-01-27T00:00:00Z
source MITRE
title Mandiant M-Trends 2011

Mandiant. (2016, February 25). Mandiant M-Trends 2016. Retrieved March 5, 2019.

Internal MISP references

UUID f769a3ac-4330-46b7-bed8-61697e22cd24 which can be used as unique global reference for Mandiant M Trends 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-05T00:00:00Z
date_published 2016-02-25T00:00:00Z
source MITRE
title Mandiant M-Trends 2016

FireEye APT35 2018

Mandiant. (2018). Mandiant M-Trends 2018. Retrieved July 9, 2018.

Internal MISP references

UUID 71d3db50-4a20-4d8e-a640-4670d642205c which can be used as unique global reference for FireEye APT35 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-09T00:00:00Z
date_published 2018-01-01T00:00:00Z
source MITRE, Tidal Cyber
title Mandiant M-Trends 2018

Mandiant WMI

Mandiant. (n.d.). Retrieved February 13, 2024.

Internal MISP references

UUID 8d237948-7b10-5055-b9e6-52e6cab16f32 which can be used as unique global reference for Mandiant WMI in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-13T00:00:00Z
source MITRE
title Mandiant WMI

Microsoft Manifests

Microsoft. (n.d.). Manifests. Retrieved December 5, 2014.

Internal MISP references

UUID e336dc02-c7bb-4046-93d9-17b9512fb731 which can be used as unique global reference for Microsoft Manifests in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-12-05T00:00:00Z
source MITRE
title Manifests

MSDN Manifests

Microsoft. (n.d.). Manifests. Retrieved June 3, 2016.

Internal MISP references

UUID a29301fe-0e3c-4c6e-85c5-a30a6bcb9114 which can be used as unique global reference for MSDN Manifests in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-03T00:00:00Z
source MITRE
title Manifests

Wikipedia Man in the Browser

Wikipedia. (2017, October 28). Man-in-the-browser. Retrieved January 10, 2018.

Internal MISP references

UUID f8975da7-4c50-4b3b-8ecb-c99c9b3bc20c which can be used as unique global reference for Wikipedia Man in the Browser in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-10T00:00:00Z
date_published 2017-10-28T00:00:00Z
source MITRE
title Man-in-the-browser

Kaspersky Encyclopedia MiTM

Kaspersky IT Encyclopedia. (n.d.). Man-in-the-middle attack. Retrieved September 1, 2023.

Internal MISP references

UUID 353a6eb9-54c5-5211-ad87-abf5d941e503 which can be used as unique global reference for Kaspersky Encyclopedia MiTM in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-01T00:00:00Z
source MITRE
title Man-in-the-middle attack

Rapid7 MiTM Basics

Rapid7. (n.d.). Man-in-the-Middle (MITM) Attacks. Retrieved March 2, 2020.

Internal MISP references

UUID 33b25966-0ab9-4cc6-9702-62263a23af9c which can be used as unique global reference for Rapid7 MiTM Basics in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-02T00:00:00Z
source MITRE
title Man-in-the-Middle (MITM) Attacks

Praetorian TLS Downgrade Attack 2014

Praetorian. (2014, August 19). Man-in-the-Middle TLS Protocol Downgrade Attack. Retrieved October 8, 2021.

Internal MISP references

UUID 4375602d-4b5f-476d-82f8-3cef84d3378e which can be used as unique global reference for Praetorian TLS Downgrade Attack 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-08T00:00:00Z
date_published 2014-08-19T00:00:00Z
source MITRE
title Man-in-the-Middle TLS Protocol Downgrade Attack

mitm_tls_downgrade_att

praetorian Editorial Team. (2014, August 19). Man-in-the-Middle TLS Protocol Downgrade Attack. Retrieved December 8, 2021.

Internal MISP references

UUID af907fe1-1e37-4f44-8ad4-fcc3826ee6fb which can be used as unique global reference for mitm_tls_downgrade_att in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-12-08T00:00:00Z
date_published 2014-08-19T00:00:00Z
source MITRE
title Man-in-the-Middle TLS Protocol Downgrade Attack

InsiderThreat ChangeNTLM July 2017

Warren, J. (2017, July 11). Manipulating User Passwords with Mimikatz. Retrieved December 4, 2017.

Internal MISP references

UUID 3bf24c68-fc98-4143-9dff-f54030c902fe which can be used as unique global reference for InsiderThreat ChangeNTLM July 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-04T00:00:00Z
date_published 2017-07-11T00:00:00Z
source MITRE
title Manipulating User Passwords with Mimikatz

Talos Manjusaka 2022

Asheer Malhotra & Vitor Ventura. (2022, August 2). Manjusaka: A Chinese sibling of Sliver and Cobalt Strike. Retrieved September 4, 2024.

Internal MISP references

UUID 5dd749c8-deff-5813-a7d4-80760bb5e999 which can be used as unique global reference for Talos Manjusaka 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-04T00:00:00Z
date_published 2022-08-02T00:00:00Z
source MITRE
title Manjusaka: A Chinese sibling of Sliver and Cobalt Strike

Kaspersky ManOnTheSide

Starikova, A. (2023, February 14). Man-on-the-side – peculiar attack. Retrieved September 1, 2023.

Internal MISP references

UUID 8ea545ac-cca6-5da5-8a93-6b07518fc9d4 which can be used as unique global reference for Kaspersky ManOnTheSide in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-01T00:00:00Z
date_published 2023-02-14T00:00:00Z
source MITRE
title Man-on-the-side – peculiar attack

symantec_mantis

Symantec Threat Hunter Team. (2023, April 4). Mantis: New Tooling Used in Attacks Against Palestinian Targets. Retrieved March 4, 2024.

Internal MISP references

UUID 76a792b5-f3cd-566e-a87b-9fae844ce07d which can be used as unique global reference for symantec_mantis in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-04T00:00:00Z
date_published 2023-04-04T00:00:00Z
source MITRE
title Mantis: New Tooling Used in Attacks Against Palestinian Targets

CrowdStrike Manufacturing Threat July 2020

Falcon OverWatch Team. (2020, July 14). Manufacturing Industry in the Adversaries’ Crosshairs. Retrieved October 17, 2021.

Internal MISP references

UUID 5ed6a702-dcc5-4021-95cc-5b720dbd8774 which can be used as unique global reference for CrowdStrike Manufacturing Threat July 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-17T00:00:00Z
date_published 2020-07-14T00:00:00Z
source MITRE
title Manufacturing Industry in the Adversaries’ Crosshairs

US-CERT TYPEFRAME June 2018

US-CERT. (2018, June 14). MAR-10135536-12 – North Korean Trojan: TYPEFRAME. Retrieved July 13, 2018.

Internal MISP references

UUID b89f20ad-39c4-480f-b02e-20f4e71f6b95 which can be used as unique global reference for US-CERT TYPEFRAME June 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-13T00:00:00Z
date_published 2018-06-14T00:00:00Z
source MITRE
title MAR-10135536-12 – North Korean Trojan: TYPEFRAME

US-CERT KEYMARBLE Aug 2018

US-CERT. (2018, August 09). MAR-10135536-17 – North Korean Trojan: KEYMARBLE. Retrieved August 16, 2018.

Internal MISP references

UUID b30dd720-a85d-4bf5-84e1-394a27917ee7 which can be used as unique global reference for US-CERT KEYMARBLE Aug 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-16T00:00:00Z
date_published 2018-08-09T00:00:00Z
source MITRE
title MAR-10135536-17 – North Korean Trojan: KEYMARBLE

US-CERT HOPLIGHT Apr 2019

US-CERT. (2019, April 10). MAR-10135536-8 – North Korean Trojan: HOPLIGHT. Retrieved April 19, 2019.

Internal MISP references

UUID e722b71b-9042-4143-a156-489783d86e0a which can be used as unique global reference for US-CERT HOPLIGHT Apr 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-19T00:00:00Z
date_published 2019-04-10T00:00:00Z
source MITRE
title MAR-10135536-8 – North Korean Trojan: HOPLIGHT

US-CERT HOTCROISSANT February 2020

US-CERT. (2020, February 20). MAR-10271944-1.v1 – North Korean Trojan: HOTCROISSANT. Retrieved May 1, 2020.

Internal MISP references

UUID db5c816a-2a23-4966-8f0b-4ec86cae45c9 which can be used as unique global reference for US-CERT HOTCROISSANT February 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-01T00:00:00Z
date_published 2020-02-20T00:00:00Z
source MITRE
title MAR-10271944-1.v1 – North Korean Trojan: HOTCROISSANT

CISA MAR-10288834-2.v1 TAINTEDSCRIBE MAY 2020

USG. (2020, May 12). MAR-10288834-2.v1 – North Korean Trojan: TAINTEDSCRIBE. Retrieved March 5, 2021.

Internal MISP references

UUID b9946fcc-592a-4c54-b504-4fe5050704df which can be used as unique global reference for CISA MAR-10288834-2.v1 TAINTEDSCRIBE MAY 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-05T00:00:00Z
date_published 2020-05-12T00:00:00Z
source MITRE
title MAR-10288834-2.v1 – North Korean Trojan: TAINTEDSCRIBE

CISA MAR-10292089-1.v2 TAIDOOR August 2021

CISA, FBI, DOD. (2021, August). MAR-10292089-1.v2 – Chinese Remote Access Trojan: TAIDOOR. Retrieved August 24, 2021.

Internal MISP references

UUID 0ae18fda-cc88-49f4-8e85-7b63044579ea which can be used as unique global reference for CISA MAR-10292089-1.v2 TAIDOOR August 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-24T00:00:00Z
date_published 2021-08-01T00:00:00Z
source MITRE
title MAR-10292089-1.v2 – Chinese Remote Access Trojan: TAIDOOR

US-CERT BLINDINGCAN Aug 2020

US-CERT. (2020, August 19). MAR-10295134-1.v1 – North Korean Remote Access Trojan: BLINDINGCAN. Retrieved August 19, 2020.

Internal MISP references

UUID 0421788c-b807-4e19-897c-bfb4323feb16 which can be used as unique global reference for US-CERT BLINDINGCAN Aug 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-19T00:00:00Z
date_published 2020-08-19T00:00:00Z
source MITRE
title MAR-10295134-1.v1 – North Korean Remote Access Trojan: BLINDINGCAN

CISA SoreFang July 2016

CISA. (2020, July 16). MAR-10296782-1.v1 – SOREFANG. Retrieved September 29, 2020.

Internal MISP references

UUID a87db09c-cadc-48fd-9634-8dd44bbd9009 which can be used as unique global reference for CISA SoreFang July 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-29T00:00:00Z
date_published 2020-07-16T00:00:00Z
source MITRE
title MAR-10296782-1.v1 – SOREFANG

CISA WellMess July 2020

CISA. (2020, July 16). MAR-10296782-2.v1 – WELLMESS. Retrieved September 24, 2020.

Internal MISP references

UUID 40e9eda2-51a2-4fd8-b0b1-7d2c6deca820 which can be used as unique global reference for CISA WellMess July 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-24T00:00:00Z
date_published 2020-07-16T00:00:00Z
source MITRE
title MAR-10296782-2.v1 – WELLMESS

CISA WellMail July 2020

CISA. (2020, July 16). MAR-10296782-3.v1 – WELLMAIL. Retrieved September 29, 2020.

Internal MISP references

UUID 2f33b88a-a8dd-445b-a34f-e356b94bed35 which can be used as unique global reference for CISA WellMail July 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-29T00:00:00Z
date_published 2020-07-16T00:00:00Z
source MITRE
title MAR-10296782-3.v1 – WELLMAIL

CISA EB Aug 2020

Cybersecurity and Infrastructure Security Agency. (2020, August 26). MAR-10301706-1.v1 - North Korean Remote Access Tool: ECCENTRICBANDWAGON. Retrieved March 18, 2021.

Internal MISP references

UUID a1b143f9-ca85-4c11-8909-49423c9ffeab which can be used as unique global reference for CISA EB Aug 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-18T00:00:00Z
date_published 2020-08-26T00:00:00Z
source MITRE
title MAR-10301706-1.v1 - North Korean Remote Access Tool: ECCENTRICBANDWAGON

CISA HatMan

CISA. (2019, February 27). MAR-17-352-01 HatMan-Safety System Targeted Malware. Retrieved January 6, 2021.

Internal MISP references

UUID 0690fa53-fee4-43fa-afd5-61137fd7529e which can be used as unique global reference for CISA HatMan in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-06T00:00:00Z
date_published 2019-02-27T00:00:00Z
source MITRE
title MAR-17-352-01 HatMan-Safety System Targeted Malware

Outflank MotW 2020

Hegt, S. (2020, March 30). Mark-of-the-Web from a red team’s perspective. Retrieved February 22, 2021.

Internal MISP references

UUID 54d9c59f-800a-426f-90c8-0d1cb2bea1ea which can be used as unique global reference for Outflank MotW 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-22T00:00:00Z
date_published 2020-03-30T00:00:00Z
source MITRE
title Mark-of-the-Web from a red team’s perspective

Masquerads-Guardio

Tal, Nati. (2022, December 28). “MasquerAds” — Google’s Ad-Words Massively Abused by Threat Actors, Targeting Organizations, GPUs and Crypto Wallets. Retrieved February 21, 2023.

Internal MISP references

UUID e11492f4-f9a3-5489-b2bb-a28b19ef88b5 which can be used as unique global reference for Masquerads-Guardio in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-21T00:00:00Z
date_published 2022-12-28T00:00:00Z
source MITRE
title “MasquerAds” — Google’s Ad-Words Massively Abused by Threat Actors, Targeting Organizations, GPUs and Crypto Wallets

CNET Leaks

Ng, A. (2019, January 17). Massive breach leaks 773 million email addresses, 21 million passwords. Retrieved October 20, 2020.

Internal MISP references

UUID 46df3a49-e7c4-4169-b35c-0aecc78c31ea which can be used as unique global reference for CNET Leaks in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
date_published 2019-01-17T00:00:00Z
source MITRE
title Massive breach leaks 773 million email addresses, 21 million passwords

ArsTechnica Great Firewall of China

Goodin, D.. (2015, March 31). Massive denial-of-service attack on GitHub tied to Chinese government. Retrieved April 19, 2019.

Internal MISP references

UUID 1a08d58f-bf91-4345-aa4e-2906d3ef365a which can be used as unique global reference for ArsTechnica Great Firewall of China in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-19T00:00:00Z
date_published 2015-03-31T00:00:00Z
source MITRE
title Massive denial-of-service attack on GitHub tied to Chinese government

Europol Cobalt Mar 2018

Europol. (2018, March 26). Mastermind Behind EUR 1 Billion Cyber Bank Robbery Arrested in Spain. Retrieved October 10, 2018.

Internal MISP references

UUID f9d1f2ab-9e75-48ce-bcdf-b7119687feef which can be used as unique global reference for Europol Cobalt Mar 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-10-10T00:00:00Z
date_published 2018-03-26T00:00:00Z
source MITRE
title Mastermind Behind EUR 1 Billion Cyber Bank Robbery Arrested in Spain

LOLBAS Mavinject

LOLBAS. (n.d.). Mavinject.exe. Retrieved September 22, 2021.

Internal MISP references

UUID 4ba7fa89-006b-4fbf-aa6c-6775842c97a4 which can be used as unique global reference for LOLBAS Mavinject in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-22T00:00:00Z
source MITRE
title Mavinject.exe

Mavinject Functionality Deconstructed

Matt Graeber. (2018, May 29). mavinject.exe Functionality Deconstructed. Retrieved September 22, 2021.

Internal MISP references

UUID 17b055ba-5e59-4508-ba77-2519c03c6d65 which can be used as unique global reference for Mavinject Functionality Deconstructed in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-22T00:00:00Z
date_published 2018-05-29T00:00:00Z
source MITRE
title mavinject.exe Functionality Deconstructed

Sophos Maze VM September 2020

Brandt, A., Mackenzie, P.. (2020, September 17). Maze Attackers Adopt Ragnar Locker Virtual Machine Technique. Retrieved October 9, 2020.

Internal MISP references

UUID 9c4bbcbb-2c18-453c-8b02-0a0cd512c3f3 which can be used as unique global reference for Sophos Maze VM September 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-09T00:00:00Z
date_published 2020-09-17T00:00:00Z
source MITRE
title Maze Attackers Adopt Ragnar Locker Virtual Machine Technique

mbed-crypto

ARMmbed. (2018, June 21). Mbed Crypto. Retrieved February 15, 2021.

Internal MISP references

UUID 324ba1b8-cc97-4d20-b25d-053b2462f3b2 which can be used as unique global reference for mbed-crypto in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-15T00:00:00Z
date_published 2018-06-21T00:00:00Z
source MITRE
title Mbed Crypto

McAfee REvil October 2019

Saavedra-Morales, J, et al. (2019, October 20). McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – Crescendo. Retrieved August 5, 2020.

Internal MISP references

UUID 288e94b3-a023-4b59-8b2a-25c469fb56a1 which can be used as unique global reference for McAfee REvil October 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-05T00:00:00Z
date_published 2019-10-20T00:00:00Z
source MITRE
title McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – Crescendo

McAfee Sodinokibi October 2019

McAfee. (2019, October 2). McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – What The Code Tells Us. Retrieved August 4, 2020.

Internal MISP references

UUID 1bf961f2-dfa9-4ca3-9bf5-90c21755d783 which can be used as unique global reference for McAfee Sodinokibi October 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-04T00:00:00Z
date_published 2019-10-02T00:00:00Z
source MITRE
title McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – What The Code Tells Us

McAfee Sandworm November 2013

Li, H. (2013, November 5). McAfee Labs Detects Zero-Day Exploit Targeting Microsoft Office. Retrieved June 18, 2020.

Internal MISP references

UUID c90ecd26-ce29-4c1d-b739-357b6d42f399 which can be used as unique global reference for McAfee Sandworm November 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-18T00:00:00Z
date_published 2013-11-05T00:00:00Z
source MITRE
title McAfee Labs Detects Zero-Day Exploit Targeting Microsoft Office

McAfee Honeybee

Sherstobitoff, R. (2018, March 02). McAfee Uncovers Operation Honeybee, a Malicious Document Campaign Targeting Humanitarian Aid Groups. Retrieved May 16, 2018.

Internal MISP references

UUID e6f0f7b5-01fe-437f-a9c9-2ea054e7d69d which can be used as unique global reference for McAfee Honeybee in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-05-16T00:00:00Z
date_published 2018-03-02T00:00:00Z
source MITRE
title McAfee Uncovers Operation Honeybee, a Malicious Document Campaign Targeting Humanitarian Aid Groups

Secureworks MCMD July 2019

Secureworks. (2019, July 24). MCMD Malware Analysis. Retrieved August 13, 2020.

Internal MISP references

UUID f7364cfc-5a3b-4538-80d0-cae65f3c6592 which can be used as unique global reference for Secureworks MCMD July 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-13T00:00:00Z
date_published 2019-07-24T00:00:00Z
source MITRE
title MCMD Malware Analysis

Purves Kextpocalypse 2

Richard Purves. (2017, November 9). MDM and the Kextpocalypse . Retrieved September 23, 2021.

Internal MISP references

UUID 57aeedda-2c32-404f-bead-fe6d213d7241 which can be used as unique global reference for Purves Kextpocalypse 2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-23T00:00:00Z
date_published 2017-11-09T00:00:00Z
source MITRE
title MDM and the Kextpocalypse

MDSec Brute Ratel August 2022

Chell, D. PART 3: How I Met Your Beacon – Brute Ratel. Retrieved February 6, 2023.

Internal MISP references

UUID dfd12595-0056-5b4a-b753-624fac1bb3a6 which can be used as unique global reference for MDSec Brute Ratel August 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-06T00:00:00Z
source MITRE
title MDSec Brute Ratel August 2022

Secureworks NICKEL ACADEMY Dec 2017

Secureworks. (2017, December 15). Media Alert - Secureworks Discovers North Korean Cyber Threat Group, Lazarus, Spearphishing Financial Executives of Cryptocurrency Companies. Retrieved December 27, 2017.

Internal MISP references

UUID aa7393ad-0760-4f27-a068-17beba17bbe3 which can be used as unique global reference for Secureworks NICKEL ACADEMY Dec 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-27T00:00:00Z
date_published 2017-12-15T00:00:00Z
source MITRE
title Media Alert - Secureworks Discovers North Korean Cyber Threat Group, Lazarus, Spearphishing Financial Executives of Cryptocurrency Companies

HC3 Analyst Note MedusaLocker Ransomware February 2023

Health Sector Cybersecurity Coordination Center (HC3). (2023, February 24). MedusaLocker Ransomware. Retrieved August 11, 2023.

Internal MISP references

UUID 49e314d6-5324-41e0-8bee-2b3e08d5e12f which can be used as unique global reference for HC3 Analyst Note MedusaLocker Ransomware February 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-11T00:00:00Z
date_published 2023-02-24T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title MedusaLocker Ransomware

Cybereason Nocturnus MedusaLocker 2020

Cybereason Nocturnus. (2020, November 19). Cybereason vs. MedusaLocker Ransomware. Retrieved June 23, 2021.

Internal MISP references

UUID f7b41120-8455-409f-ad9c-815c2c43edfd which can be used as unique global reference for Cybereason Nocturnus MedusaLocker 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-23T00:00:00Z
source MITRE
title MedusaLocker Ransomware

Bleeping Computer Medusa Ransomware March 12 2023

Lawrence Abrams. (2023, March 12). Medusa ransomware gang picks up steam as it targets companies worldwide. Retrieved September 14, 2023.

Internal MISP references

UUID 21fe1d9e-17f1-49e2-b05f-78e9160f5414 which can be used as unique global reference for Bleeping Computer Medusa Ransomware March 12 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-14T00:00:00Z
date_published 2023-03-12T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Medusa ransomware gang picks up steam as it targets companies worldwide

Meduza Stealer RussianPanda June 28 2023

RussianPanda. (2023, June 28). Meduza Stealer or The Return of The Infamous Aurora Stealer. Retrieved October 14, 2024.

Internal MISP references

UUID f7d3cc96-4c0f-4a87-8a79-abd3f0f84533 which can be used as unique global reference for Meduza Stealer RussianPanda June 28 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-14T00:00:00Z
date_published 2023-06-28T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Meduza Stealer or The Return of The Infamous Aurora Stealer

CyberScoop Babuk February 2021

Lyngaas, S. (2021, February 4). Meet Babuk, a ransomware attacker blamed for the Serco breach. Retrieved August 11, 2021.

Internal MISP references

UUID 0a0aeacd-0976-4c84-b40d-5704afca9f0e which can be used as unique global reference for CyberScoop Babuk February 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-11T00:00:00Z
date_published 2021-02-04T00:00:00Z
source MITRE
title Meet Babuk, a ransomware attacker blamed for the Serco breach

CrowdStrike Stardust Chollima Profile April 2018

Meyers, Adam. (2018, April 6). Meet CrowdStrike’s Adversary of the Month for April: STARDUST CHOLLIMA. Retrieved September 29, 2021.

Internal MISP references

UUID a0119ad4-ceea-4dba-bc08-a682085a9b27 which can be used as unique global reference for CrowdStrike Stardust Chollima Profile April 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-29T00:00:00Z
date_published 2018-04-06T00:00:00Z
source MITRE
title Meet CrowdStrike’s Adversary of the Month for April: STARDUST CHOLLIMA

CrowdStrike VOODOO BEAR

Meyers, A. (2018, January 19). Meet CrowdStrike’s Adversary of the Month for January: VOODOO BEAR. Retrieved May 22, 2018.

Internal MISP references

UUID ce07d409-292d-4e8e-b1af-bd5ba46c1b95 which can be used as unique global reference for CrowdStrike VOODOO BEAR in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-05-22T00:00:00Z
date_published 2018-01-19T00:00:00Z
source MITRE
title Meet CrowdStrike’s Adversary of the Month for January: VOODOO BEAR

Crowdstrike MUSTANG PANDA June 2018

Meyers, A. (2018, June 15). Meet CrowdStrike’s Adversary of the Month for June: MUSTANG PANDA. Retrieved April 12, 2021.

Internal MISP references

UUID 35e72170-b1ec-49c9-aefe-a24fc4302fa6 which can be used as unique global reference for Crowdstrike MUSTANG PANDA June 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-12T00:00:00Z
date_published 2018-06-15T00:00:00Z
source MITRE, Tidal Cyber
title Meet CrowdStrike’s Adversary of the Month for June: MUSTANG PANDA

CrowdStrike VENOMOUS BEAR

Meyers, A. (2018, March 12). Meet CrowdStrike’s Adversary of the Month for March: VENOMOUS BEAR. Retrieved May 16, 2018.

Internal MISP references

UUID ee400057-2b26-4464-96b4-484c9eb9d5c2 which can be used as unique global reference for CrowdStrike VENOMOUS BEAR in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-05-16T00:00:00Z
date_published 2018-03-12T00:00:00Z
source MITRE
title Meet CrowdStrike’s Adversary of the Month for March: VENOMOUS BEAR

Crowdstrike Helix Kitten Nov 2018

Meyers, A. (2018, November 27). Meet CrowdStrike’s Adversary of the Month for November: HELIX KITTEN. Retrieved December 18, 2018.

Internal MISP references

UUID 3fc0d7ad-6283-4cfd-b72f-5ce47594531e which can be used as unique global reference for Crowdstrike Helix Kitten Nov 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-12-18T00:00:00Z
date_published 2018-11-27T00:00:00Z
source MITRE
title Meet CrowdStrike’s Adversary of the Month for November: HELIX KITTEN

Cloudflare Memcrashed Feb 2018

Marek Majkowski of Cloudflare. (2018, February 27). Memcrashed - Major amplification attacks from UDP port 11211. Retrieved April 18, 2019.

Internal MISP references

UUID a2a0c1eb-20ad-4c40-a8cd-1732fdde7e19 which can be used as unique global reference for Cloudflare Memcrashed Feb 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-18T00:00:00Z
date_published 2018-02-27T00:00:00Z
source MITRE
title Memcrashed - Major amplification attacks from UDP port 11211

Github Mempdump

DiabloHorn. (2015, March 22). mempdump. Retrieved October 6, 2017.

Internal MISP references

UUID f830ed8b-33fa-4d1e-a66c-41f8c6aba69c which can be used as unique global reference for Github Mempdump in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-10-06T00:00:00Z
date_published 2015-03-22T00:00:00Z
source MITRE
title mempdump

Palo Alto menuPass Feb 2017

Miller-Osborn, J. and Grunzweig, J.. (2017, February 16). menuPass Returns with New Malware and New Attacks Against Japanese Academics and Organizations. Retrieved March 1, 2017.

Internal MISP references

UUID ba4f7d65-73ec-4726-b1f6-f2443ffda5e7 which can be used as unique global reference for Palo Alto menuPass Feb 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-01T00:00:00Z
date_published 2017-02-16T00:00:00Z
source MITRE, Tidal Cyber
title menuPass Returns with New Malware and New Attacks Against Japanese Academics and Organizations

FireEye MESSAGETAP October 2019

Leong, R., Perez, D., Dean, T. (2019, October 31). MESSAGETAP: Who’s Reading Your Text Messages?. Retrieved May 11, 2020.

Internal MISP references

UUID f56380e8-3cfa-407c-a493-7f9e50ba3867 which can be used as unique global reference for FireEye MESSAGETAP October 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-11T00:00:00Z
date_published 2019-10-31T00:00:00Z
source MITRE
title MESSAGETAP: Who’s Reading Your Text Messages?

SentinelLabs Metador Technical Appendix Sept 2022

SentinelLabs. (2022, September 22). Metador Technical Appendix. Retrieved April 4, 2023.

Internal MISP references

UUID aa021076-e9c5-5428-a938-c10cfb6b7c97 which can be used as unique global reference for SentinelLabs Metador Technical Appendix Sept 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-04-04T00:00:00Z
date_published 2022-09-22T00:00:00Z
source MITRE
title Metador Technical Appendix

FireEye Metamorfo Apr 2018

Sierra, E., Iglesias, G.. (2018, April 24). Metamorfo Campaigns Targeting Brazilian Users. Retrieved July 30, 2020.

Internal MISP references

UUID fd220165-43c8-4aaf-9295-0a2b7a52929c which can be used as unique global reference for FireEye Metamorfo Apr 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-07-30T00:00:00Z
date_published 2018-04-24T00:00:00Z
source MITRE
title Metamorfo Campaigns Targeting Brazilian Users

Metasploit_Ref

Metasploit. (n.d.). Retrieved December 4, 2014.

Internal MISP references

UUID ab6ea6b3-3c71-4e69-9713-dae3e4446083 which can be used as unique global reference for Metasploit_Ref in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-12-04T00:00:00Z
source MITRE
title Metasploit_Ref

Metasploit SSH Module

undefined. (n.d.). Retrieved April 12, 2019.

Internal MISP references

UUID e4ae69e5-67ba-4a3e-8101-5e7f073bd312 which can be used as unique global reference for Metasploit SSH Module in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-12T00:00:00Z
source MITRE
title Metasploit SSH Module

Github Rapid7 Meterpreter Elevate

Rapid7. (2013, November 26). meterpreter/source/extensions/priv/server/elevate/. Retrieved July 8, 2018.

Internal MISP references

UUID 113dafad-8ede-424b-b727-66f71ea7806a which can be used as unique global reference for Github Rapid7 Meterpreter Elevate in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-08T00:00:00Z
date_published 2013-11-26T00:00:00Z
source MITRE
title meterpreter/source/extensions/priv/server/elevate/

Methods of Mac Malware Persistence

Patrick Wardle. (2014, September). Methods of Malware Persistence on Mac OS X. Retrieved July 5, 2017.

Internal MISP references

UUID 44154472-2894-4161-b23f-46d1b1fd6772 which can be used as unique global reference for Methods of Mac Malware Persistence in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-05T00:00:00Z
date_published 2014-09-01T00:00:00Z
source MITRE
title Methods of Malware Persistence on Mac OS X

MFA Fatigue Attacks - PortSwigger

Jessica Haworth. (2022, February 16). MFA fatigue attacks: Users tricked into allowing device access due to overload of push notifications. Retrieved March 31, 2022.

Internal MISP references

UUID 1b7b0f00-71ba-4762-ae81-bce24591cff4 which can be used as unique global reference for MFA Fatigue Attacks - PortSwigger in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-31T00:00:00Z
date_published 2022-02-16T00:00:00Z
source MITRE
title MFA fatigue attacks: Users tricked into allowing device access due to overload of push notifications

Mftrace.exe - LOLBAS Project

LOLBAS. (2018, May 25). Mftrace.exe. Retrieved December 4, 2023.

Internal MISP references

UUID b6d42cc9-1bf0-4389-8654-90b8d4e7ff49 which can be used as unique global reference for Mftrace.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Mftrace.exe

Radware Micropsia July 2018

Tsarfaty, Y. (2018, July 25). Micropsia Malware. Retrieved November 13, 2018.

Internal MISP references

UUID 8771ed60-eecb-4e0c-b22c-0c26d30d4dec which can be used as unique global reference for Radware Micropsia July 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-13T00:00:00Z
date_published 2018-07-25T00:00:00Z
source MITRE
title Micropsia Malware

Optiv Device Code Phishing 2021

Optiv. (2021, August 17). Microsoft 365 OAuth Device Code Flow and Phishing. Retrieved March 19, 2024.

Internal MISP references

UUID 848da3e2-3228-5ee6-8fff-ff3328e6a387 which can be used as unique global reference for Optiv Device Code Phishing 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-19T00:00:00Z
date_published 2021-08-17T00:00:00Z
source MITRE
title Microsoft 365 OAuth Device Code Flow and Phishing

Microsoft Midnight Blizzard January 19 2024

MSRC. (2024, January 19). Microsoft Actions Following Attack by Nation State Actor Midnight Blizzard. Retrieved January 24, 2024.

Internal MISP references

UUID 91b48ddd-9e3f-4d36-a262-3b52145b3db2 which can be used as unique global reference for Microsoft Midnight Blizzard January 19 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-24T00:00:00Z
date_published 2024-01-19T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Microsoft Actions Following Attack by Nation State Actor Midnight Blizzard

Microsoft ZINC disruption Dec 2017

Smith, B. (2017, December 19). Microsoft and Facebook disrupt ZINC malware attack to protect customers and the internet from ongoing cyberthreats. Retrieved December 20, 2017.

Internal MISP references

UUID 99831838-fc8f-43fa-9c87-6ccdf5677c34 which can be used as unique global reference for Microsoft ZINC disruption Dec 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-20T00:00:00Z
date_published 2017-12-19T00:00:00Z
source MITRE
title Microsoft and Facebook disrupt ZINC malware attack to protect customers and the internet from ongoing cyberthreats

The Hacker News Microsoft DDoS June 19 2023

Ravie Lakshmanan. (2023, June 19). Microsoft Blames Massive DDoS Attack for Azure, Outlook, and OneDrive Disruptions. Retrieved October 10, 2023.

Internal MISP references

UUID 2ee27b55-b7a7-40a8-8c0b-5e28943cd273 which can be used as unique global reference for The Hacker News Microsoft DDoS June 19 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-10T00:00:00Z
date_published 2023-06-19T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Microsoft Blames Massive DDoS Attack for Azure, Outlook, and OneDrive Disruptions

Posts By SpecterOps Team Members 2 5 2024

Andy Robbins. (2024, February 2). Microsoft Breach - What Happened What Should Azure Admins Do. Retrieved February 5, 2024.

Internal MISP references

UUID b4c9a3a7-c7d0-4a1d-98cd-6018c072d537 which can be used as unique global reference for Posts By SpecterOps Team Members 2 5 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-05T00:00:00Z
date_published 2024-02-02T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Microsoft Breach - What Happened What Should Azure Admins Do

Microsoft 365 Defender Threat Intelligence Team. (2021, June 14). Microsoft delivers comprehensive solution to battle rise in consent phishing emails. Retrieved December 13, 2021.

Internal MISP references

UUID 393e44fe-cf52-4c39-a79f-f7cdd9d8e16a which can be used as unique global reference for Microsoft OAuth 2.0 Consent Phishing 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-12-13T00:00:00Z
date_published 2021-06-14T00:00:00Z
source MITRE
title Microsoft delivers comprehensive solution to battle rise in consent phishing emails

Microsoft Digital Defense FY20 Sept 2020

Microsoft . (2020, September 29). Microsoft Digital Defense Report FY20. Retrieved April 21, 2021.

Internal MISP references

UUID cdf74af5-ed71-4dfd-bc49-0ccfa40b65ea which can be used as unique global reference for Microsoft Digital Defense FY20 Sept 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-21T00:00:00Z
date_published 2020-09-29T00:00:00Z
source MITRE, Tidal Cyber
title Microsoft Digital Defense Report FY20

BleepingComputer DDE Disabled in Word Dec 2017

Cimpanu, C. (2017, December 15). Microsoft Disables DDE Feature in Word to Prevent Further Malware Attacks. Retrieved December 19, 2017.

Internal MISP references

UUID d6f93310-77b6-491e-ba9d-ec1faf8de7e4 which can be used as unique global reference for BleepingComputer DDE Disabled in Word Dec 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-19T00:00:00Z
date_published 2017-12-15T00:00:00Z
source MITRE
title Microsoft Disables DDE Feature in Word to Prevent Further Malware Attacks

Microsoft DuplicateTokenEx

Microsoft TechNet. (n.d.). Retrieved April 25, 2017.

Internal MISP references

UUID 8a389e76-d43a-477c-aab4-301c7c55b439 which can be used as unique global reference for Microsoft DuplicateTokenEx in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-04-25T00:00:00Z
source MITRE
title Microsoft DuplicateTokenEx

Red Canary HTA Abuse Part Deux

McCammon, K. (2015, August 14). Microsoft HTML Application (HTA) Abuse, Part Deux. Retrieved October 27, 2017.

Internal MISP references

UUID 39b1cb2f-a07b-49f2-bf2c-15f0c9b95772 which can be used as unique global reference for Red Canary HTA Abuse Part Deux in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-10-27T00:00:00Z
date_published 2015-08-14T00:00:00Z
source MITRE
title Microsoft HTML Application (HTA) Abuse, Part Deux

Microsoft HTML Help May 2018

Microsoft. (2018, May 30). Microsoft HTML Help 1.4. Retrieved October 3, 2018.

Internal MISP references

UUID f9daf15d-61ea-4cfa-a4e8-9d33d1acd28f which can be used as unique global reference for Microsoft HTML Help May 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-10-03T00:00:00Z
date_published 2018-05-30T00:00:00Z
source MITRE
title Microsoft HTML Help 1.4

Microsoft - Azure AD Identity Tokens - Aug 2019

Microsoft. (2019, August 29). Microsoft identity platform access tokens. Retrieved September 12, 2019.

Internal MISP references

UUID 44767d53-8cd7-44dd-a69d-8a7bebc1d87d which can be used as unique global reference for Microsoft - Azure AD Identity Tokens - Aug 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-12T00:00:00Z
date_published 2019-08-29T00:00:00Z
source MITRE
title Microsoft identity platform access tokens

Microsoft Identity Platform Access 2019

Cai, S., Flores, J., de Guzman, C., et. al.. (2019, August 27). Microsoft identity platform access tokens. Retrieved October 4, 2019.

Internal MISP references

UUID a39d976e-9b52-48f3-b5db-0ffd84ecd338 which can be used as unique global reference for Microsoft Identity Platform Access 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-04T00:00:00Z
date_published 2019-08-27T00:00:00Z
source MITRE
title Microsoft identity platform access tokens

Microsoft - OAuth Code Authorization flow - June 2019

Microsoft. (n.d.). Microsoft identity platform and OAuth 2.0 authorization code flow. Retrieved September 12, 2019.

Internal MISP references

UUID a41c2123-8b8d-4f98-a535-e58e3e746b69 which can be used as unique global reference for Microsoft - OAuth Code Authorization flow - June 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-12T00:00:00Z
source MITRE
title Microsoft identity platform and OAuth 2.0 authorization code flow

Microsoft Identity Platform Protocols May 2019

Microsoft. (n.d.). Retrieved September 12, 2019.

Internal MISP references

UUID a99d2292-be39-4e55-a952-30c9d6a3d0a3 which can be used as unique global reference for Microsoft Identity Platform Protocols May 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-12T00:00:00Z
source MITRE
title Microsoft Identity Platform Protocols May 2019

Microsoft ImpersonateLoggedOnUser

Microsoft TechNet. (n.d.). Retrieved April 25, 2017.

Internal MISP references

UUID 01f5176a-cce6-46e2-acce-a77b6bea7172 which can be used as unique global reference for Microsoft ImpersonateLoggedOnUser in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-04-25T00:00:00Z
source MITRE
title Microsoft ImpersonateLoggedOnUser

Microsoft Internal Solorigate Investigation Blog

MSRC Team. (2021, February 18). Microsoft Internal Solorigate Investigation – Final Update. Retrieved May 14, 2021.

Internal MISP references

UUID 66cade99-0040-464c-98a6-bba57719f0a4 which can be used as unique global reference for Microsoft Internal Solorigate Investigation Blog in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-05-14T00:00:00Z
date_published 2021-02-18T00:00:00Z
source MITRE
title Microsoft Internal Solorigate Investigation – Final Update

Microsoft Albanian Government Attacks September 2022

MSTIC. (2022, September 8). Microsoft investigates Iranian attacks against the Albanian government. Retrieved August 6, 2024.

Internal MISP references

UUID d00399e9-a6c6-5691-92cd-0185b03b689e which can be used as unique global reference for Microsoft Albanian Government Attacks September 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-06T00:00:00Z
date_published 2022-09-08T00:00:00Z
source MITRE
title Microsoft investigates Iranian attacks against the Albanian government

Microsoft LogonUser

Microsoft TechNet. (n.d.). Retrieved April 25, 2017.

Internal MISP references

UUID 08088ec0-5b48-4c32-b213-5e029e5f83ee which can be used as unique global reference for Microsoft LogonUser in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-04-25T00:00:00Z
source MITRE
title Microsoft LogonUser

mmc_vulns

Boxiner, A., Vaknin, E. (2019, June 11). Microsoft Management Console (MMC) Vulnerabilities. Retrieved September 24, 2021.

Internal MISP references

UUID 7bcf1c90-6299-448b-92c3-a6702882936a which can be used as unique global reference for mmc_vulns in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-24T00:00:00Z
date_published 2019-06-11T00:00:00Z
source MITRE
title Microsoft Management Console (MMC) Vulnerabilities

Microsoft.NodejsTools.PressAnyKey.exe - LOLBAS Project

LOLBAS. (2022, January 20). Microsoft.NodejsTools.PressAnyKey.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 25c46948-a648-4c3c-b442-e700df68fa20 which can be used as unique global reference for Microsoft.NodejsTools.PressAnyKey.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2022-01-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Microsoft.NodejsTools.PressAnyKey.exe

FireEye FELIXROOT July 2018

Patil, S. (2018, June 26). Microsoft Office Vulnerabilities Used to Distribute FELIXROOT Backdoor in Recent Campaign. Retrieved July 31, 2018.

Internal MISP references

UUID 501057e2-9a31-46fe-aaa0-427218682153 which can be used as unique global reference for FireEye FELIXROOT July 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-31T00:00:00Z
date_published 2018-06-26T00:00:00Z
source MITRE
title Microsoft Office Vulnerabilities Used to Distribute FELIXROOT Backdoor in Recent Campaign

Irongeek Sims BSides 2017

Stephen Sims. (2017, April 30). Microsoft Patch Analysis for Exploitation. Retrieved October 16, 2020.

Internal MISP references

UUID ce11568a-36a8-4da2-972f-9cd67cc337d8 which can be used as unique global reference for Irongeek Sims BSides 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-16T00:00:00Z
date_published 2017-04-30T00:00:00Z
source MITRE
title Microsoft Patch Analysis for Exploitation

Microsoft_rec_block_rules

Microsoft. (2021, August 23). Retrieved August 16, 2021.

Internal MISP references

UUID 8fbc12b4-dec6-4913-9103-b28b5c3395ee which can be used as unique global reference for Microsoft_rec_block_rules in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-16T00:00:00Z
source MITRE
title Microsoft_rec_block_rules

Microsoft WDAC

Coulter, D. et al.. (2019, April 9). Microsoft recommended block rules. Retrieved August 12, 2021.

Internal MISP references

UUID 86955cd2-5980-44ba-aa7b-4b9f8e347730 which can be used as unique global reference for Microsoft WDAC in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-12T00:00:00Z
date_published 2019-04-09T00:00:00Z
source MITRE
title Microsoft recommended block rules

Microsoft driver block rules - Duplicate

Jordan Geurten et al. . (2022, March 29). Microsoft recommended driver block rules. Retrieved April 7, 2022.

Internal MISP references

UUID 9bb5c330-56bd-47e7-8414-729d8e6cb3b3 which can be used as unique global reference for Microsoft driver block rules - Duplicate in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-07T00:00:00Z
date_published 2022-03-29T00:00:00Z
source MITRE
title Microsoft recommended driver block rules

Microsoft Driver Block Rules

Microsoft. (2020, October 15). Microsoft recommended driver block rules. Retrieved March 16, 2021.

Internal MISP references

UUID 2ad8414a-4490-4896-8266-556b8bdbb77f which can be used as unique global reference for Microsoft Driver Block Rules in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-16T00:00:00Z
date_published 2020-10-15T00:00:00Z
source MITRE
title Microsoft recommended driver block rules

Microsoft Register-WmiEvent

Microsoft. (n.d.). Retrieved January 24, 2020.

Internal MISP references

UUID 6d75029f-f63c-4ca6-b5f9-cb41b698b32a which can be used as unique global reference for Microsoft Register-WmiEvent in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-01-24T00:00:00Z
source MITRE
title Microsoft Register-WmiEvent

Microsoft DDoS Attacks Response June 2023

MSRC Team. (2023, June 16). Microsoft Response to Layer 7 Distributed Denial of Service (DDoS) Attacks. Retrieved October 10, 2023.

Internal MISP references

UUID d64e941e-785b-4b23-a7d0-04f12024b033 which can be used as unique global reference for Microsoft DDoS Attacks Response June 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-10T00:00:00Z
date_published 2023-06-16T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Microsoft Response to Layer 7 Distributed Denial of Service (DDoS) Attacks

Microsoft Security Advisory 2269637

Microsoft. (, May 23). Microsoft Security Advisory 2269637. Retrieved March 13, 2020.

Internal MISP references

UUID fa3d303e-bb1a-426d-9387-e92fc1ea75bc which can be used as unique global reference for Microsoft Security Advisory 2269637 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-13T00:00:00Z
date_published 1978-05-23T00:00:00Z
source MITRE
title Microsoft Security Advisory 2269637

Microsoft 2269637

Microsoft. (2010, August 22). Microsoft Security Advisory 2269637 Released. Retrieved December 5, 2014.

Internal MISP references

UUID ebb94db8-b1a3-4d61-97e6-9b787a742669 which can be used as unique global reference for Microsoft 2269637 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-12-05T00:00:00Z
date_published 2010-08-22T00:00:00Z
source MITRE
title Microsoft Security Advisory 2269637 Released

Microsoft DDE Advisory Nov 2017

Microsoft. (2017, November 8). Microsoft Security Advisory 4053440 - Securely opening Microsoft Office documents that contain Dynamic Data Exchange (DDE) fields. Retrieved November 21, 2017.

Internal MISP references

UUID 955b0074-a1d6-40b5-9437-bd2548daf54c which can be used as unique global reference for Microsoft DDE Advisory Nov 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-21T00:00:00Z
date_published 2017-11-08T00:00:00Z
source MITRE
title Microsoft Security Advisory 4053440 - Securely opening Microsoft Office documents that contain Dynamic Data Exchange (DDE) fields

Microsoft WDigest Mit

Microsoft. (2014, May 13). Microsoft Security Advisory: Update to improve credentials protection and management. Retrieved June 8, 2020.

Internal MISP references

UUID 2a9149d7-ba39-47f2-8f23-7f3b175931f0 which can be used as unique global reference for Microsoft WDigest Mit in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-08T00:00:00Z
date_published 2014-05-13T00:00:00Z
source MITRE
title Microsoft Security Advisory: Update to improve credentials protection and management

MS17-010 March 2017

Microsoft. (2017, March 14). Microsoft Security Bulletin MS17-010 - Critical. Retrieved August 17, 2017.

Internal MISP references

UUID 8088a624-d8c8-4d8e-99c2-a9da4a2f0117 which can be used as unique global reference for MS17-010 March 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-08-17T00:00:00Z
date_published 2017-03-14T00:00:00Z
source MITRE
title Microsoft Security Bulletin MS17-010 - Critical

MSTIC GADOLINIUM September 2020

Ben Koehl, Joe Hannon. (2020, September 24). Microsoft Security - Detecting Empires in the Cloud. Retrieved August 24, 2021.

Internal MISP references

UUID ee352214-421f-4778-ac28-949142a8ef2a which can be used as unique global reference for MSTIC GADOLINIUM September 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-24T00:00:00Z
date_published 2020-09-24T00:00:00Z
source MITRE
title Microsoft Security - Detecting Empires in the Cloud

Microsoft SIR Vol 19

Anthe, C. et al. (2015, October 19). Microsoft Security Intelligence Report Volume 19. Retrieved December 23, 2015.

Internal MISP references

UUID 050e0a70-19e6-4637-a3f7-b7cd788cca43 which can be used as unique global reference for Microsoft SIR Vol 19 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-12-23T00:00:00Z
date_published 2015-10-19T00:00:00Z
source MITRE
title Microsoft Security Intelligence Report Volume 19

Microsoft SIR Vol 21

Anthe, C. et al. (2016, December 14). Microsoft Security Intelligence Report Volume 21. Retrieved November 27, 2017.

Internal MISP references

UUID 619b9cf8-7201-45de-9c36-834ccee356a9 which can be used as unique global reference for Microsoft SIR Vol 21 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-27T00:00:00Z
date_published 2016-12-14T00:00:00Z
source MITRE
title Microsoft Security Intelligence Report Volume 21

Microsoft Threat Intelligence LinkedIn July 15 2024

Microsoft Threat Intelligence. (2024, July 15). Microsoft Threat Intelligence LinkedIn Q2 2024. Retrieved July 26, 2024.

Internal MISP references

UUID 0e7ea8d0-bdb8-48a6-9718-703f64d16460 which can be used as unique global reference for Microsoft Threat Intelligence LinkedIn July 15 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-26T00:00:00Z
date_published 2024-07-15T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Microsoft Threat Intelligence LinkedIn Q2 2024

MSTIC Vanilla Tempest September 18 2024

Microsoft Threat Intelligence. (2024, September 18). Microsoft Threat Intelligence LinkedIn Vanilla Tempest. Retrieved September 19, 2024.

Internal MISP references

UUID 24c11dff-21df-4ce9-b3df-2e0a886339ff which can be used as unique global reference for MSTIC Vanilla Tempest September 18 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-19T00:00:00Z
date_published 2024-09-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Microsoft Threat Intelligence LinkedIn Vanilla Tempest

Microsoft Threat Intelligence Tweet April 26 2023

MsftSecIntel. (2023, May 26). Microsoft Threat Intelligence Tweet April 26 2023. Retrieved June 16, 2023.

Internal MISP references

UUID 3b5a2349-e10c-422b-91e3-20e9033fdb60 which can be used as unique global reference for Microsoft Threat Intelligence Tweet April 26 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-16T00:00:00Z
date_published 2023-05-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Microsoft Threat Intelligence Tweet April 26 2023

Microsoft Threat Intelligence Tweet August 17 2023

MsftSecIntel. (2023, August 17). Microsoft Threat Intelligence Tweet August 17 2023. Retrieved September 14, 2023.

Internal MISP references

UUID 8b0ebcb5-d531-4f49-aa2d-bceb5e491b3f which can be used as unique global reference for Microsoft Threat Intelligence Tweet August 17 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-14T00:00:00Z
date_published 2023-08-17T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Microsoft Threat Intelligence Tweet August 17 2023

Microsoft Threat Intelligence Tweet June 17 2020

MsftSecIntel. (2020, June 17). Microsoft Threat Intelligence Tweet June 17 2020. Retrieved June 22, 2023.

Internal MISP references

UUID 98fc7485-9424-412f-8162-a69d6c10c243 which can be used as unique global reference for Microsoft Threat Intelligence Tweet June 17 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-22T00:00:00Z
date_published 2020-06-17T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Microsoft Threat Intelligence Tweet June 17 2020

Microsoft Threat Intelligence Tweet May 18 2023

MsftSecIntel. (2023, May 18). Microsoft Threat Intelligence Tweet May 18 2023. Retrieved May 25, 2023.

Internal MISP references

UUID b41e9f89-cd88-4483-bb86-9d88c555a648 which can be used as unique global reference for Microsoft Threat Intelligence Tweet May 18 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-25T00:00:00Z
date_published 2023-05-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Microsoft Threat Intelligence Tweet May 18 2023

Wikipedia Windows Library Files

Wikipedia. (2017, January 31). Microsoft Windows library files. Retrieved February 13, 2017.

Internal MISP references

UUID 9b6e2f38-6e5a-4e4f-ad84-97155be2c641 which can be used as unique global reference for Wikipedia Windows Library Files in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-02-13T00:00:00Z
date_published 2017-01-31T00:00:00Z
source MITRE
title Microsoft Windows library files

Proofpoint Cobalt June 2017

Mesa, M, et al. (2017, June 1). Microsoft Word Intruder Integrates CVE-2017-0199, Utilized by Cobalt Group to Target Financial Institutions. Retrieved October 10, 2018.

Internal MISP references

UUID c4922659-88b2-4311-9c9b-dc9b383d746a which can be used as unique global reference for Proofpoint Cobalt June 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-10-10T00:00:00Z
date_published 2017-06-01T00:00:00Z
source MITRE
title Microsoft Word Intruder Integrates CVE-2017-0199, Utilized by Cobalt Group to Target Financial Institutions

Microsoft.Workflow.Compiler.exe - LOLBAS Project

LOLBAS. (2018, October 22). Microsoft.Workflow.Compiler.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 1e659b32-a06f-45dc-a1eb-03f1a42c55ef which can be used as unique global reference for Microsoft.Workflow.Compiler.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-10-22T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Microsoft.Workflow.Compiler.exe

InfoSecurity Sandworm Oct 2014

Muncaster, P.. (2014, October 14). Microsoft Zero Day Traced to Russian ‘Sandworm’ Hackers. Retrieved October 6, 2017.

Internal MISP references

UUID 05b3840d-162d-455f-a87b-229e83e5a031 which can be used as unique global reference for InfoSecurity Sandworm Oct 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-10-06T00:00:00Z
date_published 2014-10-14T00:00:00Z
source MITRE
title Microsoft Zero Day Traced to Russian ‘Sandworm’ Hackers

objective-see windtail1 dec 2018

Wardle, Patrick. (2018, December 20). Middle East Cyber-Espionage analyzing WindShift's implant: OSX.WindTail (part 1). Retrieved October 3, 2019.

Internal MISP references

UUID 7a32c962-8050-45de-8b90-8644be5109d9 which can be used as unique global reference for objective-see windtail1 dec 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-03T00:00:00Z
date_published 2018-12-20T00:00:00Z
source MITRE, Tidal Cyber
title Middle East Cyber-Espionage analyzing WindShift's implant: OSX.WindTail (part 1)

objective-see windtail2 jan 2019

Wardle, Patrick. (2019, January 15). Middle East Cyber-Espionage analyzing WindShift's implant: OSX.WindTail (part 2). Retrieved October 3, 2019.

Internal MISP references

UUID e6bdc679-ee0c-4f34-b5bc-0d6a26485b36 which can be used as unique global reference for objective-see windtail2 jan 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-03T00:00:00Z
date_published 2019-01-15T00:00:00Z
source MITRE
title Middle East Cyber-Espionage analyzing WindShift's implant: OSX.WindTail (part 2)

CyberScoop BlackOasis Oct 2017

Bing, C. (2017, October 16). Middle Eastern hacking group is using FinFisher malware to conduct international espionage. Retrieved February 15, 2018.

Internal MISP references

UUID a8224ad5-4688-4382-a3e7-1dd3ed74ebce which can be used as unique global reference for CyberScoop BlackOasis Oct 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-15T00:00:00Z
date_published 2017-10-16T00:00:00Z
source MITRE
title Middle Eastern hacking group is using FinFisher malware to conduct international espionage

Int SP - chat apps

Microsoft Threat Intelligence. (2023, August 2). Midnight Blizzard conducts targeted social engineering over Microsoft Teams. Retrieved February 16, 2024.

Internal MISP references

UUID 8d0db0f2-9b29-5216-8c9c-de8bf0c541de which can be used as unique global reference for Int SP - chat apps in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-16T00:00:00Z
date_published 2023-08-02T00:00:00Z
source MITRE
title Midnight Blizzard conducts targeted social engineering over Microsoft Teams

Microsoft Security Blog 1 26 2024

Microsoft Threat Intelligence. (2024, January 25). Midnight Blizzard Guidance for responders on nation-state attack . Retrieved January 26, 2024.

Internal MISP references

UUID 10dedea9-35e9-476f-84e8-e49e3f057039 which can be used as unique global reference for Microsoft Security Blog 1 26 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-26T00:00:00Z
date_published 2024-01-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Midnight Blizzard Guidance for responders on nation-state attack

Deply Mimikatz

Deply, B. (n.d.). Mimikatz. Retrieved September 29, 2015.

Internal MISP references

UUID c92d890c-2839-433a-b458-f663e66e1c63 which can be used as unique global reference for Deply Mimikatz in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-09-29T00:00:00Z
source MITRE
title Mimikatz

CG 2014

CG. (2014, May 20). Mimikatz Against Virtual Machine Memory Part 1. Retrieved November 12, 2014.

Internal MISP references

UUID 46836549-f7e9-45e1-8d89-4d25ba26dbd7 which can be used as unique global reference for CG 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-12T00:00:00Z
date_published 2014-05-20T00:00:00Z
source MITRE
title Mimikatz Against Virtual Machine Memory Part 1

ADSecurity AD Kerberos Attacks

Metcalf, S. (2014, November 22). Mimikatz and Active Directory Kerberos Attacks. Retrieved June 2, 2016.

Internal MISP references

UUID 07ff57eb-1e23-433b-8da7-80f1caf7543e which can be used as unique global reference for ADSecurity AD Kerberos Attacks in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-02T00:00:00Z
date_published 2014-11-22T00:00:00Z
source MITRE
title Mimikatz and Active Directory Kerberos Attacks

Harmj0y DCSync Sept 2015

Schroeder, W. (2015, September 22). Mimikatz and DCSync and ExtraSids, Oh My. Retrieved December 4, 2017.

Internal MISP references

UUID 2a01a70c-28a8-444e-95a7-00a568d51ce6 which can be used as unique global reference for Harmj0y DCSync Sept 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-04T00:00:00Z
date_published 2015-09-22T00:00:00Z
source MITRE
title Mimikatz and DCSync and ExtraSids, Oh My

Harmj0y Mimikatz and DCSync

Schroeder, W. (2015, September 22). Mimikatz and DCSync and ExtraSids, Oh My. Retrieved September 23, 2024.

Internal MISP references

UUID 2afa76c1-caa1-4f16-9289-7abc7eb3a102 which can be used as unique global reference for Harmj0y Mimikatz and DCSync in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-23T00:00:00Z
date_published 2015-09-22T00:00:00Z
source MITRE
title Mimikatz and DCSync and ExtraSids, Oh My

ADSecurity Mimikatz DCSync

Metcalf, S. (2015, September 25). Mimikatz DCSync Usage, Exploitation, and Detection. Retrieved August 7, 2017.

Internal MISP references

UUID 61b0bb42-2ed6-413d-b331-0a84df12a87d which can be used as unique global reference for ADSecurity Mimikatz DCSync in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-08-07T00:00:00Z
date_published 2015-09-25T00:00:00Z
source MITRE
title Mimikatz DCSync Usage, Exploitation, and Detection

AdSecurity DCSync Sept 2015

Metcalf, S. (2015, September 25). Mimikatz DCSync Usage, Exploitation, and Detection. Retrieved December 4, 2017.

Internal MISP references

UUID 856ed70b-29b0-4f56-b5ae-a98981a22eaf which can be used as unique global reference for AdSecurity DCSync Sept 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-04T00:00:00Z
date_published 2015-09-25T00:00:00Z
source MITRE
title Mimikatz DCSync Usage, Exploitation, and Detection

GitHub Mimikittenz July 2016

Jamieson O'Reilly (putterpanda). (2016, July 4). mimikittenz. Retrieved June 20, 2019.

Internal MISP references

UUID 2e0a95b2-3f9a-4638-9bc5-ff1f3ac2af4b which can be used as unique global reference for GitHub Mimikittenz July 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-20T00:00:00Z
date_published 2016-07-04T00:00:00Z
source MITRE
title mimikittenz

MimiPenguin GitHub May 2017

Gregal, H. (2017, May 12). MimiPenguin. Retrieved December 5, 2017.

Internal MISP references

UUID b10cd6cc-35ed-4eac-b213-110de28f33ef which can be used as unique global reference for MimiPenguin GitHub May 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-05T00:00:00Z
date_published 2017-05-12T00:00:00Z
source MITRE
title MimiPenguin

mimipenguin proc file

Gregal, Hunter. (2019, September 17). MimiPenguin 2.0. Retrieved March 28, 2024.

Internal MISP references

UUID b66d4c5a-f4de-5888-ad8a-a20bda888bc6 which can be used as unique global reference for mimipenguin proc file in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-28T00:00:00Z
date_published 2019-09-17T00:00:00Z
source MITRE
title MimiPenguin 2.0

Securelist Minidionis July 2015

Lozhkin, S.. (2015, July 16). Minidionis – one more APT with a usage of cloud drives. Retrieved April 5, 2017.

Internal MISP references

UUID af40a05e-02fb-4943-b3ff-9a292679e93d which can be used as unique global reference for Securelist Minidionis July 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-04-05T00:00:00Z
date_published 2015-07-16T00:00:00Z
source MITRE
title Minidionis – one more APT with a usage of cloud drives

mining_ruby_reversinglabs

Maljic, T. (2020, April 16). Mining for malicious Ruby gems. Retrieved October 15, 2022.

Internal MISP references

UUID ca2074d8-330b-544e-806f-ddee7b702631 which can be used as unique global reference for mining_ruby_reversinglabs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-10-15T00:00:00Z
date_published 2020-04-16T00:00:00Z
source MITRE
title Mining for malicious Ruby gems

lazgroup_idn_phishing

RISKIQ. (2017, December 20). Mining Insights: Infrastructure Analysis of Lazarus Group Cyber Attacks on the Cryptocurrency Industry. Retrieved July 29, 2022.

Internal MISP references

UUID 83de363d-b575-4851-9c2d-a78f504cf754 which can be used as unique global reference for lazgroup_idn_phishing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-29T00:00:00Z
date_published 2017-12-20T00:00:00Z
source MITRE
title Mining Insights: Infrastructure Analysis of Lazarus Group Cyber Attacks on the Cryptocurrency Industry

NCSC-NL COATHANGER Feb 2024

Dutch Military Intelligence and Security Service (MIVD) & Dutch General Intelligence and Security Service (AIVD). (2024, February 6). Ministry of Defense of the Netherlands uncovers COATHANGER, a stealthy Chinese FortiGate RAT. Retrieved February 7, 2024.

Internal MISP references

UUID e8e60112-a08d-5316-b80f-f601e7e5c973 which can be used as unique global reference for NCSC-NL COATHANGER Feb 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-07T00:00:00Z
date_published 2024-02-06T00:00:00Z
source MITRE
title Ministry of Defense of the Netherlands uncovers COATHANGER, a stealthy Chinese FortiGate RAT

Bleeping Computer Mint Mobile Hack 2021

Lawrence Abrams. (2021, July 10). Mint Mobile hit by a data breach after numbers ported, data accessed. Retrieved July 1, 2024.

Internal MISP references

UUID a5432624-c394-56e6-b463-5b1a1aea542b which can be used as unique global reference for Bleeping Computer Mint Mobile Hack 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-01T00:00:00Z
date_published 2021-07-10T00:00:00Z
source MITRE
title Mint Mobile hit by a data breach after numbers ported, data accessed

APT15 Intezer June 2018

Rosenberg, J. (2018, June 14). MirageFox: APT15 Resurfaces With New Tools Based On Old Ones. Retrieved September 21, 2018.

Internal MISP references

UUID 0110500c-bf67-43a5-97cb-16eb6c01040b which can be used as unique global reference for APT15 Intezer June 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-09-21T00:00:00Z
date_published 2018-06-14T00:00:00Z
source MITRE, Tidal Cyber
title MirageFox: APT15 Resurfaces With New Tools Based On Old Ones

ESET Mispadu November 2019

ESET Research. (2019, November 19). Mispadu: Advertisement for a discounted Unhappy Meal. Retrieved April 4, 2024.

Internal MISP references

UUID a27753c1-2f7a-40c4-9e28-a37265bce28c which can be used as unique global reference for ESET Mispadu November 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-04T00:00:00Z
date_published 2019-11-19T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Mispadu: Advertisement for a discounted Unhappy Meal

ESET Security Mispadu Facebook Ads 2019

ESET Security. (2019, November 19). Mispadu: Advertisement for a discounted Unhappy Meal. Retrieved March 13, 2024.

Internal MISP references

UUID e1b945f4-20e0-5b69-8fd7-f05afce8c0ba which can be used as unique global reference for ESET Security Mispadu Facebook Ads 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-13T00:00:00Z
date_published 2019-11-19T00:00:00Z
source MITRE
title Mispadu: Advertisement for a discounted Unhappy Meal

Slideshare Abusing SSH

Duarte, H., Morrison, B. (2012). (Mis)trusting and (ab)using ssh. Retrieved January 8, 2018.

Internal MISP references

UUID 4f63720a-50b6-4eef-826c-71ce8d6e4bb8 which can be used as unique global reference for Slideshare Abusing SSH in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-08T00:00:00Z
date_published 2012-01-01T00:00:00Z
source MITRE
title (Mis)trusting and (ab)using ssh

Mitiga Security Advisory: SSM Agent as Remote Access Trojan

Ariel Szarf, Or Aspir. (n.d.). Mitiga Security Advisory: Abusing the SSM Agent as a Remote Access Trojan. Retrieved January 31, 2024.

Internal MISP references

UUID 88fecbcd-a89b-536a-a1f6-6ddfb2b452da which can be used as unique global reference for Mitiga Security Advisory: SSM Agent as Remote Access Trojan in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-31T00:00:00Z
source MITRE
title Mitiga Security Advisory: Abusing the SSM Agent as a Remote Access Trojan

ACSC Email Spoofing

Australian Cyber Security Centre. (2012, December). Mitigating Spoofed Emails Using Sender Policy Framework. Retrieved October 19, 2020.

Internal MISP references

UUID 4e82a053-c881-4569-8efe-3ef40f6e25a0 which can be used as unique global reference for ACSC Email Spoofing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
date_published 2012-12-01T00:00:00Z
source MITRE
title Mitigating Spoofed Emails Using Sender Policy Framework

NSA Cyber Mitigating Web Shells

NSA Cybersecurity Directorate. (n.d.). Mitigating Web Shells. Retrieved July 22, 2021.

Internal MISP references

UUID cc40e8e8-5450-4340-a091-ae7e609778dc which can be used as unique global reference for NSA Cyber Mitigating Web Shells in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-07-22T00:00:00Z
source MITRE
title Mitigating Web Shells

MIT ccache

Massachusetts Institute of Technology. (n.d.). MIT Kerberos Documentation: Credential Cache. Retrieved October 4, 2021.

Internal MISP references

UUID 6a1b4373-2304-420c-8733-e1eae71ff7b2 which can be used as unique global reference for MIT ccache in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-04T00:00:00Z
source MITRE
title MIT Kerberos Documentation: Credential Cache

MITRE SE Guide 2014

The MITRE Corporation. (2014). MITRE Systems Engineering Guide. Retrieved April 6, 2018.

Internal MISP references

UUID 576f95bc-5cb9-473e-b026-19b864d1c26c which can be used as unique global reference for MITRE SE Guide 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-06T00:00:00Z
date_published 2014-01-01T00:00:00Z
source MITRE
title MITRE Systems Engineering Guide

win_mmc

Microsoft. (2017, October 16). mmc. Retrieved September 20, 2021.

Internal MISP references

UUID 508373ef-2634-404f-99de-7a73cce68699 which can be used as unique global reference for win_mmc in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-20T00:00:00Z
date_published 2017-10-16T00:00:00Z
source MITRE
title mmc

Mmc.exe - LOLBAS Project

LOLBAS. (2018, December 4). Mmc.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 490b6769-e386-4a3d-972e-5a919cb2f6f5 which can be used as unique global reference for Mmc.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-12-04T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Mmc.exe

Trend Micro Bouncing Golf 2019

E. Xu, G. Guo. (2019, June 28). Mobile Cyberespionage Campaign ‘Bouncing Golf’ Affects Middle East. Retrieved January 27, 2020.

Internal MISP references

UUID b830fe30-0b53-4fc6-a172-7da930618725 which can be used as unique global reference for Trend Micro Bouncing Golf 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-01-27T00:00:00Z
date_published 2019-06-28T00:00:00Z
source MITRE
title Mobile Cyberespionage Campaign ‘Bouncing Golf’ Affects Middle East

ELF Injection May 2009

O'Neill, R. (2009, May). Modern Day ELF Runtime infection via GOT poisoning. Retrieved March 15, 2020.

Internal MISP references

UUID 3ca314d4-3fcf-4545-8ae9-4d8781d51295 which can be used as unique global reference for ELF Injection May 2009 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-15T00:00:00Z
date_published 2009-05-01T00:00:00Z
source MITRE
title Modern Day ELF Runtime infection via GOT poisoning

specter ops evil twin

Ryan, Gabriel. (2019, October 28). Modern Wireless Tradecraft Pt I — Basic Rogue AP Theory — Evil Twin and Karma Attacks. Retrieved September 17, 2024.

Internal MISP references

UUID 7e16241a-d906-5eb0-961d-00724f44d903 which can be used as unique global reference for specter ops evil twin in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-17T00:00:00Z
date_published 2019-10-28T00:00:00Z
source MITRE
title Modern Wireless Tradecraft Pt I — Basic Rogue AP Theory — Evil Twin and Karma Attacks

Elastic Rules macOS launchctl 2022

Elastic Security 7.17. (2022, February 1). Modification of Environment Variable via Launchctl. Retrieved September 28, 2023.

Internal MISP references

UUID 04b0582e-357f-5f2a-8582-b3bf8f52c2a2 which can be used as unique global reference for Elastic Rules macOS launchctl 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-28T00:00:00Z
date_published 2022-02-01T00:00:00Z
source MITRE
title Modification of Environment Variable via Launchctl

modinfo man

Russell, R. (n.d.). modinfo(8) - Linux man page. Retrieved March 28, 2023.

Internal MISP references

UUID d4f2db5c-ef6d-556d-a5e2-f6738277fecd which can be used as unique global reference for modinfo man in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-28T00:00:00Z
source MITRE
title modinfo(8) - Linux man page

hasherezade debug

hasherezade. (2021, June 30). Module 3 - Understanding and countering malware's evasion and self-defence. Retrieved April 1, 2022.

Internal MISP references

UUID 53b0c71d-c577-40e8-8a04-9de083e276a2 which can be used as unique global reference for hasherezade debug in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-01T00:00:00Z
date_published 2021-06-30T00:00:00Z
source MITRE
title Module 3 - Understanding and countering malware's evasion and self-defence

Microsoft Module Class

Microsoft. (n.d.). Module Class. Retrieved September 28, 2021.

Internal MISP references

UUID b051a38a-09c7-4280-a5b6-08067d81a2d8 which can be used as unique global reference for Microsoft Module Class in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-28T00:00:00Z
source MITRE
title Module Class

GitHub Mimikatz kerberos Module

Deply, B., Le Toux, V.. (2016, June 5). module ~ kerberos. Retrieved March 17, 2020.

Internal MISP references

UUID b5eca224-bea1-48e8-acdc-e910d52560f1 which can be used as unique global reference for GitHub Mimikatz kerberos Module in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-17T00:00:00Z
date_published 2016-06-05T00:00:00Z
source MITRE
title module ~ kerberos

GitHub Mimikatz lsadump Module

Deply, B., Le Toux, V. (2016, June 5). module ~ lsadump. Retrieved August 7, 2017.

Internal MISP references

UUID e188ff4d-a983-4f5a-b9e1-3b0f9fd8df25 which can be used as unique global reference for GitHub Mimikatz lsadump Module in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-08-07T00:00:00Z
date_published 2016-06-05T00:00:00Z
source MITRE
title module ~ lsadump

Module Stomping for Shellcode Injection

Red Teaming Experiments. (n.d.). Module Stomping for Shellcode Injection. Retrieved July 14, 2022.

Internal MISP references

UUID 0f9b58e2-2a81-4b79-aad6-b36a844cf1c6 which can be used as unique global reference for Module Stomping for Shellcode Injection in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-14T00:00:00Z
source MITRE
title Module Stomping for Shellcode Injection

Linux Kernel Module Programming Guide

Pomerantz, O., Salzman, P. (2003, April 4). Modules vs Programs. Retrieved April 6, 2018.

Internal MISP references

UUID ceefe610-0b26-4307-806b-17313d570511 which can be used as unique global reference for Linux Kernel Module Programming Guide in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-06T00:00:00Z
date_published 2003-04-04T00:00:00Z
source MITRE
title Modules vs Programs

FOX-IT May 2016 Mofang

Yonathan Klijnsma. (2016, May 17). Mofang: A politically motivated information stealing adversary. Retrieved May 12, 2020.

Internal MISP references

UUID f1a08b1c-f7d5-4a91-b3b7-0f042b297842 which can be used as unique global reference for FOX-IT May 2016 Mofang in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-12T00:00:00Z
date_published 2016-05-17T00:00:00Z
source MITRE, Tidal Cyber
title Mofang: A politically motivated information stealing adversary

Unit42 Molerat Mar 2020

Falcone, R., et al. (2020, March 3). Molerats Delivers Spark Backdoor to Government and Telecommunications Organizations. Retrieved December 14, 2020.

Internal MISP references

UUID 328f1c87-c9dc-42d8-bb33-a17ad4d7f57e which can be used as unique global reference for Unit42 Molerat Mar 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-14T00:00:00Z
date_published 2020-03-03T00:00:00Z
source MITRE
title Molerats Delivers Spark Backdoor to Government and Telecommunications Organizations

Cybereason Molerats Dec 2020

Cybereason Nocturnus Team. (2020, December 9). MOLERATS IN THE CLOUD: New Malware Arsenal Abuses Cloud Platforms in Middle East Espionage Campaign. Retrieved December 22, 2020.

Internal MISP references

UUID 81a10a4b-c66f-4526-882c-184436807e1d which can be used as unique global reference for Cybereason Molerats Dec 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-22T00:00:00Z
date_published 2020-12-09T00:00:00Z
source MITRE
title MOLERATS IN THE CLOUD: New Malware Arsenal Abuses Cloud Platforms in Middle East Espionage Campaign

Azure - Monitor Logs

Microsoft. (2019, June 4). Monitor at scale by using Azure Monitor. Retrieved May 1, 2020.

Internal MISP references

UUID e16974cc-623e-4fa6-ac36-5f199d54bf55 which can be used as unique global reference for Azure - Monitor Logs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-01T00:00:00Z
date_published 2019-06-04T00:00:00Z
source MITRE
title Monitor at scale by using Azure Monitor

EventTracker File Permissions Feb 2014

Netsurion. (2014, February 19). Monitoring File Permission Changes with the Windows Security Log. Retrieved August 19, 2018.

Internal MISP references

UUID 91a4278e-ea52-4cd5-8c79-c73c690372a3 which can be used as unique global reference for EventTracker File Permissions Feb 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-19T00:00:00Z
date_published 2014-02-19T00:00:00Z
source MITRE
title Monitoring File Permission Changes with the Windows Security Log

Microsoft Silent Process Exit NOV 2017

Marshall, D. & Griffin, S. (2017, November 28). Monitoring Silent Process Exit. Retrieved June 27, 2018.

Internal MISP references

UUID 86896031-f654-4185-ba45-8c931903153b which can be used as unique global reference for Microsoft Silent Process Exit NOV 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-06-27T00:00:00Z
date_published 2017-11-28T00:00:00Z
source MITRE
title Monitoring Silent Process Exit

Windows Event Forwarding Payne

Payne, J. (2015, November 23). Monitoring what matters - Windows Event Forwarding for everyone (even if you already have a SIEM.). Retrieved February 1, 2016.

Internal MISP references

UUID 72798df8-0e12-46f5-acb0-2fe99bd8dbff which can be used as unique global reference for Windows Event Forwarding Payne in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-02-01T00:00:00Z
date_published 2015-11-23T00:00:00Z
source MITRE
title Monitoring what matters - Windows Event Forwarding for everyone (even if you already have a SIEM.)

Google Workspace Apps Script Restrict OAuth Scopes

Google Workspace. (2024, March 5). Monitor & restrict data access. Retrieved July 1, 2024.

Internal MISP references

UUID 9009a8cc-3282-5eac-90f1-525a85d99c0e which can be used as unique global reference for Google Workspace Apps Script Restrict OAuth Scopes in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-01T00:00:00Z
date_published 2024-03-05T00:00:00Z
source MITRE
title Monitor & restrict data access

GCP Monitoring Service Account Usage

Google Cloud. (2022, March 31). Monitor usage patterns for service accounts and keys . Retrieved April 1, 2022.

Internal MISP references

UUID d33115c5-ae47-4089-a6cb-4ef97effa722 which can be used as unique global reference for GCP Monitoring Service Account Usage in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-01T00:00:00Z
date_published 2022-03-31T00:00:00Z
source MITRE
title Monitor usage patterns for service accounts and keys

Forcepoint Monsoon

Settle, A., et al. (2016, August 8). MONSOON - Analysis Of An APT Campaign. Retrieved September 22, 2016.

Internal MISP references

UUID ea64a3a5-a248-44bb-98cd-f7e3d4c23d4e which can be used as unique global reference for Forcepoint Monsoon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-09-22T00:00:00Z
date_published 2016-08-08T00:00:00Z
source MITRE
title MONSOON - Analysis Of An APT Campaign

Trend Micro August 14 2023

Nathaniel Morales; Joshua Paul Ignacio Read time. (2023, August 14). Monti Ransomware Unleashes a New Encryptor for Linux. Retrieved January 1, 2024.

Internal MISP references

UUID 12d2fbc5-f9cb-41b5-96a6-1cd100b5a173 which can be used as unique global reference for Trend Micro August 14 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-01T00:00:00Z
date_published 2023-08-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Monti Ransomware Unleashes a New Encryptor for Linux

Microsoft Security Blog 5 28 2024

Microsoft Threat Intelligence. (2024, May 28). Moonstone Sleet emerges as new North Korean threat actor with new bag of tricks . Retrieved May 29, 2024.

Internal MISP references

UUID faf315ed-71f7-4e29-8334-701da35a69ad which can be used as unique global reference for Microsoft Security Blog 5 28 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-29T00:00:00Z
date_published 2024-05-28T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Moonstone Sleet emerges as new North Korean threat actor with new bag of tricks

Microsoft Moonstone Sleet 2024

Microsoft Threat Intelligence. (2024, May 28). Moonstone Sleet emerges as new North Korean threat actor with new bag of tricks. Retrieved August 26, 2024.

Internal MISP references

UUID b9ee14c9-75fe-552e-81b5-a1fd5aa916d7 which can be used as unique global reference for Microsoft Moonstone Sleet 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-26T00:00:00Z
date_published 2024-05-28T00:00:00Z
source MITRE
title Moonstone Sleet emerges as new North Korean threat actor with new bag of tricks

Security Intelligence More Eggs Aug 2019

Villadsen, O.. (2019, August 29). More_eggs, Anyone? Threat Actor ITG08 Strikes Again. Retrieved September 16, 2019.

Internal MISP references

UUID f0a0286f-adb9-4a6e-85b5-5b0f45e6fbf3 which can be used as unique global reference for Security Intelligence More Eggs Aug 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-16T00:00:00Z
date_published 2019-08-29T00:00:00Z
source MITRE, Tidal Cyber
title More_eggs, Anyone? Threat Actor ITG08 Strikes Again

ESET EvilNum July 2020

Porolli, M. (2020, July 9). More evil: A deep look at Evilnum and its toolset. Retrieved January 22, 2021.

Internal MISP references

UUID 6851b3f9-0239-40fc-ba44-34a775e9bd4e which can be used as unique global reference for ESET EvilNum July 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-22T00:00:00Z
date_published 2020-07-09T00:00:00Z
source MITRE, Tidal Cyber
title More evil: A deep look at Evilnum and its toolset

Microsoft More information about DLL

Microsoft. (2010, August 12). More information about the DLL Preloading remote attack vector. Retrieved December 5, 2014.

Internal MISP references

UUID 80289c7b-53c1-4aec-9436-04a43a82f769 which can be used as unique global reference for Microsoft More information about DLL in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-12-05T00:00:00Z
date_published 2010-08-12T00:00:00Z
source MITRE
title More information about the DLL Preloading remote attack vector

Microsoft DLL Preloading

Microsoft. (2010, August 12). More information about the DLL Preloading remote attack vector. Retrieved December 5, 2014.

Internal MISP references

UUID 46aa7075-9f0a-461e-8519-5c4860208678 which can be used as unique global reference for Microsoft DLL Preloading in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-12-05T00:00:00Z
date_published 2010-08-12T00:00:00Z
source MITRE
title More information about the DLL Preloading remote attack vector

aptsim

valsmith. (2012, September 21). More on APTSim. Retrieved September 28, 2017.

Internal MISP references

UUID c33ca45d-eeff-4a23-906c-99369047c7f5 which can be used as unique global reference for aptsim in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-09-28T00:00:00Z
date_published 2012-09-21T00:00:00Z
source MITRE
title More on APTSim

Washington Post WannaCry 2017

Dwoskin, E. and Adam, K. (2017, May 14). More than 150 countries affected by massive cyberattack, Europol says. Retrieved March 25, 2019.

Internal MISP references

UUID bbf9b08a-072c-4fb9-8c3c-cb6f91e8940c which can be used as unique global reference for Washington Post WannaCry 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-25T00:00:00Z
date_published 2017-05-14T00:00:00Z
source MITRE
title More than 150 countries affected by massive cyberattack, Europol says

ArsTechnica Intel

Goodin, D. & Salter, J. (2020, August 6). More than 20GB of Intel source code and proprietary data dumped online. Retrieved October 20, 2020.

Internal MISP references

UUID 99151b50-3dd8-47b5-a48f-2e3b450944e9 which can be used as unique global reference for ArsTechnica Intel in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
date_published 2020-08-06T00:00:00Z
source MITRE
title More than 20GB of Intel source code and proprietary data dumped online

Kaspersky Winnti April 2013

Kaspersky Lab's Global Research and Analysis Team. (2013, April 11). Winnti. More than just a game. Retrieved February 8, 2017.

Internal MISP references

UUID 2d4834b9-61c4-478e-919a-317d97cd2c36 which can be used as unique global reference for Kaspersky Winnti April 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-02-08T00:00:00Z
source MITRE, Tidal Cyber
title More than just a game

polygot_icedID

Lim, M. (2022, September 27). More Than Meets the Eye: Exposing a Polyglot File That Delivers IcedID. Retrieved September 29, 2022.

Internal MISP references

UUID dcd65d74-4e7b-5ddd-8c72-700456981347 which can be used as unique global reference for polygot_icedID in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-29T00:00:00Z
date_published 2022-09-27T00:00:00Z
source MITRE
title More Than Meets the Eye: Exposing a Polyglot File That Delivers IcedID

CrowdStrike Deep Panda Web Shells

RYANJ. (2014, February 20). Mo’ Shells Mo’ Problems – Deep Panda Web Shells. Retrieved September 16, 2015.

Internal MISP references

UUID e9c47d8e-f732-45c9-bceb-26c5d564e781 which can be used as unique global reference for CrowdStrike Deep Panda Web Shells in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-09-16T00:00:00Z
date_published 2014-02-20T00:00:00Z
source MITRE, Tidal Cyber
title Mo’ Shells Mo’ Problems – Deep Panda Web Shells

MoustachedBouncer ESET August 2023

Faou, M. (2023, August 10). MoustachedBouncer: Espionage against foreign diplomats in Belarus. Retrieved September 25, 2023.

Internal MISP references

UUID 9070f14b-5d5e-5f6d-bcac-628478e01242 which can be used as unique global reference for MoustachedBouncer ESET August 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-25T00:00:00Z
date_published 2023-08-10T00:00:00Z
source MITRE
title MoustachedBouncer: Espionage against foreign diplomats in Belarus

ESET MoustachedBouncer

Faou, M. (2023, August 10). MoustachedBouncer: Espionage against foreign diplomats in Belarus. Retrieved September 1, 2023.

Internal MISP references

UUID 6c85e925-d42b-590c-a424-14ebb49812bb which can be used as unique global reference for ESET MoustachedBouncer in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-01T00:00:00Z
date_published 2023-08-10T00:00:00Z
source MITRE
title MoustachedBouncer: Espionage against foreign diplomats in Belarus

Huntress MOVEit 2023

John Hammond. (2023, June 1). MOVEit Transfer Critical Vulnerability CVE-2023-34362 Rapid Response. Retrieved August 5, 2024.

Internal MISP references

UUID 6d426568-f760-5624-bdde-934ce3d83c45 which can be used as unique global reference for Huntress MOVEit 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-05T00:00:00Z
date_published 2023-06-01T00:00:00Z
source MITRE
title MOVEit Transfer Critical Vulnerability CVE-2023-34362 Rapid Response

Progress Software MOVEit Transfer Critical Vulnerability

Progress Software. (2023, June 16). MOVEit Transfer Critical Vulnerability (May 2023) (CVE-2023-34362). Retrieved July 28, 2023.

Internal MISP references

UUID 9f364e22-b73c-4f3a-902c-a3f0eb01a2b9 which can be used as unique global reference for Progress Software MOVEit Transfer Critical Vulnerability in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-28T00:00:00Z
date_published 2023-06-16T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title MOVEit Transfer Critical Vulnerability (May 2023) (CVE-2023-34362)

TechNet Moving Beyond EMET

Nunez, N. (2017, August 9). Moving Beyond EMET II – Windows Defender Exploit Guard. Retrieved March 12, 2018.

Internal MISP references

UUID da4fbddf-9398-43a9-888c-2c58e9fc9aaf which can be used as unique global reference for TechNet Moving Beyond EMET in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-12T00:00:00Z
date_published 2017-08-09T00:00:00Z
source MITRE
title Moving Beyond EMET II – Windows Defender Exploit Guard

ScriptingOSX zsh

Armin Briegel. (2019, June 5). Moving to zsh, part 2: Configuration Files. Retrieved February 25, 2021.

Internal MISP references

UUID 08b390aa-863b-420e-9b00-e168e3c756d8 which can be used as unique global reference for ScriptingOSX zsh in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-25T00:00:00Z
date_published 2019-06-05T00:00:00Z
source MITRE
title Moving to zsh, part 2: Configuration Files

Volatility Detecting Hooks Sept 2012

Volatility Labs. (2012, September 24). MoVP 3.1 Detecting Malware Hooks in the Windows GUI Subsystem. Retrieved December 12, 2017.

Internal MISP references

UUID e208c277-e477-4123-8c3c-313d55cdc1ea which can be used as unique global reference for Volatility Detecting Hooks Sept 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-12T00:00:00Z
date_published 2012-09-24T00:00:00Z
source MITRE
title MoVP 3.1 Detecting Malware Hooks in the Windows GUI Subsystem

Mozilla Firefox Installer DLL Hijack

Kugler, R. (2012, November 20). Mozilla Foundation Security Advisory 2012-98. Retrieved March 10, 2017.

Internal MISP references

UUID 920d1607-154e-4c74-b1eb-0d8299be536f which can be used as unique global reference for Mozilla Firefox Installer DLL Hijack in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-10T00:00:00Z
date_published 2012-11-20T00:00:00Z
source MITRE
title Mozilla Foundation Security Advisory 2012-98

mozilla_sec_adv_2012

Robert Kugler. (2012, November 20). Mozilla Foundation Security Advisory 2012-98. Retrieved March 10, 2017.

Internal MISP references

UUID cd720550-a0b5-4d1d-85dd-98da97f45b62 which can be used as unique global reference for mozilla_sec_adv_2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-10T00:00:00Z
date_published 2012-11-20T00:00:00Z
source MITRE
title Mozilla Foundation Security Advisory 2012-98

MpCmdRun.exe - LOLBAS Project

LOLBAS. (2020, March 20). MpCmdRun.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 2082d5ca-474f-4130-b275-c1ac5e30064c which can be used as unique global reference for MpCmdRun.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2020-03-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title MpCmdRun.exe

TechNet MS14-019

Nagaraju, S. (2014, April 8). MS14-019 – Fixing a binary hijacking via .cmd or .bat file. Retrieved July 25, 2016.

Internal MISP references

UUID 2474e2ee-bbcd-4b7c-8c52-22112d22135f which can be used as unique global reference for TechNet MS14-019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-07-25T00:00:00Z
date_published 2014-04-08T00:00:00Z
source MITRE
title MS14-019 – Fixing a binary hijacking via .cmd or .bat file

SRD GPP

Security Research and Defense. (2014, May 13). MS14-025: An Update for Group Policy Preferences. Retrieved January 28, 2015.

Internal MISP references

UUID a15fff18-5d3f-4898-9e47-ec6ae7dda749 which can be used as unique global reference for SRD GPP in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-01-28T00:00:00Z
date_published 2014-05-13T00:00:00Z
source MITRE
title MS14-025: An Update for Group Policy Preferences

Microsoft MS14-025

Microsoft. (2014, May 13). MS14-025: Vulnerability in Group Policy Preferences could allow elevation of privilege. Retrieved January 28, 2015.

Internal MISP references

UUID dbe32cbd-8c6e-483f-887c-ea2a5102cf65 which can be used as unique global reference for Microsoft MS14-025 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-01-28T00:00:00Z
date_published 2014-05-13T00:00:00Z
source MITRE
title MS14-025: Vulnerability in Group Policy Preferences could allow elevation of privilege

MS14-025

Microsoft. (2014, May 13). MS14-025: Vulnerability in Group Policy Preferences could allow elevation of privilege. Retrieved February 17, 2020.

Internal MISP references

UUID 7537c0bb-6f14-4a4a-94cc-98c6ed9e878f which can be used as unique global reference for MS14-025 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-17T00:00:00Z
date_published 2014-05-13T00:00:00Z
source MITRE
title MS14-025: Vulnerability in Group Policy Preferences could allow elevation of privilege

MSDN MSBuild

Microsoft. (n.d.). MSBuild1. Retrieved November 30, 2016.

Internal MISP references

UUID 9ad54187-84b0-47f9-af6e-c3753452e470 which can be used as unique global reference for MSDN MSBuild in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-11-30T00:00:00Z
source MITRE
title MSBuild1

LOLBAS Msbuild

LOLBAS. (n.d.). Msbuild.exe. Retrieved July 31, 2019.

Internal MISP references

UUID de8e0741-255b-4c41-ba50-248ac5acc325 which can be used as unique global reference for LOLBAS Msbuild in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-07-31T00:00:00Z
source MITRE
title Msbuild.exe

Microsoft MSBuild Inline Tasks 2017

Microsoft. (2017, September 21). MSBuild inline tasks. Retrieved March 5, 2021.

Internal MISP references

UUID 2c638ca5-c7e2-4c4e-bb9c-e36d14899ca8 which can be used as unique global reference for Microsoft MSBuild Inline Tasks 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-05T00:00:00Z
date_published 2017-09-21T00:00:00Z
source MITRE
title MSBuild inline tasks

Msconfig.exe - LOLBAS Project

LOLBAS. (2018, May 25). Msconfig.exe. Retrieved December 4, 2023.

Internal MISP references

UUID a073d2fc-d20d-4a52-944e-85ff89f04978 which can be used as unique global reference for Msconfig.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Msconfig.exe

Msdeploy.exe - LOLBAS Project

LOLBAS. (2018, May 25). Msdeploy.exe. Retrieved December 4, 2023.

Internal MISP references

UUID e563af9a-5e49-4612-a52b-31f22f76193c which can be used as unique global reference for Msdeploy.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Msdeploy.exe

MSDN File Associations

Microsoft. (n.d.). Retrieved July 26, 2016.

Internal MISP references

UUID f62c8cc9-9c75-4b9a-a0b4-8fc55a94e207 which can be used as unique global reference for MSDN File Associations in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-07-26T00:00:00Z
source MITRE
title MSDN File Associations

Microsoft DRSR Dec 2017

Microsoft. (2017, December 1). MS-DRSR Directory Replication Service (DRS) Remote Protocol. Retrieved December 4, 2017.

Internal MISP references

UUID 43b75a27-7875-4c24-b04d-54e1b60f3028 which can be used as unique global reference for Microsoft DRSR Dec 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-04T00:00:00Z
date_published 2017-12-01T00:00:00Z
source MITRE
title MS-DRSR Directory Replication Service (DRS) Remote Protocol

Msdt.exe - LOLBAS Project

LOLBAS. (2018, May 25). Msdt.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 3eb1750c-a2f2-4d68-b060-ceb32f44f5fe which can be used as unique global reference for Msdt.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Msdt.exe

Msedge.exe - LOLBAS Project

LOLBAS. (2022, January 20). Msedge.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 6169c12e-9753-4e48-8213-aff95b0f6a95 which can be used as unique global reference for Msedge.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2022-01-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Msedge.exe

msedge_proxy.exe - LOLBAS Project

LOLBAS. (2023, August 18). msedge_proxy.exe. Retrieved December 4, 2023.

Internal MISP references

UUID a6fd4727-e22f-4157-9a5f-1217cb876b32 which can be used as unique global reference for msedge_proxy.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2023-08-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title msedge_proxy.exe

msedgewebview2.exe - LOLBAS Project

LOLBAS. (2023, June 15). msedgewebview2.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 8125ece7-10d1-4e79-8ea1-724fe46a3c97 which can be used as unique global reference for msedgewebview2.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2023-06-15T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title msedgewebview2.exe

LOLBAS Mshta

LOLBAS. (n.d.). Mshta.exe. Retrieved July 31, 2019.

Internal MISP references

UUID 915a4aef-800e-4c68-ad39-df67c3dbaf75 which can be used as unique global reference for LOLBAS Mshta in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-07-31T00:00:00Z
source MITRE
title Mshta.exe

Mshtml.dll - LOLBAS Project

LOLBAS. (2018, May 25). Mshtml.dll. Retrieved December 4, 2023.

Internal MISP references

UUID 1a135e0b-5a79-4a4c-bc70-fd8f3f84e1f0 which can be used as unique global reference for Mshtml.dll - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Mshtml.dll

Microsoft msiexec

Microsoft. (2017, October 15). msiexec. Retrieved January 24, 2020.

Internal MISP references

UUID 028a8dc6-08f6-4660-8b82-9d5483d15f72 which can be used as unique global reference for Microsoft msiexec in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-01-24T00:00:00Z
date_published 2017-10-15T00:00:00Z
source MITRE
title msiexec

LOLBAS Msiexec

LOLBAS. (n.d.). Msiexec.exe. Retrieved April 18, 2019.

Internal MISP references

UUID 996cc7ea-0729-4c51-b9c3-b201ec32e984 which can be used as unique global reference for LOLBAS Msiexec in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-18T00:00:00Z
source MITRE
title Msiexec.exe

CIS Emotet Dec 2018

CIS. (2018, December 12). MS-ISAC Security Primer- Emotet. Retrieved March 25, 2019.

Internal MISP references

UUID e88ba993-d5c0-440f-af52-1f70f1579215 which can be used as unique global reference for CIS Emotet Dec 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-25T00:00:00Z
date_published 2018-12-12T00:00:00Z
source MITRE
title MS-ISAC Security Primer- Emotet

Microsoft NRPC Dec 2017

Microsoft. (2017, December 1). MS-NRPC - Netlogon Remote Protocol. Retrieved December 6, 2017.

Internal MISP references

UUID 05cf36a3-ff04-4437-9209-376e9f27c009 which can be used as unique global reference for Microsoft NRPC Dec 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-06T00:00:00Z
date_published 2017-12-01T00:00:00Z
source MITRE
title MS-NRPC - Netlogon Remote Protocol

MsoHtmEd.exe - LOLBAS Project

LOLBAS. (2022, July 24). MsoHtmEd.exe. Retrieved December 4, 2023.

Internal MISP references

UUID c39fdefa-4c54-48a9-8357-ffe4dca2a2f4 which can be used as unique global reference for MsoHtmEd.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2022-07-24T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title MsoHtmEd.exe

Mspub.exe - LOLBAS Project

LOLBAS. (2022, August 2). Mspub.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 41eff63a-fef0-4b4b-86f7-0908150fcfcf which can be used as unique global reference for Mspub.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2022-08-02T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Mspub.exe

Microsoft SAMR

Microsoft. (n.d.). MS-SAMR Security Account Manager (SAM) Remote Protocol (Client-to-Server) - Transport. Retrieved December 4, 2017.

Internal MISP references

UUID add907d8-06c1-481d-a27a-d077ecb32d0e which can be used as unique global reference for Microsoft SAMR in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-04T00:00:00Z
source MITRE
title MS-SAMR Security Account Manager (SAM) Remote Protocol (Client-to-Server) - Transport

GitHub IAD Secure Host Baseline UAC Filtering

NSA IAD. (2017, January 24). MS Security Guide. Retrieved December 18, 2017.

Internal MISP references

UUID 15ad7216-df50-467f-a00b-687336898537 which can be used as unique global reference for GitHub IAD Secure Host Baseline UAC Filtering in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-18T00:00:00Z
date_published 2017-01-24T00:00:00Z
source MITRE
title MS Security Guide

msxsl.exe - LOLBAS Project

LOLBAS. (2018, May 25). msxsl.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 4e1ed0a8-60d0-45e2-9592-573b904811f8 which can be used as unique global reference for msxsl.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title msxsl.exe

XSL Bypass Mar 2019

Singh, A. (2019, March 14). MSXSL.EXE and WMIC.EXE — A Way to Proxy Code Execution. Retrieved August 2, 2019.

Internal MISP references

UUID e4e2cf48-47e0-45d8-afc2-a35635f7e880 which can be used as unique global reference for XSL Bypass Mar 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-08-02T00:00:00Z
date_published 2019-03-14T00:00:00Z
source MITRE
title MSXSL.EXE and WMIC.EXE — A Way to Proxy Code Execution

Mandiant. (2015, February 24). M-Trends 2015: A View from the Front Lines. Retrieved May 18, 2016.

Internal MISP references

UUID 067497eb-17d9-465f-a070-495575f420d7 which can be used as unique global reference for Mandiant M-Trends 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-05-18T00:00:00Z
date_published 2015-02-24T00:00:00Z
source MITRE
title M-Trends 2015: A View from the Front Lines

MTrends 2016

Mandiant. (2016, February). M-Trends 2016. Retrieved January 4, 2017.

Internal MISP references

UUID a4747b74-7266-439b-bb8a-bae7102b0d07 which can be used as unique global reference for MTrends 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-01-04T00:00:00Z
date_published 2016-02-01T00:00:00Z
source MITRE
title M-Trends 2016

Mandiant. (2020, February). M-Trends 2020. Retrieved April 24, 2020.

Internal MISP references

UUID 83bc9b28-f8b3-4522-b9f1-f43bce3ae917 which can be used as unique global reference for Mandiant M-Trends 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-04-24T00:00:00Z
date_published 2020-02-01T00:00:00Z
source MITRE
title M-Trends 2020

Accenture MUDCARP March 2019

Accenture iDefense Unit. (2019, March 5). Mudcarp's Focus on Submarine Technologies. Retrieved August 24, 2021.

Internal MISP references

UUID 811d433d-27a4-4411-8ec9-b3a173ba0033 which can be used as unique global reference for Accenture MUDCARP March 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-24T00:00:00Z
date_published 2019-03-05T00:00:00Z
source MITRE
title Mudcarp's Focus on Submarine Technologies

Unit 42 4 9 2024

Margaret Zimmermann. (2024, April 9). Muddled Libra's Evolution to the Cloud. Retrieved April 9, 2024.

Internal MISP references

UUID 85379fc0-18e5-4862-9629-d21fa686afa2 which can be used as unique global reference for Unit 42 4 9 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-09T00:00:00Z
date_published 2024-04-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Muddled Libra's Evolution to the Cloud

Unit 42 MuddyWater Nov 2017

Lancaster, T.. (2017, November 14). Muddying the Water: Targeted Attacks in the Middle East. Retrieved March 15, 2018.

Internal MISP references

UUID dcdee265-2e46-4f40-95c7-6a2683edb23a which can be used as unique global reference for Unit 42 MuddyWater Nov 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-15T00:00:00Z
date_published 2017-11-14T00:00:00Z
source MITRE, Tidal Cyber
title Muddying the Water: Targeted Attacks in the Middle East

Securelist MuddyWater Oct 2018

Kaspersky Lab's Global Research & Analysis Team. (2018, October 10). MuddyWater expands operations. Retrieved November 2, 2018.

Internal MISP references

UUID d968546b-5b00-4a7b-9bff-57dfedd0125f which can be used as unique global reference for Securelist MuddyWater Oct 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-02T00:00:00Z
date_published 2018-10-10T00:00:00Z
source MITRE
title MuddyWater expands operations

ClearSky MuddyWater Nov 2018

ClearSky Cyber Security. (2018, November). MuddyWater Operations in Lebanon and Oman: Using an Israeli compromised domain for a two-stage campaign. Retrieved November 29, 2018.

Internal MISP references

UUID a5f60f45-5df5-407d-9f68-bc5f7c42ee85 which can be used as unique global reference for ClearSky MuddyWater Nov 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-29T00:00:00Z
date_published 2018-11-01T00:00:00Z
source MITRE, Tidal Cyber
title MuddyWater Operations in Lebanon and Oman: Using an Israeli compromised domain for a two-stage campaign

TrendMicro POWERSTATS V3 June 2019

Lunghi, D. and Horejsi, J.. (2019, June 10). MuddyWater Resurfaces, Uses Multi-Stage Backdoor POWERSTATS V3 and New Post-Exploitation Tools. Retrieved May 14, 2020.

Internal MISP references

UUID bf9847e2-f2bb-4a96-af8f-56e1ffc45cf7 which can be used as unique global reference for TrendMicro POWERSTATS V3 June 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-14T00:00:00Z
date_published 2019-06-10T00:00:00Z
source MITRE
title MuddyWater Resurfaces, Uses Multi-Stage Backdoor POWERSTATS V3 and New Post-Exploitation Tools

Aquasec Muhstik Malware 2024

Nitzan Yaakov. (2024, June 4). Muhstik Malware Targets Message Queuing Services Applications. Retrieved September 24, 2024.

Internal MISP references

UUID 3cd203fd-f178-5c0f-bccc-ea5d52240304 which can be used as unique global reference for Aquasec Muhstik Malware 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-24T00:00:00Z
date_published 2024-06-04T00:00:00Z
source MITRE
title Muhstik Malware Targets Message Queuing Services Applications

NIST MFA

NIST. (n.d.). Multi-Factor Authentication (MFA). Retrieved September 25, 2024.

Internal MISP references

UUID 2f069bb2-3f59-409e-a337-7c69411c8b01 which can be used as unique global reference for NIST MFA in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-25T00:00:00Z
source MITRE
title Multi-Factor Authentication (MFA)

Talos Cobalt Group July 2018

Svajcer, V. (2018, July 31). Multiple Cobalt Personality Disorder. Retrieved September 5, 2018.

Internal MISP references

UUID 7cdfd0d1-f7e6-4625-91ff-f87f46f95864 which can be used as unique global reference for Talos Cobalt Group July 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-09-05T00:00:00Z
date_published 2018-07-31T00:00:00Z
source MITRE, Tidal Cyber
title Multiple Cobalt Personality Disorder

U.S. CISA Zoho Exploits September 7 2023

Cybersecurity and Infrastructure Security Agency. (2023, September 7). Multiple Nation-State Threat Actors Exploit CVE-2022-47966 and CVE-2022-42475. Retrieved September 7, 2023.

Internal MISP references

UUID 6bb581e8-ed0e-41fe-bf95-49b5d11b4e6b which can be used as unique global reference for U.S. CISA Zoho Exploits September 7 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-07T00:00:00Z
date_published 2023-09-07T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Multiple Nation-State Threat Actors Exploit CVE-2022-47966 and CVE-2022-42475

CIS Multiple SMB Vulnerabilities

CIS. (2017, May 15). Multiple Vulnerabilities in Microsoft Windows SMB Server Could Allow for Remote Code Execution. Retrieved April 3, 2018.

Internal MISP references

UUID 76d9da2c-1503-4105-b017-cb2b69298296 which can be used as unique global reference for CIS Multiple SMB Vulnerabilities in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-03T00:00:00Z
date_published 2017-05-15T00:00:00Z
source MITRE
title Multiple Vulnerabilities in Microsoft Windows SMB Server Could Allow for Remote Code Execution

GitHub Mauraena

Orrù, M., Trotta, G.. (2019, September 11). Muraena. Retrieved October 14, 2019.

Internal MISP references

UUID 578ecf62-b546-4f52-9d50-92557edf2dd4 which can be used as unique global reference for GitHub Mauraena in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-14T00:00:00Z
date_published 2019-09-11T00:00:00Z
source MITRE
title Muraena

Arbor Musical Chairs Feb 2018

Sabo, S. (2018, February 15). Musical Chairs Playing Tetris. Retrieved February 19, 2018.

Internal MISP references

UUID bddf44bb-7a0a-498b-9831-7b73cf9a582e which can be used as unique global reference for Arbor Musical Chairs Feb 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-19T00:00:00Z
date_published 2018-02-15T00:00:00Z
source MITRE
title Musical Chairs Playing Tetris

Microsoft Mutexes

Microsoft. (2022, March 11). Mutexes. Retrieved September 19, 2024.

Internal MISP references

UUID e1384ecc-7fb9-588c-aca9-a67dc1ca1b60 which can be used as unique global reference for Microsoft Mutexes in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-19T00:00:00Z
date_published 2022-03-11T00:00:00Z
source MITRE
title Mutexes

Mythc Documentation

Thomas, C. (n.d.). Mythc Documentation. Retrieved March 25, 2022.

Internal MISP references

UUID de3091b4-663e-4d9e-9dde-51250749863d which can be used as unique global reference for Mythc Documentation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-25T00:00:00Z
source MITRE
title Mythc Documentation

Mythic Github

Thomas, C. (2018, July 4). Mythic. Retrieved March 25, 2022.

Internal MISP references

UUID 20d0adf0-b832-4b03-995e-dfb56474ddcc which can be used as unique global reference for Mythic Github in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-25T00:00:00Z
date_published 2018-07-04T00:00:00Z
source MITRE
title Mythic

Crowdstrike Mythic Leopard Profile

Crowdstrike. (n.d.). Mythic Leopard. Retrieved October 6, 2021.

Internal MISP references

UUID efa5dc67-3364-4049-bb13-8b9e1b55f172 which can be used as unique global reference for Crowdstrike Mythic Leopard Profile in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-06T00:00:00Z
source MITRE
title Mythic Leopard

CheckPoint Naikon May 2020

CheckPoint. (2020, May 7). Naikon APT: Cyber Espionage Reloaded. Retrieved May 26, 2020.

Internal MISP references

UUID f080acab-a6a0-42e1-98ff-45e415393648 which can be used as unique global reference for CheckPoint Naikon May 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-26T00:00:00Z
date_published 2020-05-07T00:00:00Z
source MITRE
title Naikon APT: Cyber Espionage Reloaded

Bitdefender Naikon April 2021

Vrabie, V. (2021, April 23). NAIKON – Traces from a Military Cyber-Espionage Operation. Retrieved June 29, 2021.

Internal MISP references

UUID 55660913-4c03-4360-bb8b-1cad94bd8d0e which can be used as unique global reference for Bitdefender Naikon April 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-29T00:00:00Z
date_published 2021-04-23T00:00:00Z
source MITRE
title NAIKON – Traces from a Military Cyber-Espionage Operation

Microsoft Named Pipes

Microsoft. (2018, May 31). Named Pipes. Retrieved September 28, 2021.

Internal MISP references

UUID 09a3f7dd-5597-4a55-8408-a2f09f4efcd4 which can be used as unique global reference for Microsoft Named Pipes in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-28T00:00:00Z
date_published 2018-05-31T00:00:00Z
source MITRE
title Named Pipes

fsecure NanHaiShu July 2016

F-Secure Labs. (2016, July). NANHAISHU RATing the South China Sea. Retrieved July 6, 2018.

Internal MISP references

UUID 41984650-a0ac-4445-80b6-7ceaf93bd135 which can be used as unique global reference for fsecure NanHaiShu July 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-06T00:00:00Z
date_published 2016-07-01T00:00:00Z
source MITRE
title NANHAISHU RATing the South China Sea

DigiTrust NanoCore Jan 2017

The DigiTrust Group. (2017, January 01). NanoCore Is Not Your Average RAT. Retrieved November 9, 2018.

Internal MISP references

UUID 6abac972-bbd0-4cd2-b3a7-25e7825ac134 which can be used as unique global reference for DigiTrust NanoCore Jan 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-09T00:00:00Z
date_published 2017-01-01T00:00:00Z
source MITRE
title NanoCore Is Not Your Average RAT

PaloAlto NanoCore Feb 2016

Kasza, A., Halfpop, T. (2016, February 09). NanoCoreRAT Behind an Increase in Tax-Themed Phishing E-mails. Retrieved November 9, 2018.

Internal MISP references

UUID caa0a421-04b0-4ebc-b365-97082d69d33d which can be used as unique global reference for PaloAlto NanoCore Feb 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-09T00:00:00Z
date_published 2016-02-09T00:00:00Z
source MITRE
title NanoCoreRAT Behind an Increase in Tax-Themed Phishing E-mails

Unit42 BabyShark Feb 2019

Unit 42. (2019, February 22). New BabyShark Malware Targets U.S. National Security Think Tanks. Retrieved October 7, 2019.

Internal MISP references

UUID 634404e3-e2c9-4872-a280-12d2be168cba which can be used as unique global reference for Unit42 BabyShark Feb 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-07T00:00:00Z
source MITRE
title National Security Think Tanks

National Vulnerability Database

National Vulnerability Database. (n.d.). National Vulnerability Database. Retrieved October 15, 2020.

Internal MISP references

UUID 9b42dcc6-a39c-4d74-adc3-135f9ceac5ba which can be used as unique global reference for National Vulnerability Database in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-15T00:00:00Z
source MITRE
title National Vulnerability Database

NationsBuying

Nicole Perlroth and David E. Sanger. (2013, July 12). Nations Buying as Hackers Sell Flaws in Computer Code. Retrieved March 9, 2017.

Internal MISP references

UUID a3e224e7-fe22-48d6-9ff5-35900f06c060 which can be used as unique global reference for NationsBuying in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-09T00:00:00Z
date_published 2013-07-12T00:00:00Z
source MITRE
title Nations Buying as Hackers Sell Flaws in Computer Code

FireEye Maze May 2020

Kennelly, J., Goody, K., Shilko, J. (2020, May 7). Navigating the MAZE: Tactics, Techniques and Procedures Associated With MAZE Ransomware Incidents. Retrieved May 18, 2020.

Internal MISP references

UUID 02338a66-6820-4505-8239-a1f1fcc60d32 which can be used as unique global reference for FireEye Maze May 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-18T00:00:00Z
date_published 2020-05-07T00:00:00Z
source MITRE
title Navigating the MAZE: Tactics, Techniques and Procedures Associated With MAZE Ransomware Incidents

Talos NavRAT May 2018

Mercer, W., Rascagneres, P. (2018, May 31). NavRAT Uses US-North Korea Summit As Decoy For Attacks In South Korea. Retrieved June 11, 2018.

Internal MISP references

UUID f644ac27-a923-489b-944e-1ba89c609307 which can be used as unique global reference for Talos NavRAT May 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-06-11T00:00:00Z
date_published 2018-05-31T00:00:00Z
source MITRE
title NavRAT Uses US-North Korea Summit As Decoy For Attacks In South Korea

GitHub NBNSpoof

Nomex. (2014, February 7). NBNSpoof. Retrieved November 17, 2017.

Internal MISP references

UUID 4119091a-96f8-441c-b66f-ee0d9013d7ca which can be used as unique global reference for GitHub NBNSpoof in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-17T00:00:00Z
date_published 2014-02-07T00:00:00Z
source MITRE
title NBNSpoof

SecTools nbtscan June 2003

SecTools. (2003, June 11). NBTscan. Retrieved March 17, 2021.

Internal MISP references

UUID 505c9e8b-66e0-435c-835f-b4405ba91966 which can be used as unique global reference for SecTools nbtscan June 2003 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-17T00:00:00Z
date_published 2003-06-11T00:00:00Z
source MITRE
title NBTscan

Debian nbtscan Nov 2019

Bezroutchko, A. (2019, November 19). NBTscan man page. Retrieved March 17, 2021.

Internal MISP references

UUID 8d718be1-9695-4e61-a922-5162d88477c0 which can be used as unique global reference for Debian nbtscan Nov 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-17T00:00:00Z
date_published 2019-11-19T00:00:00Z
source MITRE
title NBTscan man page

TechNet Nbtstat

Microsoft. (n.d.). Nbtstat. Retrieved April 17, 2016.

Internal MISP references

UUID 1b1e6b08-fc2a-48f7-82bd-e3c1a7a0d97e which can be used as unique global reference for TechNet Nbtstat in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-17T00:00:00Z
source MITRE
title Nbtstat

NCSC Sandworm Feb 2020

NCSC. (2020, February 20). NCSC supports US advisory regarding GRU intrusion set Sandworm. Retrieved June 10, 2020.

Internal MISP references

UUID d876d037-9d24-44af-b8f0-5c1555632b91 which can be used as unique global reference for NCSC Sandworm Feb 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-10T00:00:00Z
date_published 2020-02-20T00:00:00Z
source MITRE
title NCSC supports US advisory regarding GRU intrusion set Sandworm

7 - appv

Nick Landers. (2017, August 8). Need a signed alternative to Powershell.exe? SyncAppvPublishingServer in Win10 has got you covered.. Retrieved September 12, 2024.

Internal MISP references

UUID 264a4f99-b1dc-5afd-8178-e1f37c3db8ff which can be used as unique global reference for 7 - appv in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2017-08-08T00:00:00Z
source MITRE
title Need a signed alternative to Powershell.exe? SyncAppvPublishingServer in Win10 has got you covered.

Szappanos MgBot 2014

Gabor Szappanos. (2014, February 3). Needle in a haystack. Retrieved July 25, 2024.

Internal MISP references

UUID d2742561-6d0a-54d6-9c6d-1e2cd789dcc4 which can be used as unique global reference for Szappanos MgBot 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-25T00:00:00Z
date_published 2014-02-03T00:00:00Z
source MITRE
title Needle in a haystack

TechNet NetBIOS

Microsoft. (n.d.). NetBIOS Name Resolution. Retrieved November 17, 2017.

Internal MISP references

UUID f756ee2e-2e79-41df-bf9f-6492a9708663 which can be used as unique global reference for TechNet NetBIOS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-17T00:00:00Z
source MITRE
title NetBIOS Name Resolution

Microsoft Net

Microsoft. (2017, February 14). Net Commands On Windows Operating Systems. Retrieved March 19, 2020.

Internal MISP references

UUID a04320b9-0c6a-49f9-8b84-50587278cdfb which can be used as unique global reference for Microsoft Net in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-19T00:00:00Z
date_published 2017-02-14T00:00:00Z
source MITRE
title Net Commands On Windows Operating Systems

Savill 1999

Savill, J. (1999, March 4). Net.exe reference. Retrieved September 22, 2015.

Internal MISP references

UUID e814d4a5-b846-4d68-ac00-7021238d287a which can be used as unique global reference for Savill 1999 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-09-22T00:00:00Z
date_published 1999-03-04T00:00:00Z
source MITRE
title Net.exe reference

Microsoft Net Utility

Microsoft. (2006, October 18). Net.exe Utility. Retrieved September 22, 2015.

Internal MISP references

UUID 75998d1c-69c0-40d2-a64b-43ad8efa05da which can be used as unique global reference for Microsoft Net Utility in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-09-22T00:00:00Z
date_published 2006-10-18T00:00:00Z
source MITRE
title Net.exe Utility

Microsoft Net Group

Microsoft. (2016, August 31). Net group. Retrieved August 5, 2024.

Internal MISP references

UUID 23ec5471-808c-53fa-8bce-36b3982e9dd1 which can be used as unique global reference for Microsoft Net Group in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-05T00:00:00Z
date_published 2016-08-31T00:00:00Z
source MITRE
title Net group

Microsoft Net Localgroup

Microsoft. (2016, August 31). Net Localgroup. Retrieved August 5, 2024.

Internal MISP references

UUID f7e55413-2e3f-5e46-ba73-75eaa1ed6ec3 which can be used as unique global reference for Microsoft Net Localgroup in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-05T00:00:00Z
date_published 2016-08-31T00:00:00Z
source MITRE
title Net Localgroup

TechNet Netsh Firewall

Microsoft. (2009, June 3). Netsh Commands for Windows Firewall. Retrieved April 20, 2016.

Internal MISP references

UUID 00fb3fa3-6f72-47ad-a950-f258a70485f2 which can be used as unique global reference for TechNet Netsh Firewall in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-20T00:00:00Z
date_published 2009-06-03T00:00:00Z
source MITRE
title Netsh Commands for Windows Firewall

Netsh.exe - LOLBAS Project

LOLBAS. (2019, December 24). Netsh.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 6d76b28f-ab57-46bd-871d-1488212d3a8f which can be used as unique global reference for Netsh.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2019-12-24T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Netsh.exe

Github Netsh Helper CS Beacon

Smeets, M. (2016, September 26). NetshHelperBeacon. Retrieved February 13, 2017.

Internal MISP references

UUID c3169722-9c32-4a38-a7fe-8d4b6e51ca36 which can be used as unique global reference for Github Netsh Helper CS Beacon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-02-13T00:00:00Z
date_published 2016-09-26T00:00:00Z
source MITRE
title NetshHelperBeacon

TechNet Netstat

Microsoft. (n.d.). Netstat. Retrieved April 17, 2016.

Internal MISP references

UUID 84ac26d8-9c7c-4c8c-bf64-a9fb4578388c which can be used as unique global reference for TechNet Netstat in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-17T00:00:00Z
source MITRE
title Netstat

The DFIR Report NetSupport October 30 2023

The DFIR Report. (2023, October 30). NetSupport Intrusion Results in Domain Compromise. Retrieved May 22, 2024.

Internal MISP references

UUID 0436db31-42f0-47c1-b9a9-c6bb7c60a1ec which can be used as unique global reference for The DFIR Report NetSupport October 30 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-22T00:00:00Z
date_published 2023-10-30T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title NetSupport Intrusion Results in Domain Compromise

TechNet Net Time

Microsoft. (n.d.). Net time. Retrieved November 25, 2016.

Internal MISP references

UUID 83094489-791f-4925-879f-e79f67e4bf1f which can be used as unique global reference for TechNet Net Time in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-11-25T00:00:00Z
source MITRE
title Net time

Technet Net Use

Microsoft. (n.d.). Net Use. Retrieved November 25, 2016.

Internal MISP references

UUID f761d4b6-8fc5-4037-aa34-7982c17f8bed which can be used as unique global reference for Technet Net Use in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-11-25T00:00:00Z
source MITRE
title Net Use

TrendMicro Netwalker May 2020

Victor, K.. (2020, May 18). Netwalker Fileless Ransomware Injected via Reflective Loading . Retrieved May 26, 2020.

Internal MISP references

UUID ceda9ef6-e609-4a34-9db1-d2a3ebffb679 which can be used as unique global reference for TrendMicro Netwalker May 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-26T00:00:00Z
date_published 2020-05-18T00:00:00Z
source MITRE
title Netwalker Fileless Ransomware Injected via Reflective Loading

Sophos Netwalker May 2020

Szappanos, G., Brandt, A.. (2020, May 27). Netwalker ransomware tools give insight into threat actor. Retrieved May 27, 2020.

Internal MISP references

UUID 721db562-6046-4f47-95a1-36a16f26f3d1 which can be used as unique global reference for Sophos Netwalker May 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-27T00:00:00Z
date_published 2020-05-27T00:00:00Z
source MITRE
title Netwalker ransomware tools give insight into threat actor

McAfee Netwire Mar 2015

McAfee. (2015, March 2). Netwire RAT Behind Recent Targeted Attacks. Retrieved February 15, 2018.

Internal MISP references

UUID b02fbf00-f571-4507-941d-ac1d4a8310b0 which can be used as unique global reference for McAfee Netwire Mar 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-15T00:00:00Z
date_published 2015-03-02T00:00:00Z
source MITRE
title Netwire RAT Behind Recent Targeted Attacks

Windows Anonymous Enumeration of SAM Accounts

Microsoft. (2017, April 19). Network access: Do not allow anonymous enumeration of SAM accounts and shares. Retrieved May 20, 2020.

Internal MISP references

UUID 25e0244a-b829-4df9-a435-b6f9f1a2f0bc which can be used as unique global reference for Windows Anonymous Enumeration of SAM Accounts in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-20T00:00:00Z
date_published 2017-04-19T00:00:00Z
source MITRE
title Network access: Do not allow anonymous enumeration of SAM accounts and shares

Microsoft Network access Credential Manager

Microsoft. (2016, August 31). Network access: Do not allow storage of passwords and credentials for network authentication. Retrieved November 23, 2020.

Internal MISP references

UUID e0d8c585-e898-43ba-8d46-201dbe52db56 which can be used as unique global reference for Microsoft Network access Credential Manager in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-23T00:00:00Z
date_published 2016-08-31T00:00:00Z
source MITRE
title Network access: Do not allow storage of passwords and credentials for network authentication

Microsoft NFS Overview

Microsoft. (2018, July 9). Network File System overview. Retrieved September 28, 2021.

Internal MISP references

UUID 1e49b346-d822-4f82-92db-2989313d07e9 which can be used as unique global reference for Microsoft NFS Overview in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-28T00:00:00Z
date_published 2018-07-09T00:00:00Z
source MITRE
title Network File System overview

Network Provider API

Microsoft. (2021, January 7). Network Provider API. Retrieved March 30, 2023.

Internal MISP references

UUID b218434e-4233-5963-824e-50ee32d468ed which can be used as unique global reference for Network Provider API in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-30T00:00:00Z
date_published 2021-01-07T00:00:00Z
source MITRE
title Network Provider API

Malwarebytes Agent Tesla April 2020

Jazi, H. (2020, April 16). New AgentTesla variant steals WiFi credentials. Retrieved May 19, 2020.

Internal MISP references

UUID 87f4fe4c-54cd-40a7-938b-6e6f6d2efbea which can be used as unique global reference for Malwarebytes Agent Tesla April 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-19T00:00:00Z
date_published 2020-04-16T00:00:00Z
source MITRE
title New AgentTesla variant steals WiFi credentials

Malware Bytes New AgentTesla variant steals WiFi credentials

Hossein Jazi. (2020, April 16). New AgentTesla variant steals WiFi credentials. Retrieved September 8, 2023.

Internal MISP references

UUID b61b7db6-ed0d-546d-b1e0-c2630530975b which can be used as unique global reference for Malware Bytes New AgentTesla variant steals WiFi credentials in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-08T00:00:00Z
date_published 2020-04-16T00:00:00Z
source MITRE
title New AgentTesla variant steals WiFi credentials

TrendMicro New Andariel Tactics July 2018

Chen, Joseph. (2018, July 16). New Andariel Reconnaissance Tactics Uncovered. Retrieved September 29, 2021.

Internal MISP references

UUID b667eb44-8c2f-4319-bc93-f03610214b8b which can be used as unique global reference for TrendMicro New Andariel Tactics July 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-29T00:00:00Z
date_published 2018-07-16T00:00:00Z
source MITRE
title New Andariel Reconnaissance Tactics Uncovered

Unit 42 C0d0so0 Jan 2016

Grunzweig, J., Lee, B. (2016, January 22). New Attacks Linked to C0d0so0 Group. Retrieved August 2, 2018.

Internal MISP references

UUID c740fc1c-093e-4389-890e-1fd88a824df4 which can be used as unique global reference for Unit 42 C0d0so0 Jan 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-02T00:00:00Z
date_published 2016-01-22T00:00:00Z
source MITRE
title New Attacks Linked to C0d0so0 Group

Trend Micro Banking Malware Jan 2019

Salvio, J.. (2014, June 27). New Banking Malware Uses Network Sniffing for Data Theft. Retrieved March 25, 2019.

Internal MISP references

UUID 4fee21e3-1b8f-4e10-b077-b59e2df94633 which can be used as unique global reference for Trend Micro Banking Malware Jan 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-25T00:00:00Z
date_published 2014-06-27T00:00:00Z
source MITRE
title New Banking Malware Uses Network Sniffing for Data Theft

IBM IcedID November 2017

Kessem, L., et al. (2017, November 13). New Banking Trojan IcedID Discovered by IBM X-Force Research. Retrieved July 14, 2020.

Internal MISP references

UUID fdc56361-24f4-4fa5-949e-02e61c4d3be8 which can be used as unique global reference for IBM IcedID November 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-07-14T00:00:00Z
date_published 2017-11-13T00:00:00Z
source MITRE
title New Banking Trojan IcedID Discovered by IBM X-Force Research

Minerva Labs Black Basta May 2022

Zargarov, N. (2022, May 2). New Black Basta Ransomware Hijacks Windows Fax Service. Retrieved March 7, 2023.

Internal MISP references

UUID 6358f7ed-41d6-56be-83bb-179e0a8b7873 which can be used as unique global reference for Minerva Labs Black Basta May 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-07T00:00:00Z
date_published 2022-05-02T00:00:00Z
source MITRE
title New Black Basta Ransomware Hijacks Windows Fax Service

Google TAG Lazarus Jan 2021

Weidemann, A. (2021, January 25). New campaign targeting security researchers. Retrieved December 20, 2021.

Internal MISP references

UUID fb4b3427-353d-44c7-8dcd-d257324a83b2 which can be used as unique global reference for Google TAG Lazarus Jan 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-12-20T00:00:00Z
date_published 2021-01-25T00:00:00Z
source MITRE
title New campaign targeting security researchers

Airbus Derusbi 2015

Perigaud, F. (2015, December 15). Newcomers in the Derusbi family. Retrieved September 12, 2024.

Internal MISP references

UUID 9b419a40-c20b-40dd-8627-9c1c786bf165 which can be used as unique global reference for Airbus Derusbi 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2015-12-15T00:00:00Z
source MITRE
title Newcomers in the Derusbi family

Malwarebytes Crossrider Apr 2018

Reed, Thomas. (2018, April 24). New Crossrider variant installs configuration profiles on Macs. Retrieved September 6, 2019.

Internal MISP references

UUID 80530288-26a3-4c3e-ace1-47510df10fbd which can be used as unique global reference for Malwarebytes Crossrider Apr 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-06T00:00:00Z
date_published 2018-04-24T00:00:00Z
source MITRE
title New Crossrider variant installs configuration profiles on Macs

IBM ZeroCleare Wiper December 2019

Kessem, L. (2019, December 4). New Destructive Wiper ZeroCleare Targets Energy Sector in the Middle East. Retrieved September 4, 2024.

Internal MISP references

UUID 26ba5292-265d-5db4-a571-215c984fe095 which can be used as unique global reference for IBM ZeroCleare Wiper December 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-04T00:00:00Z
date_published 2019-12-04T00:00:00Z
source MITRE
title New Destructive Wiper ZeroCleare Targets Energy Sector in the Middle East

CyberBit Early Bird Apr 2018

Gavriel, H. & Erbesfeld, B. (2018, April 11). New ‘Early Bird’ Code Injection Technique Discovered. Retrieved May 24, 2018.

Internal MISP references

UUID 8ae4ec67-518e-46dd-872c-7e2a9ca4ef13 which can be used as unique global reference for CyberBit Early Bird Apr 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-05-24T00:00:00Z
date_published 2018-04-11T00:00:00Z
source MITRE
title New ‘Early Bird’ Code Injection Technique Discovered

Zscaler Molerats Campaign

Sahil Antil, Sudeep Singh. (2022, January 20). New espionage attack by Molerats APT targeting users in the Middle East. Retrieved October 10, 2023.

Internal MISP references

UUID 3b39e73e-229f-4ff4-bec3-d83e6364a66e which can be used as unique global reference for Zscaler Molerats Campaign in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-10T00:00:00Z
date_published 2022-01-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title New espionage attack by Molerats APT targeting users in the Middle East

CrowdStrike Wizard Spider March 2019

Feeley, B. and Stone-Gross, B. (2019, March 20). New Evidence Proves Ongoing WIZARD SPIDER / LUNAR SPIDER Collaboration. Retrieved June 15, 2020.

Internal MISP references

UUID d7001d6f-97a1-4155-8f74-3d878d4cbb27 which can be used as unique global reference for CrowdStrike Wizard Spider March 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-15T00:00:00Z
date_published 2019-03-20T00:00:00Z
source MITRE
title New Evidence Proves Ongoing WIZARD SPIDER / LUNAR SPIDER Collaboration

Bleeping Computer Evil Corp mimics PayloadBin gang 2022

Abrams, L. (2021, June 6). New Evil Corp ransomware mimics PayloadBin gang to evade US sanctions. Retrieved July 19, 2022.

Internal MISP references

UUID 5695d3a2-6b6c-433a-9254-d4a2e001a8be which can be used as unique global reference for Bleeping Computer Evil Corp mimics PayloadBin gang 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-19T00:00:00Z
source Tidal Cyber
title New Evil Corp ransomware mimics PayloadBin gang to evade US sanctions

Reliaquest-execution

Reliaquest. (2024, May 31). New Execution Technique in ClearFake Campaign. Retrieved August 2, 2024.

Internal MISP references

UUID c6febbb5-b994-5996-a42d-56d4cb151e83 which can be used as unique global reference for Reliaquest-execution in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-02T00:00:00Z
date_published 2024-05-31T00:00:00Z
source MITRE
title New Execution Technique in ClearFake Campaign

Microsoft Block Office Macros

Windows Defender Research. (2016, March 22). New feature in Office 2016 can block macros and help prevent infection. Retrieved April 11, 2018.

Internal MISP references

UUID 4d0f4d0a-b812-42f8-a52c-a1f5c69e6337 which can be used as unique global reference for Microsoft Block Office Macros in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-11T00:00:00Z
date_published 2016-03-22T00:00:00Z
source MITRE
title New feature in Office 2016 can block macros and help prevent infection

TechNet Office Macro Security

Microsoft Malware Protection Center. (2016, March 22). New feature in Office 2016 can block macros and help prevent infection. Retrieved July 3, 2017.

Internal MISP references

UUID f14f08c5-de51-4827-ba3a-f0598dfbe505 which can be used as unique global reference for TechNet Office Macro Security in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-03T00:00:00Z
date_published 2016-03-22T00:00:00Z
source MITRE
title New feature in Office 2016 can block macros and help prevent infection

SolarWinds Sunburst Sunspot Update January 2021

Sudhakar Ramakrishna . (2021, January 11). New Findings From Our Investigation of SUNBURST. Retrieved January 13, 2021.

Internal MISP references

UUID 1be1b6e0-1b42-4d07-856b-b6321c17bb88 which can be used as unique global reference for SolarWinds Sunburst Sunspot Update January 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-13T00:00:00Z
date_published 2021-01-11T00:00:00Z
source MITRE
title New Findings From Our Investigation of SUNBURST

BleepingComp Godlua JUL19

Gatlan, S. (2019, July 3). New Godlua Malware Evades Traffic Monitoring via DNS over HTTPS. Retrieved March 15, 2020.

Internal MISP references

UUID fd862d10-79bc-489d-a552-118014d01648 which can be used as unique global reference for BleepingComp Godlua JUL19 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-15T00:00:00Z
date_published 2019-07-03T00:00:00Z
source MITRE
title New Godlua Malware Evades Traffic Monitoring via DNS over HTTPS

HTML Smuggling Menlo Security 2020

Subramanian, K. (2020, August 18). New HTML Smuggling Attack Alert: Duri. Retrieved May 20, 2021.

Internal MISP references

UUID a9fc3502-66c2-4504-9886-458f8a803b5d which can be used as unique global reference for HTML Smuggling Menlo Security 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-05-20T00:00:00Z
date_published 2020-08-18T00:00:00Z
source MITRE
title New HTML Smuggling Attack Alert: Duri

Microsoft New-InboxRule

Microsoft. (n.d.). New-InboxRule. Retrieved June 7, 2021.

Internal MISP references

UUID 54fcfc36-e0d5-422f-8a45-eeb7fa077a93 which can be used as unique global reference for Microsoft New-InboxRule in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-07T00:00:00Z
source MITRE
title New-InboxRule

AWS - IAM Console Best Practices

Moncur, Rob. (2020, July 5). New Information in the AWS IAM Console Helps You Follow IAM Best Practices. Retrieved August 4, 2020.

Internal MISP references

UUID dadae802-91a7-46d4-aacd-48f49f22854e which can be used as unique global reference for AWS - IAM Console Best Practices in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-04T00:00:00Z
date_published 2020-07-05T00:00:00Z
source MITRE
title New Information in the AWS IAM Console Helps You Follow IAM Best Practices

Trend Micro Ransomware February 2021

Centero, R. et al. (2021, February 5). New in Ransomware: Seth-Locker, Babuk Locker, Maoloa, TeslaCrypt, and CobraLocker. Retrieved August 11, 2021.

Internal MISP references

UUID 64a86a3f-0160-4766-9ac1-7d287eb2c323 which can be used as unique global reference for Trend Micro Ransomware February 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-11T00:00:00Z
date_published 2021-02-05T00:00:00Z
source MITRE
title New in Ransomware: Seth-Locker, Babuk Locker, Maoloa, TeslaCrypt, and CobraLocker

Avast CCleaner3 2018

Avast Threat Intelligence Team. (2018, March 8). New investigations into the CCleaner incident point to a possible third stage that had keylogger capacities. Retrieved March 15, 2018.

Internal MISP references

UUID 1641553f-96e7-4829-8c77-d96388dac5c7 which can be used as unique global reference for Avast CCleaner3 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-15T00:00:00Z
date_published 2018-03-08T00:00:00Z
source MITRE
title New investigations into the CCleaner incident point to a possible third stage that had keylogger capacities

amnesia malware

Claud Xiao, Cong Zheng, Yanhui Jia. (2017, April 6). New IoT/Linux Malware Targets DVRs, Forms Botnet. Retrieved February 19, 2018.

Internal MISP references

UUID 489a6c57-f64c-423b-a7bd-169fa36c4cdf which can be used as unique global reference for amnesia malware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-19T00:00:00Z
date_published 2017-04-06T00:00:00Z
source MITRE
title New IoT/Linux Malware Targets DVRs, Forms Botnet

Tsunami

Claud Xiao and Cong Zheng. (2017, April 6). New IoT/Linux Malware Targets DVRs, Forms Botnet. Retrieved December 17, 2020.

Internal MISP references

UUID 95b5b03e-f160-47cf-920c-8f4f3d4114a3 which can be used as unique global reference for Tsunami in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-17T00:00:00Z
date_published 2017-04-06T00:00:00Z
source MITRE
title New IoT/Linux Malware Targets DVRs, Forms Botnet

ClearSky Siamesekitten August 2021

ClearSky Cyber Security . (2021, August). New Iranian Espionage Campaign By “Siamesekitten” - Lyceum. Retrieved June 6, 2022.

Internal MISP references

UUID 9485efce-8d54-4461-b64e-0d15e31fbf8c which can be used as unique global reference for ClearSky Siamesekitten August 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-06T00:00:00Z
date_published 2021-08-01T00:00:00Z
source MITRE
title New Iranian Espionage Campaign By “Siamesekitten” - Lyceum

Unit 42 NOKKI Sept 2018

Grunzweig, J., Lee, B. (2018, September 27). New KONNI Malware attacking Eurasia and Southeast Asia. Retrieved November 5, 2018.

Internal MISP references

UUID f3d3b9bc-4c59-4a1f-b602-e3e884661708 which can be used as unique global reference for Unit 42 NOKKI Sept 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-05T00:00:00Z
date_published 2018-09-27T00:00:00Z
source MITRE
title New KONNI Malware attacking Eurasia and Southeast Asia

Bleeping Computer Latrodectus April 2024

Abrams, L. (2024, April 30). New Latrodectus malware attacks use Microsoft, Cloudflare themes. Retrieved September 13, 2024.

Internal MISP references

UUID b138b07e-d68b-5f68-ba74-ddd7bb654fa6 which can be used as unique global reference for Bleeping Computer Latrodectus April 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-13T00:00:00Z
date_published 2024-04-30T00:00:00Z
source MITRE
title New Latrodectus malware attacks use Microsoft, Cloudflare themes

Arghire LazyScripter

Ionut Arghire. (2021, February 24). New ‘LazyScripter’ Hacking Group Targets Airlines. Retrieved January 10, 2024.

Internal MISP references

UUID bafb2088-d3c1-5550-a48e-cf1e84662fcc which can be used as unique global reference for Arghire LazyScripter in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-10T00:00:00Z
date_published 2021-02-24T00:00:00Z
source MITRE
title New ‘LazyScripter’ Hacking Group Targets Airlines

Intezer RedXOR 2021

Joakim Kennedy and Avigayil Mechtinger. (2021, March 10). New Linux Backdoor RedXOR Likely Operated by Chinese Nation-State Actor. Retrieved September 19, 2024.

Internal MISP references

UUID 43d1212a-356c-56f7-be92-78f2ffe17cf2 which can be used as unique global reference for Intezer RedXOR 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-19T00:00:00Z
date_published 2021-03-10T00:00:00Z
source MITRE
title New Linux Backdoor RedXOR Likely Operated by Chinese Nation-State Actor

Trend Micro Cheerscrypt May 2022

Dela Cruz, A. et al. (2022, May 25). New Linux-Based Ransomware Cheerscrypt Targeting ESXi Devices Linked to Leaked Babuk Source Code. Retrieved December 19, 2023.

Internal MISP references

UUID ca7ccf2c-37f3-522a-acfb-09daa16e23d8 which can be used as unique global reference for Trend Micro Cheerscrypt May 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-19T00:00:00Z
date_published 2022-05-25T00:00:00Z
source MITRE
title New Linux-Based Ransomware Cheerscrypt Targeting ESXi Devices Linked to Leaked Babuk Source Code

Malwarebytes Higaisa 2020

Malwarebytes Threat Intelligence Team. (2020, June 4). New LNK attack tied to Higaisa APT discovered. Retrieved March 2, 2021.

Internal MISP references

UUID 6054e0ab-cf61-49ba-b7f5-58b304477451 which can be used as unique global reference for Malwarebytes Higaisa 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-02T00:00:00Z
date_published 2020-06-04T00:00:00Z
source MITRE
title New LNK attack tied to Higaisa APT discovered

New loader on the bloc - AresLoader | Intel471

Intel471. (2023, March 22). New loader on the bloc - AresLoader. Retrieved May 7, 2023.

Internal MISP references

UUID 1bdd0957-1f5b-4323-bf49-f5c41b8c397a which can be used as unique global reference for New loader on the bloc - AresLoader | Intel471 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2023-03-22T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title New loader on the bloc - AresLoader

Gallagher 2015

Gallagher, S.. (2015, August 5). Newly discovered Chinese hacking group hacked 100+ websites to use as “watering holes”. Retrieved January 25, 2016.

Internal MISP references

UUID b1540c5c-0bbc-4b9d-9185-fae224ba31be which can be used as unique global reference for Gallagher 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-25T00:00:00Z
date_published 2015-08-05T00:00:00Z
source MITRE
title Newly discovered Chinese hacking group hacked 100+ websites to use as “watering holes”

FireEye TLS Nov 2017

Vaish, A. & Nemes, S. (2017, November 28). Newly Observed Ursnif Variant Employs Malicious TLS Callback Technique to Achieve Process Injection. Retrieved December 18, 2017.

Internal MISP references

UUID 9737055a-f583-448e-84d0-1d336c4da9a8 which can be used as unique global reference for FireEye TLS Nov 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-18T00:00:00Z
date_published 2017-11-28T00:00:00Z
source MITRE
title Newly Observed Ursnif Variant Employs Malicious TLS Callback Technique to Achieve Process Injection

FireEye Ursnif Nov 2017

Vaish, A. & Nemes, S. (2017, November 28). Newly Observed Ursnif Variant Employs Malicious TLS Callback Technique to Achieve Process Injection. Retrieved June 5, 2019.

Internal MISP references

UUID 32c0b9d2-9f31-4e49-8b3a-c63ff4fffa47 which can be used as unique global reference for FireEye Ursnif Nov 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-05T00:00:00Z
date_published 2017-11-28T00:00:00Z
source MITRE
title Newly Observed Ursnif Variant Employs Malicious TLS Callback Technique to Achieve Process Injection

Antiquated Mac Malware

Thomas Reed. (2017, January 18). New Mac backdoor using antiquated code. Retrieved July 5, 2017.

Internal MISP references

UUID 165edb01-2681-45a3-b76b-4eb7dee5dab9 which can be used as unique global reference for Antiquated Mac Malware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-05T00:00:00Z
date_published 2017-01-18T00:00:00Z
source MITRE
title New Mac backdoor using antiquated code

Trend Micro MacOS Backdoor November 2020

Magisa, L. (2020, November 27). New MacOS Backdoor Connected to OceanLotus Surfaces. Retrieved December 2, 2020.

Internal MISP references

UUID 43726cb8-a169-4594-9323-fad65b9bae97 which can be used as unique global reference for Trend Micro MacOS Backdoor November 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-02T00:00:00Z
date_published 2020-11-27T00:00:00Z
source MITRE
title New MacOS Backdoor Connected to OceanLotus Surfaces

TrendMicro MacOS April 2018

Horejsi, J. (2018, April 04). New MacOS Backdoor Linked to OceanLotus Found. Retrieved November 13, 2018.

Internal MISP references

UUID e18ad1a7-1e7e-4aca-be9b-9ee12b41c147 which can be used as unique global reference for TrendMicro MacOS April 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-13T00:00:00Z
date_published 2018-04-04T00:00:00Z
source MITRE
title New MacOS Backdoor Linked to OceanLotus Found

TrendMicro macOS Dacls May 2020

Mabutas, G. (2020, May 11). New MacOS Dacls RAT Backdoor Shows Lazarus’ Multi-Platform Attack Capability. Retrieved August 10, 2020.

Internal MISP references

UUID 0ef8691d-48ae-4057-82ef-eb086c05e2b9 which can be used as unique global reference for TrendMicro macOS Dacls May 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-10T00:00:00Z
date_published 2020-05-11T00:00:00Z
source MITRE
title New MacOS Dacls RAT Backdoor Shows Lazarus’ Multi-Platform Attack Capability

OSX Malware Exploits MacKeeper

Sergei Shevchenko. (2015, June 4). New Mac OS Malware Exploits Mackeeper. Retrieved July 3, 2017.

Internal MISP references

UUID 8c4bcbc7-ff52-4f7b-a22e-98bf9cfb1040 which can be used as unique global reference for OSX Malware Exploits MacKeeper in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-03T00:00:00Z
date_published 2015-06-04T00:00:00Z
source MITRE
title New Mac OS Malware Exploits Mackeeper

Carbon Black Shlayer Feb 2019

Carbon Black Threat Analysis Unit. (2019, February 12). New macOS Malware Variant of Shlayer (OSX) Discovered. Retrieved August 8, 2019.

Internal MISP references

UUID d8212691-4a6e-49bf-bc33-740850a1189a which can be used as unique global reference for Carbon Black Shlayer Feb 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-08-08T00:00:00Z
date_published 2019-02-12T00:00:00Z
source MITRE
title New macOS Malware Variant of Shlayer (OSX) Discovered

Palo Alto Rover

Ray, V., Hayashi, K. (2016, February 29). New Malware ‘Rover’ Targets Indian Ambassador to Afghanistan. Retrieved February 29, 2016.

Internal MISP references

UUID bbdf3f49-9875-4d41-986d-b693e82c77e1 which can be used as unique global reference for Palo Alto Rover in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-02-29T00:00:00Z
date_published 2016-02-29T00:00:00Z
source MITRE
title New Malware ‘Rover’ Targets Indian Ambassador to Afghanistan

Palo Alto Reaver Nov 2017

Grunzweig, J. and Miller-Osborn, J. (2017, November 10). New Malware with Ties to SunOrcal Discovered. Retrieved November 16, 2017.

Internal MISP references

UUID 69fbe527-2ec4-457b-81b1-2eda65eb8442 which can be used as unique global reference for Palo Alto Reaver Nov 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-16T00:00:00Z
date_published 2017-11-10T00:00:00Z
source MITRE
title New Malware with Ties to SunOrcal Discovered

Trend Micro Xbash Sept 2018

Trend Micro. (2018, September 19). New Multi-Platform Xbash Packs Obfuscation, Ransomware, Coinminer, Worm and Botnet. Retrieved June 4, 2019.

Internal MISP references

UUID a4b37a24-b2a0-4fcb-9ec3-0d6b67e4e13b which can be used as unique global reference for Trend Micro Xbash Sept 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-04T00:00:00Z
date_published 2018-09-19T00:00:00Z
source MITRE
title New Multi-Platform Xbash Packs Obfuscation, Ransomware, Coinminer, Worm and Botnet

NKAbuse BC

Bill Toulas. (2023, December 14). New NKAbuse malware abuses NKN blockchain for stealthy comms. Retrieved February 8, 2024.

Internal MISP references

UUID 7c0fea50-a125-57eb-9a86-dd0d6693abce which can be used as unique global reference for NKAbuse BC in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-08T00:00:00Z
date_published 2023-12-14T00:00:00Z
source MITRE
title New NKAbuse malware abuses NKN blockchain for stealthy comms

MSRC Nobelium June 2021

MSRC. (2021, June 25). New Nobelium activity. Retrieved August 4, 2021.

Internal MISP references

UUID 1588799f-a5d2-46bc-978d-f10ed7ceb15c which can be used as unique global reference for MSRC Nobelium June 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-04T00:00:00Z
date_published 2021-06-25T00:00:00Z
source MITRE
title New Nobelium activity

Symantec Orangeworm April 2018

Symantec Security Response Attack Investigation Team. (2018, April 23). New Orangeworm attack group targets the healthcare sector in the U.S., Europe, and Asia. Retrieved May 8, 2018.

Internal MISP references

UUID eee5efa1-bbc6-44eb-8fae-23002f351605 which can be used as unique global reference for Symantec Orangeworm April 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-05-08T00:00:00Z
date_published 2018-04-23T00:00:00Z
source MITRE, Tidal Cyber
title New Orangeworm attack group targets the healthcare sector in the U.S., Europe, and Asia

OSX.Dok Malware

Thomas Reed. (2017, July 7). New OSX.Dok malware intercepts web traffic. Retrieved July 10, 2017.

Internal MISP references

UUID 71d65081-dada-4a69-94c5-f1d8e4e151c1 which can be used as unique global reference for OSX.Dok Malware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-10T00:00:00Z
date_published 2017-07-07T00:00:00Z
source MITRE
title New OSX.Dok malware intercepts web traffic

OSX Keydnap malware

Marc-Etienne M.Leveille. (2016, July 6). New OSX/Keydnap malware is hungry for credentials. Retrieved July 3, 2017.

Internal MISP references

UUID d43e0dd1-0946-4f49-bcc7-3ef38445eac3 which can be used as unique global reference for OSX Keydnap malware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-03T00:00:00Z
date_published 2016-07-06T00:00:00Z
source MITRE
title New OSX/Keydnap malware is hungry for credentials

Intego Shlayer Apr 2018

Vrijenhoek, Jay. (2018, April 24). New OSX/Shlayer Malware Variant Found Using a Dirty New Trick. Retrieved September 6, 2019.

Internal MISP references

UUID 3ca1254c-db51-4a5d-8242-ffd9e4481c22 which can be used as unique global reference for Intego Shlayer Apr 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-06T00:00:00Z
date_published 2018-04-24T00:00:00Z
source MITRE
title New OSX/Shlayer Malware Variant Found Using a Dirty New Trick

Cybereason Linux Exim Worm

Cybereason Nocturnus. (2019, June 13). New Pervasive Worm Exploiting Linux Exim Server Vulnerability. Retrieved June 24, 2020.

Internal MISP references

UUID 9523d8ae-d749-4c25-8c7b-df2d8c25c3c8 which can be used as unique global reference for Cybereason Linux Exim Worm in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-24T00:00:00Z
date_published 2019-06-13T00:00:00Z
source MITRE
title New Pervasive Worm Exploiting Linux Exim Server Vulnerability

Netskope Device Code Phishing 2021

Jenko Hwong. (2021, August 10). New Phishing Attacks Exploiting OAuth Authorization Flows (Part 1). Retrieved March 19, 2024.

Internal MISP references

UUID 175ea9c6-aa18-581b-9af5-d4d44f0909e9 which can be used as unique global reference for Netskope Device Code Phishing 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-19T00:00:00Z
date_published 2021-08-10T00:00:00Z
source MITRE
title New Phishing Attacks Exploiting OAuth Authorization Flows (Part 1)

Microsoft Prestige ransomware October 2022

MSTIC. (2022, October 14). New “Prestige” ransomware impacts organizations in Ukraine and Poland. Retrieved January 19, 2023.

Internal MISP references

UUID b57e1181-461b-5ada-a739-873ede1ec079 which can be used as unique global reference for Microsoft Prestige ransomware October 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-01-19T00:00:00Z
date_published 2022-10-14T00:00:00Z
source MITRE
title New “Prestige” ransomware impacts organizations in Ukraine and Poland

Unit 42 MechaFlounder March 2019

Falcone, R. (2019, March 4). New Python-Based Payload MechaFlounder Used by Chafer. Retrieved May 27, 2020.

Internal MISP references

UUID 2263af27-9c30-4bf6-a204-2f148ebdd17c which can be used as unique global reference for Unit 42 MechaFlounder March 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-27T00:00:00Z
date_published 2019-03-04T00:00:00Z
source MITRE
title New Python-Based Payload MechaFlounder Used by Chafer

ThreatDown RansomHub September 9 2024

Bill Cozens. (2024, September 9). New RansomHub attack uses TDSSKiller and LaZagne, disables EDR. Retrieved September 13, 2024.

Internal MISP references

UUID 34422e6e-0e79-48ba-a942-9816e9b4ee7c which can be used as unique global reference for ThreatDown RansomHub September 9 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-13T00:00:00Z
date_published 2024-09-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title New RansomHub attack uses TDSSKiller and LaZagne, disables EDR

Talos Nyetya June 2017

Chiu, A. (2016, June 27). New Ransomware Variant "Nyetya" Compromises Systems Worldwide. Retrieved March 26, 2019.

Internal MISP references

UUID c76e806c-b0e3-4ab9-ba6d-68a9f731f127 which can be used as unique global reference for Talos Nyetya June 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-26T00:00:00Z
date_published 2016-06-27T00:00:00Z
source MITRE
title New Ransomware Variant "Nyetya" Compromises Systems Worldwide

Cyble Black Basta May 2022

Cyble. (2022, May 6). New ransomware variant targeting high-value organizations. Retrieved March 7, 2023.

Internal MISP references

UUID 18035aba-0ae3-58b8-b426-86c2e38a37ae which can be used as unique global reference for Cyble Black Basta May 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-07T00:00:00Z
date_published 2022-05-06T00:00:00Z
source MITRE
title New ransomware variant targeting high-value organizations

Bleepingcomputer RAT malware 2020

Abrams, L. (2020, October 23). New RAT malware gets commands via Discord, has ransomware feature. Retrieved April 1, 2021.

Internal MISP references

UUID a587ea99-a951-4aa8-a3cf-a4822ae97490 which can be used as unique global reference for Bleepingcomputer RAT malware 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-01T00:00:00Z
date_published 2020-10-23T00:00:00Z
source MITRE
title New RAT malware gets commands via Discord, has ransomware feature

IBM ITG18 2020

Wikoff, A. Emerson, R. (2020, July 16). New Research Exposes Iranian Threat Group Operations. Retrieved March 8, 2021.

Internal MISP references

UUID 523b7a1e-88ef-4440-a7b3-3fd0b8d5e199 which can be used as unique global reference for IBM ITG18 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-08T00:00:00Z
date_published 2020-07-16T00:00:00Z
source MITRE
title New Research Exposes Iranian Threat Group Operations

new_rogue_DHCP_serv_malware

Irwin, Ullrich, J. (2009, March 16). new rogue-DHCP server malware. Retrieved January 14, 2022.

Internal MISP references

UUID 8e0a8a9a-9b1f-4141-b595-80b98daf6b68 which can be used as unique global reference for new_rogue_DHCP_serv_malware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-14T00:00:00Z
date_published 2009-03-16T00:00:00Z
source MITRE
title new rogue-DHCP server malware

NCSC, CISA, FBI, NSA. (2022, February 23). New Sandworm malware Cyclops Blink replaces VPNFilter. Retrieved March 3, 2022.

Internal MISP references

UUID bee6cf85-5cb9-4000-b82e-9e15aebfbece which can be used as unique global reference for NCSC CISA Cyclops Blink Advisory February 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-03T00:00:00Z
date_published 2022-02-23T00:00:00Z
source MITRE
title New Sandworm malware Cyclops Blink replaces VPNFilter

Eweek Newscaster and Charming Kitten May 2014

Kerner, S. (2014, May 29). Newscaster Threat Uses Social Media for Intelligence Gathering. Retrieved April 14, 2021.

Internal MISP references

UUID a3407cd2-d579-4d64-8f2e-162c31a99534 which can be used as unique global reference for Eweek Newscaster and Charming Kitten May 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-14T00:00:00Z
date_published 2014-05-29T00:00:00Z
source MITRE
title Newscaster Threat Uses Social Media for Intelligence Gathering

Deep Instinct TA505 Apr 2019

Vilkomir-Preisman, S. (2019, April 2). New ServHelper Variant Employs Excel 4.0 Macro to Drop Signed Payload. Retrieved September 16, 2024..

Internal MISP references

UUID 529524c0-123b-459c-bc6f-62aa45c228d1 which can be used as unique global reference for Deep Instinct TA505 Apr 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-16T00:00:00Z
date_published 2019-04-02T00:00:00Z
source MITRE
title New ServHelper Variant Employs Excel 4.0 Macro to Drop Signed Payload

Janicab

Thomas. (2013, July 15). New signed malware called Janicab. Retrieved July 17, 2017.

Internal MISP references

UUID 1acc1a83-faac-41d3-a08b-cc3a539567fb which can be used as unique global reference for Janicab in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-17T00:00:00Z
date_published 2013-07-15T00:00:00Z
source MITRE
title New signed malware called Janicab

MSTIC NOBELIUM May 2021

Microsoft Threat Intelligence Center (MSTIC). (2021, May 27). New sophisticated email-based attack from NOBELIUM. Retrieved May 28, 2021.

Internal MISP references

UUID 047ec63f-1f4b-4b57-9ab5-8a5cfcc11f4d which can be used as unique global reference for MSTIC NOBELIUM May 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-05-28T00:00:00Z
date_published 2021-05-27T00:00:00Z
source MITRE
title New sophisticated email-based attack from NOBELIUM

Microsoft Phosphorus Mar 2019

Burt, T. (2019, March 27). New steps to protect customers from hacking. Retrieved May 27, 2020.

Internal MISP references

UUID c55a112d-4b05-4c32-a5b3-480b12929115 which can be used as unique global reference for Microsoft Phosphorus Mar 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-27T00:00:00Z
date_published 2019-03-27T00:00:00Z
source MITRE
title New steps to protect customers from hacking

FireEye SUNSHUTTLE Mar 2021

Smith, L., Leathery, J., Read, B. (2021, March 4). New SUNSHUTTLE Second-Stage Backdoor Uncovered Targeting U.S.-Based Entity; Possible Connection to UNC2452. Retrieved March 12, 2021.

Internal MISP references

UUID 1cdb8a1e-fbed-4db3-b273-5f8f45356dc1 which can be used as unique global reference for FireEye SUNSHUTTLE Mar 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-12T00:00:00Z
date_published 2021-03-04T00:00:00Z
source MITRE
title New SUNSHUTTLE Second-Stage Backdoor Uncovered Targeting U.S.-Based Entity; Possible Connection to UNC2452

Blasco 2013

Blasco, J. (2013, March 21). New Sykipot developments [Blog]. Retrieved November 12, 2014.

Internal MISP references

UUID 46be6b77-ee2b-407e-bdd4-5a1183eda7f3 which can be used as unique global reference for Blasco 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-12T00:00:00Z
date_published 2013-03-21T00:00:00Z
source MITRE
title New Sykipot developments [Blog]

AWS RE:Inforce Threat Detection 2024

Ben Fletcher and Steve de Vera. (2024, June). New tactics and techniques for proactive threat detection. Retrieved September 25, 2024.

Internal MISP references

UUID f2689dfc-83ff-53c6-b074-ce507824799a which can be used as unique global reference for AWS RE:Inforce Threat Detection 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-25T00:00:00Z
date_published 2024-06-01T00:00:00Z
source MITRE
title New tactics and techniques for proactive threat detection

Malwarebytes Targeted Attack against Saudi Arabia

Malwarebytes Labs. (2017, March 27). New targeted attack against Saudi Arabia Government. Retrieved July 3, 2017.

Internal MISP references

UUID 735647f9-9cd4-4a20-8812-4671a3358e46 which can be used as unique global reference for Malwarebytes Targeted Attack against Saudi Arabia in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-03T00:00:00Z
date_published 2017-03-27T00:00:00Z
source MITRE
title New targeted attack against Saudi Arabia Government

FireEye APT34 Dec 2017

Sardiwal, M, et al. (2017, December 7). New Targeted Attack in the Middle East by APT34, a Suspected Iranian Threat Group, Using CVE-2017-11882 Exploit. Retrieved December 20, 2017.

Internal MISP references

UUID 88f41728-08ad-4cd8-a418-895738d68b04 which can be used as unique global reference for FireEye APT34 Dec 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-20T00:00:00Z
date_published 2017-12-07T00:00:00Z
source MITRE, Tidal Cyber
title New Targeted Attack in the Middle East by APT34, a Suspected Iranian Threat Group, Using CVE-2017-11882 Exploit

Unit 42 Cobalt Gang Oct 2018

Unit 42. (2018, October 25). New Techniques to Uncover and Attribute Financial actors Commodity Builders and Infrastructure Revealed. Retrieved December 11, 2018.

Internal MISP references

UUID 8956f0e5-d07f-4063-bf60-f8b964d03e6d which can be used as unique global reference for Unit 42 Cobalt Gang Oct 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-12-11T00:00:00Z
date_published 2018-10-25T00:00:00Z
source MITRE
title New Techniques to Uncover and Attribute Financial actors Commodity Builders and Infrastructure Revealed

Checkmarx-oss-seo

Yehuda Gelb. (2024, April 10). New Technique to Trick Developers Detected in an Open Source Supply Chain Attack. Retrieved June 18, 2024.

Internal MISP references

UUID ef9376d8-4792-5883-bb0f-00fe7e34b049 which can be used as unique global reference for Checkmarx-oss-seo in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-18T00:00:00Z
date_published 2024-04-10T00:00:00Z
source MITRE
title New Technique to Trick Developers Detected in an Open Source Supply Chain Attack

ESET TeleBots Oct 2018

Cherepanov, A., Lipovsky, R. (2018, October 11). New TeleBots backdoor: First evidence linking Industroyer to NotPetya. Retrieved November 27, 2018.

Internal MISP references

UUID 56372448-03f5-49b5-a2a9-384fbd49fefc which can be used as unique global reference for ESET TeleBots Oct 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-27T00:00:00Z
date_published 2018-10-11T00:00:00Z
source MITRE
title New TeleBots backdoor: First evidence linking Industroyer to NotPetya

Unit 42 DarkHydrus July 2018

Falcone, R., et al. (2018, July 27). New Threat Actor Group DarkHydrus Targets Middle East Government. Retrieved August 2, 2018.

Internal MISP references

UUID 800279cf-e6f8-4721-818f-46e35ec7892a which can be used as unique global reference for Unit 42 DarkHydrus July 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-02T00:00:00Z
date_published 2018-07-27T00:00:00Z
source MITRE, Tidal Cyber
title New Threat Actor Group DarkHydrus Targets Middle East Government

Bitdefender Trickbot March 2020

Tudorica, R., Maximciuc, A., Vatamanu, C. (2020, March 18). New TrickBot Module Bruteforces RDP Connections, Targets Select Telecommunication Services in US and Hong Kong. Retrieved March 15, 2021.

Internal MISP references

UUID 2ccdaded-97f6-47e2-b6c0-9a83e8a945d6 which can be used as unique global reference for Bitdefender Trickbot March 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-15T00:00:00Z
date_published 2020-03-18T00:00:00Z
source MITRE
title New TrickBot Module Bruteforces RDP Connections, Targets Select Telecommunication Services in US and Hong Kong

Malwarebytes Konni Aug 2021

Threat Intelligence Team. (2021, August 23). New variant of Konni malware used in campaign targetting Russia. Retrieved January 5, 2022.

Internal MISP references

UUID fb8c6402-ec18-414a-85f7-3d76eacbd890 which can be used as unique global reference for Malwarebytes Konni Aug 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-05T00:00:00Z
date_published 2021-08-23T00:00:00Z
source MITRE
title New variant of Konni malware used in campaign targetting Russia

Proofpoint Vega Credential Stealer May 2018

Proofpoint. (2018, May 10). New Vega Stealer shines brightly in targeted campaign . Retrieved June 18, 2019.

Internal MISP references

UUID c52fe62f-4df4-43b0-a126-2df07dc61fc0 which can be used as unique global reference for Proofpoint Vega Credential Stealer May 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-18T00:00:00Z
date_published 2018-05-10T00:00:00Z
source MITRE
title New Vega Stealer shines brightly in targeted campaign

Proofpoint Azorult July 2018

Proofpoint. (2018, July 30). New version of AZORult stealer improves loading features, spreads alongside ransomware in new campaign. Retrieved November 29, 2018.

Internal MISP references

UUID a85c869a-3ba3-42c2-9460-d3d1f0874044 which can be used as unique global reference for Proofpoint Azorult July 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-29T00:00:00Z
date_published 2018-07-30T00:00:00Z
source MITRE
title New version of AZORult stealer improves loading features, spreads alongside ransomware in new campaign

Avira Mustang Panda January 2020

Hamzeloofard, S. (2020, January 31). New wave of PlugX targets Hong Kong | Avira Blog. Retrieved April 13, 2021.

Internal MISP references

UUID bc7755a0-5ee3-477b-b8d7-67174a59d0e2 which can be used as unique global reference for Avira Mustang Panda January 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-13T00:00:00Z
date_published 2020-01-31T00:00:00Z
source MITRE
title New wave of PlugX targets Hong Kong

Palo Alto DNS Requests

Grunzweig, J., et al. (2016, May 24). New Wekby Attacks Use DNS Requests As Command and Control Mechanism. Retrieved August 17, 2016.

Internal MISP references

UUID 4a946c3f-ee0a-4649-8104-2bd9d90ebd49 which can be used as unique global reference for Palo Alto DNS Requests in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-08-17T00:00:00Z
date_published 2016-05-24T00:00:00Z
source MITRE
title New Wekby Attacks Use DNS Requests As Command and Control Mechanism

PaloAlto DNS Requests May 2016

Grunzweig, J., et al. (2016, May 24). New Wekby Attacks Use DNS Requests As Command and Control Mechanism. Retrieved November 15, 2018.

Internal MISP references

UUID 6f08aa4e-c89f-4d3e-8f46-e856e21d2d50 which can be used as unique global reference for PaloAlto DNS Requests May 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-15T00:00:00Z
date_published 2016-05-24T00:00:00Z
source MITRE
title New Wekby Attacks Use DNS Requests As Command and Control Mechanism

Unit42 Azorult Nov 2018

Yan, T., et al. (2018, November 21). New Wine in Old Bottle: New Azorult Variant Found in FindMyName Campaign using Fallout Exploit Kit. Retrieved November 29, 2018.

Internal MISP references

UUID 44ceddf6-bcbf-4a60-bb92-f8cdc675d185 which can be used as unique global reference for Unit42 Azorult Nov 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-29T00:00:00Z
date_published 2018-11-21T00:00:00Z
source MITRE
title New Wine in Old Bottle: New Azorult Variant Found in FindMyName Campaign using Fallout Exploit Kit

FireEye Clandestine Fox

Chen, X., Scott, M., Caselden, D.. (2014, April 26). New Zero-Day Exploit targeting Internet Explorer Versions 9 through 11 Identified in Targeted Attacks. Retrieved January 14, 2016.

Internal MISP references

UUID fd536975-ff27-45fc-a07f-4b2128568df8 which can be used as unique global reference for FireEye Clandestine Fox in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-14T00:00:00Z
date_published 2014-04-26T00:00:00Z
source MITRE
title New Zero-Day Exploit targeting Internet Explorer Versions 9 through 11 Identified in Targeted Attacks

Twitter ItsReallyNick Platinum Masquerade

Carr, N.. (2018, October 25). Nick Carr Status Update. Retrieved September 12, 2024.

Internal MISP references

UUID 12eea502-cf70-474f-8127-352cacc37418 which can be used as unique global reference for Twitter ItsReallyNick Platinum Masquerade in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2018-10-25T00:00:00Z
source MITRE
title Nick Carr Status Update

Twitter ItsReallyNick APT32 pubprn Masquerade

Carr, N.. (2017, December 26). Nick Carr Status Update APT32 pubprn. Retrieved September 12, 2024.

Internal MISP references

UUID 731865ea-2410-40ac-85cf-75f768edd08a which can be used as unique global reference for Twitter ItsReallyNick APT32 pubprn Masquerade in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2017-12-26T00:00:00Z
source MITRE
title Nick Carr Status Update APT32 pubprn

Twitter ItsReallyNick APT41 EK

Carr, N. (2019, October 30). Nick Carr Status Update APT41 Environmental Keying. Retrieved September 12, 2024.

Internal MISP references

UUID e226a034-b79b-42bd-8115-2537f98e5d46 which can be used as unique global reference for Twitter ItsReallyNick APT41 EK in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2019-10-30T00:00:00Z
source MITRE
title Nick Carr Status Update APT41 Environmental Keying

Twitter ItsReallyNick Masquerading Update

Carr, N.. (2018, October 25). Nick Carr Status Update Masquerading. Retrieved September 12, 2024.

Internal MISP references

UUID aca324b7-15f1-47b5-9c13-248d1b1a7fff which can be used as unique global reference for Twitter ItsReallyNick Masquerading Update in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2018-10-25T00:00:00Z
source MITRE
title Nick Carr Status Update Masquerading

SecureWorks NICKEL GLADSTONE profile Sept 2021

SecureWorks. (2021, September 29). NICKEL GLADSTONE Threat Profile. Retrieved September 29, 2021.

Internal MISP references

UUID c78a8379-04a4-4558-820d-831ad4f267fd which can be used as unique global reference for SecureWorks NICKEL GLADSTONE profile Sept 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-29T00:00:00Z
date_published 2021-09-29T00:00:00Z
source MITRE
title NICKEL GLADSTONE Threat Profile

Microsoft NICKEL December 2021

MSTIC. (2021, December 6). NICKEL targeting government organizations across Latin America and Europe. Retrieved March 18, 2022.

Internal MISP references

UUID 29a46bb3-f514-4554-ad9c-35f9a5ad9870 which can be used as unique global reference for Microsoft NICKEL December 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-18T00:00:00Z
date_published 2021-12-06T00:00:00Z
source MITRE, Tidal Cyber
title NICKEL targeting government organizations across Latin America and Europe

Nicolas Falliere, Liam O Murchu, Eric Chien February 2011

Nicolas Falliere, Liam O Murchu, Eric Chien. (2011, February) W32.Stuxnet Dossier (Version 1.4). Retrieved September 22, 2017

Internal MISP references

UUID a1b371c2-b2b1-5780-95c8-11f8c616dcf3 which can be used as unique global reference for Nicolas Falliere, Liam O Murchu, Eric Chien February 2011 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-09-22T00:00:00Z
source MITRE
title Nicolas Falliere, Liam O Murchu, Eric Chien February 2011

ProofPoint Ursnif Aug 2016

Proofpoint Staff. (2016, August 25). Nightmare on Tor Street: Ursnif variant Dreambot adds Tor functionality. Retrieved June 5, 2019.

Internal MISP references

UUID 4cef8c44-d440-4746-b3e8-c8e4d307273d which can be used as unique global reference for ProofPoint Ursnif Aug 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-05T00:00:00Z
date_published 2016-08-25T00:00:00Z
source MITRE
title Nightmare on Tor Street: Ursnif variant Dreambot adds Tor functionality

NirSoft Website

NirSoft. (n.d.). NirSoft Website. Retrieved March 6, 2024.

Internal MISP references

UUID 024e4e25-aab7-4231-bb4b-5e399d02d7b2 which can be used as unique global reference for NirSoft Website in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-06T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title NirSoft Website

NIST Server Security July 2008

Scarfone, K. et al.. (2008, July). NIST Special Publication 800-123 - Guide to General Server Security. Retrieved July 26, 2018.

Internal MISP references

UUID 351a444e-2829-4584-83ea-de909e43ee72 which can be used as unique global reference for NIST Server Security July 2008 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-26T00:00:00Z
date_published 2008-07-01T00:00:00Z
source MITRE
title NIST Special Publication 800-123 - Guide to General Server Security

Netskope Nitol

Malik, A. (2016, October 14). Nitol Botnet makes a resurgence with evasive sandbox analysis technique. Retrieved September 30, 2021.

Internal MISP references

UUID 94b5ac75-1fd5-4cad-a604-2b09846eb975 which can be used as unique global reference for Netskope Nitol in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-30T00:00:00Z
date_published 2016-10-14T00:00:00Z
source MITRE
title Nitol Botnet makes a resurgence with evasive sandbox analysis technique

The DFIR Report September 30 2024

The DFIR Report. (2024, September 30). Nitrogen Campaign Drops Sliver and Ends With BlackCat Ransomware. Retrieved September 30, 2024.

Internal MISP references

UUID b2ee9f5e-ed34-4141-9740-8f6e37ba4f28 which can be used as unique global reference for The DFIR Report September 30 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-30T00:00:00Z
date_published 2024-09-30T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Nitrogen Campaign Drops Sliver and Ends With BlackCat Ransomware

FireEye Njw0rm Aug 2013

Dawda, U. and Villeneuve, N. (2013, August 30). Njw0rm - Brother From the Same Mother. Retrieved June 4, 2019.

Internal MISP references

UUID 062c31b1-7c1e-487f-8340-11f4b3faabc4 which can be used as unique global reference for FireEye Njw0rm Aug 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-04T00:00:00Z
date_published 2013-08-30T00:00:00Z
source MITRE
title Njw0rm - Brother From the Same Mother

Nltest Manual

ss64. (n.d.). NLTEST.exe - Network Location Test. Retrieved February 14, 2019.

Internal MISP references

UUID 4bb113a8-7e2c-4656-86f4-c30b08705ffa which can be used as unique global reference for Nltest Manual in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-14T00:00:00Z
source MITRE
title NLTEST.exe - Network Location Test

Nmap: the Network Mapper

Nmap. (n.d.). Nmap: the Network Mapper - Free Security Scanner. Retrieved September 7, 2023.

Internal MISP references

UUID 65f1bbaa-8ad1-4ad5-b726-660558d27efc which can be used as unique global reference for Nmap: the Network Mapper in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-07T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Nmap: the Network Mapper - Free Security Scanner

MSTIC Nobelium Oct 2021

Microsoft Threat Intelligence Center. (2021, October 25). NOBELIUM targeting delegated administrative privileges to facilitate broader attacks. Retrieved March 25, 2022.

Internal MISP references

UUID 7b6cc308-9871-47e5-9039-a9a7e66ce373 which can be used as unique global reference for MSTIC Nobelium Oct 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-25T00:00:00Z
date_published 2021-10-25T00:00:00Z
source MITRE
title NOBELIUM targeting delegated administrative privileges to facilitate broader attacks

Microsoft Nobelium Admin Privileges

Microsoft Threat Intelligence Center. (2021, October 25). NOBELIUM targeting delegated administrative privileges to facilitate broader attacks. Retrieved January 31, 2022.

Internal MISP references

UUID aa315293-77a5-4ad9-b024-9af844edff9a which can be used as unique global reference for Microsoft Nobelium Admin Privileges in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-31T00:00:00Z
date_published 2021-10-25T00:00:00Z
source MITRE
title NOBELIUM targeting delegated administrative privileges to facilitate broader attacks

Symantec Noberus September 22 2022

Symantec Threat Hunter Team. (2022, September 22). Noberus Ransomware: Darkside and BlackMatter Successor Continues to Evolve its Tactics. Retrieved September 14, 2023.

Internal MISP references

UUID afd6808d-2c9f-4926-b7c6-ca9d3abdd923 which can be used as unique global reference for Symantec Noberus September 22 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-14T00:00:00Z
date_published 2022-09-22T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Noberus Ransomware: Darkside and BlackMatter Successor Continues to Evolve its Tactics

new_rust_based_ransomware

Symantec Threat Hunter Team. (2021, December 16). Noberus: Technical Analysis Shows Sophistication of New Rust-based Ransomware. Retrieved January 14, 2022.

Internal MISP references

UUID 8206240f-c84e-442e-b025-f629e9cc8d91 which can be used as unique global reference for new_rust_based_ransomware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-14T00:00:00Z
date_published 2021-12-16T00:00:00Z
source MITRE
title Noberus: Technical Analysis Shows Sophistication of New Rust-based Ransomware

SentinelOne NobleBaron June 2021

Guerrero-Saade, J. (2021, June 1). NobleBaron | New Poisoned Installers Could Be Used In Supply Chain Attacks. Retrieved August 4, 2021.

Internal MISP references

UUID 98cf2bb0-f36c-45af-8d47-bf26aca3bb09 which can be used as unique global reference for SentinelOne NobleBaron June 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-04T00:00:00Z
date_published 2021-06-01T00:00:00Z
source MITRE
title NobleBaron

NodeJS

OpenJS Foundation. (n.d.). Node.js. Retrieved June 23, 2020.

Internal MISP references

UUID af710d49-48f4-47f6-98c6-8d4a4568b020 which can be used as unique global reference for NodeJS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-23T00:00:00Z
source MITRE
title Node.js

Mandiant No Easy Breach

Dunwoody, M. and Carr, N.. (2016, September 27). No Easy Breach DerbyCon 2016. Retrieved October 4, 2016.

Internal MISP references

UUID e7c49ce6-9c5d-483a-b476-8a48799df6fa which can be used as unique global reference for Mandiant No Easy Breach in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-10-04T00:00:00Z
date_published 2016-09-27T00:00:00Z
source MITRE
title No Easy Breach DerbyCon 2016

ESET PipeMon May 2020

Tartare, M. et al. (2020, May 21). No “Game over” for the Winnti Group. Retrieved August 24, 2020.

Internal MISP references

UUID cbc09411-be18-4241-be69-b718a741ed8c which can be used as unique global reference for ESET PipeMon May 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-24T00:00:00Z
date_published 2020-05-21T00:00:00Z
source MITRE
title No “Game over” for the Winnti Group

nohup Linux Man

Meyering, J. (n.d.). nohup(1). Retrieved August 30, 2023.

Internal MISP references

UUID f61dde91-3518-5a74-8eb8-bb3bae43e8fb which can be used as unique global reference for nohup Linux Man in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-30T00:00:00Z
source MITRE
title nohup(1)

Unit 42 Nokki Oct 2018

Grunzweig, J. (2018, October 01). NOKKI Almost Ties the Knot with DOGCALL: Reaper Group Uses New Malware to Deploy RAT. Retrieved November 5, 2018.

Internal MISP references

UUID 4eea6638-a71b-4d74-acc4-0fac82ef72f6 which can be used as unique global reference for Unit 42 Nokki Oct 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-05T00:00:00Z
date_published 2018-10-01T00:00:00Z
source MITRE
title NOKKI Almost Ties the Knot with DOGCALL: Reaper Group Uses New Malware to Deploy RAT

ESET Nomadic Octopus 2018

Cherepanov, A. (2018, October 4). Nomadic Octopus Cyber espionage in Central Asia. Retrieved October 13, 2021.

Internal MISP references

UUID 50dcb3f0-1461-453a-aab9-38c2e259173f which can be used as unique global reference for ESET Nomadic Octopus 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-13T00:00:00Z
date_published 2018-10-04T00:00:00Z
source MITRE, Tidal Cyber
title Nomadic Octopus Cyber espionage in Central Asia

Malwarebytes Pony April 2016

hasherezade. (2016, April 11). No money, but Pony! From a mail to a trojan horse. Retrieved May 21, 2020.

Internal MISP references

UUID f8700002-5da6-4cb8-be62-34e421d2a573 which can be used as unique global reference for Malwarebytes Pony April 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-21T00:00:00Z
date_published 2016-04-11T00:00:00Z
source MITRE
title No money, but Pony! From a mail to a trojan horse

BleepingComputer NoName September 10 2024

Bill Toulas. (2024, September 10). NoName ransomware gang deploying RansomHub malware in recent attacks. Retrieved September 13, 2024.

Internal MISP references

UUID 79752048-f2fd-4357-9e0a-15b9a2927852 which can be used as unique global reference for BleepingComputer NoName September 10 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-13T00:00:00Z
date_published 2024-09-10T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title NoName ransomware gang deploying RansomHub malware in recent attacks

WithSecure Lazarus-NoPineapple Threat Intel Report 2023

Ruohonen, S. & Robinson, S. (2023, February 2). No Pineapple! -DPRK Targeting of Medical Research and Technology Sector. Retrieved July 10, 2023.

Internal MISP references

UUID 195922fa-a843-5cd3-a153-32f0b960dcb9 which can be used as unique global reference for WithSecure Lazarus-NoPineapple Threat Intel Report 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-10T00:00:00Z
date_published 2023-02-02T00:00:00Z
source MITRE
title No Pineapple! -DPRK Targeting of Medical Research and Technology Sector

xorrior chrome extensions macOS

Chris Ross. (2019, February 8). No Place Like Chrome. Retrieved April 27, 2021.

Internal MISP references

UUID 84bfd3a1-bda2-4821-ac52-6af8515e5879 which can be used as unique global reference for xorrior chrome extensions macOS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-27T00:00:00Z
date_published 2019-02-08T00:00:00Z
source MITRE
title No Place Like Chrome

Cybernews Yanfeng Qilin November 2023

Stefanie Schappert. (2023, November 28). North American auto supplier Yanfeng claimed by Qilin ransom group. Retrieved November 30, 2023.

Internal MISP references

UUID 93c89ca5-1863-4ee2-9fff-258f94f655c4 which can be used as unique global reference for Cybernews Yanfeng Qilin November 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-11-30T00:00:00Z
date_published 2023-11-28T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title North American auto supplier Yanfeng claimed by Qilin ransom group

U.S. CISA Andariel July 25 2024

Cybersecurity and Infrastructure Security Agency. (2024, July 25). North Korea Cyber Group Conducts Global Espionage Campaign to Advance Regime’s Military and Nuclear Programs. Retrieved July 29, 2024.

Internal MISP references

UUID b615953e-3c6c-4201-914c-4b75e45bb9ed which can be used as unique global reference for U.S. CISA Andariel July 25 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-29T00:00:00Z
date_published 2024-07-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title North Korea Cyber Group Conducts Global Espionage Campaign to Advance Regime’s Military and Nuclear Programs

The Hacker News Lazarus Aug 2022

Lakshmanan, R. (2022, August 17). North Korea Hackers Spotted Targeting Job Seekers with macOS Malware. Retrieved April 10, 2023.

Internal MISP references

UUID 8ae38830-1547-5cc1-83a4-87c3a7c82aa6 which can be used as unique global reference for The Hacker News Lazarus Aug 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-04-10T00:00:00Z
date_published 2022-08-17T00:00:00Z
source MITRE
title North Korea Hackers Spotted Targeting Job Seekers with macOS Malware

Zdnet Kimsuky Group September 2020

Cimpanu, C. (2020, September 30). North Korea has tried to hack 11 officials of the UN Security Council. Retrieved November 4, 2020.

Internal MISP references

UUID 6253bbc5-4d7d-4b7e-bd6b-59bd6366dc50 which can be used as unique global reference for Zdnet Kimsuky Group September 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-04T00:00:00Z
date_published 2020-09-30T00:00:00Z
source MITRE
title North Korea has tried to hack 11 officials of the UN Security Council

Volexity InkySquid BLUELIGHT August 2021

Cash, D., Grunzweig, J., Meltzer, M., Adair, S., Lancaster, T. (2021, August 17). North Korean APT InkySquid Infects Victims Using Browser Exploits. Retrieved September 30, 2021.

Internal MISP references

UUID 7e394434-364f-4e50-9a96-3e75dacc9866 which can be used as unique global reference for Volexity InkySquid BLUELIGHT August 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-30T00:00:00Z
date_published 2021-08-17T00:00:00Z
source MITRE
title North Korean APT InkySquid Infects Victims Using Browser Exploits

Talos Kimsuky Nov 2021

An, J and Malhotra, A. (2021, November 10). North Korean attackers use malicious blogs to deliver malware to high-profile South Korean targets. Retrieved December 29, 2021.

Internal MISP references

UUID 17927f0e-297a-45ec-8e1c-8a33892205dc which can be used as unique global reference for Talos Kimsuky Nov 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-12-29T00:00:00Z
date_published 2021-11-10T00:00:00Z
source MITRE
title North Korean attackers use malicious blogs to deliver malware to high-profile South Korean targets

Volexity InkySquid RokRAT August 2021

Cash, D., Grunzweig, J., Adair, S., Lancaster, T. (2021, August 25). North Korean BLUELIGHT Special: InkySquid Deploys RokRAT. Retrieved October 1, 2021.

Internal MISP references

UUID bff1667b-3f87-4653-bd17-b675e997baf1 which can be used as unique global reference for Volexity InkySquid RokRAT August 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-01T00:00:00Z
date_published 2021-08-25T00:00:00Z
source MITRE
title North Korean BLUELIGHT Special: InkySquid Deploys RokRAT

Microsoft Security Blog August 30 2024

Microsoft Threat Intelligence; Microsoft Security Response Center. (2024, August 30). North Korean threat actor Citrine Sleet exploiting Chromium zero-day . Retrieved September 1, 2024.

Internal MISP references

UUID d7ef2e80-30c0-47ce-91d4-db1690c6c689 which can be used as unique global reference for Microsoft Security Blog August 30 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-01T00:00:00Z
date_published 2024-08-30T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title North Korean threat actor Citrine Sleet exploiting Chromium zero-day

Lazarus APT January 2022

Saini, A. and Hossein, J. (2022, January 27). North Korea’s Lazarus APT leverages Windows Update client, GitHub in latest campaign. Retrieved January 27, 2022.

Internal MISP references

UUID fbd96014-16c3-4ad6-bb3f-f92d15efce13 which can be used as unique global reference for Lazarus APT January 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-27T00:00:00Z
date_published 2022-01-27T00:00:00Z
source MITRE
title North Korea’s Lazarus APT leverages Windows Update client, GitHub in latest campaign

Github NoRunDll

gtworek. (2019, December 17). NoRunDll. Retrieved August 23, 2021.

Internal MISP references

UUID 72d4b682-ed19-4e0f-aeff-faa52b3a0439 which can be used as unique global reference for Github NoRunDll in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-23T00:00:00Z
date_published 2019-12-17T00:00:00Z
source MITRE
title NoRunDll

Crowdstrike TELCO BPO Campaign December 2022

Parisi, T. (2022, December 2). Not a SIMulation: CrowdStrike Investigations Reveal Intrusion Campaign Targeting Telco and BPO Companies. Retrieved June 30, 2023.

Internal MISP references

UUID 382785e1-4ef3-506e-b74f-cd07df9ae46e which can be used as unique global reference for Crowdstrike TELCO BPO Campaign December 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-30T00:00:00Z
date_published 2022-12-02T00:00:00Z
source MITRE
title Not a SIMulation: CrowdStrike Investigations Reveal Intrusion Campaign Targeting Telco and BPO Companies

CrowdStrike Scattered Spider SIM Swapping December 22 2022

Tim Parisi. (2022, December 22). Not a SIMulation: CrowdStrike Investigations Reveal Intrusion Campaign Targeting Telco and BPO Companies. Retrieved September 14, 2023.

Internal MISP references

UUID e48760ba-2752-4d30-8f99-152c81f63017 which can be used as unique global reference for CrowdStrike Scattered Spider SIM Swapping December 22 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-14T00:00:00Z
date_published 2022-12-22T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Not a SIMulation: CrowdStrike Investigations Reveal Intrusion Campaign Targeting Telco and BPO Companies

Sophos Dyreza April 2015

Ducklin, P. (2015, April 20). Notes from SophosLabs: Dyreza, the malware that discriminates against old computers. Retrieved June 16, 2020.

Internal MISP references

UUID 50f9aa49-dde5-42c9-ba5c-f42281a71b7e which can be used as unique global reference for Sophos Dyreza April 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-16T00:00:00Z
date_published 2015-04-20T00:00:00Z
source MITRE
title Notes from SophosLabs: Dyreza, the malware that discriminates against old computers

NIST Supply Chain 2012

Boyens, J,. Et al.. (2002, October). Notional Supply Chain Risk Management Practices for Federal Information Systems. Retrieved April 6, 2018.

Internal MISP references

UUID b3171abc-957c-4bd5-a18f-0d66bba396b9 which can be used as unique global reference for NIST Supply Chain 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-06T00:00:00Z
date_published 2002-10-01T00:00:00Z
source MITRE
title Notional Supply Chain Risk Management Practices for Federal Information Systems

eSentire FIN7 July 2021

eSentire. (2021, July 21). Notorious Cybercrime Gang, FIN7, Lands Malware in Law Firm Using Fake Legal Complaint Against Jack Daniels’ Owner, Brown-Forman Inc.. Retrieved September 20, 2021.

Internal MISP references

UUID 3976dd0e-7dee-4ae7-8c38-484b12ca233e which can be used as unique global reference for eSentire FIN7 July 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-20T00:00:00Z
date_published 2021-07-21T00:00:00Z
source MITRE
title Notorious Cybercrime Gang, FIN7, Lands Malware in Law Firm Using Fake Legal Complaint Against Jack Daniels’ Owner, Brown-Forman Inc.

Secureworks NotPetya June 2017

Counter Threat Research Team. (2017, June 28). NotPetya Campaign: What We Know About the Latest Global Ransomware Attack. Retrieved June 11, 2020.

Internal MISP references

UUID 3109e59c-ace2-4e5a-bba2-24b840a7af0d which can be used as unique global reference for Secureworks NotPetya June 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-11T00:00:00Z
date_published 2017-06-28T00:00:00Z
source MITRE
title NotPetya Campaign: What We Know About the Latest Global Ransomware Attack

SensePost NotRuler

SensePost. (2017, September 21). NotRuler - The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange. Retrieved February 4, 2019.

Internal MISP references

UUID 1bafe35e-f99c-4aa9-8b2f-5a35970ec83b which can be used as unique global reference for SensePost NotRuler in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-04T00:00:00Z
date_published 2017-09-21T00:00:00Z
source MITRE
title NotRuler - The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange

FireEye APT29 Nov 2018

Dunwoody, M., et al. (2018, November 19). Not So Cozy: An Uncomfortable Examination of a Suspected APT29 Phishing Campaign. Retrieved November 27, 2018.

Internal MISP references

UUID 30e769e0-4552-429b-b16e-27830d42edea which can be used as unique global reference for FireEye APT29 Nov 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-27T00:00:00Z
date_published 2018-11-19T00:00:00Z
source MITRE
title Not So Cozy: An Uncomfortable Examination of a Suspected APT29 Phishing Campaign

Unit 42 Cuba August 9 2022

Anthony Galiette, Daniel Bunce, Doel Santos, Shawn Westfall. (2022, August 9). Novel News on Cuba Ransomware: Greetings From Tropical Scorpius. Retrieved June 4, 2022.

Internal MISP references

UUID 06f668d9-9a68-4d2f-b9a0-b92beb3b75d6 which can be used as unique global reference for Unit 42 Cuba August 9 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-04T00:00:00Z
date_published 2022-08-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Novel News on Cuba Ransomware: Greetings From Tropical Scorpius

NT API Windows

The NTinterlnals.net team. (n.d.). Nowak, T. Retrieved June 25, 2020.

Internal MISP references

UUID 306f7da7-caa2-40bf-a3db-e579c541eeb4 which can be used as unique global reference for NT API Windows in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-25T00:00:00Z
source MITRE
title Nowak, T

Malicious Life by Cybereason

Philip Tsukerman. (n.d.). No Win32 Process Needed | Expanding the WMI Lateral Movement Arsenal. Retrieved June 19, 2024.

Internal MISP references

UUID 650cdde6-e0b5-5cb4-9dc4-7a2528c9e49b which can be used as unique global reference for Malicious Life by Cybereason in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-19T00:00:00Z
source MITRE
title No Win32 Process Needed

Now You Serial

Rahman, Alyssa. (2021, December 13). Now You Serial, Now You Don’t — Systematically Hunting for Deserialization Exploits. Retrieved November 28, 2023.

Internal MISP references

UUID c42e1d00-942c-513d-bdfb-b97afc8f38cf which can be used as unique global reference for Now You Serial in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-11-28T00:00:00Z
date_published 2021-12-13T00:00:00Z
source MITRE
title Now You Serial, Now You Don’t — Systematically Hunting for Deserialization Exploits

Npcap: Windows Packet Capture Library & Driver

Npcap. (n.d.). Npcap: Windows Packet Capture Library & Driver. Retrieved September 7, 2023.

Internal MISP references

UUID c8dc5650-eb37-4bb6-b5b7-e6269c79785c which can be used as unique global reference for Npcap: Windows Packet Capture Library & Driver in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-07T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Npcap: Windows Packet Capture Library & Driver

NPLogonNotify

Microsoft. (2021, October 21). NPLogonNotify function (npapi.h). Retrieved March 30, 2023.

Internal MISP references

UUID 1fda833e-e543-5e68-a0f5-8a4170dd632a which can be used as unique global reference for NPLogonNotify in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-30T00:00:00Z
date_published 2021-10-21T00:00:00Z
source MITRE
title NPLogonNotify function (npapi.h)

NPPSPY

Grzegorz Tworek. (2021, December 15). NPPSpy. Retrieved March 30, 2023.

Internal MISP references

UUID c12bfaf6-4d83-552e-912b-cc55bce85961 which can be used as unique global reference for NPPSPY in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-30T00:00:00Z
date_published 2021-12-15T00:00:00Z
source MITRE
title NPPSpy

ntdsutil.exe - LOLBAS Project

LOLBAS. (2020, January 10). ntdsutil.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 9d15ab80-86b7-4a69-ae3f-de017ca89f37 which can be used as unique global reference for ntdsutil.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2020-01-10T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title ntdsutil.exe

Ntdsutil Microsoft

Microsoft. (2016, August 31). Ntdsutil Microsoft. Retrieved July 11, 2023.

Internal MISP references

UUID 34de2f08-0481-4894-80ef-86506d821cf0 which can be used as unique global reference for Ntdsutil Microsoft in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-11T00:00:00Z
date_published 2016-08-31T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Ntdsutil Microsoft

Microsoft NTFS File Attributes Aug 2010

Hughes, J. (2010, August 25). NTFS File Attributes. Retrieved March 21, 2018.

Internal MISP references

UUID dc4689d2-54b4-4310-ac10-6b234eedbc16 which can be used as unique global reference for Microsoft NTFS File Attributes Aug 2010 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-21T00:00:00Z
date_published 2010-08-25T00:00:00Z
source MITRE
title NTFS File Attributes

NtQueryInformationProcess

Microsoft. (2021, November 23). NtQueryInformationProcess function (winternl.h). Retrieved February 4, 2022.

Internal MISP references

UUID 7b533ca9-9075-408d-b125-89bc7446ec8f which can be used as unique global reference for NtQueryInformationProcess in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-04T00:00:00Z
date_published 2021-11-23T00:00:00Z
source MITRE
title NtQueryInformationProcess function (winternl.h)

Sentinel Labs NullBulge 2024

Jim Walter. (2024, July 16). NullBulge | Threat Actor Masquerades as Hacktivist Group Rebelling Against AI. Retrieved August 30, 2024.

Internal MISP references

UUID 7cbf93a8-0d1b-5c49-851b-5bc2bc3ffb2c which can be used as unique global reference for Sentinel Labs NullBulge 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-30T00:00:00Z
date_published 2024-07-16T00:00:00Z
source MITRE
title NullBulge

AsyncRAT GitHub

Nyan-x-Cat. (n.d.). NYAN-x-CAT / AsyncRAT-C-Sharp. Retrieved October 3, 2023.

Internal MISP references

UUID b40fc5d8-02fd-5683-88c3-592c6b06df1a which can be used as unique global reference for AsyncRAT GitHub in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-03T00:00:00Z
source MITRE
title NYAN-x-CAT / AsyncRAT-C-Sharp

Joe Sec Nymaim

Joe Security. (2016, April 21). Nymaim - evading Sandboxes with API hammering. Retrieved September 30, 2021.

Internal MISP references

UUID fe6ac288-1c7c-4ec0-a709-c3ca56e5d088 which can be used as unique global reference for Joe Sec Nymaim in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-30T00:00:00Z
date_published 2016-04-21T00:00:00Z
source MITRE
title Nymaim - evading Sandboxes with API hammering

OWASP Fingerprinting

OWASP Wiki. (2018, February 16). OAT-004 Fingerprinting. Retrieved October 20, 2020.

Internal MISP references

UUID ec89a48b-3b00-4928-8450-d2fbd307817f which can be used as unique global reference for OWASP Fingerprinting in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
date_published 2018-02-16T00:00:00Z
source MITRE
title OAT-004 Fingerprinting

OWASP Vuln Scanning

OWASP. (n.d.). OAT-014 Vulnerability Scanning. Retrieved October 20, 2020.

Internal MISP references

UUID 039c0947-1976-4eb8-bb26-4c74dceea7f0 which can be used as unique global reference for OWASP Vuln Scanning in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
date_published 2018-02-16T00:00:00Z
source MITRE
title OAT-014 Vulnerability Scanning

SecureWorks Device Code Phishing 2021

SecureWorks Counter Threat Unit Research Team. (2021, June 3). OAuth’S Device Code Flow Abused in Phishing Attacks. Retrieved March 19, 2024.

Internal MISP references

UUID 0cea6734-d877-5007-95cc-0e24bdf33ff8 which can be used as unique global reference for SecureWorks Device Code Phishing 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-19T00:00:00Z
date_published 2021-06-03T00:00:00Z
source MITRE
title OAuth’S Device Code Flow Abused in Phishing Attacks

BlackHat API Packers

Choi, S. (2015, August 6). Obfuscated API Functions in Modern Packers. Retrieved August 22, 2022.

Internal MISP references

UUID fc4434c0-373b-42fe-a0f5-683c24fa329e which can be used as unique global reference for BlackHat API Packers in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-22T00:00:00Z
date_published 2015-08-06T00:00:00Z
source MITRE
title Obfuscated API Functions in Modern Packers

FireEye Obfuscation June 2017

Bohannon, D. & Carr N. (2017, June 30). Obfuscation in the Wild: Targeted Attackers Lead the Way in Evasion Techniques. Retrieved February 12, 2018.

Internal MISP references

UUID 6d1089b7-0efe-4961-8abc-22a882895377 which can be used as unique global reference for FireEye Obfuscation June 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-12T00:00:00Z
date_published 2017-06-30T00:00:00Z
source MITRE
title Obfuscation in the Wild: Targeted Attackers Lead the Way in Evasion Techniques

objective-see 2017 review

Patrick Wardle. (n.d.). Retrieved March 20, 2018.

Internal MISP references

UUID 26b757c8-25cd-42ef-bef2-eb7a28455d57 which can be used as unique global reference for objective-see 2017 review in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-20T00:00:00Z
source MITRE
title objective-see 2017 review

GCP Storage Lifecycles

Google Cloud. (n.d.). Object Lifecycle Management. Retrieved September 25, 2024.

Internal MISP references

UUID 32c16ce6-ccb6-5a60-975c-39d165dfc0a2 which can be used as unique global reference for GCP Storage Lifecycles in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-25T00:00:00Z
source MITRE
title Object Lifecycle Management

Talos Oblique RAT March 2021

Malhotra, A. (2021, March 2). ObliqueRAT returns with new campaign using hijacked websites. Retrieved September 2, 2021.

Internal MISP references

UUID 20e13efb-4ca1-43b2-83a6-c852e03333d7 which can be used as unique global reference for Talos Oblique RAT March 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-02T00:00:00Z
date_published 2021-03-02T00:00:00Z
source MITRE
title ObliqueRAT returns with new campaign using hijacked websites

IBM ITG07 June 2019

McMillen, D. Sperry, C. (2019, June 14). Observations of ITG07 Cyber Operations. Retrieved May 17, 2021.

Internal MISP references

UUID e2d453c3-efb4-44e5-8b60-6a98dd6c3341 which can be used as unique global reference for IBM ITG07 June 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-05-17T00:00:00Z
date_published 2019-06-14T00:00:00Z
source MITRE
title Observations of ITG07 Cyber Operations

Palo Alto CVE-2015-3113 July 2015

Falcone, R. and Wartell, R.. (2015, July 27). Observations on CVE-2015-3113, Prior Zero-Days and the Pirpi Payload. Retrieved January 22, 2016.

Internal MISP references

UUID 0ab158b4-9085-481a-8458-40f7c752179f which can be used as unique global reference for Palo Alto CVE-2015-3113 July 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-22T00:00:00Z
date_published 2015-07-27T00:00:00Z
source MITRE
title Observations on CVE-2015-3113, Prior Zero-Days and the Pirpi Payload

Volexity OceanLotus Nov 2017

Lassalle, D., et al. (2017, November 6). OceanLotus Blossoms: Mass Digital Surveillance and Attacks Targeting ASEAN, Asian Nations, the Media, Human Rights Groups, and Civil Society. Retrieved November 6, 2017.

Internal MISP references

UUID ed9f5545-377f-4a12-92e4-c0439cc5b037 which can be used as unique global reference for Volexity OceanLotus Nov 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-06T00:00:00Z
date_published 2017-11-06T00:00:00Z
source MITRE
title OceanLotus Blossoms: Mass Digital Surveillance and Attacks Targeting ASEAN, Asian Nations, the Media, Human Rights Groups, and Civil Society

Volexity Ocean Lotus November 2020

Adair, S. and Lancaster, T. (2020, November 6). OceanLotus: Extending Cyber Espionage Operations Through Fake Websites. Retrieved November 20, 2020.

Internal MISP references

UUID dbea2493-7e0a-47f0-88c1-5867f8bb1199 which can be used as unique global reference for Volexity Ocean Lotus November 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-20T00:00:00Z
date_published 2020-11-06T00:00:00Z
source MITRE
title OceanLotus: Extending Cyber Espionage Operations Through Fake Websites

OceanLotus for OS X

Eddie Lee. (2016, February 17). OceanLotus for OS X - an Application Bundle Pretending to be an Adobe Flash Update. Retrieved July 5, 2017.

Internal MISP references

UUID 6e9acc29-06af-4915-8e01-7dcccb204530 which can be used as unique global reference for OceanLotus for OS X in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-05T00:00:00Z
date_published 2016-02-17T00:00:00Z
source MITRE
title OceanLotus for OS X - an Application Bundle Pretending to be an Adobe Flash Update

ESET OceanLotus macOS April 2019

Dumont, R.. (2019, April 9). OceanLotus: macOS malware update. Retrieved April 15, 2019.

Internal MISP references

UUID e97e479b-4e6d-40b5-94cb-eac06172c0f8 which can be used as unique global reference for ESET OceanLotus macOS April 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-15T00:00:00Z
date_published 2019-04-09T00:00:00Z
source MITRE
title OceanLotus: macOS malware update

ESET OceanLotus

Foltýn, T. (2018, March 13). OceanLotus ships new backdoor using old tricks. Retrieved May 22, 2018.

Internal MISP references

UUID a7bcbaca-10c1-403a-9eb5-f111af1cbf6a which can be used as unique global reference for ESET OceanLotus in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-05-22T00:00:00Z
date_published 2018-03-13T00:00:00Z
source MITRE, Tidal Cyber
title OceanLotus ships new backdoor using old tricks

Okta HAR Files Incident Update

David Bradbury. (2023, November 29). October Customer Support Security Incident - Update and Recommended Actions. Retrieved December 19, 2023.

Internal MISP references

UUID 5e09ab9c-8cb2-49f5-b65f-fd5447e71ef4 which can be used as unique global reference for Okta HAR Files Incident Update in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-19T00:00:00Z
date_published 2023-11-29T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title October Customer Support Security Incident - Update and Recommended Actions

Securelist Octopus Oct 2018

Kaspersky Lab's Global Research & Analysis Team. (2018, October 15). Octopus-infested seas of Central Asia. Retrieved November 14, 2018.

Internal MISP references

UUID 77407057-53f1-4fde-bc74-00f73d417f7d which can be used as unique global reference for Securelist Octopus Oct 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-14T00:00:00Z
date_published 2018-10-15T00:00:00Z
source MITRE, Tidal Cyber
title Octopus-infested seas of Central Asia

MSTIC Octo Tempest Operations October 2023

Microsoft. (2023, October 25). Octo Tempest crosses boundaries to facilitate extortion, encryption, and destruction. Retrieved March 18, 2024.

Internal MISP references

UUID 92716d7d-3ca5-5d7a-b719-946e94828f13 which can be used as unique global reference for MSTIC Octo Tempest Operations October 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-18T00:00:00Z
date_published 2023-10-25T00:00:00Z
source MITRE
title Octo Tempest crosses boundaries to facilitate extortion, encryption, and destruction

LOLBAS Odbcconf

LOLBAS. (n.d.). Odbcconf.exe. Retrieved March 7, 2019.

Internal MISP references

UUID febcaaec-b535-4347-a4c7-b3284b251897 which can be used as unique global reference for LOLBAS Odbcconf in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-07T00:00:00Z
source MITRE
title Odbcconf.exe

Microsoft odbcconf.exe

Microsoft. (2017, January 18). ODBCCONF.EXE. Retrieved March 7, 2019.

Internal MISP references

UUID 9df74876-2abf-4ced-b986-36212225d795 which can be used as unique global reference for Microsoft odbcconf.exe in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-07T00:00:00Z
date_published 2017-01-18T00:00:00Z
source MITRE
title ODBCCONF.EXE

GrimBlog UsernameEnum

GrimHacker. (2017, July 24). Office365 ActiveSync Username Enumeration. Retrieved December 9, 2021.

Internal MISP references

UUID cab25908-63da-484d-8c42-4451f46086e2 which can be used as unique global reference for GrimBlog UsernameEnum in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-12-09T00:00:00Z
date_published 2017-07-24T00:00:00Z
source MITRE
title Office365 ActiveSync Username Enumeration

GitHub Office 365 User Enumeration

gremwell. (2020, March 24). Office 365 User Enumeration. Retrieved May 27, 2022.

Internal MISP references

UUID 314fb591-d5f2-4f0c-ab0b-97977308b5dc which can be used as unique global reference for GitHub Office 365 User Enumeration in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-27T00:00:00Z
date_published 2020-03-24T00:00:00Z
source MITRE
title Office 365 User Enumeration

GitHub Office-Crackros Aug 2016

Carr, N. (2016, August 14). OfficeCrackros. Retrieved February 12, 2018.

Internal MISP references

UUID 6298d7b0-c6f9-46dd-91f0-41ef0ad515a5 which can be used as unique global reference for GitHub Office-Crackros Aug 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-12T00:00:00Z
date_published 2016-08-14T00:00:00Z
source MITRE
title OfficeCrackros

GlobalDotName Jun 2019

Shukrun, S. (2019, June 2). Office Templates and GlobalDotName - A Stealthy Office Persistence Technique. Retrieved August 26, 2019.

Internal MISP references

UUID f574182a-5d91-43c8-b560-e84a7e941c96 which can be used as unique global reference for GlobalDotName Jun 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-08-26T00:00:00Z
date_published 2019-06-02T00:00:00Z
source MITRE
title Office Templates and GlobalDotName - A Stealthy Office Persistence Technique

Microsoft VBA

Microsoft. (2019, June 11). Office VBA Reference. Retrieved June 23, 2020.

Internal MISP references

UUID ba0e3c5d-7934-4ece-b4a1-c03bc355f378 which can be used as unique global reference for Microsoft VBA in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-23T00:00:00Z
date_published 2019-06-11T00:00:00Z
source MITRE
title Office VBA Reference

OfflineScannerShell.exe - LOLBAS Project

LOLBAS. (2021, August 16). OfflineScannerShell.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 8194442f-4f86-438e-bd0c-f4cbda0264b8 which can be used as unique global reference for OfflineScannerShell.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-08-16T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title OfflineScannerShell.exe

Bitdefender Agent Tesla April 2020

Arsene, L. (2020, April 21). Oil & Gas Spearphishing Campaigns Drop Agent Tesla Spyware in Advance of Historic OPEC+ Deal. Retrieved May 19, 2020.

Internal MISP references

UUID e3d932fc-0148-43b9-bcc7-971dd7ba3bf8 which can be used as unique global reference for Bitdefender Agent Tesla April 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-19T00:00:00Z
date_published 2020-04-21T00:00:00Z
source MITRE
title Oil & Gas Spearphishing Campaigns Drop Agent Tesla Spyware in Advance of Historic OPEC+ Deal

CFR OilRig Profile

Council on Foreign Relations. (n.d.). OilRig. Retrieved September 1, 2024.

Internal MISP references

UUID db9985eb-d536-45b9-a82b-34d8cdd2b699 which can be used as unique global reference for CFR OilRig Profile in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-01T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title OilRig

Palo Alto OilRig April 2017

Falcone, R.. (2017, April 27). OilRig Actors Provide a Glimpse into Development and Testing Efforts. Retrieved May 3, 2017.

Internal MISP references

UUID fb561cdd-03f6-4867-b5b5-7e4deb11f0d0 which can be used as unique global reference for Palo Alto OilRig April 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-05-03T00:00:00Z
date_published 2017-04-27T00:00:00Z
source MITRE
title OilRig Actors Provide a Glimpse into Development and Testing Efforts

OilRig New Delivery Oct 2017

Falcone, R. and Lee, B. (2017, October 9). OilRig Group Steps Up Attacks with New Delivery Documents and New Injector Trojan. Retrieved January 8, 2018.

Internal MISP references

UUID f5f3e1e7-1d83-4ddc-a878-134cd0d268ce which can be used as unique global reference for OilRig New Delivery Oct 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-08T00:00:00Z
date_published 2017-10-09T00:00:00Z
source MITRE
title OilRig Group Steps Up Attacks with New Delivery Documents and New Injector Trojan

Palo Alto OilRig Oct 2016

Grunzweig, J. and Falcone, R.. (2016, October 4). OilRig Malware Campaign Updates Toolset and Expands Targets. Retrieved May 3, 2017.

Internal MISP references

UUID 14bbb07b-caeb-4d17-8e54-047322a5930c which can be used as unique global reference for Palo Alto OilRig Oct 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-05-03T00:00:00Z
date_published 2016-10-04T00:00:00Z
source MITRE, Tidal Cyber
title OilRig Malware Campaign Updates Toolset and Expands Targets

ESET OilRig September 21 2023

ESET Research. (2024, September 21). OilRig’s Outer Space and Juicy Mix: Same ol’ rig, new drill pipes. Retrieved September 3, 2024.

Internal MISP references

UUID 21ee3e95-ac4b-48f7-b948-249e1884bc96 which can be used as unique global reference for ESET OilRig September 21 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-03T00:00:00Z
date_published 2024-09-21T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title OilRig’s Outer Space and Juicy Mix: Same ol’ rig, new drill pipes

ESET OilRig December 14 2023

Zuzana Hromcová, Adam Burgher. (2023, December 14). OilRig’s persistent attacks using cloud service-powered downloaders. Retrieved September 1, 2024.

Internal MISP references

UUID f96b74d5-ff75-47c6-a9a2-b2f43db351bc which can be used as unique global reference for ESET OilRig December 14 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-01T00:00:00Z
date_published 2023-12-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title OilRig’s persistent attacks using cloud service-powered downloaders

Unit 42 OilRig Sept 2018

Falcone, R., et al. (2018, September 04). OilRig Targets a Middle Eastern Government and Adds Evasion Techniques to OopsIE. Retrieved September 24, 2018.

Internal MISP references

UUID 84815940-b98a-4f5c-82fe-7d8bf2f51a09 which can be used as unique global reference for Unit 42 OilRig Sept 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-09-24T00:00:00Z
date_published 2018-09-04T00:00:00Z
source MITRE
title OilRig Targets a Middle Eastern Government and Adds Evasion Techniques to OopsIE

Unit42 RDAT July 2020

Falcone, R. (2020, July 22). OilRig Targets Middle Eastern Telecommunications Organization and Adds Novel C2 Channel with Steganography to Its Inventory. Retrieved July 28, 2020.

Internal MISP references

UUID 2929baa5-ead7-4936-ab67-c4742afc473c which can be used as unique global reference for Unit42 RDAT July 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-07-28T00:00:00Z
date_published 2020-07-22T00:00:00Z
source MITRE
title OilRig Targets Middle Eastern Telecommunications Organization and Adds Novel C2 Channel with Steganography to Its Inventory

Unit 42 QUADAGENT July 2018

Lee, B., Falcone, R. (2018, July 25). OilRig Targets Technology Service Provider and Government Agency with QUADAGENT. Retrieved August 9, 2018.

Internal MISP references

UUID 320f49df-7b0a-4a6a-8542-17b0f56c94c9 which can be used as unique global reference for Unit 42 QUADAGENT July 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-09T00:00:00Z
date_published 2018-07-25T00:00:00Z
source MITRE
title OilRig Targets Technology Service Provider and Government Agency with QUADAGENT

OilRig ISMAgent July 2017

Falcone, R. and Lee, B. (2017, July 27). OilRig Uses ISMDoor Variant; Possibly Linked to Greenbug Threat Group. Retrieved January 8, 2018.

Internal MISP references

UUID e42c60cb-7827-4896-96e9-1323d5973aac which can be used as unique global reference for OilRig ISMAgent July 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-08T00:00:00Z
date_published 2017-07-27T00:00:00Z
source MITRE
title OilRig Uses ISMDoor Variant; Possibly Linked to Greenbug Threat Group

Unit 42 RGDoor Jan 2018

Falcone, R. (2018, January 25). OilRig uses RGDoor IIS Backdoor on Targets in the Middle East. Retrieved July 6, 2018.

Internal MISP references

UUID 94b37da6-f808-451e-8f2d-5df0e93358ca which can be used as unique global reference for Unit 42 RGDoor Jan 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-06T00:00:00Z
date_published 2018-01-25T00:00:00Z
source MITRE
title OilRig uses RGDoor IIS Backdoor on Targets in the Middle East

Palo Alto OilRig Sep 2018

Wilhoit, K. and Falcone, R. (2018, September 12). OilRig Uses Updated BONDUPDATER to Target Middle Eastern Government. Retrieved February 18, 2019.

Internal MISP references

UUID 2ec6eabe-92e2-454c-ba7b-b27fec5b428d which can be used as unique global reference for Palo Alto OilRig Sep 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-18T00:00:00Z
date_published 2018-09-12T00:00:00Z
source MITRE
title OilRig Uses Updated BONDUPDATER to Target Middle Eastern Government

ESET Okrum July 2019

Hromcova, Z. (2019, July). OKRUM AND KETRICAN: AN OVERVIEW OF RECENT KE3CHANG GROUP ACTIVITY. Retrieved May 6, 2020.

Internal MISP references

UUID 197163a8-1a38-4edd-ba73-f44e7a329f41 which can be used as unique global reference for ESET Okrum July 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-06T00:00:00Z
date_published 2019-07-01T00:00:00Z
source MITRE
title OKRUM AND KETRICAN: AN OVERVIEW OF RECENT KE3CHANG GROUP ACTIVITY

Talos Agent Tesla Oct 2018

Brumaghin, E., et al. (2018, October 15). Old dog, new tricks - Analysing new RTF-based campaign distributing Agent Tesla, Loki with PyREbox. Retrieved November 5, 2018.

Internal MISP references

UUID a7f38717-afbe-41c1-a404-bcb023c337e3 which can be used as unique global reference for Talos Agent Tesla Oct 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-05T00:00:00Z
date_published 2018-10-15T00:00:00Z
source MITRE
title Old dog, new tricks - Analysing new RTF-based campaign distributing Agent Tesla, Loki with PyREbox

Securelist Malware Tricks April 2017

Ishimaru, S.. (2017, April 13). Old Malware Tricks To Bypass Detection in the Age of Big Data. Retrieved May 30, 2019.

Internal MISP references

UUID 3430ac9b-1621-42b4-9cc7-5ee60191051f which can be used as unique global reference for Securelist Malware Tricks April 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-05-30T00:00:00Z
date_published 2017-04-13T00:00:00Z
source MITRE
title Old Malware Tricks To Bypass Detection in the Age of Big Data

Red Canary Verclsid.exe

Haag, M., Levan, K. (2017, April 6). Old Phishing Attacks Deploy a New Methodology: Verclsid.exe. Retrieved August 10, 2020.

Internal MISP references

UUID f64e934f-737d-4461-8158-ae855bc472c4 which can be used as unique global reference for Red Canary Verclsid.exe in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-10T00:00:00Z
date_published 2017-04-06T00:00:00Z
source MITRE
title Old Phishing Attacks Deploy a New Methodology: Verclsid.exe

Talos Olympic Destroyer 2018

Mercer, W. and Rascagneres, P. (2018, February 12). Olympic Destroyer Takes Aim At Winter Olympics. Retrieved March 14, 2019.

Internal MISP references

UUID 25a2e179-7abd-4091-8af4-e9d2bf24ef11 which can be used as unique global reference for Talos Olympic Destroyer 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-14T00:00:00Z
date_published 2018-02-12T00:00:00Z
source MITRE
title Olympic Destroyer Takes Aim At Winter Olympics

Crowdstrike Pirate Panda April 2020

Busselen, M. (2020, April 7). On-demand Webcast: CrowdStrike Experts on COVID-19 Cybersecurity Challenges and Recommendations. Retrieved May 20, 2020.

Internal MISP references

UUID f71410b4-5f79-439a-ae9e-8965f9bc577f which can be used as unique global reference for Crowdstrike Pirate Panda April 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-20T00:00:00Z
date_published 2020-04-07T00:00:00Z
source MITRE
title On-demand Webcast: CrowdStrike Experts on COVID-19 Cybersecurity Challenges and Recommendations

OneDriveStandaloneUpdater.exe - LOLBAS Project

LOLBAS. (2021, August 22). OneDriveStandaloneUpdater.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 3d7dcd68-a7b2-438c-95bb-b7523a39c6f7 which can be used as unique global reference for OneDriveStandaloneUpdater.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-08-22T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title OneDriveStandaloneUpdater.exe

Electron 6-8

Kosayev, U. (2023, June 15). One Electron to Rule Them All. Retrieved March 7, 2024.

Internal MISP references

UUID e4aa340e-de84-5b0d-8fba-405005a46f09 which can be used as unique global reference for Electron 6-8 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-07T00:00:00Z
date_published 2023-06-15T00:00:00Z
source MITRE
title One Electron to Rule Them All

chasing_avaddon_ransomware

Hernandez, A. S. Tarter, P. Ocamp, E. J. (2022, January 19). One Source to Rule Them All: Chasing AVADDON Ransomware. Retrieved January 26, 2022.

Internal MISP references

UUID c5aeed6b-2d5d-4d49-b05e-261d565808d9 which can be used as unique global reference for chasing_avaddon_ransomware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-26T00:00:00Z
date_published 2022-01-19T00:00:00Z
source MITRE
title One Source to Rule Them All: Chasing AVADDON Ransomware

Onion Routing

Wikipedia. (n.d.). Onion Routing. Retrieved October 20, 2020.

Internal MISP references

UUID 0667caad-39cd-469b-91c0-1210c09e6041 which can be used as unique global reference for Onion Routing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
source MITRE
title Onion Routing

FireEye FIN7 Aug 2018

Carr, N., et al. (2018, August 01). On the Hunt for FIN7: Pursuing an Enigmatic and Evasive Global Criminal Operation. Retrieved August 23, 2018.

Internal MISP references

UUID 54e5f23a-5ca6-4feb-8046-db2fb71b400a which can be used as unique global reference for FireEye FIN7 Aug 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-23T00:00:00Z
date_published 2018-08-01T00:00:00Z
source MITRE
title On the Hunt for FIN7: Pursuing an Enigmatic and Evasive Global Criminal Operation

securelist_strongpity

Baumgartner, K. (2016, October 3). On the StrongPity Waterhole Attacks Targeting Italian and Belgian Encryption Users. Retrieved March 28, 2024.

Internal MISP references

UUID 67d6cf00-7971-55fb-ae5f-e71a3150ceaa which can be used as unique global reference for securelist_strongpity in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-28T00:00:00Z
date_published 2016-10-03T00:00:00Z
source MITRE
title On the StrongPity Waterhole Attacks Targeting Italian and Belgian Encryption Users

OSX.FairyTale

Phile Stokes. (2018, September 20). On the Trail of OSX.FairyTale | Adware Playing at Malware. Retrieved August 24, 2021.

Internal MISP references

UUID 27f8ad45-53d2-48ba-b549-f7674cf9c2e7 which can be used as unique global reference for OSX.FairyTale in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-24T00:00:00Z
date_published 2018-09-20T00:00:00Z
source MITRE
title On the Trail of OSX.FairyTale

Unit 42 OopsIE! Feb 2018

Lee, B., Falcone, R. (2018, February 23). OopsIE! OilRig Uses ThreeDollars to Deliver New Trojan. Retrieved July 16, 2018.

Internal MISP references

UUID d4c2bac0-e95c-46af-ae52-c93de3d92f19 which can be used as unique global reference for Unit 42 OopsIE! Feb 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-16T00:00:00Z
date_published 2018-02-23T00:00:00Z
source MITRE
title OopsIE! OilRig Uses ThreeDollars to Deliver New Trojan

Mitiga

Ariel Szarf, Doron Karmi, and Lionel Saposnik. (n.d.). Oops, I Leaked It Again — How Mitiga Found PII in Exposed Amazon RDS Snapshots. Retrieved September 24, 2024.

Internal MISP references

UUID 8c1d75b3-2ea9-5390-aefb-88f50730b2a0 which can be used as unique global reference for Mitiga in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-24T00:00:00Z
source MITRE
title Oops, I Leaked It Again — How Mitiga Found PII in Exposed Amazon RDS Snapshots

Proofpoint ZeroT Feb 2017

Huss, D., et al. (2017, February 2). Oops, they did it again: APT Targets Russia and Belarus with ZeroT and PlugX. Retrieved April 5, 2018.

Internal MISP references

UUID 63787035-f136-43e1-b445-22853bbed92b which can be used as unique global reference for Proofpoint ZeroT Feb 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-05T00:00:00Z
date_published 2017-02-02T00:00:00Z
source MITRE
title Oops, they did it again: APT Targets Russia and Belarus with ZeroT and PlugX

OpenConsole.exe - LOLBAS Project

LOLBAS. (2022, June 17). OpenConsole.exe. Retrieved December 4, 2023.

Internal MISP references

UUID e597522a-68ac-4d7e-80c4-db1c66d2da04 which can be used as unique global reference for OpenConsole.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2022-06-17T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title OpenConsole.exe

Open Login Items Apple

Apple. (n.d.). Open items automatically when you log in on Mac. Retrieved October 1, 2021.

Internal MISP references

UUID 46a480eb-52d1-44c9-8b44-7e516b27cf82 which can be used as unique global reference for Open Login Items Apple in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-01T00:00:00Z
source MITRE
title Open items automatically when you log in on Mac

OpenSSH Project Page

OpenSSH. (2023, March 15). OpenSSH. Retrieved May 25, 2023.

Internal MISP references

UUID e5ca6811-cd22-4be5-a751-d23fb99d206e which can be used as unique global reference for OpenSSH Project Page in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-25T00:00:00Z
date_published 2023-03-15T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title OpenSSH

OpenSSH Server Listening On Socket

mdecrevoisier. (2022, October 25). OpenSSH Server Listening On Socket. Retrieved May 25, 2023.

Internal MISP references

UUID 8ab9903b-db4b-4459-9791-f9ab12b7577b which can be used as unique global reference for OpenSSH Server Listening On Socket in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-25T00:00:00Z
date_published 2022-10-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title OpenSSH Server Listening On Socket

Operating with EmPyre

rvrsh3ll. (2016, May 18). Operating with EmPyre. Retrieved July 12, 2017.

Internal MISP references

UUID 459a4ad5-0e28-4bfc-a73e-b9dd516d516f which can be used as unique global reference for Operating with EmPyre in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-12T00:00:00Z
date_published 2016-05-18T00:00:00Z
source MITRE
title Operating with EmPyre

Windows AppleJeus GReAT

Global Research & Analysis Team, Kaspersky Lab (GReAT). (2018, August 23). Operation AppleJeus: Lazarus hits cryptocurrency exchange with fake installer and macOS malware. Retrieved September 27, 2022.

Internal MISP references

UUID 336ea5f5-d8cc-4af5-9aa0-203e319b3c28 which can be used as unique global reference for Windows AppleJeus GReAT in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-27T00:00:00Z
date_published 2018-08-23T00:00:00Z
source MITRE
title Operation AppleJeus: Lazarus hits cryptocurrency exchange with fake installer and macOS malware

Cybereason Operation Bearded Barbie April 5 2022

Cybereason Nocturnus. (2022, April 5). Operation Bearded Barbie: APT-C-23 Campaign Targeting Israeli Officials. Retrieved October 30, 2023.

Internal MISP references

UUID 7d71b7c9-531e-4e4f-ab85-df2380555b7a which can be used as unique global reference for Cybereason Operation Bearded Barbie April 5 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-30T00:00:00Z
date_published 2022-04-05T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Operation Bearded Barbie: APT-C-23 Campaign Targeting Israeli Officials

Novetta Blockbuster Destructive Malware

Novetta Threat Research Group. (2016, February 24). Operation Blockbuster: Destructive Malware Report. Retrieved March 2, 2016.

Internal MISP references

UUID de278b77-52cb-4126-9341-5b32843ae9f1 which can be used as unique global reference for Novetta Blockbuster Destructive Malware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-03-02T00:00:00Z
date_published 2016-02-24T00:00:00Z
source MITRE
title Operation Blockbuster: Destructive Malware Report

Novetta Blockbuster Loaders

Novetta Threat Research Group. (2016, February 24). Operation Blockbuster: Loaders, Installers and Uninstallers Report. Retrieved March 2, 2016.

Internal MISP references

UUID 5d3e2f36-3833-4203-9884-c3ff806da286 which can be used as unique global reference for Novetta Blockbuster Loaders in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-03-02T00:00:00Z
date_published 2016-02-24T00:00:00Z
source MITRE
title Operation Blockbuster: Loaders, Installers and Uninstallers Report

Novetta Blockbuster RATs

Novetta Threat Research Group. (2016, February 24). Operation Blockbuster: Remote Administration Tools & Content Staging Malware Report. Retrieved March 16, 2016.

Internal MISP references

UUID 80d88e80-b5a7-48b7-a999-96b06d082997 which can be used as unique global reference for Novetta Blockbuster RATs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-03-16T00:00:00Z
date_published 2016-02-24T00:00:00Z
source MITRE
title Operation Blockbuster: Remote Administration Tools & Content Staging Malware Report

Novetta Blockbuster Tools

Novetta Threat Research Group. (2016, February 24). Operation Blockbuster: Tools Report. Retrieved March 10, 2016.

Internal MISP references

UUID 6dd1b091-9ace-4e31-9845-3b1091147ecd which can be used as unique global reference for Novetta Blockbuster Tools in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-03-10T00:00:00Z
date_published 2016-02-24T00:00:00Z
source MITRE
title Operation Blockbuster: Tools Report

Novetta Blockbuster

Novetta Threat Research Group. (2016, February 24). Operation Blockbuster: Unraveling the Long Thread of the Sony Attack. Retrieved February 25, 2016.

Internal MISP references

UUID bde96b4f-5f98-4ce5-a507-4b05d192b6d7 which can be used as unique global reference for Novetta Blockbuster in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-02-25T00:00:00Z
date_published 2016-02-24T00:00:00Z
source MITRE, Tidal Cyber
title Operation Blockbuster: Unraveling the Long Thread of the Sony Attack

FireEye Clandestine Wolf

Eng, E., Caselden, D.. (2015, June 23). Operation Clandestine Wolf – Adobe Flash Zero-Day in APT3 Phishing Campaign. Retrieved January 14, 2016.

Internal MISP references

UUID dbb779c4-4d75-4fb4-ad3a-7d1f0f74e26f which can be used as unique global reference for FireEye Clandestine Wolf in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-14T00:00:00Z
date_published 2015-06-23T00:00:00Z
source MITRE, Tidal Cyber
title Operation Clandestine Wolf – Adobe Flash Zero-Day in APT3 Phishing Campaign

Cylance Cleaver

Cylance. (2014, December). Operation Cleaver. Retrieved September 14, 2017.

Internal MISP references

UUID f0b45225-3ec3-406f-bd74-87f24003761b which can be used as unique global reference for Cylance Cleaver in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-09-14T00:00:00Z
date_published 2014-12-01T00:00:00Z
source MITRE, Tidal Cyber
title Operation Cleaver

PWC Cloud Hopper April 2017

PwC and BAE Systems. (2017, April). Operation Cloud Hopper. Retrieved April 5, 2017.

Internal MISP references

UUID fe741064-8cd7-428b-bdb9-9f2ab7e92489 which can be used as unique global reference for PWC Cloud Hopper April 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-04-05T00:00:00Z
date_published 2017-04-01T00:00:00Z
source MITRE, Tidal Cyber
title Operation Cloud Hopper

PWC Cloud Hopper Technical Annex April 2017

PwC and BAE Systems. (2017, April). Operation Cloud Hopper: Technical Annex. Retrieved April 13, 2017.

Internal MISP references

UUID da6c8a72-c732-44d5-81ac-427898706eed which can be used as unique global reference for PWC Cloud Hopper Technical Annex April 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-04-13T00:00:00Z
date_published 2017-04-01T00:00:00Z
source MITRE
title Operation Cloud Hopper: Technical Annex

Cybereason Cobalt Kitty 2017

Dahan, A. (2017). Operation Cobalt Kitty. Retrieved December 27, 2018.

Internal MISP references

UUID bf838a23-1620-4668-807a-4354083d69b1 which can be used as unique global reference for Cybereason Cobalt Kitty 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-12-27T00:00:00Z
date_published 2017-01-01T00:00:00Z
source MITRE
title Operation Cobalt Kitty

Cybereason Oceanlotus May 2017

Dahan, A. (2017, May 24). OPERATION COBALT KITTY: A LARGE-SCALE APT IN ASIA CARRIED OUT BY THE OCEANLOTUS GROUP. Retrieved November 5, 2018.

Internal MISP references

UUID 1ef3025b-d4a9-49aa-b744-2dbea10a0abf which can be used as unique global reference for Cybereason Oceanlotus May 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-05T00:00:00Z
date_published 2017-05-24T00:00:00Z
source MITRE
title OPERATION COBALT KITTY: A LARGE-SCALE APT IN ASIA CARRIED OUT BY THE OCEANLOTUS GROUP

Cybereason OperationCuckooBees May 2022

Cybereason Nocturnus. (2022, May 4). Operation CuckooBees: Deep-Dive into Stealthy Winnti Techniques. Retrieved September 22, 2022.

Internal MISP references

UUID fe3e2c7e-2287-406c-b717-cf7721b5843a which can be used as unique global reference for Cybereason OperationCuckooBees May 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-22T00:00:00Z
date_published 2022-05-04T00:00:00Z
source MITRE
title Operation CuckooBees: Deep-Dive into Stealthy Winnti Techniques

Securelist ScarCruft Jun 2016

Raiu, C., and Ivanov, A. (2016, June 17). Operation Daybreak. Retrieved February 15, 2018.

Internal MISP references

UUID 04961952-9bac-48f3-adc7-40a3a2bcee84 which can be used as unique global reference for Securelist ScarCruft Jun 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-15T00:00:00Z
date_published 2016-06-17T00:00:00Z
source MITRE, Tidal Cyber
title Operation Daybreak

FireEye Operation Double Tap

Moran, N., et al. (2014, November 21). Operation Double Tap. Retrieved January 14, 2016.

Internal MISP references

UUID 4b9af128-98da-48b6-95c7-8d27979c2ab1 which can be used as unique global reference for FireEye Operation Double Tap in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-14T00:00:00Z
date_published 2014-11-21T00:00:00Z
source MITRE
title Operation Double Tap

ClearSky Lazarus Aug 2020

ClearSky Research Team. (2020, August 13). Operation 'Dream Job' Widespread North Korean Espionage Campaign. Retrieved December 20, 2021.

Internal MISP references

UUID 2827e6e4-8163-47fb-9e22-b59e59cd338f which can be used as unique global reference for ClearSky Lazarus Aug 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-12-20T00:00:00Z
date_published 2020-08-13T00:00:00Z
source MITRE
title Operation 'Dream Job' Widespread North Korean Espionage Campaign

Cylance Dust Storm

Gross, J. (2016, February 23). Operation Dust Storm. Retrieved December 22, 2021.

Internal MISP references

UUID 001dd53c-74e6-4add-aeb7-da76b0d2afe8 which can be used as unique global reference for Cylance Dust Storm in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-12-22T00:00:00Z
date_published 2016-02-23T00:00:00Z
source MITRE
title Operation Dust Storm

DustySky

ClearSky. (2016, January 7). Operation DustySky. Retrieved January 8, 2016.

Internal MISP references

UUID b9e0770d-f54a-4ada-abd1-65c45eee00fa which can be used as unique global reference for DustySky in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-08T00:00:00Z
date_published 2016-01-07T00:00:00Z
source MITRE, Tidal Cyber
title Operation DustySky

DustySky2

ClearSky Cybersecurity. (2016, June 9). Operation DustySky - Part 2. Retrieved August 3, 2016.

Internal MISP references

UUID 4a3ecdec-254c-4eb4-9126-f540bb21dffe which can be used as unique global reference for DustySky2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-08-03T00:00:00Z
date_published 2016-06-09T00:00:00Z
source MITRE
title Operation DustySky - Part 2

Trend Micro Tick November 2019

Chen, J. et al. (2019, November). Operation ENDTRADE: TICK’s Multi-Stage Backdoors for Attacking Industries and Stealing Classified Data. Retrieved June 9, 2020.

Internal MISP references

UUID 93adbf0d-5f5e-498e-aca1-ed3eb11561e7 which can be used as unique global reference for Trend Micro Tick November 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-09T00:00:00Z
date_published 2019-11-01T00:00:00Z
source MITRE
title Operation ENDTRADE: TICK’s Multi-Stage Backdoors for Attacking Industries and Stealing Classified Data

FireEye DeputyDog 9002 November 2013

Moran, N. et al.. (2013, November 10). Operation Ephemeral Hydra: IE Zero-Day Linked to DeputyDog Uses Diskless Method. Retrieved March 19, 2018.

Internal MISP references

UUID 68b5a913-b696-4ca5-89ed-63453023d2a2 which can be used as unique global reference for FireEye DeputyDog 9002 November 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-19T00:00:00Z
date_published 2013-11-10T00:00:00Z
source MITRE
title Operation Ephemeral Hydra: IE Zero-Day Linked to DeputyDog Uses Diskless Method

Volexity Exchange Marauder March 2021

Gruzweig, J. et al. (2021, March 2). Operation Exchange Marauder: Active Exploitation of Multiple Zero-Day Microsoft Exchange Vulnerabilities. Retrieved March 3, 2021.

Internal MISP references

UUID ef0626e9-281c-4770-b145-ffe36e18e369 which can be used as unique global reference for Volexity Exchange Marauder March 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-03T00:00:00Z
date_published 2021-03-02T00:00:00Z
source MITRE, Tidal Cyber
title Operation Exchange Marauder: Active Exploitation of Multiple Zero-Day Microsoft Exchange Vulnerabilities

ESET Dukes October 2019

Faou, M., Tartare, M., Dupuy, T. (2019, October). OPERATION GHOST. Retrieved September 23, 2020.

Internal MISP references

UUID fbc77b85-cc5a-4c65-956d-b8556974b4ef which can be used as unique global reference for ESET Dukes October 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-23T00:00:00Z
date_published 2019-10-01T00:00:00Z
source MITRE
title OPERATION GHOST

IssueMakersLab Andariel GoldenAxe May 2017

IssueMakersLab. (2017, May 1). Operation GoldenAxe. Retrieved September 12, 2024.

Internal MISP references

UUID 10a21964-d31f-40af-bf32-5ccd7d8c99a2 which can be used as unique global reference for IssueMakersLab Andariel GoldenAxe May 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2017-05-01T00:00:00Z
source MITRE
title Operation GoldenAxe

ESET Operation Groundbait

Cherepanov, A.. (2016, May 17). Operation Groundbait: Analysis of a surveillance toolkit. Retrieved May 18, 2016.

Internal MISP references

UUID 218e69fd-558c-459b-9a57-ad2ee3e96296 which can be used as unique global reference for ESET Operation Groundbait in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-05-18T00:00:00Z
date_published 2016-05-17T00:00:00Z
source MITRE
title Operation Groundbait: Analysis of a surveillance toolkit

Operation Hangover May 2013

Fagerland, S., et al. (2013, May). Operation Hangover: Unveiling an Indian Cyberattack Infrastructure. Retrieved September 26, 2016.

Internal MISP references

UUID fd581c0c-d93e-4396-a372-99cde3cd0c7c which can be used as unique global reference for Operation Hangover May 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-09-26T00:00:00Z
date_published 2013-05-01T00:00:00Z
source MITRE
title Operation Hangover: Unveiling an Indian Cyberattack Infrastructure

ESET Operation Interception June 17 2020

Dominik Breitenbacher, Kaspars Osis. (2020, June 17). Operation In(ter)ception: Aerospace and military companies in the crosshairs of cyberspies. Retrieved June 20, 2024.

Internal MISP references

UUID 481ac64d-912b-4c69-97e5-004bb5768b48 which can be used as unique global reference for ESET Operation Interception June 17 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-20T00:00:00Z
date_published 2020-06-17T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Operation In(ter)ception: Aerospace and military companies in the crosshairs of cyberspies

ESET Lazarus Jun 2020

Breitenbacher, D and Osis, K. (2020, June 17). OPERATION IN(TER)CEPTION: Targeted Attacks Against European Aerospace and Military Companies. Retrieved December 20, 2021.

Internal MISP references

UUID b16a0141-dea3-4b34-8279-7bc1ce3d7052 which can be used as unique global reference for ESET Lazarus Jun 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-12-20T00:00:00Z
date_published 2020-06-17T00:00:00Z
source MITRE
title OPERATION IN(TER)CEPTION: Targeted Attacks Against European Aerospace and Military Companies

AhnLab Kimsuky Kabar Cobra Feb 2019

AhnLab. (2019, February 28). Operation Kabar Cobra - Tenacious cyber-espionage campaign by Kimsuky Group. Retrieved September 29, 2021.

Internal MISP references

UUID 4035e871-9291-4d7f-9c5f-d8482d4dc8a7 which can be used as unique global reference for AhnLab Kimsuky Kabar Cobra Feb 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-29T00:00:00Z
date_published 2019-02-28T00:00:00Z
source MITRE
title Operation Kabar Cobra - Tenacious cyber-espionage campaign by Kimsuky Group

Villeneuve et al 2014

Villeneuve, N., Bennett, J. T., Moran, N., Haq, T., Scott, M., & Geers, K. (2014). OPERATION “KE3CHANG”: Targeted Attacks Against Ministries of Foreign Affairs. Retrieved November 12, 2014.

Internal MISP references

UUID 31504d92-6c4d-43f0-8548-ccc3aa05ba48 which can be used as unique global reference for Villeneuve et al 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-12T00:00:00Z
date_published 2014-01-01T00:00:00Z
source MITRE
title OPERATION “KE3CHANG”: Targeted Attacks Against Ministries of Foreign Affairs

Mandiant Operation Ke3chang November 2014

Villeneuve, N., Bennett, J. T., Moran, N., Haq, T., Scott, M., & Geers, K. (2014). OPERATION “KE3CHANG”: Targeted Attacks Against Ministries of Foreign Affairs. Retrieved November 12, 2014.

Internal MISP references

UUID bb45cf96-ceae-4f46-a0f5-08cd89f699c9 which can be used as unique global reference for Mandiant Operation Ke3chang November 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-12T00:00:00Z
date_published 2014-01-01T00:00:00Z
source MITRE, Tidal Cyber
title OPERATION “KE3CHANG”: Targeted Attacks Against Ministries of Foreign Affairs

Cisco Operation Layover September 2021

Ventura, V. (2021, September 16). Operation Layover: How we tracked an attack on the aviation industry to five years of compromise. Retrieved September 15, 2023.

Internal MISP references

UUID f19b4bd5-99f9-54c0-bffe-cc9c052aea12 which can be used as unique global reference for Cisco Operation Layover September 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-15T00:00:00Z
date_published 2021-09-16T00:00:00Z
source MITRE
title Operation Layover: How we tracked an attack on the aviation industry to five years of compromise

Lotus Blossom Jun 2015

Falcone, R., et al.. (2015, June 16). Operation Lotus Blossom. Retrieved February 15, 2016.

Internal MISP references

UUID 46fdb8ca-b14d-43bd-a20f-cae7b26e56c6 which can be used as unique global reference for Lotus Blossom Jun 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-02-15T00:00:00Z
date_published 2015-06-16T00:00:00Z
source MITRE, Tidal Cyber
title Operation Lotus Blossom

FireEye Operation Molerats

Villeneuve, N., Haq, H., Moran, N. (2013, August 23). OPERATION MOLERATS: MIDDLE EAST CYBER ATTACKS USING POISON IVY. Retrieved April 1, 2016.

Internal MISP references

UUID 6b24e4aa-e773-4ca3-8267-19e036dc1144 which can be used as unique global reference for FireEye Operation Molerats in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-01T00:00:00Z
date_published 2013-08-23T00:00:00Z
source MITRE
title OPERATION MOLERATS: MIDDLE EAST CYBER ATTACKS USING POISON IVY

McAfee Lazarus Nov 2020

Beek, C. (2020, November 5). Operation North Star: Behind The Scenes. Retrieved December 20, 2021.

Internal MISP references

UUID a283d229-3a2a-43ef-bcbe-aa6d41098b51 which can be used as unique global reference for McAfee Lazarus Nov 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-12-20T00:00:00Z
date_published 2020-11-05T00:00:00Z
source MITRE
title Operation North Star: Behind The Scenes

McAfee Lazarus Jul 2020

Cashman, M. (2020, July 29). Operation North Star Campaign. Retrieved December 20, 2021.

Internal MISP references

UUID 43581a7d-d71a-4121-abb6-127483a49d12 which can be used as unique global reference for McAfee Lazarus Jul 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-12-20T00:00:00Z
date_published 2020-07-29T00:00:00Z
source MITRE
title Operation North Star Campaign

McAfee Oceansalt Oct 2018

Sherstobitoff, R., Malhotra, A. (2018, October 18). ‘Operation Oceansalt’ Attacks South Korea, U.S., and Canada With Source Code From Chinese Hacker Group. Retrieved November 30, 2018.

Internal MISP references

UUID 04b475ab-c7f6-4373-a4b0-04b5d8028f95 which can be used as unique global reference for McAfee Oceansalt Oct 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-30T00:00:00Z
date_published 2018-10-18T00:00:00Z
source MITRE
title ‘Operation Oceansalt’ Attacks South Korea, U.S., and Canada With Source Code From Chinese Hacker Group

FireEye OpPoisonedHandover February 2016

Ned Moran, Mike Scott, Mike Oppenheim of FireEye. (2014, November 3). Operation Poisoned Handover: Unveiling Ties Between APT Activity in Hong Kong’s Pro-Democracy Movement. Retrieved April 18, 2019.

Internal MISP references

UUID 1d57b1c8-930b-4bcb-a51e-39020327cc5d which can be used as unique global reference for FireEye OpPoisonedHandover February 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-18T00:00:00Z
date_published 2014-11-03T00:00:00Z
source MITRE
title Operation Poisoned Handover: Unveiling Ties Between APT Activity in Hong Kong’s Pro-Democracy Movement

Operation Quantum Entanglement

Haq, T., Moran, N., Vashisht, S., Scott, M. (2014, September). OPERATION QUANTUM ENTANGLEMENT. Retrieved November 4, 2015.

Internal MISP references

UUID c94f9652-32c3-4975-a9c0-48f93bdfe790 which can be used as unique global reference for Operation Quantum Entanglement in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-11-04T00:00:00Z
date_published 2014-09-01T00:00:00Z
source MITRE, Tidal Cyber
title OPERATION QUANTUM ENTANGLEMENT

ProofPoint GoT 9002 Aug 2017

Huss, D. & Mesa, M. (2017, August 25). Operation RAT Cook: Chinese APT actors use fake Game of Thrones leaks as lures. Retrieved March 19, 2018.

Internal MISP references

UUID b796f889-400c-440b-86b2-1588fd15f3ae which can be used as unique global reference for ProofPoint GoT 9002 Aug 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-19T00:00:00Z
date_published 2017-08-25T00:00:00Z
source MITRE
title Operation RAT Cook: Chinese APT actors use fake Game of Thrones leaks as lures

FireEye Op RussianDoll

FireEye Labs. (2015, April 18). Operation RussianDoll: Adobe & Windows Zero-Day Exploits Likely Leveraged by Russia’s APT28 in Highly-Targeted Attack. Retrieved April 24, 2017.

Internal MISP references

UUID 6f5986b7-07ee-4bca-9cb1-248744e94d7f which can be used as unique global reference for FireEye Op RussianDoll in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-04-24T00:00:00Z
date_published 2015-04-18T00:00:00Z
source MITRE
title Operation RussianDoll: Adobe & Windows Zero-Day Exploits Likely Leveraged by Russia’s APT28 in Highly-Targeted Attack

FireEye Operation Saffron Rose 2013

Villeneuve, N. et al.. (2013). OPERATION SAFFRON ROSE . Retrieved May 28, 2020.

Internal MISP references

UUID 2f4c0941-d14e-4eb8-828c-f1d9a1e14a95 which can be used as unique global reference for FireEye Operation Saffron Rose 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-28T00:00:00Z
date_published 2013-01-01T00:00:00Z
source MITRE
title OPERATION SAFFRON ROSE

Cylance Shaheen Nov 2018

Livelli, K, et al. (2018, November 12). Operation Shaheen. Retrieved May 1, 2019.

Internal MISP references

UUID 57802e46-e12c-4230-8d1c-08854a0de06a which can be used as unique global reference for Cylance Shaheen Nov 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-05-01T00:00:00Z
date_published 2018-11-12T00:00:00Z
source MITRE
title Operation Shaheen

McAfee Sharpshooter December 2018

Sherstobitoff, R., Malhotra, A., et. al.. (2018, December 18). Operation Sharpshooter Campaign Targets Global Defense, Critical Infrastructure. Retrieved May 14, 2020.

Internal MISP references

UUID 96b6d012-8620-4ef5-bf9a-5f88e465a495 which can be used as unique global reference for McAfee Sharpshooter December 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-14T00:00:00Z
date_published 2018-12-18T00:00:00Z
source MITRE
title Operation Sharpshooter Campaign Targets Global Defense, Critical Infrastructure

Novetta-Axiom

Novetta. (n.d.). Operation SMN: Axiom Threat Actor Group Report. Retrieved November 12, 2014.

Internal MISP references

UUID 0dd428b9-849b-4108-87b1-20050b86f420 which can be used as unique global reference for Novetta-Axiom in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-12T00:00:00Z
source MITRE, Tidal Cyber
title Operation SMN: Axiom Threat Actor Group Report

Cybereason Soft Cell June 2019

Cybereason Nocturnus. (2019, June 25). Operation Soft Cell: A Worldwide Campaign Against Telecommunications Providers. Retrieved July 18, 2019.

Internal MISP references

UUID 620b7353-0e58-4503-b534-9250a8f5ae3c which can be used as unique global reference for Cybereason Soft Cell June 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-07-18T00:00:00Z
date_published 2019-06-25T00:00:00Z
source MITRE
title Operation Soft Cell: A Worldwide Campaign Against Telecommunications Providers

Azure AD Graph API

Microsoft. (2016, March 26). Operations overview | Graph API concepts. Retrieved June 18, 2020.

Internal MISP references

UUID fed0fef5-e366-4e24-9554-0599744cd1c6 which can be used as unique global reference for Azure AD Graph API in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-18T00:00:00Z
date_published 2016-03-26T00:00:00Z
source MITRE
title Operations overview

ESET Operation Spalax Jan 2021

M. Porolli. (2021, January 21). Operation Spalax: Targeted malware attacks in Colombia. Retrieved September 16, 2022.

Internal MISP references

UUID b699dd10-7d3f-4542-bf8a-b3f0c747bd0e which can be used as unique global reference for ESET Operation Spalax Jan 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-16T00:00:00Z
date_published 2021-01-21T00:00:00Z
source MITRE
title Operation Spalax: Targeted malware attacks in Colombia

Proofpoint TA453 July2021

Miller, J. et al. (2021, July 13). Operation SpoofedScholars: A Conversation with TA453. Retrieved August 18, 2021.

Internal MISP references

UUID a987872f-2176-437c-a38f-58676b7b12de which can be used as unique global reference for Proofpoint TA453 July2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-18T00:00:00Z
date_published 2021-07-13T00:00:00Z
source MITRE
title Operation SpoofedScholars: A Conversation with TA453

Proofpoint Operation Transparent Tribe March 2016

Huss, D. (2016, March 1). Operation Transparent Tribe. Retrieved June 8, 2016.

Internal MISP references

UUID 8e39d0da-114f-4ae6-8130-ca1380077d6a which can be used as unique global reference for Proofpoint Operation Transparent Tribe March 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-08T00:00:00Z
date_published 2016-03-01T00:00:00Z
source MITRE, Tidal Cyber
title Operation Transparent Tribe

TrendMicro TropicTrooper 2015

Alintanahin, K. (2015). Operation Tropic Trooper: Relying on Tried-and-Tested Flaws to Infiltrate Secret Keepers. Retrieved June 14, 2019.

Internal MISP references

UUID 65d1f980-1dc2-4d36-8148-2d8747a39883 which can be used as unique global reference for TrendMicro TropicTrooper 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-14T00:00:00Z
date_published 2015-01-01T00:00:00Z
source MITRE
title Operation Tropic Trooper: Relying on Tried-and-Tested Flaws to Infiltrate Secret Keepers

ClearSky and Trend Micro Operation Wilted Tulip July 2017

ClearSky and Trend Micro. (2017, July). Operation Wilted Tulip - Exposing a cyber espionage apparatus. Retrieved May 17, 2021.

Internal MISP references

UUID 696b12c6-ce1e-4e79-b781-43e0c70f9f2e which can be used as unique global reference for ClearSky and Trend Micro Operation Wilted Tulip July 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-05-17T00:00:00Z
date_published 2017-07-01T00:00:00Z
source MITRE, Tidal Cyber
title Operation Wilted Tulip - Exposing a cyber espionage apparatus

ClearSky Wilted Tulip July 2017

ClearSky Cyber Security and Trend Micro. (2017, July). Operation Wilted Tulip: Exposing a cyber espionage apparatus. Retrieved August 21, 2017.

Internal MISP references

UUID 50233005-8dc4-4e91-9477-df574271df40 which can be used as unique global reference for ClearSky Wilted Tulip July 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-08-21T00:00:00Z
date_published 2017-07-01T00:00:00Z
source MITRE
title Operation Wilted Tulip: Exposing a cyber espionage apparatus

ESET Windigo Mar 2014

Bilodeau, O., Bureau, M., Calvet, J., Dorais-Joncas, A., Léveillé, M., Vanheuverzwijn, B. (2014, March 18). Operation Windigo – the vivisection of a large Linux server‑side credential‑stealing malware campaign. Retrieved February 10, 2021.

Internal MISP references

UUID 721cdb36-d3fc-4212-b324-6be2b5f9cb46 which can be used as unique global reference for ESET Windigo Mar 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-10T00:00:00Z
date_published 2014-03-18T00:00:00Z
source MITRE
title Operation Windigo – the vivisection of a large Linux server‑side credential‑stealing malware campaign

FoxIT Wocao December 2019

Dantzig, M. v., Schamper, E. (2019, December 19). Operation Wocao: Shining a light on one of China’s hidden hacking groups. Retrieved October 8, 2020.

Internal MISP references

UUID aa3e31c7-71cd-4a3f-b482-9049c9abb631 which can be used as unique global reference for FoxIT Wocao December 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-08T00:00:00Z
date_published 2019-12-19T00:00:00Z
source MITRE
title Operation Wocao: Shining a light on one of China’s hidden hacking groups

TrendMicro Operation Woolen Goldfish March 2015

Cedric Pernet, Kenney Lu. (2015, March 19). Operation Woolen-Goldfish - When Kittens Go phishing. Retrieved April 21, 2021.

Internal MISP references

UUID 0f077c93-aeda-4c95-9996-c52812a31267 which can be used as unique global reference for TrendMicro Operation Woolen Goldfish March 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-21T00:00:00Z
date_published 2015-03-19T00:00:00Z
source MITRE
title Operation Woolen-Goldfish - When Kittens Go phishing

Bleeping Computer Op Sharpshooter March 2019

I. Ilascu. (2019, March 3). Op 'Sharpshooter' Connected to North Korea's Lazarus Group. Retrieved September 26, 2022.

Internal MISP references

UUID 84430646-6568-4288-8710-2827692a8862 which can be used as unique global reference for Bleeping Computer Op Sharpshooter March 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-26T00:00:00Z
date_published 2019-03-03T00:00:00Z
source MITRE
title Op 'Sharpshooter' Connected to North Korea's Lazarus Group

Symantec Orangeworm IOCs April 2018

Symantec Security Response Attack Investigation Team. (2018, April 23). Orangeworm: Indicators of Compromise. Retrieved July 8, 2018.

Internal MISP references

UUID 293596ad-a13f-456b-8916-d1e1b1afe0da which can be used as unique global reference for Symantec Orangeworm IOCs April 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-08T00:00:00Z
date_published 2018-04-23T00:00:00Z
source MITRE
title Orangeworm: Indicators of Compromise

Symantec WastedLocker June 2020

Symantec Threat Intelligence. (2020, June 25). WastedLocker: Symantec Identifies Wave of Attacks Against U.S. Organizations. Retrieved May 20, 2021.

Internal MISP references

UUID 061d8f74-a202-4089-acae-687e4f96933b which can be used as unique global reference for Symantec WastedLocker June 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-05-20T00:00:00Z
source MITRE
title Organizations

Microsoft Azure Resources

Microsoft Azure. (2024, May 31). Organize your Azure resources effectively. Retrieved September 25, 2024.

Internal MISP references

UUID 3d2f4092-5173-5f40-8b5f-c1cb886a2e6e which can be used as unique global reference for Microsoft Azure Resources in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-25T00:00:00Z
date_published 2024-05-31T00:00:00Z
source MITRE
title Organize your Azure resources effectively

Symantec Calisto July 2018

Pantig, J. (2018, July 30). OSX.Calisto. Retrieved September 7, 2018.

Internal MISP references

UUID cefef3d8-94f5-4d94-9689-6ed38702454f which can be used as unique global reference for Symantec Calisto July 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-09-07T00:00:00Z
date_published 2018-07-30T00:00:00Z
source MITRE
title OSX.Calisto

Objective-See MacMa Nov 2021

Wardle, P. (2021, November 11). OSX.CDDS (OSX.MacMa). Retrieved June 30, 2022.

Internal MISP references

UUID 7240261e-d901-4a68-b6fc-deec308e8a50 which can be used as unique global reference for Objective-See MacMa Nov 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-30T00:00:00Z
date_published 2021-11-11T00:00:00Z
source MITRE
title OSX.CDDS (OSX.MacMa)

hexed osx.dok analysis 2019

fluffybunny. (2019, July 9). OSX.Dok Analysis. Retrieved October 4, 2021.

Internal MISP references

UUID 96f9d36a-01a5-418e-85f4-957e58d49c1b which can be used as unique global reference for hexed osx.dok analysis 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-04T00:00:00Z
date_published 2019-07-09T00:00:00Z
source MITRE
title OSX.Dok Analysis

malwarebyteslabs xcsset dubrobber

Thomas Reed. (2020, April 21). OSX.DubRobber. Retrieved October 5, 2021.

Internal MISP references

UUID 11ef576f-1bac-49e3-acba-85d70a42503e which can be used as unique global reference for malwarebyteslabs xcsset dubrobber in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-05T00:00:00Z
date_published 2020-04-21T00:00:00Z
source MITRE
title OSX.DubRobber

wardle evilquest partii

Patrick Wardle. (2020, July 3). OSX.EvilQuest Uncovered part ii: insidious capabilities. Retrieved March 21, 2021.

Internal MISP references

UUID 4fee237c-c2ec-47f5-b382-ec6bd4779281 which can be used as unique global reference for wardle evilquest partii in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-21T00:00:00Z
date_published 2020-07-03T00:00:00Z
source MITRE
title OSX.EvilQuest Uncovered part ii: insidious capabilities

wardle evilquest parti

Patrick Wardle. (2020, June 29). OSX.EvilQuest Uncovered part i: infection, persistence, and more!. Retrieved March 18, 2021.

Internal MISP references

UUID 1ebd91db-9b56-442f-bb61-9e154b5966ac which can be used as unique global reference for wardle evilquest parti in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-18T00:00:00Z
date_published 2020-06-29T00:00:00Z
source MITRE
title OSX.EvilQuest Uncovered part i: infection, persistence, and more!

eset_osx_flashback

ESET. (2012, January 1). OSX/Flashback. Retrieved April 19, 2022.

Internal MISP references

UUID ce6e5a21-0063-4356-a77a-5c5f9fd2cf5c which can be used as unique global reference for eset_osx_flashback in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-19T00:00:00Z
date_published 2012-01-01T00:00:00Z
source MITRE
title OSX/Flashback

CheckPoint Dok

Ofer Caspi. (2017, May 4). OSX Malware is Catching Up, and it wants to Read Your HTTPS Traffic. Retrieved October 5, 2021.

Internal MISP references

UUID 8c178fd8-db34-45c6-901a-a8b2c178d809 which can be used as unique global reference for CheckPoint Dok in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-05T00:00:00Z
date_published 2017-05-04T00:00:00Z
source MITRE
title OSX Malware is Catching Up, and it wants to Read Your HTTPS Traffic

Intego Shlayer Feb 2018

Long, Joshua. (2018, February 21). OSX/Shlayer: New Mac malware comes out of its shell. Retrieved August 28, 2019.

Internal MISP references

UUID 46eb883c-e203-4cd9-8f1c-c6ea12bc2742 which can be used as unique global reference for Intego Shlayer Feb 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-08-28T00:00:00Z
date_published 2018-02-21T00:00:00Z
source MITRE
title OSX/Shlayer: New Mac malware comes out of its shell

Decoded Avast.io Follina June 3 2022

Threat Intelligence Team. (2022, June 3). Outbreak of Follina in Australia. Retrieved May 7, 2023.

Internal MISP references

UUID 2b43d421-3921-4efa-9bde-4b482811523f which can be used as unique global reference for Decoded Avast.io Follina June 3 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2022-06-03T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Outbreak of Follina in Australia

SensePost Outlook Forms

Stalmans, E. (2017, April 28). Outlook Forms and Shells. Retrieved February 4, 2019.

Internal MISP references

UUID 5d91a713-2f05-43bd-9fef-aa3f51f4c45a which can be used as unique global reference for SensePost Outlook Forms in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-04T00:00:00Z
date_published 2017-04-28T00:00:00Z
source MITRE
title Outlook Forms and Shells

SensePost Outlook Home Page

Stalmans, E. (2017, October 11). Outlook Home Page – Another Ruler Vector. Retrieved February 4, 2019.

Internal MISP references

UUID d2758a4b-d326-45a7-9ebf-03efcd1832da which can be used as unique global reference for SensePost Outlook Home Page in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-04T00:00:00Z
date_published 2017-10-11T00:00:00Z
source MITRE
title Outlook Home Page – Another Ruler Vector

Outlook Today Home Page

Soutcast. (2018, September 14). Outlook Today Homepage Persistence. Retrieved February 5, 2019.

Internal MISP references

UUID cb7beffb-a955-40fd-b114-de6533efc80d which can be used as unique global reference for Outlook Today Home Page in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-05T00:00:00Z
date_published 2018-09-14T00:00:00Z
source MITRE
title Outlook Today Homepage Persistence

Recorded Future Beacon 2019

Recorded Future. (2019, June 20). Out of the Blue: How Recorded Future Identified Rogue Cobalt Strike Servers. Retrieved September 16, 2024.

Internal MISP references

UUID 4e554042-53bb-44d4-9acc-44c86329ac47 which can be used as unique global reference for Recorded Future Beacon 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-16T00:00:00Z
date_published 2019-06-20T00:00:00Z
source MITRE
title Out of the Blue: How Recorded Future Identified Rogue Cobalt Strike Servers

FireEye APT33 Guardrail

Ackerman, G., et al. (2018, December 21). OVERRULED: Containing a Potentially Destructive Adversary. Retrieved January 17, 2019.

Internal MISP references

UUID 4b4c9e72-eee1-4fa4-8dcb-501ec49882b0 which can be used as unique global reference for FireEye APT33 Guardrail in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-01-17T00:00:00Z
date_published 2018-12-21T00:00:00Z
source MITRE
title OVERRULED: Containing a Potentially Destructive Adversary

Kubernetes Cloud Native Security

Kubernetes. (n.d.). Overview of Cloud Native Security. Retrieved March 8, 2023.

Internal MISP references

UUID 55ee5bcc-ba56-58ac-9afb-2349aa75fe39 which can be used as unique global reference for Kubernetes Cloud Native Security in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-08T00:00:00Z
source MITRE
title Overview of Cloud Native Security

Apple Dev Dynamic Libraries

Apple. (2012, July 23). Overview of Dynamic Libraries. Retrieved September 7, 2023.

Internal MISP references

UUID 39ffd162-4052-57ec-bd20-2fe6b8e6beab which can be used as unique global reference for Apple Dev Dynamic Libraries in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-07T00:00:00Z
date_published 2012-07-23T00:00:00Z
source MITRE
title Overview of Dynamic Libraries

Apple Doco Archive Dynamic Libraries

Apple Inc.. (2012, July 23). Overview of Dynamic Libraries. Retrieved March 24, 2021.

Internal MISP references

UUID e3b8cc52-2096-418c-b291-1bc76022961d which can be used as unique global reference for Apple Doco Archive Dynamic Libraries in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-24T00:00:00Z
date_published 2012-07-23T00:00:00Z
source MITRE
title Overview of Dynamic Libraries

GCP IAM Conditions

Google Cloud. (n.d.). Overview of IAM Conditions. Retrieved January 2, 2024.

Internal MISP references

UUID fc117963-580f-5f4a-a969-b2410e00a58f which can be used as unique global reference for GCP IAM Conditions in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-02T00:00:00Z
source MITRE
title Overview of IAM Conditions

Kubeflow Pipelines

The Kubeflow Authors. (n.d.). Overview of Kubeflow Pipelines. Retrieved March 29, 2021.

Internal MISP references

UUID 0b40474c-173c-4a8c-8cc7-bac2dcfcaedd which can be used as unique global reference for Kubeflow Pipelines in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-29T00:00:00Z
source MITRE
title Overview of Kubeflow Pipelines

TechNet RDP Gateway

Microsoft. (n.d.). Overview of Remote Desktop Gateway. Retrieved June 6, 2016.

Internal MISP references

UUID 3e832a4f-b8e6-4c28-bb33-f2db817403b9 which can be used as unique global reference for TechNet RDP Gateway in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-06T00:00:00Z
source MITRE
title Overview of Remote Desktop Gateway

CrowdStrike AQUATIC PANDA December 2021

Wiley, B. et al. (2021, December 29). OverWatch Exposes AQUATIC PANDA in Possession of Log4Shell Exploit Tools During Hands-on Intrusion Attempt. Retrieved January 18, 2022.

Internal MISP references

UUID fd095ef2-6fc2-4f6f-9e4f-037b2a9217d2 which can be used as unique global reference for CrowdStrike AQUATIC PANDA December 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-18T00:00:00Z
date_published 2021-12-29T00:00:00Z
source MITRE, Tidal Cyber
title OverWatch Exposes AQUATIC PANDA in Possession of Log4Shell Exploit Tools During Hands-on Intrusion Attempt

OWASP Top 10 2017

OWASP. (2017, April 16). OWASP Top 10 2017 - The Ten Most Critical Web Application Security Risks. Retrieved February 12, 2019.

Internal MISP references

UUID 044ef2b7-44cc-4da6-b8e2-45d630558534 which can be used as unique global reference for OWASP Top 10 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-12T00:00:00Z
date_published 2017-04-16T00:00:00Z
source MITRE
title OWASP Top 10 2017 - The Ten Most Critical Web Application Security Risks

OWASP Top 10

OWASP. (2018, February 23). OWASP Top Ten Project. Retrieved April 3, 2018.

Internal MISP references

UUID c6db3a77-4d01-4b4d-886d-746d676ed6d0 which can be used as unique global reference for OWASP Top 10 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-03T00:00:00Z
date_published 2018-02-23T00:00:00Z
source MITRE
title OWASP Top Ten Project

Debian Manual Maintainer Scripts

Debian Policy Manual v4.6.1.1. (2022, August 14). Package maintainer scripts and installation procedure. Retrieved September 27, 2022.

Internal MISP references

UUID e32e293a-f583-494e-9eb5-c82167f2e000 which can be used as unique global reference for Debian Manual Maintainer Scripts in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-27T00:00:00Z
date_published 2022-08-14T00:00:00Z
source MITRE
title Package maintainer scripts and installation procedure

GCP Packet Mirroring

Google Cloud. (n.d.). Packet Mirroring overview. Retrieved March 17, 2022.

Internal MISP references

UUID c91c6399-3520-4410-936d-48c3b13235ca which can be used as unique global reference for GCP Packet Mirroring in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-17T00:00:00Z
source MITRE
title Packet Mirroring overview

Citizenlab Packrat 2015

Scott-Railton, J., et al. (2015, December 8). Packrat. Retrieved December 18, 2020.

Internal MISP references

UUID 316f347f-3e92-4861-a075-db64adf6b6a8 which can be used as unique global reference for Citizenlab Packrat 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-18T00:00:00Z
date_published 2015-12-08T00:00:00Z
source MITRE
title Packrat

GitHub Pacu

Rhino Security Labs. (2019, August 22). Pacu. Retrieved October 17, 2019.

Internal MISP references

UUID bda43b1b-ea8d-4371-9984-6d8a7cc24965 which can be used as unique global reference for GitHub Pacu in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-17T00:00:00Z
date_published 2019-08-22T00:00:00Z
source MITRE
title Pacu

Pacu Detection Disruption Module

Rhino Security Labs. (2021, April 29). Pacu Detection Disruption Module. Retrieved August 4, 2023.

Internal MISP references

UUID deba605b-7abc-5794-a820-448a395aab69 which can be used as unique global reference for Pacu Detection Disruption Module in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-04T00:00:00Z
date_published 2021-04-29T00:00:00Z
source MITRE
title Pacu Detection Disruption Module

SecurityWeek Cyber Toufan January 3 2024

Ionut Arghire. (2024, January 3). Palestinian Hackers Hit 100 Israeli Organizations in Destructive Attacks. Retrieved August 8, 2024.

Internal MISP references

UUID 413b7917-e22a-4706-aff3-80eb31521b6a which can be used as unique global reference for SecurityWeek Cyber Toufan January 3 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-08T00:00:00Z
date_published 2024-01-03T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Palestinian Hackers Hit 100 Israeli Organizations in Destructive Attacks

Symantec Palmerworm Sep 2020

Threat Intelligence. (2020, September 29). Palmerworm: Espionage Gang Targets the Media, Finance, and Other Sectors. Retrieved March 25, 2022.

Internal MISP references

UUID 84ecd475-8d3f-4e7c-afa8-2dff6078bed5 which can be used as unique global reference for Symantec Palmerworm Sep 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-25T00:00:00Z
date_published 2020-09-29T00:00:00Z
source MITRE, Tidal Cyber
title Palmerworm: Espionage Gang Targets the Media, Finance, and Other Sectors

Apple PAM

Apple. (2011, May 11). PAM - Pluggable Authentication Modules. Retrieved June 25, 2020.

Internal MISP references

UUID 4838a58e-c00d-4b4c-937d-8da5d9f1a4b5 which can be used as unique global reference for Apple PAM in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-25T00:00:00Z
date_published 2011-05-11T00:00:00Z
source MITRE
title PAM - Pluggable Authentication Modules

Man Pam_Unix

die.net. (n.d.). pam_unix(8) - Linux man page. Retrieved June 25, 2020.

Internal MISP references

UUID 6bc5ad93-3cc2-4429-ac4c-aae72193df27 which can be used as unique global reference for Man Pam_Unix in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-25T00:00:00Z
source MITRE
title pam_unix(8) - Linux man page

Unit42 PlugX June 2017

Lancaster, T., Idrizovic, E. (2017, June 27). Paranoid PlugX. Retrieved April 19, 2019.

Internal MISP references

UUID 9dc629a0-543c-4221-86cc-0dfb93903988 which can be used as unique global reference for Unit42 PlugX June 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-19T00:00:00Z
date_published 2017-06-27T00:00:00Z
source MITRE
title Paranoid PlugX

Palo Alto PlugX June 2017

Lancaster, T. and Idrizovic, E.. (2017, June 27). Paranoid PlugX. Retrieved July 13, 2017.

Internal MISP references

UUID 27f17e79-ef38-4c20-9250-40c81fa8717a which can be used as unique global reference for Palo Alto PlugX June 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-13T00:00:00Z
date_published 2017-06-27T00:00:00Z
source MITRE
title Paranoid PlugX

Secuirtyinbits Ataware3 May 2019

Secuirtyinbits . (2019, May 14). Parent PID Spoofing (Stage 2) Ataware Ransomware Part 3. Retrieved June 6, 2019.

Internal MISP references

UUID 0828b2fd-c85f-44c7-bb05-61e6eba34336 which can be used as unique global reference for Secuirtyinbits Ataware3 May 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-06T00:00:00Z
date_published 2019-05-14T00:00:00Z
source MITRE
title Parent PID Spoofing (Stage 2) Ataware Ransomware Part 3

Dragos PARISITE

Dragos. (n.d.). PARISITE. Retrieved December 21, 2020.

Internal MISP references

UUID 15e974db-51a9-4ec1-9725-cff8bb9bc2fa which can be used as unique global reference for Dragos PARISITE in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-21T00:00:00Z
source MITRE
title PARISITE

DOJ Lazarus Sony 2018

Department of Justice. (2018, September 6). Criminal Complaint - United States of America v. PARK JIN HYOK. Retrieved March 29, 2019.

Internal MISP references

UUID 950f8c1e-8793-43b7-abc7-0c9f6790b3b7 which can be used as unique global reference for DOJ Lazarus Sony 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-29T00:00:00Z
source MITRE
title PARK JIN HYOK

intezer stripped binaries elf files 2018

Ignacio Sanmillan. (2018, February 7). Executable and Linkable Format 101. Part 2: Symbols. Retrieved September 29, 2022.

Internal MISP references

UUID 2d1faa93-fed5-4b0d-b6c9-72bbc4782201 which can be used as unique global reference for intezer stripped binaries elf files 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-29T00:00:00Z
source MITRE
title Part 2: Symbols

Gabilondo DYLD_INSERT_LIBRARIES Catalina Bypass

Jon Gabilondo. (2019, September 22). How to Inject Code into Mach-O Apps. Part II.. Retrieved March 24, 2021.

Internal MISP references

UUID 67f3ce33-0197-41ef-a9d0-474c97ecf570 which can be used as unique global reference for Gabilondo DYLD_INSERT_LIBRARIES Catalina Bypass in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-24T00:00:00Z
source MITRE
title Part II.

Office 365 Delegated Administration

Microsoft. (n.d.). Partners: Offer delegated administration. Retrieved May 27, 2022.

Internal MISP references

UUID fa0ed0fd-bf57-4a0f-9370-e22f27b20e42 which can be used as unique global reference for Office 365 Delegated Administration in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-27T00:00:00Z
source MITRE
title Partners: Offer delegated administration

Microsoft IFEOorMalware July 2015

Microsoft. (2015, July 30). Part of Windows 10 or really Malware?. Retrieved December 18, 2017.

Internal MISP references

UUID 183843b5-66dc-4229-ba66-3171d9b8e33d which can be used as unique global reference for Microsoft IFEOorMalware July 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-18T00:00:00Z
date_published 2015-07-30T00:00:00Z
source MITRE
title Part of Windows 10 or really Malware?

Circl Passive DNS

CIRCL Computer Incident Response Center. (n.d.). Passive DNS. Retrieved October 20, 2020.

Internal MISP references

UUID c19f8683-97fb-4e0c-a9f5-12033b1d38ca which can be used as unique global reference for Circl Passive DNS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
source MITRE
title Passive DNS

ObjectiveSee AppleJeus 2019

Patrick Wardle. (2019, October 12). Pass the AppleJeus. Retrieved September 28, 2022.

Internal MISP references

UUID 4cfec669-1db5-4a67-81e2-18383e4c4d3d which can be used as unique global reference for ObjectiveSee AppleJeus 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-28T00:00:00Z
date_published 2019-10-12T00:00:00Z
source MITRE
title Pass the AppleJeus

GentilKiwi Pass the Ticket

Deply, B. (2014, January 13). Pass the ticket. Retrieved September 12, 2024.

Internal MISP references

UUID 3ff12b9c-1c4e-4383-a771-792f5e95dcf1 which can be used as unique global reference for GentilKiwi Pass the Ticket in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2014-01-13T00:00:00Z
source MITRE
title Pass the ticket

Wikipedia Password cracking

Wikipedia. (n.d.). Password cracking. Retrieved December 23, 2015.

Internal MISP references

UUID d5ebb79f-b39a-46cb-b546-2db383783a58 which can be used as unique global reference for Wikipedia Password cracking in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-12-23T00:00:00Z
source MITRE
title Password cracking

RDP Hijacking Korznikov

Korznikov, A. (2017, March 17). Passwordless RDP Session Hijacking Feature All Windows versions. Retrieved December 11, 2017.

Internal MISP references

UUID 8877e1f3-11e6-4ae0-adbd-c9b98b07ee25 which can be used as unique global reference for RDP Hijacking Korznikov in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-11T00:00:00Z
date_published 2017-03-17T00:00:00Z
source MITRE
title Passwordless RDP Session Hijacking Feature All Windows versions

ise Password Manager February 2019

ise. (2019, February 19). Password Managers: Under the Hood of Secrets Management. Retrieved January 22, 2021.

Internal MISP references

UUID 253104ab-20b0-43d2-8338-afdd3237cc53 which can be used as unique global reference for ise Password Manager February 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-22T00:00:00Z
date_published 2019-02-19T00:00:00Z
source MITRE
title Password Managers: Under the Hood of Secrets Management

Microsoft Password Complexity

Hall, J., Lich, B. (2017, September 9). Password must meet complexity requirements. Retrieved April 5, 2018.

Internal MISP references

UUID 918d4b6c-5783-4332-96d9-430e4c5ae030 which can be used as unique global reference for Microsoft Password Complexity in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-05T00:00:00Z
date_published 2017-09-09T00:00:00Z
source MITRE
title Password must meet complexity requirements

BlackHillsInfosec Password Spraying

Thyer, J. (2015, October 30). Password Spraying & Other Fun with RPCCLIENT. Retrieved April 25, 2017.

Internal MISP references

UUID f45c7a4b-dafc-4e5c-ad3f-db4b0388a1d7 which can be used as unique global reference for BlackHillsInfosec Password Spraying in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-04-25T00:00:00Z
date_published 2015-10-30T00:00:00Z
source MITRE
title Password Spraying & Other Fun with RPCCLIENT

how_pwd_rev_enc_1

Teusink, N. (2009, August 25). Passwords stored using reversible encryption: how it works (part 1). Retrieved November 17, 2021.

Internal MISP references

UUID 180246ca-94d8-4c78-894d-ae3b6fad3257 which can be used as unique global reference for how_pwd_rev_enc_1 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-11-17T00:00:00Z
date_published 2009-08-25T00:00:00Z
source MITRE
title Passwords stored using reversible encryption: how it works (part 1)

how_pwd_rev_enc_2

Teusink, N. (2009, August 26). Passwords stored using reversible encryption: how it works (part 2). Retrieved November 17, 2021.

Internal MISP references

UUID cc08f190-5c17-441c-a6fa-99f8fdb8d1ae which can be used as unique global reference for how_pwd_rev_enc_2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-11-17T00:00:00Z
date_published 2009-08-26T00:00:00Z
source MITRE
title Passwords stored using reversible encryption: how it works (part 2)

Volexity Patchwork June 2018

Meltzer, M, et al. (2018, June 07). Patchwork APT Group Targets US Think Tanks. Retrieved July 16, 2018.

Internal MISP references

UUID d3ed7dd9-0941-4160-aa6a-c0244c63560f which can be used as unique global reference for Volexity Patchwork June 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-16T00:00:00Z
date_published 2018-06-07T00:00:00Z
source MITRE, Tidal Cyber
title Patchwork APT Group Targets US Think Tanks

PaloAlto Patchwork Mar 2018

Levene, B. et al.. (2018, March 7). Patchwork Continues to Deliver BADNEWS to the Indian Subcontinent. Retrieved March 31, 2018.

Internal MISP references

UUID 2609e461-1e23-4dc2-aa44-d09f4acb8c6e which can be used as unique global reference for PaloAlto Patchwork Mar 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-31T00:00:00Z
date_published 2018-03-07T00:00:00Z
source MITRE
title Patchwork Continues to Deliver BADNEWS to the Indian Subcontinent

Symantec Patchwork

Hamada, J.. (2016, July 25). Patchwork cyberespionage group expands targets from governments to wide range of industries. Retrieved August 17, 2016.

Internal MISP references

UUID a6172463-56e2-49f2-856d-f4f8320d7c6e which can be used as unique global reference for Symantec Patchwork in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-08-17T00:00:00Z
date_published 2016-07-25T00:00:00Z
source MITRE, Tidal Cyber
title Patchwork cyberespionage group expands targets from governments to wide range of industries

Trend Micro Pawn Storm OAuth 2017

Hacquebord, F.. (2017, April 25). Pawn Storm Abuses Open Authentication in Advanced Social Engineering Attacks. Retrieved October 4, 2019.

Internal MISP references

UUID 7d12c764-facd-4086-acd0-5c0287344520 which can be used as unique global reference for Trend Micro Pawn Storm OAuth 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-04T00:00:00Z
date_published 2017-04-25T00:00:00Z
source MITRE
title Pawn Storm Abuses Open Authentication in Advanced Social Engineering Attacks

TrendMicro Pawn Storm 2019

Hacquebord, F. (n.d.). Pawn Storm in 2019 A Year of Scanning and Credential Phishing on High-Profile Targets. Retrieved December 29, 2020.

Internal MISP references

UUID 104f3264-3e8a-46ca-b9b2-e16a59938570 which can be used as unique global reference for TrendMicro Pawn Storm 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-29T00:00:00Z
source MITRE
title Pawn Storm in 2019 A Year of Scanning and Credential Phishing on High-Profile Targets

TrendMicro Pawn Storm Dec 2020

Hacquebord, F., Remorin, L. (2020, December 17). Pawn Storm’s Lack of Sophistication as a Strategy. Retrieved January 13, 2021.

Internal MISP references

UUID 3bc249cd-f29a-4a74-a179-a6860e43683f which can be used as unique global reference for TrendMicro Pawn Storm Dec 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-13T00:00:00Z
date_published 2020-12-17T00:00:00Z
source MITRE
title Pawn Storm’s Lack of Sophistication as a Strategy

ClearSky Pay2Kitten December 2020

ClearSky. (2020, December 17). Pay2Key Ransomware – A New Campaign by Fox Kitten. Retrieved December 21, 2020.

Internal MISP references

UUID 6e09bc1a-8a5d-4512-9176-40eed91af358 which can be used as unique global reference for ClearSky Pay2Kitten December 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-21T00:00:00Z
date_published 2020-12-17T00:00:00Z
source MITRE
title Pay2Key Ransomware – A New Campaign by Fox Kitten

PaypalScam

Bob Sullivan. (2000, July 24). PayPal alert! Beware the 'PaypaI' scam. Retrieved March 2, 2017.

Internal MISP references

UUID bcea7897-6cb2-467d-ad3b-ffd20badf19f which can be used as unique global reference for PaypalScam in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-02T00:00:00Z
date_published 2000-07-24T00:00:00Z
source MITRE
title PayPal alert! Beware the 'PaypaI' scam

Pcalua.exe - LOLBAS Project

LOLBAS. (2018, May 25). Pcalua.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 958064d4-7f9f-46a9-b475-93d6587ed770 which can be used as unique global reference for Pcalua.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Pcalua.exe

pcodedmp Bontchev

Bontchev, V. (2019, July 30). pcodedmp.py - A VBA p-code disassembler. Retrieved September 17, 2020.

Internal MISP references

UUID 3057d857-6984-4247-918b-952b75ee152e which can be used as unique global reference for pcodedmp Bontchev in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-17T00:00:00Z
date_published 2019-07-30T00:00:00Z
source MITRE
title pcodedmp.py - A VBA p-code disassembler

GitHub PcShare 2014

LiveMirror. (2014, September 17). PcShare. Retrieved October 11, 2022.

Internal MISP references

UUID f113559f-a6da-43bc-bc64-9ff7155b82bc which can be used as unique global reference for GitHub PcShare 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-10-11T00:00:00Z
date_published 2014-09-17T00:00:00Z
source MITRE
title PcShare

Pcwrun.exe - LOLBAS Project

LOLBAS. (2018, May 25). Pcwrun.exe. Retrieved December 4, 2023.

Internal MISP references

UUID b5946ca4-1f1b-4cba-af2f-0b99d6fff8b0 which can be used as unique global reference for Pcwrun.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Pcwrun.exe

Pcwutl.dll - LOLBAS Project

LOLBAS. (2018, May 25). Pcwutl.dll. Retrieved December 4, 2023.

Internal MISP references

UUID 1050758d-20da-4c4a-83d3-40aeff3db9ca which can be used as unique global reference for Pcwutl.dll - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Pcwutl.dll

Microsoft Security Blog August 28 2024

Microsoft Threat Intelligence. (2024, August 28). Peach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations . Retrieved August 29, 2024.

Internal MISP references

UUID 940c0755-18df-4fcb-9691-9f2eb45e6441 which can be used as unique global reference for Microsoft Security Blog August 28 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-29T00:00:00Z
date_published 2024-08-28T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Peach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations

Microsoft Peach Sandstorm September 14 2023

Microsoft Threat Intelligence. (2023, September 14). Peach Sandstorm password spray campaigns enable intelligence collection at high-value targets. Retrieved January 31, 2024.

Internal MISP references

UUID 98a631f4-4b95-4159-b311-dee1216ec208 which can be used as unique global reference for Microsoft Peach Sandstorm September 14 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-31T00:00:00Z
date_published 2023-09-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Peach Sandstorm password spray campaigns enable intelligence collection at high-value targets

Microsoft Peach Sandstorm 2023

Microsoft Threat Intelligence. (2023, September 14). Peach Sandstorm password spray campaigns enable intelligence collection at high-value targets. Retrieved September 18, 2023.

Internal MISP references

UUID 84d026ed-b8f2-5bbb-865a-2d93aa4b2ef8 which can be used as unique global reference for Microsoft Peach Sandstorm 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-18T00:00:00Z
date_published 2023-09-14T00:00:00Z
source MITRE
title Peach Sandstorm password spray campaigns enable intelligence collection at high-value targets

Microsoft PEB 2021

Microsoft. (2021, October 6). PEB structure (winternl.h). Retrieved November 19, 2021.

Internal MISP references

UUID e0ec4cf6-1e6a-41ab-8704-a66c5cc4d226 which can be used as unique global reference for Microsoft PEB 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-11-19T00:00:00Z
date_published 2021-10-06T00:00:00Z
source MITRE
title PEB structure (winternl.h)

Peirates GitHub

InGuardians. (2022, January 5). Peirates GitHub. Retrieved February 8, 2022.

Internal MISP references

UUID a75cde8b-76e4-4dc3-b1d5-cf08479905e7 which can be used as unique global reference for Peirates GitHub in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-08T00:00:00Z
date_published 2022-01-05T00:00:00Z
source MITRE
title Peirates GitHub

Pentesting AD Forests

García, C. (2019, April 3). Pentesting Active Directory Forests. Retrieved October 20, 2020.

Internal MISP references

UUID 3ca2e78e-751e-460b-9f3c-f851d054bce4 which can be used as unique global reference for Pentesting AD Forests in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
date_published 2019-04-03T00:00:00Z
source MITRE
title Pentesting Active Directory Forests

FBI PRC Botnet September 18 2024

U.S. Federal Bureau of Investigation. (2024, September 18). People’s Republic of China-Linked Actors Compromise Routers and IoT Devices for Botnet Operations. Retrieved September 19, 2024.

Internal MISP references

UUID cfb6f191-6c43-423b-9289-02beb3d721d1 which can be used as unique global reference for FBI PRC Botnet September 18 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-19T00:00:00Z
date_published 2024-09-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title People’s Republic of China-Linked Actors Compromise Routers and IoT Devices for Botnet Operations

U.S. CISA BlackTech September 27 2023

Cybersecurity and Infrastructure Security Agency. (2023, September 27). People's Republic of China-Linked Cyber Actors Hide in Router Firmware. Retrieved September 29, 2023.

Internal MISP references

UUID 309bfb48-76d1-4ae9-9c6a-30b54658133c which can be used as unique global reference for U.S. CISA BlackTech September 27 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-29T00:00:00Z
date_published 2023-09-27T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title People's Republic of China-Linked Cyber Actors Hide in Router Firmware

U.S. CISA APT40 July 8 2024

Cybersecurity and Infrastructure Security Agency. (2024, July 8). People’s Republic of China (PRC) Ministry of State Security APT40 Tradecraft in Action. Retrieved July 10, 2024.

Internal MISP references

UUID 3bf90a48-caf6-4b9d-adc2-3d1176f49ffc which can be used as unique global reference for U.S. CISA APT40 July 8 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-10T00:00:00Z
date_published 2024-07-08T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title People’s Republic of China (PRC) Ministry of State Security APT40 Tradecraft in Action

Joint Cybersecurity Advisory Volt Typhoon June 2023

NSA et al. (2023, May 24). People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection. Retrieved July 27, 2023.

Internal MISP references

UUID 14872f08-e219-5c0d-a2d7-43a3ba348b4b which can be used as unique global reference for Joint Cybersecurity Advisory Volt Typhoon June 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-27T00:00:00Z
date_published 2023-05-24T00:00:00Z
source MITRE
title People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection

U.S. CISA Volt Typhoon May 24 2023

Cybersecurity and Infrastructure Security Agency. (2023, May 24). People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection. Retrieved May 25, 2023.

Internal MISP references

UUID 12320f38-ebbf-486a-a450-8a548c3722d6 which can be used as unique global reference for U.S. CISA Volt Typhoon May 24 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-25T00:00:00Z
date_published 2023-05-24T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection

TechNet Firewall Design

Microsoft. (2004, February 6). Perimeter Firewall Design. Retrieved April 25, 2016.

Internal MISP references

UUID bb149242-1916-400d-93b8-d0def161ed85 which can be used as unique global reference for TechNet Firewall Design in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-25T00:00:00Z
date_published 2004-02-06T00:00:00Z
source MITRE
title Perimeter Firewall Design

Oddvar Moe IFEO APR 2018

Moe, O. (2018, April 10). Persistence using GlobalFlags in Image File Execution Options - Hidden from Autoruns.exe. Retrieved June 27, 2018.

Internal MISP references

UUID 8661b51c-ddb7-484f-919d-22079c39d1e4 which can be used as unique global reference for Oddvar Moe IFEO APR 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-06-27T00:00:00Z
date_published 2018-04-10T00:00:00Z
source MITRE
title Persistence using GlobalFlags in Image File Execution Options - Hidden from Autoruns.exe

Oddvar Moe RunOnceEx Mar 2018

Moe, O. (2018, March 21). Persistence using RunOnceEx - Hidden from Autoruns.exe. Retrieved June 29, 2018.

Internal MISP references

UUID 36d52213-8d9f-4642-892b-40460d5631d7 which can be used as unique global reference for Oddvar Moe RunOnceEx Mar 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-06-29T00:00:00Z
date_published 2018-03-21T00:00:00Z
source MITRE
title Persistence using RunOnceEx - Hidden from Autoruns.exe

Xorrior Authorization Plugins

Chris Ross. (2018, October 17). Persistent Credential Theft with Authorization Plugins. Retrieved April 22, 2021.

Internal MISP references

UUID e397815d-34ea-4275-90d8-1b85e5b47369 which can be used as unique global reference for Xorrior Authorization Plugins in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-22T00:00:00Z
date_published 2018-10-17T00:00:00Z
source MITRE
title Persistent Credential Theft with Authorization Plugins

SpecterOps JXA 2020

Pitt, L. (2020, August 6). Persistent JXA. Retrieved April 14, 2021.

Internal MISP references

UUID d9b6bb05-6ab4-4f5e-9ef0-f3e0cc97ce29 which can be used as unique global reference for SpecterOps JXA 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-14T00:00:00Z
date_published 2020-08-06T00:00:00Z
source MITRE
title Persistent JXA

PersistentJXA_leopitt

Leo Pitt. (2020, August 6). Persistent JXA - A poor man's Powershell for macOS. Retrieved January 11, 2021.

Internal MISP references

UUID 2d66932e-1b73-4255-a9a8-ea8effb3a776 which can be used as unique global reference for PersistentJXA_leopitt in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-11T00:00:00Z
date_published 2020-08-06T00:00:00Z
source MITRE
title Persistent JXA - A poor man's Powershell for macOS

Pester.bat - LOLBAS Project

LOLBAS. (2018, May 25). Pester.bat. Retrieved December 4, 2023.

Internal MISP references

UUID 93f281f6-6fcc-474a-b222-b303ea417a18 which can be used as unique global reference for Pester.bat - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Pester.bat

TrendMicro PE_URSNIF.A2

Trend Micro. (2014, December 11). PE_URSNIF.A2. Retrieved June 5, 2019.

Internal MISP references

UUID 71f5b9da-b882-4376-ac93-b4ce952d0271 which can be used as unique global reference for TrendMicro PE_URSNIF.A2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-05T00:00:00Z
date_published 2014-12-11T00:00:00Z
source MITRE
title PE_URSNIF.A2

Volatility Phalanx2

Case, A. (2012, October 10). Phalanx 2 Revealed: Using Volatility to Analyze an Advanced Linux Rootkit. Retrieved April 9, 2018.

Internal MISP references

UUID 6149f9ed-9218-489b-b87c-8208de89be68 which can be used as unique global reference for Volatility Phalanx2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-09T00:00:00Z
date_published 2012-10-10T00:00:00Z
source MITRE
title Phalanx 2 Revealed: Using Volatility to Analyze an Advanced Linux Rootkit

Prevailion EvilNum May 2020

Adamitis, D. (2020, May 6). Phantom in the Command Shell. Retrieved December 22, 2021.

Internal MISP references

UUID 533b8ae2-2fc3-4cf4-bcaa-5d8bfcba91c0 which can be used as unique global reference for Prevailion EvilNum May 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-12-22T00:00:00Z
date_published 2020-05-06T00:00:00Z
source MITRE
title Phantom in the Command Shell

Netcraft SendGrid 2024

Graham Edgecombe. (2024, February 7). Phishception – SendGrid is abused to host phishing attacks impersonating itself. Retrieved October 15, 2024.

Internal MISP references

UUID 584506e4-4ce2-5cbc-97ea-a4e68863395d which can be used as unique global reference for Netcraft SendGrid 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-15T00:00:00Z
date_published 2024-02-07T00:00:00Z
source MITRE
title Phishception – SendGrid is abused to host phishing attacks impersonating itself

ryhanson phishery SEPT 2016

Hanson, R. (2016, September 24). phishery. Retrieved July 21, 2018.

Internal MISP references

UUID 7e643cf0-5df7-455d-add7-2342f36bdbcb which can be used as unique global reference for ryhanson phishery SEPT 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-21T00:00:00Z
date_published 2016-09-24T00:00:00Z
source MITRE
title phishery

GitHub Phishery

Ryan Hanson. (2016, September 24). phishery. Retrieved October 23, 2020.

Internal MISP references

UUID 6da51561-a813-4802-aa84-1b3de1bc2e14 which can be used as unique global reference for GitHub Phishery in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-23T00:00:00Z
date_published 2016-09-24T00:00:00Z
source MITRE
title phishery

ANSSI Nobelium Phishing December 2021

ANSSI. (2021, December 6). PHISHING CAMPAIGNS BY THE NOBELIUM INTRUSION SET. Retrieved April 13, 2022.

Internal MISP references

UUID 96ee2b87-9727-4914-affe-d9dc5d58c955 which can be used as unique global reference for ANSSI Nobelium Phishing December 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-13T00:00:00Z
date_published 2021-12-06T00:00:00Z
source MITRE
title PHISHING CAMPAIGNS BY THE NOBELIUM INTRUSION SET

QR-campaign-energy-firm

Jonathan Greig. (2023, August 16). Phishing campaign used QR codes to target large energy company. Retrieved November 27, 2023.

Internal MISP references

UUID f73f45c8-4285-572e-b861-a0ded463a91e which can be used as unique global reference for QR-campaign-energy-firm in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-11-27T00:00:00Z
date_published 2023-08-16T00:00:00Z
source MITRE
title Phishing campaign used QR codes to target large energy company

Enigma Phishing for Credentials Jan 2015

Nelson, M. (2015, January 21). Phishing for Credentials: If you want it, just ask!. Retrieved December 17, 2018.

Internal MISP references

UUID 7fff81f0-2b99-4f4f-8eca-c6a54c4d8205 which can be used as unique global reference for Enigma Phishing for Credentials Jan 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-12-17T00:00:00Z
date_published 2015-01-21T00:00:00Z
source MITRE
title Phishing for Credentials: If you want it, just ask!

KISA Operation Muzabi

KISA. (2021). Phishing Target Reconnaissance and Attack Resource Analysis Operation Muzabi. Retrieved March 8, 2024.

Internal MISP references

UUID 8742ac96-a316-4264-9d3d-265784483f1a which can be used as unique global reference for KISA Operation Muzabi in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-08T00:00:00Z
date_published 2021-01-01T00:00:00Z
source MITRE
title Phishing Target Reconnaissance and Attack Resource Analysis Operation Muzabi

Staaldraad Phishing with OAuth 2017

Stalmans, E.. (2017, August 2). Phishing with OAuth and o365/Azure. Retrieved October 4, 2019.

Internal MISP references

UUID ae139c14-05ec-4c75-861b-15d86b4913fc which can be used as unique global reference for Staaldraad Phishing with OAuth 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-04T00:00:00Z
date_published 2017-08-02T00:00:00Z
source MITRE
title Phishing with OAuth and o365/Azure

phobos_virustotal

Phobos Ransomware. (2020, December 30). Phobos Ransomware, Fast.exe. Retrieved September 20, 2021.

Internal MISP references

UUID 929dbb22-34a5-4377-95dd-9e240ecb343a which can be used as unique global reference for phobos_virustotal in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-20T00:00:00Z
date_published 2020-12-30T00:00:00Z
source MITRE
title Phobos Ransomware, Fast.exe

Deep Instinct PhonyC2 June 2023

Simon Kenin. (2023, June 29). PhonyC2: Revealing a New Malicious Command & Control Framework by MuddyWater. Retrieved October 10, 2023.

Internal MISP references

UUID fd42ac0b-eae5-41bb-b56c-cb1c6d19857b which can be used as unique global reference for Deep Instinct PhonyC2 June 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-10T00:00:00Z
date_published 2023-06-29T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title PhonyC2: Revealing a New Malicious Command & Control Framework by MuddyWater

Talos Remcos Aug 2018

Brumaghin, E., Unterbrink, H. (2018, August 22). Picking Apart Remcos Botnet-In-A-Box. Retrieved November 6, 2018.

Internal MISP references

UUID c5cb2eff-ed48-47ff-bfd6-79152bf51430 which can be used as unique global reference for Talos Remcos Aug 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-06T00:00:00Z
date_published 2018-08-22T00:00:00Z
source MITRE
title Picking Apart Remcos Botnet-In-A-Box

FireEye FIN6 Apr 2019

McKeague, B. et al. (2019, April 5). Pick-Six: Intercepting a FIN6 Intrusion, an Actor Recently Tied to Ryuk and LockerGoga Ransomware. Retrieved April 17, 2019.

Internal MISP references

UUID e8a2bc6a-04e3-484e-af67-5f57656c7206 which can be used as unique global reference for FireEye FIN6 Apr 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-17T00:00:00Z
date_published 2019-04-05T00:00:00Z
source MITRE
title Pick-Six: Intercepting a FIN6 Intrusion, an Actor Recently Tied to Ryuk and LockerGoga Ransomware

Picus Labs Proc cump 2022

Huseyin Can YUCEEL & Picus Labs. (2022, March 22). Retrieved March 31, 2023.

Internal MISP references

UUID e8a50a79-6ca4-5c91-87ad-0b1ba9eca505 which can be used as unique global reference for Picus Labs Proc cump 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-31T00:00:00Z
source MITRE
title Picus Labs Proc cump 2022

wired-pig butchering

Lily Hay Newman. (n.d.). ‘Pig Butchering’ Scams Are Now a $3 Billion Threat. Retrieved August 18, 2023.

Internal MISP references

UUID dc833e17-7105-5790-b30b-b4fed7fd2d2f which can be used as unique global reference for wired-pig butchering in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-18T00:00:00Z
source MITRE
title ‘Pig Butchering’ Scams Are Now a $3 Billion Threat

Logpoint Pikabot 2024

Swachchhanda Shrawan Poudel. (2024, February). Pikabot: 
 A Sophisticated and Modular Backdoor Trojan with Advanced Evasion Techniques. Retrieved July 12, 2024.

Internal MISP references

UUID 5136cc70-ba63-551c-aa7f-ab4c57980a1c which can be used as unique global reference for Logpoint Pikabot 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-12T00:00:00Z
date_published 2024-02-01T00:00:00Z
source MITRE
title Pikabot: 
 A Sophisticated and Modular Backdoor Trojan with Advanced Evasion Techniques

Malwarebytes Pikabot December 15 2023

Jérôme Segura. (2023, December 15). PikaBot distributed via malicious search ads. Retrieved January 11, 2023.

Internal MISP references

UUID 50b29ef4-7ade-4672-99b6-fdf367170a5b which can be used as unique global reference for Malwarebytes Pikabot December 15 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-01-11T00:00:00Z
date_published 2023-12-15T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title PikaBot distributed via malicious search ads

Elastic Pikabot 2024

Daniel Stepanic & Salim Bitam. (2024, February 23). PIKABOT, I choose you!. Retrieved July 12, 2024.

Internal MISP references

UUID 6c222f33-f588-513c-9149-4c2308e05319 which can be used as unique global reference for Elastic Pikabot 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-12T00:00:00Z
date_published 2024-02-23T00:00:00Z
source MITRE
title PIKABOT, I choose you!

Trustwave Pillowmint June 2020

Trustwave SpiderLabs. (2020, June 22). Pillowmint: FIN7’s Monkey Thief . Retrieved July 27, 2020.

Internal MISP references

UUID 31bf381d-a0fc-4a4f-8d39-832480891685 which can be used as unique global reference for Trustwave Pillowmint June 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-07-27T00:00:00Z
date_published 2020-06-22T00:00:00Z
source MITRE
title Pillowmint: FIN7’s Monkey Thief

TechNet Ping

Microsoft. (n.d.). Ping. Retrieved April 8, 2016.

Internal MISP references

UUID 5afc8ad5-f50d-464f-ba84-e347b3f3e994 which can be used as unique global reference for TechNet Ping in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-08T00:00:00Z
source MITRE
title Ping

Rehberger, J. (2018, December). Pivot to the Cloud using Pass the Cookie. Retrieved April 5, 2019.

Internal MISP references

UUID dc67930f-5c7b-41be-97e9-d8f4a55e6019 which can be used as unique global reference for Pass The Cookie in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-05T00:00:00Z
date_published 2018-12-01T00:00:00Z
source MITRE
title Pivot to the Cloud using Pass the Cookie

Pktmon.exe - LOLBAS Project

LOLBAS. (2020, August 12). Pktmon.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 8f0ad4ed-869b-4332-b091-7551262cff29 which can be used as unique global reference for Pktmon.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2020-08-12T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Pktmon.exe

Osanda Stealing NetNTLM Hashes

Osanda Malith Jayathissa. (2017, March 24). Places of Interest in Stealing NetNTLM Hashes. Retrieved January 26, 2018.

Internal MISP references

UUID 991f885e-b3f4-4f3f-b0f9-c9862f918f36 which can be used as unique global reference for Osanda Stealing NetNTLM Hashes in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-26T00:00:00Z
date_published 2017-03-24T00:00:00Z
source MITRE
title Places of Interest in Stealing NetNTLM Hashes

Microsoft PLATINUM June 2017

Kaplan, D, et al. (2017, June 7). PLATINUM continues to evolve, find ways to maintain invisibility. Retrieved February 19, 2018.

Internal MISP references

UUID e71c669e-50bc-4e91-8cee-7cbedab420d1 which can be used as unique global reference for Microsoft PLATINUM June 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-19T00:00:00Z
date_published 2017-06-07T00:00:00Z
source MITRE
title PLATINUM continues to evolve, find ways to maintain invisibility

Microsoft PLATINUM April 2016

Windows Defender Advanced Threat Hunting Team. (2016, April 29). PLATINUM: Targeted attacks in South and Southeast Asia. Retrieved February 15, 2018.

Internal MISP references

UUID d0ec5037-aa7f-48ee-8d37-ff8fb2c8c297 which can be used as unique global reference for Microsoft PLATINUM April 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-15T00:00:00Z
date_published 2016-04-29T00:00:00Z
source MITRE, Tidal Cyber
title PLATINUM: Targeted attacks in South and Southeast Asia

Forcepoint Felismus Mar 2017

Somerville, L. and Toro, A. (2017, March 30). Playing Cat & Mouse: Introducing the Felismus Malware. Retrieved November 16, 2017.

Internal MISP references

UUID 23b94586-3856-4937-9b02-4fe184b7ba01 which can be used as unique global reference for Forcepoint Felismus Mar 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-16T00:00:00Z
date_published 2017-03-30T00:00:00Z
source MITRE
title Playing Cat & Mouse: Introducing the Felismus Malware

Symantec Play Ransomware April 19 2023

Symantec Threat Hunter Team. (2023, April 19). Play Ransomware Group Using New Custom Data-Gathering Tools. Retrieved August 10, 2023.

Internal MISP references

UUID a78613a5-ce17-4d11-8f2f-3e642cd7673c which can be used as unique global reference for Symantec Play Ransomware April 19 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-10T00:00:00Z
date_published 2023-04-19T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Play Ransomware Group Using New Custom Data-Gathering Tools

Trend Micro Play Ransomware September 06 2022

Don Ovid Ladores, Lucas Silva, Scott Burden, Janus Agcaoili, Ivan Nicole Chavez, Ian Kenefick, Ieriz Nicolle Gonzalez, Paul Pajares. (2022, September 6). Play Ransomware's Attack Playbook Similar to that of Hive, Nokoyawa. Retrieved September 21, 2023.

Internal MISP references

UUID ed02529c-920d-4a92-8e86-be1ed7083991 which can be used as unique global reference for Trend Micro Play Ransomware September 06 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-21T00:00:00Z
date_published 2022-09-06T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Play Ransomware's Attack Playbook Similar to that of Hive, Nokoyawa

Trend Micro Play Playbook September 06 2022

Don Ovid Ladores, Lucas Silva, Scott Burden, Janus Agcaoili, Ivan Nicole Chavez, Ian Kenefick, Ieriz Nicolle Gonzalez, Paul Pajares. (2022, September 6). Play Ransomware's Attack Playbook Similar to that of Hive, Nokoyawa. Retrieved August 10, 2023.

Internal MISP references

UUID 2d2b527d-25b0-4b58-9ae6-c87060b64069 which can be used as unique global reference for Trend Micro Play Playbook September 06 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-10T00:00:00Z
date_published 2022-09-06T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Play Ransomware's Attack Playbook Similar to that of Hive, Nokoyawa

JPCert PLEAD Downloader June 2018

Tomonaga, S. (2018, June 8). PLEAD Downloader Used by BlackTech. Retrieved May 6, 2020.

Internal MISP references

UUID 871f4af2-ed99-4256-a74d-b8c0816a82ab which can be used as unique global reference for JPCert PLEAD Downloader June 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-06T00:00:00Z
date_published 2018-06-08T00:00:00Z
source MITRE
title PLEAD Downloader Used by BlackTech

Trend Micro PLEAD RTLO

Alintanahin, K.. (2014, May 23). PLEAD Targeted Attacks Against Taiwanese Government Agencies. Retrieved April 22, 2019.

Internal MISP references

UUID 9a052eba-1708-44c9-a20f-8b4ef208fa14 which can be used as unique global reference for Trend Micro PLEAD RTLO in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-22T00:00:00Z
date_published 2014-05-23T00:00:00Z
source MITRE
title PLEAD Targeted Attacks Against Taiwanese Government Agencies

fileinfo plist file description

FileInfo.com team. (2019, November 26). .PLIST File Extension. Retrieved October 12, 2021.

Internal MISP references

UUID 24331b9d-68af-4db2-887f-3a984b6c5783 which can be used as unique global reference for fileinfo plist file description in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-12T00:00:00Z
date_published 2019-11-26T00:00:00Z
source MITRE
title .PLIST File Extension

Pnputil.exe - LOLBAS Project

LOLBAS. (2020, December 25). Pnputil.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 21d0419a-5454-4808-b7e6-2b1b9de08ed6 which can be used as unique global reference for Pnputil.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2020-12-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Pnputil.exe

uptycs Fake POC linux malware 2023

Nischay Hegde and Siddartha Malladi. (2023, July 12). PoC Exploit: Fake Proof of Concept with Backdoor Malware. Retrieved September 28, 2023.

Internal MISP references

UUID edc18649-2fcf-5fb3-a717-db4bb28ca25f which can be used as unique global reference for uptycs Fake POC linux malware 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-28T00:00:00Z
date_published 2023-07-12T00:00:00Z
source MITRE
title PoC Exploit: Fake Proof of Concept with Backdoor Malware

GitHub SIP POC Sept 2017

Graeber, M. (2017, September 14). PoCSubjectInterfacePackage. Retrieved January 31, 2018.

Internal MISP references

UUID 1a9bc729-532b-47ab-89ba-90b0ff41f8aa which can be used as unique global reference for GitHub SIP POC Sept 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-31T00:00:00Z
date_published 2017-09-14T00:00:00Z
source MITRE
title PoCSubjectInterfacePackage

Kube Pod

kubenetes. (n.d.). Pod v1 core. Retrieved October 13, 2021.

Internal MISP references

UUID 8a7a4a51-e16d-447e-8f1e-c02d6dae3e26 which can be used as unique global reference for Kube Pod in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-13T00:00:00Z
source MITRE
title Pod v1 core

PoetRat Lua

Mercer, Warren. (2020, October 6). PoetRAT: Malware targeting public and private sector in Azerbaijan evolves. Retrieved August 5, 2024.

Internal MISP references

UUID 83503473-54c5-555e-954c-12c4f4bbdde6 which can be used as unique global reference for PoetRat Lua in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-05T00:00:00Z
date_published 2020-10-06T00:00:00Z
source MITRE
title PoetRAT: Malware targeting public and private sector in Azerbaijan evolves

Talos PoetRAT October 2020

Mercer, W. Rascagneres, P. Ventura, V. (2020, October 6). PoetRAT: Malware targeting public and private sector in Azerbaijan evolves . Retrieved April 9, 2021.

Internal MISP references

UUID 5862c90a-3bae-48d0-8749-9a6510fe3630 which can be used as unique global reference for Talos PoetRAT October 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-09T00:00:00Z
date_published 2020-10-06T00:00:00Z
source MITRE
title PoetRAT: Malware targeting public and private sector in Azerbaijan evolves

Talos PoetRAT April 2020

Mercer, W, et al. (2020, April 16). PoetRAT: Python RAT uses COVID-19 lures to target Azerbaijan public and private sectors. Retrieved April 27, 2020.

Internal MISP references

UUID fe2a79a5-bc50-4147-b919-f3d0eb7430b6 which can be used as unique global reference for Talos PoetRAT April 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-04-27T00:00:00Z
date_published 2020-04-16T00:00:00Z
source MITRE
title PoetRAT: Python RAT uses COVID-19 lures to target Azerbaijan public and private sectors

Talos Zeus Panda Nov 2017

Brumaghin, E., et al. (2017, November 02). Poisoning the Well: Banking Trojan Targets Google Search Results. Retrieved November 5, 2018.

Internal MISP references

UUID f96711d4-010d-4d7e-8074-31dd1b41c54d which can be used as unique global reference for Talos Zeus Panda Nov 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-05T00:00:00Z
date_published 2017-11-02T00:00:00Z
source MITRE
title Poisoning the Well: Banking Trojan Targets Google Search Results

FireEye Poison Ivy

FireEye. (2014). POISON IVY: Assessing Damage and Extracting Intelligence. Retrieved September 19, 2024.

Internal MISP references

UUID c189447e-a903-4dc2-a38b-1f4accc64e20 which can be used as unique global reference for FireEye Poison Ivy in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-19T00:00:00Z
date_published 2014-01-01T00:00:00Z
source MITRE
title POISON IVY: Assessing Damage and Extracting Intelligence

Umbreon Trend Micro

Fernando Mercês. (2016, September 5). Pokémon-themed Umbreon Linux Rootkit Hits x86, ARM Systems. Retrieved March 5, 2018.

Internal MISP references

UUID 38d9c5a2-8fa5-4cb7-a1a9-86b3f54c1eb7 which can be used as unique global reference for Umbreon Trend Micro in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-05T00:00:00Z
date_published 2016-09-05T00:00:00Z
source MITRE
title Pokémon-themed Umbreon Linux Rootkit Hits x86, ARM Systems

AWS IAM Policies and Permissions

AWS. (n.d.). Policies and permissions in IAM. Retrieved April 1, 2022.

Internal MISP references

UUID 9bb520fa-0c4f-48aa-8b0a-8f1d42ee1d0c which can be used as unique global reference for AWS IAM Policies and Permissions in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-01T00:00:00Z
source MITRE
title Policies and permissions in IAM

EnableMPRNotifications

Microsoft. (2023, January 26). Policy CSP - WindowsLogon. Retrieved March 30, 2023.

Internal MISP references

UUID 36a7ed58-95ef-594f-a15b-5c3b5911a630 which can be used as unique global reference for EnableMPRNotifications in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-30T00:00:00Z
date_published 2023-01-26T00:00:00Z
source MITRE
title Policy CSP - WindowsLogon

Microsoft DirSync

Microsoft. (n.d.). Polling for Changes Using the DirSync Control. Retrieved March 30, 2018.

Internal MISP references

UUID 6b7ad651-8c48-462d-90db-07ed3d570118 which can be used as unique global reference for Microsoft DirSync in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-30T00:00:00Z
source MITRE
title Polling for Changes Using the DirSync Control

Polyglot Files: a Hacker’s best friend

Li, V. (2019, October 2). Polyglot Files: a Hacker’s best friend. Retrieved September 27, 2022.

Internal MISP references

UUID ea9c1fc9-41d7-5629-b714-62f9ecf70e3b which can be used as unique global reference for Polyglot Files: a Hacker’s best friend in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-27T00:00:00Z
date_published 2019-10-02T00:00:00Z
source MITRE
title Polyglot Files: a Hacker’s best friend

CheckPoint Redaman October 2019

Eisenkraft, K., Olshtein, A. (2019, October 17). Pony’s C&C servers hidden inside the Bitcoin blockchain. Retrieved June 15, 2020.

Internal MISP references

UUID ce64739e-1311-4e1b-8352-ff941786ff39 which can be used as unique global reference for CheckPoint Redaman October 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-15T00:00:00Z
date_published 2019-10-17T00:00:00Z
source MITRE
title Pony’s C&C servers hidden inside the Bitcoin blockchain

Kaspersky Poseidon Group

Kaspersky Lab's Global Research and Analysis Team. (2016, February 9). Poseidon Group: a Targeted Attack Boutique specializing in global cyber-espionage. Retrieved March 16, 2016.

Internal MISP references

UUID e53bc63e-986f-4d48-a6b7-ed8e93494ed5 which can be used as unique global reference for Kaspersky Poseidon Group in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-03-16T00:00:00Z
date_published 2016-02-09T00:00:00Z
source MITRE, Tidal Cyber
title Poseidon Group: a Targeted Attack Boutique specializing in global cyber-espionage

Breach Post-mortem SSH Hijack

Hodgson, M. (2019, May 8). Post-mortem and remediations for Apr 11 security incident. Retrieved February 17, 2020.

Internal MISP references

UUID f1d15b92-8840-45ae-b23d-0cba20fc22cc which can be used as unique global reference for Breach Post-mortem SSH Hijack in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-17T00:00:00Z
date_published 2019-05-08T00:00:00Z
source MITRE
title Post-mortem and remediations for Apr 11 security incident

Elastic Docs Potential Protocol Tunneling via EarthWorm

Elastic. (n.d.). Potential Protocol Tunneling via EarthWorm. Retrieved July 7, 2023.

Internal MISP references

UUID a02790a1-f7c5-43b6-bc7e-075b2c0aa791 which can be used as unique global reference for Elastic Docs Potential Protocol Tunneling via EarthWorm in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-07T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Potential Protocol Tunneling via EarthWorm

sus mofcomp

detection.fyi. (2023, October 28). Potential Suspicious Mofcomp Execution. Retrieved February 9, 2024.

Internal MISP references

UUID c0cdb878-ef43-570a-8d5b-d643ec01f435 which can be used as unique global reference for sus mofcomp in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-09T00:00:00Z
date_published 2023-10-28T00:00:00Z
source MITRE
title Potential Suspicious Mofcomp Execution

This is Security Command Line Confusion

B. Ancel. (2014, August 20). Poweliks – Command Line Confusion. Retrieved March 5, 2018.

Internal MISP references

UUID 49a21bba-b77d-4b0e-b666-20ef2826e92c which can be used as unique global reference for This is Security Command Line Confusion in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-05T00:00:00Z
date_published 2014-08-20T00:00:00Z
source MITRE
title Poweliks – Command Line Confusion

TrendMicro POWELIKS AUG 2014

Santos, R. (2014, August 1). POWELIKS: Malware Hides In Windows Registry. Retrieved August 9, 2018.

Internal MISP references

UUID 4a42df15-4d09-4f4f-8333-2b41356fdb80 which can be used as unique global reference for TrendMicro POWELIKS AUG 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-09T00:00:00Z
date_published 2014-08-01T00:00:00Z
source MITRE
title POWELIKS: Malware Hides In Windows Registry

Microsoft: Powercfg command-line options

Microsoft. (2021, December 15). Powercfg command-line options. Retrieved June 5, 2023.

Internal MISP references

UUID d9b5be77-5e44-5786-a683-82642b8dd8c9 which can be used as unique global reference for Microsoft: Powercfg command-line options in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-05T00:00:00Z
date_published 2021-12-15T00:00:00Z
source MITRE
title Powercfg command-line options

Volexity PowerDuke November 2016

Adair, S.. (2016, November 9). PowerDuke: Widespread Post-Election Spear Phishing Campaigns Targeting Think Tanks and NGOs. Retrieved January 11, 2017.

Internal MISP references

UUID 4026c055-6020-41bb-a4c8-54b308867023 which can be used as unique global reference for Volexity PowerDuke November 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-01-11T00:00:00Z
date_published 2016-11-09T00:00:00Z
source MITRE
title PowerDuke: Widespread Post-Election Spear Phishing Campaigns Targeting Think Tanks and NGOs

Cybereason PowerLess February 2022

Cybereason Nocturnus. (2022, February 1). PowerLess Trojan: Iranian APT Phosphorus Adds New PowerShell Backdoor for Espionage. Retrieved June 1, 2022.

Internal MISP references

UUID 095aaa25-b674-4313-bc4f-3227b00c0459 which can be used as unique global reference for Cybereason PowerLess February 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-01T00:00:00Z
date_published 2022-02-01T00:00:00Z
source MITRE
title PowerLess Trojan: Iranian APT Phosphorus Adds New PowerShell Backdoor for Espionage

MalwareTech Power Loader Aug 2013

MalwareTech. (2013, August 13). PowerLoader Injection – Something truly amazing. Retrieved December 16, 2017.

Internal MISP references

UUID 9a9a6ca1-d7c5-4385-924b-cdeffd66602e which can be used as unique global reference for MalwareTech Power Loader Aug 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-16T00:00:00Z
date_published 2013-08-13T00:00:00Z
source MITRE
title PowerLoader Injection – Something truly amazing

Powerpnt.exe - LOLBAS Project

LOLBAS. (2019, July 19). Powerpnt.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 23c48ab3-9426-4949-9a35-d1b9ecb4bb47 which can be used as unique global reference for Powerpnt.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2019-07-19T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Powerpnt.exe

Sophos PowerShell Command History Forensics

Vikas, S. (2020, August 26). PowerShell Command History Forensics. Retrieved September 4, 2020.

Internal MISP references

UUID 9cff28da-c379-49e7-b971-7dccc72054fc which can be used as unique global reference for Sophos PowerShell Command History Forensics in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-04T00:00:00Z
date_published 2020-08-26T00:00:00Z
source MITRE
title PowerShell Command History Forensics

Microsoft PowerShell CLM

PowerShell Team. (2017, November 2). PowerShell Constrained Language Mode. Retrieved March 27, 2023.

Internal MISP references

UUID d6eaa28f-f900-528a-bba0-560a37c90a98 which can be used as unique global reference for Microsoft PowerShell CLM in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-27T00:00:00Z
date_published 2017-11-02T00:00:00Z
source MITRE
title PowerShell Constrained Language Mode

SensePost PS DDE May 2016

El-Sherei, S. (2016, May 20). PowerShell, C-Sharp and DDE The Power Within. Retrieved November 22, 2017.

Internal MISP references

UUID 28b3c105-8d64-4767-a735-d353d1fee756 which can be used as unique global reference for SensePost PS DDE May 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-22T00:00:00Z
date_published 2016-05-20T00:00:00Z
source MITRE
title PowerShell, C-Sharp and DDE The Power Within

Powersploit

PowerSploit. (n.d.). Retrieved December 4, 2014.

Internal MISP references

UUID 8e870f75-ed76-4898-bfbb-ad3c0c1ae0ca which can be used as unique global reference for Powersploit in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-12-04T00:00:00Z
source MITRE
title Powersploit

PowerShellMagazine PowerSploit July 2014

Graeber, M. (2014, July 8). PowerSploit. Retrieved February 6, 2018.

Internal MISP references

UUID 7765d4f7-bf2d-43b9-a87e-74114a092645 which can be used as unique global reference for PowerShellMagazine PowerSploit July 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-06T00:00:00Z
date_published 2014-07-08T00:00:00Z
source MITRE
title PowerSploit

PowerSploit Documentation

PowerSploit. (n.d.). PowerSploit. Retrieved February 6, 2018.

Internal MISP references

UUID 56628e55-94cd-4c5e-8f5a-34ffb7a45174 which can be used as unique global reference for PowerSploit Documentation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-06T00:00:00Z
source MITRE
title PowerSploit

GitHub PowerSploit May 2012

PowerShellMafia. (2012, May 26). PowerSploit - A PowerShell Post-Exploitation Framework. Retrieved February 6, 2018.

Internal MISP references

UUID ec3edb54-9f1b-401d-a265-cd8924e5cb2b which can be used as unique global reference for GitHub PowerSploit May 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-06T00:00:00Z
date_published 2012-05-26T00:00:00Z
source MITRE
title PowerSploit - A PowerShell Post-Exploitation Framework

byt3bl33d3r NTLM Relaying

Salvati, M. (2017, June 2). Practical guide to NTLM Relaying in 2017 (A.K.A getting a foothold in under 5 minutes). Retrieved February 7, 2019.

Internal MISP references

UUID 34deeec2-6edc-492c-bb35-5ccb1dc8e4df which can be used as unique global reference for byt3bl33d3r NTLM Relaying in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-07T00:00:00Z
date_published 2017-06-02T00:00:00Z
source MITRE
title Practical guide to NTLM Relaying in 2017 (A.K.A getting a foothold in under 5 minutes)

U.S. CISA Volt Typhoon February 7 2024

Cybersecurity and Infrastructure Security Agency. (2024, February 7). PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure. Retrieved February 9, 2024.

Internal MISP references

UUID c74f5ecf-8810-4670-b778-24171c078724 which can be used as unique global reference for U.S. CISA Volt Typhoon February 7 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-09T00:00:00Z
date_published 2024-02-07T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure

Zimbra Preauth

Zimbra. (2023, March 16). Preauth. Retrieved May 31, 2023.

Internal MISP references

UUID f8931e8d-9a03-5407-857a-2a1c5a895eed which can be used as unique global reference for Zimbra Preauth in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-31T00:00:00Z
date_published 2023-03-16T00:00:00Z
source MITRE
title Preauth

Microsoft Preauthentication Jul 2012

Microsoft. (2012, July 18). Preauthentication. Retrieved August 24, 2020.

Internal MISP references

UUID edaf08ec-0a56-480a-93ef-eb8038147e5c which can be used as unique global reference for Microsoft Preauthentication Jul 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-24T00:00:00Z
date_published 2012-07-18T00:00:00Z
source MITRE
title Preauthentication

Elastic Predicting DGA

Ahuja, A., Anderson, H., Grant, D., Woodbridge, J.. (2016, November 2). Predicting Domain Generation Algorithms with Long Short-Term Memory Networks. Retrieved April 26, 2019.

Internal MISP references

UUID 4462e71d-0373-4fc0-8cde-93a2972bedd5 which can be used as unique global reference for Elastic Predicting DGA in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-26T00:00:00Z
date_published 2016-11-02T00:00:00Z
source MITRE
title Predicting Domain Generation Algorithms with Long Short-Term Memory Networks

WithSecure SystemBC May 10 2021

Callum Roxan, Sami Ruohonen. (2021, May 10). Prelude to Ransomware: SystemBC. Retrieved September 21, 2023.

Internal MISP references

UUID 4004e072-9e69-4e81-a2b7-840e106cf3d9 which can be used as unique global reference for WithSecure SystemBC May 10 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-21T00:00:00Z
date_published 2021-05-10T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Prelude to Ransomware: SystemBC

URI

Michael Cobb. (2007, October 11). Preparing for uniform resource identifier (URI) exploits. Retrieved February 9, 2024.

Internal MISP references

UUID 8bb388d4-b7d1-5778-b599-2ed42206b88b which can be used as unique global reference for URI in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-09T00:00:00Z
date_published 2007-10-11T00:00:00Z
source MITRE
title Preparing for uniform resource identifier (URI) exploits

Presentationhost.exe - LOLBAS Project

LOLBAS. (2018, May 25). Presentationhost.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 37539e72-18f5-435a-a949-f9fa5991149a which can be used as unique global reference for Presentationhost.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Presentationhost.exe

Microsoft Sub Takeover 2020

Microsoft. (2020, September 29). Prevent dangling DNS entries and avoid subdomain takeover. Retrieved October 12, 2020.

Internal MISP references

UUID b8005a55-7e77-4dc1-abed-f75a0a3d8afb which can be used as unique global reference for Microsoft Sub Takeover 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-12T00:00:00Z
date_published 2020-09-29T00:00:00Z
source MITRE
title Prevent dangling DNS entries and avoid subdomain takeover

Microsoft Preventing SMB

Microsoft. (2020, March 10). Preventing SMB traffic from lateral connections and entering or leaving the network. Retrieved June 1, 2020.

Internal MISP references

UUID cd2fd958-63ce-4ac9-85e6-bb32f29d88b0 which can be used as unique global reference for Microsoft Preventing SMB in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-01T00:00:00Z
date_published 2020-03-10T00:00:00Z
source MITRE
title Preventing SMB traffic from lateral connections and entering or leaving the network

Palo Alto Prince of Persia

Bar, T., Conant, S., Efraim, L. (2016, June 28). Prince of Persia – Game Over. Retrieved July 5, 2017.

Internal MISP references

UUID e08bfc40-a580-4fa3-9531-d5e1bede374e which can be used as unique global reference for Palo Alto Prince of Persia in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-05T00:00:00Z
date_published 2016-06-28T00:00:00Z
source MITRE
title Prince of Persia – Game Over

PrintBrm.exe - LOLBAS Project

LOLBAS. (2021, June 21). PrintBrm.exe. Retrieved December 4, 2023.

Internal MISP references

UUID a7ab6f09-c22f-4627-afb1-c13a963efca5 which can be used as unique global reference for PrintBrm.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-06-21T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title PrintBrm.exe

Print.exe - LOLBAS Project

LOLBAS. (2018, May 25). Print.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 696ce89a-b3a1-4993-b30d-33a669a57031 which can be used as unique global reference for Print.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Print.exe

PrivateLoader: The first step in many malware schemes | Intel471

Intel471. (2022, February 8). PrivateLoader: The first step in many malware schemes. Retrieved May 15, 2023.

Internal MISP references

UUID c84be284-03ad-4674-94db-03f264f2db9f which can be used as unique global reference for PrivateLoader: The first step in many malware schemes | Intel471 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-15T00:00:00Z
date_published 2022-02-08T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title PrivateLoader: The first step in many malware schemes

Rhingo Security Labs GCP Privilege Escalation

Spencer Gietzen. (n.d.). Privilege Escalation in Google Cloud Platform – Part 1 (IAM). Retrieved May 27, 2022.

Internal MISP references

UUID 55373476-1cbe-49f5-aecb-69d60b336d38 which can be used as unique global reference for Rhingo Security Labs GCP Privilege Escalation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-27T00:00:00Z
source MITRE
title Privilege Escalation in Google Cloud Platform – Part 1 (IAM)

Rhino Google Cloud Privilege Escalation

Spencer Gietzen. (n.d.). Privilege Escalation in Google Cloud Platform – Part 1 (IAM). Retrieved September 21, 2023.

Internal MISP references

UUID 55173e12-9edc-5685-ac0b-acd51617cc6e which can be used as unique global reference for Rhino Google Cloud Privilege Escalation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-21T00:00:00Z
source MITRE
title Privilege Escalation in Google Cloud Platform – Part 1 (IAM)

FireEye APT19

Ahl, I. (2017, June 06). Privileges and Credentials: Phished at the Request of Counsel. Retrieved May 17, 2018.

Internal MISP references

UUID d75508b1-8b85-47c9-a087-bc64e8e4cb33 which can be used as unique global reference for FireEye APT19 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-05-17T00:00:00Z
date_published 2017-06-06T00:00:00Z
source MITRE
title Privileges and Credentials: Phished at the Request of Counsel

Anomali Static Kitten February 2021

Mele, G. et al. (2021, February 10). Probable Iranian Cyber Actors, Static Kitten, Conducting Cyberespionage Campaign Targeting UAE and Kuwait Government Agencies. Retrieved March 17, 2021.

Internal MISP references

UUID 710ed789-de1f-4601-a8ba-32147827adcb which can be used as unique global reference for Anomali Static Kitten February 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-17T00:00:00Z
date_published 2021-02-10T00:00:00Z
source MITRE
title Probable Iranian Cyber Actors, Static Kitten, Conducting Cyberespionage Campaign Targeting UAE and Kuwait Government Agencies

sus mofcomp dos

The DFIR Report. (2023, January 8). proc_creation_win_mofcomp_execution.yml. Retrieved February 9, 2024.

Internal MISP references

UUID f7c4e24f-b91e-574f-8b16-fb93295ef9d8 which can be used as unique global reference for sus mofcomp dos in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-09T00:00:00Z
date_published 2023-01-08T00:00:00Z
source MITRE
title proc_creation_win_mofcomp_execution.yml

Procdump.exe - LOLBAS Project

LOLBAS. (2020, October 14). Procdump.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 3e37fe71-71d0-424e-96ff-81070e2571ae which can be used as unique global reference for Procdump.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2020-10-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Procdump.exe

Microsoft Process Creation Flags May 2018

Schofield, M. & Satran, M. (2018, May 30). Process Creation Flags. Retrieved June 4, 2019.

Internal MISP references

UUID d4edd219-c91a-4ff1-8f22-10daa1057f29 which can be used as unique global reference for Microsoft Process Creation Flags May 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-04T00:00:00Z
date_published 2018-05-30T00:00:00Z
source MITRE
title Process Creation Flags

hasherezade Process Doppelgänging Dec 2017

hasherezade. (2017, December 18). Process Doppelgänging – a new way to impersonate a process. Retrieved December 20, 2017.

Internal MISP references

UUID b7a86159-7005-4b61-8b4e-a3dcd77c6a7d which can be used as unique global reference for hasherezade Process Doppelgänging Dec 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-20T00:00:00Z
date_published 2017-12-18T00:00:00Z
source MITRE
title Process Doppelgänging – a new way to impersonate a process

Microsoft Processes and Threads

Microsoft. (2018, May 31). Processes and Threads. Retrieved September 28, 2021.

Internal MISP references

UUID 250c689d-9a9c-4f02-8b99-ca43fbdaddae which can be used as unique global reference for Microsoft Processes and Threads in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-28T00:00:00Z
date_published 2018-05-31T00:00:00Z
source MITRE
title Processes and Threads

ProcessHacker Github

ProcessHacker. (2009, October 27). Process Hacker. Retrieved April 11, 2022.

Internal MISP references

UUID 3fc82a92-cfba-405d-b30e-22eba69ab1ee which can be used as unique global reference for ProcessHacker Github in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-11T00:00:00Z
date_published 2009-10-27T00:00:00Z
source MITRE
title Process Hacker

Leitch Hollowing

Leitch, J. (n.d.). Process Hollowing. Retrieved November 12, 2014.

Internal MISP references

UUID 8feb180a-bfad-42cb-b8ee-792c5088567a which can be used as unique global reference for Leitch Hollowing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-12T00:00:00Z
source MITRE
title Process Hollowing

Korean FSI TA505 2020

Financial Security Institute. (2020, February 28). Profiling of TA505 Threat Group That Continues to Attack the Financial Sector. Retrieved July 14, 2022.

Internal MISP references

UUID d4e2c109-341c-45b3-9d41-3eb980724524 which can be used as unique global reference for Korean FSI TA505 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-14T00:00:00Z
date_published 2020-02-28T00:00:00Z
source MITRE
title Profiling of TA505 Threat Group That Continues to Attack the Financial Sector

Microsoft Profiling Mar 2017

Microsoft. (2017, March 30). Profiling Overview. Retrieved June 24, 2020.

Internal MISP references

UUID eb0909ea-616c-4d79-b145-ee2f1ae539fb which can be used as unique global reference for Microsoft Profiling Mar 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-24T00:00:00Z
date_published 2017-03-30T00:00:00Z
source MITRE
title Profiling Overview

Microsoft Win32

Microsoft. (n.d.). Programming reference for the Win32 API. Retrieved March 15, 2020.

Internal MISP references

UUID 585b9975-3cfb-4485-a9eb-5eea337ebd3c which can be used as unique global reference for Microsoft Win32 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-15T00:00:00Z
source MITRE
title Programming reference for the Win32 API

CameraShy

ThreatConnect Inc. and Defense Group Inc. (DGI). (2015, September 23). Project CameraShy: Closing the Aperture on China's Unit 78020. Retrieved December 17, 2015.

Internal MISP references

UUID 9942b6a5-6ffb-4a26-9392-6c8bb9954997 which can be used as unique global reference for CameraShy in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-12-17T00:00:00Z
date_published 2015-09-23T00:00:00Z
source MITRE, Tidal Cyber
title Project CameraShy: Closing the Aperture on China's Unit 78020

Unit 42 ProjectM March 2016

Falcone, R. and Conant S. (2016, March 25). ProjectM: Link Found Between Pakistani Actor and Operation Transparent Tribe. Retrieved September 2, 2021.

Internal MISP references

UUID adee82e6-a74a-4a91-ab5a-97847b135ca3 which can be used as unique global reference for Unit 42 ProjectM March 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-02T00:00:00Z
date_published 2016-03-25T00:00:00Z
source MITRE
title ProjectM: Link Found Between Pakistani Actor and Operation Transparent Tribe

Threatpost Sauron

Michael Mimoso. (2016, August 8). ProjectSauron APT On Par With Equation, Flame, Duqu. Retrieved January 10, 2024.

Internal MISP references

UUID 4d349f2f-c740-55c7-8e7b-b6957e382307 which can be used as unique global reference for Threatpost Sauron in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-10T00:00:00Z
date_published 2016-08-08T00:00:00Z
source MITRE
title ProjectSauron APT On Par With Equation, Flame, Duqu

Kaspersky ProjectSauron Blog

Kaspersky Lab's Global Research & Analysis Team. (2016, August 8). ProjectSauron: top level cyber-espionage platform covertly extracts encrypted government comms. Retrieved August 17, 2016.

Internal MISP references

UUID baeaa632-3fa5-4d2b-9537-ccc7674fd7d6 which can be used as unique global reference for Kaspersky ProjectSauron Blog in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-08-17T00:00:00Z
date_published 2016-08-08T00:00:00Z
source MITRE, Tidal Cyber
title ProjectSauron: top level cyber-espionage platform covertly extracts encrypted government comms

Kaspersky TajMahal April 2019

GReAT. (2019, April 10). Project TajMahal – a sophisticated new APT framework. Retrieved October 14, 2019.

Internal MISP references

UUID 1ed20522-52ae-4d0c-b42e-c680490958ac which can be used as unique global reference for Kaspersky TajMahal April 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-14T00:00:00Z
date_published 2019-04-10T00:00:00Z
source MITRE
title Project TajMahal – a sophisticated new APT framework

DarkReading FireEye FIN5 Oct 2015

Higgins, K. (2015, October 13). Prolific Cybercrime Gang Favors Legit Login Credentials. Retrieved October 4, 2017.

Internal MISP references

UUID afe0549d-dc1b-4bcf-9a1d-55698afd530e which can be used as unique global reference for DarkReading FireEye FIN5 Oct 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-10-04T00:00:00Z
date_published 2015-10-13T00:00:00Z
source MITRE
title Prolific Cybercrime Gang Favors Legit Login Credentials

Talos Promethium June 2020

Mercer, W. et al. (2020, June 29). PROMETHIUM extends global reach with StrongPity3 APT. Retrieved July 20, 2020.

Internal MISP references

UUID 188d990e-f0be-40f2-90f3-913dfe687d27 which can be used as unique global reference for Talos Promethium June 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-07-20T00:00:00Z
date_published 2020-06-29T00:00:00Z
source MITRE
title PROMETHIUM extends global reach with StrongPity3 APT

The Record Cyber Toufan December 29 2023

Daryna Antoniuk. (2023, December 29). Pro-Palestinian operation claims dozens of data breaches against Israeli firms. Retrieved August 8, 2024.

Internal MISP references

UUID bc621380-7094-4877-abbe-5c20588e5dbc which can be used as unique global reference for The Record Cyber Toufan December 29 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-08T00:00:00Z
date_published 2023-12-29T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Pro-Palestinian operation claims dozens of data breaches against Israeli firms

Intel471 Pro-Russian Hacktivist 2022

Intel471. (2022, September 14). Pro-Russian Hacktivist Groups Target Ukraine Supporters. Retrieved April 30, 2024.

Internal MISP references

UUID f51610a7-1323-4cc4-85ec-2ebdab2a2a50 which can be used as unique global reference for Intel471 Pro-Russian Hacktivist 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-30T00:00:00Z
date_published 2022-09-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Pro-Russian Hacktivist Groups Target Ukraine Supporters

TechNet Credential Guard

Lich, B. (2016, May 31). Protect derived domain credentials with Credential Guard. Retrieved June 1, 2016.

Internal MISP references

UUID d5b2446b-4685-490f-8181-1169cd049bee which can be used as unique global reference for TechNet Credential Guard in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-01T00:00:00Z
date_published 2016-05-31T00:00:00Z
source MITRE
title Protect derived domain credentials with Credential Guard

Microsoft Protected Users Security Group

Microsoft. (2016, October 12). Protected Users Security Group. Retrieved May 29, 2020.

Internal MISP references

UUID e6316ecd-da29-4928-a868-c9876badce62 which can be used as unique global reference for Microsoft Protected Users Security Group in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-29T00:00:00Z
date_published 2016-10-12T00:00:00Z
source MITRE
title Protected Users Security Group

CISA Remote Monitoring and Management Software

CISA. (n.d.). Protecting Against Malicious Use of Remote Monitoring and Management Software. Retrieved February 2, 2023.

Internal MISP references

UUID 1ee55a8c-9e9d-520a-a3d3-1d2da57e0265 which can be used as unique global reference for CISA Remote Monitoring and Management Software in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-02T00:00:00Z
source MITRE
title Protecting Against Malicious Use of Remote Monitoring and Management Software

Protecting Microsoft 365 From On-Premises Attacks

Microsoft. (2022, August 26). Protecting Microsoft 365 from on-premises attacks. Retrieved February 21, 2023.

Internal MISP references

UUID 95e19778-95ce-585a-892e-e6a8c20389f7 which can be used as unique global reference for Protecting Microsoft 365 From On-Premises Attacks in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-21T00:00:00Z
date_published 2022-08-26T00:00:00Z
source MITRE
title Protecting Microsoft 365 from on-premises attacks

SANS PsExec

Pilkington, M. (2012, December 17). Protecting Privileged Domain Accounts: PsExec Deep-Dive. Retrieved August 17, 2016.

Internal MISP references

UUID a8d1e40d-b291-443c-86cc-edf6db00b898 which can be used as unique global reference for SANS PsExec in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-08-17T00:00:00Z
date_published 2012-12-17T00:00:00Z
source MITRE
title Protecting Privileged Domain Accounts: PsExec Deep-Dive

Docker Daemon Socket Protect

Docker. (n.d.). Protect the Docker Daemon Socket. Retrieved March 29, 2021.

Internal MISP references

UUID 48ce6b2c-57e7-4467-b0ea-3160ac46817e which can be used as unique global reference for Docker Daemon Socket Protect in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-29T00:00:00Z
source MITRE
title Protect the Docker Daemon Socket

Malwarebytes Emotet Dec 2017

Smith, A.. (2017, December 22). Protect your network from Emotet Trojan with Malwarebytes Endpoint Security. Retrieved January 17, 2019.

Internal MISP references

UUID 3642af0b-f14d-4860-a87c-fb57dc107a49 which can be used as unique global reference for Malwarebytes Emotet Dec 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-01-17T00:00:00Z
date_published 2017-12-22T00:00:00Z
source MITRE
title Protect your network from Emotet Trojan with Malwarebytes Endpoint Security

ProtocolHandler.exe - LOLBAS Project

LOLBAS. (2022, July 24). ProtocolHandler.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 1f678111-dfa3-4c06-9359-816b9ca12cd0 which can be used as unique global reference for ProtocolHandler.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2022-07-24T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title ProtocolHandler.exe

cybereason osx proton

Amit Serper. (2018, May 10). ProtonB What this Mac Malware Actually Does. Retrieved March 19, 2018.

Internal MISP references

UUID 9c43d646-9ac2-43b5-80b6-9e69dcb57617 which can be used as unique global reference for cybereason osx proton in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-19T00:00:00Z
date_published 2018-05-10T00:00:00Z
source MITRE
title ProtonB What this Mac Malware Actually Does

Provlaunch.exe - LOLBAS Project

LOLBAS. (2023, June 30). Provlaunch.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 56a57369-4707-4dff-ad23-431109f24233 which can be used as unique global reference for Provlaunch.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2023-06-30T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Provlaunch.exe

FBI Proxies Credential Stuffing

FBI. (2022, August 18). Proxies and Configurations Used for Credential Stuffing Attacks on Online Customer Accounts . Retrieved July 6, 2023.

Internal MISP references

UUID 17f9b7b0-3e1a-5d75-9030-da79fcccdb49 which can be used as unique global reference for FBI Proxies Credential Stuffing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-06T00:00:00Z
date_published 2022-08-18T00:00:00Z
source MITRE
title Proxies and Configurations Used for Credential Stuffing Attacks on Online Customer Accounts

Sysdig Proxyjacking

Crystal Morin. (2023, April 4). Proxyjacking has Entered the Chat. Retrieved July 6, 2023.

Internal MISP references

UUID 26562be2-cab6-5867-9a43-d8a59c663596 which can be used as unique global reference for Sysdig Proxyjacking in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-06T00:00:00Z
date_published 2023-04-04T00:00:00Z
source MITRE
title Proxyjacking has Entered the Chat

Password Protected Word Docs

Lawrence Abrams. (2017, July 12). PSA: Don't Open SPAM Containing Password Protected Word Docs. Retrieved January 5, 2022.

Internal MISP references

UUID fe6f3ee6-b0a4-4092-947b-48e02a9255c1 which can be used as unique global reference for Password Protected Word Docs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-05T00:00:00Z
date_published 2017-07-12T00:00:00Z
source MITRE
title PSA: Don't Open SPAM Containing Password Protected Word Docs

Github PSAttack

Haight, J. (2016, April 21). PS>Attack. Retrieved September 27, 2024.

Internal MISP references

UUID 929e37ed-c230-4517-a2ef-b7896bd3e4a2 which can be used as unique global reference for Github PSAttack in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-27T00:00:00Z
date_published 2016-04-21T00:00:00Z
source MITRE
title PS>Attack

PsExec Russinovich

Russinovich, M. (2004, June 28). PsExec. Retrieved December 17, 2015.

Internal MISP references

UUID d6216ce3-1e63-4bb1-b379-b530c8203a96 which can be used as unique global reference for PsExec Russinovich in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-12-17T00:00:00Z
date_published 2004-06-28T00:00:00Z
source MITRE
title PsExec

SANS UAC Bypass

Medin, T. (2013, August 8). PsExec UAC Bypass. Retrieved June 3, 2016.

Internal MISP references

UUID 824739ac-633a-40e0-bb01-2bfd43714d67 which can be used as unique global reference for SANS UAC Bypass in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-03T00:00:00Z
date_published 2013-08-08T00:00:00Z
source MITRE
title PsExec UAC Bypass

GitHub PSPKIAudit

HarmJ0y et al. (2021, June 16). PSPKIAudit. Retrieved August 2, 2022.

Internal MISP references

UUID ac3d5502-0ab9-446e-bf8c-22675f92f017 which can be used as unique global reference for GitHub PSPKIAudit in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-02T00:00:00Z
date_published 2021-06-16T00:00:00Z
source MITRE
title PSPKIAudit

Psr.exe - LOLBAS Project

LOLBAS. (2020, June 27). Psr.exe. Retrieved December 4, 2023.

Internal MISP references

UUID a00782cf-f6b2-4b63-9d8d-97efe17e11c0 which can be used as unique global reference for Psr.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2020-06-27T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Psr.exe

Microsoft PsSetCreateProcessNotifyRoutine routine

Microsoft. (n.d.). PsSetCreateProcessNotifyRoutine routine. Retrieved December 20, 2017.

Internal MISP references

UUID c407645d-1109-49a7-a4c0-51ec9cd54c8d which can be used as unique global reference for Microsoft PsSetCreateProcessNotifyRoutine routine in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-20T00:00:00Z
source MITRE
title PsSetCreateProcessNotifyRoutine routine

PTRACE man

Kerrisk, M. (2020, February 9). PTRACE(2) - Linux Programmer's Manual. Retrieved February 21, 2020.

Internal MISP references

UUID fc5e63e7-090a-441b-8e34-9946e1840b49 which can be used as unique global reference for PTRACE man in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-21T00:00:00Z
date_published 2020-02-09T00:00:00Z
source MITRE
title PTRACE(2) - Linux Programmer's Manual

Wikipedia Public Key Crypto

Wikipedia. (2017, June 29). Public-key cryptography. Retrieved July 5, 2017.

Internal MISP references

UUID 1b7514e7-477d-44a2-acee-d1819066dee4 which can be used as unique global reference for Wikipedia Public Key Crypto in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-05T00:00:00Z
date_published 2017-06-29T00:00:00Z
source MITRE
title Public-key cryptography

SingHealth Breach Jan 2019

Committee of Inquiry into the Cyber Attack on SingHealth. (2019, January 10). Public Report of the Committee of Inquiry into the Cyber Attack on Singapore Health Services Private Limited's Patient Database. Retrieved June 29, 2020.

Internal MISP references

UUID d1f699e3-7c9d-4a95-ad58-f46e665a4d37 which can be used as unique global reference for SingHealth Breach Jan 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-29T00:00:00Z
date_published 2019-01-10T00:00:00Z
source MITRE
title Public Report of the Committee of Inquiry into the Cyber Attack on Singapore Health Services Private Limited's Patient Database

pubprn

Jason Gerend. (2017, October 16). pubprn. Retrieved July 23, 2021.

Internal MISP references

UUID c845c67a-20ab-405c-95fe-2f667f83b886 which can be used as unique global reference for pubprn in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-07-23T00:00:00Z
date_published 2017-10-16T00:00:00Z
source MITRE
title pubprn

Pubprn.vbs - LOLBAS Project

LOLBAS. (2018, May 25). Pubprn.vbs. Retrieved December 4, 2023.

Internal MISP references

UUID d2b6b9fd-5f80-41c0-ac22-06b78c86a9e5 which can be used as unique global reference for Pubprn.vbs - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Pubprn.vbs

PaloAlto EncodedCommand March 2017

White, J. (2017, March 10). Pulling Back the Curtains on EncodedCommand PowerShell Attacks. Retrieved February 12, 2018.

Internal MISP references

UUID 069ef9af-3402-4b13-8c60-b397b0b0bfd7 which can be used as unique global reference for PaloAlto EncodedCommand March 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-12T00:00:00Z
date_published 2017-03-10T00:00:00Z
source MITRE
title Pulling Back the Curtains on EncodedCommand PowerShell Attacks

anomali-linux-rabbit

Anomali Threat Research. (2018, December 6). Pulling Linux Rabbit/Rabbot Malware Out of a Hat. Retrieved December 17, 2020.

Internal MISP references

UUID ec413dc7-028c-4153-9e98-abe85961747f which can be used as unique global reference for anomali-linux-rabbit in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-17T00:00:00Z
date_published 2018-12-06T00:00:00Z
source MITRE
title Pulling Linux Rabbit/Rabbot Malware Out of a Hat

Anomali Linux Rabbit 2018

Anomali Labs. (2018, December 6). Pulling Linux Rabbit/Rabbot Malware Out of a Hat. Retrieved March 4, 2019.

Internal MISP references

UUID e843eb47-21b0-44b9-8065-02aea0a0b05f which can be used as unique global reference for Anomali Linux Rabbit 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-04T00:00:00Z
date_published 2018-12-06T00:00:00Z
source MITRE
title Pulling Linux Rabbit/Rabbot Malware Out of a Hat

CrowdStrike PUNK SPIDER

CrowdStrike. (n.d.). Punk Spider. Retrieved February 20, 2024.

Internal MISP references

UUID a16f89a4-5142-559b-acfa-f69ad9410bd2 which can be used as unique global reference for CrowdStrike PUNK SPIDER in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-20T00:00:00Z
source MITRE
title Punk Spider

Menlo Security PureCrypter February 2023

Abhay Yadav. (2023, February 23). PureCrypter targets government entities through Discord. Retrieved May 10, 2023.

Internal MISP references

UUID 58b4eb62-4bdc-47fd-98b2-22dfff1b9dc3 which can be used as unique global reference for Menlo Security PureCrypter February 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-10T00:00:00Z
date_published 2023-02-23T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title PureCrypter targets government entities through Discord

BleepingComputer Snowflake June 11 2024

Sergiu Gatlan. (2024, June 11). Pure Storage confirms data breach after Snowflake account hack. Retrieved June 13, 2024.

Internal MISP references

UUID 410920f2-8e0f-437b-928f-0a7b19a6b96e which can be used as unique global reference for BleepingComputer Snowflake June 11 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-13T00:00:00Z
date_published 2024-06-11T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Pure Storage confirms data breach after Snowflake account hack

Free Trial PurpleUrchin

Gamazo, William. Quist, Nathaniel.. (2023, January 5). PurpleUrchin Bypasses CAPTCHA and Steals Cloud Platform Resources. Retrieved February 28, 2024.

Internal MISP references

UUID 841f397d-d103-56d7-9854-7ce43c684879 which can be used as unique global reference for Free Trial PurpleUrchin in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-28T00:00:00Z
date_published 2023-01-05T00:00:00Z
source MITRE
title PurpleUrchin Bypasses CAPTCHA and Steals Cloud Platform Resources

Cylance Putter Panda

Gross, J. and Walter, J.. (2016, January 12). Puttering into the Future.... Retrieved January 22, 2016.

Internal MISP references

UUID 058d6e8e-7ab9-4151-97de-1778ac95e18d which can be used as unique global reference for Cylance Putter Panda in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-22T00:00:00Z
date_published 2016-01-12T00:00:00Z
source MITRE
title Puttering into the Future...

Oddvar Moe ADS1 Jan 2018

Moe, O. (2018, January 14). Putting Data in Alternate Data Streams and How to Execute It. Retrieved June 30, 2018.

Internal MISP references

UUID 4a711970-870c-4710-9dbc-7cfebd2e315c which can be used as unique global reference for Oddvar Moe ADS1 Jan 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-06-30T00:00:00Z
date_published 2018-01-14T00:00:00Z
source MITRE
title Putting Data in Alternate Data Streams and How to Execute It

Oddvar Moe ADS2 Apr 2018

Moe, O. (2018, April 11). Putting Data in Alternate Data Streams and How to Execute It - Part 2. Retrieved June 30, 2018.

Internal MISP references

UUID b280f0c8-effe-45a4-a64a-a9a8b6ad2122 which can be used as unique global reference for Oddvar Moe ADS2 Apr 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-06-30T00:00:00Z
date_published 2018-04-11T00:00:00Z
source MITRE
title Putting Data in Alternate Data Streams and How to Execute It - Part 2

Moran RDPieces

Moran, B. (2020, November 18). Putting Together the RDPieces. Retrieved October 17, 2022.

Internal MISP references

UUID 794331fb-f1f2-4aaa-aae8-d1c4c95fb00f which can be used as unique global reference for Moran RDPieces in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-10-17T00:00:00Z
date_published 2020-11-18T00:00:00Z
source MITRE
title Putting Together the RDPieces

PuTTY Download Page

PuTTY. (n.d.). PuTTY Download Page. Retrieved November 16, 2023.

Internal MISP references

UUID bf278270-128e-483b-9f09-ce24f5f6ed80 which can be used as unique global reference for PuTTY Download Page in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-11-16T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title PuTTY Download Page

Wikipedia pwdump

Wikipedia. (2007, August 9). pwdump. Retrieved June 22, 2016.

Internal MISP references

UUID 6a1a1ae1-a587-41f5-945f-011d6808e5b8 which can be used as unique global reference for Wikipedia pwdump in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-22T00:00:00Z
date_published 2007-08-09T00:00:00Z
source MITRE
title pwdump

DFIR Pysa Nov 2020

THe DFIR Report. (2020, November 23). PYSA/Mespinoza Ransomware. Retrieved March 17, 2021.

Internal MISP references

UUID a00ae87e-6e64-4f1c-8639-adca436c217e which can be used as unique global reference for DFIR Pysa Nov 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-17T00:00:00Z
date_published 2020-11-23T00:00:00Z
source MITRE
title PYSA/Mespinoza Ransomware

NHS Digital Pysa Oct 2020

NHS Digital. (2020, October 10). Pysa Ransomware: Another 'big-game hunter' ransomware. Retrieved March 17, 2021.

Internal MISP references

UUID 5a853dfb-d935-4d85-a5bf-0ab5279fd32e which can be used as unique global reference for NHS Digital Pysa Oct 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-17T00:00:00Z
date_published 2020-10-10T00:00:00Z
source MITRE
title Pysa Ransomware: Another 'big-game hunter' ransomware

oletools toolkit

decalage2. (2019, December 3). python-oletools. Retrieved September 18, 2020.

Internal MISP references

UUID 9036fac0-dca8-4956-b0b4-469801adad28 which can be used as unique global reference for oletools toolkit in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-18T00:00:00Z
date_published 2019-12-03T00:00:00Z
source MITRE
title python-oletools

GitHub PoshC2

Nettitude. (2018, July 23). Python Server for PoshC2. Retrieved April 23, 2019.

Internal MISP references

UUID 45e79c0e-a2f6-4b56-b621-4142756bd1b1 which can be used as unique global reference for GitHub PoshC2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-23T00:00:00Z
date_published 2018-07-23T00:00:00Z
source MITRE
title Python Server for PoshC2

Trend Micro Qakbot December 2020

Trend Micro. (2020, December 17). QAKBOT: A decade-old malware still with new tricks. Retrieved September 27, 2021.

Internal MISP references

UUID c061ce45-1452-4c11-9586-bd5eb2d718ab which can be used as unique global reference for Trend Micro Qakbot December 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-27T00:00:00Z
date_published 2020-12-17T00:00:00Z
source MITRE
title QAKBOT: A decade-old malware still with new tricks

Cyberint Qakbot May 2021

Cyberint. (2021, May 25). Qakbot Banking Trojan. Retrieved September 27, 2021.

Internal MISP references

UUID 1baeac94-9168-4813-ab72-72e609250745 which can be used as unique global reference for Cyberint Qakbot May 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-27T00:00:00Z
date_published 2021-05-25T00:00:00Z
source MITRE
title Qakbot Banking Trojan

Trellix-Qakbot

Pham Duy Phuc, John Fokker J.E., Alejandro Houspanossian and Mathanraj Thangaraju. (2023, March 7). Qakbot Evolves to OneNote Malware Distribution. Retrieved June 7, 2024.

Internal MISP references

UUID 0ffc4317-c88a-5c9b-9c13-cb8b2a8b65e6 which can be used as unique global reference for Trellix-Qakbot in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-07T00:00:00Z
date_published 2023-03-07T00:00:00Z
source MITRE
title Qakbot Evolves to OneNote Malware Distribution

TrellixQakbot

Pham Duy Phuc, John Fokker J.E., Alejandro Houspanossian and Mathanraj Thangaraju. (2023, March 7). Qakbot Evolves to OneNote Malware Distribution. Retrieved August 1, 2024.

Internal MISP references

UUID c07a87bd-be9d-5bd9-b59a-d89f0e835886 which can be used as unique global reference for TrellixQakbot in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-01T00:00:00Z
date_published 2023-03-07T00:00:00Z
source MITRE
title Qakbot Evolves to OneNote Malware Distribution

Kroll Qakbot June 2020

Sette, N. et al. (2020, June 4). Qakbot Malware Now Exfiltrating Emails for Sophisticated Thread Hijacking Attacks. Retrieved September 27, 2021.

Internal MISP references

UUID 716960fd-c22d-42af-ba9b-295fee02657f which can be used as unique global reference for Kroll Qakbot June 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-27T00:00:00Z
date_published 2020-06-04T00:00:00Z
source MITRE
title Qakbot Malware Now Exfiltrating Emails for Sophisticated Thread Hijacking Attacks

Trend Micro Qakbot May 2020

Mendoza, E. et al. (2020, May 25). Qakbot Resurges, Spreads through VBS Files. Retrieved September 27, 2021.

Internal MISP references

UUID e2791c37-e149-43e7-b7c3-c91a6d1bc91e which can be used as unique global reference for Trend Micro Qakbot May 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-27T00:00:00Z
date_published 2020-05-25T00:00:00Z
source MITRE
title Qakbot Resurges, Spreads through VBS Files

K7 QakBot Returns January 4 2024

Saikumaravel. (2024, January 4). Qakbot Returns. Retrieved January 24, 2024.

Internal MISP references

UUID 5cb5e645-b77b-4bd1-a742-c8f53f234713 which can be used as unique global reference for K7 QakBot Returns January 4 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-24T00:00:00Z
date_published 2024-01-04T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Qakbot Returns

Kaspersky QakBot September 2021

Kuzmenko, A. et al. (2021, September 2). QakBot technical analysis. Retrieved September 27, 2021.

Internal MISP references

UUID f40cabe3-a324-4b4d-8e95-25c036dbd8b5 which can be used as unique global reference for Kaspersky QakBot September 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-27T00:00:00Z
date_published 2021-09-02T00:00:00Z
source MITRE
title QakBot technical analysis

Red Canary Qbot

Rainey, K. (n.d.). Qbot. Retrieved September 27, 2021.

Internal MISP references

UUID 6e4960e7-ae5e-4b68-ac85-4bd84e940634 which can be used as unique global reference for Red Canary Qbot in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-27T00:00:00Z
source MITRE
title Qbot

qr-phish-agriculture

Tim Bedard and Tyler Johnson. (2023, October 4). QR Code Scams & Phishing. Retrieved November 27, 2023.

Internal MISP references

UUID 58df8729-ab42-55ee-a27d-655644bdeb0d which can be used as unique global reference for qr-phish-agriculture in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-11-27T00:00:00Z
date_published 2023-10-04T00:00:00Z
source MITRE
title QR Code Scams & Phishing

DFIR_Quantum_Ransomware

DFIR. (2022, April 25). Quantum Ransomware. Retrieved July 26, 2024.

Internal MISP references

UUID 7dffba82-5b07-5d93-86dd-d97a1ea865e7 which can be used as unique global reference for DFIR_Quantum_Ransomware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-26T00:00:00Z
date_published 2022-04-25T00:00:00Z
source MITRE
title Quantum Ransomware

The DFIR Report April 25 2022

The DFIR Report. (2022, April 25). Quantum Ransomware. Retrieved June 28, 2024.

Internal MISP references

UUID 2e28c754-911a-4f08-a7bd-4580f5283571 which can be used as unique global reference for The DFIR Report April 25 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-28T00:00:00Z
date_published 2022-04-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Quantum Ransomware

TheEclecticLightCompany Quarantine and the flag

hoakley. (2020, October 29). Quarantine and the quarantine flag. Retrieved September 13, 2021.

Internal MISP references

UUID 7cce88cc-fbfb-43e1-a330-ac55bce9e394 which can be used as unique global reference for TheEclecticLightCompany Quarantine and the flag in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-13T00:00:00Z
date_published 2020-10-29T00:00:00Z
source MITRE
title Quarantine and the quarantine flag

Esentire July 31 2024

Esentire Threat Response Unit. (2024, July 31). Quartet of Trouble XWorm, AsyncRAT, VenomRAT, and PureLogs Stealer…. Retrieved August 6, 2024.

Internal MISP references

UUID 18185ffd-8a66-4531-86de-4ba4dd9f675b which can be used as unique global reference for Esentire July 31 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-06T00:00:00Z
date_published 2024-07-31T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Quartet of Trouble XWorm, AsyncRAT, VenomRAT, and PureLogs Stealer…

GitHub QuasarRAT

MaxXor. (n.d.). QuasarRAT. Retrieved July 10, 2018.

Internal MISP references

UUID c87e4427-af97-4e93-9596-ad5a588aa171 which can be used as unique global reference for GitHub QuasarRAT in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-10T00:00:00Z
source MITRE
title QuasarRAT

0DAY IN {REA_TEAM} Pikabot January 6 2024

0DAY IN {REA_TEAM}. (2024, January 6). [QuickNote] Technical Analysis of recent Pikabot Core Module. Retrieved January 11, 2024.

Internal MISP references

UUID 08ec9726-5a1d-4b2e-82d5-a5a9e7e917ae which can be used as unique global reference for 0DAY IN {REA_TEAM} Pikabot January 6 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-11T00:00:00Z
date_published 2024-01-06T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title [QuickNote] Technical Analysis of recent Pikabot Core Module

DidierStevens SelectMyParent Nov 2009

Stevens, D. (2009, November 22). Quickpost: SelectMyParent or Playing With the Windows Process Tree. Retrieved June 3, 2019.

Internal MISP references

UUID 1fee31b0-2d9c-4c02-b494-d3a6b80f12f3 which can be used as unique global reference for DidierStevens SelectMyParent Nov 2009 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-03T00:00:00Z
date_published 2009-11-22T00:00:00Z
source MITRE
title Quickpost: SelectMyParent or Playing With the Windows Process Tree

Microsoft - Azure AD App Registration - May 2019

Microsoft. (2019, May 8). Quickstart: Register an application with the Microsoft identity platform. Retrieved September 12, 2019.

Internal MISP references

UUID 36a06c99-55ca-4163-9450-c3b84ae10039 which can be used as unique global reference for Microsoft - Azure AD App Registration - May 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-12T00:00:00Z
date_published 2019-05-08T00:00:00Z
source MITRE
title Quickstart: Register an application with the Microsoft identity platform

Microsoft Azure Key Vault

Microsoft. (2023, January 13). Quickstart: Set and retrieve a secret from Azure Key Vault using Azure CLI. Retrieved September 25, 2023.

Internal MISP references

UUID 8f076aae-38c0-5335-9f7a-1e29b90fc33f which can be used as unique global reference for Microsoft Azure Key Vault in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-25T00:00:00Z
date_published 2023-01-13T00:00:00Z
source MITRE
title Quickstart: Set and retrieve a secret from Azure Key Vault using Azure CLI

Google Command Center Dashboard

Google. (2019, October 3). Quickstart: Using the dashboard. Retrieved October 8, 2019.

Internal MISP references

UUID a470fe2a-40ce-4060-8dfc-2cdb56bbc18b which can be used as unique global reference for Google Command Center Dashboard in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-08T00:00:00Z
date_published 2019-10-03T00:00:00Z
source MITRE
title Quickstart: Using the dashboard

Trend Micro R980 2016

Antazo, F. and Yambao, M. (2016, August 10). R980 Ransomware Found Abusing Disposable Email Address Service. Retrieved October 13, 2020.

Internal MISP references

UUID 6afd89ba-2f51-4192-82b3-d961cc86adf1 which can be used as unique global reference for Trend Micro R980 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-13T00:00:00Z
date_published 2016-08-10T00:00:00Z
source MITRE
title R980 Ransomware Found Abusing Disposable Email Address Service

Costa AvosLocker May 2022

Costa, F. (2022, May 1). RaaS AvosLocker Incident Response Analysis. Retrieved January 11, 2023.

Internal MISP references

UUID a94268d8-6b7c-574b-a588-d8fd80c27fd3 which can be used as unique global reference for Costa AvosLocker May 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-01-11T00:00:00Z
date_published 2022-05-01T00:00:00Z
source MITRE
title RaaS AvosLocker Incident Response Analysis

S2W Racoon 2022

S2W TALON. (2022, June 16). Raccoon Stealer is Back with a New Version. Retrieved August 1, 2024.

Internal MISP references

UUID b53a4c5f-ef68-50a7-ae2d-192b3ace860c which can be used as unique global reference for S2W Racoon 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-01T00:00:00Z
date_published 2022-06-16T00:00:00Z
source MITRE
title Raccoon Stealer is Back with a New Version

Sekoia Raccoon1 2022

Quentin Bourgue, Pierre le Bourhis, & Sekoia TDR. (2022, June 28). Raccoon Stealer v2 - Part 1: The return of the dead. Retrieved August 1, 2024.

Internal MISP references

UUID 645bc346-747b-5b9b-984b-fa1057cf8eb1 which can be used as unique global reference for Sekoia Raccoon1 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-01T00:00:00Z
date_published 2022-06-28T00:00:00Z
source MITRE
title Raccoon Stealer v2 - Part 1: The return of the dead

Sekoia.io Raccoon Stealer June 28 2022

Quentin Bourgue, Pierre Le Bourhis, Threat & Detection Research Team - TDR. (2022, June 28). Raccoon Stealer v2 – Part 1: The return of the dead. Retrieved November 16, 2023.

Internal MISP references

UUID df0c9cbd-8692-497e-9f81-cf9e44a3a5cd which can be used as unique global reference for Sekoia.io Raccoon Stealer June 28 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-11-16T00:00:00Z
date_published 2022-06-28T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Raccoon Stealer v2 – Part 1: The return of the dead

Sekoia Raccoon2 2022

Pierre Le Bourhis, Quentin Bourgue, & Sekoia TDR. (2022, June 29). Raccoon Stealer v2 - Part 2: In-depth analysis. Retrieved August 1, 2024.

Internal MISP references

UUID 5d4cd7c6-62c1-5e0e-beda-a0575e7f1af5 which can be used as unique global reference for Sekoia Raccoon2 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-01T00:00:00Z
date_published 2022-06-29T00:00:00Z
source MITRE
title Raccoon Stealer v2 - Part 2: In-depth analysis

DOJ Iran Indictments March 2018

DOJ. (2018, March 23). U.S. v. Rafatnejad et al . Retrieved February 3, 2021.

Internal MISP references

UUID 7dfdccd5-d035-4678-89c1-f5f1630d7a79 which can be used as unique global reference for DOJ Iran Indictments March 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-03T00:00:00Z
source MITRE
title Rafatnejad et al

Sophos Ragnar May 2020

SophosLabs. (2020, May 21). Ragnar Locker ransomware deploys virtual machine to dodge security. Retrieved June 29, 2020.

Internal MISP references

UUID 04ed6dc0-45c2-4e36-8ec7-a75f6f715f0a which can be used as unique global reference for Sophos Ragnar May 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-29T00:00:00Z
date_published 2020-05-21T00:00:00Z
source MITRE
title Ragnar Locker ransomware deploys virtual machine to dodge security

SC Magazine Ragnar Locker 2021

Joe Uchill. (2021, December 3). Ragnar Locker reminds breach victims it can read the on-network incident response chat rooms. Retrieved August 30, 2024.

Internal MISP references

UUID 69dca68b-f864-509a-ad1b-3c6fea0152f8 which can be used as unique global reference for SC Magazine Ragnar Locker 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-30T00:00:00Z
date_published 2021-12-03T00:00:00Z
source MITRE
title Ragnar Locker reminds breach victims it can read the on-network incident response chat rooms

GitHub Raindance

Stringer, M.. (2018, November 21). RainDance. Retrieved October 6, 2019.

Internal MISP references

UUID 321bba10-06c6-4c4f-a3e0-318561fa0fed which can be used as unique global reference for GitHub Raindance in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-06T00:00:00Z
date_published 2018-11-21T00:00:00Z
source MITRE
title RainDance

Symantec RAINDROP January 2021

Symantec Threat Hunter Team. (2021, January 18). Raindrop: New Malware Discovered in SolarWinds Investigation. Retrieved January 19, 2021.

Internal MISP references

UUID 9185092d-3d99-466d-b885-f4e76fe74b6b which can be used as unique global reference for Symantec RAINDROP January 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-19T00:00:00Z
date_published 2021-01-18T00:00:00Z
source MITRE
title Raindrop: New Malware Discovered in SolarWinds Investigation

Eset Ramsay May 2020

Sanmillan, I.. (2020, May 13). Ramsay: A cyber‑espionage toolkit tailored for air‑gapped networks. Retrieved May 27, 2020.

Internal MISP references

UUID 3c149b0b-f37c-4d4e-aa61-351c87fd57ce which can be used as unique global reference for Eset Ramsay May 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-27T00:00:00Z
date_published 2020-05-13T00:00:00Z
source MITRE
title Ramsay: A cyber‑espionage toolkit tailored for air‑gapped networks

Rancor WMI

Jen Miller-Osborn and Mike Harbison. (2019, December 17). Rancor: Cyber Espionage Group Uses New Custom Malware to Attack Southeast Asia. Retrieved February 9, 2024.

Internal MISP references

UUID 462b8752-aa21-50d1-a21d-c9945373f37c which can be used as unique global reference for Rancor WMI in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-09T00:00:00Z
date_published 2019-12-17T00:00:00Z
source MITRE
title Rancor: Cyber Espionage Group Uses New Custom Malware to Attack Southeast Asia

Rancor Unit42 June 2018

Ash, B., et al. (2018, June 26). RANCOR: Targeted Attacks in South East Asia Using PLAINTEE and DDKONG Malware Families. Retrieved July 2, 2018.

Internal MISP references

UUID 45098a85-a61f-491a-a549-f62b02dc2ecd which can be used as unique global reference for Rancor Unit42 June 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-02T00:00:00Z
date_published 2018-06-26T00:00:00Z
source MITRE, Tidal Cyber
title RANCOR: Targeted Attacks in South East Asia Using PLAINTEE and DDKONG Malware Families

BroadcomSW June 5 2024

Threat Hunter Team Symantec. (2024, June 5). RansomHub New Ransomware has Origins in Older Knight. Retrieved June 7, 2024.

Internal MISP references

UUID 3fa49490-cb22-4362-bf48-eaba9e83e6f5 which can be used as unique global reference for BroadcomSW June 5 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-07T00:00:00Z
date_published 2024-06-05T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title RansomHub New Ransomware has Origins in Older Knight

FBI-ransomware

FBI. (n.d.). Ransomware. Retrieved August 18, 2023.

Internal MISP references

UUID 54e296c9-edcc-5af7-99be-b118da29711f which can be used as unique global reference for FBI-ransomware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-18T00:00:00Z
source MITRE
title Ransomware

SentinelOne INC Ransomware

SentinelOne. (n.d.). What Is Inc. Ransomware?. Retrieved June 5, 2024.

Internal MISP references

UUID 5f82878b-2258-5663-8694-efc3179c1849 which can be used as unique global reference for SentinelOne INC Ransomware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-05T00:00:00Z
source MITRE
title Ransomware?

Singleton, C. and Kiefer, C. (2020, September 28). Ransomware 2020: Attack Trends Affecting Organizations Worldwide. Retrieved September 20, 2021.

Internal MISP references

UUID eb767436-4a96-4e28-bd34-944842d7593e which can be used as unique global reference for IBM Ransomware Trends September 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-20T00:00:00Z
date_published 2020-09-28T00:00:00Z
source MITRE
title Ransomware 2020: Attack Trends Affecting Organizations Worldwide

DHS/CISA Ransomware Targeting Healthcare October 2020

DHS/CISA. (2020, October 28). Ransomware Activity Targeting the Healthcare and Public Health Sector. Retrieved October 28, 2020.

Internal MISP references

UUID 984e86e6-32e4-493c-8172-3d29de4720cc which can be used as unique global reference for DHS/CISA Ransomware Targeting Healthcare October 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-28T00:00:00Z
date_published 2020-10-28T00:00:00Z
source MITRE, Tidal Cyber
title Ransomware Activity Targeting the Healthcare and Public Health Sector

FBI Ransomware Tools November 7 2023

Federal Bureau of Investigation. (2023, November 7). Ransomware Actors Continue to Gain Access through Third Parties and Legitimate System Tools. Retrieved June 28, 2024.

Internal MISP references

UUID e096e1f4-6b62-4756-8811-f263cf1dcecc which can be used as unique global reference for FBI Ransomware Tools November 7 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-28T00:00:00Z
date_published 2023-11-07T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Ransomware Actors Continue to Gain Access through Third Parties and Legitimate System Tools

FireEye Ransomware Disrupt Industrial Production

Zafra, D. Lunden, K. Brubaker, N. Kennelly, J.. (2020, February 24). Ransomware Against the Machine: How Adversaries are Learning to Disrupt Industrial Production by Targeting IT and OT. Retrieved February 9, 2021.

Internal MISP references

UUID 9ffa0f35-98e4-4265-8b66-9c805a2b6525 which can be used as unique global reference for FireEye Ransomware Disrupt Industrial Production in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-09T00:00:00Z
date_published 2020-02-24T00:00:00Z
source MITRE
title Ransomware Against the Machine: How Adversaries are Learning to Disrupt Industrial Production by Targeting IT and OT

FireEye Ransomware Feb 2020

Zafra, D., et al. (2020, February 24). Ransomware Against the Machine: How Adversaries are Learning to Disrupt Industrial Production by Targeting IT and OT. Retrieved March 2, 2021.

Internal MISP references

UUID 44856547-2de5-45ff-898f-a523095bd593 which can be used as unique global reference for FireEye Ransomware Feb 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-02T00:00:00Z
date_published 2020-02-24T00:00:00Z
source MITRE
title Ransomware Against the Machine: How Adversaries are Learning to Disrupt Industrial Production by Targeting IT and OT

Check Point Pay2Key November 2020

Check Point. (2020, November 6). Ransomware Alert: Pay2Key. Retrieved January 4, 2021.

Internal MISP references

UUID e4ea263d-f70e-4f9c-92a1-cb0e565a5ae9 which can be used as unique global reference for Check Point Pay2Key November 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-04T00:00:00Z
date_published 2020-11-06T00:00:00Z
source MITRE
title Ransomware Alert: Pay2Key

Microsoft Ransomware as a Service

Microsoft. (2022, May 9). Ransomware as a service: Understanding the cybercrime gig economy and how to protect yourself. Retrieved March 10, 2023.

Internal MISP references

UUID 833018b5-6ef6-5327-9af5-1a551df25cd2 which can be used as unique global reference for Microsoft Ransomware as a Service in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-10T00:00:00Z
date_published 2022-05-09T00:00:00Z
source MITRE
title Ransomware as a service: Understanding the cybercrime gig economy and how to protect yourself

Sophos News August 14 2024

Andreas Klopsch. (2024, August 14). Ransomware attackers introduce new EDR killer to their arsenal. Retrieved August 22, 2024.

Internal MISP references

UUID d0811fd4-e89d-4337-9bc1-a9a8774d44b1 which can be used as unique global reference for Sophos News August 14 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-22T00:00:00Z
date_published 2024-08-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Ransomware attackers introduce new EDR killer to their arsenal

Rapid7 Blog September 12 2024

Rapid. (2024, September 12). Ransomware Groups Demystified Lynx Ransomware . Retrieved September 12, 2024.

Internal MISP references

UUID 21d393ae-d135-4c5a-8c6d-1baa8c0a1e08 which can be used as unique global reference for Rapid7 Blog September 12 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2024-09-12T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Ransomware Groups Demystified Lynx Ransomware

Invictus IR Cloud Ransomware 2024

Invictus IR. (2024, January 11). Ransomware in the cloud. Retrieved August 5, 2024.

Internal MISP references

UUID 2ff4aed1-88a0-5e19-8fe9-1ecf4604f245 which can be used as unique global reference for Invictus IR Cloud Ransomware 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-05T00:00:00Z
date_published 2024-01-11T00:00:00Z
source MITRE
title Ransomware in the cloud

Www.invictus-ir.com 1 11 2024

Www.invictus-ir.com. (2024, January 11). Ransomware in the cloud. Retrieved April 17, 2024.

Internal MISP references

UUID 5e2a0756-d8f6-4359-9ca3-1e96fb8b5ac9 which can be used as unique global reference for Www.invictus-ir.com 1 11 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-17T00:00:00Z
date_published 2024-01-11T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Ransomware in the cloud

Palo Alto Cloud Ransomware

Ofir Balassiano and Ofir Shaty. (2023, November 29). Ransomware in the Cloud: Breaking Down the Attack Vectors. Retrieved September 25, 2024.

Internal MISP references

UUID d23216df-be77-59a0-9910-ab9bf54da6d7 which can be used as unique global reference for Palo Alto Cloud Ransomware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-25T00:00:00Z
date_published 2023-11-29T00:00:00Z
source MITRE
title Ransomware in the Cloud: Breaking Down the Attack Vectors

McAfee Maze March 2020

Mundo, A. (2020, March 26). Ransomware Maze. Retrieved May 18, 2020.

Internal MISP references

UUID 627a14dd-5300-4f58-869c-0ec91ffb664e which can be used as unique global reference for McAfee Maze March 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-18T00:00:00Z
date_published 2020-03-26T00:00:00Z
source MITRE
title Ransomware Maze

Sophos SystemBC December 16 2020

Sivagnanam Gn, Sean Gallagher. (2020, December 16). Ransomware operators use SystemBC RAT as off-the-shelf Tor backdoor. Retrieved September 21, 2023.

Internal MISP references

UUID eca1301f-deeb-4a97-8c4e-e61210706116 which can be used as unique global reference for Sophos SystemBC December 16 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-21T00:00:00Z
date_published 2020-12-16T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Ransomware operators use SystemBC RAT as off-the-shelf Tor backdoor

Fortinet Play Ransomware December 22 2022

Shunichi Imano, James Slaughter. (2022, December 22). Ransomware Roundup – Play. Retrieved August 10, 2023.

Internal MISP references

UUID a3fa463f-dd2f-4d23-8834-c428d90ea09b which can be used as unique global reference for Fortinet Play Ransomware December 22 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-10T00:00:00Z
date_published 2022-12-22T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Ransomware Roundup – Play

TrendMicro Akira October 5 2023

Trend Micro Research. (2023, October 5). Ransomware Spotlight: Akira. Retrieved February 27, 2024.

Internal MISP references

UUID 8f45fb21-c6ad-4b97-b459-da96eb643069 which can be used as unique global reference for TrendMicro Akira October 5 2023 in MISP communities and other software using the MISP galaxy

External references
  • http:/www.trendmicro.com/vinfo/us/security/news/ransomware-spotlight/ransomware-spotlight-akira
Associated metadata
Metadata key Value
date_accessed 2024-02-27T00:00:00Z
date_published 2023-10-05T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Ransomware Spotlight: Akira

Trend Micro AvosLocker Apr 2022

Trend Micro Research. (2022, April 4). Ransomware Spotlight AvosLocker. Retrieved January 11, 2023.

Internal MISP references

UUID 01fdc732-0951-59e2-afaf-5fe761357e7f which can be used as unique global reference for Trend Micro AvosLocker Apr 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-01-11T00:00:00Z
date_published 2022-04-04T00:00:00Z
source MITRE
title Ransomware Spotlight AvosLocker

Trend Micro Black Basta Spotlight September 2022

Trend Micro. (2022, September 1). Ransomware Spotlight Black Basta. Retrieved March 8, 2023.

Internal MISP references

UUID 1f2942ab-e6a9-5a50-b266-3436c8c0b5ec which can be used as unique global reference for Trend Micro Black Basta Spotlight September 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-08T00:00:00Z
date_published 2022-09-01T00:00:00Z
source MITRE
title Ransomware Spotlight Black Basta

Trend Micro BlackCat October 27 2022

Trend Micro Research. (2022, October 27). Ransomware Spotlight: BlackCat. Retrieved March 5, 2024.

Internal MISP references

UUID 94aef206-b4cb-4d91-9843-96cf50af157c which can be used as unique global reference for Trend Micro BlackCat October 27 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-05T00:00:00Z
date_published 2022-10-27T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Ransomware Spotlight: BlackCat

Trend Micro LockBit Spotlight February 08 2023

Trend Micro Research. (2022, February 8). Ransomware Spotlight: LockBit. Retrieved August 18, 2023.

Internal MISP references

UUID f72dade0-ec82-40e7-96a0-9f124d59bd35 which can be used as unique global reference for Trend Micro LockBit Spotlight February 08 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-18T00:00:00Z
date_published 2022-02-08T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Ransomware Spotlight: LockBit

Trend Micro Play Spotlight July 21 2023

Trend Micro Research. (2023, July 21). Ransomware Spotlight: Play. Retrieved August 10, 2023.

Internal MISP references

UUID 6cf9c6f0-7818-45dd-9afc-f69e394c23e4 which can be used as unique global reference for Trend Micro Play Spotlight July 21 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-10T00:00:00Z
date_published 2023-07-21T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Ransomware Spotlight: Play

Trend Micro Ransomware Spotlight Play July 2023

Trend Micro Research. (2023, July 21). Ransomware Spotlight: Play. Retrieved September 24, 2024.

Internal MISP references

UUID 399eac4c-5638-595c-9ee6-997dcd2d47c3 which can be used as unique global reference for Trend Micro Ransomware Spotlight Play July 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-24T00:00:00Z
date_published 2023-07-21T00:00:00Z
source MITRE
title Ransomware Spotlight: Play

Trend Micro Royal Ransomware March 15 2023

Trend Micro Research. (2023, March 15). Ransomware Spotlight: Royal. Retrieved October 11, 2024.

Internal MISP references

UUID 0914ce86-86f2-4f17-af37-a0d4ca9ff615 which can be used as unique global reference for Trend Micro Royal Ransomware March 15 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-11T00:00:00Z
date_published 2023-03-15T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Ransomware Spotlight: Royal

Group IB Ransomware May 2020

Group IB. (2020, May). Ransomware Uncovered: Attackers’ Latest Methods. Retrieved August 5, 2020.

Internal MISP references

UUID 18d20965-f1f4-439f-a4a3-34437ad1fe14 which can be used as unique global reference for Group IB Ransomware May 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-05T00:00:00Z
date_published 2020-05-01T00:00:00Z
source MITRE
title Ransomware Uncovered: Attackers’ Latest Methods

GitHub ransomwatch

joshhighet. (n.d.). ransomwatch. Retrieved June 30, 2023.

Internal MISP references

UUID 62037959-58e4-475a-bb91-ff360d20c1d7 which can be used as unique global reference for GitHub ransomwatch in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-30T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title ransomwatch

Microsoft PlayCrypt August 2022

Microsoft Security Intelligence. (2022, August 27). Ransom:Win32/PlayCrypt.PA. Retrieved September 24, 2024.

Internal MISP references

UUID af4a38bc-32d5-5eab-a13a-0f3533beedb1 which can be used as unique global reference for Microsoft PlayCrypt August 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-24T00:00:00Z
date_published 2022-08-27T00:00:00Z
source MITRE
title Ransom:Win32/PlayCrypt.PA

PyPI RAR

mkz. (2020). rarfile 3.1. Retrieved February 20, 2020.

Internal MISP references

UUID e40d1cc8-b8c7-4f43-b6a7-c50a4f7bf1f0 which can be used as unique global reference for PyPI RAR in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-20T00:00:00Z
date_published 2020-01-01T00:00:00Z
source MITRE
title rarfile 3.1

WinRAR Homepage

A. Roshal. (2020). RARLAB. Retrieved February 20, 2020.

Internal MISP references

UUID c1334e4f-67c8-451f-b50a-86003f6e3d3b which can be used as unique global reference for WinRAR Homepage in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-20T00:00:00Z
date_published 2020-01-01T00:00:00Z
source MITRE
title RARLAB

Aquino RARSTONE

Aquino, M. (2013, June 13). RARSTONE Found In Targeted Attacks. Retrieved December 17, 2015.

Internal MISP references

UUID 2327592e-4e8a-481e-bdf9-d548c776adee which can be used as unique global reference for Aquino RARSTONE in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-12-17T00:00:00Z
date_published 2013-06-13T00:00:00Z
source MITRE
title RARSTONE Found In Targeted Attacks

Rasautou.exe - LOLBAS Project

LOLBAS. (2020, January 10). Rasautou.exe. Retrieved December 4, 2023.

Internal MISP references

UUID dc299f7a-403b-4a22-9386-0be3e160d185 which can be used as unique global reference for Rasautou.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2020-01-10T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Rasautou.exe

RedCanary RaspberryRobin 2022

Lauren Podber and Stef Rand. (2022, May 5). Raspberry Robin gets the worm early. Retrieved May 17, 2024.

Internal MISP references

UUID ca6aa417-3da7-5173-818c-c539983033b5 which can be used as unique global reference for RedCanary RaspberryRobin 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-17T00:00:00Z
date_published 2022-05-05T00:00:00Z
source MITRE
title Raspberry Robin gets the worm early

Red Canary Raspberry Robin May 2022

Lauren Podber, Stef Rand. (2022, May 5). Raspberry Robin gets the worm early. Retrieved May 19, 2023.

Internal MISP references

UUID fb04d89a-3f39-48be-b986-9c4eac4dd8a4 which can be used as unique global reference for Red Canary Raspberry Robin May 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-19T00:00:00Z
date_published 2022-05-05T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Raspberry Robin gets the worm early

TrendMicro RaspberryRobin 2022

Christopher So. (2022, December 20). Raspberry Robin Malware Targets Telecom, Governments. Retrieved May 17, 2024.

Internal MISP references

UUID b454f50a-57fe-56f2-a8c0-ae1ab65fa945 which can be used as unique global reference for TrendMicro RaspberryRobin 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-17T00:00:00Z
date_published 2022-12-20T00:00:00Z
source MITRE
title Raspberry Robin Malware Targets Telecom, Governments

HP RaspberryRobin 2024

Patrick Schläpfer . (2024, April 10). Raspberry Robin Now Spreading Through Windows Script Files. Retrieved May 17, 2024.

Internal MISP references

UUID f01c041a-f8f5-51de-ab2f-1f513bf6d38c which can be used as unique global reference for HP RaspberryRobin 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-17T00:00:00Z
date_published 2024-04-10T00:00:00Z
source MITRE
title Raspberry Robin Now Spreading Through Windows Script Files

Avast RaspberryRobin 2022

Jan Vojtěšek. (2022, September 22). Raspberry Robin’s Roshtyak: A Little Lesson in Trickery. Retrieved May 17, 2024.

Internal MISP references

UUID 3ebeefee-42cd-5130-8d6b-d0520d8bb8c2 which can be used as unique global reference for Avast RaspberryRobin 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-17T00:00:00Z
date_published 2022-09-22T00:00:00Z
source MITRE
title Raspberry Robin’s Roshtyak: A Little Lesson in Trickery

Microsoft Security Raspberry Robin October 2022

Microsoft Threat Intelligence. (2022, October 27). Raspberry Robin worm part of larger ecosystem facilitating pre-ransomware activity. Retrieved May 19, 2023.

Internal MISP references

UUID 8017e42a-8373-4d24-8d89-638a925b704b which can be used as unique global reference for Microsoft Security Raspberry Robin October 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-19T00:00:00Z
date_published 2022-10-27T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Raspberry Robin worm part of larger ecosystem facilitating pre-ransomware activity

Microsoft RaspberryRobin 2022

Microsoft Threat Intelligence. (2022, October 27). Raspberry Robin worm part of larger ecosystem facilitating pre-ransomware activity. Retrieved May 17, 2024.

Internal MISP references

UUID fe2dd68c-6e25-5fae-bc57-3a072ecf4f72 which can be used as unique global reference for Microsoft RaspberryRobin 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-17T00:00:00Z
date_published 2022-10-27T00:00:00Z
source MITRE
title Raspberry Robin worm part of larger ecosystem facilitating pre-ransomware activity

Dragos Raspite Aug 2018

Dragos, Inc. (2018, August 2). RASPITE. Retrieved November 26, 2018.

Internal MISP references

UUID bf4ccd52-0a03-41b6-bde7-34ead90171c3 which can be used as unique global reference for Dragos Raspite Aug 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-26T00:00:00Z
date_published 2018-08-02T00:00:00Z
source MITRE
title RASPITE

RATANKBA

Trend Micro. (2017, February 27). RATANKBA: Delving into Large-scale Watering Holes against Enterprises. Retrieved May 22, 2018.

Internal MISP references

UUID 7d08ec64-7fb8-4520-b26b-95b0dee891fe which can be used as unique global reference for RATANKBA in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-05-22T00:00:00Z
date_published 2017-02-27T00:00:00Z
source MITRE
title RATANKBA: Delving into Large-scale Watering Holes against Enterprises

TrendMicro RawPOS April 2015

TrendLabs Security Intelligence Blog. (2015, April). RawPOS Technical Brief. Retrieved October 4, 2017.

Internal MISP references

UUID e483ed86-713b-42c6-ad77-e9b889bbcb81 which can be used as unique global reference for TrendMicro RawPOS April 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-10-04T00:00:00Z
date_published 2015-04-01T00:00:00Z
source MITRE
title RawPOS Technical Brief

Rclone

Nick Craig-Wood. (n.d.). Rclone syncs your files to cloud storage. Retrieved August 30, 2022.

Internal MISP references

UUID 3c7824de-d958-4254-beec-bc4e5ab989b0 which can be used as unique global reference for Rclone in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-30T00:00:00Z
source MITRE
title Rclone syncs your files to cloud storage

Rclone Wars

Justin Schoenfeld and Aaron Didier. (2021, May 4). Rclone Wars: Transferring leverage in a ransomware attack. Retrieved August 30, 2022.

Internal MISP references

UUID d47e5f7c-cf70-4f7c-ac83-57e4e1187485 which can be used as unique global reference for Rclone Wars in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-30T00:00:00Z
date_published 2021-05-04T00:00:00Z
source MITRE
title Rclone Wars: Transferring leverage in a ransomware attack

rcsi.exe - LOLBAS Project

LOLBAS. (2018, May 25). rcsi.exe. Retrieved December 4, 2023.

Internal MISP references

UUID dc02058a-7ed3-4253-a976-6f99b9e91406 which can be used as unique global reference for rcsi.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title rcsi.exe

RDP Hijacking Medium

Beaumont, K. (2017, March 19). RDP hijacking — how to hijack RDS and RemoteApp sessions transparently to move through an organisation. Retrieved December 11, 2017.

Internal MISP references

UUID 0a615508-c155-4004-86b8-916bbfd8ae42 which can be used as unique global reference for RDP Hijacking Medium in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-11T00:00:00Z
date_published 2017-03-19T00:00:00Z
source MITRE
title RDP hijacking — how to hijack RDS and RemoteApp sessions transparently to move through an organisation

RDPWrap Github

Stas'M Corp. (2014, October 22). RDP Wrapper Library by Stas'M. Retrieved March 28, 2022.

Internal MISP references

UUID 777a0a6f-3684-4888-ae1b-adc386be763a which can be used as unique global reference for RDPWrap Github in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-28T00:00:00Z
date_published 2014-10-22T00:00:00Z
source MITRE
title RDP Wrapper Library by Stas'M

rdrleakdiag.exe - LOLBAS Project

LOLBAS. (2022, May 18). rdrleakdiag.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 1feff728-2230-4a45-bd64-6093f8b42646 which can be used as unique global reference for rdrleakdiag.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2022-05-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title rdrleakdiag.exe

blog.vincss.net 1 13 2021

Yến Hứa. (2021, January 13). [RE019] From A to X analyzing some real cases which used recent Emotet samples. Retrieved February 27, 2024.

Internal MISP references

UUID 1ebae9fa-bab1-4a26-8d49-ae6778fdf094 which can be used as unique global reference for blog.vincss.net 1 13 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-27T00:00:00Z
date_published 2021-01-13T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title [RE019] From A to X analyzing some real cases which used recent Emotet samples

ESET RTM Feb 2017

Faou, M. and Boutin, J. (2017, February). Read The Manual: A Guide to the RTM Banking Trojan. Retrieved March 9, 2017.

Internal MISP references

UUID ab2cced7-05b8-4788-8d3c-8eadb0aaf38c which can be used as unique global reference for ESET RTM Feb 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-09T00:00:00Z
date_published 2017-02-01T00:00:00Z
source MITRE, Tidal Cyber
title Read The Manual: A Guide to the RTM Banking Trojan

FireEye Sunshop Campaign May 2013

Moran, N. (2013, May 20). Ready for Summer: The Sunshop Campaign. Retrieved March 19, 2018.

Internal MISP references

UUID ec246c7a-3396-46f9-acc4-a100cb5e5fe6 which can be used as unique global reference for FireEye Sunshop Campaign May 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-19T00:00:00Z
date_published 2013-05-20T00:00:00Z
source MITRE
title Ready for Summer: The Sunshop Campaign

Mandiant golang stripped binaries explanation

STEPHEN ECKELS. (2022, February 28). Ready, Set, Go — Golang Internals and Symbol Recovery. Retrieved September 29, 2022.

Internal MISP references

UUID 60eb0109-9655-41ab-bf76-37b17bf9594a which can be used as unique global reference for Mandiant golang stripped binaries explanation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-29T00:00:00Z
date_published 2022-02-28T00:00:00Z
source MITRE
title Ready, Set, Go — Golang Internals and Symbol Recovery

reagentc_cmd

Microsoft, EliotSeattle, et al. (2022, August 18). REAgentC command-line options. Retrieved October 19, 2022.

Internal MISP references

UUID d26c830b-c196-5503-bf8c-4cfe90a6e7e5 which can be used as unique global reference for reagentc_cmd in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-10-19T00:00:00Z
date_published 2022-08-18T00:00:00Z
source MITRE
title REAgentC command-line options

Microsoft DART Case Report 001

Berk Veral. (2020, March 9). Real-life cybercrime stories from DART, the Microsoft Detection and Response Team. Retrieved May 27, 2022.

Internal MISP references

UUID bd8c6a86-1a63-49cd-a97f-3d119e4223d4 which can be used as unique global reference for Microsoft DART Case Report 001 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-27T00:00:00Z
date_published 2020-03-09T00:00:00Z
source MITRE
title Real-life cybercrime stories from DART, the Microsoft Detection and Response Team

RootDSE AD Detection 2022

Scarred Monk. (2022, May 6). Real-time detection scenarios in Active Directory environments. Retrieved August 5, 2024.

Internal MISP references

UUID 54dd37f8-b32a-5100-9197-4802ba9201d7 which can be used as unique global reference for RootDSE AD Detection 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-05T00:00:00Z
date_published 2022-05-06T00:00:00Z
source MITRE
title Real-time detection scenarios in Active Directory environments

Sans ARP Spoofing Aug 2003

Siles, R. (2003, August). Real World ARP Spoofing. Retrieved October 15, 2020.

Internal MISP references

UUID 1f9f5bfc-c044-4046-8586-39163a305c1e which can be used as unique global reference for Sans ARP Spoofing Aug 2003 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-15T00:00:00Z
date_published 2003-08-01T00:00:00Z
source MITRE
title Real World ARP Spoofing

Github CLI Create Webhook

Github. (n.d.). Receiving webhooks with the GitHub CLI. Retrieved August 4, 2023.

Internal MISP references

UUID 8ddee62e-adc0-5b28-b271-4b14b01f84c1 which can be used as unique global reference for Github CLI Create Webhook in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-04T00:00:00Z
source MITRE
title Receiving webhooks with the GitHub CLI

Kaspersky Cloud Atlas August 2019

GReAT. (2019, August 12). Recent Cloud Atlas activity. Retrieved May 8, 2020.

Internal MISP references

UUID 4c3ae600-0787-4847-b528-ae3e8ff1b5ef which can be used as unique global reference for Kaspersky Cloud Atlas August 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-08T00:00:00Z
date_published 2019-08-12T00:00:00Z
source MITRE
title Recent Cloud Atlas activity

Talos MuddyWater May 2019

Adamitis, D. et al. (2019, May 20). Recent MuddyWater-associated BlackWater campaign shows signs of new anti-detection techniques. Retrieved June 5, 2019.

Internal MISP references

UUID 5b8b6429-14ef-466b-b806-5603e694efc1 which can be used as unique global reference for Talos MuddyWater May 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-05T00:00:00Z
date_published 2019-05-20T00:00:00Z
source MITRE
title Recent MuddyWater-associated BlackWater campaign shows signs of new anti-detection techniques

Mandiant Pulse Secure Update May 2021

Perez, D. et al. (2021, May 27). Re-Checking Your Pulse: Updates on Chinese APT Actors Compromising Pulse Secure VPN Devices. Retrieved February 5, 2024.

Internal MISP references

UUID 5620adaf-c2a7-5f0f-ae70-554ce720426e which can be used as unique global reference for Mandiant Pulse Secure Update May 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-05T00:00:00Z
date_published 2021-05-27T00:00:00Z
source MITRE
title Re-Checking Your Pulse: Updates on Chinese APT Actors Compromising Pulse Secure VPN Devices

Free Desktop Entry Keys

Free Desktop. (2017, December 24). Recognized Desktop Entry Keys. Retrieved September 12, 2019.

Internal MISP references

UUID 4ffb9866-1cf4-46d1-b7e5-d75bd98de018 which can be used as unique global reference for Free Desktop Entry Keys in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-12T00:00:00Z
date_published 2017-12-24T00:00:00Z
source MITRE
title Recognized Desktop Entry Keys

Recorded Future APT3 May 2017

Insikt Group (Recorded Future). (2017, May 17). Recorded Future Research Concludes Chinese Ministry of State Security Behind APT3. Retrieved September 16, 2024.

Internal MISP references

UUID a894d79f-5977-4ef9-9aa5-7bfec795ceb2 which can be used as unique global reference for Recorded Future APT3 May 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-16T00:00:00Z
date_published 2017-05-17T00:00:00Z
source MITRE
title Recorded Future Research Concludes Chinese Ministry of State Security Behind APT3

Trend Micro Daserf Nov 2017

Chen, J. and Hsieh, M. (2017, November 7). REDBALDKNIGHT/BRONZE BUTLER’s Daserf Backdoor Now Using Steganography. Retrieved December 27, 2017.

Internal MISP references

UUID 4ca0e6a9-8c20-49a0-957a-7108083a8a29 which can be used as unique global reference for Trend Micro Daserf Nov 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-27T00:00:00Z
date_published 2017-11-07T00:00:00Z
source MITRE, Tidal Cyber
title REDBALDKNIGHT/BRONZE BUTLER’s Daserf Backdoor Now Using Steganography

Red Canary SocGholish March 2024

Red Canary. (2024, March). Red Canary 2024 Threat Detection Report: SocGholish. Retrieved March 22, 2024.

Internal MISP references

UUID 70fa26e4-109c-5a48-b9fd-ac8b9acf2cf3 which can be used as unique global reference for Red Canary SocGholish March 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-22T00:00:00Z
date_published 2024-03-01T00:00:00Z
source MITRE
title Red Canary 2024 Threat Detection Report: SocGholish

therecord_redcurl

Antoniuk, D. (2023, July 17). RedCurl hackers return to spy on 'major Russian bank,' Australian company. Retrieved August 9, 2024.

Internal MISP references

UUID c9561395-08eb-5e37-b9ba-154e08e2e1ab which can be used as unique global reference for therecord_redcurl in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-09T00:00:00Z
date_published 2023-07-17T00:00:00Z
source MITRE
title RedCurl hackers return to spy on 'major Russian bank,' Australian company

group-ib_redcurl2

Group-IB. (2021, November). RedCurl: The Awakening. Retrieved August 14, 2024.

Internal MISP references

UUID 1fc20d89-def2-5a1e-8e58-37383a019132 which can be used as unique global reference for group-ib_redcurl2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-14T00:00:00Z
date_published 2021-11-01T00:00:00Z
source MITRE
title RedCurl: The Awakening

group-ib_redcurl1

Group-IB. (2020, August). RedCurl: The Pentest You Didn’t Know About. Retrieved August 9, 2024.

Internal MISP references

UUID e9200100-cc58-5c30-b837-e6e73bfe2cbb which can be used as unique global reference for group-ib_redcurl1 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-09T00:00:00Z
date_published 2020-08-01T00:00:00Z
source MITRE
title RedCurl: The Pentest You Didn’t Know About

RHEL auditd

Jahoda, M. et al.. (2017, March 14). redhat Security Guide - Chapter 7 - System Auditing. Retrieved December 20, 2017.

Internal MISP references

UUID cdedab06-7745-4a5e-aa62-00ed81ccc8d0 which can be used as unique global reference for RHEL auditd in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-20T00:00:00Z
date_published 2017-03-14T00:00:00Z
source MITRE
title redhat Security Guide - Chapter 7 - System Auditing

Red Hat System Auditing

Jahoda, M. et al.. (2017, March 14). Red Hat Security Guide - Chapter 7 - System Auditing. Retrieved December 20, 2017.

Internal MISP references

UUID 599337b3-8587-5578-9be5-e6e4f0edd0ef which can be used as unique global reference for Red Hat System Auditing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-20T00:00:00Z
date_published 2017-03-14T00:00:00Z
source MITRE
title Red Hat Security Guide - Chapter 7 - System Auditing

Recorded Future RedHotel August 2023

Insikt Group. (2023, August 8). RedHotel: A Prolific, Chinese State-Sponsored Group Operating at a Global Scale. Retrieved March 11, 2024.

Internal MISP references

UUID 006715e1-9354-51aa-812b-21a33a37ebb4 which can be used as unique global reference for Recorded Future RedHotel August 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-11T00:00:00Z
date_published 2023-08-08T00:00:00Z
source MITRE
title RedHotel: A Prolific, Chinese State-Sponsored Group Operating at a Global Scale

Cylance Redirect to SMB

Cylance. (2015, April 13). Redirect to SMB. Retrieved December 21, 2017.

Internal MISP references

UUID 32c7626a-b284-424c-8294-7fac37e71336 which can be used as unique global reference for Cylance Redirect to SMB in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-21T00:00:00Z
date_published 2015-04-13T00:00:00Z
source MITRE
title Redirect to SMB

Black Hills Red Teaming MS AD Azure, 2018

Felch, M.. (2018, August 31). Red Teaming Microsoft Part 1 Active Directory Leaks via Azure. Retrieved October 6, 2019.

Internal MISP references

UUID 48971032-8fa2-40ff-adef-e91d7109b859 which can be used as unique global reference for Black Hills Red Teaming MS AD Azure, 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-06T00:00:00Z
date_published 2018-08-31T00:00:00Z
source MITRE
title Red Teaming Microsoft Part 1 Active Directory Leaks via Azure

OutFlank System Calls

de Plaa, C. (2019, June 19). Red Team Tactics: Combining Direct System Calls and sRDI to bypass AV/EDR. Retrieved September 29, 2021.

Internal MISP references

UUID c4c3370a-2d6b-4ebd-961e-58d584066377 which can be used as unique global reference for OutFlank System Calls in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-29T00:00:00Z
date_published 2019-06-19T00:00:00Z
source MITRE
title Red Team Tactics: Combining Direct System Calls and sRDI to bypass AV/EDR

US-CERT TA17-156A SNMP Abuse 2017

US-CERT. (2017, June 5). Reducing the Risk of SNMP Abuse. Retrieved October 19, 2020.

Internal MISP references

UUID 82b814f3-2853-48a9-93ff-701d16d97535 which can be used as unique global reference for US-CERT TA17-156A SNMP Abuse 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
date_published 2017-06-05T00:00:00Z
source MITRE
title Reducing the Risk of SNMP Abuse

Cloudflare ReflectionDoS May 2017

Marek Majkowsk, Cloudflare. (2017, May 24). Reflections on reflection (attacks). Retrieved April 23, 2019.

Internal MISP references

UUID a6914c13-f95f-4c30-a129-905ed43e3454 which can be used as unique global reference for Cloudflare ReflectionDoS May 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-23T00:00:00Z
date_published 2017-05-24T00:00:00Z
source MITRE
title Reflections on reflection (attacks)

Trend Micro

Karen Victor. (2020, May 18). Reflective Loading Runs Netwalker Fileless Ransomware. Retrieved September 30, 2022.

Internal MISP references

UUID 2d4cb6f1-bc44-454b-94c1-88a81324903e which can be used as unique global reference for Trend Micro in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-30T00:00:00Z
date_published 2020-05-18T00:00:00Z
source MITRE
title Reflective Loading Runs Netwalker Fileless Ransomware

Microsoft Reg

Microsoft. (2012, April 17). Reg. Retrieved May 1, 2015.

Internal MISP references

UUID 1e1b21bd-18b3-4c77-8eb8-911b028ab603 which can be used as unique global reference for Microsoft Reg in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-05-01T00:00:00Z
date_published 2012-04-17T00:00:00Z
source MITRE
title Reg

LOLBAS Regasm

LOLBAS. (n.d.). Regasm.exe. Retrieved July 31, 2019.

Internal MISP references

UUID b6a3356f-72c2-4ec2-a276-2432eb691055 which can be used as unique global reference for LOLBAS Regasm in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-07-31T00:00:00Z
source MITRE
title Regasm.exe

MSDN Regasm

Microsoft. (n.d.). Regasm.exe (Assembly Registration Tool). Retrieved July 1, 2016.

Internal MISP references

UUID 66a3de54-4a16-4b1b-b18f-e3842aeb7b40 which can be used as unique global reference for MSDN Regasm in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-07-01T00:00:00Z
source MITRE
title Regasm.exe (Assembly Registration Tool)

Microsoft RegDelNull July 2016

Russinovich, M. & Sharkey, K. (2016, July 4). RegDelNull v1.11. Retrieved August 10, 2018.

Internal MISP references

UUID d34d35ee-9d0b-4556-ad19-04cfa9001bf2 which can be used as unique global reference for Microsoft RegDelNull July 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-10T00:00:00Z
date_published 2016-07-04T00:00:00Z
source MITRE
title RegDelNull v1.11

Regedit.exe - LOLBAS Project

LOLBAS. (2018, May 25). Regedit.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 86e47198-751b-4754-8741-6dd8f2960416 which can be used as unique global reference for Regedit.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Regedit.exe

Reg.exe - LOLBAS Project

LOLBAS. (2018, May 25). Reg.exe. Retrieved December 4, 2023.

Internal MISP references

UUID ba0e31a1-125b-43c3-adf0-567ca393eeab which can be used as unique global reference for Reg.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Reg.exe

Microsoft Reghide NOV 2006

Russinovich, M. & Sharkey, K. (2006, January 10). Reghide. Retrieved August 9, 2018.

Internal MISP references

UUID 42503ec7-f5da-4116-a3b3-a1b18a66eed3 which can be used as unique global reference for Microsoft Reghide NOV 2006 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-09T00:00:00Z
date_published 2006-01-10T00:00:00Z
source MITRE
title Reghide

Regini.exe - LOLBAS Project

LOLBAS. (2020, July 3). Regini.exe. Retrieved December 4, 2023.

Internal MISP references

UUID db2573d2-6ecd-4c5a-b038-2f799f9723ae which can be used as unique global reference for Regini.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2020-07-03T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Regini.exe

Register-cimprovider.exe - LOLBAS Project

LOLBAS. (2018, May 25). Register-cimprovider.exe. Retrieved December 4, 2023.

Internal MISP references

UUID d445d016-c4f1-45c8-929d-913867275417 which can be used as unique global reference for Register-cimprovider.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Register-cimprovider.exe

Microsoft Registry

Microsoft. (2018, May 31). Registry. Retrieved September 29, 2021.

Internal MISP references

UUID 08dc94ff-a289-45bd-93c2-1183fd507493 which can be used as unique global reference for Microsoft Registry in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-29T00:00:00Z
date_published 2018-05-31T00:00:00Z
source MITRE
title Registry

Tilbury 2014

Tilbury, C. (2014, August 28). Registry Analysis with CrowdResponse. Retrieved November 12, 2014.

Internal MISP references

UUID 136325ee-0712-49dd-b3ab-a6f2bfb218b0 which can be used as unique global reference for Tilbury 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-12T00:00:00Z
date_published 2014-08-28T00:00:00Z
source MITRE
title Registry Analysis with CrowdResponse

Microsoft COR_PROFILER Feb 2013

Microsoft. (2013, February 4). Registry-Free Profiler Startup and Attach. Retrieved June 24, 2020.

Internal MISP references

UUID 4e85ef68-dfb7-4db3-ac76-92f4b78cb1cd which can be used as unique global reference for Microsoft COR_PROFILER Feb 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-24T00:00:00Z
date_published 2013-02-04T00:00:00Z
source MITRE
title Registry-Free Profiler Startup and Attach

Microsoft Registry Auditing Aug 2016

Microsoft. (2016, August 31). Registry (Global Object Access Auditing). Retrieved January 31, 2018.

Internal MISP references

UUID f58ac1e4-c470-4aac-a077-7f358e25b0fa which can be used as unique global reference for Microsoft Registry Auditing Aug 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-31T00:00:00Z
date_published 2016-08-31T00:00:00Z
source MITRE
title Registry (Global Object Access Auditing)

Registry Key Security

Microsoft. (2018, May 31). Registry Key Security and Access Rights. Retrieved March 16, 2017.

Internal MISP references

UUID f8f12cbb-029c-48b1-87ce-624a7f98c8ab which can be used as unique global reference for Registry Key Security in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-16T00:00:00Z
date_published 2018-05-31T00:00:00Z
source MITRE
title Registry Key Security and Access Rights

MSDN Registry Key Security

Microsoft. (n.d.). Registry Key Security and Access Rights. Retrieved March 16, 2017.

Internal MISP references

UUID c5627d86-1b59-4c2a-aac0-88f1b4dc6974 which can be used as unique global reference for MSDN Registry Key Security in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-16T00:00:00Z
source MITRE
title Registry Key Security and Access Rights

Microsoft Registry Drivers

Microsoft. (2021, December 14). Registry Trees for Devices and Drivers. Retrieved March 28, 2023.

Internal MISP references

UUID 4bde767e-d4a7-56c5-9aa3-b3f3cc2e3e70 which can be used as unique global reference for Microsoft Registry Drivers in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-28T00:00:00Z
date_published 2021-12-14T00:00:00Z
source MITRE
title Registry Trees for Devices and Drivers

Microsoft System Wide Com Keys

Microsoft. (n.d.). Registry Values for System-Wide Security. Retrieved November 21, 2017.

Internal MISP references

UUID e0836ebc-66fd-46ac-adf6-727b46f2fb38 which can be used as unique global reference for Microsoft System Wide Com Keys in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-21T00:00:00Z
source MITRE
title Registry Values for System-Wide Security

LOLBAS Regsvcs

LOLBAS. (n.d.). Regsvcs.exe. Retrieved July 31, 2019.

Internal MISP references

UUID 3f669f4c-0b94-4b78-ad3e-fd62f7600902 which can be used as unique global reference for LOLBAS Regsvcs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-07-31T00:00:00Z
source MITRE
title Regsvcs.exe

MSDN Regsvcs

Microsoft. (n.d.). Regsvcs.exe (.NET Services Installation Tool). Retrieved July 1, 2016.

Internal MISP references

UUID 4f3651df-159e-4006-8cb6-de0d0712a194 which can be used as unique global reference for MSDN Regsvcs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-07-01T00:00:00Z
source MITRE
title Regsvcs.exe (.NET Services Installation Tool)

LOLBAS Regsvr32

LOLBAS. (n.d.). Regsvr32.exe. Retrieved July 31, 2019.

Internal MISP references

UUID 8e32abef-534e-475a-baad-946b6ec681c1 which can be used as unique global reference for LOLBAS Regsvr32 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-07-31T00:00:00Z
source MITRE
title Regsvr32.exe

Fortinet Remcos Feb 2017

Bacurio, F., Salvio, J. (2017, February 14). REMCOS: A New RAT In The Wild. Retrieved November 6, 2018.

Internal MISP references

UUID c4d5d6e7-47c0-457a-b396-53d34f87e444 which can be used as unique global reference for Fortinet Remcos Feb 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-06T00:00:00Z
date_published 2017-02-14T00:00:00Z
source MITRE
title REMCOS: A New RAT In The Wild

Mandiant Remediation and Hardening Strategies for Microsoft 365

Mandiant. (2022, August). Remediation and Hardening Strategies for Microsoft 365 to Defend Against APT29. Retrieved February 21, 2023.

Internal MISP references

UUID 4054604b-7c0f-5012-b40c-2b117f6b54c2 which can be used as unique global reference for Mandiant Remediation and Hardening Strategies for Microsoft 365 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-21T00:00:00Z
date_published 2022-08-01T00:00:00Z
source MITRE
title Remediation and Hardening Strategies for Microsoft 365 to Defend Against APT29

Mandiant Defend UNC2452 White Paper

Mandiant. (2021, January 19). Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452. Retrieved January 22, 2021.

Internal MISP references

UUID ed031297-d0f5-44a7-9723-ba692e923a6e which can be used as unique global reference for Mandiant Defend UNC2452 White Paper in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-22T00:00:00Z
date_published 2021-01-19T00:00:00Z
source MITRE
title Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452

Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452

Mike Burns, Matthew McWhirt, Douglas Bienstock, Nick Bennett. (2021, January 19). Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452. Retrieved September 25, 2021.

Internal MISP references

UUID 7aa5c294-df8e-4994-9b9e-69444d75ef37 which can be used as unique global reference for Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-25T00:00:00Z
date_published 2021-01-19T00:00:00Z
source MITRE
title Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452

TechNet Remote Desktop Services

Microsoft. (n.d.). Remote Desktop Services. Retrieved June 1, 2016.

Internal MISP references

UUID b8fc1bdf-f602-4a9b-a51c-fa49e70f24cd which can be used as unique global reference for TechNet Remote Desktop Services in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-01T00:00:00Z
source MITRE
title Remote Desktop Services

Remote.exe - LOLBAS Project

LOLBAS. (2021, June 1). Remote.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 9a298f83-80b8-45a3-9f63-6119be6621b4 which can be used as unique global reference for Remote.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-06-01T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Remote.exe

Microsoft Remote Use of Local

Margosis, A.. (2018, December 10). Remote Use of Local Accounts: LAPS Changes Everything. Retrieved March 13, 2020.

Internal MISP references

UUID 2239d595-4b80-4828-9d06-f8de221f9534 which can be used as unique global reference for Microsoft Remote Use of Local in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-13T00:00:00Z
date_published 2018-12-10T00:00:00Z
source MITRE
title Remote Use of Local Accounts: LAPS Changes Everything

SigmaHQ

Sittikorn S. (2022, April 15). Removal Of SD Value to Hide Schedule Task - Registry. Retrieved June 1, 2022.

Internal MISP references

UUID 27812e3f-9177-42ad-8681-91c65aba4743 which can be used as unique global reference for SigmaHQ in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-01T00:00:00Z
date_published 2022-04-15T00:00:00Z
source MITRE
title Removal Of SD Value to Hide Schedule Task - Registry

disable_win_evt_logging

Heiligenstein, L. (n.d.). REP-25: Disable Windows Event Logging. Retrieved April 7, 2022.

Internal MISP references

UUID 408c0c8c-5d8e-5ebe-bd31-81b405c615d8 which can be used as unique global reference for disable_win_evt_logging in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-07T00:00:00Z
source MITRE
title REP-25: Disable Windows Event Logging

Microsoft Replace Process Token

Brower, N., Lich, B. (2017, April 19). Replace a process level token. Retrieved December 19, 2017.

Internal MISP references

UUID 75130a36-e859-438b-9536-410c2831b2de which can be used as unique global reference for Microsoft Replace Process Token in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-19T00:00:00Z
date_published 2017-04-19T00:00:00Z
source MITRE
title Replace a process level token

Replace.exe - LOLBAS Project

LOLBAS. (2018, May 25). Replace.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 82a473e9-208c-4c47-bf38-92aee43238dd which can be used as unique global reference for Replace.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Replace.exe

Bugcrowd Replay Attack

Bugcrowd. (n.d.). Replay Attack. Retrieved September 27, 2023.

Internal MISP references

UUID ed31056c-23cb-5cb0-9b70-f363c54b27f7 which can be used as unique global reference for Bugcrowd Replay Attack in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-27T00:00:00Z
source MITRE
title Replay Attack

Mac Forwarding Rules

Apple. (n.d.). Reply to, forward, or redirect emails in Mail on Mac. Retrieved June 22, 2021.

Internal MISP references

UUID 0ff40575-cd2d-4a70-a07b-fff85f520062 which can be used as unique global reference for Mac Forwarding Rules in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-22T00:00:00Z
source MITRE
title Reply to, forward, or redirect emails in Mail on Mac

GitHub Reptile

Augusto, I. (2018, March 8). Reptile - LMK Linux rootkit. Retrieved April 9, 2018.

Internal MISP references

UUID 6e8cc88a-fb3f-4464-9380-868f597def6e which can be used as unique global reference for GitHub Reptile in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-09T00:00:00Z
date_published 2018-03-08T00:00:00Z
source MITRE
title Reptile - LMK Linux rootkit

AWS Temporary Security Credentials

AWS. (n.d.). Requesting temporary security credentials. Retrieved April 1, 2022.

Internal MISP references

UUID c6f29134-5af2-42e1-af4f-fbb9eae03432 which can be used as unique global reference for AWS Temporary Security Credentials in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-01T00:00:00Z
source MITRE
title Requesting temporary security credentials

ARS Technica China Hack SK April 2017

Sean Gallagher. (2017, April 21). Researchers claim China trying to hack South Korea missile defense efforts. Retrieved October 17, 2021.

Internal MISP references

UUID c9c647b6-f4fb-44d6-9376-23c1ae9520b4 which can be used as unique global reference for ARS Technica China Hack SK April 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-17T00:00:00Z
date_published 2017-04-21T00:00:00Z
source MITRE, Tidal Cyber
title Researchers claim China trying to hack South Korea missile defense efforts

Wired SandCat Oct 2019

Zetter, K. (2019, October 3). Researchers Say They Uncovered Uzbekistan Hacking Operations Due to Spectacularly Bad OPSEC. Retrieved October 15, 2020.

Internal MISP references

UUID 5f28adee-1313-48ec-895c-27341bd1071f which can be used as unique global reference for Wired SandCat Oct 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-15T00:00:00Z
date_published 2019-10-03T00:00:00Z
source MITRE
title Researchers Say They Uncovered Uzbekistan Hacking Operations Due to Spectacularly Bad OPSEC

Vincens AcidPour 2024

A.J. Vincens, CyberScoop. (2024, March 18). Researchers spot updated version of malware that hit Viasat. Retrieved March 25, 2024.

Internal MISP references

UUID 742c8a5c-21e5-58d8-a90d-f4c186c0699a which can be used as unique global reference for Vincens AcidPour 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-25T00:00:00Z
date_published 2024-03-18T00:00:00Z
source MITRE
title Researchers spot updated version of malware that hit Viasat

MSitPros CMSTP Aug 2017

Moe, O. (2017, August 15). Research on CMSTP.exe. Retrieved April 11, 2018.

Internal MISP references

UUID 8dbbf13b-e73c-43c2-a053-7b07fdf25c85 which can be used as unique global reference for MSitPros CMSTP Aug 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-11T00:00:00Z
date_published 2017-08-15T00:00:00Z
source MITRE
title Research on CMSTP.exe

sentinellabs resource named fork 2020

Phil Stokes. (2020, November 5). Resourceful macOS Malware Hides in Named Fork. Retrieved October 12, 2021.

Internal MISP references

UUID 0008dfd8-25a1-4e6a-9154-da7bcbb7daa7 which can be used as unique global reference for sentinellabs resource named fork 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-12T00:00:00Z
date_published 2020-11-05T00:00:00Z
source MITRE
title Resourceful macOS Malware Hides in Named Fork

GitHub Responder

Gaffie, L. (2016, August 25). Responder. Retrieved November 17, 2017.

Internal MISP references

UUID 3ef681a9-4ab0-420b-9d1a-b8152c50b3ca which can be used as unique global reference for GitHub Responder in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-17T00:00:00Z
date_published 2016-08-25T00:00:00Z
source MITRE
title Responder

Mandiant UNC2589 March 2022

Sadowski, J; Hall, R. (2022, March 4). Responses to Russia's Invasion of Ukraine Likely to Spur Retaliation. Retrieved June 9, 2022.

Internal MISP references

UUID 63d89139-9dd4-4ed6-bf6e-8cd872c5d034 which can be used as unique global reference for Mandiant UNC2589 March 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-09T00:00:00Z
date_published 2022-03-04T00:00:00Z
source MITRE
title Responses to Russia's Invasion of Ukraine Likely to Spur Retaliation

CrowdStrike BGH Ransomware 2021

Falcon Complete Team. (2021, May 11). Response When Minutes Matter: Rising Up Against Ransomware. Retrieved October 8, 2021.

Internal MISP references

UUID a4cb3caf-e7ef-4662-93c6-63a0c3352a32 which can be used as unique global reference for CrowdStrike BGH Ransomware 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-08T00:00:00Z
date_published 2021-05-11T00:00:00Z
source MITRE
title Response When Minutes Matter: Rising Up Against Ransomware

Google - Restore Cloud Snapshot

Google. (2019, October 7). Restoring and deleting persistent disk snapshots. Retrieved October 8, 2019.

Internal MISP references

UUID ffa46676-518e-4fef-965d-e91efae95dfc which can be used as unique global reference for Google - Restore Cloud Snapshot in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-08T00:00:00Z
date_published 2019-10-07T00:00:00Z
source MITRE
title Restoring and deleting persistent disk snapshots

Google Instances Resource

Google. (n.d.). Rest Resource: instance. Retrieved March 3, 2020.

Internal MISP references

UUID 9733447c-072f-4da8-9cc7-0a0ce6a3b820 which can be used as unique global reference for Google Instances Resource in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-03T00:00:00Z
source MITRE
title Rest Resource: instance

Secureworks IRON LIBERTY July 2019

Secureworks. (2019, July 24). Resurgent Iron Liberty Targeting Energy Sector. Retrieved August 12, 2020.

Internal MISP references

UUID c666200d-5392-43f2-9ad0-1268d7b2e86f which can be used as unique global reference for Secureworks IRON LIBERTY July 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-12T00:00:00Z
date_published 2019-07-24T00:00:00Z
source MITRE, Tidal Cyber
title Resurgent Iron Liberty Targeting Energy Sector

Palo Alto Retefe

Levene, B., Falcone, R., Grunzweig, J., Lee, B., Olson, R. (2015, August 20). Retefe Banking Trojan Targets Sweden, Switzerland and Japan. Retrieved July 3, 2017.

Internal MISP references

UUID 52f841b0-10a8-4f48-8265-5b336489ff80 which can be used as unique global reference for Palo Alto Retefe in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-03T00:00:00Z
date_published 2015-08-20T00:00:00Z
source MITRE
title Retefe Banking Trojan Targets Sweden, Switzerland and Japan

AWS Secrets Manager

AWS. (n.d.). Retrieve secrets from AWS Secrets Manager. Retrieved September 25, 2023.

Internal MISP references

UUID ec87e183-3018-5cac-9fab-711003be54f7 which can be used as unique global reference for AWS Secrets Manager in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-25T00:00:00Z
source MITRE
title Retrieve secrets from AWS Secrets Manager

Directory Services Internals DPAPI Backup Keys Oct 2015

Grafnetter, M. (2015, October 26). Retrieving DPAPI Backup Keys from Active Directory. Retrieved December 19, 2017.

Internal MISP references

UUID e48dc4ce-e7c5-44e4-b033-7ab4bbdbe1cb which can be used as unique global reference for Directory Services Internals DPAPI Backup Keys Oct 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-19T00:00:00Z
date_published 2015-10-26T00:00:00Z
source MITRE
title Retrieving DPAPI Backup Keys from Active Directory

Malwarebytes RokRAT VBA January 2021

Jazi, Hossein. (2021, January 6). Retrohunting APT37: North Korean APT used VBA self decode technique to inject RokRat. Retrieved March 22, 2022.

Internal MISP references

UUID 62ad7dbc-3ed2-4fa5-a56a-2810ce131167 which can be used as unique global reference for Malwarebytes RokRAT VBA January 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-22T00:00:00Z
date_published 2021-01-06T00:00:00Z
source MITRE
title Retrohunting APT37: North Korean APT used VBA self decode technique to inject RokRat

TCC Database

Marina Liang. (2024, April 23). Return of the mac(OS): Transparency, Consent, and Control (TCC) Database Manipulation. Retrieved March 28, 2024.

Internal MISP references

UUID 4929c08e-cc20-5f85-8ae0-6bb691ce7917 which can be used as unique global reference for TCC Database in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-28T00:00:00Z
date_published 2024-04-23T00:00:00Z
source MITRE
title Return of the mac(OS): Transparency, Consent, and Control (TCC) Database Manipulation

jRAT Symantec Aug 2018

Sharma, R. (2018, August 15). Revamped jRAT Uses New Anti-Parsing Techniques. Retrieved September 21, 2018.

Internal MISP references

UUID 8aed9534-2ec6-4c9f-b63b-9bb135432cfb which can be used as unique global reference for jRAT Symantec Aug 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-09-21T00:00:00Z
date_published 2018-08-15T00:00:00Z
source MITRE
title Revamped jRAT Uses New Anti-Parsing Techniques

Sygnia Emperor Dragonfly October 2022

Biderman, O. et al. (2022, October 3). REVEALING EMPEROR DRAGONFLY: NIGHT SKY AND CHEERSCRYPT - A SINGLE RANSOMWARE GROUP. Retrieved December 6, 2023.

Internal MISP references

UUID f9e40a71-c963-53de-9266-13f9f326c5bf which can be used as unique global reference for Sygnia Emperor Dragonfly October 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-06T00:00:00Z
date_published 2022-10-03T00:00:00Z
source MITRE
title REVEALING EMPEROR DRAGONFLY: NIGHT SKY AND CHEERSCRYPT - A SINGLE RANSOMWARE GROUP

Morphisec Snip3 May 2021

Lorber, N. (2021, May 7). Revealing the Snip3 Crypter, a Highly Evasive RAT Loader. Retrieved September 13, 2023.

Internal MISP references

UUID abe44c50-8347-5c98-8b04-d41afbe59d4c which can be used as unique global reference for Morphisec Snip3 May 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-13T00:00:00Z
date_published 2021-05-07T00:00:00Z
source MITRE
title Revealing the Snip3 Crypter, a Highly Evasive RAT Loader

Microsoft DUBNIUM June 2016

Microsoft. (2016, June 9). Reverse-engineering DUBNIUM. Retrieved March 31, 2021.

Internal MISP references

UUID ae28afad-e2d6-4c3c-a309-ee7c44a3e586 which can be used as unique global reference for Microsoft DUBNIUM June 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-31T00:00:00Z
date_published 2016-06-09T00:00:00Z
source MITRE
title Reverse-engineering DUBNIUM

Microsoft DUBNIUM Flash June 2016

Microsoft. (2016, June 20). Reverse-engineering DUBNIUM’s Flash-targeting exploit. Retrieved March 31, 2021.

Internal MISP references

UUID 999a471e-6373-463b-a77b-d3020b4a8702 which can be used as unique global reference for Microsoft DUBNIUM Flash June 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-31T00:00:00Z
date_published 2016-06-20T00:00:00Z
source MITRE
title Reverse-engineering DUBNIUM’s Flash-targeting exploit

Microsoft DUBNIUM July 2016

Microsoft. (2016, July 14). Reverse engineering DUBNIUM – Stage 2 payload analysis . Retrieved March 31, 2021.

Internal MISP references

UUID e1bd8fb3-e0b4-4659-85a1-d37e1c3d167f which can be used as unique global reference for Microsoft DUBNIUM July 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-31T00:00:00Z
date_published 2016-07-14T00:00:00Z
source MITRE
title Reverse engineering DUBNIUM – Stage 2 payload analysis

CSRB LAPSUS$ July 24 2023

Cyber Safety Review Board. (2023, July 24). Review of the Attacks Associated with LAPSUS$ and Related Threat Groups. Retrieved November 16, 2023.

Internal MISP references

UUID f8311977-303c-4d05-a7f4-25b3ae36318b which can be used as unique global reference for CSRB LAPSUS$ July 24 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-11-16T00:00:00Z
date_published 2023-07-24T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Review of the Attacks Associated with LAPSUS$ and Related Threat Groups

Intel 471 REvil March 2020

Intel 471 Malware Intelligence team. (2020, March 31). REvil Ransomware-as-a-Service – An analysis of a ransomware affiliate operation. Retrieved August 4, 2020.

Internal MISP references

UUID b939dc98-e00e-4d47-84a4-3eaaeb5c0abf which can be used as unique global reference for Intel 471 REvil March 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-04T00:00:00Z
date_published 2020-03-31T00:00:00Z
source MITRE
title REvil Ransomware-as-a-Service – An analysis of a ransomware affiliate operation

BleepingComputer REvil 2021

Abrams, L. (2021, March 19). REvil ransomware has a new ‘Windows Safe Mode’ encryption mode. Retrieved June 23, 2021.

Internal MISP references

UUID 790ef274-aea4-49b7-8b59-1b95185c5f50 which can be used as unique global reference for BleepingComputer REvil 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-23T00:00:00Z
date_published 2021-03-19T00:00:00Z
source MITRE
title REvil ransomware has a new ‘Windows Safe Mode’ encryption mode

Secureworks REvil September 2019

Counter Threat Unit Research Team. (2019, September 24). REvil/Sodinokibi Ransomware. Retrieved August 4, 2020.

Internal MISP references

UUID 8f4e2baf-4227-4bbd-bfdb-5598717dcf88 which can be used as unique global reference for Secureworks REvil September 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-04T00:00:00Z
date_published 2019-09-24T00:00:00Z
source MITRE, Tidal Cyber
title REvil/Sodinokibi Ransomware

Secureworks GandCrab and REvil September 2019

Secureworks . (2019, September 24). REvil: The GandCrab Connection. Retrieved August 4, 2020.

Internal MISP references

UUID 46b5d57b-17be-48ff-b723-406f6a55d84a which can be used as unique global reference for Secureworks GandCrab and REvil September 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-04T00:00:00Z
date_published 2019-09-24T00:00:00Z
source MITRE
title REvil: The GandCrab Connection

Enigma Reviving DDE Jan 2018

Nelson, M. (2018, January 29). Reviving DDE: Using OneNote and Excel for Code Execution. Retrieved February 3, 2018.

Internal MISP references

UUID 188a0f02-8d1e-4e4e-b2c0-ddf1bf1bdf93 which can be used as unique global reference for Enigma Reviving DDE Jan 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-03T00:00:00Z
date_published 2018-01-29T00:00:00Z
source MITRE
title Reviving DDE: Using OneNote and Excel for Code Execution

GitHub Revoke-Obfuscation

Bohannon, D. (2017, July 27). Revoke-Obfuscation. Retrieved February 12, 2018.

Internal MISP references

UUID 3624d75e-be50-4c10-9e8a-28523568ff9f which can be used as unique global reference for GitHub Revoke-Obfuscation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-12T00:00:00Z
date_published 2017-07-27T00:00:00Z
source MITRE
title Revoke-Obfuscation

FireEye Revoke-Obfuscation July 2017

Bohannon, D. & Holmes, L. (2017, July 27). Revoke-Obfuscation: PowerShell Obfuscation Detection Using Science. Retrieved February 12, 2018.

Internal MISP references

UUID e03e9d19-18bb-4d28-8c96-8c1cef89a20b which can be used as unique global reference for FireEye Revoke-Obfuscation July 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-12T00:00:00Z
date_published 2017-07-27T00:00:00Z
source MITRE
title Revoke-Obfuscation: PowerShell Obfuscation Detection Using Science

Recorded Future Rhadamanthys September 26 2024

Insikt Group. (2024, September 26). Rhadamanthys Stealer Adds Innovative AI Feature in Version 0.7.0. Retrieved October 14, 2024.

Internal MISP references

UUID 5e668cd3-5a5d-4b40-9d4b-6108489a9a91 which can be used as unique global reference for Recorded Future Rhadamanthys September 26 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-14T00:00:00Z
date_published 2024-09-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Rhadamanthys Stealer Adds Innovative AI Feature in Version 0.7.0

HC3 Analyst Note Rhysida Ransomware August 2023

Health Sector Cybersecurity Coordination Center (HC3). (2023, August 4). Rhysida Ransomware. Retrieved August 11, 2023.

Internal MISP references

UUID 3f6e2821-5073-4382-b5dd-08676eaa2240 which can be used as unique global reference for HC3 Analyst Note Rhysida Ransomware August 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-11T00:00:00Z
date_published 2023-08-04T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Rhysida Ransomware

SentinelOne Rhysida June 29 2023

Alex Delamotte, Jim Walter. (2023, June 29). Rhysida Ransomware | RaaS Crawls Out of Crimeware Undergrowth to Attack Chilean Army. Retrieved August 11, 2023.

Internal MISP references

UUID 4fa2a841-71e8-4733-8622-cc068d077ad9 which can be used as unique global reference for SentinelOne Rhysida June 29 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-11T00:00:00Z
date_published 2023-06-29T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Rhysida Ransomware

Prodaft RIG February 2023

PTI Team. (2023, February 27). [RIG] RIG Exploit Kit: In-Depth Analysis. Retrieved May 8, 2023.

Internal MISP references

UUID 13ed0c11-f258-47d8-9253-8bd13661c2a9 which can be used as unique global reference for Prodaft RIG February 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-08T00:00:00Z
date_published 2023-02-27T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title [RIG] RIG Exploit Kit: In-Depth Analysis

Microsoft XorDdos Linux Stealth 2022

Microsoft Threat Intelligence. (2022, May 19). Rise in XorDdos: A deeper look at the stealthy DDoS malware targeting Linux devices. Retrieved September 27, 2023.

Internal MISP references

UUID 6425d351-2c88-5af9-970a-4d0d184d0c70 which can be used as unique global reference for Microsoft XorDdos Linux Stealth 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-27T00:00:00Z
date_published 2022-05-19T00:00:00Z
source MITRE
title Rise in XorDdos: A deeper look at the stealthy DDoS malware targeting Linux devices

httrack_unhcr

RISKIQ. (2022, March 15). RiskIQ Threat Intelligence Roundup: Campaigns Targeting Ukraine and Global Malware Infrastructure. Retrieved July 29, 2022.

Internal MISP references

UUID a4a3fd3d-1c13-40e5-b462-fa69a1861986 which can be used as unique global reference for httrack_unhcr in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-29T00:00:00Z
date_published 2022-03-15T00:00:00Z
source MITRE
title RiskIQ Threat Intelligence Roundup: Campaigns Targeting Ukraine and Global Malware Infrastructure

US-CERT Alert TA13-175A Risks of Default Passwords on the Internet

US-CERT. (n.d.). Risks of Default Passwords on the Internet. Retrieved April 12, 2019.

Internal MISP references

UUID 0c365c3f-3aa7-4c63-b96e-7716b95db049 which can be used as unique global reference for US-CERT Alert TA13-175A Risks of Default Passwords on the Internet in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-12T00:00:00Z
source MITRE
title Risks of Default Passwords on the Internet

Mandiant ROADSWEEP August 2022

Jenkins, L. at al. (2022, August 4). ROADSWEEP Ransomware - Likely Iranian Threat Actor Conducts Politically Motivated Disruptive Activity Against Albanian Government Organizations. Retrieved August 6, 2024.

Internal MISP references

UUID 0d81ec58-2e12-5824-aa53-feb0d2260f30 which can be used as unique global reference for Mandiant ROADSWEEP August 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-06T00:00:00Z
date_published 2022-08-04T00:00:00Z
source MITRE
title ROADSWEEP Ransomware - Likely Iranian Threat Actor Conducts Politically Motivated Disruptive Activity Against Albanian Government Organizations

ROADtools Github

Dirk-jan Mollema. (2022, January 31). ROADtools. Retrieved January 31, 2022.

Internal MISP references

UUID 90c592dc-2c9d-401a-96ab-b539f7522956 which can be used as unique global reference for ROADtools Github in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-31T00:00:00Z
date_published 2022-01-31T00:00:00Z
source MITRE
title ROADtools

Harmj0y Roasting AS-REPs Jan 2017

HarmJ0y. (2017, January 17). Roasting AS-REPs. Retrieved September 23, 2024.

Internal MISP references

UUID bfb01fbf-4dc0-4943-8a21-457f28f4b01f which can be used as unique global reference for Harmj0y Roasting AS-REPs Jan 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-23T00:00:00Z
date_published 2017-01-17T00:00:00Z
source MITRE
title Roasting AS-REPs

Register Robots TXT 2015

Darren Pauli. (2015, May 19). Robots.txt tells hackers the places you don't want them to look. Retrieved July 18, 2024.

Internal MISP references

UUID 0027a941-bc2d-54e3-9adf-85333d68b244 which can be used as unique global reference for Register Robots TXT 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-18T00:00:00Z
date_published 2015-05-19T00:00:00Z
source MITRE
title Robots.txt tells hackers the places you don't want them to look

Anomali Rocke March 2019

Anomali Labs. (2019, March 15). Rocke Evolves Its Arsenal With a New Malware Family Written in Golang. Retrieved April 24, 2019.

Internal MISP references

UUID 31051c8a-b523-4b8e-b834-2168c59e783b which can be used as unique global reference for Anomali Rocke March 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-24T00:00:00Z
date_published 2019-03-15T00:00:00Z
source MITRE
title Rocke Evolves Its Arsenal With a New Malware Family Written in Golang

Talos Rocke August 2018

Liebenberg, D.. (2018, August 30). Rocke: The Champion of Monero Miners. Retrieved May 26, 2020.

Internal MISP references

UUID bff0ee40-e583-4f73-a013-4669ca576904 which can be used as unique global reference for Talos Rocke August 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-26T00:00:00Z
date_published 2018-08-30T00:00:00Z
source MITRE, Tidal Cyber
title Rocke: The Champion of Monero Miners

Check Point Rocket Kitten

Check Point Software Technologies. (2015). ROCKET KITTEN: A CAMPAIGN WITH 9 LIVES. Retrieved March 16, 2018.

Internal MISP references

UUID 71da7d4c-f1f8-4f5c-a609-78a414851baf which can be used as unique global reference for Check Point Rocket Kitten in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-16T00:00:00Z
date_published 2015-01-01T00:00:00Z
source MITRE
title ROCKET KITTEN: A CAMPAIGN WITH 9 LIVES

NCCGroup RokRat Nov 2018

Pantazopoulos, N.. (2018, November 8). RokRat Analysis. Retrieved May 21, 2020.

Internal MISP references

UUID bcad3b27-858f-4c1d-a24c-dbc4dcee3cdc which can be used as unique global reference for NCCGroup RokRat Nov 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-21T00:00:00Z
date_published 2018-11-08T00:00:00Z
source MITRE
title RokRat Analysis

Talos ROKRAT 2

Mercer, W., Rascagneres, P. (2017, November 28). ROKRAT Reloaded. Retrieved May 21, 2018.

Internal MISP references

UUID 116f6565-d36d-4d01-9a97-a40cf589afa9 which can be used as unique global reference for Talos ROKRAT 2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-05-21T00:00:00Z
date_published 2017-11-28T00:00:00Z
source MITRE
title ROKRAT Reloaded

Kubernetes RBAC

Kubernetes. (n.d.). Role Based Access Control Good Practices. Retrieved March 8, 2023.

Internal MISP references

UUID 37c0e0e1-cc4d-5a93-b8a0-224f031b7324 which can be used as unique global reference for Kubernetes RBAC in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-08T00:00:00Z
source MITRE
title Role Based Access Control Good Practices

Google Cloud Service Account Authentication Roles

Google Cloud. (n.d.). Roles for service account authentication. Retrieved July 10, 2023.

Internal MISP references

UUID 525a8afc-64e9-5cc3-9c56-95da9811da0d which can be used as unique global reference for Google Cloud Service Account Authentication Roles in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-10T00:00:00Z
source MITRE
title Roles for service account authentication

BBC-Ronin

Joe Tidy. (2022, March 30). Ronin Network: What a $600m hack says about the state of crypto. Retrieved August 18, 2023.

Internal MISP references

UUID 8e162e39-a58f-5ba0-9a8e-101d4cfa324c which can be used as unique global reference for BBC-Ronin in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-18T00:00:00Z
date_published 2022-03-30T00:00:00Z
source MITRE
title Ronin Network: What a $600m hack says about the state of crypto

Wikipedia Root Certificate

Wikipedia. (2016, December 6). Root certificate. Retrieved February 20, 2017.

Internal MISP references

UUID 68b9ccbb-906e-4f06-b5bd-3969723c3616 which can be used as unique global reference for Wikipedia Root Certificate in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-02-20T00:00:00Z
date_published 2016-12-06T00:00:00Z
source MITRE
title Root certificate

Wikipedia Rootkit

Wikipedia. (2016, June 1). Rootkit. Retrieved June 2, 2016.

Internal MISP references

UUID 7e877b6b-9873-48e2-b138-e02dcb5268ca which can be used as unique global reference for Wikipedia Rootkit in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-02T00:00:00Z
date_published 2016-06-01T00:00:00Z
source MITRE
title Rootkit

Sekoia HideDRV Oct 2016

Rascagnères, P.. (2016, October 27). Rootkit analysis: Use case on HideDRV. Retrieved March 9, 2017.

Internal MISP references

UUID c383811d-c036-4fe7-add8-b4d4f73b3ce4 which can be used as unique global reference for Sekoia HideDRV Oct 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-09T00:00:00Z
date_published 2016-10-27T00:00:00Z
source MITRE
title Rootkit analysis: Use case on HideDRV

RotaJakiro 2021 netlab360 analysis

Alex Turing, Hui Wang. (2021, April 28). RotaJakiro: A long live secret backdoor with 0 VT detection. Retrieved June 14, 2023.

Internal MISP references

UUID 7a9c53dd-2c0e-5452-9ee2-01531fbf8ba8 which can be used as unique global reference for RotaJakiro 2021 netlab360 analysis in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-14T00:00:00Z
date_published 2021-04-28T00:00:00Z
source MITRE
title RotaJakiro: A long live secret backdoor with 0 VT detection

netlab360 rotajakiro vs oceanlotus

Alex Turing. (2021, May 6). RotaJakiro, the Linux version of the OceanLotus. Retrieved June 14, 2023.

Internal MISP references

UUID 20967c9b-5bb6-5cdd-9466-2c9efd9ab98c which can be used as unique global reference for netlab360 rotajakiro vs oceanlotus in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-14T00:00:00Z
date_published 2021-05-06T00:00:00Z
source MITRE
title RotaJakiro, the Linux version of the OceanLotus

TechNet Route

Microsoft. (n.d.). Route. Retrieved April 17, 2016.

Internal MISP references

UUID 0e483ec8-af40-4139-9711-53b999e069ee which can be used as unique global reference for TechNet Route in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-17T00:00:00Z
source MITRE
title Route

Lumen KVBotnet 2023

Black Lotus Labs. (2023, December 13). Routers Roasting On An Open Firewall: The KV-Botnet Investigation. Retrieved June 10, 2024.

Internal MISP references

UUID 81bbc4e1-e1e6-5c93-bf65-ffdc9c7ff71d which can be used as unique global reference for Lumen KVBotnet 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-10T00:00:00Z
date_published 2023-12-13T00:00:00Z
source MITRE
title Routers Roasting On An Open Firewall: The KV-Botnet Investigation

U.S. HHS Royal & BlackCat Alert

Health Sector Cybersecurity Coordination Center (HC3). (2023, January 12). Royal & BlackCat Ransomware: The Threat to the Health Sector. Retrieved March 7, 2024.

Internal MISP references

UUID d1d6b6fe-ef93-4417-844b-7cd8dc76934b which can be used as unique global reference for U.S. HHS Royal & BlackCat Alert in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-07T00:00:00Z
date_published 2023-01-12T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Royal & BlackCat Ransomware: The Threat to the Health Sector

Kroll Royal Deep Dive February 2023

Iacono, L. and Green, S. (2023, February 13). Royal Ransomware Deep Dive. Retrieved March 30, 2023.

Internal MISP references

UUID dcdcc965-56d0-58e6-996b-d8bd40916745 which can be used as unique global reference for Kroll Royal Deep Dive February 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-30T00:00:00Z
date_published 2023-02-13T00:00:00Z
source MITRE
title Royal Ransomware Deep Dive

Kroll Royal Ransomware February 13 2023

Laurie Iacono, Keith Wojcieszek, George Glass. (2023, February 13). Royal Ransomware Deep Dive. Retrieved June 17, 2024.

Internal MISP references

UUID de385ede-f928-4a1e-934c-8ce7a6e7f33b which can be used as unique global reference for Kroll Royal Ransomware February 13 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-17T00:00:00Z
date_published 2023-02-13T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Royal Ransomware Deep Dive

Trend Micro Royal Linux ESXi February 2023

Morales, N. et al. (2023, February 20). Royal Ransomware Expands Attacks by Targeting Linux ESXi Servers. Retrieved March 30, 2023.

Internal MISP references

UUID e5bb846f-d11f-580c-b96a-9de4ba5eaed6 which can be used as unique global reference for Trend Micro Royal Linux ESXi February 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-30T00:00:00Z
date_published 2023-02-20T00:00:00Z
source MITRE
title Royal Ransomware Expands Attacks by Targeting Linux ESXi Servers

Royal Rumble: Analysis of Royal Ransomware

Cybereason global soc & cybereason security research teams. (n.d.). Royal Rumble: Analysis of Royal Ransomware. Retrieved May 18, 2023.

Internal MISP references

UUID 5afa7fd0-908e-4714-9ab3-2bbbc1fff976 which can be used as unique global reference for Royal Rumble: Analysis of Royal Ransomware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Royal Rumble: Analysis of Royal Ransomware

Cybereason Royal December 2022

Cybereason Global SOC and Cybereason Security Research Teams. (2022, December 14). Royal Rumble: Analysis of Royal Ransomware. Retrieved March 30, 2023.

Internal MISP references

UUID 28aef64e-20d3-5227-a3c9-e657c6e2d07e which can be used as unique global reference for Cybereason Royal December 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-30T00:00:00Z
date_published 2022-12-14T00:00:00Z
source MITRE
title Royal Rumble: Analysis of Royal Ransomware

Rpcping.exe - LOLBAS Project

LOLBAS. (2018, May 25). Rpcping.exe. Retrieved December 4, 2023.

Internal MISP references

UUID dc15a187-4de7-422e-a507-223e89e317b1 which can be used as unique global reference for Rpcping.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Rpcping.exe

Threatpost New Op Sharpshooter Data March 2019

L. O'Donnell. (2019, March 3). RSAC 2019: New Operation Sharpshooter Data Reveals Higher Complexity, Scope. Retrieved September 26, 2022.

Internal MISP references

UUID 2361b5b1-3a01-4d77-99c6-261f444a498e which can be used as unique global reference for Threatpost New Op Sharpshooter Data March 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-26T00:00:00Z
date_published 2019-03-03T00:00:00Z
source MITRE
title RSAC 2019: New Operation Sharpshooter Data Reveals Higher Complexity, Scope

GCN RSA June 2011

Jackson, William. (2011, June 7). RSA confirms its tokens used in Lockheed hack. Retrieved September 24, 2018.

Internal MISP references

UUID 40564d23-b9ae-4bb3-8dd1-d6b01163a32d which can be used as unique global reference for GCN RSA June 2011 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-09-24T00:00:00Z
date_published 2011-06-07T00:00:00Z
source MITRE
title RSA confirms its tokens used in Lockheed hack

RSA Shell Crew

RSA Incident Response. (2014, January). RSA Incident Response Emerging Threat Profile: Shell Crew. Retrieved January 14, 2016.

Internal MISP references

UUID 6872a6d3-c4ab-40cf-82b7-5c5c8e077189 which can be used as unique global reference for RSA Shell Crew in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-14T00:00:00Z
date_published 2014-01-01T00:00:00Z
source MITRE
title RSA Incident Response Emerging Threat Profile: Shell Crew

GitHub Rubeus March 2023

Harmj0y. (n.d.). Rubeus. Retrieved March 29, 2023.

Internal MISP references

UUID 4bde7ce6-7fc6-5660-a8aa-745f19350ee1 which can be used as unique global reference for GitHub Rubeus March 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-29T00:00:00Z
source MITRE
title Rubeus

SOCPrime DoubleExtension

Eugene Tkachenko. (2020, May 1). Rule of the Week: Possible Malicious File Double Extension. Retrieved July 27, 2021.

Internal MISP references

UUID 14a99228-de84-4551-a6b5-9c6f1173f292 which can be used as unique global reference for SOCPrime DoubleExtension in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-07-27T00:00:00Z
date_published 2020-05-01T00:00:00Z
source MITRE
title Rule of the Week: Possible Malicious File Double Extension

SensePost Ruler GitHub

SensePost. (2016, August 18). Ruler: A tool to abuse Exchange services. Retrieved February 4, 2019.

Internal MISP references

UUID aa0a1508-a872-4e69-bf20-d3c8202f18c1 which can be used as unique global reference for SensePost Ruler GitHub in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-04T00:00:00Z
date_published 2016-08-18T00:00:00Z
source MITRE
title Ruler: A tool to abuse Exchange services

Microsoft Cloud App Security

Niv Goldenberg. (2018, December 12). Rule your inbox with Microsoft Cloud App Security. Retrieved June 7, 2021.

Internal MISP references

UUID be0a1168-fa84-4742-a658-41a078b7f5fa which can be used as unique global reference for Microsoft Cloud App Security in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-07T00:00:00Z
date_published 2018-12-12T00:00:00Z
source MITRE
title Rule your inbox with Microsoft Cloud App Security

Microsoft Run Key

Microsoft. (n.d.). Run and RunOnce Registry Keys. Retrieved September 12, 2024.

Internal MISP references

UUID 0d633a50-4afd-4479-898e-1a785f5637da which can be used as unique global reference for Microsoft Run Key in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
source MITRE
title Run and RunOnce Registry Keys

Microsoft RunAs

Microsoft. (2016, August 31). Runas. Retrieved October 1, 2021.

Internal MISP references

UUID af05c12e-f9c6-421a-9a5d-0797c01ab2dc which can be used as unique global reference for Microsoft RunAs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-01T00:00:00Z
date_published 2016-08-31T00:00:00Z
source MITRE
title Runas

Microsoft runas - Duplicate

Microsoft TechNet. (n.d.). Runas. Retrieved April 21, 2017.

Internal MISP references

UUID 8b4bdce9-da19-443f-88d2-11466e126c09 which can be used as unique global reference for Microsoft runas - Duplicate in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-04-21T00:00:00Z
source MITRE
title Runas

Wikipedia Run Command

Wikipedia. (2018, August 3). Run Command. Retrieved October 12, 2018.

Internal MISP references

UUID 2fd66037-95dd-4819-afc7-00b7fd6f54fe which can be used as unique global reference for Wikipedia Run Command in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-10-12T00:00:00Z
date_published 2018-08-03T00:00:00Z
source MITRE
title Run Command

Secpod Winexe June 2017

Prakash, T. (2017, June 21). Run commands on Windows system remotely using Winexe. Retrieved September 12, 2024.

Internal MISP references

UUID ca8ea354-44d4-4606-8b3e-1102b27f251c which can be used as unique global reference for Secpod Winexe June 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2017-06-21T00:00:00Z
source MITRE
title Run commands on Windows system remotely using Winexe

Rundll32.exe - LOLBAS Project

LOLBAS. (2018, May 25). Rundll32.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 90aff246-ce27-4f21-96f9-38543718ab07 which can be used as unique global reference for Rundll32.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Rundll32.exe

Attackify Rundll32.exe Obscurity

Attackify. (n.d.). Rundll32.exe Obscurity. Retrieved August 23, 2021.

Internal MISP references

UUID daa35853-eb46-4ef4-b543-a2c5157f96bf which can be used as unique global reference for Attackify Rundll32.exe Obscurity in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-23T00:00:00Z
source MITRE
title Rundll32.exe Obscurity

Runexehelper.exe - LOLBAS Project

LOLBAS. (2022, December 13). Runexehelper.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 86ff0379-2b73-4981-9f13-2b02b53bc90f which can be used as unique global reference for Runexehelper.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2022-12-13T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Runexehelper.exe

ELC Running at startup

hoakley. (2018, May 22). Running at startup: when to use a Login Item or a LaunchAgent/LaunchDaemon. Retrieved October 5, 2021.

Internal MISP references

UUID 11ee6303-5103-4063-a765-659ead217c6c which can be used as unique global reference for ELC Running at startup in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-05T00:00:00Z
date_published 2018-05-22T00:00:00Z
source MITRE
title Running at startup: when to use a Login Item or a LaunchAgent/LaunchDaemon

Powershell Remote Commands

Microsoft. (2020, August 21). Running Remote Commands. Retrieved July 26, 2021.

Internal MISP references

UUID 24c526e1-7199-45ca-99b4-75e75c7041cd which can be used as unique global reference for Powershell Remote Commands in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-07-26T00:00:00Z
date_published 2020-08-21T00:00:00Z
source MITRE
title Running Remote Commands

AutoIT

AutoIT. (n.d.). Running Scripts. Retrieved March 29, 2024.

Internal MISP references

UUID 97e76bc2-9312-5f39-8491-8b42ddeb2067 which can be used as unique global reference for AutoIT in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-29T00:00:00Z
source MITRE
title Running Scripts

Runonce.exe - LOLBAS Project

LOLBAS. (2018, May 25). Runonce.exe. Retrieved December 4, 2023.

Internal MISP references

UUID b97d4b16-ead2-4cc7-90e5-f8b05d84faf3 which can be used as unique global reference for Runonce.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Runonce.exe

Apple Developer Doco Archive Run-Path

Apple Inc.. (2012, July 7). Run-Path Dependent Libraries. Retrieved March 31, 2021.

Internal MISP references

UUID e9e5cff5-836a-4b66-87d5-03a727c0f467 which can be used as unique global reference for Apple Developer Doco Archive Run-Path in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-31T00:00:00Z
date_published 2012-07-07T00:00:00Z
source MITRE
title Run-Path Dependent Libraries

Runscripthelper.exe - LOLBAS Project

LOLBAS. (2018, May 25). Runscripthelper.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 6d7151e3-685a-4dc7-a44d-aefae4f3db6a which can be used as unique global reference for Runscripthelper.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Runscripthelper.exe

Microsoft Run Command

Microsoft. (2023, March 10). Run scripts in your VM by using Run Command. Retrieved March 13, 2023.

Internal MISP references

UUID 4f2e6adb-6e3d-5f1f-b873-4b99797f2bfa which can be used as unique global reference for Microsoft Run Command in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-13T00:00:00Z
date_published 2023-03-10T00:00:00Z
source MITRE
title Run scripts in your VM by using Run Command

McAfee APT28 DDE2 Nov 2017

Paganini, P. (2017, November 9). Russia-Linked APT28 group observed using DDE attack to deliver malware. Retrieved November 21, 2017.

Internal MISP references

UUID d5ab8075-334f-492c-8318-c691f210b984 which can be used as unique global reference for McAfee APT28 DDE2 Nov 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-21T00:00:00Z
date_published 2017-11-09T00:00:00Z
source MITRE
title Russia-Linked APT28 group observed using DDE attack to deliver malware

Security Affairs DustSquad Oct 2018

Paganini, P. (2018, October 16). Russia-linked APT group DustSquad targets diplomatic entities in Central Asia. Retrieved August 24, 2021.

Internal MISP references

UUID 0e6b019c-cf8e-40a7-9e7c-6a7dc5309dc6 which can be used as unique global reference for Security Affairs DustSquad Oct 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-24T00:00:00Z
date_published 2018-10-16T00:00:00Z
source MITRE
title Russia-linked APT group DustSquad targets diplomatic entities in Central Asia

SecurityWeek Nomadic Octopus Oct 2018

Kovacs, E. (2018, October 18). Russia-Linked Hackers Target Diplomatic Entities in Central Asia. Retrieved October 13, 2021.

Internal MISP references

UUID 659f86ef-7e90-42ff-87b7-2e289f9f6cc2 which can be used as unique global reference for SecurityWeek Nomadic Octopus Oct 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-13T00:00:00Z
date_published 2018-10-18T00:00:00Z
source MITRE
title Russia-Linked Hackers Target Diplomatic Entities in Central Asia

U.S. Federal Bureau of Investigation 2 27 2024

U.S. Federal Bureau of Investigation. (2024, February 27). Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations. Retrieved February 28, 2024.

Internal MISP references

UUID 962fb031-dfd1-43a7-8202-3a2231b0472b which can be used as unique global reference for U.S. Federal Bureau of Investigation 2 27 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-28T00:00:00Z
date_published 2024-02-27T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations

U.S. CISA SVR TeamCity Exploits December 2023

Cybersecurity and Infrastructure Security Agency. (2023, December 13). Russian Foreign Intelligence Service (SVR) Exploiting JetBrains TeamCity CVE Globally. Retrieved December 14, 2023.

Internal MISP references

UUID 5f66f864-58c2-4b41-8011-61f954e04b7e which can be used as unique global reference for U.S. CISA SVR TeamCity Exploits December 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-14T00:00:00Z
date_published 2023-12-13T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Russian Foreign Intelligence Service (SVR) Exploiting JetBrains TeamCity CVE Globally

U.S. CISA Star Blizzard December 2023

Cybersecurity and Infrastructure Security Agency. (2023, December 7). Russian FSB Cyber Actor Star Blizzard Continues Worldwide Spear-phishing Campaigns. Retrieved December 14, 2023.

Internal MISP references

UUID 3d53c154-8ced-4dbe-ab4e-db3bc15bfe4b which can be used as unique global reference for U.S. CISA Star Blizzard December 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-14T00:00:00Z
date_published 2023-12-07T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Russian FSB Cyber Actor Star Blizzard Continues Worldwide Spear-phishing Campaigns

CISA Star Blizzard Advisory December 2023

CISA, et al. (2023, December 7). Russian FSB Cyber Actor Star Blizzard Continues Worldwide Spear-phishing Campaigns. Retrieved June 13, 2024.

Internal MISP references

UUID 96b26cfc-b31d-5226-879f-4888801ec268 which can be used as unique global reference for CISA Star Blizzard Advisory December 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-13T00:00:00Z
date_published 2023-12-07T00:00:00Z
source MITRE
title Russian FSB Cyber Actor Star Blizzard Continues Worldwide Spear-phishing Campaigns

NSA/FBI Drovorub August 2020

NSA/FBI. (2020, August). Russian GRU 85th GTsSS Deploys Previously Undisclosed Drovorub Malware. Retrieved August 25, 2020.

Internal MISP references

UUID d697a342-4100-4e6b-95b9-4ae3ba80924b which can be used as unique global reference for NSA/FBI Drovorub August 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-25T00:00:00Z
date_published 2020-08-01T00:00:00Z
source MITRE
title Russian GRU 85th GTsSS Deploys Previously Undisclosed Drovorub Malware

Cybersecurity Advisory GRU Brute Force Campaign July 2021

NSA, CISA, FBI, NCSC. (2021, July). Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments. Retrieved July 26, 2021.

Internal MISP references

UUID e70f0742-5f3e-4701-a46b-4a58c0281537 which can be used as unique global reference for Cybersecurity Advisory GRU Brute Force Campaign July 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-07-26T00:00:00Z
date_published 2021-07-01T00:00:00Z
source MITRE, Tidal Cyber
title Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments

BleepingComputer Ebury March 2017

Cimpanu, C.. (2017, March 29). Russian Hacker Pleads Guilty for Role in Infamous Linux Ebury Malware. Retrieved April 23, 2019.

Internal MISP references

UUID e5d69297-b0f3-4586-9eb7-d2922b3ee7bb which can be used as unique global reference for BleepingComputer Ebury March 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-23T00:00:00Z
date_published 2017-03-29T00:00:00Z
source MITRE
title Russian Hacker Pleads Guilty for Role in Infamous Linux Ebury Malware

Russian 2FA Push Annoyance - Cimpanu

Catalin Cimpanu. (2021, December 9). Russian hackers bypass 2FA by annoying victims with repeated push notifications. Retrieved March 31, 2022.

Internal MISP references

UUID ad2b0648-b657-4daa-9510-82375a252fc4 which can be used as unique global reference for Russian 2FA Push Annoyance - Cimpanu in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-31T00:00:00Z
date_published 2021-12-09T00:00:00Z
source MITRE
title Russian hackers bypass 2FA by annoying victims with repeated push notifications

Reuters Cold River January 6 2023

James Pearson, Christopher Bing. (2023, January 6). Russian hackers targeted U.S. nuclear scientists. Retrieved October 1, 2024.

Internal MISP references

UUID 15bac539-2561-4f97-a9fb-4e081417215f which can be used as unique global reference for Reuters Cold River January 6 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-01T00:00:00Z
date_published 2023-01-06T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Russian hackers targeted U.S. nuclear scientists

Unit42 Redaman January 2019

Duncan, B., Harbison, M. (2019, January 23). Russian Language Malspam Pushing Redaman Banking Malware. Retrieved June 16, 2020.

Internal MISP references

UUID 433cd55a-f912-4d5a-aff6-92133d08267b which can be used as unique global reference for Unit42 Redaman January 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-16T00:00:00Z
date_published 2019-01-23T00:00:00Z
source MITRE
title Russian Language Malspam Pushing Redaman Banking Malware

U.S. CISA Unit 29155 September 5 2024

Cybersecurity and Infrastructure Security Agency. (2024, September 5). Russian Military Cyber Actors Target US and Global Critical Infrastructure. Retrieved September 9, 2024.

Internal MISP references

UUID 9631a46d-3e0a-4f25-962b-0b2501c47926 which can be used as unique global reference for U.S. CISA Unit 29155 September 5 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-09T00:00:00Z
date_published 2024-09-05T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Russian Military Cyber Actors Target US and Global Critical Infrastructure

Russians Exploit Default MFA Protocol - CISA March 2022

Cyber Security Infrastructure Agency. (2022, March 15). Russian State-Sponsored Cyber Actors Gain Network Access by Exploiting Default Multifactor Authentication Protocols and “PrintNightmare” Vulnerability. Retrieved May 31, 2022.

Internal MISP references

UUID 00c6ff88-6eeb-486d-ae69-dffd5aebafe6 which can be used as unique global reference for Russians Exploit Default MFA Protocol - CISA March 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-31T00:00:00Z
date_published 2022-03-15T00:00:00Z
source MITRE
title Russian State-Sponsored Cyber Actors Gain Network Access by Exploiting Default Multifactor Authentication Protocols and “PrintNightmare” Vulnerability

CISA MFA PrintNightmare

Cybersecurity and Infrastructure Security Agency. (2022, March 15). Russian State-Sponsored Cyber Actors Gain Network Access by Exploiting Default Multifactor Authentication Protocols and “PrintNightmare” Vulnerability. Retrieved March 16, 2022.

Internal MISP references

UUID fa03324e-c79c-422e-80f1-c270fd87d4e2 which can be used as unique global reference for CISA MFA PrintNightmare in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-16T00:00:00Z
date_published 2022-03-15T00:00:00Z
source MITRE
title Russian State-Sponsored Cyber Actors Gain Network Access by Exploiting Default Multifactor Authentication Protocols and “PrintNightmare” Vulnerability

alert_TA18_106A

CISA. (2018, April 20). Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. Retrieved February 14, 2022.

Internal MISP references

UUID 26b520dc-5c68-40f4-82fb-366d27fc0c2f which can be used as unique global reference for alert_TA18_106A in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-14T00:00:00Z
date_published 2018-04-20T00:00:00Z
source MITRE
title Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices

US-CERT TA18-106A Network Infrastructure Devices 2018

US-CERT. (2018, April 20). Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. Retrieved October 19, 2020.

Internal MISP references

UUID 8fdf280d-680f-4b8f-8fb9-6b3118ec3983 which can be used as unique global reference for US-CERT TA18-106A Network Infrastructure Devices 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
date_published 2018-04-20T00:00:00Z
source MITRE
title Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices

Google TAG COLDRIVER January 18 2024

Wesley Shields. (2024, January 18). Russian threat group COLDRIVER expands its targeting of Western officials to include the use of malware. Retrieved October 1, 2024.

Internal MISP references

UUID 0b26c6f8-51ee-4419-9842-245c0e5e6f58 which can be used as unique global reference for Google TAG COLDRIVER January 18 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-01T00:00:00Z
date_published 2024-01-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Russian threat group COLDRIVER expands its targeting of Western officials to include the use of malware

Google TAG COLDRIVER January 2024

Shields, W. (2024, January 18). Russian threat group COLDRIVER expands its targeting of Western officials to include the use of malware. Retrieved June 13, 2024.

Internal MISP references

UUID cff26ad8-b8dc-557d-9751-530f7ebfaa02 which can be used as unique global reference for Google TAG COLDRIVER January 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-13T00:00:00Z
date_published 2024-01-18T00:00:00Z
source MITRE
title Russian threat group COLDRIVER expands its targeting of Western officials to include the use of malware

UK GOV FSB Factsheet April 2022

UK Gov. (2022, April 5). Russia's FSB malign activity: factsheet. Retrieved April 5, 2022.

Internal MISP references

UUID 27e7d347-9d85-4897-9e04-33f58acc5687 which can be used as unique global reference for UK GOV FSB Factsheet April 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-05T00:00:00Z
date_published 2022-04-05T00:00:00Z
source MITRE
title Russia's FSB malign activity: factsheet

Unit 42 Gamaredon February 2022

Unit 42. (2022, February 3). Russia’s Gamaredon aka Primitive Bear APT Group Actively Targeting Ukraine. Retrieved February 21, 2022.

Internal MISP references

UUID a5df39b2-77f8-4814-8198-8620655aa79b which can be used as unique global reference for Unit 42 Gamaredon February 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-21T00:00:00Z
date_published 2022-02-03T00:00:00Z
source MITRE
title Russia’s Gamaredon aka Primitive Bear APT Group Actively Targeting Ukraine

Wired Russia Cyberwar

Greenberg, A. (2022, November 10). Russia’s New Cyberwarfare in Ukraine Is Fast, Dirty, and Relentless. Retrieved March 22, 2023.

Internal MISP references

UUID 28c53a97-5500-5bfb-8aac-3c0bf94c2dfe which can be used as unique global reference for Wired Russia Cyberwar in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-22T00:00:00Z
date_published 2022-11-10T00:00:00Z
source MITRE
title Russia’s New Cyberwarfare in Ukraine Is Fast, Dirty, and Relentless

unit42_gamaredon_dec2022

Unit 42. (2022, December 20). Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine. Retrieved September 12, 2024.

Internal MISP references

UUID a8a32597-2b52-5f99-850d-f38d3f891713 which can be used as unique global reference for unit42_gamaredon_dec2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2022-12-20T00:00:00Z
source MITRE
title Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine

RyanW3stman Tweet October 10 2023

RyanW3stman. (2023, October 10). RyanW3stman Tweet October 10 2023. Retrieved October 10, 2023.

Internal MISP references

UUID cfd0ad64-54b2-446f-9624-9c90a9a94f52 which can be used as unique global reference for RyanW3stman Tweet October 10 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-10T00:00:00Z
date_published 2023-10-10T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title RyanW3stman Tweet October 10 2023

Ryte Wiki

Ryte Wiki. (n.d.). Retrieved March 5, 2024.

Internal MISP references

UUID 51b4932e-f85a-5483-8bf8-48de9c85782d which can be used as unique global reference for Ryte Wiki in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-05T00:00:00Z
source MITRE
title Ryte Wiki

DFIR Ryuk in 5 Hours October 2020

The DFIR Report. (2020, October 18). Ryuk in 5 Hours. Retrieved October 19, 2020.

Internal MISP references

UUID 892150f4-769d-447d-b652-e5d85790ee37 which can be used as unique global reference for DFIR Ryuk in 5 Hours October 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
date_published 2020-10-18T00:00:00Z
source MITRE
title Ryuk in 5 Hours

ANSSI RYUK RANSOMWARE

ANSSI. (2021, February 25). RYUK RANSOMWARE. Retrieved March 29, 2021.

Internal MISP references

UUID 0a23be83-3438-4437-9e51-0cfa16a00d57 which can be used as unique global reference for ANSSI RYUK RANSOMWARE in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-29T00:00:00Z
date_published 2021-02-25T00:00:00Z
source MITRE
title RYUK RANSOMWARE

Bleeping Computer - Ryuk WoL

Abrams, L. (2021, January 14). Ryuk Ransomware Uses Wake-on-Lan To Encrypt Offline Devices. Retrieved February 11, 2021.

Internal MISP references

UUID f6670b73-4d57-4aad-8264-1d42d585e280 which can be used as unique global reference for Bleeping Computer - Ryuk WoL in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-11T00:00:00Z
date_published 2021-01-14T00:00:00Z
source MITRE
title Ryuk Ransomware Uses Wake-on-Lan To Encrypt Offline Devices

DFIR Ryuk 2 Hour Speed Run November 2020

The DFIR Report. (2020, November 5). Ryuk Speed Run, 2 Hours to Ransom. Retrieved November 6, 2020.

Internal MISP references

UUID 3b904516-3b26-4caa-8814-6e69b76a7c8c which can be used as unique global reference for DFIR Ryuk 2 Hour Speed Run November 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-06T00:00:00Z
date_published 2020-11-05T00:00:00Z
source MITRE
title Ryuk Speed Run, 2 Hours to Ransom

DFIR Ryuk's Return October 2020

The DFIR Report. (2020, October 8). Ryuk’s Return. Retrieved October 9, 2020.

Internal MISP references

UUID eba1dafb-ff62-4d34-b268-3b9ba6a7a822 which can be used as unique global reference for DFIR Ryuk's Return October 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-09T00:00:00Z
date_published 2020-10-08T00:00:00Z
source MITRE
title Ryuk’s Return

Rhino S3 Ransomware Part 1

Gietzen, S. (n.d.). S3 Ransomware Part 1: Attack Vector. Retrieved April 14, 2021.

Internal MISP references

UUID bb28711f-186d-4101-b153-6340ce826343 which can be used as unique global reference for Rhino S3 Ransomware Part 1 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-14T00:00:00Z
source MITRE
title S3 Ransomware Part 1: Attack Vector

Rhino S3 Ransomware Part 2

Gietzen, S. (n.d.). S3 Ransomware Part 2: Prevention and Defense. Retrieved April 14, 2021.

Internal MISP references

UUID a2b3e738-257c-4078-9fde-d55b08c8003b which can be used as unique global reference for Rhino S3 Ransomware Part 2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-14T00:00:00Z
source MITRE
title S3 Ransomware Part 2: Prevention and Defense

S3Recon GitHub

Travis Clarke. (2020, March 21). S3Recon GitHub. Retrieved March 4, 2022.

Internal MISP references

UUID 803c51be-a54e-4fab-8ea0-c6bef18e84d3 which can be used as unique global reference for S3Recon GitHub in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-04T00:00:00Z
date_published 2020-03-21T00:00:00Z
source MITRE
title S3Recon GitHub

Dell Sakula

Dell SecureWorks Counter Threat Unit Threat Intelligence. (2015, July 30). Sakula Malware Family. Retrieved January 26, 2016.

Internal MISP references

UUID e9a2ffd8-7aed-4343-8678-66fc3e758d19 which can be used as unique global reference for Dell Sakula in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-26T00:00:00Z
date_published 2015-07-30T00:00:00Z
source MITRE
title Sakula Malware Family

Wine API samlib.dll

Wine API. (n.d.). samlib.dll. Retrieved December 4, 2017.

Internal MISP references

UUID d0fdc669-959c-42ed-be5d-386a4e90a897 which can be used as unique global reference for Wine API samlib.dll in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-04T00:00:00Z
source MITRE
title samlib.dll

Sophos SamSam Apr 2018

Palotay, D. and Mackenzie, P. (2018, April). SamSam Ransomware Chooses Its Targets Carefully. Retrieved April 15, 2019.

Internal MISP references

UUID 4da5e9c3-7205-4a6e-b147-be7c971380f0 which can be used as unique global reference for Sophos SamSam Apr 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-15T00:00:00Z
date_published 2018-04-01T00:00:00Z
source MITRE
title SamSam Ransomware Chooses Its Targets Carefully

Symantec SamSam Oct 2018

Symantec Security Response Attack Investigation Team. (2018, October 30). SamSam: Targeted Ransomware Attacks Continue. Retrieved April 16, 2019.

Internal MISP references

UUID c5022a91-bdf4-4187-9967-dfe6362219ea which can be used as unique global reference for Symantec SamSam Oct 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-16T00:00:00Z
date_published 2018-10-30T00:00:00Z
source MITRE
title SamSam: Targeted Ransomware Attacks Continue

Talos SamSam Jan 2018

Ventura, V. (2018, January 22). SamSam - The Evolution Continues Netting Over $325,000 in 4 Weeks. Retrieved April 16, 2019.

Internal MISP references

UUID 0965bb64-be96-46b9-b60f-6829c43a661f which can be used as unique global reference for Talos SamSam Jan 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-16T00:00:00Z
date_published 2018-01-22T00:00:00Z
source MITRE
title SamSam - The Evolution Continues Netting Over $325,000 in 4 Weeks

NSA Sandworm 2020

National Security Agency. (2020, March 28). Sandworm Actors Exploiting Vulnerability In EXIM Mail Transfer Agent. Retrieved March 1, 2024.

Internal MISP references

UUID 5135c600-b2a6-59e7-9023-8e293736f8de which can be used as unique global reference for NSA Sandworm 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-01T00:00:00Z
date_published 2020-03-28T00:00:00Z
source MITRE
title Sandworm Actors Exploiting Vulnerability In EXIM Mail Transfer Agent

Mandiant-Sandworm-Ukraine-2022

Ken Proska, John Wolfram, Jared Wilson, Dan Black, Keith Lunden, Daniel Kapellmann Zafra, Nathan Brubaker, Tyler Mclellan, Chris Sistrunk. (2023, November 9). Sandworm Disrupts Power in Ukraine Using a Novel Attack Against Operational Technology. Retrieved March 28, 2024.

Internal MISP references

UUID 7ad64744-2790-54e4-97cd-e412423f6ada which can be used as unique global reference for Mandiant-Sandworm-Ukraine-2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-28T00:00:00Z
date_published 2023-11-09T00:00:00Z
source MITRE
title Sandworm Disrupts Power in Ukraine Using a Novel Attack Against Operational Technology

Mandiant Sandworm November 9 2023

Ken Proska, John Wolfram, Jared Wilson, Dan Black, Keith Lunden, Daniel Kapellmann Zafra, Nathan Brubaker, Tyler McLellan, Chris Sistrunk. (2023, November 9). Sandworm Disrupts Power in Ukraine Using a Novel Attack Against Operational Technology. Retrieved April 17, 2024.

Internal MISP references

UUID e35f005d-a3cd-4733-88ac-92bbf46e2c8a which can be used as unique global reference for Mandiant Sandworm November 9 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-17T00:00:00Z
date_published 2023-11-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Sandworm Disrupts Power in Ukraine Using a Novel Attack Against Operational Technology

ANSSI Sandworm January 2021

ANSSI. (2021, January 27). SANDWORM INTRUSION SET CAMPAIGN TARGETING CENTREON SYSTEMS. Retrieved March 30, 2021.

Internal MISP references

UUID 5e619fef-180a-46d4-8bf5-998860b5ad7e which can be used as unique global reference for ANSSI Sandworm January 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-30T00:00:00Z
date_published 2021-01-27T00:00:00Z
source MITRE
title SANDWORM INTRUSION SET CAMPAIGN TARGETING CENTREON SYSTEMS

iSIGHT Sandworm 2014

Hultquist, J.. (2016, January 7). Sandworm Team and the Ukrainian Power Authority Attacks. Retrieved October 6, 2017.

Internal MISP references

UUID 63622990-5467-42b2-8f45-b675dfc4dc8f which can be used as unique global reference for iSIGHT Sandworm 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-10-06T00:00:00Z
date_published 2016-01-07T00:00:00Z
source MITRE
title Sandworm Team and the Ukrainian Power Authority Attacks

DOJ - Cisco Insider

DOJ. (2020, August 26). San Jose Man Pleads Guilty To Damaging Cisco’s Network. Retrieved December 15, 2020.

Internal MISP references

UUID b8d9006d-7466-49cf-a70e-384edee530ce which can be used as unique global reference for DOJ - Cisco Insider in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-15T00:00:00Z
date_published 2020-08-26T00:00:00Z
source MITRE
title San Jose Man Pleads Guilty To Damaging Cisco’s Network

SANS 1

Joshua Wright. (2020, October 13). Retrieved March 22, 2024.

Internal MISP references

UUID 6fb8f825-5f77-501a-8277-22a5f551d13a which can be used as unique global reference for SANS 1 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-22T00:00:00Z
source MITRE
title SANS 1

SANS 2

Joshua Wright. (2020, October 14). Retrieved March 22, 2024.

Internal MISP references

UUID 2a4c41f3-473f-516f-8c68-b771f7c3dfcb which can be used as unique global reference for SANS 2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-22T00:00:00Z
source MITRE
title SANS 2

ATT ScanBox

Blasco, J. (2014, August 28). Scanbox: A Reconnaissance Framework Used with Watering Hole Attacks. Retrieved October 19, 2020.

Internal MISP references

UUID 48753fc9-b7b7-465f-92a7-fb3f51b032cb which can be used as unique global reference for ATT ScanBox in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
date_published 2014-08-28T00:00:00Z
source MITRE
title Scanbox: A Reconnaissance Framework Used with Watering Hole Attacks

Mandiant SCANdalous Jul 2020

Stephens, A. (2020, July 13). SCANdalous! (External Detection Using Network Scan Data and Automation). Retrieved October 12, 2021.

Internal MISP references

UUID 3a60f7de-9ead-444e-9d08-689c655b26c7 which can be used as unique global reference for Mandiant SCANdalous Jul 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-12T00:00:00Z
date_published 2020-07-13T00:00:00Z
source MITRE
title SCANdalous! (External Detection Using Network Scan Data and Automation)

WeLiveSecurity Scarab August 22 2023

Jakub Souček. (2023, August 22). Scarabs colon-izing vulnerable servers. Retrieved September 13, 2024.

Internal MISP references

UUID 7cbf97fe-1809-4089-b386-a8bfd083df39 which can be used as unique global reference for WeLiveSecurity Scarab August 22 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-13T00:00:00Z
date_published 2023-08-22T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Scarabs colon-izing vulnerable servers

Securelist ScarCruft May 2019

GReAT. (2019, May 13). ScarCruft continues to evolve, introduces Bluetooth harvester. Retrieved June 4, 2019.

Internal MISP references

UUID 2dd5b872-a4ab-4b77-8457-a3d947298fc0 which can be used as unique global reference for Securelist ScarCruft May 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-04T00:00:00Z
date_published 2019-05-13T00:00:00Z
source MITRE
title ScarCruft continues to evolve, introduces Bluetooth harvester

Sysdig ScarletEel 2.0 2023

Alessandro Brucato. (2023, July 11). SCARLETEEL 2.0: Fargate, Kubernetes, and Crypto. Retrieved September 25, 2023.

Internal MISP references

UUID 285266e7-7a62-5f98-9b0f-fefde4b21c88 which can be used as unique global reference for Sysdig ScarletEel 2.0 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-25T00:00:00Z
date_published 2023-07-11T00:00:00Z
source MITRE
title SCARLETEEL 2.0: Fargate, Kubernetes, and Crypto

Sysdig ScarletEel 2.0

SCARLETEEL 2.0: Fargate, Kubernetes, and Crypto. (2023, July 11). SCARLETEEL 2.0: Fargate, Kubernetes, and Crypto. Retrieved July 12, 2023.

Internal MISP references

UUID 90e60242-82d8-5648-b7e4-def6fd508e16 which can be used as unique global reference for Sysdig ScarletEel 2.0 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-12T00:00:00Z
date_published 2023-07-11T00:00:00Z
source MITRE
title SCARLETEEL 2.0: Fargate, Kubernetes, and Crypto

Sysdig Scarleteel February 28 2023

Alberto Pellitteri. (2023, February 28). SCARLETEEL: Operation leveraging Terraform, Kubernetes, and AWS for data theft. Retrieved February 2, 2023.

Internal MISP references

UUID 18931f81-51bf-44af-9573-512ccb66c238 which can be used as unique global reference for Sysdig Scarleteel February 28 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-02T00:00:00Z
date_published 2023-02-28T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title SCARLETEEL: Operation leveraging Terraform, Kubernetes, and AWS for data theft

Red Canary June 26 2024

Laura Brosnan. (2024, June 26). Scarlet Goldfinch Taking flight with NetSupport Manager - Red Canary. Retrieved June 26, 2024.

Internal MISP references

UUID e0d62504-6fec-4d95-9f4a-e0dda7e7b6d9 which can be used as unique global reference for Red Canary June 26 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-26T00:00:00Z
date_published 2024-06-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Scarlet Goldfinch Taking flight with NetSupport Manager - Red Canary

Scarlet Mimic Jan 2016

Falcone, R. and Miller-Osborn, J.. (2016, January 24). Scarlet Mimic: Years-Long Espionage Campaign Targets Minority Activists. Retrieved February 10, 2016.

Internal MISP references

UUID f84a5b6d-3af1-45b1-ac55-69ceced8735f which can be used as unique global reference for Scarlet Mimic Jan 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-02-10T00:00:00Z
date_published 2016-01-24T00:00:00Z
source MITRE, Tidal Cyber
title Scarlet Mimic: Years-Long Espionage Campaign Targets Minority Activists

CrowdStrike Scattered Spider Profile

CrowdStrike. (n.d.). Scattered Spider. Retrieved July 5, 2023.

Internal MISP references

UUID a865a984-7f7b-5f82-ac4a-6fac79a2a753 which can be used as unique global reference for CrowdStrike Scattered Spider Profile in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-05T00:00:00Z
source MITRE
title Scattered Spider

U.S. CISA Scattered Spider November 16 2023

Cybersecurity and Infrastructure Security Agency. (2023, November 16). Scattered Spider. Retrieved November 16, 2023.

Internal MISP references

UUID 9c242265-c28c-4580-8e6a-478d8700b092 which can be used as unique global reference for U.S. CISA Scattered Spider November 16 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-11-16T00:00:00Z
date_published 2023-11-16T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Scattered Spider

CrowdStrike Scattered Spider BYOVD January 2023

CrowdStrike. (2023, January 10). SCATTERED SPIDER Exploits Windows Security Deficiencies with Bring-Your-Own-Vulnerable-Driver Tactic in Attempt to Bypass Endpoint Security. Retrieved July 5, 2023.

Internal MISP references

UUID d7d86f5d-1f02-54b0-b6f4-879878563245 which can be used as unique global reference for CrowdStrike Scattered Spider BYOVD January 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-05T00:00:00Z
date_published 2023-01-10T00:00:00Z
source MITRE
title SCATTERED SPIDER Exploits Windows Security Deficiencies with Bring-Your-Own-Vulnerable-Driver Tactic in Attempt to Bypass Endpoint Security

Trellix Scattered Spider MO August 2023

Trellix et. al.. (2023, August 17). Scattered Spider: The Modus Operandi. Retrieved March 18, 2024.

Internal MISP references

UUID 0041bf10-e26f-59e8-a212-6b1687aafb79 which can be used as unique global reference for Trellix Scattered Spider MO August 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-18T00:00:00Z
date_published 2023-08-17T00:00:00Z
source MITRE
title Scattered Spider: The Modus Operandi

Sc.exe - LOLBAS Project

LOLBAS. (2018, May 25). Sc.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 5ce3ef73-f789-4939-a60e-e0a373048bda which can be used as unique global reference for Sc.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Sc.exe

TechNet Forum Scheduled Task Operational Setting

Satyajit321. (2015, November 3). Scheduled Tasks History Retention settings. Retrieved December 12, 2017.

Internal MISP references

UUID 63e53238-30b5-46ef-8083-7d2888b01561 which can be used as unique global reference for TechNet Forum Scheduled Task Operational Setting in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-12T00:00:00Z
date_published 2015-11-03T00:00:00Z
source MITRE
title Scheduled Tasks History Retention settings

Kifarunix - Task Scheduling in Linux

Koromicha. (2019, September 7). Scheduling tasks using at command in Linux. Retrieved December 3, 2019.

Internal MISP references

UUID dbab6766-ab87-4528-97e5-cc3121aa77b9 which can be used as unique global reference for Kifarunix - Task Scheduling in Linux in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-12-03T00:00:00Z
date_published 2019-09-07T00:00:00Z
source MITRE
title Scheduling tasks using at command in Linux

TechNet Schtasks

Microsoft. (n.d.). Schtasks. Retrieved April 28, 2016.

Internal MISP references

UUID 17c03e27-222d-41b5-9fa2-34f0939e5371 which can be used as unique global reference for TechNet Schtasks in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-28T00:00:00Z
source MITRE
title Schtasks

Schtasks.exe - LOLBAS Project

LOLBAS. (2018, May 25). Schtasks.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 2ef31677-b7ec-4200-a342-7c9196e1aa58 which can be used as unique global reference for Schtasks.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Schtasks.exe

Secplicity Rhysida May 23 2023

Ryan Estes. (2023, May 23). Scratching the Surface of Rhysida Ransomware. Retrieved August 11, 2023.

Internal MISP references

UUID 1b73bfb6-376e-4252-b3a1-9b6cf5ccaaf3 which can be used as unique global reference for Secplicity Rhysida May 23 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-11T00:00:00Z
date_published 2023-05-23T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Scratching the Surface of Rhysida Ransomware

Wikipedia Screensaver

Wikipedia. (2017, November 22). Screensaver. Retrieved December 5, 2017.

Internal MISP references

UUID b5d69465-27df-4acc-b6cc-f51be8780b7b which can be used as unique global reference for Wikipedia Screensaver in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-05T00:00:00Z
date_published 2017-11-22T00:00:00Z
source MITRE
title Screensaver

CobaltStrike Scripted Web Delivery

Strategic Cyber, LLC. (n.d.). Scripted Web Delivery. Retrieved January 23, 2018.

Internal MISP references

UUID 89ed4c93-b69d-4eed-8212-cd2ebee08bcb which can be used as unique global reference for CobaltStrike Scripted Web Delivery in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-23T00:00:00Z
source MITRE
title Scripted Web Delivery

Cobalt Strike DCOM Jan 2017

Mudge, R. (2017, January 24). Scripting Matt Nelson’s MMC20.Application Lateral Movement Technique. Retrieved November 21, 2017.

Internal MISP references

UUID ccafe7af-fbb3-4478-9035-f588e5e3c8b8 which can be used as unique global reference for Cobalt Strike DCOM Jan 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-21T00:00:00Z
date_published 2017-01-24T00:00:00Z
source MITRE
title Scripting Matt Nelson’s MMC20.Application Lateral Movement Technique

Scriptrunner.exe - LOLBAS Project

LOLBAS. (2018, May 25). Scriptrunner.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 805d16cc-8bd0-4f80-b0ac-c5b5df51427c which can be used as unique global reference for Scriptrunner.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Scriptrunner.exe

SS64

SS64. (n.d.). ScriptRunner.exe. Retrieved July 8, 2024.

Internal MISP references

UUID e96e1486-ae8a-5fb3-bb8b-a9f0bf22b488 which can be used as unique global reference for SS64 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-08T00:00:00Z
source MITRE
title ScriptRunner.exe

Scrobj.dll - LOLBAS Project

LOLBAS. (2021, January 7). Scrobj.dll. Retrieved December 4, 2023.

Internal MISP references

UUID c50ff71f-c742-4d63-a18e-e1ce41d55193 which can be used as unique global reference for Scrobj.dll - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-01-07T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Scrobj.dll

Microsoft SDelete July 2016

Russinovich, M. (2016, July 4). SDelete v2.0. Retrieved February 8, 2018.

Internal MISP references

UUID 356c7d49-5abc-4566-9657-5ce58cf7be67 which can be used as unique global reference for Microsoft SDelete July 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-08T00:00:00Z
date_published 2016-07-04T00:00:00Z
source MITRE
title SDelete v2.0

Sean Metcalf Twitter DNS Records

Sean Metcalf. (2019, May 9). Sean Metcalf Twitter. September 12, 2024.

Internal MISP references

UUID c7482430-58f9-4365-a7c6-d17067b257e4 which can be used as unique global reference for Sean Metcalf Twitter DNS Records in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-27T00:00:00Z
date_published 2019-05-09T00:00:00Z
source MITRE
title Sean Metcalf Twitter

Amazon. (n.d.). Search CloudTrail logs for API calls to EC2 Instances. Retrieved June 17, 2020.

Internal MISP references

UUID 636b933d-8953-4579-980d-227527dfcc94 which can be used as unique global reference for AWS CloudTrail Search in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-17T00:00:00Z
source MITRE
title Search CloudTrail logs for API calls to EC2 Instances

Group IB Cobalt Aug 2017

Matveeva, V. (2017, August 15). Secrets of Cobalt. Retrieved October 10, 2018.

Internal MISP references

UUID 2d9ef1de-2ee6-4500-a87d-b55f83e65900 which can be used as unique global reference for Group IB Cobalt Aug 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-10-10T00:00:00Z
date_published 2017-08-15T00:00:00Z
source MITRE
title Secrets of Cobalt

GitHub SHB Credential Guard

NSA IAD. (2017, April 20). Secure Host Baseline - Credential Guard. Retrieved April 25, 2017.

Internal MISP references

UUID 11bb1f9b-53c1-4738-ab66-56522f228743 which can be used as unique global reference for GitHub SHB Credential Guard in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-04-25T00:00:00Z
date_published 2017-04-20T00:00:00Z
source MITRE
title Secure Host Baseline - Credential Guard

Secure Host Baseline EMET

National Security Agency. (2016, May 4). Secure Host Baseline EMET. Retrieved June 22, 2016.

Internal MISP references

UUID 00953d3e-5fe7-454a-8d01-6405f74cca80 which can be used as unique global reference for Secure Host Baseline EMET in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-22T00:00:00Z
date_published 2016-05-04T00:00:00Z
source MITRE
title Secure Host Baseline EMET

TechNet Secure Boot Process

Microsoft. (n.d.). Secure the Windows 10 boot process. Retrieved April 23, 2020.

Internal MISP references

UUID 3f0ff65d-56a0-4c29-b561-e6342b0b6b65 which can be used as unique global reference for TechNet Secure Boot Process in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-04-23T00:00:00Z
source MITRE
title Secure the Windows 10 boot process

SecureWorks August 2019

SecureWorks. (2019, August 27) LYCEUM Takes Center Stage in Middle East Campaign. Retrieved November 19, 2019

Internal MISP references

UUID 573edbb6-687b-4bc2-bc4a-764a548633b5 which can be used as unique global reference for SecureWorks August 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-11-19T00:00:00Z
date_published 2019-08-27T00:00:00Z
source MITRE
title SecureWorks August 2019

SecureWorks September 2019

SecureWorks. (2019, September 24) REvil/Sodinokibi Ransomware. Retrieved April 12, 2021

Internal MISP references

UUID dc3387b0-c845-5b5a-afef-bc518ecbfb1f which can be used as unique global reference for SecureWorks September 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-12T00:00:00Z
source MITRE
title SecureWorks September 2019

Securing bash history

Mathew Branwell. (2012, March 21). Securing .bash_history file. Retrieved July 8, 2017.

Internal MISP references

UUID 15280399-e9c8-432c-8ee2-47ced9377378 which can be used as unique global reference for Securing bash history in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-08T00:00:00Z
date_published 2012-03-21T00:00:00Z
source MITRE
title Securing .bash_history file

Microsoft Securing Privileged Access

Plett, C., Poggemeyer, L. (2012, October 26). Securing Privileged Access Reference Material. Retrieved April 25, 2017.

Internal MISP references

UUID 716844d6-a6ed-41d4-9067-3822ed32828f which can be used as unique global reference for Microsoft Securing Privileged Access in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-04-25T00:00:00Z
date_published 2012-10-26T00:00:00Z
source MITRE
title Securing Privileged Access Reference Material

Berkley Secure

Berkeley Security, University of California. (n.d.). Securing Remote Desktop for System Administrators. Retrieved November 4, 2014.

Internal MISP references

UUID 98bdf25b-fbad-497f-abd2-8286d9e0479c which can be used as unique global reference for Berkley Secure in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-04T00:00:00Z
source MITRE
title Securing Remote Desktop for System Administrators

Cisco Securing SNMP

Cisco. (2006, May 10). Securing Simple Network Management Protocol. Retrieved October 19, 2020.

Internal MISP references

UUID 31de3a32-ae7a-42bf-9153-5d891651a7d1 which can be used as unique global reference for Cisco Securing SNMP in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
date_published 2006-05-10T00:00:00Z
source MITRE
title Securing Simple Network Management Protocol

ADSecurity Windows Secure Baseline

Metcalf, S. (2016, October 21). Securing Windows Workstations: Developing a Secure Baseline. Retrieved November 17, 2017.

Internal MISP references

UUID 078b9848-8e5f-4750-bb90-3e110876a6a4 which can be used as unique global reference for ADSecurity Windows Secure Baseline in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-17T00:00:00Z
date_published 2016-10-21T00:00:00Z
source MITRE
title Securing Windows Workstations: Developing a Secure Baseline

Morphisec ShellTea June 2019

Gorelik, M.. (2019, June 10). SECURITY ALERT: FIN8 IS BACK IN BUSINESS, TARGETING THE HOSPITALITY INDUSTRY. Retrieved June 13, 2019.

Internal MISP references

UUID 1b6ce918-651a-480d-8305-82bccbf42e96 which can be used as unique global reference for Morphisec ShellTea June 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-13T00:00:00Z
date_published 2019-06-10T00:00:00Z
source MITRE
title SECURITY ALERT: FIN8 IS BACK IN BUSINESS, TARGETING THE HOSPITALITY INDUSTRY

Carbon Black Obfuscation Sept 2016

Tedesco, B. (2016, September 23). Security Alert Summary. Retrieved February 12, 2018.

Internal MISP references

UUID bed8ae68-9738-46fb-abc9-0004fa35636a which can be used as unique global reference for Carbon Black Obfuscation Sept 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-12T00:00:00Z
date_published 2016-09-23T00:00:00Z
source MITRE
title Security Alert Summary

NIST Special Publication 800-53 Revision 5

National Institute of Standards and Technology. (2020, September). Security and Privacy Controlsfor Information Systems and Organizations. Retrieved August 30, 2024.

Internal MISP references

UUID c07bed36-e1a4-598c-9361-6fb5402947ff which can be used as unique global reference for NIST Special Publication 800-53 Revision 5 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-30T00:00:00Z
date_published 2020-09-01T00:00:00Z
source MITRE
title Security and Privacy Controlsfor Information Systems and Organizations

Havana authentication bug

Jay Pipes. (2013, December 23). Security Breach! Tenant A is seeing the VNC Consoles of Tenant B!. Retrieved September 12, 2024.

Internal MISP references

UUID 255181c2-b1c5-4531-bc16-853f21bc6435 which can be used as unique global reference for Havana authentication bug in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2013-12-23T00:00:00Z
source MITRE
title Security Breach! Tenant A is seeing the VNC Consoles of Tenant B!

Proofpoint TA450 Phishing March 2024

Miller, J. et al. (2024, March 21). Security Brief: TA450 Uses Embedded Links in PDF Attachments in Latest Campaign. Retrieved March 27, 2024.

Internal MISP references

UUID 263be6fe-d9ed-5216-a0be-e8391dbd83e6 which can be used as unique global reference for Proofpoint TA450 Phishing March 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-27T00:00:00Z
date_published 2024-03-21T00:00:00Z
source MITRE
title Security Brief: TA450 Uses Embedded Links in PDF Attachments in Latest Campaign

Microsoft Trust Considerations Nov 2014

Microsoft. (2014, November 19). Security Considerations for Trusts. Retrieved November 30, 2017.

Internal MISP references

UUID 01ddd53c-1f02-466d-abf2-43bf1ab2d3fc which can be used as unique global reference for Microsoft Trust Considerations Nov 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-30T00:00:00Z
date_published 2014-11-19T00:00:00Z
source MITRE
title Security Considerations for Trusts

AWS Sec Groups VPC

Amazon. (n.d.). Security groups for your VPC. Retrieved October 13, 2021.

Internal MISP references

UUID a5dd078b-10c7-433d-b7b5-929cf8437413 which can be used as unique global reference for AWS Sec Groups VPC in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-13T00:00:00Z
source MITRE
title Security groups for your VPC

Microsoft SID

Microsoft. (n.d.). Security Identifiers. Retrieved November 30, 2017.

Internal MISP references

UUID c921c476-741e-4b49-8f94-752984adbba5 which can be used as unique global reference for Microsoft SID in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-30T00:00:00Z
source MITRE
title Security Identifiers

Schneider Electric USB Malware

Schneider Electric. (2018, August 24). Security Notification – USB Removable Media Provided With Conext Combox and Conext Battery Monitor. Retrieved May 28, 2019.

Internal MISP references

UUID e4d8ce63-8626-4c8f-a437-b6a120ff61c7 which can be used as unique global reference for Schneider Electric USB Malware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-05-28T00:00:00Z
date_published 2018-08-24T00:00:00Z
source MITRE
title Security Notification – USB Removable Media Provided With Conext Combox and Conext Battery Monitor

Electron 3

Alanna Titterington. (2023, September 14). Security of Electron-based desktop applications. Retrieved March 7, 2024.

Internal MISP references

UUID e3e9d747-d5d7-5d36-b5fc-9f58b1d330f3 which can be used as unique global reference for Electron 3 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-07T00:00:00Z
date_published 2023-09-14T00:00:00Z
source MITRE
title Security of Electron-based desktop applications

Apple Dev SecurityD

Apple. (n.d.). Security Server and Security Agent. Retrieved March 29, 2024.

Internal MISP references

UUID 2b63d6c7-138b-5a9b-83e0-58f3d34723da which can be used as unique global reference for Apple Dev SecurityD in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-29T00:00:00Z
source MITRE
title Security Server and Security Agent

Microsoft Security Subsystem

Microsoft. (n.d.). Security Subsystem Architecture. Retrieved November 27, 2017.

Internal MISP references

UUID 27dae010-e3b3-4080-8039-9f89a29607e6 which can be used as unique global reference for Microsoft Security Subsystem in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-27T00:00:00Z
source MITRE
title Security Subsystem Architecture

CISA IDN ST05-016

CISA. (2019, September 27). Security Tip (ST05-016): Understanding Internationalized Domain Names. Retrieved October 20, 2020.

Internal MISP references

UUID 3cc2c996-10e9-4e25-999c-21dc2c69e4af which can be used as unique global reference for CISA IDN ST05-016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
date_published 2019-09-27T00:00:00Z
source MITRE
title Security Tip (ST05-016): Understanding Internationalized Domain Names

AADInternals zure AD Federated Domain

Dr. Nestori Syynimaa. (2017, November 16). Security vulnerability in Azure AD & Office 365 identity federation. Retrieved September 28, 2022.

Internal MISP references

UUID d2005eb6-4da4-4938-97fb-caa0e2381f4e which can be used as unique global reference for AADInternals zure AD Federated Domain in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-28T00:00:00Z
date_published 2017-11-16T00:00:00Z
source MITRE
title Security vulnerability in Azure AD & Office 365 identity federation

Azure AD Federation Vulnerability

Dr. Nestori Syynimaa.. (2017, November 16). Security vulnerability in Azure AD & Office 365 identity federation. Retrieved February 1, 2022.

Internal MISP references

UUID 123995be-36f5-4cd6-b80a-d601c2d0971e which can be used as unique global reference for Azure AD Federation Vulnerability in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-01T00:00:00Z
date_published 2017-11-16T00:00:00Z
source MITRE
title Security vulnerability in Azure AD & Office 365 identity federation

ESET Sednit July 2015

ESET Research. (2015, July 10). Sednit APT Group Meets Hacking Team. Retrieved March 1, 2017.

Internal MISP references

UUID e21c39ad-85e5-49b4-8df7-e8890b09c7c1 which can be used as unique global reference for ESET Sednit July 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-01T00:00:00Z
date_published 2015-07-10T00:00:00Z
source MITRE
title Sednit APT Group Meets Hacking Team

ESET Sednit USBStealer 2014

Calvet, J. (2014, November 11). Sednit Espionage Group Attacking Air-Gapped Networks. Retrieved January 4, 2017.

Internal MISP references

UUID 8673f7fc-5b23-432a-a2d8-700ece46bd0f which can be used as unique global reference for ESET Sednit USBStealer 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-01-04T00:00:00Z
date_published 2014-11-11T00:00:00Z
source MITRE
title Sednit Espionage Group Attacking Air-Gapped Networks

ESET Sednit 2017 Activity

ESET. (2017, December 21). Sednit update: How Fancy Bear Spent the Year. Retrieved February 18, 2019.

Internal MISP references

UUID 406e434e-0602-4a08-bbf6-6d72311a720e which can be used as unique global reference for ESET Sednit 2017 Activity in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-18T00:00:00Z
date_published 2017-12-21T00:00:00Z
source MITRE
title Sednit update: How Fancy Bear Spent the Year

ESET Zebrocy Nov 2018

ESET. (2018, November 20). Sednit: What’s going on with Zebrocy?. Retrieved February 12, 2019.

Internal MISP references

UUID 1e503e32-75aa-482b-81d3-ac61e806fa5c which can be used as unique global reference for ESET Zebrocy Nov 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-12T00:00:00Z
date_published 2018-11-20T00:00:00Z
source MITRE
title Sednit: What’s going on with Zebrocy?

Symantec MuddyWater Dec 2018

Symantec DeepSight Adversary Intelligence Team. (2018, December 10). Seedworm: Group Compromises Government Agencies, Oil & Gas, NGOs, Telecoms, and IT Firms. Retrieved December 14, 2018.

Internal MISP references

UUID a8e58ef1-91e1-4f93-b2ff-faa7a6365f5d which can be used as unique global reference for Symantec MuddyWater Dec 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-12-14T00:00:00Z
date_published 2018-12-10T00:00:00Z
source MITRE, Tidal Cyber
title Seedworm: Group Compromises Government Agencies, Oil & Gas, NGOs, Telecoms, and IT Firms

SanDisk SMART

SanDisk. (n.d.). Self-Monitoring, Analysis and Reporting Technology (S.M.A.R.T.). Retrieved October 2, 2018.

Internal MISP references

UUID 578464ff-79d4-4358-9aa6-df8d7063fee1 which can be used as unique global reference for SanDisk SMART in MISP communities and other software using the MISP galaxy

Associated metadata
Metadata key Value
date_accessed 2018-10-02T00:00:00Z
source MITRE
title Self-Monitoring, Analysis and Reporting Technology (S.M.A.R.T.)

SELinux official

SELinux Project. (2017, November 30). SELinux Project Wiki. Retrieved December 20, 2017.

Internal MISP references

UUID 3b64ce9e-6eec-42ee-bec1-1a8b5420f01d which can be used as unique global reference for SELinux official in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-20T00:00:00Z
date_published 2017-11-30T00:00:00Z
source MITRE
title SELinux Project Wiki

Microsoft SendNotifyMessage function

Microsoft. (n.d.). SendNotifyMessage function. Retrieved December 16, 2017.

Internal MISP references

UUID c65b3dc8-4129-4c14-b3d1-7fdd1d39ebd5 which can be used as unique global reference for Microsoft SendNotifyMessage function in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-16T00:00:00Z
source MITRE
title SendNotifyMessage function

DFIR Report Gootloader

The DFIR Report. (2022, May 9). SEO Poisoning – A Gootloader Story. Retrieved September 30, 2022.

Internal MISP references

UUID aa12dc30-ba81-46c5-b412-ca4a01e72d7f which can be used as unique global reference for DFIR Report Gootloader in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-30T00:00:00Z
date_published 2022-05-09T00:00:00Z
source MITRE
title SEO Poisoning – A Gootloader Story

MalwareBytes SEO

Arntz, P. (2018, May 29). SEO poisoning: Is it worth it?. Retrieved September 30, 2022.

Internal MISP references

UUID 250b09a2-dd97-4fbf-af2f-618d1f126957 which can be used as unique global reference for MalwareBytes SEO in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-30T00:00:00Z
date_published 2018-05-29T00:00:00Z
source MITRE
title SEO poisoning: Is it worth it?

Sophos Attachment

Ducklin, P. (2020, October 2). Serious Security: Phishing without links – when phishers bring along their own web pages. Retrieved October 20, 2020.

Internal MISP references

UUID b4aa5bf9-31db-42ee-93e8-a576ecc00b57 which can be used as unique global reference for Sophos Attachment in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
date_published 2020-10-02T00:00:00Z
source MITRE
title Serious Security: Phishing without links – when phishers bring along their own web pages

ProofPoint Serpent

Campbell, B. et al. (2022, March 21). Serpent, No Swiping! New Backdoor Targets French Entities with Unique Attack Chain. Retrieved April 11, 2022.

Internal MISP references

UUID c2f7958b-f521-4133-9aeb-c5c8fae23e78 which can be used as unique global reference for ProofPoint Serpent in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-11T00:00:00Z
date_published 2022-03-21T00:00:00Z
source MITRE
title Serpent, No Swiping! New Backdoor Targets French Entities with Unique Attack Chain

Wikipedia SMB

Wikipedia. (2016, June 12). Server Message Block. Retrieved June 12, 2016.

Internal MISP references

UUID 087b4779-22d5-4872-adb7-583904a92285 which can be used as unique global reference for Wikipedia SMB in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-12T00:00:00Z
date_published 2016-06-12T00:00:00Z
source MITRE
title Server Message Block

Wikipedia Server Message Block

Wikipedia. (2017, December 16). Server Message Block. Retrieved December 21, 2017.

Internal MISP references

UUID 3ea03c65-12e0-4e28-bbdc-17bb8c1e1831 which can be used as unique global reference for Wikipedia Server Message Block in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-21T00:00:00Z
date_published 2017-12-16T00:00:00Z
source MITRE
title Server Message Block

Proofpoint TA505 Jan 2019

Schwarz, D. and Proofpoint Staff. (2019, January 9). ServHelper and FlawedGrace - New malware introduced by TA505. Retrieved May 28, 2019.

Internal MISP references

UUID b744f739-8810-4fb9-96e3-6488f9ed6305 which can be used as unique global reference for Proofpoint TA505 Jan 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-05-28T00:00:00Z
date_published 2019-01-09T00:00:00Z
source MITRE
title ServHelper and FlawedGrace - New malware introduced by TA505

Kubernetes Service Accounts Security

Kubernetes. (n.d.). Service Accounts. Retrieved July 14, 2023.

Internal MISP references

UUID 522eaa6b-0075-5346-bf3c-db1e7820aba2 which can be used as unique global reference for Kubernetes Service Accounts Security in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-14T00:00:00Z
source MITRE
title Service Accounts

GCP Service Accounts

Google. (n.d.). Service Accounts Overview. Retrieved February 28, 2024.

Internal MISP references

UUID 7409c7d3-97a0-5f17-9061-cdaf41274647 which can be used as unique global reference for GCP Service Accounts in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-28T00:00:00Z
source MITRE
title Service Accounts Overview

Microsoft Service Control Manager

Microsoft. (2018, May 31). Service Control Manager. Retrieved March 28, 2020.

Internal MISP references

UUID 00d22c6d-a51a-4107-bf75-53ec3330db92 which can be used as unique global reference for Microsoft Service Control Manager in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-28T00:00:00Z
date_published 2018-05-31T00:00:00Z
source MITRE
title Service Control Manager

Rapid7 Service Persistence 22JUNE2016

Rapid7. (2016, June 22). Service Persistence. Retrieved April 23, 2019.

Internal MISP references

UUID 75441af3-2ff6-42c8-b7f1-c8dc2c27efe2 which can be used as unique global reference for Rapid7 Service Persistence 22JUNE2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-23T00:00:00Z
date_published 2016-06-22T00:00:00Z
source MITRE
title Service Persistence

Microsoft SPN

Microsoft. (n.d.). Service Principal Names. Retrieved March 22, 2018.

Internal MISP references

UUID 985ad31b-c385-473d-978d-40b6cd85268a which can be used as unique global reference for Microsoft SPN in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-22T00:00:00Z
source MITRE
title Service Principal Names

Microsoft SetSPN

Microsoft. (2010, April 13). Service Principal Names (SPNs) SetSPN Syntax (Setspn.exe). Retrieved March 22, 2018.

Internal MISP references

UUID dd5dc432-32de-4bf3-b2c7-0bbdda031dd0 which can be used as unique global reference for Microsoft SetSPN in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-22T00:00:00Z
date_published 2010-04-13T00:00:00Z
source MITRE
title Service Principal Names (SPNs) SetSPN Syntax (Setspn.exe)

Twitter Service Recovery Nov 2017

The Cyber (@r0wdy_). (2017, November 30). Service Recovery Parameters. Retrieved April 9, 2018.

Internal MISP references

UUID 8875ff5d-65bc-402a-bfe0-32adc10fb008 which can be used as unique global reference for Twitter Service Recovery Nov 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-09T00:00:00Z
date_published 2017-11-30T00:00:00Z
source MITRE
title Service Recovery Parameters

Tweet Registry Perms Weakness

@r0wdy_. (2017, November 30). Service Recovery Parameters. Retrieved September 12, 2024.

Internal MISP references

UUID 7757776d-b0e9-4a99-8a55-2cd1b248c4a0 which can be used as unique global reference for Tweet Registry Perms Weakness in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2017-11-30T00:00:00Z
source MITRE
title Service Recovery Parameters

TechNet Services

Microsoft. (n.d.). Services. Retrieved June 7, 2016.

Internal MISP references

UUID b50a3c2e-e997-4af5-8be0-3a8b3a959827 which can be used as unique global reference for TechNet Services in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-07T00:00:00Z
source MITRE
title Services

Krebs Access Brokers Fortune 500

Brian Krebs. (2012, October 22). Service Sells Access to Fortune 500 Firms. Retrieved March 10, 2023.

Internal MISP references

UUID 37d237ae-f0a8-5b30-8f97-d751c1560391 which can be used as unique global reference for Krebs Access Brokers Fortune 500 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-10T00:00:00Z
date_published 2012-10-22T00:00:00Z
source MITRE
title Service Sells Access to Fortune 500 Firms

Permiso SES Abuse 2023

Nathan Eades. (2023, January 12). SES-pionage. Retrieved September 25, 2024.

Internal MISP references

UUID 04541283-247a-5a8c-8017-4d74967e194c which can be used as unique global reference for Permiso SES Abuse 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-25T00:00:00Z
date_published 2023-01-12T00:00:00Z
source MITRE
title SES-pionage

Session Management Cheat Sheet

OWASP CheatSheets Series Team. (n.d.). Session Management Cheat Sheet. Retrieved December 26, 2023.

Internal MISP references

UUID 8b979a57-8238-5a68-bb0f-0301fa1b6432 which can be used as unique global reference for Session Management Cheat Sheet in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-26T00:00:00Z
source MITRE
title Session Management Cheat Sheet

Medium Authentication Tokens

Hsu, S. (2018, June 30). Session vs Token Based Authentication. Retrieved September 29, 2021.

Internal MISP references

UUID 08b5165c-1c98-4ebc-9f9f-778115e9e06d which can be used as unique global reference for Medium Authentication Tokens in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-29T00:00:00Z
date_published 2018-06-30T00:00:00Z
source MITRE
title Session vs Token Based Authentication

Microsoft Set-InboxRule

Microsoft. (n.d.). Set-InboxRule. Retrieved June 7, 2021.

Internal MISP references

UUID 28cc6142-cc4f-4e63-bcff-94347bc06b37 which can be used as unique global reference for Microsoft Set-InboxRule in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-07T00:00:00Z
source MITRE
title Set-InboxRule

Setres.exe - LOLBAS Project

LOLBAS. (2022, October 21). Setres.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 631de0bd-d536-4183-bc5a-25af83bd795a which can be used as unique global reference for Setres.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2022-10-21T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Setres.exe

Microsoft Process Wide Com Keys

Microsoft. (n.d.). Setting Process-Wide Security Through the Registry. Retrieved November 21, 2017.

Internal MISP references

UUID 749d83a9-3c9f-42f4-b5ed-fa775b079716 which can be used as unique global reference for Microsoft Process Wide Com Keys in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-21T00:00:00Z
source MITRE
title Setting Process-Wide Security Through the Registry

SettingSyncHost.exe - LOLBAS Project

LOLBAS. (2021, August 26). SettingSyncHost.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 57f573f2-1c9b-4037-8f4d-9ae65d13af94 which can be used as unique global reference for SettingSyncHost.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-08-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title SettingSyncHost.exe

Petri Logon Script AD

Daniel Petri. (2009, January 8). Setting up a Logon Script through Active Directory Users and Computers in Windows Server 2008. Retrieved November 15, 2019.

Internal MISP references

UUID 1de42b0a-3dd6-4f75-bcf3-a2373e349a39 which can be used as unique global reference for Petri Logon Script AD in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-11-15T00:00:00Z
date_published 2009-01-08T00:00:00Z
source MITRE
title Setting up a Logon Script through Active Directory Users and Computers in Windows Server 2008

AWS Setting Up Run Command

AWS. (n.d.). Setting up Run Command. Retrieved March 13, 2023.

Internal MISP references

UUID 9d320336-5be4-5c20-8205-a139376fe648 which can be used as unique global reference for AWS Setting Up Run Command in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-13T00:00:00Z
source MITRE
title Setting up Run Command

VNC Authentication

Tegan. (2019, August 15). Setting up System Authentication. Retrieved September 20, 2021.

Internal MISP references

UUID de6e1202-19aa-41af-8446-521abc20200d which can be used as unique global reference for VNC Authentication in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-20T00:00:00Z
date_published 2019-08-15T00:00:00Z
source MITRE
title Setting up System Authentication

MacOS VNC software for Remote Desktop

Apple Support. (n.d.). Set up a computer running VNC software for Remote Desktop. Retrieved August 18, 2021.

Internal MISP references

UUID c1f7fb59-6e61-4a7f-b14d-a3d1d3da45af which can be used as unique global reference for MacOS VNC software for Remote Desktop in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-18T00:00:00Z
source MITRE
title Set up a computer running VNC software for Remote Desktop

Setupapi.dll - LOLBAS Project

LOLBAS. (2018, May 25). Setupapi.dll. Retrieved December 4, 2023.

Internal MISP references

UUID 1a8a1434-fc4a-4c3e-9a9b-fb91692d7efd which can be used as unique global reference for Setupapi.dll - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Setupapi.dll

Microsoft Service Recovery Feb 2013

Microsoft. (2013, February 22). Set up Recovery Actions to Take Place When a Service Fails. Retrieved April 9, 2018.

Internal MISP references

UUID 6284d130-83e5-4961-a723-af4f9a01c24e which can be used as unique global reference for Microsoft Service Recovery Feb 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-09T00:00:00Z
date_published 2013-02-22T00:00:00Z
source MITRE
title Set up Recovery Actions to Take Place When a Service Fails

Microsoft SetWindowLong function

Microsoft. (n.d.). SetWindowLong function. Retrieved December 16, 2017.

Internal MISP references

UUID 11755d06-a9df-4a19-a165-2995f25c4b12 which can be used as unique global reference for Microsoft SetWindowLong function in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-16T00:00:00Z
source MITRE
title SetWindowLong function

Securelist ShadowPad Aug 2017

GReAT. (2017, August 15). ShadowPad in corporate networks. Retrieved March 22, 2021.

Internal MISP references

UUID 862877d7-e18c-4613-bdad-0700bf3d45ae which can be used as unique global reference for Securelist ShadowPad Aug 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-22T00:00:00Z
date_published 2017-08-15T00:00:00Z
source MITRE
title ShadowPad in corporate networks

Kaspersky ShadowPad Aug 2017

Kaspersky Lab. (2017, August). ShadowPad: popular server management software hit in supply chain attack. Retrieved March 22, 2021.

Internal MISP references

UUID 95c9a28d-6056-4f87-9a46-9491318889e2 which can be used as unique global reference for Kaspersky ShadowPad Aug 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-22T00:00:00Z
date_published 2017-08-01T00:00:00Z
source MITRE
title ShadowPad: popular server management software hit in supply chain attack

Palo Alto Shamoon Nov 2016

Falcone, R.. (2016, November 30). Shamoon 2: Return of the Disttrack Wiper. Retrieved January 11, 2017.

Internal MISP references

UUID 15007a87-a281-41ae-b203-fdafe02a885f which can be used as unique global reference for Palo Alto Shamoon Nov 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-01-11T00:00:00Z
date_published 2016-11-30T00:00:00Z
source MITRE
title Shamoon 2: Return of the Disttrack Wiper

Unit 42 Shamoon3 2018

Falcone, R. (2018, December 13). Shamoon 3 Targets Oil and Gas Organization. Retrieved March 14, 2019.

Internal MISP references

UUID c2148166-faf4-4ab7-a37e-deae0c88c08d which can be used as unique global reference for Unit 42 Shamoon3 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-14T00:00:00Z
date_published 2018-12-13T00:00:00Z
source MITRE
title Shamoon 3 Targets Oil and Gas Organization

McAfee Shamoon December19 2018

Roccia, T., Saavedra-Morales, J., Beek, C.. (2018, December 19). Shamoon Attackers Employ New Tool Kit to Wipe Infected Systems. Retrieved May 29, 2020.

Internal MISP references

UUID 11cb784e-0bfe-4e64-a1ed-56530798f358 which can be used as unique global reference for McAfee Shamoon December19 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-29T00:00:00Z
date_published 2018-12-19T00:00:00Z
source MITRE
title Shamoon Attackers Employ New Tool Kit to Wipe Infected Systems

McAfee Shamoon December 2018

Mundo, A., Roccia, T., Saavedra-Morales, J., Beek, C.. (2018, December 14). Shamoon Returns to Wipe Systems in Middle East, Europe . Retrieved May 29, 2020.

Internal MISP references

UUID d731f5b4-77a1-4de1-a00a-e2ad918de670 which can be used as unique global reference for McAfee Shamoon December 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-29T00:00:00Z
date_published 2018-12-14T00:00:00Z
source MITRE
title Shamoon Returns to Wipe Systems in Middle East, Europe

TechNet Shared Folder

Microsoft. (n.d.). Share a Folder or Drive. Retrieved June 30, 2017.

Internal MISP references

UUID 80a9b92a-1404-4454-88f0-dd929a12e16f which can be used as unique global reference for TechNet Shared Folder in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-06-30T00:00:00Z
source MITRE
title Share a Folder or Drive

AWS EBS Snapshot Sharing

Amazon Web Services. (n.d.). Share an Amazon EBS snapshot. Retrieved March 2, 2022.

Internal MISP references

UUID 6f454218-91b7-4606-9467-c6d465c0fd1f which can be used as unique global reference for AWS EBS Snapshot Sharing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-02T00:00:00Z
source MITRE
title Share an Amazon EBS snapshot

TLDP Shared Libraries

The Linux Documentation Project. (n.d.). Shared Libraries. Retrieved January 31, 2020.

Internal MISP references

UUID 2862845b-72b3-41d8-aafb-b36e90c6c30a which can be used as unique global reference for TLDP Shared Libraries in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-01-31T00:00:00Z
source MITRE
title Shared Libraries

Linux Shared Libraries

Wheeler, D. (2003, April 11). Shared Libraries. Retrieved September 7, 2023.

Internal MISP references

UUID 054d769a-f88e-55e9-971a-f169ee434cfe which can be used as unique global reference for Linux Shared Libraries in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-07T00:00:00Z
date_published 2003-04-11T00:00:00Z
source MITRE
title Shared Libraries

Phrack halfdead 1997

halflife. (1997, September 1). Shared Library Redirection Techniques. Retrieved December 20, 2017.

Internal MISP references

UUID 9b3f0dc7-d830-43c5-8a5b-ad3c811920c5 which can be used as unique global reference for Phrack halfdead 1997 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-20T00:00:00Z
date_published 1997-09-01T00:00:00Z
source MITRE
title Shared Library Redirection Techniques

Wikipedia Shared Resource

Wikipedia. (2017, April 15). Shared resource. Retrieved June 30, 2017.

Internal MISP references

UUID 6cc6164e-84b3-4413-9895-6719248808fb which can be used as unique global reference for Wikipedia Shared Resource in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-06-30T00:00:00Z
date_published 2017-04-15T00:00:00Z
source MITRE
title Shared resource

Sharepoint Sharing Events

Microsoft. (n.d.). Sharepoint Sharing Events. Retrieved October 8, 2021.

Internal MISP references

UUID 2086d37a-05a8-4604-9c69-75a178406b4a which can be used as unique global reference for Sharepoint Sharing Events in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-08T00:00:00Z
source MITRE
title Sharepoint Sharing Events

GitHub GhostPack Certificates

HarmJ0y. (2018, August 22). SharpDPAPI - Certificates. Retrieved August 2, 2022.

Internal MISP references

UUID 941e214d-4188-4ca0-9ef8-b26aa96373a2 which can be used as unique global reference for GitHub GhostPack Certificates in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-02T00:00:00Z
date_published 2018-08-22T00:00:00Z
source MITRE
title SharpDPAPI - Certificates

Shdocvw.dll - LOLBAS Project

LOLBAS. (2018, May 25). Shdocvw.dll. Retrieved December 4, 2023.

Internal MISP references

UUID 0739d5fe-b460-4ed4-be75-cff422643a32 which can be used as unique global reference for Shdocvw.dll - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Shdocvw.dll

Securelist Turla Oct 2018

Kaspersky Lab's Global Research & Analysis Team. (2018, October 04). Shedding Skin – Turla’s Fresh Faces. Retrieved November 7, 2018.

Internal MISP references

UUID 5b08ea46-e25d-4df9-9b91-f8e7a1d5f7ee which can be used as unique global reference for Securelist Turla Oct 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-07T00:00:00Z
date_published 2018-10-04T00:00:00Z
source MITRE
title Shedding Skin – Turla’s Fresh Faces

Shell32.dll - LOLBAS Project

LOLBAS. (2018, May 25). Shell32.dll. Retrieved December 4, 2023.

Internal MISP references

UUID 9465358f-e0cc-41f0-a7f9-01d5faca8157 which can be used as unique global reference for Shell32.dll - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Shell32.dll

Cylance Shell Crew Feb 2017

Cylance SPEAR Team. (2017, February 9). Shell Crew Variants Continue to Fly Under Big AV’s Radar. Retrieved February 15, 2017.

Internal MISP references

UUID c0fe5d29-838b-4e91-bd33-59ab3dbcfbc3 which can be used as unique global reference for Cylance Shell Crew Feb 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-02-15T00:00:00Z
date_published 2017-02-09T00:00:00Z
source MITRE
title Shell Crew Variants Continue to Fly Under Big AV’s Radar

Magento

Cesar Anjos. (2018, May 31). Shell Logins as a Magento Reinfection Vector. Retrieved December 17, 2020.

Internal MISP references

UUID b8b3f360-e14c-49ea-a4e5-8d6d9727e731 which can be used as unique global reference for Magento in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-17T00:00:00Z
date_published 2018-05-31T00:00:00Z
source MITRE
title Shell Logins as a Magento Reinfection Vector

Trend Micro TA505 June 2019

Hiroaki, H. and Lu, L. (2019, June 12). Shifting Tactics: Breaking Down TA505 Group’s Use of HTML, RATs and Other Techniques in Latest Campaigns. Retrieved May 29, 2020.

Internal MISP references

UUID e664a0c7-154f-449e-904d-335be1b72b29 which can be used as unique global reference for Trend Micro TA505 June 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-29T00:00:00Z
date_published 2019-06-12T00:00:00Z
source MITRE
title Shifting Tactics: Breaking Down TA505 Group’s Use of HTML, RATs and Other Techniques in Latest Campaigns

Shimgvw.dll - LOLBAS Project

LOLBAS. (2021, January 6). Shimgvw.dll. Retrieved December 4, 2023.

Internal MISP references

UUID aba1cc57-ac30-400f-8b02-db7bf279dfb6 which can be used as unique global reference for Shimgvw.dll - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-01-06T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Shimgvw.dll

Binary Defense Kerberos Linux

ARC Labs, Dwyer, John. Gonzalez, Eric. Hudak, Tyler. (2024, October 1). Shining a Light in the Dark – How Binary Defense Uncovered an APT Lurking in Shadows of IT. Retrieved October 7, 2024.

Internal MISP references

UUID 588d7272-a3c4-561e-883e-49e8effa4e78 which can be used as unique global reference for Binary Defense Kerberos Linux in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-07T00:00:00Z
date_published 2024-10-01T00:00:00Z
source MITRE
title Shining a Light in the Dark – How Binary Defense Uncovered an APT Lurking in Shadows of IT

FireEye Shining A Light on DARKSIDE May 2021

FireEye. (2021, May 11). Shining a Light on DARKSIDE Ransomware Operations. Retrieved September 22, 2021.

Internal MISP references

UUID 6ac6acc2-9fea-4887-99b2-9988991b47b6 which can be used as unique global reference for FireEye Shining A Light on DARKSIDE May 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-22T00:00:00Z
date_published 2021-05-11T00:00:00Z
source MITRE
title Shining a Light on DARKSIDE Ransomware Operations

Telekom Security DarkGate August 25 2023

Fabian Marquardt. (2023, August 25). Shining some light on the DarkGate loader. Retrieved October 20, 2023.

Internal MISP references

UUID 1cb60362-f73e-49e6-b0ee-e8f67a25c058 which can be used as unique global reference for Telekom Security DarkGate August 25 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-20T00:00:00Z
date_published 2023-08-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Shining some light on the DarkGate loader

NCC Group Black Basta June 2022

Inman, R. and Gurney, P. (2022, June 6). Shining the Light on Black Basta. Retrieved March 8, 2023.

Internal MISP references

UUID b5f91f77-b102-5812-a79f-69b254487da8 which can be used as unique global reference for NCC Group Black Basta June 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-08T00:00:00Z
date_published 2022-06-06T00:00:00Z
source MITRE
title Shining the Light on Black Basta

Trustwave Cherry Picker

Merritt, E.. (2015, November 16). Shining the Spotlight on Cherry Picker PoS Malware. Retrieved April 20, 2016.

Internal MISP references

UUID e09f639e-bdd3-4e88-8032-f665e347272b which can be used as unique global reference for Trustwave Cherry Picker in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-20T00:00:00Z
date_published 2015-11-16T00:00:00Z
source MITRE
title Shining the Spotlight on Cherry Picker PoS Malware

File obfuscation

Aspen Lindblom, Joseph Goodwin, and Chris Sheldon. (2021, July 19). Shlayer Malvertising Campaigns Still Using Flash Update Disguise. Retrieved March 29, 2024.

Internal MISP references

UUID 1fb860e8-47e4-5b6e-85ef-afe8de81a3b9 which can be used as unique global reference for File obfuscation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-29T00:00:00Z
date_published 2021-07-19T00:00:00Z
source MITRE
title Shlayer Malvertising Campaigns Still Using Flash Update Disguise

Shlayer jamf gatekeeper bypass 2021

Jaron Bradley. (2021, April 26). Shlayer malware abusing Gatekeeper bypass on macOS. Retrieved September 22, 2021.

Internal MISP references

UUID 9ece29ee-c4e9-4a30-9958-88b114a417ce which can be used as unique global reference for Shlayer jamf gatekeeper bypass 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-22T00:00:00Z
date_published 2021-04-26T00:00:00Z
source MITRE
title Shlayer malware abusing Gatekeeper bypass on macOS

Shodan

Shodan. (n.d.). Shodan. Retrieved October 20, 2020.

Internal MISP references

UUID a142aceb-3ef5-4231-8771-bb3b2dae9acd which can be used as unique global reference for Shodan in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
source MITRE
title Shodan

Shortcut for Persistence

Elastic. (n.d.). Shortcut File Written or Modified for Persistence. Retrieved June 1, 2022.

Internal MISP references

UUID 4a12e927-0511-40b1-85f3-869ffc452c2e which can be used as unique global reference for Shortcut for Persistence in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-01T00:00:00Z
source MITRE
title Shortcut File Written or Modified for Persistence

Unprotect Shortcut

Unprotect Project. (2019, March 18). Shortcut Hiding. Retrieved October 3, 2023.

Internal MISP references

UUID b62d40bc-2782-538a-8913-429908c6a2ee which can be used as unique global reference for Unprotect Shortcut in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-03T00:00:00Z
date_published 2019-03-18T00:00:00Z
source MITRE
title Shortcut Hiding

Sleep, shut down, hibernate

AVG. (n.d.). Should You Shut Down, Sleep or Hibernate Your PC or Mac Laptop?. Retrieved June 8, 2023.

Internal MISP references

UUID e9064801-0297-51d0-9089-db58f4811a9f which can be used as unique global reference for Sleep, shut down, hibernate in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-08T00:00:00Z
source MITRE
title Should You Shut Down, Sleep or Hibernate Your PC or Mac Laptop?

show_clock_detail_cisco_cmd

Cisco. (2023, March 6). show clock detail - Cisco IOS Security Command Reference: Commands S to Z . Retrieved July 13, 2022.

Internal MISP references

UUID a2215813-31b0-5624-92d8-479e7bd1a30b which can be used as unique global reference for show_clock_detail_cisco_cmd in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-13T00:00:00Z
date_published 2023-03-06T00:00:00Z
source MITRE
title show clock detail - Cisco IOS Security Command Reference: Commands S to Z

show_processes_cisco_cmd

Cisco. (2022, August 16). show processes - . Retrieved July 13, 2022.

Internal MISP references

UUID 944e529b-5e8a-54a1-b205-71dcb7dd304f which can be used as unique global reference for show_processes_cisco_cmd in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-13T00:00:00Z
date_published 2022-08-16T00:00:00Z
source MITRE
title show processes -

show_run_config_cmd_cisco

Cisco. (2022, August 16). show running-config - Cisco IOS Configuration Fundamentals Command Reference . Retrieved July 13, 2022.

Internal MISP references

UUID 5a68a45a-a53e-5d73-a82a-0cc951071aef which can be used as unique global reference for show_run_config_cmd_cisco in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-13T00:00:00Z
date_published 2022-08-16T00:00:00Z
source MITRE
title show running-config - Cisco IOS Configuration Fundamentals Command Reference

Symantec Shuckworm January 2022

Symantec. (2022, January 31). Shuckworm Continues Cyber-Espionage Attacks Against Ukraine. Retrieved February 17, 2022.

Internal MISP references

UUID 3abb9cfb-8927-4447-b904-6ed071787bef which can be used as unique global reference for Symantec Shuckworm January 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-17T00:00:00Z
date_published 2022-01-31T00:00:00Z
source MITRE, Tidal Cyber
title Shuckworm Continues Cyber-Espionage Attacks Against Ukraine

Microsoft Shutdown Oct 2017

Microsoft. (2017, October 15). Shutdown. Retrieved October 4, 2019.

Internal MISP references

UUID c587f021-596a-4e63-ac51-afa2793a859d which can be used as unique global reference for Microsoft Shutdown Oct 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-04T00:00:00Z
date_published 2017-10-15T00:00:00Z
source MITRE
title Shutdown

MalwareBytes SideCopy Dec 2021

Threat Intelligence Team. (2021, December 2). SideCopy APT: Connecting lures victims, payloads to infrastructure. Retrieved June 13, 2022.

Internal MISP references

UUID 466569a7-1ef8-4824-bd9c-d25301184ea4 which can be used as unique global reference for MalwareBytes SideCopy Dec 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-13T00:00:00Z
date_published 2021-12-02T00:00:00Z
source MITRE
title SideCopy APT: Connecting lures victims, payloads to infrastructure

Rewterz Sidewinder APT April 2020

Rewterz. (2020, April 20). Sidewinder APT Group Campaign Analysis. Retrieved January 29, 2021.

Internal MISP references

UUID e1cecdab-d6d1-47c6-a942-3f3329e5d98d which can be used as unique global reference for Rewterz Sidewinder APT April 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-29T00:00:00Z
date_published 2020-04-20T00:00:00Z
source MITRE
title Sidewinder APT Group Campaign Analysis

Cyble Sidewinder September 2020

Cyble. (2020, September 26). SideWinder APT Targets with futuristic Tactics and Techniques. Retrieved January 29, 2021.

Internal MISP references

UUID 25d8d6df-d3b9-4f57-bce0-d5285660e746 which can be used as unique global reference for Cyble Sidewinder September 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-29T00:00:00Z
date_published 2020-09-26T00:00:00Z
source MITRE
title SideWinder APT Targets with futuristic Tactics and Techniques

Microsoft Sigcheck May 2017

Russinovich, M. et al.. (2017, May 22). Sigcheck. Retrieved April 3, 2018.

Internal MISP references

UUID 7f3a0f44-03d4-4b02-9d9d-74e8ee9eede8 which can be used as unique global reference for Microsoft Sigcheck May 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-03T00:00:00Z
date_published 2017-05-22T00:00:00Z
source MITRE
title Sigcheck

Linux Signal Man

Linux man-pages. (2023, April 3). signal(7). Retrieved August 30, 2023.

Internal MISP references

UUID 63483956-fa3e-52da-a834-b3b762c4e84e which can be used as unique global reference for Linux Signal Man in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-30T00:00:00Z
date_published 2023-04-03T00:00:00Z
source MITRE
title signal(7)

f-secure janicab

Brod. (2013, July 15). Signed Mac Malware Using Right-to-Left Override Trick. Retrieved July 17, 2017.

Internal MISP references

UUID 07e484cb-7e72-4938-a029-f9904d751777 which can be used as unique global reference for f-secure janicab in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-17T00:00:00Z
date_published 2013-07-15T00:00:00Z
source MITRE
title Signed Mac Malware Using Right-to-Left Override Trick

Group IB Silence Aug 2019

Group-IB. (2019, August). Silence 2.0: Going Global. Retrieved May 5, 2020.

Internal MISP references

UUID 2c314eb6-767f-45b9-8a60-dba11e06afd8 which can be used as unique global reference for Group IB Silence Aug 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-05T00:00:00Z
date_published 2019-08-01T00:00:00Z
source MITRE
title Silence 2.0: Going Global

SecureList Silence Nov 2017

GReAT. (2017, November 1). Silence – a new Trojan attacking financial organizations. Retrieved May 24, 2019.

Internal MISP references

UUID 004a8877-7e57-48ad-a6ce-b9ad8577cc68 which can be used as unique global reference for SecureList Silence Nov 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-05-24T00:00:00Z
date_published 2017-11-01T00:00:00Z
source MITRE
title Silence – a new Trojan attacking financial organizations

Cyber Forensicator Silence Jan 2019

Skulkin, O.. (2019, January 20). Silence: Dissecting Malicious CHM Files and Performing Forensic Analysis. Retrieved May 24, 2019.

Internal MISP references

UUID c328d6d3-5e8b-45a6-8487-eecd7e8cbf7e which can be used as unique global reference for Cyber Forensicator Silence Jan 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-05-24T00:00:00Z
date_published 2019-01-20T00:00:00Z
source MITRE
title Silence: Dissecting Malicious CHM Files and Performing Forensic Analysis

Group IB Silence Sept 2018

Group-IB. (2018, September). Silence: Moving Into the Darkside. Retrieved May 5, 2020.

Internal MISP references

UUID 10d41d2e-44be-41a7-84c1-b8f39689cb93 which can be used as unique global reference for Group IB Silence Sept 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-05T00:00:00Z
date_published 2018-09-01T00:00:00Z
source MITRE
title Silence: Moving Into the Darkside

CrowdStrike Silent Chollima Adversary September 2021

CrowdStrike. (2021, September 29). Silent Chollima Adversary Profile. Retrieved September 29, 2021.

Internal MISP references

UUID 835283b5-af3b-4baf-805e-da8ebbe8b5d2 which can be used as unique global reference for CrowdStrike Silent Chollima Adversary September 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-29T00:00:00Z
date_published 2021-09-29T00:00:00Z
source MITRE, Tidal Cyber
title Silent Chollima Adversary Profile

Malwarebytes Silent Librarian October 2020

Malwarebytes Threat Intelligence Team. (2020, October 14). Silent Librarian APT right on schedule for 20/21 academic year. Retrieved February 3, 2021.

Internal MISP references

UUID 9bb8ddd0-a8ec-459b-9983-79ccf46297ca which can be used as unique global reference for Malwarebytes Silent Librarian October 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-03T00:00:00Z
date_published 2020-10-14T00:00:00Z
source MITRE
title Silent Librarian APT right on schedule for 20/21 academic year

Phish Labs Silent Librarian

Hassold, Crane. (2018, March 26). Silent Librarian: More to the Story of the Iranian Mabna Institute Indictment. Retrieved February 3, 2021.

Internal MISP references

UUID d79d0510-4d49-464d-8074-daedd186f1c1 which can be used as unique global reference for Phish Labs Silent Librarian in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-03T00:00:00Z
date_published 2018-03-26T00:00:00Z
source MITRE, Tidal Cyber
title Silent Librarian: More to the Story of the Iranian Mabna Institute Indictment

Trend Micro October 15 2024

Jacob Santos; Cj Arsley Mateo; Sarah Pearl Camiling Read time. (2024, October 15). Silent Threat Red Team Tool EDRSilencer Disrupting Endpoint Security Solutions. Retrieved October 17, 2024.

Internal MISP references

UUID 7c49c1fd-0a02-457d-97d2-13e72f489f1f which can be used as unique global reference for Trend Micro October 15 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-17T00:00:00Z
date_published 2024-10-15T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Silent Threat Red Team Tool EDRSilencer Disrupting Endpoint Security Solutions

Github_SILENTTRINITY

byt3bl33d3r. (n.d.). SILENTTRINITY. Retrieved September 12, 2024.

Internal MISP references

UUID b71c198b-0570-500c-b0dc-05e76dd383bb which can be used as unique global reference for Github_SILENTTRINITY in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
source MITRE
title SILENTTRINITY

GitHub SILENTTRINITY Modules July 2019

Salvati, M. (2019, August 6). SILENTTRINITY Modules. Retrieved March 24, 2022.

Internal MISP references

UUID df9252e6-2727-4b39-a5f8-9f01c85aae9d which can be used as unique global reference for GitHub SILENTTRINITY Modules July 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-24T00:00:00Z
date_published 2019-08-06T00:00:00Z
source MITRE
title SILENTTRINITY Modules

Unit 42 Siloscape Jun 2021

Prizmant, D. (2021, June 7). Siloscape: First Known Malware Targeting Windows Containers to Compromise Cloud Environments. Retrieved June 9, 2021.

Internal MISP references

UUID 4be128a7-97b8-48fa-8a52-a53c1e56f086 which can be used as unique global reference for Unit 42 Siloscape Jun 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-09T00:00:00Z
date_published 2021-06-07T00:00:00Z
source MITRE
title Siloscape: First Known Malware Targeting Windows Containers to Compromise Cloud Environments

Unit42 SilverTerrier 2016

Renals, P., Conant, S. (2016). SILVERTERRIER: The Next Evolution in Nigerian Cybercrime. Retrieved November 13, 2018.

Internal MISP references

UUID a6ba79ca-7d4a-48d3-aae3-ee766770f83b which can be used as unique global reference for Unit42 SilverTerrier 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-13T00:00:00Z
date_published 2016-01-01T00:00:00Z
source MITRE, Tidal Cyber
title SILVERTERRIER: The Next Evolution in Nigerian Cybercrime

Unit42 SilverTerrier 2018

Unit42. (2016). SILVERTERRIER: THE RISE OF NIGERIAN BUSINESS EMAIL COMPROMISE. Retrieved November 13, 2018.

Internal MISP references

UUID 59630d6e-d034-4788-b418-a72bafefe54e which can be used as unique global reference for Unit42 SilverTerrier 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-13T00:00:00Z
date_published 2016-01-01T00:00:00Z
source MITRE, Tidal Cyber
title SILVERTERRIER: THE RISE OF NIGERIAN BUSINESS EMAIL COMPROMISE

Timac DYLD_INSERT_LIBRARIES

Timac. (2012, December 18). Simple code injection using DYLD_INSERT_LIBRARIES. Retrieved March 26, 2020.

Internal MISP references

UUID 54fcbc49-f4e3-48a4-9d67-52ca08b322b2 which can be used as unique global reference for Timac DYLD_INSERT_LIBRARIES in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-26T00:00:00Z
date_published 2012-12-18T00:00:00Z
source MITRE
title Simple code injection using DYLD_INSERT_LIBRARIES

group-ib_muddywater_infra

Rostovcev, N. (2023, April 18). SimpleHarm: Tracking MuddyWater’s infrastructure. Retrieved July 11, 2024.

Internal MISP references

UUID 793d05a5-5b32-5bf7-9ffc-6ffa13b4c7a4 which can be used as unique global reference for group-ib_muddywater_infra in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-11T00:00:00Z
date_published 2023-04-18T00:00:00Z
source MITRE
title SimpleHarm: Tracking MuddyWater’s infrastructure

SIM Swapping and Abuse of the Microsoft Azure Serial Console

Mandiant Intelligence. (2023, May 16). SIM Swapping and Abuse of the Microsoft Azure Serial Console: Serial Is Part of a Well Balanced Attack. Retrieved June 2, 2023.

Internal MISP references

UUID c596a0e0-6e9c-52e4-b1bb-9c0542f960f2 which can be used as unique global reference for SIM Swapping and Abuse of the Microsoft Azure Serial Console in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-02T00:00:00Z
date_published 2023-05-16T00:00:00Z
source MITRE
title SIM Swapping and Abuse of the Microsoft Azure Serial Console: Serial Is Part of a Well Balanced Attack

EduardosBlog SIPs July 2008

Navarro, E. (2008, July 11). SIP’s (Subject Interface Package) and Authenticode. Retrieved January 31, 2018.

Internal MISP references

UUID ac37f167-3ae9-437b-9215-c30c1ab4e249 which can be used as unique global reference for EduardosBlog SIPs July 2008 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-31T00:00:00Z
date_published 2008-07-11T00:00:00Z
source MITRE
title SIP’s (Subject Interface Package) and Authenticode

Anonymous Hackers Deface Russian Govt Site

Andy. (2018, May 12). ‘Anonymous’ Hackers Deface Russian Govt. Site to Protest Web-Blocking (NSFW). Retrieved April 19, 2019.

Internal MISP references

UUID ca63ccd4-8c81-4de6-8eb4-06a6c68ce4d3 which can be used as unique global reference for Anonymous Hackers Deface Russian Govt Site in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-19T00:00:00Z
source MITRE
title Site to Protest Web-Blocking (NSFW)

Dell Skeleton

Dell SecureWorks. (2015, January 12). Skeleton Key Malware Analysis. Retrieved April 8, 2019.

Internal MISP references

UUID cea9ce77-7641-4086-b92f-a4c3ad94a49c which can be used as unique global reference for Dell Skeleton in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-08T00:00:00Z
date_published 2015-01-12T00:00:00Z
source MITRE
title Skeleton Key Malware Analysis

Command Five SK 2011

Command Five Pty Ltd. (2011, September). SK Hack by an Advanced Persistent Threat. Retrieved April 6, 2018.

Internal MISP references

UUID ccca927e-fa03-4eba-b631-9989804a1f3c which can be used as unique global reference for Command Five SK 2011 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-06T00:00:00Z
date_published 2011-09-01T00:00:00Z
source MITRE
title SK Hack by an Advanced Persistent Threat

Trend Micro Skidmap

Remillano, A., Urbanec, J. (2019, September 19). Skidmap Linux Malware Uses Rootkit Capabilities to Hide Cryptocurrency-Mining Payload. Retrieved June 4, 2020.

Internal MISP references

UUID 53291621-f0ad-4cb7-af08-78b96eb67168 which can be used as unique global reference for Trend Micro Skidmap in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-04T00:00:00Z
date_published 2019-09-19T00:00:00Z
source MITRE
title Skidmap Linux Malware Uses Rootkit Capabilities to Hide Cryptocurrency-Mining Payload

Detectify Slack Tokens

Detectify. (2016, April 28). Slack bot token leakage exposing business critical information. Retrieved October 19, 2020.

Internal MISP references

UUID 46c40ed4-5a15-4b38-b625-bebc569dbf69 which can be used as unique global reference for Detectify Slack Tokens in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
date_published 2016-04-28T00:00:00Z
source MITRE
title Slack bot token leakage exposing business critical information

Huntress ScreenConnect 2 23 2024

Team Huntress. (2024, February 23). SlashAndGrab ScreenConnect Post-Exploitation in the Wild (CVE-2024-1709 & CVE-2024-1708). Retrieved February 23, 2024.

Internal MISP references

UUID 203e002f-09b0-436d-b9c2-a8988ee0b7aa which can be used as unique global reference for Huntress ScreenConnect 2 23 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-23T00:00:00Z
date_published 2024-02-23T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title SlashAndGrab ScreenConnect Post-Exploitation in the Wild (CVE-2024-1709 & CVE-2024-1708)

GitHub Sliver C2

BishopFox. (n.d.). Sliver. Retrieved September 15, 2021.

Internal MISP references

UUID f706839a-c6e7-469b-a0c0-02c0d55eb4f6 which can be used as unique global reference for GitHub Sliver C2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-15T00:00:00Z
source MITRE
title Sliver

GitHub Sliver C2 DNS

BishopFox. (n.d.). Sliver DNS C2 . Retrieved September 15, 2021.

Internal MISP references

UUID 41c1ac3e-d03a-4e09-aebe-a8c191236e7e which can be used as unique global reference for GitHub Sliver C2 DNS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-15T00:00:00Z
source MITRE
title Sliver DNS C2

GitHub Sliver Download

BishopFox. (n.d.). Sliver Download. Retrieved September 16, 2021.

Internal MISP references

UUID f9f6468f-6115-4753-a1ff-3658e410f964 which can be used as unique global reference for GitHub Sliver Download in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-16T00:00:00Z
source MITRE
title Sliver Download

GitHub Sliver File System August 2021

BishopFox. (2021, August 18). Sliver Filesystem. Retrieved September 22, 2021.

Internal MISP references

UUID 820beaff-a0d5-4017-9a9c-6fbd7874b585 which can be used as unique global reference for GitHub Sliver File System August 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-22T00:00:00Z
date_published 2021-08-18T00:00:00Z
source MITRE
title Sliver Filesystem

GitHub Sliver HTTP

BishopFox. (n.d.). Sliver HTTP(S) C2. Retrieved September 16, 2021.

Internal MISP references

UUID 0194a86d-c7bf-4115-ab45-4c67fcfdb2a1 which can be used as unique global reference for GitHub Sliver HTTP in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-16T00:00:00Z
source MITRE
title Sliver HTTP(S) C2

GitHub Sliver Ifconfig

BishopFox. (n.d.). Sliver Ifconfig. Retrieved September 16, 2021.

Internal MISP references

UUID e9783116-144f-49e9-a3c5-28bf3ff9c654 which can be used as unique global reference for GitHub Sliver Ifconfig in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-16T00:00:00Z
source MITRE
title Sliver Ifconfig

GitHub Sliver Netstat

BishopFox. (n.d.). Sliver Netstat. Retrieved September 16, 2021.

Internal MISP references

UUID 37ef7619-8157-4522-aea7-779d75464029 which can be used as unique global reference for GitHub Sliver Netstat in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-16T00:00:00Z
source MITRE
title Sliver Netstat

GitHub Sliver Screen

BishopFox. (n.d.). Sliver Screenshot. Retrieved September 16, 2021.

Internal MISP references

UUID 0417572e-d1c7-4db5-8644-5b94c79cc14d which can be used as unique global reference for GitHub Sliver Screen in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-16T00:00:00Z
source MITRE
title Sliver Screenshot

GitHub Sliver Encryption

BishopFox. (n.d.). Sliver Transport Encryption. Retrieved September 16, 2021.

Internal MISP references

UUID b33a9d44-1468-4b3e-8d27-9c48c81bec74 which can be used as unique global reference for GitHub Sliver Encryption in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-16T00:00:00Z
source MITRE
title Sliver Transport Encryption

GitHub Sliver Upload

BishopFox. (n.d.). Sliver Upload. Retrieved September 16, 2021.

Internal MISP references

UUID 96e6e207-bf8b-4a3e-9a92-779e8bb6bb67 which can be used as unique global reference for GitHub Sliver Upload in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-16T00:00:00Z
source MITRE
title Sliver Upload

Zdnet Ngrok September 2018

Cimpanu, C. (2018, September 13). Sly malware author hides cryptomining botnet behind ever-shifting proxy service. Retrieved September 15, 2020.

Internal MISP references

UUID 3edb88be-2ca6-4925-ba2e-a5a4ac5f9ab0 which can be used as unique global reference for Zdnet Ngrok September 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-15T00:00:00Z
date_published 2018-09-13T00:00:00Z
source MITRE
title Sly malware author hides cryptomining botnet behind ever-shifting proxy service

NCSC GCHQ Small Sieve Jan 2022

NCSC GCHQ. (2022, January 27). Small Sieve Malware Analysis Report. Retrieved August 22, 2022.

Internal MISP references

UUID 0edb8946-be38-45f5-a27c-bdbebc383d72 which can be used as unique global reference for NCSC GCHQ Small Sieve Jan 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-22T00:00:00Z
date_published 2022-01-27T00:00:00Z
source MITRE
title Small Sieve Malware Analysis Report

SmartMontools

smartmontools. (n.d.). smartmontools. Retrieved October 2, 2018.

Internal MISP references

UUID efae8de6-1b8d-47c0-b7a0-e3d0c227a14c which can be used as unique global reference for SmartMontools in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-10-02T00:00:00Z
source MITRE
title smartmontools

CME Github September 2018

byt3bl33d3r. (2018, September 8). SMB: Command Reference. Retrieved July 17, 2020.

Internal MISP references

UUID a6e1e3b4-1b69-43b7-afbe-aedb812c5778 which can be used as unique global reference for CME Github September 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-07-17T00:00:00Z
date_published 2018-09-08T00:00:00Z
source MITRE
title SMB: Command Reference

US-CERT SMB Security

US-CERT. (2017, March 16). SMB Security Best Practices. Retrieved December 21, 2017.

Internal MISP references

UUID 710d2292-c693-4857-9196-397449061e76 which can be used as unique global reference for US-CERT SMB Security in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-21T00:00:00Z
date_published 2017-03-16T00:00:00Z
source MITRE
title SMB Security Best Practices

SMLoginItemSetEnabled Schroeder 2013

Tim Schroeder. (2013, April 21). SMLoginItemSetEnabled Demystified. Retrieved October 5, 2021.

Internal MISP references

UUID ad14bad2-95c8-49b0-9777-e464fc8359a0 which can be used as unique global reference for SMLoginItemSetEnabled Schroeder 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-05T00:00:00Z
date_published 2013-04-21T00:00:00Z
source MITRE
title SMLoginItemSetEnabled Demystified

Malwarebytes SmokeLoader 2016

Hasherezade. (2016, September 12). Smoke Loader – downloader with a smokescreen still alive. Retrieved March 20, 2018.

Internal MISP references

UUID b619e338-16aa-478c-b227-b22f78d572a3 which can be used as unique global reference for Malwarebytes SmokeLoader 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-20T00:00:00Z
date_published 2016-09-12T00:00:00Z
source MITRE
title Smoke Loader – downloader with a smokescreen still alive

Talos Smoke Loader July 2018

Baker, B., Unterbrink H. (2018, July 03). Smoking Guns - Smoke Loader learned new tricks. Retrieved July 5, 2018.

Internal MISP references

UUID 072ac051-7564-4dd3-a279-7f75c91b55f1 which can be used as unique global reference for Talos Smoke Loader July 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-05T00:00:00Z
date_published 2018-07-03T00:00:00Z
source MITRE
title Smoking Guns - Smoke Loader learned new tricks

FireEye SMOKEDHAM June 2021

FireEye. (2021, June 16). Smoking Out a DARKSIDE Affiliate’s Supply Chain Software Compromise. Retrieved September 22, 2021.

Internal MISP references

UUID a81ad3ef-fd96-432c-a7c8-ccc86d127a1b which can be used as unique global reference for FireEye SMOKEDHAM June 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-22T00:00:00Z
date_published 2021-06-16T00:00:00Z
source MITRE
title Smoking Out a DARKSIDE Affiliate’s Supply Chain Software Compromise

Environmental Keyed HTA

Warren, R. (2017, August 8). Smuggling HTA files in Internet Explorer/Edge. Retrieved January 16, 2019.

Internal MISP references

UUID b16bae1a-75aa-478b-b8c7-458ee5a3f7e5 which can be used as unique global reference for Environmental Keyed HTA in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-01-16T00:00:00Z
date_published 2017-08-08T00:00:00Z
source MITRE
title Smuggling HTA files in Internet Explorer/Edge

nccgroup Smuggling HTA 2017

Warren, R. (2017, August 8). Smuggling HTA files in Internet Explorer/Edge. Retrieved September 12, 2024.

Internal MISP references

UUID f5615cdc-bc56-415b-8e38-6f3fd1c33c88 which can be used as unique global reference for nccgroup Smuggling HTA 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2017-08-08T00:00:00Z
source MITRE
title Smuggling HTA files in Internet Explorer/Edge

Accenture SNAKEMACKEREL Nov 2018

Accenture Security. (2018, November 29). SNAKEMACKEREL. Retrieved April 15, 2019.

Internal MISP references

UUID c38d021c-d84c-4aa7-b7a5-be47e18df1d8 which can be used as unique global reference for Accenture SNAKEMACKEREL Nov 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-15T00:00:00Z
date_published 2018-11-29T00:00:00Z
source MITRE
title SNAKEMACKEREL

Sophos Snatch Ransomware 2019

Sophos. (2019, December 9). Snatch ransomware reboots PCs into Safe Mode to bypass protection. Retrieved June 23, 2021.

Internal MISP references

UUID 63019d16-07ec-4e53-98b7-529cc09b8429 which can be used as unique global reference for Sophos Snatch Ransomware 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-23T00:00:00Z
date_published 2019-12-09T00:00:00Z
source MITRE
title Snatch ransomware reboots PCs into Safe Mode to bypass protection

AdSecurity SID History Sept 2015

Metcalf, S. (2015, September 19). Sneaky Active Directory Persistence #14: SID History. Retrieved November 30, 2017.

Internal MISP references

UUID 26961107-c48e-46d5-8d80-cda543b3be3b which can be used as unique global reference for AdSecurity SID History Sept 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-30T00:00:00Z
date_published 2015-09-19T00:00:00Z
source MITRE
title Sneaky Active Directory Persistence #14: SID History

ADSecurity GPO Persistence 2016

Metcalf, S. (2016, March 14). Sneaky Active Directory Persistence #17: Group Policy. Retrieved March 5, 2019.

Internal MISP references

UUID e304715f-7da1-4342-ba5b-d0387d93aeb2 which can be used as unique global reference for ADSecurity GPO Persistence 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-05T00:00:00Z
date_published 2016-03-14T00:00:00Z
source MITRE
title Sneaky Active Directory Persistence #17: Group Policy

Telefonica Snip3 December 2021

Jornet, A. (2021, December 23). Snip3, an investigation into malware. Retrieved September 19, 2023.

Internal MISP references

UUID f026dd44-1491-505b-8a8a-e4f28c6cd6a7 which can be used as unique global reference for Telefonica Snip3 December 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-19T00:00:00Z
date_published 2021-12-23T00:00:00Z
source MITRE
title Snip3, an investigation into malware

SentinelLabs SNS Sender 2024

Alex Delamotte. (2024, February 15). SNS Sender | Active Campaigns Unleash Messaging Spam Through the Cloud. Retrieved September 25, 2024.

Internal MISP references

UUID 73102615-cf40-5606-a203-6c7f061c14ec which can be used as unique global reference for SentinelLabs SNS Sender 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-25T00:00:00Z
date_published 2024-02-15T00:00:00Z
source MITRE
title SNS Sender

Cybereason SocGholish Zloader April 2022

Cybereason Global SOC Team. (2022, April 25). SocGholish and Zloader – From Fake Updates and Installers to Owning Your Systems. Retrieved May 7, 2023.

Internal MISP references

UUID c28b2fbf-f309-4fb3-9743-1c11651e03ee which can be used as unique global reference for Cybereason SocGholish Zloader April 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2022-04-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title SocGholish and Zloader – From Fake Updates and Installers to Owning Your Systems

ReliaQuest SocGholish

Dean Murphy, Brandon Tirado, Joseph Morales. (2023, January 30). SocGholish: A Tale of FakeUpdates. Retrieved May 7, 2023.

Internal MISP references

UUID de4c13b5-1707-4d8f-a562-6e5fd5504dda which can be used as unique global reference for ReliaQuest SocGholish in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2023-01-30T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title SocGholish: A Tale of FakeUpdates

SocGholish-update

Andrew Northern. (2022, November 22). SocGholish, a very real threat from a very fake update. Retrieved February 13, 2024.

Internal MISP references

UUID 01d9c3ba-29e2-5090-b399-0e7adf50a6b9 which can be used as unique global reference for SocGholish-update in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-13T00:00:00Z
date_published 2022-11-22T00:00:00Z
source MITRE
title SocGholish, a very real threat from a very fake update

SentinelOne SocGholish Infrastructure November 2022

Milenkoski, A. (2022, November 7). SocGholish Diversifies and Expands Its Malware Staging Infrastructure to Counter Defenders. Retrieved March 22, 2024.

Internal MISP references

UUID 8a26eeb6-6f80-58f1-b773-b38835c6781d which can be used as unique global reference for SentinelOne SocGholish Infrastructure November 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-22T00:00:00Z
date_published 2022-11-07T00:00:00Z
source MITRE
title SocGholish Diversifies and Expands Its Malware Staging Infrastructure to Counter Defenders

SentinelLabs SocGholish November 2022

Aleksandar Milenkoski. (2022, November 7). SocGholish Diversifies and Expands Its Malware Staging Infrastructure to Counter Defenders. Retrieved May 7, 2023.

Internal MISP references

UUID c2dd119c-25d8-4e48-8eeb-89552a5a096c which can be used as unique global reference for SentinelLabs SocGholish November 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2022-11-07T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title SocGholish Diversifies and Expands Its Malware Staging Infrastructure to Counter Defenders

Proofpoint November 21 2022

Proofpoint. (2022, November 21). SocGholish Malware: A Real Threat from a Fake Update | Proofpoint US. Retrieved May 7, 2023.

Internal MISP references

UUID dc4117ea-be69-47db-ab75-03100fee230c which can be used as unique global reference for Proofpoint November 21 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2022-11-21T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title SocGholish Malware: A Real Threat from a Fake Update

Rapid7 Blog 5 10 2024

Rapid7. (2024, May 10). Social Engineering Campaign Linked to Black Basta Ransomware Operators . Retrieved May 21, 2024.

Internal MISP references

UUID ba749fe0-1ac7-4767-85df-97e6351c37f9 which can be used as unique global reference for Rapid7 Blog 5 10 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-21T00:00:00Z
date_published 2024-05-10T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Social Engineering Campaign Linked to Black Basta Ransomware Operators

FBI Social Engineering Attacks June 24 2024

Federal Bureau of Investigation. (2024, June 24). Social Engineering Tactics Targeting Healthcare & Public Health Entities and Providers. Retrieved June 28, 2024.

Internal MISP references

UUID 527ac41a-a65e-4cf9-a9c9-194443b37c5b which can be used as unique global reference for FBI Social Engineering Attacks June 24 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-28T00:00:00Z
date_published 2024-06-24T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Social Engineering Tactics Targeting Healthcare & Public Health Entities and Providers

Security Joes Sockbot March 09 2022

Felipe Duarte, Ido Naor. (2022, March 9). Sockbot in GoLand. Retrieved September 22, 2023.

Internal MISP references

UUID bca2b5c2-bc3b-4504-806e-5c5b6fee96e6 which can be used as unique global reference for Security Joes Sockbot March 09 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-22T00:00:00Z
date_published 2022-03-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Sockbot in GoLand

DFIR_Sodinokibi_Ransomware

DFIR. (2021, March 29). Sodinokibi (aka REvil) Ransomware. Retrieved July 22, 2024.

Internal MISP references

UUID bb685e6c-e42c-57e5-9fc4-6966bde38f71 which can be used as unique global reference for DFIR_Sodinokibi_Ransomware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-22T00:00:00Z
date_published 2021-03-29T00:00:00Z
source MITRE
title Sodinokibi (aka REvil) Ransomware

Kaspersky Sodin July 2019

Mamedov, O, et al. (2019, July 3). Sodin ransomware exploits Windows vulnerability and processor architecture. Retrieved August 4, 2020.

Internal MISP references

UUID ea46271d-3251-4bd7-afa8-f1bd7baf9570 which can be used as unique global reference for Kaspersky Sodin July 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-04T00:00:00Z
date_published 2019-07-03T00:00:00Z
source MITRE
title Sodin ransomware exploits Windows vulnerability and processor architecture

Kaspersky Sofacy

Kaspersky Lab's Global Research and Analysis Team. (2015, December 4). Sofacy APT hits high profile targets with updated toolset. Retrieved December 10, 2015.

Internal MISP references

UUID 46226f98-c762-48e3-9bcd-19ff14184bb5 which can be used as unique global reference for Kaspersky Sofacy in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-12-10T00:00:00Z
date_published 2015-12-04T00:00:00Z
source MITRE
title Sofacy APT hits high profile targets with updated toolset

Unit 42 Sofacy Feb 2018

Lee, B, et al. (2018, February 28). Sofacy Attacks Multiple Government Entities. Retrieved March 15, 2018.

Internal MISP references

UUID 0bcc2d76-987c-4a9b-9e00-1400eec4e606 which can be used as unique global reference for Unit 42 Sofacy Feb 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-15T00:00:00Z
date_published 2018-02-28T00:00:00Z
source MITRE
title Sofacy Attacks Multiple Government Entities

Unit42 Cannon Nov 2018

Falcone, R., Lee, B. (2018, November 20). Sofacy Continues Global Attacks and Wheels Out New ‘Cannon’ Trojan. Retrieved November 26, 2018.

Internal MISP references

UUID 8c634bbc-4878-4b27-aa18-5996ec968809 which can be used as unique global reference for Unit42 Cannon Nov 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-26T00:00:00Z
date_published 2018-11-20T00:00:00Z
source MITRE
title Sofacy Continues Global Attacks and Wheels Out New ‘Cannon’ Trojan

Unit 42 Sofacy Nov 2018

Falcone, R., Lee, B.. (2018, November 20). Sofacy Continues Global Attacks and Wheels Out New ‘Cannon’ Trojan. Retrieved April 23, 2019.

Internal MISP references

UUID 1523c6de-8879-4652-ac51-1a5085324370 which can be used as unique global reference for Unit 42 Sofacy Nov 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-23T00:00:00Z
date_published 2018-11-20T00:00:00Z
source MITRE
title Sofacy Continues Global Attacks and Wheels Out New ‘Cannon’ Trojan

Palo Alto Sofacy 06-2018

Lee, B., Falcone, R. (2018, June 06). Sofacy Group’s Parallel Attacks. Retrieved June 18, 2018.

Internal MISP references

UUID a32357eb-3226-4bee-aeed-d2fbcfa52da0 which can be used as unique global reference for Palo Alto Sofacy 06-2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-06-18T00:00:00Z
date_published 2018-06-06T00:00:00Z
source MITRE
title Sofacy Group’s Parallel Attacks

F-Secure Sofacy 2015

F-Secure. (2015, September 8). Sofacy Recycles Carberp and Metasploit Code. Retrieved August 3, 2016.

Internal MISP references

UUID 56a95d3c-5268-4e69-b669-7055fb38d570 which can be used as unique global reference for F-Secure Sofacy 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-08-03T00:00:00Z
date_published 2015-09-08T00:00:00Z
source MITRE
title Sofacy Recycles Carberp and Metasploit Code

Sofacy Komplex Trojan

Dani Creus, Tyler Halfpop, Robert Falcone. (2016, September 26). Sofacy's 'Komplex' OS X Trojan. Retrieved July 8, 2017.

Internal MISP references

UUID a21be45e-26c3-446d-b336-b58d08df5749 which can be used as unique global reference for Sofacy Komplex Trojan in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-08T00:00:00Z
date_published 2016-09-26T00:00:00Z
source MITRE
title Sofacy's 'Komplex' OS X Trojan

Sofacy DealersChoice

Falcone, R. (2018, March 15). Sofacy Uses DealersChoice to Target European Government Agency. Retrieved June 4, 2018.

Internal MISP references

UUID ec157d0c-4091-43f5-85f1-a271c4aac1fc which can be used as unique global reference for Sofacy DealersChoice in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-06-04T00:00:00Z
date_published 2018-03-15T00:00:00Z
source MITRE
title Sofacy Uses DealersChoice to Target European Government Agency

SoftPerfect Network Scanner Product Page

SoftPerfect. (2024, July 4). SoftPerfect Network Scanner Product Page. Retrieved October 6, 2024.

Internal MISP references

UUID c9c3251d-1852-4b33-80f9-6e321a05cc30 which can be used as unique global reference for SoftPerfect Network Scanner Product Page in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-06T00:00:00Z
date_published 2024-07-04T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title SoftPerfect Network Scanner Product Page

Unit 42 SolarStorm December 2020

Unit 42. (2020, December 23). SolarStorm Supply Chain Attack Timeline. Retrieved March 24, 2023.

Internal MISP references

UUID ecbb602a-2427-5eba-8c2b-25d90c95f166 which can be used as unique global reference for Unit 42 SolarStorm December 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-24T00:00:00Z
date_published 2020-12-23T00:00:00Z
source MITRE
title SolarStorm Supply Chain Attack Timeline

Symantec Sunburst Sending Data January 2021

Symantec Threat Hunter Team. (2021, January 22). SolarWinds: How Sunburst Sends Data Back to the Attackers. Retrieved January 22, 2021.

Internal MISP references

UUID 50be20ca-48d1-4eb9-a25f-76935a0770b3 which can be used as unique global reference for Symantec Sunburst Sending Data January 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-22T00:00:00Z
date_published 2021-01-22T00:00:00Z
source MITRE
title SolarWinds: How Sunburst Sends Data Back to the Attackers

Carnegie Mellon University Supernova Dec 2020

Carnegie Mellon University. (2020, December 26). SolarWinds Orion API authentication bypass allows remote command execution. Retrieved February 22, 2021.

Internal MISP references

UUID ad43df0c-bdac-43e2-bd86-640036367b6c which can be used as unique global reference for Carnegie Mellon University Supernova Dec 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-22T00:00:00Z
date_published 2020-12-26T00:00:00Z
source MITRE
title SolarWinds Orion API authentication bypass allows remote command execution

SolarWinds Advisory Dec 2020

SolarWinds. (2020, December 24). SolarWinds Security Advisory. Retrieved February 22, 2021.

Internal MISP references

UUID 4e8b908a-bdc5-441b-bc51-98dfa87f6b7a which can be used as unique global reference for SolarWinds Advisory Dec 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-22T00:00:00Z
date_published 2020-12-24T00:00:00Z
source MITRE
title SolarWinds Security Advisory

solution_monitor_dhcp_scopes

Shoemaker, E. (2015, December 31). Solution: Monitor DHCP Scopes and Detect Man-in-the-Middle Attacks with PRTG and PowerShell. Retrieved September 12, 2024.

Internal MISP references

UUID 6fce30c3-17d6-42a0-8470-319e2930e573 which can be used as unique global reference for solution_monitor_dhcp_scopes in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2015-12-31T00:00:00Z
source MITRE
title Solution: Monitor DHCP Scopes and Detect Man-in-the-Middle Attacks with PRTG and PowerShell

Sekoia.io Blog July 23 2024

Sekoia TDR; Felix Aimé; Pierre-Antoine D; Charles M; Grégoire Clermont; Jeremy Scion. (2024, July 23). Solving the 7777 Botnet enigma A cybersecurity quest. Retrieved July 24, 2024.

Internal MISP references

UUID ae84e72a-56b3-4dc4-b053-d3766764ac0d which can be used as unique global reference for Sekoia.io Blog July 23 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-24T00:00:00Z
date_published 2024-07-23T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Solving the 7777 Botnet enigma A cybersecurity quest

Sophos X-Ops Tweet September 13 2023

SophosXOps. (2023, September 13). Sophos X-Ops Tweet September 13 2023. Retrieved September 22, 2023.

Internal MISP references

UUID 98af96a6-98bb-4d81-bb0c-a550e765e6ac which can be used as unique global reference for Sophos X-Ops Tweet September 13 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-22T00:00:00Z
date_published 2023-09-13T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Sophos X-Ops Tweet September 13 2023

Source Manual

ss64. (n.d.). Source or Dot Operator. Retrieved May 21, 2019.

Internal MISP references

UUID a39354fc-334f-4f65-ba8a-56550f91710f which can be used as unique global reference for Source Manual in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-05-21T00:00:00Z
source MITRE
title Source or Dot Operator

FireEye Southeast Asia Threat Landscape March 2015

FireEye. (2015, March). SOUTHEAST ASIA: AN EVOLVING CYBER THREAT LANDSCAPE. Retrieved February 5, 2024.

Internal MISP references

UUID 59658f8b-af24-5df5-8f7d-cb6b9cf7579e which can be used as unique global reference for FireEye Southeast Asia Threat Landscape March 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-05T00:00:00Z
date_published 2015-03-01T00:00:00Z
source MITRE
title SOUTHEAST ASIA: AN EVOLVING CYBER THREAT LANDSCAPE

Symantec Sowbug Nov 2017

Symantec Security Response. (2017, November 7). Sowbug: Cyber espionage group targets South American and Southeast Asian governments. Retrieved November 16, 2017.

Internal MISP references

UUID 14f49074-fc46-45d3-bf7e-30c896c39c07 which can be used as unique global reference for Symantec Sowbug Nov 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-16T00:00:00Z
date_published 2017-11-07T00:00:00Z
source MITRE, Tidal Cyber
title Sowbug: Cyber espionage group targets South American and Southeast Asian governments

NIST 800-63-3

Grassi, P., et al. (2017, December 1). SP 800-63-3, Digital Identity Guidelines. Retrieved January 16, 2019.

Internal MISP references

UUID 143599bf-167b-4041-82c5-8612c3e81095 which can be used as unique global reference for NIST 800-63-3 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-01-16T00:00:00Z
date_published 2017-12-01T00:00:00Z
source MITRE
title SP 800-63-3, Digital Identity Guidelines

Threatpost Hancitor

Tom Spring. (2017, January 11). Spammers Revive Hancitor Downloader Campaigns. Retrieved August 13, 2020.

Internal MISP references

UUID 70ad77af-88aa-4f06-a9cb-df9608157841 which can be used as unique global reference for Threatpost Hancitor in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-13T00:00:00Z
date_published 2017-01-11T00:00:00Z
source MITRE
title Spammers Revive Hancitor Downloader Campaigns

CheckPoint SpeakUp Feb 2019

Check Point Research. (2019, February 4). SpeakUp: A New Undetected Backdoor Linux Trojan. Retrieved April 17, 2019.

Internal MISP references

UUID 8f0d6a8d-6bd4-4df5-aa28-70e1ec4b0b12 which can be used as unique global reference for CheckPoint SpeakUp Feb 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-17T00:00:00Z
date_published 2019-02-04T00:00:00Z
source MITRE
title SpeakUp: A New Undetected Backdoor Linux Trojan

Cyfirma Kimsuky Spear Phishing

Cyfirma. (2020, December 16). Spear Phishing Attack by N. Korean Hacking Group, Kimsuky. Retrieved October 30, 2023.

Internal MISP references

UUID de9817bc-1ac0-4f19-b5af-c402c874f431 which can be used as unique global reference for Cyfirma Kimsuky Spear Phishing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-30T00:00:00Z
date_published 2020-12-16T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Spear Phishing Attack by N. Korean Hacking Group, Kimsuky

Palo Alto Unit 42 OutSteel SaintBot February 2022

Unit 42. (2022, February 25). Spear Phishing Attacks Target Organizations in Ukraine, Payloads Include the Document Stealer OutSteel and the Downloader SaintBot. Retrieved June 9, 2022.

Internal MISP references

UUID b0632490-76be-4018-982d-4b73b3d13881 which can be used as unique global reference for Palo Alto Unit 42 OutSteel SaintBot February 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-09T00:00:00Z
date_published 2022-02-25T00:00:00Z
source MITRE
title Spear Phishing Attacks Target Organizations in Ukraine, Payloads Include the Document Stealer OutSteel and the Downloader SaintBot

Zscaler Bazar September 2020

Sadique, M. and Singh, A. (2020, September 29). Spear Phishing Campaign Delivers Buer and Bazar Malware. Retrieved November 19, 2020.

Internal MISP references

UUID fc46f152-9ed7-4850-8127-7b1f486ef2fe which can be used as unique global reference for Zscaler Bazar September 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-19T00:00:00Z
date_published 2020-09-29T00:00:00Z
source MITRE
title Spear Phishing Campaign Delivers Buer and Bazar Malware

Reaqta MSXSL Spearphishing MAR 2018

Admin. (2018, March 2). Spear-phishing campaign leveraging on MSXSL. Retrieved July 3, 2018.

Internal MISP references

UUID 927737c9-63a3-49a6-85dc-620e055aaf0a which can be used as unique global reference for Reaqta MSXSL Spearphishing MAR 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-03T00:00:00Z
date_published 2018-03-02T00:00:00Z
source MITRE
title Spear-phishing campaign leveraging on MSXSL

FireEye Regsvr32 Targeting Mongolian Gov

Anubhav, A., Kizhakkinan, D. (2017, February 22). Spear Phishing Techniques Used in Attacks Targeting the Mongolian Government. Retrieved February 24, 2017.

Internal MISP references

UUID d1509d15-04af-46bd-a6b1-30fbd179b257 which can be used as unique global reference for FireEye Regsvr32 Targeting Mongolian Gov in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-02-24T00:00:00Z
date_published 2017-02-22T00:00:00Z
source MITRE
title Spear Phishing Techniques Used in Attacks Targeting the Mongolian Government

FireEye admin@338 March 2014

Moran, N. and Lanstein, A.. (2014, March 25). Spear Phishing the News Cycle: APT Actors Leverage Interest in the Disappearance of Malaysian Flight MH 370. Retrieved April 15, 2016.

Internal MISP references

UUID 6a37e6eb-b767-4b10-9c39-660a42b19ddd which can be used as unique global reference for FireEye admin@338 March 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-15T00:00:00Z
date_published 2014-03-25T00:00:00Z
source MITRE
title Spear Phishing the News Cycle: APT Actors Leverage Interest in the Disappearance of Malaysian Flight MH 370

Microsoft File Handlers

Microsoft. (n.d.). Specifying File Handlers for File Name Extensions. Retrieved November 13, 2014.

Internal MISP references

UUID cc12cd2c-4f41-4d7b-902d-53c35eb41210 which can be used as unique global reference for Microsoft File Handlers in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-13T00:00:00Z
source MITRE
title Specifying File Handlers for File Name Extensions

GTFO split

GTFOBins. (2020, November 13). split. Retrieved April 18, 2022.

Internal MISP references

UUID 4b86c8c3-57b0-4558-be21-f928acb23f49 which can be used as unique global reference for GTFO split in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-18T00:00:00Z
date_published 2020-11-13T00:00:00Z
source MITRE
title split

split man page

Torbjorn Granlund, Richard M. Stallman. (2020, March null). split(1) — Linux manual page. Retrieved March 25, 2022.

Internal MISP references

UUID 3a4dc770-8bfa-44e9-bb0e-f0af0ae92994 which can be used as unique global reference for split man page in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-25T00:00:00Z
source MITRE
title split(1) — Linux manual page

Spoofing credential dialogs

Johann Rehberger. (2021, April 18). Spoofing credential dialogs on macOS Linux and Windows. Retrieved August 19, 2021.

Internal MISP references

UUID 4f8abaae-1483-4bf6-a79c-6a801ae5a640 which can be used as unique global reference for Spoofing credential dialogs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-19T00:00:00Z
date_published 2021-04-18T00:00:00Z
source MITRE
title Spoofing credential dialogs on macOS Linux and Windows

Infosecinstitute RTLO Technique

Security Ninja. (2015, April 16). Spoof Using Right to Left Override (RTLO) Technique. Retrieved April 22, 2019.

Internal MISP references

UUID 79d21506-07a8-444d-a2d7-c91de67c393e which can be used as unique global reference for Infosecinstitute RTLO Technique in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-22T00:00:00Z
date_published 2015-04-16T00:00:00Z
source MITRE
title Spoof Using Right to Left Override (RTLO) Technique

BBC-malvertising

BBC. (2011, March 29). Spotify ads hit by malware attack. Retrieved February 21, 2023.

Internal MISP references

UUID 425775e4-2948-5a73-a2d8-9a3edca74b1b which can be used as unique global reference for BBC-malvertising in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-21T00:00:00Z
date_published 2011-03-29T00:00:00Z
source MITRE
title Spotify ads hit by malware attack

NSA Spotting

National Security Agency/Central Security Service Information Assurance Directorate. (2015, August 7). Spotting the Adversary with Windows Event Log Monitoring. Retrieved September 6, 2018.

Internal MISP references

UUID c1fa6c1d-f11a-47d4-88fc-ec0a3dc44279 which can be used as unique global reference for NSA Spotting in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-09-06T00:00:00Z
date_published 2015-08-07T00:00:00Z
source MITRE
title Spotting the Adversary with Windows Event Log Monitoring

Elastic Latrodectus May 2024

Stepanic, D. and Bousseaden, S. (2024, May 15). Spring Cleaning with LATRODECTUS: A Potential Replacement for ICEDID. Retrieved September 13, 2024.

Internal MISP references

UUID 98e3c7a6-d088-56e5-ae43-96c284cc6f94 which can be used as unique global reference for Elastic Latrodectus May 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-13T00:00:00Z
date_published 2024-05-15T00:00:00Z
source MITRE
title Spring Cleaning with LATRODECTUS: A Potential Replacement for ICEDID

Villeneuve 2014

Villeneuve, N., Homan, J. (2014, July 31). Spy of the Tiger. Retrieved September 29, 2015.

Internal MISP references

UUID a156e24e-0da5-4ac7-b914-29f2f05e7d6f which can be used as unique global reference for Villeneuve 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-09-29T00:00:00Z
date_published 2014-07-31T00:00:00Z
source MITRE, Tidal Cyber
title Spy of the Tiger

Sqldumper.exe - LOLBAS Project

LOLBAS. (2018, May 25). Sqldumper.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 793d6262-37af-46e1-a6b5-a5262f4a749d which can be used as unique global reference for Sqldumper.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Sqldumper.exe

sqlmap Introduction

Damele, B., Stampar, M. (n.d.). sqlmap. Retrieved March 19, 2018.

Internal MISP references

UUID ac643245-d54f-470f-a393-26875c0877c8 which can be used as unique global reference for sqlmap Introduction in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-19T00:00:00Z
source MITRE
title sqlmap

Sqlps.exe - LOLBAS Project

LOLBAS. (2018, May 25). Sqlps.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 31cc851a-c536-4cef-9391-d3c7d3eab64f which can be used as unique global reference for Sqlps.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Sqlps.exe

SQLToolsPS.exe - LOLBAS Project

LOLBAS. (2018, May 25). SQLToolsPS.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 612c9569-80af-48d2-a853-0f6e3f55aa50 which can be used as unique global reference for SQLToolsPS.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title SQLToolsPS.exe

Squirrel.exe - LOLBAS Project

LOLBAS. (2019, June 26). Squirrel.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 952b5ca5-1251-4e27-bd30-5d55d7d2da5e which can be used as unique global reference for Squirrel.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2019-06-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Squirrel.exe

ZScaler Squirrelwaffle Sep 2021

Kumar, A., Stone-Gross, Brett. (2021, September 28). Squirrelwaffle: New Loader Delivering Cobalt Strike. Retrieved August 9, 2022.

Internal MISP references

UUID 624a62db-f00f-45f9-89f6-2c3505b4979f which can be used as unique global reference for ZScaler Squirrelwaffle Sep 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-09T00:00:00Z
date_published 2021-09-28T00:00:00Z
source MITRE
title Squirrelwaffle: New Loader Delivering Cobalt Strike

Netskope Squirrelwaffle Oct 2021

Palazolo, G. (2021, October 7). SquirrelWaffle: New Malware Loader Delivering Cobalt Strike and QakBot. Retrieved August 9, 2022.

Internal MISP references

UUID 5559895a-4647-438f-b3d5-6d6aa323a6f9 which can be used as unique global reference for Netskope Squirrelwaffle Oct 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-09T00:00:00Z
date_published 2021-10-07T00:00:00Z
source MITRE
title SquirrelWaffle: New Malware Loader Delivering Cobalt Strike and QakBot

Clockwork SSH Agent Hijacking

Beuchler, B. (2012, September 28). SSH Agent Hijacking. Retrieved December 20, 2017.

Internal MISP references

UUID 4a4026e3-977a-4f25-aeee-794947f384b2 which can be used as unique global reference for Clockwork SSH Agent Hijacking in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-20T00:00:00Z
date_published 2012-09-28T00:00:00Z
source MITRE
title SSH Agent Hijacking

Symantec SSH and ssh-agent

Hatch, B. (2004, November 22). SSH and ssh-agent. Retrieved January 8, 2018.

Internal MISP references

UUID 0d576bca-511d-40a2-9916-26832eb28861 which can be used as unique global reference for Symantec SSH and ssh-agent in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-08T00:00:00Z
date_published 2004-11-22T00:00:00Z
source MITRE
title SSH and ssh-agent

ssh.exe - LOLBAS Project

LOLBAS. (2021, November 8). ssh.exe. Retrieved December 4, 2023.

Internal MISP references

UUID b1a9af1c-0cfc-4e8a-88ac-7d33cddc26a1 which can be used as unique global reference for ssh.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-11-08T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title ssh.exe

SSH Secure Shell

SSH.COM. (n.d.). SSH (Secure Shell). Retrieved March 23, 2020.

Internal MISP references

UUID ac5fc103-1946-488b-8af5-eda0636cbdd0 which can be used as unique global reference for SSH Secure Shell in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-23T00:00:00Z
source MITRE
title SSH (Secure Shell)

SSH Tunneling

SSH.COM. (n.d.). SSH tunnel. Retrieved March 15, 2020.

Internal MISP references

UUID 13280f38-0f17-42d3-9f92-693f1da60ffa which can be used as unique global reference for SSH Tunneling in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-15T00:00:00Z
source MITRE
title SSH tunnel

SSLShopper Lookup

SSL Shopper. (n.d.). SSL Checker. Retrieved October 20, 2020.

Internal MISP references

UUID a8dc493f-2021-48fa-8f28-afd13756b789 which can be used as unique global reference for SSLShopper Lookup in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
source MITRE
title SSL Checker

Ubuntu SSSD Docs

Ubuntu. (n.d.). SSSD. Retrieved September 23, 2021.

Internal MISP references

UUID f2ed1c28-8cde-4279-a04c-217a4dc68121 which can be used as unique global reference for Ubuntu SSSD Docs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-23T00:00:00Z
source MITRE
title SSSD

Stantinko Botnet

Vachon, F., Faou, M. (2017, July 20). Stantinko: A massive adware campaign operating covertly since 2012. Retrieved November 16, 2017.

Internal MISP references

UUID d81e0274-76f4-43ce-b829-69f761e280dc which can be used as unique global reference for Stantinko Botnet in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-16T00:00:00Z
date_published 2017-07-20T00:00:00Z
source MITRE
title Stantinko: A massive adware campaign operating covertly since 2012

StarBlizzard

Microsoft Threat Intelligence. (2023, December 7). Star Blizzard increases sophistication and evasion in ongoing attacks. Retrieved February 13, 2024.

Internal MISP references

UUID 68b16960-1893-51a1-b46c-974a09d4a0c4 which can be used as unique global reference for StarBlizzard in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-13T00:00:00Z
date_published 2023-12-07T00:00:00Z
source MITRE
title Star Blizzard increases sophistication and evasion in ongoing attacks

Amazon AWS

Amazon. (n.d.). Start Building on AWS Today. Retrieved October 13, 2021.

Internal MISP references

UUID b7d41cde-18c8-4e15-a0ac-ca0afc127e33 which can be used as unique global reference for Amazon AWS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-13T00:00:00Z
source MITRE
title Start Building on AWS Today

Docker Systemd

Docker. (n.d.). Start containers automatically. Retrieved February 15, 2024.

Internal MISP references

UUID 5969a1d0-7645-5a58-a461-446d49b63b17 which can be used as unique global reference for Docker Systemd in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-15T00:00:00Z
source MITRE
title Start containers automatically

Startup Items

Apple. (2016, September 13). Startup Items. Retrieved July 11, 2017.

Internal MISP references

UUID e36dd211-22e4-4b23-befb-fbfe1a84b866 which can be used as unique global reference for Startup Items in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-11T00:00:00Z
date_published 2016-09-13T00:00:00Z
source MITRE
title Startup Items

Microsoft Safe Mode

Microsoft. (n.d.). Start your PC in safe mode in Windows 10. Retrieved June 23, 2021.

Internal MISP references

UUID fdddb25b-22ba-4433-b25f-bad340ffc849 which can be used as unique global reference for Microsoft Safe Mode in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-23T00:00:00Z
source MITRE
title Start your PC in safe mode in Windows 10

Mandiant APT41

Rufus Brown, Van Ta, Douglas Bienstock, Geoff Ackerman, John Wolfram. (2022, March 8). Does This Look Infected? A Summary of APT41 Targeting U.S. State Governments. Retrieved July 8, 2022.

Internal MISP references

UUID e54415fe-40c2-55ff-9e75-881bc8a912b8 which can be used as unique global reference for Mandiant APT41 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-08T00:00:00Z
source MITRE
title State Governments

Google Cloud APT41 2022

Rufus Brown, Van Ta, Douglas Bienstock, Geoff Ackerman & John Wolfram. (2022, March 8). Does This Look Infected? A Summary of APT41 Targeting U.S. State Governments. Retrieved September 16, 2024.

Internal MISP references

UUID c65cfdde-bc7f-5cd2-b1ee-066b7cc2eb6a which can be used as unique global reference for Google Cloud APT41 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-16T00:00:00Z
source MITRE
title State Governments

Twitter SquiblyTwo Detection APR 2018

Desimone, J. (2018, April 18). Status Update. Retrieved September 12, 2024.

Internal MISP references

UUID 9cee0681-3ad2-4b1d-8eeb-5160134f3069 which can be used as unique global reference for Twitter SquiblyTwo Detection APR 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2018-04-18T00:00:00Z
source MITRE
title Status Update

MSFT-AI

Microsoft Threat Intelligence. (2024, February 14). Staying ahead of threat actors in the age of AI. Retrieved March 11, 2024.

Internal MISP references

UUID 4f08a1a3-3cc5-5dfb-9190-2e4991e43d94 which can be used as unique global reference for MSFT-AI in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-11T00:00:00Z
date_published 2024-02-14T00:00:00Z
source MITRE
title Staying ahead of threat actors in the age of AI

Mandiant Endpoint Evading 2019

Pena, E., Erikson, C. (2019, October 10). Staying Hidden on the Endpoint: Evading Detection with Shellcode. Retrieved November 29, 2021.

Internal MISP references

UUID 5d43542f-aad5-4ac5-b5b6-1a2b03222fc8 which can be used as unique global reference for Mandiant Endpoint Evading 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-11-29T00:00:00Z
date_published 2019-10-10T00:00:00Z
source MITRE
title Staying Hidden on the Endpoint: Evading Detection with Shellcode

Double Timestomping

Matthew Dunwoody. (2022, April 28). I have seen double-timestomping ITW, including by APT29. Stay sharp out there.. Retrieved June 20, 2024.

Internal MISP references

UUID d4ee5a4b-9e68-5e77-ae5b-e45942a7fd26 which can be used as unique global reference for Double Timestomping in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-20T00:00:00Z
source MITRE
title Stay sharp out there.

Sekoia.io Stealc February 20 2023

Quentin Bourgue, Pierre Le Bourhis, Threat & Detection Research Team. (2023, February 20). Stealc: a copycat of Vidar and Raccoon infostealers gaining in popularity – Part 1. Retrieved July 28, 2023.

Internal MISP references

UUID ca5b727d-f35b-4009-b4d4-21a69d41162d which can be used as unique global reference for Sekoia.io Stealc February 20 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-28T00:00:00Z
date_published 2023-02-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Stealc: a copycat of Vidar and Raccoon infostealers gaining in popularity – Part 1

Sekoia.io Stealc February 27 2023

Pierre Le Bourhis, Quentin Bourgue, Threat & Detection Research Team. (2023, February 27). Stealc: a copycat of Vidar and Raccoon infostealers gaining in popularity – Part 2. Retrieved July 28, 2023.

Internal MISP references

UUID edd0cab4-48f7-48d8-a318-ced118af6a63 which can be used as unique global reference for Sekoia.io Stealc February 27 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-28T00:00:00Z
date_published 2023-02-27T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Stealc: a copycat of Vidar and Raccoon infostealers gaining in popularity – Part 2

O365 Blog Azure AD Device IDs

Syynimaa, N. (2022, February 15). Stealing and faking Azure AD device identities. Retrieved August 3, 2022.

Internal MISP references

UUID ec94c043-92ef-4691-b21a-7ea68f39e338 which can be used as unique global reference for O365 Blog Azure AD Device IDs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-03T00:00:00Z
date_published 2022-02-15T00:00:00Z
source MITRE
title Stealing and faking Azure AD device identities

AADInternals Azure AD Device Identities

Dr. Nestori Syynimaa. (2022, February 15). Stealing and faking Azure AD device identities. Retrieved February 21, 2023.

Internal MISP references

UUID b5ef16c4-1db0-51e9-93ab-54a8e480debc which can be used as unique global reference for AADInternals Azure AD Device Identities in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-21T00:00:00Z
date_published 2022-02-15T00:00:00Z
source MITRE
title Stealing and faking Azure AD device identities

Carnal Ownage Password Filters Sept 2013

Fuller, R. (2013, September 11). Stealing passwords every time they change. Retrieved November 21, 2017.

Internal MISP references

UUID 78ed9074-a46c-4ce6-ab7d-a587bd585dc5 which can be used as unique global reference for Carnal Ownage Password Filters Sept 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-21T00:00:00Z
date_published 2013-09-11T00:00:00Z
source MITRE
title Stealing passwords every time they change

CSM Elderwood Sept 2012

Clayton, M.. (2012, September 14). Stealing US business secrets: Experts ID two huge cyber 'gangs' in China. Retrieved February 15, 2018.

Internal MISP references

UUID 6b79006d-f6de-489c-82fa-8c3c28d652ef which can be used as unique global reference for CSM Elderwood Sept 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-15T00:00:00Z
date_published 2012-09-14T00:00:00Z
source MITRE
title Stealing US business secrets: Experts ID two huge cyber 'gangs' in China

wailing crab sub/pub

Hammond, Charlotte. Villadsen, Ole. Metrick, Kat.. (2023, November 21). Stealthy WailingCrab Malware misuses MQTT Messaging Protocol. Retrieved August 28, 2024.

Internal MISP references

UUID 5d0f12e2-919c-5a7f-8340-83577508368d which can be used as unique global reference for wailing crab sub/pub in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-28T00:00:00Z
date_published 2023-11-21T00:00:00Z
source MITRE
title Stealthy WailingCrab Malware misuses MQTT Messaging Protocol

DEFCON2016 Sticky Keys

Maldonado, D., McGuffin, T. (2016, August 6). Sticky Keys to the Kingdom. Retrieved July 5, 2017.

Internal MISP references

UUID f903146d-b63d-4771-8d53-28ef137c9349 which can be used as unique global reference for DEFCON2016 Sticky Keys in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-05T00:00:00Z
date_published 2016-08-06T00:00:00Z
source MITRE
title Sticky Keys to the Kingdom

The DFIR Report Stolen Images Conti

The DFIR Report. (2023, April 4). Stolen Images Campaign Ends in Conti Ransomware. Retrieved June 23, 2023.

Internal MISP references

UUID 4a89916f-3919-41fd-bf93-27f25a2363f5 which can be used as unique global reference for The DFIR Report Stolen Images Conti in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-23T00:00:00Z
date_published 2023-04-04T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Stolen Images Campaign Ends in Conti Ransomware

Netscout Stolen Pencil Dec 2018

ASERT team. (2018, December 5). STOLEN PENCIL Campaign Targets Academia. Retrieved February 5, 2019.

Internal MISP references

UUID 6d3b31da-a784-4da0-91dd-b72c04fd520a which can be used as unique global reference for Netscout Stolen Pencil Dec 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-05T00:00:00Z
date_published 2018-12-05T00:00:00Z
source MITRE
title STOLEN PENCIL Campaign Targets Academia

FireEye VBA stomp Feb 2020

Cole, R., Moore, A., Stark, G., Stancill, B. (2020, February 5). STOMP 2 DIS: Brilliance in the (Visual) Basics. Retrieved September 17, 2020.

Internal MISP references

UUID bd034cc8-29e2-4d58-a72a-161b831191b7 which can be used as unique global reference for FireEye VBA stomp Feb 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-17T00:00:00Z
date_published 2020-02-05T00:00:00Z
source MITRE
title STOMP 2 DIS: Brilliance in the (Visual) Basics

Symantec Stonefly April 27 2022

Threat Hunter Team. (2022, April 27). Stonefly: North Korea-linked Spying Operation Continues to Hit High-value Targets. Retrieved July 26, 2024.

Internal MISP references

UUID 64d72689-0c7a-480a-a295-6321fc0d82fc which can be used as unique global reference for Symantec Stonefly April 27 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-26T00:00:00Z
date_published 2022-04-27T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Stonefly: North Korea-linked Spying Operation Continues to Hit High-value Targets

Stopping CloudTrail from Sending Events to CloudWatch Logs

Amazon Web Services. (n.d.). Stopping CloudTrail from Sending Events to CloudWatch Logs. Retrieved October 16, 2020.

Internal MISP references

UUID affb4d4f-5c96-4c27-b702-b8ad9bc8e1b3 which can be used as unique global reference for Stopping CloudTrail from Sending Events to CloudWatch Logs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-16T00:00:00Z
source MITRE
title Stopping CloudTrail from Sending Events to CloudWatch Logs

McAfee Virtual Jan 2017

Roccia, T. (2017, January 19). Stopping Malware With a Fake Virtual Machine. Retrieved April 17, 2019.

Internal MISP references

UUID a541a027-733c-438f-a723-6f7e8e6f354c which can be used as unique global reference for McAfee Virtual Jan 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-17T00:00:00Z
date_published 2017-01-19T00:00:00Z
source MITRE
title Stopping Malware With a Fake Virtual Machine

Checkpoint Dridex Jan 2021

Check Point Research. (2021, January 4). Stopping Serial Killer: Catching the Next Strike. Retrieved September 7, 2021.

Internal MISP references

UUID a988084f-1a58-4e5b-a616-ed31d311cccf which can be used as unique global reference for Checkpoint Dridex Jan 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-07T00:00:00Z
date_published 2021-01-04T00:00:00Z
source MITRE
title Stopping Serial Killer: Catching the Next Strike

U.S. CISA Akira April 18 2024

Cybersecurity and Infrastructure Security Agency. (2024, April 18). #StopRansomware: Akira Ransomware. Retrieved April 19, 2024.

Internal MISP references

UUID 2e8cf25e-1c06-4f14-a6aa-cb7b876ad5be which can be used as unique global reference for U.S. CISA Akira April 18 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-19T00:00:00Z
date_published 2024-04-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title #StopRansomware: Akira Ransomware

U.S. CISA ALPHV Blackcat December 2023

Cybersecurity and Infrastructure Security Agency. (2023, December 19). #StopRansomware: ALPHV Blackcat. Retrieved December 19, 2023.

Internal MISP references

UUID d28d64cf-b5db-4438-8c5c-907ce5f55f69 which can be used as unique global reference for U.S. CISA ALPHV Blackcat December 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-19T00:00:00Z
date_published 2023-12-19T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title #StopRansomware: ALPHV Blackcat

U.S. CISA AvosLocker October 11 2023

Cybersecurity and Infrastructure Security Agency. (2023, October 11). #StopRansomware: AvosLocker Ransomware (Update). Retrieved October 20, 2023.

Internal MISP references

UUID d419a317-6599-4fc5-91d1-a4c2bc83bf6a which can be used as unique global reference for U.S. CISA AvosLocker October 11 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-20T00:00:00Z
date_published 2023-10-11T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title #StopRansomware: AvosLocker Ransomware (Update)

U.S. CISA BianLian Ransomware May 2023

Cybersecurity and Infrastructure Security Agency. (2023, May 16). #StopRansomware: BianLian Ransomware Group. Retrieved May 18, 2023.

Internal MISP references

UUID aa52e826-f292-41f6-985d-0282230c8948 which can be used as unique global reference for U.S. CISA BianLian Ransomware May 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-18T00:00:00Z
date_published 2023-05-16T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title #StopRansomware: BianLian Ransomware Group

U.S. CISA Black Basta May 10 2024

Cybersecurity and Infrastructure Security Agency. (2024, May 10). #StopRansomware: Black Basta. Retrieved May 13, 2024.

Internal MISP references

UUID 10fed6c7-4d73-49cd-9170-3f67d06365ca which can be used as unique global reference for U.S. CISA Black Basta May 10 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-13T00:00:00Z
date_published 2024-05-10T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title #StopRansomware: Black Basta

U.S. CISA CL0P CVE-2023-34362 Exploitation

Cybersecurity and Infrastructure Security Agency. (2023, June 7). #StopRansomware: CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability. Retrieved July 27, 2023.

Internal MISP references

UUID 07e48ca8-b965-4234-b04a-dfad45d58b22 which can be used as unique global reference for U.S. CISA CL0P CVE-2023-34362 Exploitation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-27T00:00:00Z
date_published 2023-06-07T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title #StopRansomware: CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability

U.S. CISA Cuba Ransomware October 2022

Cybersecurity and Infrastructure Security Agency. (2023, January 5). #StopRansomware: Cuba Ransomware. Retrieved May 19, 2023.

Internal MISP references

UUID d6ed5172-a319-45b0-b1cb-d270a2a48fa3 which can be used as unique global reference for U.S. CISA Cuba Ransomware October 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-19T00:00:00Z
date_published 2023-01-05T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title #StopRansomware: Cuba Ransomware

U.S. CISA Daixin Team October 2022

Cybersecurity and Infrastructure Security Agency. (2022, October 26). #StopRansomware: Daixin Team. Retrieved May 19, 2023.

Internal MISP references

UUID cbf5ecfb-de79-41cc-8250-01790ff6e89b which can be used as unique global reference for U.S. CISA Daixin Team October 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-19T00:00:00Z
date_published 2022-10-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title #StopRansomware: Daixin Team

U.S. CISA Hive November 25 2022

Cybersecurity and Infrastructure Security Agency. (2022, November 25). #StopRansomware: Hive Ransomware. Retrieved June 18, 2024.

Internal MISP references

UUID fce322e6-5e23-404a-acf8-cd003f00c79d which can be used as unique global reference for U.S. CISA Hive November 25 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-18T00:00:00Z
date_published 2022-11-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title #StopRansomware: Hive Ransomware

U.S. CISA LockBit 3.0 March 2023

Cybersecurity and Infrastructure Security Agency. (2023, March 16). #StopRansomware: LockBit 3.0. Retrieved May 19, 2023.

Internal MISP references

UUID 06de9247-ce40-4709-a17a-a65b8853758b which can be used as unique global reference for U.S. CISA LockBit 3.0 March 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-19T00:00:00Z
date_published 2023-03-16T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title #StopRansomware: LockBit 3.0

U.S. CISA LockBit Citrix Bleed November 21 2023

Cybersecurity and Infrastructure Security Agency. (2023, November 21). #StopRansomware: LockBit 3.0 Ransomware Affiliates Exploit CVE 2023-4966 Citrix Bleed Vulnerability. Retrieved November 30, 2023.

Internal MISP references

UUID 21f56e0c-9605-4fbb-9cb1-f868ba6eb053 which can be used as unique global reference for U.S. CISA LockBit Citrix Bleed November 21 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-11-30T00:00:00Z
date_published 2023-11-21T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title #StopRansomware: LockBit 3.0 Ransomware Affiliates Exploit CVE 2023-4966 Citrix Bleed Vulnerability

U.S. CISA MedusaLocker August 11 2022

Cybersecurity and Infrastructure Security Agency. (2022, August 11). #StopRansomware: MedusaLocker. Retrieved August 4, 2023.

Internal MISP references

UUID 48b34fb3-c346-4165-a4c6-caeaa9b02dba which can be used as unique global reference for U.S. CISA MedusaLocker August 11 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-04T00:00:00Z
date_published 2022-08-11T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title #StopRansomware: MedusaLocker

U.S. CISA Phobos February 29 2024

Cybersecurity and Infrastructure Security Agency. (2024, February 29). #StopRansomware: Phobos Ransomware. Retrieved March 7, 2024.

Internal MISP references

UUID bd6f9bd3-22ec-42fc-9d85-fdc14dcfa55a which can be used as unique global reference for U.S. CISA Phobos February 29 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-07T00:00:00Z
date_published 2024-02-29T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title #StopRansomware: Phobos Ransomware

U.S. CISA Play Ransomware December 2023

Cybersecurity and Infrastructure Security Agency. (2023, December 18). #StopRansomware: Play Ransomware. Retrieved December 18, 2023.

Internal MISP references

UUID ad96148c-8230-4923-86fd-4b1da211db1a which can be used as unique global reference for U.S. CISA Play Ransomware December 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-18T00:00:00Z
date_published 2023-12-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title #StopRansomware: Play Ransomware

CISA Play Ransomware Advisory December 2023

CISA. (2023, December 18). #StopRansomware: Play Ransomware AA23-352A. Retrieved September 24, 2024.

Internal MISP references

UUID b47f5430-25d4-5502-9219-674daed4e2c5 which can be used as unique global reference for CISA Play Ransomware Advisory December 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-24T00:00:00Z
date_published 2023-12-18T00:00:00Z
source MITRE
title #StopRansomware: Play Ransomware AA23-352A

U.S. CISA RansomHub Ransomware August 29 2024

Cybersecurity and Infrastructure Security Agency. (2024, August 29). #StopRansomware: RansomHub Ransomware. Retrieved September 3, 2024.

Internal MISP references

UUID af338cbd-6416-4dee-95c7-6915f78e2604 which can be used as unique global reference for U.S. CISA RansomHub Ransomware August 29 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-03T00:00:00Z
date_published 2024-08-29T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title #StopRansomware: RansomHub Ransomware

U.S. CISA Rhysida Ransomware November 15 2023

Cybersecurity and Infrastructure Security Agency. (2023, November 15). #StopRansomware: Rhysida Ransomware. Retrieved November 16, 2023.

Internal MISP references

UUID 6d902955-d9a9-4ec1-8dd4-264f7594605e which can be used as unique global reference for U.S. CISA Rhysida Ransomware November 15 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-11-16T00:00:00Z
date_published 2023-11-15T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title #StopRansomware: Rhysida Ransomware

CISA Royal AA23-061A March 2023

CISA. (2023, March 2). #StopRansomware: Royal Ransomware. Retrieved March 31, 2023.

Internal MISP references

UUID 81baa61e-13c3-51e0-bf22-08383dbfb2a1 which can be used as unique global reference for CISA Royal AA23-061A March 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-31T00:00:00Z
date_published 2023-03-02T00:00:00Z
source MITRE
title #StopRansomware: Royal Ransomware

#StopRansomware: Royal Ransomware | CISA

Cybersecurity and Infrastructure Security Agency. (2023, March 2). #StopRansomware: Royal Ransomware | CISA. Retrieved May 10, 2023.

Internal MISP references

UUID dd094572-da2e-4e54-9e54-b243dd4fcd2b which can be used as unique global reference for #StopRansomware: Royal Ransomware | CISA in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-10T00:00:00Z
date_published 2023-03-02T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title #StopRansomware: Royal Ransomware

U.S. CISA Vice Society September 2022

Cybersecurity and Infrastructure Security Agency. (2022, September 8). #StopRansomware: Vice Society. Retrieved May 19, 2023.

Internal MISP references

UUID 0a754513-5f20-44a0-8cea-c5d9519106c8 which can be used as unique global reference for U.S. CISA Vice Society September 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-19T00:00:00Z
date_published 2022-09-08T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title #StopRansomware: Vice Society

U.S. CISA Zeppelin Ransomware August 11 2022

Cybersecurity and Infrastructure Security Agency. (2022, August 11). #StopRansomware: Zeppelin Ransomware. Retrieved September 19, 2024.

Internal MISP references

UUID 42d98de2-8c9a-4cc4-b5a1-9778c0da3286 which can be used as unique global reference for U.S. CISA Zeppelin Ransomware August 11 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-19T00:00:00Z
date_published 2022-08-11T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title #StopRansomware: Zeppelin Ransomware

Stordiag.exe - LOLBAS Project

LOLBAS. (2021, October 21). Stordiag.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 5e52a211-7ef6-42bd-93a1-5902f5e1c2ea which can be used as unique global reference for Stordiag.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-10-21T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Stordiag.exe

Pentestlab Stored Credentials

netbiosX. (2017, April 19). Stored Credentials. Retrieved April 6, 2018.

Internal MISP references

UUID 5be9afb8-749e-45a2-8e86-b5e6dc167b41 which can be used as unique global reference for Pentestlab Stored Credentials in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-06T00:00:00Z
date_published 2017-04-19T00:00:00Z
source MITRE
title Stored Credentials

store_pwd_rev_enc

Microsoft. (2021, October 28). Store passwords using reversible encryption. Retrieved January 3, 2022.

Internal MISP references

UUID d3b9df24-b776-4658-9bb4-f43a2fe0094c which can be used as unique global reference for store_pwd_rev_enc in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-03T00:00:00Z
date_published 2021-10-28T00:00:00Z
source MITRE
title Store passwords using reversible encryption

Microsoft Security Blog September 26 2024

Microsoft Threat Intelligence. (2024, September 26). Storm-0501 Ransomware attacks expanding to hybrid cloud environments . Retrieved September 27, 2024.

Internal MISP references

UUID bf05138b-f690-4b0f-ba10-9af71f7d9bfc which can be used as unique global reference for Microsoft Security Blog September 26 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-27T00:00:00Z
date_published 2024-09-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Storm-0501 Ransomware attacks expanding to hybrid cloud environments

IBM Storwize

IBM Support. (2017, April 26). Storwize USB Initialization Tool may contain malicious code. Retrieved May 28, 2019.

Internal MISP references

UUID 321cf27a-327d-4824-84d0-56634d3b86f5 which can be used as unique global reference for IBM Storwize in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-05-28T00:00:00Z
date_published 2017-04-26T00:00:00Z
source MITRE
title Storwize USB Initialization Tool may contain malicious code

G Data Sodinokibi June 2019

Han, Karsten. (2019, June 4). Strange Bits: Sodinokibi Spam, CinaRAT, and Fake G DATA. Retrieved August 4, 2020.

Internal MISP references

UUID 03b1ef5a-aa63-453a-affc-aa0caf174ce4 which can be used as unique global reference for G Data Sodinokibi June 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-04T00:00:00Z
date_published 2019-06-04T00:00:00Z
source MITRE
title Strange Bits: Sodinokibi Spam, CinaRAT, and Fake G DATA

Windows Blogs Microsoft Edge Sandbox

Cowan, C. (2017, March 23). Strengthening the Microsoft Edge Sandbox. Retrieved March 12, 2018.

Internal MISP references

UUID d7097b1e-507b-4626-9cef-39367c09f722 which can be used as unique global reference for Windows Blogs Microsoft Edge Sandbox in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-12T00:00:00Z
date_published 2017-03-23T00:00:00Z
source MITRE
title Strengthening the Microsoft Edge Sandbox

ComputerWeekly Strider

Warwick Ashford. (2016, August 8). Strider cyber attack group deploying malware for espionage. Retrieved January 10, 2024.

Internal MISP references

UUID dc9cfd06-54fb-553c-b538-1e93fed6c538 which can be used as unique global reference for ComputerWeekly Strider in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-10T00:00:00Z
date_published 2016-08-08T00:00:00Z
source MITRE
title Strider cyber attack group deploying malware for espionage

Symantec Strider Blog

Symantec Security Response. (2016, August 7). Strider: Cyberespionage group turns eye of Sauron on targets. Retrieved August 17, 2016.

Internal MISP references

UUID 664eac41-257f-4d4d-aba5-5d2e8e2117a7 which can be used as unique global reference for Symantec Strider Blog in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-08-17T00:00:00Z
date_published 2016-08-07T00:00:00Z
source MITRE, Tidal Cyber
title Strider: Cyberespionage group turns eye of Sauron on targets

Cybereason StrifeWater Feb 2022

Cybereason Nocturnus. (2022, February 1). StrifeWater RAT: Iranian APT Moses Staff Adds New Trojan to Ransomware Operations. Retrieved August 15, 2022.

Internal MISP references

UUID 30c911b2-9a5e-4510-a78c-c65e84398c7e which can be used as unique global reference for Cybereason StrifeWater Feb 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-15T00:00:00Z
date_published 2022-02-01T00:00:00Z
source MITRE
title StrifeWater RAT: Iranian APT Moses Staff Adds New Trojan to Ransomware Operations

Bitdefender StrongPity June 2020

Tudorica, R. et al. (2020, June 30). StrongPity APT - Revealing Trojanized Tools, Working Hours and Infrastructure. Retrieved July 20, 2020.

Internal MISP references

UUID 7d2e20f2-20ba-4d51-9495-034c07be41a8 which can be used as unique global reference for Bitdefender StrongPity June 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-07-20T00:00:00Z
date_published 2020-06-30T00:00:00Z
source MITRE
title StrongPity APT - Revealing Trojanized Tools, Working Hours and Infrastructure

welivesec_strongpity

Stefanko, L. (2023, January 10). StrongPity espionage campaign targeting Android users. Retrieved January 31, 2023.

Internal MISP references

UUID 1b89df2c-e756-599a-9f7f-a5230db9de46 which can be used as unique global reference for welivesec_strongpity in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-01-31T00:00:00Z
date_published 2023-01-10T00:00:00Z
source MITRE
title StrongPity espionage campaign targeting Android users

Microsoft STRONTIUM New Patterns Cred Harvesting Sept 2020

Microsoft Threat Intelligence Center (MSTIC). (2020, September 10). STRONTIUM: Detecting new patterns in credential harvesting. Retrieved September 11, 2020.

Internal MISP references

UUID 0a65008c-acdd-40fa-af1a-3d9941af8eac which can be used as unique global reference for Microsoft STRONTIUM New Patterns Cred Harvesting Sept 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-11T00:00:00Z
date_published 2020-09-10T00:00:00Z
source MITRE
title STRONTIUM: Detecting new patterns in credential harvesting

ESET Stuxnet Under the Microscope

Matrosov, A., Rodionov, E., Harley, D., Malcho, J.. (n.d.). Stuxnet Under the Microscope. Retrieved December 7, 2020.

Internal MISP references

UUID 4ec039a9-f843-42de-96ed-185c4e8c2d9f which can be used as unique global reference for ESET Stuxnet Under the Microscope in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-07T00:00:00Z
source MITRE
title Stuxnet Under the Microscope

subTee .NET Profilers May 2017

Smith, C. (2017, May 18). Subvert CLR Process Listing With .NET Profilers. Retrieved June 24, 2020.

Internal MISP references

UUID 6ef42019-5393-423e-811d-29b728c877e1 which can be used as unique global reference for subTee .NET Profilers May 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-24T00:00:00Z
date_published 2017-05-18T00:00:00Z
source MITRE
title Subvert CLR Process Listing With .NET Profilers

SpectorOps Subverting Trust Sept 2017

Graeber, M. (2017, September). Subverting Trust in Windows. Retrieved January 31, 2018.

Internal MISP references

UUID 0b6e7651-0e17-4101-ab2b-22cb09fe1691 which can be used as unique global reference for SpectorOps Subverting Trust Sept 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-31T00:00:00Z
date_published 2017-09-01T00:00:00Z
source MITRE
title Subverting Trust in Windows

Symantec Suckfly March 2016

DiMaggio, J. (2016, March 15). Suckfly: Revealing the secret life of your code signing certificates. Retrieved August 3, 2016.

Internal MISP references

UUID 8711c175-e405-4cb0-8c86-8aaa471e5573 which can be used as unique global reference for Symantec Suckfly March 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-08-03T00:00:00Z
date_published 2016-03-15T00:00:00Z
source MITRE, Tidal Cyber
title Suckfly: Revealing the secret life of your code signing certificates

sudo man page 2018

Todd C. Miller. (2018). Sudo Man Page. Retrieved March 19, 2018.

Internal MISP references

UUID 659d4302-d4cf-41af-8007-aa1da0208aa0 which can be used as unique global reference for sudo man page 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-19T00:00:00Z
date_published 2018-01-01T00:00:00Z
source MITRE
title Sudo Man Page

FireEye SUNBURST Additional Details Dec 2020

Stephen Eckels, Jay Smith, William Ballenthin. (2020, December 24). SUNBURST Additional Technical Details. Retrieved January 6, 2021.

Internal MISP references

UUID c5d94f7f-f796-4872-9a19-f030c825588e which can be used as unique global reference for FireEye SUNBURST Additional Details Dec 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-06T00:00:00Z
date_published 2020-12-24T00:00:00Z
source MITRE
title SUNBURST Additional Technical Details

Check Point Sunburst Teardrop December 2020

Check Point Research. (2020, December 22). SUNBURST, TEARDROP and the NetSec New Normal. Retrieved January 6, 2021.

Internal MISP references

UUID a6b75979-af51-42ed-9bb9-01d5fb9ceac9 which can be used as unique global reference for Check Point Sunburst Teardrop December 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-06T00:00:00Z
date_published 2020-12-22T00:00:00Z
source MITRE
title SUNBURST, TEARDROP and the NetSec New Normal

CheckPoint Sunburst & Teardrop December 2020

Check Point Research. (2020, December 22). SUNBURST, TEARDROP and the NetSec New Normal. Retrieved January 6, 2021.

Internal MISP references

UUID 4e3d9201-83d4-5375-b3b7-e00dfb16342d which can be used as unique global reference for CheckPoint Sunburst & Teardrop December 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-06T00:00:00Z
date_published 2020-12-22T00:00:00Z
source MITRE
title SUNBURST, TEARDROP and the NetSec New Normal

CrowdStrike SUNSPOT Implant January 2021

CrowdStrike Intelligence Team. (2021, January 11). SUNSPOT: An Implant in the Build Process. Retrieved January 11, 2021.

Internal MISP references

UUID 3a7b71cf-961a-4f63-84a8-31b43b18fb95 which can be used as unique global reference for CrowdStrike SUNSPOT Implant January 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-11T00:00:00Z
date_published 2021-01-11T00:00:00Z
source MITRE
title SUNSPOT: An Implant in the Build Process

Kaspersky Superfish

Onuma. (2015, February 24). Superfish: Adware Preinstalled on Lenovo Laptops. Retrieved February 20, 2017.

Internal MISP references

UUID 3d554c05-992c-41f3-99f4-6b0baac56b3a which can be used as unique global reference for Kaspersky Superfish in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-02-20T00:00:00Z
date_published 2015-02-24T00:00:00Z
source MITRE
title Superfish: Adware Preinstalled on Lenovo Laptops

Unit42 SUPERNOVA Dec 2020

Tennis, M. (2020, December 17). SUPERNOVA: A Novel .NET Webshell. Retrieved February 22, 2021.

Internal MISP references

UUID e884d0b5-f2a2-47cb-bb77-3acdac6b1790 which can be used as unique global reference for Unit42 SUPERNOVA Dec 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-22T00:00:00Z
date_published 2020-12-17T00:00:00Z
source MITRE
title SUPERNOVA: A Novel .NET Webshell

Guidepoint SUPERNOVA Dec 2020

Riley, W. (2020, December 1). SUPERNOVA SolarWinds .NET Webshell Analysis. Retrieved February 18, 2021.

Internal MISP references

UUID 78fee365-ab2b-4823-8358-46c362be1ac0 which can be used as unique global reference for Guidepoint SUPERNOVA Dec 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-18T00:00:00Z
date_published 2020-12-01T00:00:00Z
source MITRE
title SUPERNOVA SolarWinds .NET Webshell Analysis

00sec Droppers

0x00pico. (2017, September 25). Super-Stealthy Droppers. Retrieved October 4, 2021.

Internal MISP references

UUID 7569e79b-5a80-4f42-b467-8548cc9fc319 which can be used as unique global reference for 00sec Droppers in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-04T00:00:00Z
date_published 2017-09-25T00:00:00Z
source MITRE
title Super-Stealthy Droppers

FireEyeSupplyChain

FireEye. (2014). SUPPLY CHAIN ANALYSIS: From Quartermaster to SunshopFireEye. Retrieved March 6, 2017.

Internal MISP references

UUID 0647b285-963b-4427-bc96-a17b5f8839a9 which can be used as unique global reference for FireEyeSupplyChain in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-06T00:00:00Z
date_published 2014-01-01T00:00:00Z
source MITRE
title SUPPLY CHAIN ANALYSIS: From Quartermaster to SunshopFireEye

Moran 2013

Moran, N., & Villeneuve, N. (2013, August 12). Survival of the Fittest: New York Times Attackers Evolve Quickly [Blog]. Retrieved November 12, 2014.

Internal MISP references

UUID d38bdb47-1a8d-43f8-b7ed-dfa5e430ac2f which can be used as unique global reference for Moran 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-12T00:00:00Z
date_published 2013-08-12T00:00:00Z
source MITRE
title Survival of the Fittest: New York Times Attackers Evolve Quickly [Blog]

4 - appv

John Fokker. (2022, March 17). Suspected DarkHotel APT activity update. Retrieved February 6, 2024.

Internal MISP references

UUID 2b64284f-bc2c-5ca5-bf16-f862345cef80 which can be used as unique global reference for 4 - appv in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-06T00:00:00Z
date_published 2022-03-17T00:00:00Z
source MITRE
title Suspected DarkHotel APT activity update

Dell Threat Group 2889

Dell SecureWorks. (2015, October 7). Suspected Iran-Based Hacker Group Creates Network of Fake LinkedIn Profiles. Retrieved January 14, 2016.

Internal MISP references

UUID de7003cb-5127-4fd7-9475-d69e0d7f5cc8 which can be used as unique global reference for Dell Threat Group 2889 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-14T00:00:00Z
date_published 2015-10-07T00:00:00Z
source MITRE
title Suspected Iran-Based Hacker Group Creates Network of Fake LinkedIn Profiles

Mandiant UNC3890 Aug 2022

Mandiant Israel Research Team. (2022, August 17). Suspected Iranian Actor Targeting Israeli Shipping, Healthcare, Government and Energy Sectors. Retrieved September 21, 2022.

Internal MISP references

UUID 7b3fda0b-d327-4f02-bebe-2b8974f9959d which can be used as unique global reference for Mandiant UNC3890 Aug 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-21T00:00:00Z
date_published 2022-08-17T00:00:00Z
source MITRE
title Suspected Iranian Actor Targeting Israeli Shipping, Healthcare, Government and Energy Sectors

Suspected Russian Activity Targeting Government and Business Entities Around the Globe

Luke Jenkins, Sarah Hawley, Parnian Najafi, Doug Bienstock. (2021, December 6). Suspected Russian Activity Targeting Government and Business Entities Around the Globe. Retrieved April 15, 2022.

Internal MISP references

UUID f45a0551-8d49-4d40-989f-659416dc25ec which can be used as unique global reference for Suspected Russian Activity Targeting Government and Business Entities Around the Globe in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-15T00:00:00Z
date_published 2021-12-06T00:00:00Z
source MITRE
title Suspected Russian Activity Targeting Government and Business Entities Around the Globe

NCSC et al APT29 2024

UK National Cyber Security Center et al. (2024, February). SVR cyber actors adapt tactics for initial cloud access. Retrieved March 1, 2024.

Internal MISP references

UUID e04e6419-a086-598d-a794-925e42f3f237 which can be used as unique global reference for NCSC et al APT29 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-01T00:00:00Z
date_published 2024-02-01T00:00:00Z
source MITRE
title SVR cyber actors adapt tactics for initial cloud access

U.S. CISA APT29 Cloud Access

Cybersecurity and Infrastructure Security Agency. (2024, February 26). SVR Cyber Actors Adapt Tactics for Initial Cloud Access. Retrieved March 1, 2024.

Internal MISP references

UUID e9e08eca-1e01-4ff0-a8ef-49ecf66aaf3d which can be used as unique global reference for U.S. CISA APT29 Cloud Access in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-01T00:00:00Z
date_published 2024-02-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title SVR Cyber Actors Adapt Tactics for Initial Cloud Access

Recorded Future Turla Infra 2020

Insikt Group. (2020, March 12). Swallowing the Snake’s Tail: Tracking Turla Infrastructure. Retrieved September 16, 2024.

Internal MISP references

UUID 73aaff33-5a0e-40b7-a089-77ac57da8dca which can be used as unique global reference for Recorded Future Turla Infra 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-16T00:00:00Z
date_published 2020-03-12T00:00:00Z
source MITRE
title Swallowing the Snake’s Tail: Tracking Turla Infrastructure

Microsoft Sxstrace

Gerend, J. et al.. (2017, October 16). sxstrace. Retrieved April 26, 2021.

Internal MISP references

UUID a0a753c6-7d8c-4ad9-91a9-a2c385178054 which can be used as unique global reference for Microsoft Sxstrace in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-26T00:00:00Z
date_published 2017-10-16T00:00:00Z
source MITRE
title sxstrace

Alienvault Sykipot DOD Smart Cards

Blasco, J. (2012, January 12). Sykipot variant hijacks DOD and Windows smart cards. Retrieved January 10, 2016.

Internal MISP references

UUID 1a96544f-5b4e-4e1a-8db0-a989df9e4aaa which can be used as unique global reference for Alienvault Sykipot DOD Smart Cards in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-10T00:00:00Z
date_published 2012-01-12T00:00:00Z
source MITRE
title Sykipot variant hijacks DOD and Windows smart cards

SecureList SynAck Doppelgänging May 2018

Ivanov, A. et al. (2018, May 7). SynAck targeted ransomware uses the Doppelgänging technique. Retrieved May 22, 2018.

Internal MISP references

UUID d9f0af0f-8a65-406b-9d7e-4051086ef301 which can be used as unique global reference for SecureList SynAck Doppelgänging May 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-05-22T00:00:00Z
date_published 2018-05-07T00:00:00Z
source MITRE
title SynAck targeted ransomware uses the Doppelgänging technique

SyncAppvPublishingServer.exe - LOLBAS Project

LOLBAS. (2018, May 25). SyncAppvPublishingServer.exe. Retrieved December 4, 2023.

Internal MISP references

UUID ce371df7-aab6-4338-9491-656481cb5601 which can be used as unique global reference for SyncAppvPublishingServer.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title SyncAppvPublishingServer.exe

6 - appv

Strontic. (n.d.). SyncAppvPublishingServer.exe. Retrieved February 6, 2024.

Internal MISP references

UUID bc5d8a1a-5cf9-5974-bf13-245fa53721da which can be used as unique global reference for 6 - appv in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-06T00:00:00Z
source MITRE
title SyncAppvPublishingServer.exe

5 - appv

Nick Landers, Casey Smith. (n.d.). /Syncappvpublishingserver.vbs. Retrieved February 6, 2024.

Internal MISP references

UUID 926c9e06-cc6a-55ea-8436-1211b4cc4d92 which can be used as unique global reference for 5 - appv in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-06T00:00:00Z
source MITRE
title /Syncappvpublishingserver.vbs

Syncappvpublishingserver.vbs - LOLBAS Project

LOLBAS. (2018, May 25). Syncappvpublishingserver.vbs. Retrieved December 4, 2023.

Internal MISP references

UUID adb09226-894c-4874-a2e3-fb2c6de30173 which can be used as unique global reference for Syncappvpublishingserver.vbs - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Syncappvpublishingserver.vbs

Mac Time Sync

Cone, Matt. (2021, January 14). Synchronize your Mac's Clock with a Time Server. Retrieved March 27, 2024.

Internal MISP references

UUID b36dd8af-045d-57b0-b0a9-45d831fe6373 which can be used as unique global reference for Mac Time Sync in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-27T00:00:00Z
date_published 2021-01-14T00:00:00Z
source MITRE
title Synchronize your Mac's Clock with a Time Server

Mandiant - Synful Knock

Bill Hau, Tony Lee, Josh Homan. (2015, September 15). SYNful Knock - A Cisco router implant - Part I. Retrieved October 19, 2020.

Internal MISP references

UUID 1f6eaa98-9184-4341-8634-5512a9c632dd which can be used as unique global reference for Mandiant - Synful Knock in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
date_published 2015-09-15T00:00:00Z
source MITRE
title SYNful Knock - A Cisco router implant - Part I

sysdig

Sysdig. (2023). Sysdig Global Cloud Threat Report. Retrieved March 1, 2024.

Internal MISP references

UUID 80cb54c2-2c44-5e19-bbc5-da9f4aaf976a which can be used as unique global reference for sysdig in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-01T00:00:00Z
date_published 2023-01-01T00:00:00Z
source MITRE
title Sysdig Global Cloud Threat Report

Sysmon EID 9

Russinovich, R. & Garnier, T. (2021, August 18). Sysmon Event ID 9. Retrieved September 24, 2021.

Internal MISP references

UUID b24440b2-43c3-46f2-be4c-1147f6acfe57 which can be used as unique global reference for Sysmon EID 9 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-24T00:00:00Z
date_published 2021-08-18T00:00:00Z
source MITRE
title Sysmon Event ID 9

Microsoft Sysmon v6 May 2017

Russinovich, M. & Garnier, T. (2017, May 22). Sysmon v6.20. Retrieved December 13, 2017.

Internal MISP references

UUID 41cd9e06-a56c-4b68-948c-efc497a8d0dc which can be used as unique global reference for Microsoft Sysmon v6 May 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-13T00:00:00Z
date_published 2017-05-22T00:00:00Z
source MITRE
title Sysmon v6.20

Syssetup.dll - LOLBAS Project

LOLBAS. (2018, May 25). Syssetup.dll. Retrieved December 4, 2023.

Internal MISP references

UUID 3bb7027f-7cbb-47e7-8cbb-cf45604669af which can be used as unique global reference for Syssetup.dll - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Syssetup.dll

System and kernel extensions in macOS

Apple. (n.d.). System and kernel extensions in macOS. Retrieved March 31, 2022.

Internal MISP references

UUID e5c4974d-dfd4-4c1c-ba4c-b6fb276effac which can be used as unique global reference for System and kernel extensions in macOS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-31T00:00:00Z
source MITRE
title System and kernel extensions in macOS

Linux man-pages: systemd January 2014

Linux man-pages. (2014, January). systemd(1) - Linux manual page. Retrieved April 23, 2019.

Internal MISP references

UUID e9a58efd-8de6-40c9-9638-c642311d6a07 which can be used as unique global reference for Linux man-pages: systemd January 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-23T00:00:00Z
date_published 2014-01-01T00:00:00Z
source MITRE
title systemd(1) - Linux manual page

FreeDesktop Journal

freedesktop.org. (n.d.). systemd-journald.service. Retrieved June 15, 2022.

Internal MISP references

UUID 5ded9060-9a23-42dc-b13b-15e4e3ccabf9 which can be used as unique global reference for FreeDesktop Journal in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-15T00:00:00Z
source MITRE
title systemd-journald.service

Ubuntu Manpage systemd rc

Canonical Ltd.. (n.d.). systemd-rc-local-generator - Compatibility generator for starting /etc/rc.local and /usr/sbin/halt.local during boot and shutdown. Retrieved February 23, 2021.

Internal MISP references

UUID 6be16aba-a37f-49c4-9a36-51d2676f64e6 which can be used as unique global reference for Ubuntu Manpage systemd rc in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-23T00:00:00Z
source MITRE
title systemd-rc-local-generator - Compatibility generator for starting /etc/rc.local and /usr/sbin/halt.local during boot and shutdown

freedesktop systemd.service

Free Desktop. (n.d.). systemd.service — Service unit configuration. Retrieved March 20, 2023.

Internal MISP references

UUID cae49a7a-db3b-5202-ba45-fbfa98b073c9 which can be used as unique global reference for freedesktop systemd.service in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-20T00:00:00Z
source MITRE
title systemd.service — Service unit configuration

Systemd Service Units

Freedesktop.org. (n.d.). systemd.service — Service unit configuration. Retrieved March 16, 2020.

Internal MISP references

UUID 43bae447-d2e3-4b53-b17b-12a0b54ac604 which can be used as unique global reference for Systemd Service Units in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-16T00:00:00Z
source MITRE
title systemd.service — Service unit configuration

systemdsleep Linux

Man7. (n.d.). systemd-sleep.conf(5) — Linux manual page. Retrieved June 7, 2023.

Internal MISP references

UUID 9537f6f9-1521-5c21-b14f-ac459a2d1b70 which can be used as unique global reference for systemdsleep Linux in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-07T00:00:00Z
source MITRE
title systemd-sleep.conf(5) — Linux manual page

Freedesktop.org Linux systemd 29SEP2018

Freedesktop.org. (2018, September 29). systemd System and Service Manager. Retrieved April 23, 2019.

Internal MISP references

UUID 940dcbbe-45d3-4f36-8d48-d606d41a679e which can be used as unique global reference for Freedesktop.org Linux systemd 29SEP2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-23T00:00:00Z
date_published 2018-09-29T00:00:00Z
source MITRE
title systemd System and Service Manager

archlinux Systemd Timers Aug 2020

archlinux. (2020, August 11). systemd/Timers. Retrieved October 12, 2020.

Internal MISP references

UUID 670f02f1-3927-4f38-aa2b-9ca0d8cf5b8e which can be used as unique global reference for archlinux Systemd Timers Aug 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-12T00:00:00Z
date_published 2020-08-11T00:00:00Z
source MITRE
title systemd/Timers

TechNet Systeminfo

Microsoft. (n.d.). Systeminfo. Retrieved April 8, 2016.

Internal MISP references

UUID 5462ba66-6e26-41c2-bc28-6c19085d4469 which can be used as unique global reference for TechNet Systeminfo in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-08T00:00:00Z
source MITRE
title Systeminfo

Peripheral Discovery macOS

SS64. (n.d.). system_profiler. Retrieved March 11, 2022.

Internal MISP references

UUID 2a3c5216-b153-4d89-b0b1-f32af3aa83d0 which can be used as unique global reference for Peripheral Discovery macOS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-11T00:00:00Z
source MITRE
title system_profiler

linux system time

ArchLinux. (2024, February 1). System Time. Retrieved March 27, 2024.

Internal MISP references

UUID 2dfd22d7-c78b-5967-b732-736f37ea5489 which can be used as unique global reference for linux system time in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-27T00:00:00Z
date_published 2024-02-01T00:00:00Z
source MITRE
title System Time

MSDN System Time

Microsoft. (n.d.). System Time. Retrieved November 25, 2016.

Internal MISP references

UUID 5e15e03b-be8b-4f3d-a3ae-0df7a4ecfbec which can be used as unique global reference for MSDN System Time in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-11-25T00:00:00Z
source MITRE
title System Time

atomic-red proc file system

Atomic Red Team. (2023, November). T1003.007 - OS Credential Dumping: Proc Filesystem. Retrieved March 28, 2024.

Internal MISP references

UUID c7e77109-36d3-5549-a0f7-bacc0d9288b2 which can be used as unique global reference for atomic-red proc file system in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-28T00:00:00Z
date_published 2023-11-01T00:00:00Z
source MITRE
title T1003.007 - OS Credential Dumping: Proc Filesystem

Red Canary - Atomic Red Team

Red Canary - Atomic Red Team. (n.d.). T1053.005 - Scheduled Task/Job: Scheduled Task. Retrieved June 19, 2024.

Internal MISP references

UUID 2e7fd604-6ec8-54ec-a9f4-879b349f3542 which can be used as unique global reference for Red Canary - Atomic Red Team in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-19T00:00:00Z
source MITRE
title T1053.005 - Scheduled Task/Job: Scheduled Task

T1562.002_redcanaryco

redcanaryco. (2021, September 3). T1562.002 - Disable Windows Event Logging. Retrieved September 13, 2021.

Internal MISP references

UUID e136f5a2-d4c2-4c6c-8f72-0f8ed9abeed1 which can be used as unique global reference for T1562.002_redcanaryco in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-13T00:00:00Z
date_published 2021-09-03T00:00:00Z
source MITRE
title T1562.002 - Disable Windows Event Logging

Palo Alto T9000 Feb 2016

Grunzweig, J. and Miller-Osborn, J.. (2016, February 4). T9000: Advanced Modular Backdoor Uses Complex Anti-Analysis Techniques. Retrieved April 15, 2016.

Internal MISP references

UUID d7eefe85-86cf-4b9d-bf70-f16c5a0227cc which can be used as unique global reference for Palo Alto T9000 Feb 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-15T00:00:00Z
date_published 2016-02-04T00:00:00Z
source MITRE
title T9000: Advanced Modular Backdoor Uses Complex Anti-Analysis Techniques

US-CERT TA18-068A 2018

US-CERT. (2018, March 27). TA18-068A Brute Force Attacks Conducted by Cyber Actors. Retrieved October 2, 2019.

Internal MISP references

UUID d9992f57-8ff3-432f-b445-937ff4a6ebf9 which can be used as unique global reference for US-CERT TA18-068A 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-02T00:00:00Z
date_published 2018-03-27T00:00:00Z
source MITRE
title TA18-068A Brute Force Attacks Conducted by Cyber Actors

Browers FriarFox

Raggi, Michael. Proofpoint Threat Research Team. (2021, February 25). TA413 Leverages New FriarFox Browser Extension to Target the Gmail Accounts of Global Tibetan Organizations. Retrieved February 26, 2024.

Internal MISP references

UUID 3fe79fc8-c86d-57ad-961f-30fddd0e5f62 which can be used as unique global reference for Browers FriarFox in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-26T00:00:00Z
date_published 2021-02-25T00:00:00Z
source MITRE
title TA413 Leverages New FriarFox Browser Extension to Target the Gmail Accounts of Global Tibetan Organizations

Proofpoint TA416 November 2020

Proofpoint Threat Research Team. (2020, November 23). TA416 Goes to Ground and Returns with a Golang PlugX Malware Loader. Retrieved April 13, 2021.

Internal MISP references

UUID f72685de-c775-41c4-94ed-45fd7f873a1d which can be used as unique global reference for Proofpoint TA416 November 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-13T00:00:00Z
date_published 2020-11-23T00:00:00Z
source MITRE
title TA416 Goes to Ground and Returns with a Golang PlugX Malware Loader

NCC Group TA505

Terefos, A. (2020, November 18). TA505: A Brief History of Their Time. Retrieved July 14, 2022.

Internal MISP references

UUID 45e0b869-5447-491b-9e8b-fbf63c62f5d6 which can be used as unique global reference for NCC Group TA505 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-14T00:00:00Z
date_published 2020-11-18T00:00:00Z
source MITRE
title TA505: A Brief History of Their Time

ProofPoint SettingContent-ms July 2018

Proofpoint Staff. (2018, July 19). TA505 Abusing SettingContent-ms within PDF files to Distribute FlawedAmmyy RAT. Retrieved April 19, 2019.

Internal MISP references

UUID 4f92af77-0428-4c67-8eec-98ecc3b55630 which can be used as unique global reference for ProofPoint SettingContent-ms July 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-19T00:00:00Z
date_published 2018-07-19T00:00:00Z
source MITRE
title TA505 Abusing SettingContent-ms within PDF files to Distribute FlawedAmmyy RAT

IBM TA505 April 2020

Frydrych, M. (2020, April 14). TA505 Continues to Infect Networks With SDBbot RAT. Retrieved May 29, 2020.

Internal MISP references

UUID bcef8bf8-5fc2-4921-b920-74ef893b8a27 which can be used as unique global reference for IBM TA505 April 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-29T00:00:00Z
date_published 2020-04-14T00:00:00Z
source MITRE
title TA505 Continues to Infect Networks With SDBbot RAT

Proofpoint TA505 October 2019

Schwarz, D. et al. (2019, October 16). TA505 Distributes New SDBbot Remote Access Trojan with Get2 Downloader. Retrieved May 29, 2020.

Internal MISP references

UUID 711ea2b3-58e2-4b38-aa71-877029c12e64 which can be used as unique global reference for Proofpoint TA505 October 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-29T00:00:00Z
date_published 2019-10-16T00:00:00Z
source MITRE
title TA505 Distributes New SDBbot Remote Access Trojan with Get2 Downloader

Proofpoint TA505 June 2018

Proofpoint Staff. (2018, June 8). TA505 shifts with the times. Retrieved May 28, 2019.

Internal MISP references

UUID e48dec7b-5635-4ae0-b0db-229660806c06 which can be used as unique global reference for Proofpoint TA505 June 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-05-28T00:00:00Z
date_published 2018-06-08T00:00:00Z
source MITRE
title TA505 shifts with the times

TrendMicro TA505 Aug 2019

Trend Micro. (2019, August 27). TA505: Variety in Use of ServHelper and FlawedAmmyy. Retrieved February 22, 2021.

Internal MISP references

UUID 460758ea-ed3e-4e9b-ba2e-97c9d42154a4 which can be used as unique global reference for TrendMicro TA505 Aug 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-22T00:00:00Z
date_published 2019-08-27T00:00:00Z
source MITRE
title TA505: Variety in Use of ServHelper and FlawedAmmyy

Proofpoint TA547 April 10 2024

Tommy Madjar, Selena Larson, the Proofpoint Threat Research Team. (2024, April 10). TA547 Targets German Organizations with Rhadamanthys Stealer. Retrieved September 9, 2024.

Internal MISP references

UUID c1fab1dd-bec1-4637-9d50-8317247dc82b which can be used as unique global reference for Proofpoint TA547 April 10 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-09T00:00:00Z
date_published 2024-04-10T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title TA547 Targets German Organizations with Rhadamanthys Stealer

Unit 42 TA551 Jan 2021

Duncan, B. (2021, January 7). TA551: Email Attack Campaign Switches from Valak to IcedID. Retrieved March 17, 2021.

Internal MISP references

UUID 8e34bf1e-86ce-4d52-a6fa-037572766e99 which can be used as unique global reference for Unit 42 TA551 Jan 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-17T00:00:00Z
date_published 2021-01-07T00:00:00Z
source MITRE
title TA551: Email Attack Campaign Switches from Valak to IcedID

Proofpoint February 23 2023

Proofpoint. (2023, February 23). TA569: SocGholish and Beyond | Proofpoint US. Retrieved May 7, 2023.

Internal MISP references

UUID fe7924b1-a385-4784-b308-15c2d0dbd840 which can be used as unique global reference for Proofpoint February 23 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2023-02-23T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title TA569: SocGholish and Beyond

TA571

Axel F, Selena Larson. (2023, October 30). TA571 Delivers IcedID Forked Loader. Retrieved February 13, 2024.

Internal MISP references

UUID 5b463ad7-f425-5e70-b0b0-28514730a888 which can be used as unique global reference for TA571 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-13T00:00:00Z
date_published 2023-10-30T00:00:00Z
source MITRE
title TA571 Delivers IcedID Forked Loader

IBM TA577 OneNote Malspam

IBM X-Force. (2023, May 30). TA577 OneNote Malspam Results in QakBot Deployment. Retrieved January 24, 2024.

Internal MISP references

UUID 30ebffb8-be3e-4094-a41b-882aec9e14b8 which can be used as unique global reference for IBM TA577 OneNote Malspam in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-24T00:00:00Z
date_published 2023-05-30T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title TA577 OneNote Malspam Results in QakBot Deployment

Proofpoint TA577 NTLM March 4 2024

Tommy Madjar, Kelsey Merriman, Selena Larson, Proofpoint Threat Research Team. (2024, March 4). TA577’s Unusual Attack Chain Leads to NTLM Data Theft. Retrieved March 11, 2024.

Internal MISP references

UUID bbbef77a-8cd8-411c-a8a7-7faa7b5fdb2c which can be used as unique global reference for Proofpoint TA577 NTLM March 4 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-11T00:00:00Z
date_published 2024-03-04T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title TA577’s Unusual Attack Chain Leads to NTLM Data Theft

Cobalt Strike TTPs Dec 2017

Cobalt Strike. (2017, December 8). Tactics, Techniques, and Procedures. Retrieved December 20, 2017.

Internal MISP references

UUID ee56d7a3-32c4-4f75-ad0c-73164a83b5a6 which can be used as unique global reference for Cobalt Strike TTPs Dec 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-20T00:00:00Z
date_published 2017-12-08T00:00:00Z
source MITRE
title Tactics, Techniques, and Procedures

Reuters Taiwan BlackTech August 2020

Lee, Y. (2020, August 19). Taiwan says China behind cyberattacks on government agencies, emails. Retrieved April 6, 2022.

Internal MISP references

UUID 77293f88-e336-4786-b042-7f0080bbff32 which can be used as unique global reference for Reuters Taiwan BlackTech August 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-06T00:00:00Z
date_published 2020-08-19T00:00:00Z
source MITRE
title Taiwan says China behind cyberattacks on government agencies, emails

Microsoft Process Snapshot

Microsoft. (n.d.). Taking a Snapshot and Viewing Processes. Retrieved December 12, 2017.

Internal MISP references

UUID 6e4b1921-99b2-41ce-a7dc-72c05b17c682 which can be used as unique global reference for Microsoft Process Snapshot in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-12T00:00:00Z
source MITRE
title Taking a Snapshot and Viewing Processes

Lacework TeamTNT May 2021

Stroud, J. (2021, May 25). Taking TeamTNT's Docker Images Offline. Retrieved September 16, 2024.

Internal MISP references

UUID 5908b04b-dbca-4fd8-bacc-141ef15546a1 which can be used as unique global reference for Lacework TeamTNT May 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-16T00:00:00Z
date_published 2021-05-25T00:00:00Z
source MITRE
title Taking TeamTNT's Docker Images Offline

Lumen Versa 2024

Black Lotus Labs. (2024, August 27). Taking The Crossroads: The Versa Director Zero-Day Exploitaiton. Retrieved August 27, 2024.

Internal MISP references

UUID 1d7f40f7-76e6-5ba2-8561-17f3646cf407 which can be used as unique global reference for Lumen Versa 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-27T00:00:00Z
date_published 2024-08-27T00:00:00Z
source MITRE
title Taking The Crossroads: The Versa Director Zero-Day Exploitaiton

Lumen August 27 2024

Black Lotus Labs. (2024, August 27). Taking the Crossroads The Versa Director Zero-Day Exploitation. Retrieved September 6, 2024.

Internal MISP references

UUID f82c001f-13c0-43d0-bfa4-a51b2715a3e7 which can be used as unique global reference for Lumen August 27 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-06T00:00:00Z
date_published 2024-08-27T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Taking the Crossroads The Versa Director Zero-Day Exploitation

Datadog ECS January 19 2024

Martin McCloskey, Christophe Tafani-Dereeper. (2024, January 19). Tales from the cloud trenches: Amazon ECS is the new EC2 for crypto mining. Retrieved April 11, 2024.

Internal MISP references

UUID 7e4e44a7-b079-41af-b41d-176ba7e99563 which can be used as unique global reference for Datadog ECS January 19 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-11T00:00:00Z
date_published 2024-01-19T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Tales from the cloud trenches: Amazon ECS is the new EC2 for crypto mining

Splunk Kovar Certificates 2017

Kovar, R. (2017, December 11). Tall Tales of Hunting with TLS/SSL Certificates. Retrieved October 16, 2020.

Internal MISP references

UUID 2b341021-897e-4e3f-9141-825d3501c498 which can be used as unique global reference for Splunk Kovar Certificates 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-16T00:00:00Z
date_published 2017-12-11T00:00:00Z
source MITRE
title Tall Tales of Hunting with TLS/SSL Certificates

Dragos TALONITE

Dragos. (null). TALONITE. Retrieved February 25, 2021.

Internal MISP references

UUID f8ef1920-a4ad-4d65-b9de-8357d75f6929 which can be used as unique global reference for Dragos TALONITE in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-25T00:00:00Z
source MITRE
title TALONITE

Talos Sodinokibi April 2019

Cadieux, P, et al (2019, April 30). Sodinokibi ransomware exploits WebLogic Server vulnerability. Retrieved August 4, 2020.

Internal MISP references

UUID fb948877-da2b-4abd-9d57-de9866b7a7c2 which can be used as unique global reference for Talos Sodinokibi April 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-04T00:00:00Z
source MITRE
title Talos Sodinokibi April 2019

Medium Event Tracing Tampering 2018

Palantir. (2018, December 24). Tampering with Windows Event Tracing: Background, Offense, and Defense. Retrieved June 7, 2019.

Internal MISP references

UUID cd1a7b9a-183f-4acf-95c8-14d9475d0551 which can be used as unique global reference for Medium Event Tracing Tampering 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-07T00:00:00Z
date_published 2018-12-24T00:00:00Z
source MITRE
title Tampering with Windows Event Tracing: Background, Offense, and Defense

Tar.exe - LOLBAS Project

LOLBAS. (2023, January 30). Tar.exe. Retrieved December 4, 2023.

Internal MISP references

UUID e5f54ded-3ec1-49c1-9302-6b9f372d5015 which can be used as unique global reference for Tar.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2023-01-30T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Tar.exe

NGLite Trojan

Robert Falcone, Jeff White, and Peter Renals. (2021, November 7). Targeted Attack Campaign Against ManageEngine ADSelfService Plus Delivers Godzilla Webshells, NGLite Trojan and KdcSponge Stealer. Retrieved February 8, 2024.

Internal MISP references

UUID 7cdd99d2-bbb2-5c81-ad09-92b581f33ffe which can be used as unique global reference for NGLite Trojan in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-08T00:00:00Z
date_published 2021-11-07T00:00:00Z
source MITRE
title Targeted Attack Campaign Against ManageEngine ADSelfService Plus Delivers Godzilla Webshells, NGLite Trojan and KdcSponge Stealer

Netskope GCP Redirection

Ashwin Vamshi. (2019, January 24). Targeted Attacks Abusing Google Cloud Platform Open Redirection. Retrieved August 18, 2022.

Internal MISP references

UUID 18efeffc-c47b-46ad-8e7b-2eda30a406f0 which can be used as unique global reference for Netskope GCP Redirection in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-18T00:00:00Z
date_published 2019-01-24T00:00:00Z
source MITRE
title Targeted Attacks Abusing Google Cloud Platform Open Redirection

AhnLab Andariel Subgroup of Lazarus June 2018

AhnLab. (2018, June 23). Targeted attacks by Andariel Threat Group, a subgroup of the Lazarus. Retrieved September 29, 2021.

Internal MISP references

UUID bbc66e9f-98f9-4e34-b568-2833ea536f2e which can be used as unique global reference for AhnLab Andariel Subgroup of Lazarus June 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-29T00:00:00Z
date_published 2018-06-23T00:00:00Z
source MITRE, Tidal Cyber
title Targeted attacks by Andariel Threat Group, a subgroup of the Lazarus

Sood and Enbody

Aditya Sood and Richard Enbody. (2014, December 16). Targeted Cyber Attacks. Retrieved January 4, 2024.

Internal MISP references

UUID 61aca848-6376-560a-8f14-c23a3a9c832b which can be used as unique global reference for Sood and Enbody in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-04T00:00:00Z
date_published 2014-12-16T00:00:00Z
source MITRE
title Targeted Cyber Attacks

dharma_ransomware

Loui, E. Scheuerman, K. et al. (2020, April 16). Targeted Dharma Ransomware Intrusions Exhibit Consistent Techniques. Retrieved January 26, 2022.

Internal MISP references

UUID dfd168c0-40da-4402-a123-963eb8e2125a which can be used as unique global reference for dharma_ransomware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-26T00:00:00Z
date_published 2020-04-16T00:00:00Z
source MITRE
title Targeted Dharma Ransomware Intrusions Exhibit Consistent Techniques

Check Point Research September 11 2024

Check Point Research. (2024, September 11). Targeted Iranian Attacks Against Iraqi Government Infrastructure - Check Point Research. Retrieved September 11, 2024.

Internal MISP references

UUID 53320d81-4060-4414-b5b8-21d09362bc44 which can be used as unique global reference for Check Point Research September 11 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-11T00:00:00Z
date_published 2024-09-11T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Targeted Iranian Attacks Against Iraqi Government Infrastructure - Check Point Research

Targeted SSL Stripping Attacks Are Real

Check Point. (n.d.). Targeted SSL Stripping Attacks Are Real. Retrieved May 24, 2023.

Internal MISP references

UUID 714528e8-0f2e-50a3-93c0-c560a34ba973 which can be used as unique global reference for Targeted SSL Stripping Attacks Are Real in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-24T00:00:00Z
source MITRE
title Targeted SSL Stripping Attacks Are Real

CFR Vaccine Development Threats

Council on Foreign Relations. (2020, November 28). Targeting of companies involved in vaccine development. Retrieved October 30, 2023.

Internal MISP references

UUID 2ec4f877-de9a-44bf-8236-20d7ecd631df which can be used as unique global reference for CFR Vaccine Development Threats in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-30T00:00:00Z
date_published 2020-11-28T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Targeting of companies involved in vaccine development

Tarrask scheduled task

Microsoft Threat Intelligence Team & Detection and Response Team . (2022, April 12). Tarrask malware uses scheduled tasks for defense evasion. Retrieved June 1, 2022.

Internal MISP references

UUID 87682623-d1dd-4ee8-ae68-b08be5113e3e which can be used as unique global reference for Tarrask scheduled task in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-01T00:00:00Z
date_published 2022-04-12T00:00:00Z
source MITRE
title Tarrask malware uses scheduled tasks for defense evasion

Microsoft Tasklist

Microsoft. (n.d.). Tasklist. Retrieved December 23, 2015.

Internal MISP references

UUID 2c09561a-02ee-4948-9745-9d6c8eb2881d which can be used as unique global reference for Microsoft Tasklist in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-12-23T00:00:00Z
source MITRE
title Tasklist

Microsoft Tasks

Microsoft. (2018, May 31). Tasks. Retrieved September 28, 2021.

Internal MISP references

UUID def6601b-67e6-41e5-bcf3-9c701b86fd10 which can be used as unique global reference for Microsoft Tasks in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-28T00:00:00Z
date_published 2018-05-31T00:00:00Z
source MITRE
title Tasks

TechNet Task Scheduler Security

Microsoft. (2005, January 21). Task Scheduler and security. Retrieved June 8, 2016.

Internal MISP references

UUID 3a6d08ba-d79d-46f7-917d-075a98c59228 which can be used as unique global reference for TechNet Task Scheduler Security in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-08T00:00:00Z
date_published 2005-01-21T00:00:00Z
source MITRE
title Task Scheduler and security

tau bundlore erika noerenberg 2020

Erika Noerenberg. (2020, June 29). TAU Threat Analysis: Bundlore (macOS) mm-install-macos. Retrieved October 12, 2021.

Internal MISP references

UUID 1c62ed57-43f7-40d7-a5c9-46b40a40af0e which can be used as unique global reference for tau bundlore erika noerenberg 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-12T00:00:00Z
date_published 2020-06-29T00:00:00Z
source MITRE
title TAU Threat Analysis: Bundlore (macOS) mm-install-macos

CarbonBlack Conti July 2020

Baskin, B. (2020, July 8). TAU Threat Discovery: Conti Ransomware. Retrieved February 17, 2021.

Internal MISP references

UUID 3c3a6dc0-66f2-492e-8c9c-c0bcca73008e which can be used as unique global reference for CarbonBlack Conti July 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-17T00:00:00Z
date_published 2020-07-08T00:00:00Z
source MITRE
title TAU Threat Discovery: Conti Ransomware

CarbonBlack LockerGoga 2019

CarbonBlack Threat Analysis Unit. (2019, March 22). TAU Threat Intelligence Notification – LockerGoga Ransomware. Retrieved April 16, 2019.

Internal MISP references

UUID 9970063c-6df7-4638-a247-6b1102289372 which can be used as unique global reference for CarbonBlack LockerGoga 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-16T00:00:00Z
date_published 2019-03-22T00:00:00Z
source MITRE
title TAU Threat Intelligence Notification – LockerGoga Ransomware

GitHub Turla Driver Loader

TDL Project. (2016, February 4). TDL (Turla Driver Loader). Retrieved April 22, 2021.

Internal MISP references

UUID ed3534be-06ce-487b-911d-abe2fba70210 which can be used as unique global reference for GitHub Turla Driver Loader in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-22T00:00:00Z
date_published 2016-02-04T00:00:00Z
source MITRE
title TDL (Turla Driver Loader)

S1 Old Rat New Tricks

Landry, J. (2016, April 21). Teaching an old RAT new tricks. Retrieved October 4, 2021.

Internal MISP references

UUID 20ef3645-fb92-4e13-a5a8-99367869bcba which can be used as unique global reference for S1 Old Rat New Tricks in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-04T00:00:00Z
date_published 2016-04-21T00:00:00Z
source MITRE
title Teaching an old RAT new tricks

Teams.exe - LOLBAS Project

LOLBAS. (2022, January 17). Teams.exe. Retrieved December 4, 2023.

Internal MISP references

UUID ceee2b13-331f-4019-9c27-af0ce8b25414 which can be used as unique global reference for Teams.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2022-01-17T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Teams.exe

TeamTNT Cloud Enumeration

Nathaniel Quist. (2021, June 4). TeamTNT Actively Enumerating Cloud Environments to Infiltrate Organizations. Retrieved February 8, 2022.

Internal MISP references

UUID a672b74f-1f04-4d3a-84a6-1dd50e1a9951 which can be used as unique global reference for TeamTNT Cloud Enumeration in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-08T00:00:00Z
date_published 2021-06-04T00:00:00Z
source MITRE
title TeamTNT Actively Enumerating Cloud Environments to Infiltrate Organizations

Intezer TeamTNT Explosion September 2021

Intezer. (2021, September 1). TeamTNT Cryptomining Explosion. Retrieved October 15, 2021.

Internal MISP references

UUID e0d6208b-a4d6-45f0-bb3a-6c8681630b55 which can be used as unique global reference for Intezer TeamTNT Explosion September 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-15T00:00:00Z
date_published 2021-09-01T00:00:00Z
source MITRE
title TeamTNT Cryptomining Explosion

AquaSec TeamTNT 2023

Ofek Itach and Assaf Morag. (2023, July 13). TeamTNT Reemerged with New Aggressive Cloud Campaign. Retrieved February 15, 2024.

Internal MISP references

UUID b98f1967-c62f-5afe-a2f7-4c426615d576 which can be used as unique global reference for AquaSec TeamTNT 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-15T00:00:00Z
date_published 2023-07-13T00:00:00Z
source MITRE
title TeamTNT Reemerged with New Aggressive Cloud Campaign

Talos TeamTNT

Darin Smith. (2022, April 21). TeamTNT targeting AWS, Alibaba. Retrieved July 8, 2022.

Internal MISP references

UUID acd1b4c5-da28-584e-b892-599180a8dbb0 which can be used as unique global reference for Talos TeamTNT in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-08T00:00:00Z
date_published 2022-04-21T00:00:00Z
source MITRE
title TeamTNT targeting AWS, Alibaba

Cisco Talos Intelligence Group

Darin Smith. (2022, April 21). TeamTNT targeting AWS, Alibaba. Retrieved August 4, 2022.

Internal MISP references

UUID f39b5f92-6e14-4c7f-b79d-7bade722e6d9 which can be used as unique global reference for Cisco Talos Intelligence Group in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-04T00:00:00Z
date_published 2022-04-21T00:00:00Z
source MITRE
title TeamTNT targeting AWS, Alibaba

Cado Security TeamTNT Worm August 2020

Cado Security. (2020, August 16). Team TNT – The First Crypto-Mining Worm to Steal AWS Credentials. Retrieved September 22, 2021.

Internal MISP references

UUID 8ccab4fe-155d-44b0-b0f2-941e9f8f87db which can be used as unique global reference for Cado Security TeamTNT Worm August 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-22T00:00:00Z
date_published 2020-08-16T00:00:00Z
source MITRE
title Team TNT – The First Crypto-Mining Worm to Steal AWS Credentials

ATT TeamTNT Chimaera September 2020

AT&T Alien Labs. (2021, September 8). TeamTNT with new campaign aka Chimaera. Retrieved September 22, 2021.

Internal MISP references

UUID 5d9f402f-4ff4-4993-8685-e5656e2f3aff which can be used as unique global reference for ATT TeamTNT Chimaera September 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-22T00:00:00Z
date_published 2021-09-08T00:00:00Z
source MITRE
title TeamTNT with new campaign aka Chimaera

OSX Coldroot RAT

Patrick Wardle. (2018, February 17). Tearing Apart the Undetected (OSX)Coldroot RAT. Retrieved August 8, 2019.

Internal MISP references

UUID 5ee3a92c-df33-4ecd-b21e-7b9a4f6de227 which can be used as unique global reference for OSX Coldroot RAT in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-08-08T00:00:00Z
date_published 2018-02-17T00:00:00Z
source MITRE
title Tearing Apart the Undetected (OSX)Coldroot RAT

Kaspersky ProjectSauron Technical Analysis

Kaspersky Lab's Global Research & Analysis Team. (2016, August 9). The ProjectSauron APT. Technical Analysis. Retrieved August 17, 2016.

Internal MISP references

UUID 1664726e-3a79-4d90-86e0-b2d50e9e0ba2 which can be used as unique global reference for Kaspersky ProjectSauron Technical Analysis in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-08-17T00:00:00Z
source MITRE
title Technical Analysis

McAfee Babuk February 2021

Mundo, A. et al. (2021, February). Technical Analysis of Babuk Ransomware. Retrieved August 11, 2021.

Internal MISP references

UUID bb23ca19-78bb-4406-90a4-bf82bd467e04 which can be used as unique global reference for McAfee Babuk February 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-11T00:00:00Z
date_published 2021-02-01T00:00:00Z
source MITRE
title Technical Analysis of Babuk Ransomware

Crytox Ransomware

Romain Dumont . (2022, September 21). Technical Analysis of Crytox Ransomware. Retrieved November 22, 2023.

Internal MISP references

UUID 7c22d9d0-a2d8-5936-a6b1-5c696a2a19c6 which can be used as unique global reference for Crytox Ransomware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-11-22T00:00:00Z
date_published 2022-09-21T00:00:00Z
source MITRE
title Technical Analysis of Crytox Ransomware

McAfee Cuba April 2021

Roccio, T., et al. (2021, April). Technical Analysis of Cuba Ransomware. Retrieved June 18, 2021.

Internal MISP references

UUID e0e86e08-64ec-48dc-91e6-24fde989cd77 which can be used as unique global reference for McAfee Cuba April 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-18T00:00:00Z
date_published 2021-04-01T00:00:00Z
source MITRE
title Technical Analysis of Cuba Ransomware

McAfee Dianxun March 2021

Roccia, T., Seret, T., Fokker, J. (2021, March 16). Technical Analysis of Operation Dianxun. Retrieved April 13, 2021.

Internal MISP references

UUID a40a69d7-7abc-4829-9905-98c156a809fe which can be used as unique global reference for McAfee Dianxun March 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-13T00:00:00Z
date_published 2021-03-16T00:00:00Z
source MITRE
title Technical Analysis of Operation Dianxun

Zscaler Pikabot 2023

Brett Stone-Gross & Nikolaos Pantazopoulos. (2023, May 24). Technical Analysis of Pikabot. Retrieved July 12, 2024.

Internal MISP references

UUID 7d3785e3-52db-54ec-ad54-32a2ecdb451f which can be used as unique global reference for Zscaler Pikabot 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-12T00:00:00Z
date_published 2023-05-24T00:00:00Z
source MITRE
title Technical Analysis of Pikabot

Zscaler Pikabot May 24 2023

Brett Stone-Gross, Nikolaos Pantazopoulos. (2023, May 24). Technical Analysis of Pikabot. Retrieved January 11, 2024.

Internal MISP references

UUID ec87676b-bc88-44b5-9e9a-5eb8eb39b4a1 which can be used as unique global reference for Zscaler Pikabot May 24 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-11T00:00:00Z
date_published 2023-05-24T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Technical Analysis of Pikabot

Technical Analysis of PureCrypter | Zscaler Blog

Zscaler. (2022, June 13). Technical Analysis of PureCrypter | Zscaler Blog. Retrieved May 10, 2023.

Internal MISP references

UUID 5e3fa76b-0ca3-4935-830a-6ca132fa2fb4 which can be used as unique global reference for Technical Analysis of PureCrypter | Zscaler Blog in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-10T00:00:00Z
date_published 2022-06-13T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Technical Analysis of PureCrypter

Zscaler Rhadamanthys February 21 2023

Nikolao Pantazopoulos, Sarthak Misraa. (2023, February 21). Technical Analysis of Rhadamanthys Obfuscation Techniques. Retrieved October 14, 2024.

Internal MISP references

UUID a289704d-952d-4150-b9cc-5c53e4b0a41f which can be used as unique global reference for Zscaler Rhadamanthys February 21 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-14T00:00:00Z
date_published 2023-02-21T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Technical Analysis of Rhadamanthys Obfuscation Techniques

Crowdstrike WhisperGate January 2022

Crowdstrike. (2022, January 19). Technical Analysis of the WhisperGate Malicious Bootloader. Retrieved March 10, 2022.

Internal MISP references

UUID 846bccb4-b177-4c17-8cc5-56769c1d4b60 which can be used as unique global reference for Crowdstrike WhisperGate January 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-10T00:00:00Z
date_published 2022-01-19T00:00:00Z
source MITRE
title Technical Analysis of the WhisperGate Malicious Bootloader

Apple TN2459 Kernel Extensions

Apple. (2018, April 19). Technical Note TN2459: User-Approved Kernel Extension Loading. Retrieved June 30, 2020.

Internal MISP references

UUID 8cd7676a-bbef-4c31-8288-365837acf65d which can be used as unique global reference for Apple TN2459 Kernel Extensions in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-30T00:00:00Z
date_published 2018-04-19T00:00:00Z
source MITRE
title Technical Note TN2459: User-Approved Kernel Extension Loading

fb_arid_viper

Flossman, M., Scott, M. (2021, April). Technical Paper // Taking Action Against Arid Viper. Retrieved March 4, 2024.

Internal MISP references

UUID 1dca5e73-0b6e-51cd-867c-927d081f228d which can be used as unique global reference for fb_arid_viper in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-04T00:00:00Z
date_published 2021-04-01T00:00:00Z
source MITRE
title Technical Paper // Taking Action Against Arid Viper

GovCERT Carbon May 2016

GovCERT. (2016, May 23). Technical Report about the Espionage Case at RUAG. Retrieved November 7, 2018.

Internal MISP references

UUID 2e4a445f-b55c-4800-9d75-9d8fe20abc74 which can be used as unique global reference for GovCERT Carbon May 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-07T00:00:00Z
date_published 2016-05-23T00:00:00Z
source MITRE
title Technical Report about the Espionage Case at RUAG

Palo Alto Office Test Sofacy

Falcone, R. (2016, July 20). Technical Walkthrough: Office Test Persistence Method Used In Recent Sofacy Attacks. Retrieved July 3, 2017.

Internal MISP references

UUID 3138f32c-f89c-439c-a8c5-2964c356308d which can be used as unique global reference for Palo Alto Office Test Sofacy in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-03T00:00:00Z
date_published 2016-07-20T00:00:00Z
source MITRE
title Technical Walkthrough: Office Test Persistence Method Used In Recent Sofacy Attacks

polymorphic-linkedin

Sherwin Akshay. (2024, May 28). Techniques for concealing malware and hindering analysis: Packing up and unpacking stuff. Retrieved September 27, 2024.

Internal MISP references

UUID a2d50199-6ff4-504b-8f26-9cca4c0eb46f which can be used as unique global reference for polymorphic-linkedin in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-27T00:00:00Z
date_published 2024-05-28T00:00:00Z
source MITRE
title Techniques for concealing malware and hindering analysis: Packing up and unpacking stuff

te.exe - LOLBAS Project

LOLBAS. (2018, May 25). te.exe. Retrieved December 4, 2023.

Internal MISP references

UUID e7329381-319e-4dcc-8187-92882e6f2e12 which can be used as unique global reference for te.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title te.exe

ESET Telebots June 2017

Cherepanov, A.. (2017, June 30). TeleBots are back: Supply chain attacks against Ukraine. Retrieved June 11, 2020.

Internal MISP references

UUID eb5c2951-b149-4e40-bc5f-b2630213eb8b which can be used as unique global reference for ESET Telebots June 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-11T00:00:00Z
date_published 2017-06-30T00:00:00Z
source MITRE
title TeleBots are back: Supply chain attacks against Ukraine

SANS Brian Wiltse Template Injection

Wiltse, B.. (2018, November 7). Template Injection Attacks - Bypassing Security Controls by Living off the Land. Retrieved April 10, 2019.

Internal MISP references

UUID 8c010c87-865b-4168-87a7-4a24db413def which can be used as unique global reference for SANS Brian Wiltse Template Injection in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-10T00:00:00Z
date_published 2018-11-07T00:00:00Z
source MITRE
title Template Injection Attacks - Bypassing Security Controls by Living off the Land

Amazon AWS Temporary Security Credentials

Amazon. (n.d.). Temporary Security Credentials. Retrieved October 18, 2019.

Internal MISP references

UUID d3740d23-1561-47c4-a6e5-df1b6277839e which can be used as unique global reference for Amazon AWS Temporary Security Credentials in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-18T00:00:00Z
source MITRE
title Temporary Security Credentials

Elastic Process Injection July 2017

Hosseini, A. (2017, July 18). Ten Process Injection Techniques: A Technical Survey Of Common And Trending Process Injection Techniques. Retrieved December 7, 2017.

Internal MISP references

UUID 02c9100d-27eb-4f2f-b302-adf890055546 which can be used as unique global reference for Elastic Process Injection July 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-07T00:00:00Z
date_published 2017-07-18T00:00:00Z
source MITRE
title Ten Process Injection Techniques: A Technical Survey Of Common And Trending Process Injection Techniques

AWS Organizations

AWS. (n.d.). Terminology and concepts for AWS Organizations. Retrieved September 25, 2024.

Internal MISP references

UUID 06d4ce21-ef87-5977-80df-10bd36ae722e which can be used as unique global reference for AWS Organizations in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-25T00:00:00Z
source MITRE
title Terminology and concepts for AWS Organizations

TestWindowRemoteAgent.exe - LOLBAS Project

LOLBAS. (2023, August 21). TestWindowRemoteAgent.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 0cc891bc-692c-4a52-9985-39ddb434294d which can be used as unique global reference for TestWindowRemoteAgent.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2023-08-21T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title TestWindowRemoteAgent.exe

Sygnia Elephant Beetle Jan 2022

Sygnia Incident Response Team. (2022, January 5). TG2003: ELEPHANT BEETLE UNCOVERING AN ORGANIZED FINANCIAL-THEFT OPERATION. Retrieved February 9, 2023.

Internal MISP references

UUID 932897a6-0fa4-5be3-bf0b-20d6ddad238e which can be used as unique global reference for Sygnia Elephant Beetle Jan 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-09T00:00:00Z
date_published 2022-01-05T00:00:00Z
source MITRE
title TG2003: ELEPHANT BEETLE UNCOVERING AN ORGANIZED FINANCIAL-THEFT OPERATION

Cloudflare February 5 2024

Matthew Prince. (2024, February 1). Thanksgiving 2023 security incident. Retrieved February 5, 2024.

Internal MISP references

UUID 0d183112-77d9-472f-8b0e-5724e1bb4706 which can be used as unique global reference for Cloudflare February 5 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-05T00:00:00Z
date_published 2024-02-01T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Thanksgiving 2023 security incident

Domain_Steal_CC

Krebs, B. (2018, November 13). That Domain You Forgot to Renew? Yeah, it’s Now Stealing Credit Cards. Retrieved September 20, 2019.

Internal MISP references

UUID 30ab5d35-db9b-401f-89cb-73f2c7fea060 which can be used as unique global reference for Domain_Steal_CC in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-20T00:00:00Z
date_published 2018-11-13T00:00:00Z
source MITRE
title That Domain You Forgot to Renew? Yeah, it’s Now Stealing Credit Cards

Kali Hydra

Kali. (2014, February 18). THC-Hydra. Retrieved November 2, 2017.

Internal MISP references

UUID d8c93272-00f8-4dc4-b4cd-03246fc0fc23 which can be used as unique global reference for Kali Hydra in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-02T00:00:00Z
date_published 2014-02-18T00:00:00Z
source MITRE
title THC-Hydra

Adventures of a Keystroke

Tinaztepe, E. (n.d.). The Adventures of a Keystroke: An in-depth look into keyloggers on Windows. Retrieved April 27, 2016.

Internal MISP references

UUID f29ed400-2986-4b2c-9b8a-7dde37562d22 which can be used as unique global reference for Adventures of a Keystroke in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-27T00:00:00Z
source MITRE
title The Adventures of a Keystroke: An in-depth look into keyloggers on Windows

ThreatConnect Anthem

ThreatConnect Research Team. (2015, February 27). The Anthem Hack: All Roads Lead to China. Retrieved January 26, 2016.

Internal MISP references

UUID 61ecd0b4-6cac-4d9f-8e8c-3d488fef6fec which can be used as unique global reference for ThreatConnect Anthem in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-26T00:00:00Z
date_published 2015-02-27T00:00:00Z
source MITRE, Tidal Cyber
title The Anthem Hack: All Roads Lead to China

Talos Cobalt Strike September 2020

Mavis, N. (2020, September 21). The Art and Science of Detecting Cobalt Strike. Retrieved September 12, 2024.

Internal MISP references

UUID 60a5ee63-3d98-466a-8037-4a1edfcdef8c which can be used as unique global reference for Talos Cobalt Strike September 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2020-09-21T00:00:00Z
source MITRE
title The Art and Science of Detecting Cobalt Strike

wardle chp2 persistence

Patrick Wardle. (2022, January 1). The Art of Mac Malware Volume 0x1:Analysis. Retrieved April 19, 2022.

Internal MISP references

UUID 3684bacb-24cb-4467-b463-d0d3f5075c5c which can be used as unique global reference for wardle chp2 persistence in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-19T00:00:00Z
date_published 2022-01-01T00:00:00Z
source MITRE
title The Art of Mac Malware Volume 0x1:Analysis

wardle artofmalware volume1

Patrick Wardle. (2020, August 5). The Art of Mac Malware Volume 0x1: Analysis. Retrieved March 19, 2021.

Internal MISP references

UUID 53d0279e-4f30-4bbe-a9c7-90e36cd81570 which can be used as unique global reference for wardle artofmalware volume1 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-19T00:00:00Z
date_published 2020-08-05T00:00:00Z
source MITRE
title The Art of Mac Malware Volume 0x1: Analysis

ArtOfMemoryForensics

Ligh, M.H. et al.. (2014, July). The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory. Retrieved December 20, 2017.

Internal MISP references

UUID 054404b7-48a6-4578-9828-9f1e8e21d2df which can be used as unique global reference for ArtOfMemoryForensics in MISP communities and other software using the MISP galaxy

Associated metadata
Metadata key Value
date_accessed 2017-12-20T00:00:00Z
date_published 2014-07-01T00:00:00Z
source MITRE
title The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory

STIG Audit Kernel Modules

Unified Compliance Framework. (2016, December 20). The audit system must be configured to audit the loading and unloading of dynamic kernel modules.. Retrieved September 28, 2021.

Internal MISP references

UUID 44c10623-557f-445d-8b88-6006af13c54d which can be used as unique global reference for STIG Audit Kernel Modules in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-28T00:00:00Z
date_published 2016-12-20T00:00:00Z
source MITRE
title The audit system must be configured to audit the loading and unloading of dynamic kernel modules.

Medium Metamorfo Apr 2020

Erlich, C. (2020, April 3). The Avast Abuser: Metamorfo Banking Malware Hides By Abusing Avast Executable. Retrieved May 26, 2020.

Internal MISP references

UUID 356defac-b976-41c1-aac8-5d6ff0c80e28 which can be used as unique global reference for Medium Metamorfo Apr 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-26T00:00:00Z
date_published 2020-04-03T00:00:00Z
source MITRE
title The Avast Abuser: Metamorfo Banking Malware Hides By Abusing Avast Executable

Gigamon Berserk Bear October 2021

Slowik, J. (2021, October). THE BAFFLING BERSERK BEAR: A DECADE’S ACTIVITY TARGETING CRITICAL INFRASTRUCTURE. Retrieved December 6, 2021.

Internal MISP references

UUID 06b6cbe3-8e35-4594-b36f-76b503c11520 which can be used as unique global reference for Gigamon Berserk Bear October 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-12-06T00:00:00Z
date_published 2021-10-01T00:00:00Z
source MITRE
title THE BAFFLING BERSERK BEAR: A DECADE’S ACTIVITY TARGETING CRITICAL INFRASTRUCTURE

Kaspersky Emotet Jan 2019

Shulmin, A. . (2015, April 9). The Banking Trojan Emotet: Detailed Analysis. Retrieved March 25, 2019.

Internal MISP references

UUID 4824dfdf-8dbb-4b98-afcc-4a703c31fbda which can be used as unique global reference for Kaspersky Emotet Jan 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-25T00:00:00Z
date_published 2015-04-09T00:00:00Z
source MITRE
title The Banking Trojan Emotet: Detailed Analysis

Symantec Black Vine

DiMaggio, J.. (2015, August 6). The Black Vine cyberespionage group. Retrieved January 26, 2016.

Internal MISP references

UUID 0b7745ce-04c0-41d9-a440-df9084a45d09 which can be used as unique global reference for Symantec Black Vine in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-26T00:00:00Z
date_published 2015-08-06T00:00:00Z
source MITRE, Tidal Cyber
title The Black Vine cyberespionage group

Group IB GrimAgent July 2021

Priego, A. (2021, July). THE BROTHERS GRIM: THE REVERSING TALE OF GRIMAGENT MALWARE USED BY RYUK. Retrieved September 19, 2024.

Internal MISP references

UUID 6b0dd676-3ea5-4b56-a27b-b1685787de02 which can be used as unique global reference for Group IB GrimAgent July 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-19T00:00:00Z
date_published 2021-07-01T00:00:00Z
source MITRE
title THE BROTHERS GRIM: THE REVERSING TALE OF GRIMAGENT MALWARE USED BY RYUK

RSA Carbanak November 2017

RSA. (2017, November 21). THE CARBANAK/FIN7 SYNDICATE A HISTORICAL OVERVIEW OF AN EVOLVING THREAT. Retrieved July 29, 2020.

Internal MISP references

UUID eb947d49-26f4-4104-8296-1552a273c9c3 which can be used as unique global reference for RSA Carbanak November 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-07-29T00:00:00Z
date_published 2017-11-21T00:00:00Z
source MITRE
title THE CARBANAK/FIN7 SYNDICATE A HISTORICAL OVERVIEW OF AN EVOLVING THREAT

Picus Emotet Dec 2018

Özarslan, S. (2018, December 21). The Christmas Card you never wanted - A new wave of Emotet is back to wreak havoc. Retrieved March 25, 2019.

Internal MISP references

UUID d7594fb4-e544-491b-a406-228a5c7884a9 which can be used as unique global reference for Picus Emotet Dec 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-25T00:00:00Z
date_published 2018-12-21T00:00:00Z
source MITRE
title The Christmas Card you never wanted - A new wave of Emotet is back to wreak havoc

Medium Ali Salem Bumblebee April 2022

Salem, A. (2022, April 27). The chronicles of Bumblebee: The Hook, the Bee, and the Trickbot connection. Retrieved September 2, 2022.

Internal MISP references

UUID 5f6752a7-50a9-4202-b69b-c5f9d24b86de which can be used as unique global reference for Medium Ali Salem Bumblebee April 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-02T00:00:00Z
date_published 2022-04-27T00:00:00Z
source MITRE
title The chronicles of Bumblebee: The Hook, the Bee, and the Trickbot connection

Avira XWorm April 2023

Gurumoorthi Ramanathan. (2023, April 25). The Claws of Evilcode Gauntlet – XWorm RAT  . Retrieved May 10, 2023.

Internal MISP references

UUID 564931cf-a3e1-488f-bc90-be37c448f3b3 which can be used as unique global reference for Avira XWorm April 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-10T00:00:00Z
date_published 2023-04-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title The Claws of Evilcode Gauntlet – XWorm RAT

MSDN COM Elevation

Microsoft. (n.d.). The COM Elevation Moniker. Retrieved July 26, 2016.

Internal MISP references

UUID 898df7c7-4f19-40cb-a216-7b0f6c6155b3 which can be used as unique global reference for MSDN COM Elevation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-07-26T00:00:00Z
source MITRE
title The COM Elevation Moniker

Microsoft Component Object Model

Microsoft. (n.d.). The Component Object Model. Retrieved August 18, 2016.

Internal MISP references

UUID e1bb3872-7748-4e64-818f-6187a20d59f0 which can be used as unique global reference for Microsoft Component Object Model in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-08-18T00:00:00Z
source MITRE
title The Component Object Model

SANS Conficker

Burton, K. (n.d.). The Conficker Worm. Retrieved February 18, 2021.

Internal MISP references

UUID 2dca2274-5f25-475a-b87d-97f3e3a525de which can be used as unique global reference for SANS Conficker in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-18T00:00:00Z
source MITRE
title The Conficker Worm

Trellix Darkgate 2023

Ernesto Fernández Provecho, Pham Duy Phuc, Ciana Driscoll & Vinoo Thomas. (2023, November 21). The Continued Evolution of the DarkGate Malware-as-a-Service. Retrieved February 9, 2024.

Internal MISP references

UUID 83fb92d8-1245-5d68-b9f2-0915c10401c6 which can be used as unique global reference for Trellix Darkgate 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-09T00:00:00Z
date_published 2023-11-21T00:00:00Z
source MITRE
title The Continued Evolution of the DarkGate Malware-as-a-Service

Symantec DDoS October 2014

Wueest, C.. (2014, October 21). The continued rise of DDoS attacks. Retrieved April 24, 2019.

Internal MISP references

UUID 878e0382-4191-4bca-8adc-c379b0d57ba8 which can be used as unique global reference for Symantec DDoS October 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-24T00:00:00Z
date_published 2014-10-21T00:00:00Z
source MITRE
title The continued rise of DDoS attacks

BlackBerry CostaRicto November 2020

The BlackBerry Research and Intelligence Team. (2020, November 12). The CostaRicto Campaign: Cyber-Espionage Outsourced. Retrieved May 24, 2021.

Internal MISP references

UUID 93a23447-641c-4ee2-9fbd-64b2adea8a5f which can be used as unique global reference for BlackBerry CostaRicto November 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-05-24T00:00:00Z
date_published 2020-11-12T00:00:00Z
source MITRE
title The CostaRicto Campaign: Cyber-Espionage Outsourced

SpyCloud Phemedrone September 6 2024

James. (2024, September 6). The Curious Case of an Open Source Stealer: Phemedrone. Retrieved October 10, 2024.

Internal MISP references

UUID f6612b6c-6bed-474f-9ff3-ae3024d099c2 which can be used as unique global reference for SpyCloud Phemedrone September 6 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-10T00:00:00Z
date_published 2024-09-06T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title The Curious Case of an Open Source Stealer: Phemedrone

Www.invictus-ir.com 1 31 2024

Www.invictus-ir.com. (2024, January 31). The curious case of DangerDev@protonmail.me. Retrieved April 17, 2024.

Internal MISP references

UUID 803a084a-0468-4c43-9843-a0b5652acdba which can be used as unique global reference for Www.invictus-ir.com 1 31 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-17T00:00:00Z
date_published 2024-01-31T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title The curious case of DangerDev@protonmail.me

Invictus IR DangerDev 2024

Invictus Incident Response. (2024, January 31). The curious case of DangerDev@protonmail.me. Retrieved March 19, 2024.

Internal MISP references

UUID 90d608b9-ddbf-5476-bce1-85e8466aca47 which can be used as unique global reference for Invictus IR DangerDev 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-19T00:00:00Z
date_published 2024-01-31T00:00:00Z
source MITRE
title The curious case of DangerDev@protonmail.me

SecureWorks Mia Ash July 2017

Counter Threat Unit Research Team. (2017, July 27). The Curious Case of Mia Ash: Fake Persona Lures Middle Eastern Targets. Retrieved February 26, 2018.

Internal MISP references

UUID 754c9276-ef05-4d05-956f-75866090aa78 which can be used as unique global reference for SecureWorks Mia Ash July 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-26T00:00:00Z
date_published 2017-07-27T00:00:00Z
source MITRE
title The Curious Case of Mia Ash: Fake Persona Lures Middle Eastern Targets

Trustwave IIS Module 2013

Grunzweig, J. (2013, December 9). The Curious Case of the Malicious IIS Module. Retrieved June 3, 2021.

Internal MISP references

UUID cbb79c3c-1e2c-42ac-8183-9566ccde0cd6 which can be used as unique global reference for Trustwave IIS Module 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-03T00:00:00Z
date_published 2013-12-09T00:00:00Z
source MITRE
title The Curious Case of the Malicious IIS Module

CloudSploit - Unused AWS Regions

CloudSploit. (2019, June 8). The Danger of Unused AWS Regions. Retrieved October 8, 2019.

Internal MISP references

UUID 7c237b73-233f-4fe3-b4a6-ce523fd82853 which can be used as unique global reference for CloudSploit - Unused AWS Regions in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-08T00:00:00Z
date_published 2019-06-08T00:00:00Z
source MITRE
title The Danger of Unused AWS Regions

Dormann Dangers of VHD 2019

Dormann, W. (2019, September 4). The Dangers of VHD and VHDX Files. Retrieved March 16, 2021.

Internal MISP references

UUID e58b4e78-d858-4b28-8d06-2fb467b26337 which can be used as unique global reference for Dormann Dangers of VHD 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-16T00:00:00Z
date_published 2019-09-04T00:00:00Z
source MITRE
title The Dangers of VHD and VHDX Files

Kaspersky Darkhotel

Kaspersky Lab's Global Research and Analysis Team. (2014, November). The Darkhotel APT A Story of Unusual Hospitality. Retrieved November 12, 2014.

Internal MISP references

UUID 3247c03a-a57c-4945-9b85-72a70719e1cd which can be used as unique global reference for Kaspersky Darkhotel in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-12T00:00:00Z
date_published 2014-11-01T00:00:00Z
source MITRE, Tidal Cyber
title The Darkhotel APT A Story of Unusual Hospitality

ESET ForSSHe December 2018

Dumont, R., M.Léveillé, M., Porcher, H. (2018, December 1). THE DARK SIDE OF THE FORSSHE A landscape of OpenSSH backdoors. Retrieved July 16, 2020.

Internal MISP references

UUID 0e25bf8b-3c9e-4661-a9fd-79b2ad3b8dd2 which can be used as unique global reference for ESET ForSSHe December 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-07-16T00:00:00Z
date_published 2018-12-01T00:00:00Z
source MITRE
title THE DARK SIDE OF THE FORSSHE A landscape of OpenSSH backdoors

Zscaler 2 12 2024

Nikolaos Pantazopoulos. (2024, February 12). The (D)Evolution of Pikabot. Retrieved March 12, 2024.

Internal MISP references

UUID 17ebabfb-6399-4b5f-8274-b34045e2d51a which can be used as unique global reference for Zscaler 2 12 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-12T00:00:00Z
date_published 2024-02-12T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title The (D)Evolution of Pikabot

Zscaler Pikabot 2024

Nikolaos Pantazopoulos. (2024, February 12). The (D)Evolution of Pikabot. Retrieved July 17, 2024.

Internal MISP references

UUID 9c1edd25-0fd0-5b5d-8091-68074da52593 which can be used as unique global reference for Zscaler Pikabot 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-17T00:00:00Z
date_published 2024-02-12T00:00:00Z
source MITRE
title The (D)Evolution of Pikabot

Binary Reverse Engineering Blog 9 6 2023

Binary Reverse Engineering Blog. (2023, September 6). The DGA of BumbleBee. Retrieved February 19, 2024.

Internal MISP references

UUID 8cc9f506-65ce-4adb-aa79-c6cea1efb99b which can be used as unique global reference for Binary Reverse Engineering Blog 9 6 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-19T00:00:00Z
date_published 2023-09-06T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title The DGA of BumbleBee

Securelist Dropping Elephant

Kaspersky Lab's Global Research & Analysis Team. (2016, July 8). The Dropping Elephant – aggressive cyber-espionage in the Asian region. Retrieved August 3, 2016.

Internal MISP references

UUID 2efa655f-ebd3-459b-9fd7-712d3f4ba1f8 which can be used as unique global reference for Securelist Dropping Elephant in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-08-03T00:00:00Z
date_published 2016-07-08T00:00:00Z
source MITRE
title The Dropping Elephant – aggressive cyber-espionage in the Asian region

F-Secure The Dukes

F-Secure Labs. (2015, September 17). The Dukes: 7 years of Russian cyberespionage. Retrieved December 10, 2015.

Internal MISP references

UUID cc0dc623-ceb5-4ac6-bfbb-4f8514d45a27 which can be used as unique global reference for F-Secure The Dukes in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-12-10T00:00:00Z
date_published 2015-09-17T00:00:00Z
source MITRE
title The Dukes: 7 years of Russian cyberespionage

Kaspersky Duqu 2.0

Kaspersky Lab. (2015, June 11). The Duqu 2.0. Retrieved April 21, 2017.

Internal MISP references

UUID b4d6db03-1587-4af3-87ff-51542ef7c87b which can be used as unique global reference for Kaspersky Duqu 2.0 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-04-21T00:00:00Z
date_published 2015-06-11T00:00:00Z
source MITRE
title The Duqu 2.0

Symantec Elderwood Sept 2012

O'Gorman, G., and McDonald, G.. (2012, September 6). The Elderwood Project. Retrieved February 15, 2018.

Internal MISP references

UUID 5e908748-d260-42f1-a599-ac38b4e22559 which can be used as unique global reference for Symantec Elderwood Sept 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-15T00:00:00Z
date_published 2012-09-06T00:00:00Z
source MITRE
title The Elderwood Project

Kaspersky Turla Aug 2014

Kaspersky Lab's Global Research & Analysis Team. (2014, August 06). The Epic Turla Operation: Solving some of the mysteries of Snake/Uroboros. Retrieved November 7, 2018.

Internal MISP references

UUID 52577f34-0aa6-4765-9f6b-dd7397183223 which can be used as unique global reference for Kaspersky Turla Aug 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-07T00:00:00Z
date_published 2014-08-06T00:00:00Z
source MITRE
title The Epic Turla Operation: Solving some of the mysteries of Snake/Uroboros

Kaspersky Turla

Kaspersky Lab's Global Research and Analysis Team. (2014, August 7). The Epic Turla Operation: Solving some of the mysteries of Snake/Uroburos. Retrieved December 11, 2014.

Internal MISP references

UUID 535e9f1a-f89e-4766-a290-c5b8100968f8 which can be used as unique global reference for Kaspersky Turla in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-12-11T00:00:00Z
date_published 2014-08-07T00:00:00Z
source MITRE, Tidal Cyber
title The Epic Turla Operation: Solving some of the mysteries of Snake/Uroburos

FireEye EPS Awakens Part 2

Winters, R. (2015, December 20). The EPS Awakens - Part 2. Retrieved January 22, 2016.

Internal MISP references

UUID 7fd58ef5-a0b7-40b6-8771-ca5e87740965 which can be used as unique global reference for FireEye EPS Awakens Part 2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-22T00:00:00Z
date_published 2015-12-20T00:00:00Z
source MITRE, Tidal Cyber
title The EPS Awakens - Part 2

Symantec Emotet Jul 2018

Symantec. (2018, July 18). The Evolution of Emotet: From Banking Trojan to Threat Distributor. Retrieved March 25, 2019.

Internal MISP references

UUID b94b5be4-1c77-48e1-875e-0cff0023fbd9 which can be used as unique global reference for Symantec Emotet Jul 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-25T00:00:00Z
date_published 2018-07-18T00:00:00Z
source MITRE
title The Evolution of Emotet: From Banking Trojan to Threat Distributor

SilentBreak Offensive PS Dec 2015

Christensen, L.. (2015, December 28). The Evolution of Offensive PowerShell Invocation. Retrieved December 8, 2018.

Internal MISP references

UUID 8eec1af3-c65e-4522-8087-73122ac6c281 which can be used as unique global reference for SilentBreak Offensive PS Dec 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-12-08T00:00:00Z
date_published 2015-12-28T00:00:00Z
source MITRE
title The Evolution of Offensive PowerShell Invocation

CrowdStrike Evolution of Pinchy Spider July 2021

Meyers, Adam. (2021, July 6). The Evolution of PINCHY SPIDER from GandCrab to REvil. Retrieved March 28, 2023.

Internal MISP references

UUID 7578541b-1ae3-58d0-a8b9-120bd6cd96f5 which can be used as unique global reference for CrowdStrike Evolution of Pinchy Spider July 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-28T00:00:00Z
date_published 2021-07-06T00:00:00Z
source MITRE
title The Evolution of PINCHY SPIDER from GandCrab to REvil

VMware Chromeloader September 19 2022

Abe Schneider, Bethany Hardin, Lavine Oluoch . (2022, September 19). The Evolution of the Chromeloader Malware. Retrieved September 26, 2024.

Internal MISP references

UUID 5c2985f1-2d80-488b-ab63-fbd56aba229b which can be used as unique global reference for VMware Chromeloader September 19 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-26T00:00:00Z
date_published 2022-09-19T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title The Evolution of the Chromeloader Malware

ATT Felismus

Julia Kisielius. (2017, April 25). The Felismus RAT: Powerful Threat, Mysterious Purpose. Retrieved January 10, 2024.

Internal MISP references

UUID 5c74fdea-e5d5-5a77-a945-4819184e571f which can be used as unique global reference for ATT Felismus in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-10T00:00:00Z
date_published 2017-04-25T00:00:00Z
source MITRE
title The Felismus RAT: Powerful Threat, Mysterious Purpose

Proofpoint Ransomware Initial Access June 2021

Selena Larson, Daniel Blackford, Garrett G. (2021, June 16). The First Step: Initial Access Leads to Ransomware. Retrieved January 24, 2024.

Internal MISP references

UUID 3b0631ae-f589-4b7c-a00a-04dcd5f3a77b which can be used as unique global reference for Proofpoint Ransomware Initial Access June 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-24T00:00:00Z
date_published 2021-06-16T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title The First Step: Initial Access Leads to Ransomware

Kaspersky Flame

Gostev, A. (2012, May 28). The Flame: Questions and Answers. Retrieved March 1, 2017.

Internal MISP references

UUID 6db8f76d-fe38-43b1-ad85-ad372da9c09d which can be used as unique global reference for Kaspersky Flame in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-01T00:00:00Z
date_published 2012-05-28T00:00:00Z
source MITRE
title The Flame: Questions and Answers

Unit 42 CARROTBAT November 2018

Grunzweig, J. and Wilhoit, K. (2018, November 29). The Fractured Block Campaign: CARROTBAT Used to Deliver Malware Targeting Southeast Asia. Retrieved June 2, 2020.

Internal MISP references

UUID 6986a64a-5fe6-4697-b70b-79cccaf3d730 which can be used as unique global reference for Unit 42 CARROTBAT November 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-02T00:00:00Z
date_published 2018-11-29T00:00:00Z
source MITRE
title The Fractured Block Campaign: CARROTBAT Used to Deliver Malware Targeting Southeast Asia

Palo Alto Gamaredon Feb 2017

Kasza, A. and Reichel, D. (2017, February 27). The Gamaredon Group Toolset Evolution. Retrieved March 1, 2017.

Internal MISP references

UUID 3f9a6343-1db3-4696-99ed-f22c6eabee71 which can be used as unique global reference for Palo Alto Gamaredon Feb 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-01T00:00:00Z
date_published 2017-02-27T00:00:00Z
source MITRE, Tidal Cyber
title The Gamaredon Group Toolset Evolution

Chexmarx-seo

Yehuda Gelb. (2023, November 30). The GitHub Black Market: Gaming the Star Ranking Game. Retrieved June 18, 2024.

Internal MISP references

UUID 47222894-95fe-55e1-a6b9-0f1578c4ee65 which can be used as unique global reference for Chexmarx-seo in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-18T00:00:00Z
date_published 2023-11-30T00:00:00Z
source MITRE
title The GitHub Black Market: Gaming the Star Ranking Game

GNU Acct

GNU. (2010, February 5). The GNU Accounting Utilities. Retrieved December 20, 2017.

Internal MISP references

UUID ef3edd44-b8d1-4d7d-a0d8-0e75aa441eac which can be used as unique global reference for GNU Acct in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-20T00:00:00Z
date_published 2010-02-05T00:00:00Z
source MITRE
title The GNU Accounting Utilities

GLIBC

glibc developer community. (2020, February 1). The GNU C Library (glibc). Retrieved June 25, 2020.

Internal MISP references

UUID 75a6a1bf-a5a7-419d-b290-6662aeddb7eb which can be used as unique global reference for GLIBC in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-25T00:00:00Z
date_published 2020-02-01T00:00:00Z
source MITRE
title The GNU C Library (glibc)

Trustwave GoldenSpy June 2020

Trustwave SpiderLabs. (2020, June 25). The Golden Tax Department and Emergence of GoldenSpy Malware. Retrieved July 23, 2020.

Internal MISP references

UUID 2a27a2ea-2815-4d97-88c0-47a6e04e84f8 which can be used as unique global reference for Trustwave GoldenSpy June 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-07-23T00:00:00Z
date_published 2020-06-25T00:00:00Z
source MITRE
title The Golden Tax Department and Emergence of GoldenSpy Malware

Proofpoint TA416 Europe March 2022

Raggi, M. et al. (2022, March 7). The Good, the Bad, and the Web Bug: TA416 Increases Operational Tempo Against European Governments as Conflict in Ukraine Escalates. Retrieved March 16, 2022.

Internal MISP references

UUID 5731d7e4-dd19-4d08-b493-7b1a467599d3 which can be used as unique global reference for Proofpoint TA416 Europe March 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-16T00:00:00Z
date_published 2022-03-07T00:00:00Z
source MITRE
title The Good, the Bad, and the Web Bug: TA416 Increases Operational Tempo Against European Governments as Conflict in Ukraine Escalates

Red Canary Gootloader April 2023

Tony Lambert, Lauren Podber. (2023, April 28). The Goot cause: Detecting Gootloader and its follow-on activity. Retrieved May 7, 2023.

Internal MISP references

UUID 658e3a1a-2f68-4e84-8dab-43e48766703e which can be used as unique global reference for Red Canary Gootloader April 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2023-04-28T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title The Goot cause: Detecting Gootloader and its follow-on activity

Unit 42 Gorgon Group Aug 2018

Falcone, R., et al. (2018, August 02). The Gorgon Group: Slithering Between Nation State and Cybercrime. Retrieved August 7, 2018.

Internal MISP references

UUID d0605185-3f8d-4846-a718-15572714e15b which can be used as unique global reference for Unit 42 Gorgon Group Aug 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-07T00:00:00Z
date_published 2018-08-02T00:00:00Z
source MITRE, Tidal Cyber
title The Gorgon Group: Slithering Between Nation State and Cybercrime

SecureWorks Infostealers 2023

SecureWorks Counter Threat Unit Research Team. (2023, May 16). The Growing Threat from Infostealers. Retrieved October 10, 2024.

Internal MISP references

UUID 03b6e028-96b1-5d04-abf6-f0d190f44df4 which can be used as unique global reference for SecureWorks Infostealers 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-10T00:00:00Z
date_published 2023-05-16T00:00:00Z
source MITRE
title The Growing Threat from Infostealers

Trend Micro HeartBeat Campaign January 2013

Roland Dela Paz. (2003, January 3). The HeartBeat APT Campaign. Retrieved October 17, 2021.

Internal MISP references

UUID f42a36c2-1ca5-49ff-a7ec-7de90379a6d5 which can be used as unique global reference for Trend Micro HeartBeat Campaign January 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-17T00:00:00Z
date_published 2003-01-03T00:00:00Z
source MITRE
title The HeartBeat APT Campaign

FireEye Hikit Rootkit

Glyer, C., Kazanciyan, R. (2012, August 20). The “Hikit” Rootkit: Advanced and Persistent Attack Techniques (Part 1). Retrieved June 6, 2016.

Internal MISP references

UUID 65d751cb-fdd2-4a45-81db-8a5a11bbee62 which can be used as unique global reference for FireEye Hikit Rootkit in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-06T00:00:00Z
date_published 2012-08-20T00:00:00Z
source MITRE
title The “Hikit” Rootkit: Advanced and Persistent Attack Techniques (Part 1)

FireEye HIKIT Rootkit Part 2

Glyer, C., Kazanciyan, R. (2012, August 22). The “Hikit” Rootkit: Advanced and Persistent Attack Techniques (Part 2). Retrieved May 4, 2020.

Internal MISP references

UUID 48448972-a5ed-4371-b930-b51dcb174b82 which can be used as unique global reference for FireEye HIKIT Rootkit Part 2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-04T00:00:00Z
date_published 2012-08-22T00:00:00Z
source MITRE
title The “Hikit” Rootkit: Advanced and Persistent Attack Techniques (Part 2)

Proofpoint Human Factor

Proofpoint. (n.d.). The Human Factor 2023: Analyzing the cyber attack chain. Retrieved July 20, 2023.

Internal MISP references

UUID 143e191f-9175-557b-8fe1-41dbe04867a6 which can be used as unique global reference for Proofpoint Human Factor in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-20T00:00:00Z
source MITRE
title The Human Factor 2023: Analyzing the cyber attack chain

TechNet Blogs Credential Protection

Wilson, B. (2016, April 18). The Importance of KB2871997 and KB2928120 for Credential Protection. Retrieved April 11, 2018.

Internal MISP references

UUID 88367099-df19-4044-8c9b-2db4c9f418c4 which can be used as unique global reference for TechNet Blogs Credential Protection in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-11T00:00:00Z
date_published 2016-04-18T00:00:00Z
source MITRE
title The Importance of KB2871997 and KB2928120 for Credential Protection

dhs_threat_to_net_devices

U.S. Department of Homeland Security. (2016, August 30). The Increasing Threat to Network Infrastructure Devices and Recommended Mitigations. Retrieved July 29, 2022.

Internal MISP references

UUID f1d16045-d365-43d2-bc08-65ba1ddbe0fd which can be used as unique global reference for dhs_threat_to_net_devices in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-29T00:00:00Z
date_published 2016-08-30T00:00:00Z
source MITRE
title The Increasing Threat to Network Infrastructure Devices and Recommended Mitigations

Triton-EENews-2017

Blake Sobczak. (2019, March 7). The inside story of the world’s most dangerous malware. Retrieved March 25, 2024.

Internal MISP references

UUID 5cc54d85-ee53-579d-a8fb-9b54b3540dc0 which can be used as unique global reference for Triton-EENews-2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-25T00:00:00Z
date_published 2019-03-07T00:00:00Z
source MITRE
title The inside story of the world’s most dangerous malware

sentinelone_israel_hamas_war

Hegel, T., Milenkoski, A. (2023, October 24). The Israel-Hamas War | Cyber Domain State-Sponsored Activity of Interest. Retrieved March 4, 2024.

Internal MISP references

UUID 8fa21bad-0186-5181-b52e-32f7f116695c which can be used as unique global reference for sentinelone_israel_hamas_war in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-04T00:00:00Z
date_published 2023-10-24T00:00:00Z
source MITRE
title The Israel-Hamas War

Kerberos GNU/Linux

Adepts of 0xCC. (2021, January 28). The Kerberos Credential Thievery Compendium (GNU/Linux). Retrieved September 17, 2024.

Internal MISP references

UUID 84b9fd50-4bcf-5f0b-9712-27d6581b8c7a which can be used as unique global reference for Kerberos GNU/Linux in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-17T00:00:00Z
date_published 2021-01-28T00:00:00Z
source MITRE
title The Kerberos Credential Thievery Compendium (GNU/Linux)

PWC KeyBoys Feb 2017

Parys, B. (2017, February 11). The KeyBoys are back in town. Retrieved June 13, 2019.

Internal MISP references

UUID 9ac6737b-c8a2-416f-bbc3-8c5556ad4833 which can be used as unique global reference for PWC KeyBoys Feb 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-13T00:00:00Z
date_published 2017-02-11T00:00:00Z
source MITRE
title The KeyBoys are back in town

Securelist Kimsuky Sept 2013

Tarakanov , D.. (2013, September 11). The “Kimsuky” Operation: A North Korean APT?. Retrieved August 13, 2019.

Internal MISP references

UUID f26771b0-2101-4fed-ac82-1bd9683dd7da which can be used as unique global reference for Securelist Kimsuky Sept 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-08-13T00:00:00Z
date_published 2013-09-11T00:00:00Z
source MITRE
title The “Kimsuky” Operation: A North Korean APT?

ClearSky Kittens Back 2 Oct 2019

ClearSky Research Team. (2019, October 1). The Kittens Are Back in Town2 - Charming Kitten Campaign KeepsGoing on, Using New Impersonation Methods. Retrieved April 21, 2021.

Internal MISP references

UUID f5114978-2528-4199-a586-0158c5f8a138 which can be used as unique global reference for ClearSky Kittens Back 2 Oct 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-21T00:00:00Z
date_published 2019-10-01T00:00:00Z
source MITRE
title The Kittens Are Back in Town2 - Charming Kitten Campaign KeepsGoing on, Using New Impersonation Methods

ClearSky Kittens Back 3 August 2020

ClearSky Research Team. (2020, August 1). The Kittens Are Back in Town 3 - Charming Kitten Campaign Evolved and Deploying Spear-Phishing link by WhatsApp. Retrieved April 21, 2021.

Internal MISP references

UUID a10c6a53-79bb-4454-b444-cfb9136ecd36 which can be used as unique global reference for ClearSky Kittens Back 3 August 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-21T00:00:00Z
date_published 2020-08-01T00:00:00Z
source MITRE, Tidal Cyber
title The Kittens Are Back in Town 3 - Charming Kitten Campaign Evolved and Deploying Spear-Phishing link by WhatsApp

Kubernetes API

The Kubernetes Authors. (n.d.). The Kubernetes API. Retrieved March 29, 2021.

Internal MISP references

UUID 5bdd1b82-9e5c-4db0-9764-240e37a1cc99 which can be used as unique global reference for Kubernetes API in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-29T00:00:00Z
source MITRE
title The Kubernetes API

GitHub LaZange Dec 2018

Zanni, A. (n.d.). The LaZagne Project !!!. Retrieved December 14, 2018.

Internal MISP references

UUID 33cca4fa-72a8-59a3-a62f-12f71a499a15 which can be used as unique global reference for GitHub LaZange Dec 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-12-14T00:00:00Z
source MITRE
title The LaZagne Project !!!

GitHub LaZagne Dec 2018

Zanni, A. (n.d.). The LaZagne Project !!!. Retrieved December 14, 2018.

Internal MISP references

UUID 9347b507-3a41-405d-87f9-d4fc2bfc48e5 which can be used as unique global reference for GitHub LaZagne Dec 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-12-14T00:00:00Z
source MITRE
title The LaZagne Project !!!

Dell P2P ZeuS

SecureWorks. (2012). The Lifecycle of Peer-to-Peer (Gameover) ZeuS. Retrieved August 19, 2015.

Internal MISP references

UUID 773d1d91-a93c-4bb3-928b-4c3f82f2c889 which can be used as unique global reference for Dell P2P ZeuS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-08-19T00:00:00Z
date_published 2012-01-01T00:00:00Z
source MITRE
title The Lifecycle of Peer-to-Peer (Gameover) ZeuS

Cylera Kwampirs 2022

Pablo Rincón Crespo. (2022, January). The link between Kwampirs (Orangeworm) and Shamoon APTs. Retrieved February 8, 2024.

Internal MISP references

UUID 06442111-2c71-5efb-9530-cabeba159a91 which can be used as unique global reference for Cylera Kwampirs 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-08T00:00:00Z
date_published 2022-01-01T00:00:00Z
source MITRE
title The link between Kwampirs (Orangeworm) and Shamoon APTs

Linux Kernel API

Linux Kernel Organization, Inc. (n.d.). The Linux Kernel API. Retrieved June 25, 2020.

Internal MISP references

UUID 0a30d54e-187a-43e0-9725-3c80aa1c7619 which can be used as unique global reference for Linux Kernel API in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-25T00:00:00Z
source MITRE
title The Linux Kernel API

Linux Kernel Programming

Pomerantz, O., Salzman, P.. (2003, April 4). The Linux Kernel Module Programming Guide. Retrieved April 6, 2018.

Internal MISP references

UUID 70f31f19-e0b3-40b1-b8dd-6667557bb334 which can be used as unique global reference for Linux Kernel Programming in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-06T00:00:00Z
date_published 2003-04-04T00:00:00Z
source MITRE
title The Linux Kernel Module Programming Guide

The DFIR Report Dharma Ransomware June 2020

The DFIR Report. (2020, June 16). The Little Ransomware That Couldn’t (Dharma). Retrieved March 7, 2024.

Internal MISP references

UUID b1002e9a-020d-4224-bf60-0c2a66d511f2 which can be used as unique global reference for The DFIR Report Dharma Ransomware June 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-07T00:00:00Z
date_published 2020-06-16T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title The Little Ransomware That Couldn’t (Dharma)

Villeneuve 2011

Villeneuve, N., Sancho, D. (2011). THE “LURID” DOWNLOADER. Retrieved November 12, 2014.

Internal MISP references

UUID ed5a2ec0-8328-40db-9f58-7eaac4ad39a0 which can be used as unique global reference for Villeneuve 2011 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-12T00:00:00Z
date_published 2011-01-01T00:00:00Z
source MITRE
title THE “LURID” DOWNLOADER

Proofpoint August 29 2024

Tommy Madjar; Pim Trouerbach; Selena Larson; The Proofpoint Threat Research Team. (2024, August 29). The Malware That Must Not Be Named Suspected Espionage Campaign Delivers “Voldemort” . Retrieved August 29, 2024.

Internal MISP references

UUID 548f23b2-3ab6-4ea0-839f-8f9c8745d91d which can be used as unique global reference for Proofpoint August 29 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-29T00:00:00Z
date_published 2024-08-29T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title The Malware That Must Not Be Named Suspected Espionage Campaign Delivers “Voldemort”

Microsoft BlackCat Jun 2022

Microsoft Defender Threat Intelligence. (2022, June 13). The many lives of BlackCat ransomware. Retrieved December 20, 2022.

Internal MISP references

UUID 55be1ca7-fdb7-5d76-a9c8-5f44a0d00b0e which can be used as unique global reference for Microsoft BlackCat Jun 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-12-20T00:00:00Z
date_published 2022-06-13T00:00:00Z
source MITRE
title The many lives of BlackCat ransomware

Talos Nyetya MEDoc 2017

Maynor, D., Nikolic, A., Olney, M., and Younan, Y. (2017, July 5). The MeDoc Connection. Retrieved March 26, 2019.

Internal MISP references

UUID a055d7a2-a356-4f0e-9a66-7f7b3ac7e74a which can be used as unique global reference for Talos Nyetya MEDoc 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-26T00:00:00Z
date_published 2017-07-05T00:00:00Z
source MITRE
title The MeDoc Connection

PegasusCitizenLab

Bill Marczak and John Scott-Railton. (2016, August 24). The Million Dollar Dissident: NSO Group’s iPhone Zero-Days used against a UAE Human Rights Defender. Retrieved December 12, 2016.

Internal MISP references

UUID d248e284-37d3-4425-a29e-5a0c814ae803 which can be used as unique global reference for PegasusCitizenLab in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-12-12T00:00:00Z
date_published 2016-08-24T00:00:00Z
source MITRE
title The Million Dollar Dissident: NSO Group’s iPhone Zero-Days used against a UAE Human Rights Defender

Securelist MiniDuke Feb 2013

Kaspersky Lab's Global Research & Analysis Team. (2013, February 27). The MiniDuke Mystery: PDF 0-day Government Spy Assembler 0x29A Micro Backdoor. Retrieved April 5, 2017.

Internal MISP references

UUID def2a635-d322-4c27-9167-2642bf8f153c which can be used as unique global reference for Securelist MiniDuke Feb 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-04-05T00:00:00Z
date_published 2013-02-27T00:00:00Z
source MITRE
title The MiniDuke Mystery: PDF 0-day Government Spy Assembler 0x29A Micro Backdoor

Harmj0y SeEnableDelegationPrivilege Right

Schroeder, W. (2017, January 10). The Most Dangerous User Right You (Probably) Have Never Heard Of. Retrieved September 23, 2024.

Internal MISP references

UUID e8f7df08-1a62-41d9-b8a4-ff39a2160294 which can be used as unique global reference for Harmj0y SeEnableDelegationPrivilege Right in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-23T00:00:00Z
date_published 2017-01-10T00:00:00Z
source MITRE
title The Most Dangerous User Right You (Probably) Have Never Heard Of

Baumgartner Naikon 2015

Baumgartner, K., Golovkin, M.. (2015, May). The MsnMM Campaigns: The Earliest Naikon APT Campaigns. Retrieved April 10, 2019.

Internal MISP references

UUID 09302b4f-7f71-4289-92f6-076c685f0810 which can be used as unique global reference for Baumgartner Naikon 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-10T00:00:00Z
date_published 2015-05-01T00:00:00Z
source MITRE
title The MsnMM Campaigns: The Earliest Naikon APT Campaigns

SentinelLabs Metador Sept 2022

Ehrlich, A., et al. (2022, September). THE MYSTERY OF METADOR | AN UNATTRIBUTED THREAT HIDING IN TELCOS, ISPS, AND UNIVERSITIES. Retrieved January 23, 2023.

Internal MISP references

UUID 137474b7-638a-56d7-9ce2-ab906f207175 which can be used as unique global reference for SentinelLabs Metador Sept 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-01-23T00:00:00Z
date_published 2022-09-01T00:00:00Z
source MITRE
title THE MYSTERY OF METADOR

Baumgartner Golovkin Naikon 2015

Baumgartner, K., Golovkin, M.. (2015, May 14). The Naikon APT. Retrieved January 14, 2015.

Internal MISP references

UUID 5163576f-0b2c-49ba-8f34-b7efe3f3f6db which can be used as unique global reference for Baumgartner Golovkin Naikon 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-01-14T00:00:00Z
date_published 2015-05-14T00:00:00Z
source MITRE
title The Naikon APT

Cofense NanoCore Mar 2018

Patel, K. (2018, March 02). The NanoCore RAT Has Resurfaced From the Sewers. Retrieved September 25, 2024.

Internal MISP references

UUID de31ba54-5634-48c5-aa57-c6b0dbb53870 which can be used as unique global reference for Cofense NanoCore Mar 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-25T00:00:00Z
date_published 2018-03-02T00:00:00Z
source MITRE
title The NanoCore RAT Has Resurfaced From the Sewers

Kaspersky NetTraveler

Kaspersky Lab's Global Research and Analysis Team. (n.d.). The NetTraveler (aka ‘Travnet’). Retrieved November 12, 2014.

Internal MISP references

UUID a7d4b322-3710-436f-bd51-e5c258073dba which can be used as unique global reference for Kaspersky NetTraveler in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-12T00:00:00Z
source MITRE
title The NetTraveler (aka ‘Travnet’)

Unit42 OceanLotus 2017

Erye Hernandez and Danny Tsechansky. (2017, June 22). The New and Improved macOS Backdoor from OceanLotus. Retrieved September 8, 2023.

Internal MISP references

UUID fcaf57f1-6696-54a5-a78c-255c8f6ac235 which can be used as unique global reference for Unit42 OceanLotus 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-08T00:00:00Z
date_published 2017-06-22T00:00:00Z
source MITRE
title The New and Improved macOS Backdoor from OceanLotus

CyberArk Labs Discord

CyberArk Labs. (2023, April 13). The (Not so) Secret War on Discord. Retrieved July 20, 2023.

Internal MISP references

UUID 4b3cd2c0-fd0b-5583-8746-648229fc5f9d which can be used as unique global reference for CyberArk Labs Discord in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-20T00:00:00Z
date_published 2023-04-13T00:00:00Z
source MITRE
title The (Not so) Secret War on Discord

Gh0stRAT ATT March 2019

Quinn, J. (2019, March 25). The odd case of a Gh0stRAT variant. Retrieved July 15, 2020.

Internal MISP references

UUID 88d7bf25-985a-4b5e-92d6-ec4fa47a314f which can be used as unique global reference for Gh0stRAT ATT March 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-07-15T00:00:00Z
date_published 2019-03-25T00:00:00Z
source MITRE
title The odd case of a Gh0stRAT variant

Palo Alto OilRig May 2016

Falcone, R. and Lee, B.. (2016, May 26). The OilRig Campaign: Attacks on Saudi Arabian Organizations Deliver Helminth Backdoor. Retrieved May 3, 2017.

Internal MISP references

UUID 53836b95-a30a-4e95-8e19-e2bb2f18c738 which can be used as unique global reference for Palo Alto OilRig May 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-05-03T00:00:00Z
date_published 2016-05-26T00:00:00Z
source MITRE, Tidal Cyber
title The OilRig Campaign: Attacks on Saudi Arabian Organizations Deliver Helminth Backdoor

STIG krbtgt reset

UCF. (n.d.). The password for the krbtgt account on a domain must be reset at least every 180 days. Retrieved November 5, 2020.

Internal MISP references

UUID a42fc58f-e7a7-46de-a2f4-25fa8498b3b3 which can be used as unique global reference for STIG krbtgt reset in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-05T00:00:00Z
source MITRE
title The password for the krbtgt account on a domain must be reset at least every 180 days

Haq 2014

Haq, T., Moran, N., Scott, M., & Vashisht, S. O. (2014, September 10). The Path to Mass-Producing Cyber Attacks [Blog]. Retrieved November 12, 2014.

Internal MISP references

UUID 4e10228d-d9da-4ba4-bca7-d3bbdce42e0d which can be used as unique global reference for Haq 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-12T00:00:00Z
date_published 2014-09-10T00:00:00Z
source MITRE, Tidal Cyber
title The Path to Mass-Producing Cyber Attacks [Blog]

Kaspersky Turla Penquin December 2014

Baumgartner, K. and Raiu, C. (2014, December 8). The ‘Penquin’ Turla. Retrieved March 11, 2021.

Internal MISP references

UUID 957edb5c-b893-4968-9603-1a6b8577f3aa which can be used as unique global reference for Kaspersky Turla Penquin December 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-11T00:00:00Z
date_published 2014-12-08T00:00:00Z
source MITRE
title The ‘Penquin’ Turla

FireEye PLA

FireEye Labs. (2014, May 20). The PLA and the 8:00am-5:00pm Work Day: FireEye Confirms DOJ’s Findings on APT1 Intrusion Activity. Retrieved November 4, 2014.

Internal MISP references

UUID b8b72a8e-87a1-4ce7-94df-ed938f9eb61c which can be used as unique global reference for FireEye PLA in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-04T00:00:00Z
date_published 2014-05-20T00:00:00Z
source MITRE
title The PLA and the 8:00am-5:00pm Work Day: FireEye Confirms DOJ’s Findings on APT1 Intrusion Activity

Kaspersky ProjectSauron Full Report

Kaspersky Lab's Global Research & Analysis Team. (2016, August 9). The ProjectSauron APT. Retrieved August 17, 2016.

Internal MISP references

UUID 6840c1d6-89dc-4138-99e8-fbd2a45f2a1c which can be used as unique global reference for Kaspersky ProjectSauron Full Report in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-08-17T00:00:00Z
date_published 2016-08-09T00:00:00Z
source MITRE
title The ProjectSauron APT

Kaspersky Lua

Global Research and Analysis Team. (2016, August 9). The ProjectSauron APT. Retrieved August 5, 2024.

Internal MISP references

UUID 274fdba1-29f1-5c92-88f6-9a1b21598411 which can be used as unique global reference for Kaspersky Lua in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-05T00:00:00Z
date_published 2016-08-09T00:00:00Z
source MITRE
title The ProjectSauron APT

McMillan Pwn March 2012

Robert McMillan. (2012, March 3). The Pwn Plug is a little white box that can hack your network. Retrieved March 30, 2018.

Internal MISP references

UUID 6b57e883-75a1-4a71-accc-2d18148b9c3d which can be used as unique global reference for McMillan Pwn March 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-30T00:00:00Z
date_published 2012-03-03T00:00:00Z
source MITRE
title The Pwn Plug is a little white box that can hack your network

FireEye Application Shimming

Ballenthin, W., Tomczak, J.. (2015). The Real Shim Shary. Retrieved May 4, 2020.

Internal MISP references

UUID 658c8dd6-1a6a-40f0-a7b5-286fd4b1985d which can be used as unique global reference for FireEye Application Shimming in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-04T00:00:00Z
date_published 2015-01-01T00:00:00Z
source MITRE
title The Real Shim Shary

Kaspersky Regin

Kaspersky Lab's Global Research and Analysis Team. (2014, November 24). THE REGIN PLATFORM NATION-STATE OWNAGE OF GSM NETWORKS. Retrieved December 1, 2014.

Internal MISP references

UUID 1b521b76-5b8f-4bd9-b312-7c795fc97898 which can be used as unique global reference for Kaspersky Regin in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-12-01T00:00:00Z
date_published 2014-11-24T00:00:00Z
source MITRE
title THE REGIN PLATFORM NATION-STATE OWNAGE OF GSM NETWORKS

The Remote Framebuffer Protocol

T. Richardson, J. Levine, RealVNC Ltd.. (2011, March). The Remote Framebuffer Protocol. Retrieved September 20, 2021.

Internal MISP references

UUID 4c75a00d-aa90-4260-ab7a-2addc17d1728 which can be used as unique global reference for The Remote Framebuffer Protocol in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-20T00:00:00Z
date_published 2011-03-01T00:00:00Z
source MITRE
title The Remote Framebuffer Protocol

Malwarebytes Heroku Skimmers

Jérôme Segura. (2019, December 4). There's an app for that: web skimmers found on PaaS Heroku. Retrieved August 18, 2022.

Internal MISP references

UUID 4656cc2c-aff3-4416-b18d-995876d37e06 which can be used as unique global reference for Malwarebytes Heroku Skimmers in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-18T00:00:00Z
date_published 2019-12-04T00:00:00Z
source MITRE
title There's an app for that: web skimmers found on PaaS Heroku

Electron 1

TOM ABAI. (2023, August 10). There’s a New Stealer Variant in Town, and It’s Using Electron to Stay Fully Undetected. Retrieved March 7, 2024.

Internal MISP references

UUID e1762a94-5efc-5211-a714-f4d6d71bfe37 which can be used as unique global reference for Electron 1 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-07T00:00:00Z
date_published 2023-08-10T00:00:00Z
source MITRE
title There’s a New Stealer Variant in Town, and It’s Using Electron to Stay Fully Undetected

ELC Extended Attributes

Howard Oakley. (2020, October 24). There's more to files than data: Extended Attributes. Retrieved October 12, 2021.

Internal MISP references

UUID e62d67ed-48d0-4141-aacc-92e165d66f16 which can be used as unique global reference for ELC Extended Attributes in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-12T00:00:00Z
date_published 2020-10-24T00:00:00Z
source MITRE
title There's more to files than data: Extended Attributes

FireEye WMI SANS 2015

Devon Kerr. (2015). There's Something About WMI. Retrieved May 4, 2020.

Internal MISP references

UUID a9333ef5-5637-4a4c-9aaf-fdc9daf8b860 which can be used as unique global reference for FireEye WMI SANS 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-04T00:00:00Z
date_published 2015-01-01T00:00:00Z
source MITRE
title There's Something About WMI

Sygnia July 17 2024

Sygnia. (2024, July 17). The Return of Ghost Emperor's Demodex. Retrieved August 9, 2024.

Internal MISP references

UUID 7d30acb4-9600-46bd-a800-1c7e1149e9b4 which can be used as unique global reference for Sygnia July 17 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-09T00:00:00Z
date_published 2024-07-17T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title The Return of Ghost Emperor's Demodex

Nviso Spoof Command Line 2020

Daman, R. (2020, February 4). The return of the spoof part 2: Command line spoofing. Retrieved November 19, 2021.

Internal MISP references

UUID a3fa92ed-763c-4082-8220-cab82d70fad4 which can be used as unique global reference for Nviso Spoof Command Line 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-11-19T00:00:00Z
date_published 2020-02-04T00:00:00Z
source MITRE
title The return of the spoof part 2: Command line spoofing

Zscaler Higaisa 2020

Singh, S. Singh, A. (2020, June 11). The Return on the Higaisa APT. Retrieved March 2, 2021.

Internal MISP references

UUID 26d7ee2c-d4f7-441a-9073-49c9049b017e which can be used as unique global reference for Zscaler Higaisa 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-02T00:00:00Z
date_published 2020-06-11T00:00:00Z
source MITRE
title The Return on the Higaisa APT

Check Point Research Rhysida August 08 2023

Check Point Research. (2023, August 8). The Rhysida Ransomware: Activity Analysis and Ties to Vice Society. Retrieved August 11, 2023.

Internal MISP references

UUID 0d01416f-4888-4b68-be47-a3245549cec5 which can be used as unique global reference for Check Point Research Rhysida August 08 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-11T00:00:00Z
date_published 2023-08-08T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title The Rhysida Ransomware: Activity Analysis and Ties to Vice Society

DigiTrust Agent Tesla Jan 2017

The DigiTrust Group. (2017, January 12). The Rise of Agent Tesla. Retrieved November 5, 2018.

Internal MISP references

UUID dbae7e21-20d4-454c-88db-43e2a195808e which can be used as unique global reference for DigiTrust Agent Tesla Jan 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-05T00:00:00Z
date_published 2017-01-12T00:00:00Z
source MITRE
title The Rise of Agent Tesla

Cofense Agent Tesla

James Arndt. (2023, February 21). The Rise of Agent Tesla: Understanding the Notorious Keylogger. Retrieved January 10, 2024.

Internal MISP references

UUID f8a8a3a0-5b30-5f3e-a7b0-f8a4aaae7ee7 which can be used as unique global reference for Cofense Agent Tesla in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-10T00:00:00Z
date_published 2023-02-21T00:00:00Z
source MITRE
title The Rise of Agent Tesla: Understanding the Notorious Keylogger

Red Canary March 18 2024

Laura Brosnan. (2024, March 18). The rise of Charcoal Stork . Retrieved September 26, 2024.

Internal MISP references

UUID a86131cd-1a42-4222-9d39-221dd6e054ba which can be used as unique global reference for Red Canary March 18 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-26T00:00:00Z
date_published 2024-03-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title The rise of Charcoal Stork

ATT QakBot April 2021

Morrow, D. (2021, April 15). The rise of QakBot. Retrieved September 27, 2021.

Internal MISP references

UUID c7b0b3f3-e9ea-4159-acd1-f6d92ed41828 which can be used as unique global reference for ATT QakBot April 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-27T00:00:00Z
date_published 2021-04-15T00:00:00Z
source MITRE
title The rise of QakBot

ESET Telebots Dec 2016

Cherepanov, A.. (2016, December 13). The rise of TeleBots: Analyzing disruptive KillDisk attacks. Retrieved June 10, 2020.

Internal MISP references

UUID 34e6e415-099a-4f29-aad0-fc0331a733a4 which can be used as unique global reference for ESET Telebots Dec 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-10T00:00:00Z
date_published 2016-12-13T00:00:00Z
source MITRE
title The rise of TeleBots: Analyzing disruptive KillDisk attacks

Darktrace September 6 2023

Emily Megan Lim. (2023, September 6). The Rise of the Lumma Info-Stealer . Retrieved October 10, 2024.

Internal MISP references

UUID 2d23c7ba-2c00-4693-a9a2-4c5fabc353b4 which can be used as unique global reference for Darktrace September 6 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-10T00:00:00Z
date_published 2023-09-06T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title The Rise of the Lumma Info-Stealer

SEI SSL Inspection Risks

Dormann, W. (2015, March 13). The Risks of SSL Inspection. Retrieved April 5, 2016.

Internal MISP references

UUID 3fafc00e-b808-486e-81bc-c08b6a410133 which can be used as unique global reference for SEI SSL Inspection Risks in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-05T00:00:00Z
date_published 2015-03-13T00:00:00Z
source MITRE
title The Risks of SSL Inspection

SourceForge rkhunter

Rootkit Hunter Project. (2018, February 20). The Rootkit Hunter project. Retrieved April 9, 2018.

Internal MISP references

UUID e52cf1aa-3d14-40ce-a1d4-e9de672261ef which can be used as unique global reference for SourceForge rkhunter in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-09T00:00:00Z
date_published 2018-02-20T00:00:00Z
source MITRE
title The Rootkit Hunter project

Campbell 2014

Campbell, C. (2014). The Secret Life of Krbtgt. Retrieved December 4, 2014.

Internal MISP references

UUID 8bef22ff-f2fc-4e1a-b4d2-d746a120f6c6 which can be used as unique global reference for Campbell 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-12-04T00:00:00Z
date_published 2014-01-01T00:00:00Z
source MITRE
title The Secret Life of Krbtgt

Proofpoint Domain Shadowing

Proofpoint Staff. (2015, December 15). The shadow knows: Malvertising campaigns use domain shadowing to pull in Angler EK. Retrieved October 16, 2020.

Internal MISP references

UUID 4653a9a5-95f1-4b02-9bf0-8f1b8cd6c059 which can be used as unique global reference for Proofpoint Domain Shadowing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-16T00:00:00Z
date_published 2015-12-15T00:00:00Z
source MITRE
title The shadow knows: Malvertising campaigns use domain shadowing to pull in Angler EK

Symantec Shamoon 2012

Symantec. (2012, August 16). The Shamoon Attacks. Retrieved March 14, 2019.

Internal MISP references

UUID ac634e99-d951-402b-bb1c-e575753dfda8 which can be used as unique global reference for Symantec Shamoon 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-14T00:00:00Z
date_published 2012-08-16T00:00:00Z
source MITRE
title The Shamoon Attacks

Spring Dragon Jun 2015

Baumgartner, K.. (2015, June 17). The Spring Dragon APT. Retrieved February 15, 2016.

Internal MISP references

UUID 2cc38587-a18e-47e9-a8bb-e3498e4737f5 which can be used as unique global reference for Spring Dragon Jun 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-02-15T00:00:00Z
date_published 2015-06-17T00:00:00Z
source MITRE
title The Spring Dragon APT

Check Point APT31 February 2021

Itkin, E. and Cohen, I. (2021, February 22). The Story of Jian – How APT31 Stole and Used an Unknown Equation Group 0-Day. Retrieved March 24, 2021.

Internal MISP references

UUID 84ac99ef-106f-44e9-97f0-3eda90570932 which can be used as unique global reference for Check Point APT31 February 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-24T00:00:00Z
date_published 2021-02-22T00:00:00Z
source MITRE
title The Story of Jian – How APT31 Stole and Used an Unknown Equation Group 0-Day

System Information Discovery Technique

YUCEEL, Huseyin Can. Picus Labs. (2022, June 9). The System Information Discovery Technique Explained - MITRE ATT&CK T1082. Retrieved March 27, 2024.

Internal MISP references

UUID 6123fbd4-c6fc-504c-92f2-5d405730c298 which can be used as unique global reference for System Information Discovery Technique in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-27T00:00:00Z
date_published 2022-06-09T00:00:00Z
source MITRE
title The System Information Discovery Technique Explained - MITRE ATT&CK T1082

UCF STIG Elevation Account Enumeration

UCF. (n.d.). The system must require username and password to elevate a running application.. Retrieved December 18, 2017.

Internal MISP references

UUID 7b895692-d401-4d74-ab3f-e6f8e432877a which can be used as unique global reference for UCF STIG Elevation Account Enumeration in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-18T00:00:00Z
source MITRE
title The system must require username and password to elevate a running application.

TrendMicro Taidoor

Trend Micro. (2012). The Taidoor Campaign. Retrieved November 12, 2014.

Internal MISP references

UUID 3d703dfa-97c5-498f-a712-cb4995119297 which can be used as unique global reference for TrendMicro Taidoor in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-12T00:00:00Z
date_published 2012-01-01T00:00:00Z
source MITRE
title The Taidoor Campaign

SpectorOPs SettingContent-ms Jun 2018

Nelson, M. (2018, June 11). The Tale of SettingContent-ms Files. Retrieved April 18, 2019.

Internal MISP references

UUID 88ffa36e-c1d8-4e40-86c9-bdefad9a6c95 which can be used as unique global reference for SpectorOPs SettingContent-ms Jun 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-18T00:00:00Z
date_published 2018-06-11T00:00:00Z
source MITRE
title The Tale of SettingContent-ms Files

Securelist Brazilian Banking Malware July 2020

GReAT. (2020, July 14). The Tetrade: Brazilian banking malware goes global. Retrieved November 9, 2020.

Internal MISP references

UUID ccc34875-93f3-40ed-a9ee-f31b86708507 which can be used as unique global reference for Securelist Brazilian Banking Malware July 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-09T00:00:00Z
date_published 2020-07-14T00:00:00Z
source MITRE
title The Tetrade: Brazilian banking malware goes global

Symantec Trojan.Hydraq Jan 2010

Symantec Security Response. (2010, January 18). The Trojan.Hydraq Incident. Retrieved February 20, 2018.

Internal MISP references

UUID 10bed842-400f-4276-972d-5fca794ea778 which can be used as unique global reference for Symantec Trojan.Hydraq Jan 2010 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-20T00:00:00Z
date_published 2010-01-18T00:00:00Z
source MITRE
title The Trojan.Hydraq Incident

Fidelis Turbo

Fidelis Cybersecurity. (2016, February 29). The Turbo Campaign, Featuring Derusbi for 64-bit Linux. Retrieved March 2, 2016.

Internal MISP references

UUID f19877f1-3e0f-4c68-b6c9-ef5b0bd470ed which can be used as unique global reference for Fidelis Turbo in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-03-02T00:00:00Z
date_published 2016-02-29T00:00:00Z
source MITRE
title The Turbo Campaign, Featuring Derusbi for 64-bit Linux

USDOJ Sandworm Feb 2020

Pompeo, M. (2020, February 20). The United States Condemns Russian Cyber Attack Against the Country of Georgia. Retrieved September 12, 2024.

Internal MISP references

UUID fefa7321-cd60-4c7e-a9d5-c723d88013f2 which can be used as unique global reference for USDOJ Sandworm Feb 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2020-02-20T00:00:00Z
source MITRE
title The United States Condemns Russian Cyber Attack Against the Country of Georgia

Securelist Ventir

Mikhail, K. (2014, October 16). The Ventir Trojan: assemble your MacOS spy. Retrieved April 6, 2018.

Internal MISP references

UUID 5e4e82c0-16b6-43bc-a70d-6b8d55aaef52 which can be used as unique global reference for Securelist Ventir in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-06T00:00:00Z
date_published 2014-10-16T00:00:00Z
source MITRE
title The Ventir Trojan: assemble your MacOS spy

Symantec Waterbug

Symantec. (2015, January 26). The Waterbug attack group. Retrieved April 10, 2015.

Internal MISP references

UUID ec02f951-17b8-44cb-945a-e5c313555124 which can be used as unique global reference for Symantec Waterbug in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-04-10T00:00:00Z
date_published 2015-01-26T00:00:00Z
source MITRE
title The Waterbug attack group

Windows NT Command Shell

Tim Hill. (2014, February 2). The Windows NT Command Shell. Retrieved December 5, 2014.

Internal MISP references

UUID aee1e76c-8ff2-4ff0-83e3-edcb76f34d19 which can be used as unique global reference for Windows NT Command Shell in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-12-05T00:00:00Z
date_published 2014-02-02T00:00:00Z
source MITRE
title The Windows NT Command Shell

Malwarebytes The Windows Vault

Arntz, P. (2016, March 30). The Windows Vault . Retrieved November 23, 2020.

Internal MISP references

UUID f09fdc31-38ca-411d-8478-683b08a68535 which can be used as unique global reference for Malwarebytes The Windows Vault in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-23T00:00:00Z
date_published 2016-03-30T00:00:00Z
source MITRE
title The Windows Vault

Microsoft JScript 2007

Microsoft. (2007, August 15). The World of JScript, JavaScript, ECMAScript …. Retrieved June 23, 2020.

Internal MISP references

UUID e3c97d0f-150e-4fe3-a4ce-fc146a2fa718 which can be used as unique global reference for Microsoft JScript 2007 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-23T00:00:00Z
date_published 2007-08-15T00:00:00Z
source MITRE
title The World of JScript, JavaScript, ECMAScript …

ntlm_relaying_kerberos_del

Mollema, D. (2019, March 4). The worst of both worlds: Combining NTLM Relaying and Kerberos delegation . Retrieved August 15, 2022.

Internal MISP references

UUID 08f44086-2387-4254-a0b6-3b9be2b6ee30 which can be used as unique global reference for ntlm_relaying_kerberos_del in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-15T00:00:00Z
date_published 2019-03-04T00:00:00Z
source MITRE
title The worst of both worlds: Combining NTLM Relaying and Kerberos delegation

trendmicro xcsset xcode project 2020

Mac Threat Response, Mobile Research Team. (2020, August 13). The XCSSET Malware: Inserts Malicious Code Into Xcode Projects, Performs UXSS Backdoor Planting in Safari, and Leverages Two Zero-day Exploits. Retrieved October 5, 2021.

Internal MISP references

UUID 0194bb11-8b97-4d61-8ddb-824077edc7db which can be used as unique global reference for trendmicro xcsset xcode project 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-05T00:00:00Z
date_published 2020-08-13T00:00:00Z
source MITRE
title The XCSSET Malware: Inserts Malicious Code Into Xcode Projects, Performs UXSS Backdoor Planting in Safari, and Leverages Two Zero-day Exploits

Sophos New Ryuk Attack October 2020

Sean Gallagher, Peter Mackenzie, Elida Leite, Syed Shahram, Bill Kearney, Anand Aijan, Sivagnanam Gn, Suraj Mundalik. (2020, October 14). They’re back: inside a new Ryuk ransomware attack. Retrieved October 14, 2020.

Internal MISP references

UUID bfc6f6fe-b504-4b99-a7c0-1efba08ac14e which can be used as unique global reference for Sophos New Ryuk Attack October 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-14T00:00:00Z
date_published 2020-10-14T00:00:00Z
source MITRE
title They’re back: inside a new Ryuk ransomware attack

RSA EU12 They're Inside

Rivner, U., Schwartz, E. (2012). They’re Inside… Now What?. Retrieved November 25, 2016.

Internal MISP references

UUID 8330ab88-9c73-4332-97d6-c1fb95b1a155 which can be used as unique global reference for RSA EU12 They're Inside in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-11-25T00:00:00Z
date_published 2012-01-01T00:00:00Z
source MITRE
title They’re Inside… Now What?

APT29 Deep Look at Credential Roaming

Thibault Van Geluwe De Berlaere. (2022, November 8). They See Me Roaming: Following APT29 by Taking a Deeper Look at Windows Credential Roaming. Retrieved November 9, 2022.

Internal MISP references

UUID 691fb596-07b6-5c13-9cec-e28530ffde12 which can be used as unique global reference for APT29 Deep Look at Credential Roaming in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-11-09T00:00:00Z
date_published 2022-11-08T00:00:00Z
source MITRE
title They See Me Roaming: Following APT29 by Taking a Deeper Look at Windows Credential Roaming

ZDNet Ransomware Backups 2020

Steve Ranger. (2020, February 27). Ransomware victims thought their backups were safe. They were wrong. Retrieved March 21, 2023.

Internal MISP references

UUID 301da9c8-60de-58f0-989f-6b504e3457a3 which can be used as unique global reference for ZDNet Ransomware Backups 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-21T00:00:00Z
source MITRE
title They were wrong

Microsoft Unidentified Dec 2018

Microsoft Defender Research Team. (2018, December 3). Analysis of cyberattack on U.S. think tanks, non-profits, public sector by unidentified attackers. Retrieved April 15, 2019.

Internal MISP references

UUID 896c88f9-8765-4b60-b679-667b338757e3 which can be used as unique global reference for Microsoft Unidentified Dec 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-15T00:00:00Z
source MITRE
title think tanks, non-profits, public sector by unidentified attackers

iPhone Charging Cable Hack

Zack Whittaker. (2019, August 12). This hacker’s iPhone charging cable can hijack your computer. Retrieved May 25, 2022.

Internal MISP references

UUID b8bb0bc5-e131-47b5-8c42-48cd3dc25250 which can be used as unique global reference for iPhone Charging Cable Hack in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-25T00:00:00Z
date_published 2019-08-12T00:00:00Z
source MITRE
title This hacker’s iPhone charging cable can hijack your computer

Mandiant APT41 Global Intrusion

Gyler, C.,Perez D.,Jones, S.,Miller, S.. (2021, February 25). This is Not a Test: APT41 Initiates Global Intrusion Campaign Using Multiple Exploits. Retrieved February 17, 2022.

Internal MISP references

UUID 9b75a38e-e5c7-43c8-a7fb-c7f212e00497 which can be used as unique global reference for Mandiant APT41 Global Intrusion in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-17T00:00:00Z
date_published 2021-02-25T00:00:00Z
source MITRE
title This is Not a Test: APT41 Initiates Global Intrusion Campaign Using Multiple Exploits

FireEye APT41 March 2020

Glyer, C, et al. (2020, March). This Is Not a Test: APT41 Initiates Global Intrusion Campaign Using Multiple Exploits. Retrieved April 28, 2020.

Internal MISP references

UUID e4d7c8f6-e202-4aac-b39d-7b2c9c5ea48d which can be used as unique global reference for FireEye APT41 March 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-04-28T00:00:00Z
date_published 2020-03-01T00:00:00Z
source MITRE
title This Is Not a Test: APT41 Initiates Global Intrusion Campaign Using Multiple Exploits

Proofpoint Bumblebee April 2022

Merriman, K. and Trouerbach, P. (2022, April 28). This isn't Optimus Prime's Bumblebee but it's Still Transforming. Retrieved August 22, 2022.

Internal MISP references

UUID 765b0ce9-7305-4b35-b5be-2f6f42339646 which can be used as unique global reference for Proofpoint Bumblebee April 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-22T00:00:00Z
date_published 2022-04-28T00:00:00Z
source MITRE
title This isn't Optimus Prime's Bumblebee but it's Still Transforming

Code Injection on Linux and macOS

Itamar Turner-Trauring. (2017, April 18). “This will only hurt for a moment”: code injection on Linux and macOS with LD_PRELOAD. Retrieved December 20, 2017.

Internal MISP references

UUID 82d41fd8-495d-41b6-b908-6ada5764c94d which can be used as unique global reference for Code Injection on Linux and macOS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-20T00:00:00Z
date_published 2017-04-18T00:00:00Z
source MITRE
title “This will only hurt for a moment”: code injection on Linux and macOS with LD_PRELOAD

Cybernews Reuters Leak 2022

Vilius Petkauskas . (2022, November 3). Thomson Reuters collected and leaked at least 3TB of sensitive data. Retrieved September 25, 2024.

Internal MISP references

UUID ca5ee9aa-6c9a-57dc-9cb4-0d976de1b5e5 which can be used as unique global reference for Cybernews Reuters Leak 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-25T00:00:00Z
date_published 2022-11-03T00:00:00Z
source MITRE
title Thomson Reuters collected and leaked at least 3TB of sensitive data

phishing-krebs

Brian Krebs. (2024, March 28). Thread Hijacking: Phishes That Prey on Your Curiosity. Retrieved September 27, 2024.

Internal MISP references

UUID 1f591eeb-04c0-5125-b378-e3716a839d17 which can be used as unique global reference for phishing-krebs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-27T00:00:00Z
date_published 2024-03-28T00:00:00Z
source MITRE
title Thread Hijacking: Phishes That Prey on Your Curiosity

TrendMicros ScreenConnect February 27 2024

Ian Kenefick, Junestherry Dela Cruz, Peter Girnus. (2024, February 27). Threat Actor Groups, Including Black Basta, are Exploiting Recent ScreenConnect Vulnerabilities. Retrieved February 28, 2024.

Internal MISP references

UUID 186dff50-f68a-4a5a-aa55-8ffbd89859c8 which can be used as unique global reference for TrendMicros ScreenConnect February 27 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-28T00:00:00Z
date_published 2024-02-27T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Threat Actor Groups, Including Black Basta, are Exploiting Recent ScreenConnect Vulnerabilities

FireEye Fin8 May 2016

Kizhakkinan, D., et al. (2016, May 11). Threat Actor Leverages Windows Zero-day Exploit in Payment Card Data Attacks. Retrieved February 12, 2018.

Internal MISP references

UUID 2079101c-d988-430a-9082-d25c475b2af5 which can be used as unique global reference for FireEye Fin8 May 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-12T00:00:00Z
date_published 2016-05-11T00:00:00Z
source MITRE
title Threat Actor Leverages Windows Zero-day Exploit in Payment Card Data Attacks

Proofpoint TA407 September 2019

Proofpoint Threat Insight Team. (2019, September 5). Threat Actor Profile: TA407, the Silent Librarian. Retrieved February 3, 2021.

Internal MISP references

UUID e787e9af-f496-442a-8b36-16056ff8bfc1 which can be used as unique global reference for Proofpoint TA407 September 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-03T00:00:00Z
date_published 2019-09-05T00:00:00Z
source MITRE
title Threat Actor Profile: TA407, the Silent Librarian

Proofpoint TA505 Sep 2017

Proofpoint Staff. (2017, September 27). Threat Actor Profile: TA505, From Dridex to GlobeImposter. Retrieved May 28, 2019.

Internal MISP references

UUID c1fff36f-802b-4436-abce-7f2787c148db which can be used as unique global reference for Proofpoint TA505 Sep 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-05-28T00:00:00Z
date_published 2017-09-27T00:00:00Z
source MITRE, Tidal Cyber
title Threat Actor Profile: TA505, From Dridex to GlobeImposter

Cyble 4 26 2023

Cybleinc. (2023, April 26). Threat Actor Selling New Atomic macOS (AMOS) Stealer on Telegram. Retrieved January 1, 2024.

Internal MISP references

UUID cdef460c-a2e0-4a44-83fe-1cf1adc3ebf1 which can be used as unique global reference for Cyble 4 26 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-01T00:00:00Z
date_published 2023-04-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Threat Actor Selling New Atomic macOS (AMOS) Stealer on Telegram

U.S. CISA CVE-2023-3519 Exploits

Cybersecurity and Infrastructure Security Agency. (2023, July 20). Threat Actors Exploiting Citrix CVE-2023-3519 to Implant Webshells. Retrieved July 24, 2023.

Internal MISP references

UUID 021c4caa-7a7a-4e49-9c5c-6eec176bf923 which can be used as unique global reference for U.S. CISA CVE-2023-3519 Exploits in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-24T00:00:00Z
date_published 2023-07-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Threat Actors Exploiting Citrix CVE-2023-3519 to Implant Webshells

U.S. CISA CVE-2023-35078 Exploits

Cybersecurity and Infrastructure Security Agency. (2023, August 1). Threat Actors Exploiting Ivanti EPMM Vulnerabilities. Retrieved August 3, 2023.

Internal MISP references

UUID 62305b8a-76c8-49ec-82dc-6756643ccf7a which can be used as unique global reference for U.S. CISA CVE-2023-35078 Exploits in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-03T00:00:00Z
date_published 2023-08-01T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Threat Actors Exploiting Ivanti EPMM Vulnerabilities

U.S. CISA Ivanti Exploits February 2024

Cybersecurity and Infrastructure Security Agency. (2024, February 29). Threat Actors Exploit Multiple Vulnerabilities in Ivanti Connect Secure and Policy Secure Gateways. Retrieved March 1, 2024.

Internal MISP references

UUID a501b21d-916d-454e-b5a0-c3d3bdb4e45c which can be used as unique global reference for U.S. CISA Ivanti Exploits February 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-01T00:00:00Z
date_published 2024-02-29T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Threat Actors Exploit Multiple Vulnerabilities in Ivanti Connect Secure and Policy Secure Gateways

Microsoft Security Blog 5 15 2024

Microsoft Threat Intelligence. (2024, May 15). Threat actors misusing Quick Assist in social engineering attacks leading to ransomware . Retrieved May 16, 2024.

Internal MISP references

UUID 0876de6e-ea0c-4717-89a4-9c7baed53b6f which can be used as unique global reference for Microsoft Security Blog 5 15 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-16T00:00:00Z
date_published 2024-05-15T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Threat actors misusing Quick Assist in social engineering attacks leading to ransomware

Atlas SEO

Atlas Cybersecurity. (2021, April 19). Threat Actors use Search-Engine-Optimization Tactics to Redirect Traffic and Install Malware. Retrieved September 30, 2022.

Internal MISP references

UUID 26d7134e-7b93-4aa1-a859-03cf964ca1b5 which can be used as unique global reference for Atlas SEO in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-30T00:00:00Z
date_published 2021-04-19T00:00:00Z
source MITRE
title Threat Actors use Search-Engine-Optimization Tactics to Redirect Traffic and Install Malware

Cisco Talos Blog September 3 2024

Vanja Svajcer. (2024, September 3). Threat actors using MacroPack to deploy Brute Ratel, Havoc and PhantomCore payloads. Retrieved September 3, 2024.

Internal MISP references

UUID b222cabd-347d-45d4-aeaf-4135795d944d which can be used as unique global reference for Cisco Talos Blog September 3 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-03T00:00:00Z
date_published 2024-09-03T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Threat actors using MacroPack to deploy Brute Ratel, Havoc and PhantomCore payloads

Cybereason TA505 April 2019

Salem, E. (2019, April 25). Threat Actor TA505 Targets Financial Enterprises Using LOLBins and a New Backdoor Malware. Retrieved May 28, 2019.

Internal MISP references

UUID 076f2b95-97d2-4d50-bb9b-6199c161e5c6 which can be used as unique global reference for Cybereason TA505 April 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-05-28T00:00:00Z
date_published 2019-04-25T00:00:00Z
source MITRE
title Threat Actor TA505 Targets Financial Enterprises Using LOLBins and a New Backdoor Malware

Cisco CaddyWiper March 2022

Malhotra, A. (2022, March 15). Threat Advisory: CaddyWiper. Retrieved March 23, 2022.

Internal MISP references

UUID 88fc1f96-2d55-4c92-a929-234248490c30 which can be used as unique global reference for Cisco CaddyWiper March 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-23T00:00:00Z
date_published 2022-03-15T00:00:00Z
source MITRE
title Threat Advisory: CaddyWiper

Carbon Black Squiblydoo Apr 2016

Nolen, R. et al.. (2016, April 28). Threat Advisory: “Squiblydoo” Continues Trend of Attackers Using Native OS Tools to “Live off the Land”. Retrieved April 9, 2018.

Internal MISP references

UUID b23fc191-cc84-49c8-9eb0-09db7e23b24d which can be used as unique global reference for Carbon Black Squiblydoo Apr 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-09T00:00:00Z
date_published 2016-04-28T00:00:00Z
source MITRE
title Threat Advisory: “Squiblydoo” Continues Trend of Attackers Using Native OS Tools to “Live off the Land”

Aqua Build Images on Hosts

Assaf Morag. (2020, July 15). Threat Alert: Attackers Building Malicious Images on Your Hosts. Retrieved March 29, 2021.

Internal MISP references

UUID efd64f41-13cc-4b2b-864c-4d2352cdadcd which can be used as unique global reference for Aqua Build Images on Hosts in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-29T00:00:00Z
date_published 2020-07-15T00:00:00Z
source MITRE
title Threat Alert: Attackers Building Malicious Images on Your Hosts

Cybereason INC Ransomware November 2023

Cybereason Security Research Team. (2023, November 20). Threat Alert: INC Ransomware. Retrieved June 5, 2024.

Internal MISP references

UUID ebe119d6-add3-5a1b-8e5f-b6419f246ba9 which can be used as unique global reference for Cybereason INC Ransomware November 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-05T00:00:00Z
date_published 2023-11-20T00:00:00Z
source MITRE
title Threat Alert: INC Ransomware

Aqua Kinsing April 2020

Singer, G. (2020, April 3). Threat Alert: Kinsing Malware Attacks Targeting Container Environments. Retrieved April 1, 2021.

Internal MISP references

UUID 67dd04dd-c0e0-49e6-9341-4e445d660641 which can be used as unique global reference for Aqua Kinsing April 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-01T00:00:00Z
date_published 2020-04-03T00:00:00Z
source MITRE
title Threat Alert: Kinsing Malware Attacks Targeting Container Environments

Segurança Informática URSA Sophisticated Loader 2020

Pedro Tavares (Segurança Informática). (2020, September 15). Threat analysis: The emergent URSA trojan impacts many countries using a sophisticated loader. Retrieved March 13, 2024.

Internal MISP references

UUID 29d25b85-ae13-57d6-9e6f-d0f65783b5ac which can be used as unique global reference for Segurança Informática URSA Sophisticated Loader 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-13T00:00:00Z
date_published 2020-09-15T00:00:00Z
source MITRE
title Threat analysis: The emergent URSA trojan impacts many countries using a sophisticated loader

Palo Alto Networks Black Basta August 2022

Elsad, A. (2022, August 25). Threat Assessment: Black Basta Ransomware. Retrieved March 8, 2023.

Internal MISP references

UUID fc9ee531-3680-549b-86e0-a10a70c3ec67 which can be used as unique global reference for Palo Alto Networks Black Basta August 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-08T00:00:00Z
date_published 2022-08-25T00:00:00Z
source MITRE
title Threat Assessment: Black Basta Ransomware

Unit42 Clop April 2021

Santos, D. (2021, April 13). Threat Assessment: Clop Ransomware. Retrieved July 30, 2021.

Internal MISP references

UUID ce48d631-757c-480b-8572-b7d9f4d738c6 which can be used as unique global reference for Unit42 Clop April 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-07-30T00:00:00Z
date_published 2021-04-13T00:00:00Z
source MITRE
title Threat Assessment: Clop Ransomware

Palo Alto Unit 42 EKANS

Hinchliffe, A. Santos, D. (2020, June 26). Threat Assessment: EKANS Ransomware. Retrieved February 9, 2021.

Internal MISP references

UUID dcdd4e48-3c3d-4008-a6f6-390f896f147b which can be used as unique global reference for Palo Alto Unit 42 EKANS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-09T00:00:00Z
date_published 2020-06-26T00:00:00Z
source MITRE
title Threat Assessment: EKANS Ransomware

Unit42 Luna Moth November 21 2022

Kristopher Russo. (2022, November 21). Threat Assessment: Luna Moth Callback Phishing Campaign. Retrieved June 28, 2024.

Internal MISP references

UUID 042f51db-c9f3-4827-883d-d7e7422fd642 which can be used as unique global reference for Unit42 Luna Moth November 21 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-28T00:00:00Z
date_published 2022-11-21T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Threat Assessment: Luna Moth Callback Phishing Campaign

UNIT 42 LAPSUS Mar 2022

UNIT 42. (2022, March 24). Threat Brief: Lapsus$ Group. Retrieved May 17, 2022.

Internal MISP references

UUID 50f4c1ed-b046-405a-963d-a113324355a3 which can be used as unique global reference for UNIT 42 LAPSUS Mar 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-17T00:00:00Z
date_published 2022-03-24T00:00:00Z
source MITRE
title Threat Brief: Lapsus$ Group

Unit 42 WhisperGate January 2022

Falcone, R. et al.. (2022, January 20). Threat Brief: Ongoing Russia and Ukraine Cyber Conflict. Retrieved March 10, 2022.

Internal MISP references

UUID 3daa8c9e-da17-4eda-aa0d-df97c5de8f64 which can be used as unique global reference for Unit 42 WhisperGate January 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-10T00:00:00Z
date_published 2022-01-20T00:00:00Z
source MITRE
title Threat Brief: Ongoing Russia and Ukraine Cyber Conflict

Unit 42 DGA Feb 2019

Unit 42. (2019, February 7). Threat Brief: Understanding Domain Generation Algorithms (DGA). Retrieved February 19, 2019.

Internal MISP references

UUID 5e1db76a-0a3e-42ce-a66c-f914fb1a3471 which can be used as unique global reference for Unit 42 DGA Feb 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-19T00:00:00Z
date_published 2019-02-07T00:00:00Z
source MITRE
title Threat Brief: Understanding Domain Generation Algorithms (DGA)

Red Canary TDR ChromeLoader

Red Canary. (n.d.). Threat: ChromeLoader. Retrieved September 26, 2024.

Internal MISP references

UUID bcfe9d10-11fe-4241-8262-bce07e8a11c1 which can be used as unique global reference for Red Canary TDR ChromeLoader in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Threat: ChromeLoader

Dell TG-3390

Dell SecureWorks Counter Threat Unit Threat Intelligence. (2015, August 5). Threat Group-3390 Targets Organizations for Cyberespionage. Retrieved August 18, 2018.

Internal MISP references

UUID dfd2d832-a6c5-40e7-a554-5a92f05bebae which can be used as unique global reference for Dell TG-3390 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-18T00:00:00Z
date_published 2015-08-05T00:00:00Z
source MITRE, Tidal Cyber
title Threat Group-3390 Targets Organizations for Cyberespionage

SecureWorks TG-4127

SecureWorks Counter Threat Unit Threat Intelligence. (2016, June 16). Threat Group-4127 Targets Hillary Clinton Presidential Campaign. Retrieved August 3, 2016.

Internal MISP references

UUID 5f401c82-4e16-43a1-b234-48918fe7df9f which can be used as unique global reference for SecureWorks TG-4127 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-08-03T00:00:00Z
date_published 2016-06-16T00:00:00Z
source MITRE
title Threat Group-4127 Targets Hillary Clinton Presidential Campaign

McAfee APT28 DDE1 Nov 2017

Sherstobitoff, R., Rea, M. (2017, November 7). Threat Group APT28 Slips Office Malware into Doc Citing NYC Terror Attack. Retrieved November 21, 2017.

Internal MISP references

UUID 8670f4ee-7491-4c37-9832-99d6f8f54ba8 which can be used as unique global reference for McAfee APT28 DDE1 Nov 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-21T00:00:00Z
date_published 2017-11-07T00:00:00Z
source MITRE
title Threat Group APT28 Slips Office Malware into Doc Citing NYC Terror Attack

Unit 42 9 15 2023

Amer Elsad; Kristopher Russo; Austin Dever. (2023, September 15). Threat Group Assessment Muddled Libra (Updated). Retrieved January 1, 2024.

Internal MISP references

UUID 5e9842ae-180f-4645-a5f5-5ddfb8b2d810 which can be used as unique global reference for Unit 42 9 15 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-01T00:00:00Z
date_published 2023-09-15T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Threat Group Assessment Muddled Libra (Updated)

Awake Security Avaddon

Gahlot, A. (n.d.). Threat Hunting for Avaddon Ransomware. Retrieved August 19, 2021.

Internal MISP references

UUID c113cde7-5dd5-45e9-af16-3ab6ed0b1728 which can be used as unique global reference for Awake Security Avaddon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-19T00:00:00Z
source MITRE
title Threat Hunting for Avaddon Ransomware

Detecting Command & Control in the Cloud

Gary Golomb. (n.d.). Threat Hunting Series: Detecting Command & Control in the Cloud. Retrieved July 8, 2022.

Internal MISP references

UUID b12e0288-48cd-46ec-8305-0f4d050782f2 which can be used as unique global reference for Detecting Command & Control in the Cloud in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-08T00:00:00Z
source MITRE
title Threat Hunting Series: Detecting Command & Control in the Cloud

Awake Security C2 Cloud

Gary Golomb and Tory Kei. (n.d.). Threat Hunting Series: Detecting Command & Control in the Cloud. Retrieved May 27, 2022.

Internal MISP references

UUID fa3762ce-3e60-4991-b464-12601d2a6912 which can be used as unique global reference for Awake Security C2 Cloud in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-27T00:00:00Z
source MITRE
title Threat Hunting Series: Detecting Command & Control in the Cloud

Threat Matrix for Kubernetes

Weizman, Y. (2020, April 2). Threat Matrix for Kubernetes. Retrieved March 30, 2021.

Internal MISP references

UUID 43fab719-e348-4902-8df3-8807765b95f0 which can be used as unique global reference for Threat Matrix for Kubernetes in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-30T00:00:00Z
date_published 2020-04-02T00:00:00Z
source MITRE
title Threat Matrix for Kubernetes

SecureWorks BRONZE MOHAWK n.d.

SecureWorks. (n.d.). Threat Profile - BRONZE MOHAWK. Retrieved August 24, 2021.

Internal MISP references

UUID b741fe9a-4b08-44b9-b6e7-5988eee486a3 which can be used as unique global reference for SecureWorks BRONZE MOHAWK n.d. in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-24T00:00:00Z
source MITRE
title Threat Profile - BRONZE MOHAWK

ESET T3 Threat Report 2021

ESET. (2022, February). THREAT REPORT T3 2021. Retrieved February 10, 2022.

Internal MISP references

UUID 34a23b22-2d39-47cc-a1e9-47f7f490dcbd which can be used as unique global reference for ESET T3 Threat Report 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-10T00:00:00Z
date_published 2022-02-01T00:00:00Z
source MITRE
title THREAT REPORT T3 2021

BlackBerry Amadey 2020

Kasuya, M. (2020, January 8). Threat Spotlight: Amadey Bot Targets Non-Russian Users. Retrieved July 14, 2022.

Internal MISP references

UUID 21b7a7c7-55a2-4235-ba11-d34ba68d1bf5 which can be used as unique global reference for BlackBerry Amadey 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-14T00:00:00Z
date_published 2020-01-08T00:00:00Z
source MITRE
title Threat Spotlight: Amadey Bot Targets Non-Russian Users

CiscoAngler

Nick Biasini. (2015, March 3). Threat Spotlight: Angler Lurking in the Domain Shadows. Retrieved March 6, 2017.

Internal MISP references

UUID 0b10d7d4-9c18-4fd8-933a-b46e41d618ab which can be used as unique global reference for CiscoAngler in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-06T00:00:00Z
date_published 2015-03-03T00:00:00Z
source MITRE
title Threat Spotlight: Angler Lurking in the Domain Shadows

Talos IPFS 2022

Edmund Brumaghin. (2022, November 9). Threat Spotlight: Cyber Criminal Adoption of IPFS for Phishing, Malware Campaigns. Retrieved March 8, 2023.

Internal MISP references

UUID dc98c7ce-0a3f-5f35-9885-6c1c73e5858d which can be used as unique global reference for Talos IPFS 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-08T00:00:00Z
date_published 2022-11-09T00:00:00Z
source MITRE
title Threat Spotlight: Cyber Criminal Adoption of IPFS for Phishing, Malware Campaigns

Cisco Group 72

Esler, J., Lee, M., and Williams, C. (2014, October 14). Threat Spotlight: Group 72. Retrieved January 14, 2016.

Internal MISP references

UUID b9201737-ef72-46d4-8e86-89fee5b98aa8 which can be used as unique global reference for Cisco Group 72 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-14T00:00:00Z
date_published 2014-10-14T00:00:00Z
source MITRE
title Threat Spotlight: Group 72

Talos ZxShell Oct 2014

Allievi, A., et al. (2014, October 28). Threat Spotlight: Group 72, Opening the ZxShell. Retrieved September 24, 2019.

Internal MISP references

UUID 41c20013-71b3-4957-98f0-fb919014c93e which can be used as unique global reference for Talos ZxShell Oct 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-24T00:00:00Z
date_published 2014-10-28T00:00:00Z
source MITRE
title Threat Spotlight: Group 72, Opening the ZxShell

Infinitum IT LockBit 3.0

Infinitum IT. (n.d.). Threat Spotlight: Lockbit Black 3.0 Ransomware. Retrieved May 19, 2023.

Internal MISP references

UUID 8bee2689-dfd8-45b2-b8dd-e87ab3ade0ec which can be used as unique global reference for Infinitum IT LockBit 3.0 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-19T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Threat Spotlight: Lockbit Black 3.0 Ransomware

BlackBerry SystemBC June 10 2021

The BlackBerry Research & Intelligence Team. (2021, June 10). Threat Thursday: SystemBC – a RAT in the Pipeline. Retrieved September 21, 2023.

Internal MISP references

UUID 08186ff9-6ca5-4c09-b5e7-b883eb15fdba which can be used as unique global reference for BlackBerry SystemBC June 10 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-21T00:00:00Z
date_published 2021-06-10T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Threat Thursday: SystemBC – a RAT in the Pipeline

DOJ North Korea Indictment Feb 2021

Department of Justice. (2021, February 17). Three North Korean Military Hackers Indicted in Wide-Ranging Scheme to Commit Cyberattacks and Financial Crimes Across the Globe. Retrieved June 9, 2021.

Internal MISP references

UUID d702653f-a9da-4a36-8f84-97caeb445266 which can be used as unique global reference for DOJ North Korea Indictment Feb 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-09T00:00:00Z
date_published 2021-02-17T00:00:00Z
source MITRE
title Three North Korean Military Hackers Indicted in Wide-Ranging Scheme to Commit Cyberattacks and Financial Crimes Across the Globe

Symantec Thrip June 2018

Security Response Attack Investigation Team. (2018, June 19). Thrip: Espionage Group Hits Satellite, Telecoms, and Defense Companies. Retrieved July 10, 2018.

Internal MISP references

UUID 482a6946-b663-4789-a31f-83fb2132118d which can be used as unique global reference for Symantec Thrip June 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-10T00:00:00Z
date_published 2018-06-19T00:00:00Z
source MITRE, Tidal Cyber
title Thrip: Espionage Group Hits Satellite, Telecoms, and Defense Companies

FireEye Bootkits

Andonov, D., et al. (2015, December 7). Thriving Beyond The Operating System: Financial Threat Group Targets Volume Boot Record. Retrieved May 13, 2016.

Internal MISP references

UUID 585827a8-1f03-439d-b66e-ad5290117c1b which can be used as unique global reference for FireEye Bootkits in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-05-13T00:00:00Z
date_published 2015-12-07T00:00:00Z
source MITRE
title Thriving Beyond The Operating System: Financial Threat Group Targets Volume Boot Record

SpecterOps AWS Traffic Mirroring

Luke Paine. (2020, March 11). Through the Looking Glass — Part 1. Retrieved March 17, 2022.

Internal MISP references

UUID 6ab2cfa1-230f-498e-8049-fcdd2f7296dd which can be used as unique global reference for SpecterOps AWS Traffic Mirroring in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-17T00:00:00Z
date_published 2020-03-11T00:00:00Z
source MITRE
title Through the Looking Glass — Part 1

Ossmann Star Feb 2011

Michael Ossmann. (2011, February 17). Throwing Star LAN Tap. Retrieved March 30, 2018.

Internal MISP references

UUID 1be27354-1326-4568-b26a-d0034acecba2 which can be used as unique global reference for Ossmann Star Feb 2011 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-30T00:00:00Z
date_published 2011-02-17T00:00:00Z
source MITRE
title Throwing Star LAN Tap

Trend Micro April 05 2022

Trend Micro. (2022, April 5). Thwarting Loaders: From SocGholish to BLISTER’s LockBit Payload. Retrieved May 7, 2023.

Internal MISP references

UUID c049ac17-1fa9-42ff-9220-1ed40890dc77 which can be used as unique global reference for Trend Micro April 05 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2022-04-05T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Thwarting Loaders: From SocGholish to BLISTER’s LockBit Payload

Symantec Tick Apr 2016

DiMaggio, J. (2016, April 28). Tick cyberespionage group zeros in on Japan. Retrieved July 16, 2018.

Internal MISP references

UUID 3e29cacc-2c05-4f35-8dd1-948f8aee6713 which can be used as unique global reference for Symantec Tick Apr 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-16T00:00:00Z
date_published 2016-04-28T00:00:00Z
source MITRE
title Tick cyberespionage group zeros in on Japan

TightVNC Software Project Page

TightVNC Software. (n.d.). TightVNC Software. Retrieved July 10, 2023.

Internal MISP references

UUID e1725230-4f6c-47c5-8e30-90dfb01a75d7 which can be used as unique global reference for TightVNC Software Project Page in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-10T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title TightVNC Software

AnyRun TimeBomb

Malicious History. (2020, September 17). Time Bombs: Malware With Delayed Execution. Retrieved April 22, 2021.

Internal MISP references

UUID cd369bf9-80a8-426f-a0aa-c9745b40696c which can be used as unique global reference for AnyRun TimeBomb in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-22T00:00:00Z
date_published 2020-09-17T00:00:00Z
source MITRE
title Time Bombs: Malware With Delayed Execution

Microsoft TimeProvider

Microsoft. (n.d.). Time Provider. Retrieved March 26, 2018.

Internal MISP references

UUID cf7c1db8-6282-4ccd-9609-5a012faf70d6 which can be used as unique global reference for Microsoft TimeProvider in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-26T00:00:00Z
source MITRE
title Time Provider

API

Vishavjit Singh. (2023, June 22). TIMESTOMPING EXPLAINED ON API LEVEL. Retrieved June 20, 2024.

Internal MISP references

UUID a9513253-630f-5535-a439-cf7655f4698b which can be used as unique global reference for API in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-20T00:00:00Z
date_published 2023-06-22T00:00:00Z
source MITRE
title TIMESTOMPING EXPLAINED ON API LEVEL

Talos TinyTurla September 2021

Cisco Talos. (2021, September 21). TinyTurla - Turla deploys new malware to keep a secret backdoor on victim machines. Retrieved December 2, 2021.

Internal MISP references

UUID 94cdbd73-a31a-4ec3-aa36-de3ea077c1c7 which can be used as unique global reference for Talos TinyTurla September 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-12-02T00:00:00Z
date_published 2021-09-21T00:00:00Z
source MITRE
title TinyTurla - Turla deploys new malware to keep a secret backdoor on victim machines

Kaspersky ToddyCat Check Logs October 2023

Dedola, G. et al. (2023, October 12). ToddyCat: Keep calm and check logs. Retrieved January 3, 2024.

Internal MISP references

UUID dbdaf320-eada-5bbb-95ab-aaa987ed7960 which can be used as unique global reference for Kaspersky ToddyCat Check Logs October 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-03T00:00:00Z
date_published 2023-10-12T00:00:00Z
source MITRE
title ToddyCat: Keep calm and check logs

Mandiant_UNC2165

Mandiant Intelligence. (2022, June 2). To HADES and Back: UNC2165 Shifts to LOCKBIT to Evade Sanctions. Retrieved July 29, 2024.

Internal MISP references

UUID 92e39558-cd2c-54c4-8930-aafdd2f14bca which can be used as unique global reference for Mandiant_UNC2165 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-29T00:00:00Z
date_published 2022-06-02T00:00:00Z
source MITRE
title To HADES and Back: UNC2165 Shifts to LOCKBIT to Evade Sanctions

Pentestlab Token Manipulation

netbiosX. (2017, April 3). Token Manipulation. Retrieved April 21, 2017.

Internal MISP references

UUID 243deb44-4d47-4c41-bd5d-262c4319cce5 which can be used as unique global reference for Pentestlab Token Manipulation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-04-21T00:00:00Z
date_published 2017-04-03T00:00:00Z
source MITRE
title Token Manipulation

Token tactics

Microsoft Incident Response. (2022, November 16). Token tactics: How to prevent, detect, and respond to cloud token theft. Retrieved December 26, 2023.

Internal MISP references

UUID e254e336-2e3e-5bea-a9e9-0f42f333b894 which can be used as unique global reference for Token tactics in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-26T00:00:00Z
date_published 2022-11-16T00:00:00Z
source MITRE
title Token tactics: How to prevent, detect, and respond to cloud token theft

Langer Stuxnet

Ralph Langner. (2013, November). To Kill a Centrifuge: A Technical Analysis of What Stuxnet's Creators Tried to Achieve. Retrieved December 7, 2020.

Internal MISP references

UUID 76b99581-e94d-4e51-8110-80557474048e which can be used as unique global reference for Langer Stuxnet in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-07T00:00:00Z
date_published 2013-11-01T00:00:00Z
source MITRE
title To Kill a Centrifuge: A Technical Analysis of What Stuxnet's Creators Tried to Achieve

TrendMicro Tonto Team October 2020

Daniel Lughi, Jaromir Horejsi. (2020, October 2). Tonto Team - Exploring the TTPs of an advanced threat actor operating a large infrastructure. Retrieved October 17, 2021.

Internal MISP references

UUID 140e6b01-6b98-4f82-9455-0c84b3856b86 which can be used as unique global reference for TrendMicro Tonto Team October 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-17T00:00:00Z
date_published 2020-10-02T00:00:00Z
source MITRE
title Tonto Team - Exploring the TTPs of an advanced threat actor operating a large infrastructure

Google Israel-Hamas War February 14 2024

Sandra Joyce, Shane Huntley. (2024, February 14). Tool of First Resort: Israel-Hamas War in Cyber. Retrieved August 30, 2024.

Internal MISP references

UUID 55290507-e007-4366-9116-bbad364c14f3 which can be used as unique global reference for Google Israel-Hamas War February 14 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-30T00:00:00Z
date_published 2024-02-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Tool of First Resort: Israel-Hamas War in Cyber

NorthSec 2015 GData Uroburos Tools

Rascagneres, P. (2015, May). Tools used by the Uroburos actors. Retrieved August 18, 2016.

Internal MISP references

UUID 99e2709e-a32a-4fbf-a20a-ffcdd8befdc8 which can be used as unique global reference for NorthSec 2015 GData Uroburos Tools in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-08-18T00:00:00Z
date_published 2015-05-01T00:00:00Z
source MITRE
title Tools used by the Uroburos actors

TrustedSec OOB Communications

Tyler Hudak. (2022, December 29). To OOB, or Not to OOB?: Why Out-of-Band Communications are Essential for Incident Response. Retrieved August 30, 2024.

Internal MISP references

UUID 65b7db0a-1aeb-545b-af65-b40d043f3502 which can be used as unique global reference for TrustedSec OOB Communications in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-30T00:00:00Z
date_published 2022-12-29T00:00:00Z
source MITRE
title To OOB, or Not to OOB?: Why Out-of-Band Communications are Essential for Incident Response

Cider Security Top 10 CICD Security Risks

Daniel Krivelevich and Omer Gil. (n.d.). Top 10 CI/CD Security Risks. Retrieved March 24, 2024.

Internal MISP references

UUID 512974b7-b464-52af-909a-2cb880b524e5 which can be used as unique global reference for Cider Security Top 10 CICD Security Risks in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-24T00:00:00Z
source MITRE
title Top 10 CI/CD Security Risks

Dingledine Tor The Second-Generation Onion Router

Roger Dingledine, Nick Mathewson and Paul Syverson. (2004). Tor: The Second-Generation Onion Router. Retrieved December 21, 2017.

Internal MISP references

UUID ffb6a26d-2da9-4cce-bb2d-5280e9cc16b4 which can be used as unique global reference for Dingledine Tor The Second-Generation Onion Router in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-21T00:00:00Z
date_published 2004-01-01T00:00:00Z
source MITRE
title Tor: The Second-Generation Onion Router

Symantec Tortoiseshell 2019

Symantec Threat Hunter Team. (2019, September 18). Tortoiseshell Group Targets IT Providers in Saudi Arabia in Probable Supply Chain Attacks. Retrieved May 20, 2024.

Internal MISP references

UUID 2565fe82-5082-5032-8424-03ce7ccb1936 which can be used as unique global reference for Symantec Tortoiseshell 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-20T00:00:00Z
date_published 2019-09-18T00:00:00Z
source MITRE
title Tortoiseshell Group Targets IT Providers in Saudi Arabia in Probable Supply Chain Attacks

FireEye FIN7 Shim Databases

Erickson, J., McWhirt, M., Palombo, D. (2017, May 3). To SDB, Or Not To SDB: FIN7 Leveraging Shim Databases for Persistence. Retrieved July 18, 2017.

Internal MISP references

UUID 25d8bac0-9187-45db-ad96-c7bce20cef00 which can be used as unique global reference for FireEye FIN7 Shim Databases in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-18T00:00:00Z
date_published 2017-05-03T00:00:00Z
source MITRE
title To SDB, Or Not To SDB: FIN7 Leveraging Shim Databases for Persistence

ESET Turla Lunar toolset May 2024

Jurčacko, F. (2024, May 15). To the Moon and back(doors): Lunar landing in diplomatic missions. Retrieved June 26, 2024.

Internal MISP references

UUID 85040d41-b786-5b63-a510-976bc35e8fce which can be used as unique global reference for ESET Turla Lunar toolset May 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-26T00:00:00Z
date_published 2024-05-15T00:00:00Z
source MITRE
title To the Moon and back(doors): Lunar landing in diplomatic missions

LOLBAS Tracker

LOLBAS. (n.d.). Tracker.exe. Retrieved July 31, 2019.

Internal MISP references

UUID f0e368f1-3347-41ef-91fb-995c3cb07707 which can be used as unique global reference for LOLBAS Tracker in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-07-31T00:00:00Z
source MITRE
title Tracker.exe

BushidoToken Akira 2023

Will Thomas. (2023, September 15). Tracking Adversaries: Akira, another descendent of Conti. Retrieved February 21, 2024.

Internal MISP references

UUID 8fe09ef1-f72e-5261-b79f-5d41fad51eac which can be used as unique global reference for BushidoToken Akira 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-21T00:00:00Z
date_published 2023-09-15T00:00:00Z
source MITRE
title Tracking Adversaries: Akira, another descendent of Conti

BushidoToken Scattered Spider August 16 2023

BushidoToken. (2023, August 16). Tracking Adversaries: Scattered Spider, the BlackCat affiliate. Retrieved September 14, 2023.

Internal MISP references

UUID 621a8320-0e3c-444f-b82a-7fd4fdf9fb67 which can be used as unique global reference for BushidoToken Scattered Spider August 16 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-14T00:00:00Z
date_published 2023-08-16T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Tracking Adversaries: Scattered Spider, the BlackCat affiliate

Lateral Movement Payne

Payne, J. (2015, November 26). Tracking Lateral Movement Part One - Special Groups and Specific Service Accounts. Retrieved February 1, 2016.

Internal MISP references

UUID 5d5ca6a4-5e2f-4679-9040-b68d524778ff which can be used as unique global reference for Lateral Movement Payne in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-02-01T00:00:00Z
date_published 2015-11-26T00:00:00Z
source MITRE
title Tracking Lateral Movement Part One - Special Groups and Specific Service Accounts

Unit 42 KerrDown February 2019

Ray, V. and Hayashi, K. (2019, February 1). Tracking OceanLotus’ new Downloader, KerrDown. Retrieved October 1, 2021.

Internal MISP references

UUID bff5dbfe-d080-46c1-82b7-272e03d2aa8c which can be used as unique global reference for Unit 42 KerrDown February 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-01T00:00:00Z
date_published 2019-02-01T00:00:00Z
source MITRE
title Tracking OceanLotus’ new Downloader, KerrDown

Trend Micro TeamTNT

Fiser, D. Oliveira, A. (n.d.). Tracking the Activities of TeamTNT A Closer Look at a Cloud-Focused Malicious Actor Group. Retrieved September 22, 2021.

Internal MISP references

UUID d6b52135-6bb2-4e37-8f94-1e1d6354bdfd which can be used as unique global reference for Trend Micro TeamTNT in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-22T00:00:00Z
source MITRE
title Tracking the Activities of TeamTNT A Closer Look at a Cloud-Focused Malicious Actor Group

Okta HAR Files Incident Notice

David Bradbury. (2023, October 20). Tracking Unauthorized Access to Okta's Support System. Retrieved December 19, 2023.

Internal MISP references

UUID 14855034-494e-477d-8c91-fc534fd7790d which can be used as unique global reference for Okta HAR Files Incident Notice in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-19T00:00:00Z
date_published 2023-10-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Tracking Unauthorized Access to Okta's Support System

SANS Windshift August 2018

Karim, T. (2018, August). TRAILS OF WINDSHIFT. Retrieved June 25, 2020.

Internal MISP references

UUID 97eac0f2-d528-4f7c-8425-7531eae4fc39 which can be used as unique global reference for SANS Windshift August 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-25T00:00:00Z
date_published 2018-08-01T00:00:00Z
source MITRE
title TRAILS OF WINDSHIFT

Microsoft TxF

Microsoft. (n.d.). Transactional NTFS (TxF). Retrieved December 20, 2017.

Internal MISP references

UUID f7f2eecc-19e6-4d93-8a53-91afea2f242e which can be used as unique global reference for Microsoft TxF in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-20T00:00:00Z
source MITRE
title Transactional NTFS (TxF)

Rclone-mega-extortion_05_2021

Justin Schoenfeld, Aaron Didier. (2021, May 4). Transferring leverage in a ransomware attack. Retrieved July 14, 2022.

Internal MISP references

UUID 9b492a2f-1326-4733-9c0e-a9454bf7fabb which can be used as unique global reference for Rclone-mega-extortion_05_2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-14T00:00:00Z
date_published 2021-05-04T00:00:00Z
source MITRE
title Transferring leverage in a ransomware attack

JScrip May 2018

Microsoft. (2018, May 31). Translating to JScript. Retrieved June 23, 2020.

Internal MISP references

UUID 99e48516-f918-477c-b85e-4ad894cc031f which can be used as unique global reference for JScrip May 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-23T00:00:00Z
date_published 2018-05-31T00:00:00Z
source MITRE
title Translating to JScript

tt_obliqueRAT

Malhotra, A., McKay, K. et al. (2021, May 13). Transparent Tribe APT expands its Windows malware arsenal . Retrieved July 29, 2022.

Internal MISP references

UUID be1e3092-1981-457b-ae76-b55b057e1d73 which can be used as unique global reference for tt_obliqueRAT in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-29T00:00:00Z
date_published 2021-05-13T00:00:00Z
source MITRE
title Transparent Tribe APT expands its Windows malware arsenal

Talos Transparent Tribe May 2021

Malhotra, A. et al. (2021, May 13). Transparent Tribe APT expands its Windows malware arsenal. Retrieved September 2, 2021.

Internal MISP references

UUID 5d58c285-bc7d-4a8a-a96a-ac7118c1089d which can be used as unique global reference for Talos Transparent Tribe May 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-02T00:00:00Z
date_published 2021-05-13T00:00:00Z
source MITRE, Tidal Cyber
title Transparent Tribe APT expands its Windows malware arsenal

Cisco Talos Transparent Tribe Education Campaign July 2022

N. Baisini. (2022, July 13). Transparent Tribe begins targeting education sector in latest campaign. Retrieved September 22, 2022.

Internal MISP references

UUID acb10fb6-608f-44d3-9faf-7e577b0e2786 which can be used as unique global reference for Cisco Talos Transparent Tribe Education Campaign July 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-22T00:00:00Z
date_published 2022-07-13T00:00:00Z
source MITRE
title Transparent Tribe begins targeting education sector in latest campaign

tt_httrack_fake_domains

Malhotra, A., Thattil, J. et al. (2022, March 29). Transparent Tribe campaign uses new bespoke malware to target Indian government officials . Retrieved September 6, 2022.

Internal MISP references

UUID 9bdda422-dbf7-4b70-a7b1-9e3ad658c239 which can be used as unique global reference for tt_httrack_fake_domains in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-06T00:00:00Z
date_published 2022-03-29T00:00:00Z
source MITRE
title Transparent Tribe campaign uses new bespoke malware to target Indian government officials

Securelist Trasparent Tribe 2020

Dedola, G. (2020, August 20). Transparent Tribe: Evolution analysis, part 1. Retrieved April 1, 2021.

Internal MISP references

UUID 0db470b1-ab22-4b67-a858-472e4de7c6f0 which can be used as unique global reference for Securelist Trasparent Tribe 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-01T00:00:00Z
date_published 2020-08-20T00:00:00Z
source MITRE
title Transparent Tribe: Evolution analysis, part 1

Kaspersky Transparent Tribe August 2020

Dedola, G. (2020, August 20). Transparent Tribe: Evolution analysis, part 1. Retrieved September 2, 2021.

Internal MISP references

UUID 42c7faa2-f664-4e4a-9d23-93c88a09da5b which can be used as unique global reference for Kaspersky Transparent Tribe August 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-02T00:00:00Z
date_published 2020-08-20T00:00:00Z
source MITRE, Tidal Cyber
title Transparent Tribe: Evolution analysis, part 1

Microsoft TransportAgent Jun 2016

Microsoft. (2016, June 1). Transport agents. Retrieved June 24, 2019.

Internal MISP references

UUID 16ae3e7e-5f0d-4ca9-8453-be960b2111b6 which can be used as unique global reference for Microsoft TransportAgent Jun 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-24T00:00:00Z
date_published 2016-06-01T00:00:00Z
source MITRE
title Transport agents

Trap Manual

ss64. (n.d.). trap. Retrieved May 21, 2019.

Internal MISP references

UUID 143462e1-b7e8-4e18-9cb1-6f4f3969e891 which can be used as unique global reference for Trap Manual in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-05-21T00:00:00Z
source MITRE
title trap

Red Canary Netwire Linux 2022

TONY LAMBERT. (2022, June 7). Trapping the Netwire RAT on Linux. Retrieved September 28, 2023.

Internal MISP references

UUID 6d4c6c52-38ae-52f5-b438-edeceed446a5 which can be used as unique global reference for Red Canary Netwire Linux 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-28T00:00:00Z
date_published 2022-06-07T00:00:00Z
source MITRE
title Trapping the Netwire RAT on Linux

Cyberciti Trap Statements

Cyberciti. (2016, March 29). Trap statement. Retrieved May 21, 2019.

Internal MISP references

UUID 24cf5471-f327-4407-b32f-055537f3495e which can be used as unique global reference for Cyberciti Trap Statements in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-05-21T00:00:00Z
date_published 2016-03-29T00:00:00Z
source MITRE
title Trap statement

Dept. of Treasury Iran Sanctions September 2020

Dept. of Treasury. (2020, September 17). Treasury Sanctions Cyber Actors Backed by Iranian Intelligence. Retrieved December 10, 2020.

Internal MISP references

UUID 0c8ff80a-6b1d-4212-aa40-99aeef04ce05 which can be used as unique global reference for Dept. of Treasury Iran Sanctions September 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-10T00:00:00Z
date_published 2020-09-17T00:00:00Z
source MITRE
title Treasury Sanctions Cyber Actors Backed by Iranian Intelligence

Treasury EvilCorp Dec 2019

U.S. Department of Treasury. (2019, December 5). Treasury Sanctions Evil Corp, the Russia-Based Cybercriminal Group Behind Dridex Malware. Retrieved September 15, 2021.

Internal MISP references

UUID 074a52c4-26d9-4083-9349-c14e2639c1bc which can be used as unique global reference for Treasury EvilCorp Dec 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-15T00:00:00Z
date_published 2019-12-05T00:00:00Z
source MITRE
title Treasury Sanctions Evil Corp, the Russia-Based Cybercriminal Group Behind Dridex Malware

Treasury North Korean Cyber Groups September 2019

US Treasury . (2019, September 13). Treasury Sanctions North Korean State-Sponsored Malicious Cyber Groups. Retrieved September 29, 2021.

Internal MISP references

UUID 54977bb2-2929-41d7-bdea-06d39dc76174 which can be used as unique global reference for Treasury North Korean Cyber Groups September 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-29T00:00:00Z
date_published 2019-09-13T00:00:00Z
source MITRE
title Treasury Sanctions North Korean State-Sponsored Malicious Cyber Groups

Mandiant APT29 Trello

Wolfram, J. et al. (2022, April 28). Trello From the Other Side: Tracking APT29 Phishing Campaigns. Retrieved August 3, 2022.

Internal MISP references

UUID 5590bb5c-d9d1-480c-bb69-1944c1cf2431 which can be used as unique global reference for Mandiant APT29 Trello in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-03T00:00:00Z
date_published 2022-04-28T00:00:00Z
source MITRE
title Trello From the Other Side: Tracking APT29 Phishing Campaigns

Mandiant. (n.d.). Trending Evil Q1 2022. Retrieved May 18, 2023.

Internal MISP references

UUID 5643a6d5-a660-4416-a4d9-6fd4d0da74ef which can be used as unique global reference for Mandiant Trending Evil Q1 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Trending Evil Q1 2022

Trend Micro - Int SP

Trend Micro. (n.d.). Retrieved February 16, 2024.

Internal MISP references

UUID 1c21c911-11db-560c-b623-5937dc478b74 which can be used as unique global reference for Trend Micro - Int SP in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-16T00:00:00Z
source MITRE
title Trend Micro - Int SP

Malicious Chrome Extension Numbers

Jagpal, N., et al. (2015, August). Trends and Lessons from Three Years Fighting Malicious Extensions. Retrieved November 17, 2017.

Internal MISP references

UUID f34fcf1f-370e-4b6e-9cc4-7ee4075faf6e which can be used as unique global reference for Malicious Chrome Extension Numbers in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-17T00:00:00Z
date_published 2015-08-01T00:00:00Z
source MITRE
title Trends and Lessons from Three Years Fighting Malicious Extensions

Triage 23893f035f8564dfea5030b9fdd54120d96072bb

tria.ge. (n.d.). Triage 23893f035f8564dfea5030b9fdd54120d96072bb. Retrieved October 20, 2023.

Internal MISP references

UUID 3c4857e0-0318-435f-9459-bd57d83e84fe which can be used as unique global reference for Triage 23893f035f8564dfea5030b9fdd54120d96072bb in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Triage 23893f035f8564dfea5030b9fdd54120d96072bb

Triage e82c11612c0870e8175eafa8c9c5f9151d0b80d7

tria.ge. (n.d.). Triage e82c11612c0870e8175eafa8c9c5f9151d0b80d7. Retrieved October 20, 2023.

Internal MISP references

UUID fd9800c3-c556-4804-a4ea-f31c2b198dcf which can be used as unique global reference for Triage e82c11612c0870e8175eafa8c9c5f9151d0b80d7 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Triage e82c11612c0870e8175eafa8c9c5f9151d0b80d7

exatrack bpf filters passive backdoors

ExaTrack. (2022, May 11). Tricephalic Hellkeeper: a tale of a passive backdoor. Retrieved October 18, 2022.

Internal MISP references

UUID 84ffd130-97b9-4bbf-bc3e-42accdf248ce which can be used as unique global reference for exatrack bpf filters passive backdoors in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-10-18T00:00:00Z
date_published 2022-05-11T00:00:00Z
source MITRE
title Tricephalic Hellkeeper: a tale of a passive backdoor

Malwarebytes TrickBot Sep 2019

Umawing, J. (2019, September 3). TrickBot adds new trick to its arsenal: tampering with trusted texts. Retrieved June 15, 2020.

Internal MISP references

UUID 4d6d258f-a57f-4cfd-880a-1ecd98e26d9f which can be used as unique global reference for Malwarebytes TrickBot Sep 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-15T00:00:00Z
date_published 2019-09-03T00:00:00Z
source MITRE
title TrickBot adds new trick to its arsenal: tampering with trusted texts

TrendMicro Trickbot Feb 2019

Llimos, N., Pascual, C.. (2019, February 12). Trickbot Adds Remote Application Credential-Grabbing Capabilities to Its Repertoire. Retrieved March 12, 2019.

Internal MISP references

UUID c402888a-ccd1-4cbc-856c-ff0bdcb8b30b which can be used as unique global reference for TrendMicro Trickbot Feb 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-12T00:00:00Z
date_published 2019-02-12T00:00:00Z
source MITRE
title Trickbot Adds Remote Application Credential-Grabbing Capabilities to Its Repertoire

Eclypsium Trickboot December 2020

Eclypsium, Advanced Intelligence. (2020, December 1). TRICKBOT NOW OFFERS ‘TRICKBOOT’: PERSIST, BRICK, PROFIT. Retrieved March 15, 2021.

Internal MISP references

UUID ad72e27f-ae4f-425a-a4ef-c76a20382691 which can be used as unique global reference for Eclypsium Trickboot December 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-15T00:00:00Z
date_published 2020-12-01T00:00:00Z
source MITRE
title TRICKBOT NOW OFFERS ‘TRICKBOOT’: PERSIST, BRICK, PROFIT

IBM X-Force ITG23 Oct 2021

Villadsen, O., et al. (2021, October 13). Trickbot Rising - Gang Doubles Down on Infection Efforts to Amass Network Footholds. Retrieved June 15, 2023.

Internal MISP references

UUID d796e773-7335-549f-a79b-a2961f85a8ec which can be used as unique global reference for IBM X-Force ITG23 Oct 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-15T00:00:00Z
date_published 2021-10-13T00:00:00Z
source MITRE
title Trickbot Rising - Gang Doubles Down on Infection Efforts to Amass Network Footholds

Trend Micro Trickbot Nov 2018

Anthony, N., Pascual, C.. (2018, November 1). Trickbot Shows Off New Trick: Password Grabber Module. Retrieved November 16, 2018.

Internal MISP references

UUID 5504d906-579e-4b1c-8864-d811b67a25f8 which can be used as unique global reference for Trend Micro Trickbot Nov 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-16T00:00:00Z
date_published 2018-11-01T00:00:00Z
source MITRE
title Trickbot Shows Off New Trick: Password Grabber Module

Joe Sec Trickbot

Joe Security. (2020, July 13). TrickBot's new API-Hammering explained. Retrieved September 30, 2021.

Internal MISP references

UUID f5441718-3c0d-4b26-863c-24df1130b090 which can be used as unique global reference for Joe Sec Trickbot in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-30T00:00:00Z
date_published 2020-07-13T00:00:00Z
source MITRE
title TrickBot's new API-Hammering explained

Fortinet TrickBot

Bacurio Jr., F. and Salvio, J. (2018, April 9). Trickbot’s New Reconnaissance Plugin. Retrieved February 14, 2019.

Internal MISP references

UUID a5dc1702-1930-463a-a581-74cc13e66ba5 which can be used as unique global reference for Fortinet TrickBot in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-14T00:00:00Z
date_published 2018-04-09T00:00:00Z
source MITRE
title Trickbot’s New Reconnaissance Plugin

Trickbot VNC module July 2021

Ionut Illascu. (2021, July 14). Trickbot updates its VNC module for high-value targets. Retrieved September 10, 2021.

Internal MISP references

UUID 0484ddd0-5402-4300-99d4-4504591dddc0 which can be used as unique global reference for Trickbot VNC module July 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-10T00:00:00Z
date_published 2021-07-14T00:00:00Z
source MITRE
title Trickbot updates its VNC module for high-value targets

Fidelis TrickBot Oct 2016

Reaves, J. (2016, October 15). TrickBot: We Missed you, Dyre. Retrieved August 2, 2018.

Internal MISP references

UUID 839c02d1-58ec-4e25-a981-0276dbb1acc8 which can be used as unique global reference for Fidelis TrickBot Oct 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-02T00:00:00Z
date_published 2016-10-15T00:00:00Z
source MITRE
title TrickBot: We Missed you, Dyre

Bromium Ursnif Mar 2017

Holland, A. (2019, March 7). Tricks and COMfoolery: How Ursnif Evades Detection. Retrieved June 10, 2019.

Internal MISP references

UUID 04028685-b2e0-4faf-8c9d-36d1b07f09fc which can be used as unique global reference for Bromium Ursnif Mar 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-10T00:00:00Z
date_published 2019-03-07T00:00:00Z
source MITRE
title Tricks and COMfoolery: How Ursnif Evades Detection

IBM TrickBot Nov 2016

Keshet, L. (2016, November 09). Tricks of the Trade: A Deeper Look Into TrickBot’s Machinations. Retrieved August 2, 2018.

Internal MISP references

UUID 092aec63-aea0-4bc9-9c05-add89b4233ff which can be used as unique global reference for IBM TrickBot Nov 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-02T00:00:00Z
date_published 2016-11-09T00:00:00Z
source MITRE
title Tricks of the Trade: A Deeper Look Into TrickBot’s Machinations

TrendMictro Phishing

Babon, P. (2020, September 3). Tricky 'Forms' of Phishing. Retrieved October 20, 2020.

Internal MISP references

UUID 621f1c52-5f34-4293-a507-b58c4084a19b which can be used as unique global reference for TrendMictro Phishing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
date_published 2020-09-03T00:00:00Z
source MITRE
title Tricky 'Forms' of Phishing

Trimarc Detecting Password Spraying

Metcalf, S. (2018, May 6). Trimarc Research: Detecting Password Spraying with Security Event Auditing. Retrieved January 16, 2019.

Internal MISP references

UUID aadbd0a8-00f2-404b-8d02-6d36292726da which can be used as unique global reference for Trimarc Detecting Password Spraying in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-01-16T00:00:00Z
date_published 2018-05-06T00:00:00Z
source MITRE
title Trimarc Research: Detecting Password Spraying with Security Event Auditing

Emotet Deploys TrickBot

Cybereason Nocturnus. (n.d.). Triple Threat: Emotet Deploys TrickBot to Steal Data & Spread Ryuk. Retrieved November 28, 2023.

Internal MISP references

UUID 672743fe-f83a-507e-bd38-2315d7a062e0 which can be used as unique global reference for Emotet Deploys TrickBot in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-11-28T00:00:00Z
source MITRE
title Triple Threat: Emotet Deploys TrickBot to Steal Data & Spread Ryuk

Dragos TRISIS

Dragos. (2017, December 13). TRISIS Malware Analysis of Safety System Targeted Malware. Retrieved January 6, 2021.

Internal MISP references

UUID 7659f7bc-2059-4a4d-a12c-17ccd99b737a which can be used as unique global reference for Dragos TRISIS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-06T00:00:00Z
date_published 2017-12-13T00:00:00Z
source MITRE
title TRISIS Malware Analysis of Safety System Targeted Malware

FireEye TRITON 2019

Miller, S, et al. (2019, April 10). TRITON Actor TTP Profile, Custom Attack Tools, Detections, and ATT&CK Mapping. Retrieved April 16, 2019.

Internal MISP references

UUID 49c97b85-ca22-400a-9dc4-6290cc117f04 which can be used as unique global reference for FireEye TRITON 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-16T00:00:00Z
date_published 2019-04-10T00:00:00Z
source MITRE
title TRITON Actor TTP Profile, Custom Attack Tools, Detections, and ATT&CK Mapping

FireEye TEMP.Veles JSON April 2019

Miller, S., et al. (2019, April 10). TRITON Appendix C. Retrieved April 29, 2019.

Internal MISP references

UUID 491783dc-7a6b-42a6-b923-c4439117e7e4 which can be used as unique global reference for FireEye TEMP.Veles JSON April 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-29T00:00:00Z
date_published 2019-04-10T00:00:00Z
source MITRE
title TRITON Appendix C

FireEye TEMP.Veles 2018

FireEye Intelligence . (2018, October 23). TRITON Attribution: Russian Government-Owned Lab Most Likely Built Custom Intrusion Tools for TRITON Attackers. Retrieved April 16, 2019.

Internal MISP references

UUID e41151fa-ea11-43ca-9689-c65aae63a8d2 which can be used as unique global reference for FireEye TEMP.Veles 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-16T00:00:00Z
date_published 2018-10-23T00:00:00Z
source MITRE
title TRITON Attribution: Russian Government-Owned Lab Most Likely Built Custom Intrusion Tools for TRITON Attackers

Palo Alto MoonWind March 2017

Miller-Osborn, J. and Grunzweig, J.. (2017, March 30). Trochilus and New MoonWind RATs Used In Attack Against Thai Organizations. Retrieved March 30, 2017.

Internal MISP references

UUID 4f3d7a08-2cf5-49ed-8bcd-6df180f3d194 which can be used as unique global reference for Palo Alto MoonWind March 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-30T00:00:00Z
date_published 2017-03-30T00:00:00Z
source MITRE
title Trochilus and New MoonWind RATs Used In Attack Against Thai Organizations

CyberESI GTALK

CyberESI. (2011). TROJAN.GTALK. Retrieved September 12, 2024.

Internal MISP references

UUID 7952f365-1284-4461-8bc3-d8e20e38e1ba which can be used as unique global reference for CyberESI GTALK in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2011-01-01T00:00:00Z
source MITRE
title TROJAN.GTALK

Symantec Hydraq Jan 2010

Lelli, A. (2010, January 11). Trojan.Hydraq. Retrieved February 20, 2018.

Internal MISP references

UUID 2f99e508-6d0c-4590-8156-cdcadeef8ed9 which can be used as unique global reference for Symantec Hydraq Jan 2010 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-20T00:00:00Z
date_published 2010-01-11T00:00:00Z
source MITRE
title Trojan.Hydraq

Symantec Security Center Trojan.Kwampirs

Moench, B. and Aboud, E. (2016, August 23). Trojan.Kwampirs. Retrieved May 10, 2018.

Internal MISP references

UUID d6fb6b97-042c-4a66-a2ba-31c13f96a144 which can be used as unique global reference for Symantec Security Center Trojan.Kwampirs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-05-10T00:00:00Z
date_published 2016-08-23T00:00:00Z
source MITRE
title Trojan.Kwampirs

Symantec Naid June 2012

Neville, A. (2012, June 15). Trojan.Naid. Retrieved February 22, 2018.

Internal MISP references

UUID dc3c16b3-e06b-4b56-b6bd-b98a0b39df3b which can be used as unique global reference for Symantec Naid June 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-22T00:00:00Z
date_published 2012-06-15T00:00:00Z
source MITRE
title Trojan.Naid

Symantec Pasam May 2012

Mullaney, C. & Honda, H. (2012, May 4). Trojan.Pasam. Retrieved February 22, 2018.

Internal MISP references

UUID c8135017-43c5-4bde-946e-141684c29b7a which can be used as unique global reference for Symantec Pasam May 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-22T00:00:00Z
date_published 2012-05-04T00:00:00Z
source MITRE
title Trojan.Pasam

Microsoft TrojanSpy:Win32/Ursnif.gen!I Sept 2017

Microsoft. (2017, September 15). TrojanSpy:Win32/Ursnif.gen!I. Retrieved December 18, 2017.

Internal MISP references

UUID 2b0c16e3-9ea0-455e-ae01-18d9b388fea6 which can be used as unique global reference for Microsoft TrojanSpy:Win32/Ursnif.gen!I Sept 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-18T00:00:00Z
date_published 2017-09-15T00:00:00Z
source MITRE
title TrojanSpy:Win32/Ursnif.gen!I

Symantec Ushedix June 2008

Symantec. (2008, June 28). Trojan.Ushedix. Retrieved December 18, 2017.

Internal MISP references

UUID 9df2b407-df20-403b-ba1b-a681b9c74c7e which can be used as unique global reference for Symantec Ushedix June 2008 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-18T00:00:00Z
date_published 2008-06-28T00:00:00Z
source MITRE
title Trojan.Ushedix

Symantec Volgmer Aug 2014

Yagi, J. (2014, August 24). Trojan.Volgmer. Retrieved July 16, 2018.

Internal MISP references

UUID 8f5ba106-267a-4f9e-9498-04e27f509c5e which can be used as unique global reference for Symantec Volgmer Aug 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-16T00:00:00Z
date_published 2014-08-24T00:00:00Z
source MITRE
title Trojan.Volgmer

FSecure Lokibot November 2019

Kazem, M. (2019, November 25). Trojan:W32/Lokibot. Retrieved May 15, 2020.

Internal MISP references

UUID e4ed8915-8f1e-47a0-ad99-075c66fa9cd3 which can be used as unique global reference for FSecure Lokibot November 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-15T00:00:00Z
date_published 2019-11-25T00:00:00Z
source MITRE
title Trojan:W32/Lokibot

Microsoft Totbrick Oct 2017

Pornasdoro, A. (2017, October 12). Trojan:Win32/Totbrick. Retrieved September 14, 2018.

Internal MISP references

UUID 3abe861b-0e3b-458a-98cf-38450058b4a5 which can be used as unique global reference for Microsoft Totbrick Oct 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-09-14T00:00:00Z
date_published 2017-10-12T00:00:00Z
source MITRE
title Trojan:Win32/Totbrick

Ciubotariu 2014

Ciubotariu, M. (2014, January 23). Trojan.Zeroaccess.C Hidden in NTFS EA. Retrieved December 2, 2014.

Internal MISP references

UUID 8a4583fe-cf73-47ba-a4ea-3e5ef1eb51b6 which can be used as unique global reference for Ciubotariu 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-12-02T00:00:00Z
date_published 2014-01-23T00:00:00Z
source MITRE
title Trojan.Zeroaccess.C Hidden in NTFS EA

TrendMicro TROJ-FAKEAV OCT 2012

Sioting, S. (2012, October 8). TROJ_FAKEAV.GZD. Retrieved August 8, 2018.

Internal MISP references

UUID 5d9e974f-07f8-48e4-96b6-632ecb31465d which can be used as unique global reference for TrendMicro TROJ-FAKEAV OCT 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-08T00:00:00Z
date_published 2012-10-08T00:00:00Z
source MITRE
title TROJ_FAKEAV.GZD

troj_zegost

Trend Micro. (2012, October 9). TROJ_ZEGOST. Retrieved September 2, 2021.

Internal MISP references

UUID c3790ad6-704a-4076-8729-61b5df9d7983 which can be used as unique global reference for troj_zegost in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-02T00:00:00Z
date_published 2012-10-09T00:00:00Z
source MITRE
title TROJ_ZEGOST

TrendMicro Tropic Trooper May 2020

Chen, J.. (2020, May 12). Tropic Trooper’s Back: USBferry Attack Targets Air gapped Environments. Retrieved May 20, 2020.

Internal MISP references

UUID 4fbc1df0-f174-4461-817d-0baf6e947ba1 which can be used as unique global reference for TrendMicro Tropic Trooper May 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-20T00:00:00Z
date_published 2020-05-12T00:00:00Z
source MITRE, Tidal Cyber
title Tropic Trooper’s Back: USBferry Attack Targets Air gapped Environments

TrendMicro Tropic Trooper Mar 2018

Horejsi, J., et al. (2018, March 14). Tropic Trooper’s New Strategy. Retrieved November 9, 2018.

Internal MISP references

UUID 5d69d122-13bc-45c4-95ab-68283a21b699 which can be used as unique global reference for TrendMicro Tropic Trooper Mar 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-09T00:00:00Z
date_published 2018-03-14T00:00:00Z
source MITRE, Tidal Cyber
title Tropic Trooper’s New Strategy

Unit 42 Tropic Trooper Nov 2016

Ray, V. (2016, November 22). Tropic Trooper Targets Taiwanese Government and Fossil Fuel Provider With Poison Ivy. Retrieved November 9, 2018.

Internal MISP references

UUID cad84e3d-9506-44f8-bdd9-d090e6ce9b06 which can be used as unique global reference for Unit 42 Tropic Trooper Nov 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-09T00:00:00Z
date_published 2016-11-22T00:00:00Z
source MITRE
title Tropic Trooper Targets Taiwanese Government and Fossil Fuel Provider With Poison Ivy

paloalto Tropic Trooper 2016

Ray, V., et al. (2016, November 22). Tropic Trooper Targets Taiwanese Government and Fossil Fuel Provider With Poison Ivy. Retrieved December 18, 2020.

Internal MISP references

UUID 47524b17-1acd-44b1-8de5-168369fa9455 which can be used as unique global reference for paloalto Tropic Trooper 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-18T00:00:00Z
date_published 2016-11-22T00:00:00Z
source MITRE
title Tropic Trooper Targets Taiwanese Government and Fossil Fuel Provider With Poison Ivy

Microsoft Conditional Access Policy Changes

Microsoft. (2023, October 23). Troubleshooting Conditional Access policy changes. Retrieved January 2, 2024.

Internal MISP references

UUID fb9ad2ce-c6bc-584b-b42e-0e7c23e5d6cc which can be used as unique global reference for Microsoft Conditional Access Policy Changes in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-02T00:00:00Z
date_published 2023-10-23T00:00:00Z
source MITRE
title Troubleshooting Conditional Access policy changes

GitHub truffleHog

Dylan Ayrey. (2016, December 31). truffleHog. Retrieved October 19, 2020.

Internal MISP references

UUID 324a563f-55ee-49e9-9fc7-2b8e35f36875 which can be used as unique global reference for GitHub truffleHog in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
date_published 2016-12-31T00:00:00Z
source MITRE
title truffleHog

TCG Trusted Platform Module

Trusted Computing Group. (2008, April 29). Trusted Platform Module (TPM) Summary. Retrieved June 8, 2016.

Internal MISP references

UUID 51a2a2fd-7828-449d-aab5-dbcf5d37f020 which can be used as unique global reference for TCG Trusted Platform Module in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-08T00:00:00Z
date_published 2008-04-29T00:00:00Z
source MITRE
title Trusted Platform Module (TPM) Summary

Microsoft Trusts

Microsoft. (2009, October 7). Trust Technologies. Retrieved February 14, 2019.

Internal MISP references

UUID e6bfc6a8-9eea-4c65-9c2b-04749da72a92 which can be used as unique global reference for Microsoft Trusts in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-14T00:00:00Z
date_published 2009-10-07T00:00:00Z
source MITRE
title Trust Technologies

SSHjack Blackhat

Adam Boileau. (2005, August 5). Trust Transience: Post Intrusion SSH Hijacking. Retrieved December 19, 2017.

Internal MISP references

UUID 64f94126-de4c-4204-8409-d26804f32cff which can be used as unique global reference for SSHjack Blackhat in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-19T00:00:00Z
date_published 2005-08-05T00:00:00Z
source MITRE
title Trust Transience: Post Intrusion SSH Hijacking

Trend Micro Totbrick Oct 2016

Antazo, F. (2016, October 31). TSPY_TRICKLOAD.N. Retrieved September 14, 2018.

Internal MISP references

UUID d6419764-f203-4089-8b38-860c442238e7 which can be used as unique global reference for Trend Micro Totbrick Oct 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-09-14T00:00:00Z
date_published 2016-10-31T00:00:00Z
source MITRE
title TSPY_TRICKLOAD.N

Ttdinject.exe - LOLBAS Project

LOLBAS. (2020, May 12). Ttdinject.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 3146c9c9-9836-4ce5-afe6-ef8f7b4a7b9d which can be used as unique global reference for Ttdinject.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2020-05-12T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Ttdinject.exe

ttint_rat

Tu, L. Ma, Y. Ye, G. (2020, October 1). Ttint: An IoT Remote Access Trojan spread through 2 0-day vulnerabilities. Retrieved October 28, 2021.

Internal MISP references

UUID f3e60cae-3225-4800-bc15-cb46ff715061 which can be used as unique global reference for ttint_rat in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-28T00:00:00Z
date_published 2020-10-01T00:00:00Z
source MITRE
title Ttint: An IoT Remote Access Trojan spread through 2 0-day vulnerabilities

Tttracer.exe - LOLBAS Project

LOLBAS. (2019, November 5). Tttracer.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 7c88a77e-034e-4847-8bd7-1be3a684a158 which can be used as unique global reference for Tttracer.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2019-11-05T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Tttracer.exe

Invincea XTunnel

Belcher, P.. (2016, July 28). Tunnel of Gov: DNC Hack and the Russian XTunnel. Retrieved August 3, 2016.

Internal MISP references

UUID 43773784-92b8-4722-806c-4b1fc4278bb0 which can be used as unique global reference for Invincea XTunnel in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-08-03T00:00:00Z
date_published 2016-07-28T00:00:00Z
source MITRE
title Tunnel of Gov: DNC Hack and the Russian XTunnel

Sysadmins of the North April 28 2015

Jan reilink. (2015, April 28). Tunnel RDP through SSH & PuTTY. Retrieved May 25, 2023.

Internal MISP references

UUID 4fc8c559-c2a1-4834-914f-c66621b117c3 which can be used as unique global reference for Sysadmins of the North April 28 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-25T00:00:00Z
date_published 2015-04-28T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Tunnel RDP through SSH & PuTTY

ThreatGeek Derusbi Converge

Fidelis Threat Research Team. (2016, May 2). Turbo Twist: Two 64-bit Derusbi Strains Converge. Retrieved August 16, 2018.

Internal MISP references

UUID a386b614-a808-42cf-be23-658f71b31560 which can be used as unique global reference for ThreatGeek Derusbi Converge in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-16T00:00:00Z
date_published 2016-05-02T00:00:00Z
source MITRE
title Turbo Twist: Two 64-bit Derusbi Strains Converge

Mandiant Suspected Turla Campaign February 2023

Hawley, S. et al. (2023, February 2). Turla: A Galaxy of Opportunity. Retrieved May 15, 2023.

Internal MISP references

UUID d8f43a52-a59e-5567-8259-821b1b6bde43 which can be used as unique global reference for Mandiant Suspected Turla Campaign February 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-15T00:00:00Z
date_published 2023-02-02T00:00:00Z
source MITRE
title Turla: A Galaxy of Opportunity

ESET Crutch December 2020

Faou, M. (2020, December 2). Turla Crutch: Keeping the “back door” open. Retrieved December 4, 2020.

Internal MISP references

UUID 8b2f40f5-7dca-4edf-8314-a8f5bc4831b8 which can be used as unique global reference for ESET Crutch December 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-04T00:00:00Z
date_published 2020-12-02T00:00:00Z
source MITRE
title Turla Crutch: Keeping the “back door” open

ESET LightNeuron May 2019

Faou, M. (2019, May). Turla LightNeuron: One email away from remote code execution. Retrieved June 24, 2019.

Internal MISP references

UUID 679aa333-572c-44ba-b94a-606f168d1ed2 which can be used as unique global reference for ESET LightNeuron May 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-24T00:00:00Z
date_published 2019-05-01T00:00:00Z
source MITRE
title Turla LightNeuron: One email away from remote code execution

ESET Turla Mosquito May 2018

ESET Research. (2018, May 22). Turla Mosquito: A shift towards more generic tools. Retrieved July 3, 2018.

Internal MISP references

UUID d683b8a2-7f90-4ae3-b763-c25fd701dbf6 which can be used as unique global reference for ESET Turla Mosquito May 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-03T00:00:00Z
date_published 2018-05-22T00:00:00Z
source MITRE
title Turla Mosquito: A shift towards more generic tools

ESET Turla August 2018

ESET. (2018, August). Turla Outlook Backdoor: Analysis of an unusual Turla backdoor. Retrieved March 11, 2019.

Internal MISP references

UUID e725fb9d-65b9-4e3f-9930-13c2c74b7fa4 which can be used as unique global reference for ESET Turla August 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-11T00:00:00Z
date_published 2018-08-01T00:00:00Z
source MITRE
title Turla Outlook Backdoor: Analysis of an unusual Turla backdoor

Accenture HyperStack October 2020

Accenture. (2020, October). Turla uses HyperStack, Carbon, and Kazuar to compromise government entity. Retrieved December 2, 2020.

Internal MISP references

UUID 680f2a0b-f69d-48bd-93ed-20ee2f79e3f7 which can be used as unique global reference for Accenture HyperStack October 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-02T00:00:00Z
date_published 2020-10-01T00:00:00Z
source MITRE
title Turla uses HyperStack, Carbon, and Kazuar to compromise government entity

Gmail Delegation

Google. (n.d.). Turn Gmail delegation on or off. Retrieved April 1, 2022.

Internal MISP references

UUID dfd28a01-56ba-4c0c-9742-d8b1db49df06 which can be used as unique global reference for Gmail Delegation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-01T00:00:00Z
source MITRE
title Turn Gmail delegation on or off

Google Cloud Privilege Escalation

Chris Moberly. (2020, February 12). Tutorial on privilege escalation and post exploitation tactics in Google Cloud Platform environments. Retrieved April 1, 2022.

Internal MISP references

UUID 3dc4b69c-8cae-4489-8df2-5f55419fb3b1 which can be used as unique global reference for Google Cloud Privilege Escalation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-01T00:00:00Z
date_published 2020-02-12T00:00:00Z
source MITRE
title Tutorial on privilege escalation and post exploitation tactics in Google Cloud Platform environments

SSH in Windows

Microsoft. (2020, May 19). Tutorial: SSH in Windows Terminal. Retrieved July 26, 2021.

Internal MISP references

UUID 3006af23-b802-400f-841d-7eea7d748d28 which can be used as unique global reference for SSH in Windows in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-07-26T00:00:00Z
date_published 2020-05-19T00:00:00Z
source MITRE
title Tutorial: SSH in Windows Terminal

Microsoft NEODYMIUM Dec 2016

Microsoft. (2016, December 14). Twin zero-day attacks: PROMETHIUM and NEODYMIUM target individuals in Europe. Retrieved November 27, 2017.

Internal MISP references

UUID 87c9f8e4-f8d1-4f19-86ca-6fd18a33890b which can be used as unique global reference for Microsoft NEODYMIUM Dec 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-27T00:00:00Z
date_published 2016-12-14T00:00:00Z
source MITRE, Tidal Cyber
title Twin zero-day attacks: PROMETHIUM and NEODYMIUM target individuals in Europe

Twitter Richard WMIC

Ackroyd, R. (2023, March 24). Twitter. Retrieved September 12, 2024.

Internal MISP references

UUID 7d701a8e-6816-5112-ac16-b36e71d7c5db which can be used as unique global reference for Twitter Richard WMIC in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2023-03-24T00:00:00Z
source MITRE
title Twitter

Twitter Nick Carr APT10

Carr, N.. (2017, April 6). Retrieved September 12, 2024.

Internal MISP references

UUID 0f133f2c-3b02-4b3b-a960-ef6a7862cf8f which can be used as unique global reference for Twitter Nick Carr APT10 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
source MITRE
title Twitter Nick Carr APT10

Crowdstrike KRYPTONITE PANDA August 2018

Adam Kozy. (2018, August 30). Two Birds, One Stone Panda. Retrieved August 24, 2021.

Internal MISP references

UUID 42fe94f5-bc4c-4b0b-9c35-0bc32cbc5d79 which can be used as unique global reference for Crowdstrike KRYPTONITE PANDA August 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-24T00:00:00Z
date_published 2018-08-30T00:00:00Z
source MITRE
title Two Birds, One Stone Panda

Two New Monero Malware Attacks Target Windows and Android Users

Douglas Bonderud. (2018, September 17). Two New Monero Malware Attacks Target Windows and Android Users. Retrieved June 5, 2023.

Internal MISP references

UUID a797397b-2af7-58b9-b66a-5ded260659f0 which can be used as unique global reference for Two New Monero Malware Attacks Target Windows and Android Users in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-05T00:00:00Z
date_published 2018-09-17T00:00:00Z
source MITRE
title Two New Monero Malware Attacks Target Windows and Android Users

Anonymous Sudan Indictment October 16 2024

U.S. Attorney's Office Central District of California. (2024, October 16). Two Sudanese Nationals Indicted for Alleged Role in Anonymous Sudan Cyberattacks. Retrieved October 18, 2024.

Internal MISP references

UUID 9ee58ce9-b201-4494-a071-7a82571e05fd which can be used as unique global reference for Anonymous Sudan Indictment October 16 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-18T00:00:00Z
date_published 2024-10-16T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Two Sudanese Nationals Indicted for Alleged Role in Anonymous Sudan Cyberattacks

Trend Micro Pawn Storm April 2017

Hacquebord, F.. (2017, April 25). Two Years of Pawn Storm: Examining an Increasingly Relevant Threat. Retrieved May 3, 2017.

Internal MISP references

UUID d92f22a7-7753-47da-a850-00c073b5fd27 which can be used as unique global reference for Trend Micro Pawn Storm April 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-05-03T00:00:00Z
date_published 2017-04-25T00:00:00Z
source MITRE
title Two Years of Pawn Storm: Examining an Increasingly Relevant Threat

Tyler McLellan UNC2190 September 26 2024

tylabs. (2024, September 26). Tyler McLellan UNC2190 Tweet. Retrieved October 3, 2024.

Internal MISP references

UUID 32298444-284a-4991-ba3b-a80bd62be903 which can be used as unique global reference for Tyler McLellan UNC2190 September 26 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-03T00:00:00Z
date_published 2024-09-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Tyler McLellan UNC2190 Tweet

CERT-UA WinterVivern 2023

CERT-UA. (2023, February 1). UAC-0114 aka Winter Vivern to target Ukrainian and Polish GOV entities (CERT-UA#5909). Retrieved July 29, 2024.

Internal MISP references

UUID d82e5170-b9be-5a60-a2a1-8df658740639 which can be used as unique global reference for CERT-UA WinterVivern 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-29T00:00:00Z
date_published 2023-02-01T00:00:00Z
source MITRE
title UAC-0114 aka Winter Vivern to target Ukrainian and Polish GOV entities (CERT-UA#5909)

Almond COR_PROFILER Apr 2019

Almond. (2019, April 30). UAC bypass via elevated .NET applications. Retrieved June 24, 2020.

Internal MISP references

UUID a49c5870-2a48-4cd7-8b4e-e80c5414f565 which can be used as unique global reference for Almond COR_PROFILER Apr 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-24T00:00:00Z
date_published 2019-04-30T00:00:00Z
source MITRE
title UAC bypass via elevated .NET applications

Github UACMe

UACME Project. (2016, June 16). UACMe. Retrieved July 26, 2016.

Internal MISP references

UUID 7006d59d-3b61-4030-a680-5dac52133722 which can be used as unique global reference for Github UACMe in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-07-26T00:00:00Z
date_published 2016-06-16T00:00:00Z
source MITRE
title UACMe

ZScaler SEO

Wang, J. (2018, October 17). Ubiquitous SEO Poisoning URLs. Retrieved September 30, 2022.

Internal MISP references

UUID f117cfa5-1bad-43ae-9eaa-3b9123061f93 which can be used as unique global reference for ZScaler SEO in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-30T00:00:00Z
date_published 2018-10-17T00:00:00Z
source MITRE
title Ubiquitous SEO Poisoning URLs

PaloAlto UBoatRAT Nov 2017

Hayashi, K. (2017, November 28). UBoatRAT Navigates East Asia. Retrieved January 12, 2018.

Internal MISP references

UUID 235a1129-2f35-4861-90b8-1f761d89b0f9 which can be used as unique global reference for PaloAlto UBoatRAT Nov 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-12T00:00:00Z
date_published 2017-11-28T00:00:00Z
source MITRE
title UBoatRAT Navigates East Asia

UK NSCS Russia SolarWinds April 2021

UK NCSC. (2021, April 15). UK and US call out Russia for SolarWinds compromise. Retrieved April 16, 2021.

Internal MISP references

UUID f49e6780-8caa-4c3c-8d68-47a2cc4319a1 which can be used as unique global reference for UK NSCS Russia SolarWinds April 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-16T00:00:00Z
date_published 2021-04-15T00:00:00Z
source MITRE
title UK and US call out Russia for SolarWinds compromise

UK Gov Malign RIS Activity April 2021

UK Gov. (2021, April 15). UK and US expose global campaign of malign activity by Russian intelligence services . Retrieved April 16, 2021.

Internal MISP references

UUID 7fe5a605-c33e-4d3d-b787-2d1f649bee53 which can be used as unique global reference for UK Gov Malign RIS Activity April 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-16T00:00:00Z
date_published 2021-04-15T00:00:00Z
source MITRE
title UK and US expose global campaign of malign activity by Russian intelligence services

UK Gov UK Exposes Russia SolarWinds April 2021

UK Gov. (2021, April 15). UK exposes Russian involvement in SolarWinds cyber compromise . Retrieved April 16, 2021.

Internal MISP references

UUID ffbd83d7-9d4f-42b9-adc0-eb144045aef2 which can be used as unique global reference for UK Gov UK Exposes Russia SolarWinds April 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-16T00:00:00Z
date_published 2021-04-15T00:00:00Z
source MITRE
title UK exposes Russian involvement in SolarWinds cyber compromise

UK NCSC Olympic Attacks October 2020

UK NCSC. (2020, October 19). UK exposes series of Russian cyber attacks against Olympic and Paralympic Games . Retrieved November 30, 2020.

Internal MISP references

UUID 93053f1b-917c-4573-ba20-99fcaa16a2dd which can be used as unique global reference for UK NCSC Olympic Attacks October 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-30T00:00:00Z
date_published 2020-10-19T00:00:00Z
source MITRE
title UK exposes series of Russian cyber attacks against Olympic and Paralympic Games

Cisco Ukraine Wipers January 2022

Biasini, N. et al.. (2022, January 21). Ukraine Campaign Delivers Defacement and Wipers, in Continued Escalation. Retrieved March 14, 2022.

Internal MISP references

UUID db17cc3d-9cd3-4faa-9de9-3b8fbec909c3 which can be used as unique global reference for Cisco Ukraine Wipers January 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-14T00:00:00Z
date_published 2022-01-21T00:00:00Z
source MITRE
title Ukraine Campaign Delivers Defacement and Wipers, in Continued Escalation

Symantec Ukraine Wipers February 2022

Symantec Threat Hunter Team. (2022, February 24). Ukraine: Disk-wiping Attacks Precede Russian Invasion. Retrieved March 25, 2022.

Internal MISP references

UUID 3ed4cd00-3387-4b80-bda8-0a190dc6353c which can be used as unique global reference for Symantec Ukraine Wipers February 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-25T00:00:00Z
date_published 2022-02-24T00:00:00Z
source MITRE
title Ukraine: Disk-wiping Attacks Precede Russian Invasion

Bleepingcomputer Gamardeon FSB November 2021

Toulas, B. (2018, November 4). Ukraine links members of Gamaredon hacker group to Russian FSB. Retrieved April 15, 2022.

Internal MISP references

UUID c565b025-df74-40a9-9535-b630ca06f777 which can be used as unique global reference for Bleepingcomputer Gamardeon FSB November 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-15T00:00:00Z
date_published 2018-11-04T00:00:00Z
source MITRE
title Ukraine links members of Gamaredon hacker group to Russian FSB

Leonard TAG 2023

Billy Leonard. (2023, April 19). Ukraine remains Russia’s biggest cyber focus in 2023. Retrieved March 1, 2024.

Internal MISP references

UUID 95c6ad1d-df16-5dd3-a6ef-75c1247ec5e0 which can be used as unique global reference for Leonard TAG 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-01T00:00:00Z
date_published 2023-04-19T00:00:00Z
source MITRE
title Ukraine remains Russia’s biggest cyber focus in 2023

Qualys Hermetic Wiper March 2022

Dani, M. (2022, March 1). Ukrainian Targets Hit by HermeticWiper, New Datawiper Malware. Retrieved March 25, 2022.

Internal MISP references

UUID 2b25969b-2f0b-4204-9277-596e80c4e626 which can be used as unique global reference for Qualys Hermetic Wiper March 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-25T00:00:00Z
date_published 2022-03-01T00:00:00Z
source MITRE
title Ukrainian Targets Hit by HermeticWiper, New Datawiper Malware

GitHub Ultimate AppLocker Bypass List

Moe, O. (2018, March 1). Ultimate AppLocker Bypass List. Retrieved April 10, 2018.

Internal MISP references

UUID a2fa7fb8-ddba-44cf-878f-448fb2aa6149 which can be used as unique global reference for GitHub Ultimate AppLocker Bypass List in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-10T00:00:00Z
date_published 2018-03-01T00:00:00Z
source MITRE
title Ultimate AppLocker Bypass List

Okta HAR Files RCA

David Bradbury. (2023, November 3). Unauthorized Access to Okta's Support Case Management System: Root Cause and Remediation. Retrieved December 19, 2023.

Internal MISP references

UUID 742d095c-9bd1-4f4a-8bc6-16db6d15a9f4 which can be used as unique global reference for Okta HAR Files RCA in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-19T00:00:00Z
date_published 2023-11-03T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Unauthorized Access to Okta's Support Case Management System: Root Cause and Remediation

UCF. (n.d.). Unauthorized accounts must not have the Create symbolic links user right.. Retrieved December 18, 2017.

Internal MISP references

UUID 93716db0-6f88-425c-af00-ed2e941214d3 which can be used as unique global reference for UCF STIG Symbolic Links in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-18T00:00:00Z
source MITRE
title Unauthorized accounts must not have the Create symbolic links user right.

FireEye FiveHands April 2021

McLellan, T. and Moore, J. et al. (2021, April 29). UNC2447 SOMBRAT and FIVEHANDS Ransomware: A Sophisticated Financial Threat. Retrieved June 2, 2021.

Internal MISP references

UUID 832aeb46-b248-43e8-9157-a2f56bcd1806 which can be used as unique global reference for FireEye FiveHands April 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-02T00:00:00Z
date_published 2021-04-29T00:00:00Z
source MITRE
title UNC2447 SOMBRAT and FIVEHANDS Ransomware: A Sophisticated Financial Threat

Mandiant APT29 Eye Spy Email Nov 22

Mandiant. (2022, May 2). UNC3524: Eye Spy on Your Email. Retrieved August 17, 2023.

Internal MISP references

UUID 452ca091-42b1-5bef-8a01-921c1f46bbee which can be used as unique global reference for Mandiant APT29 Eye Spy Email Nov 22 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-17T00:00:00Z
date_published 2022-05-02T00:00:00Z
source MITRE
title UNC3524: Eye Spy on Your Email

Google Cloud June 13 2024

Mandiant. (2024, June 13). UNC3944 Targets SaaS Applications . Retrieved June 17, 2024.

Internal MISP references

UUID 161423a2-165d-448f-90e9-0c53e319a125 which can be used as unique global reference for Google Cloud June 13 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-17T00:00:00Z
date_published 2024-06-13T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title UNC3944 Targets SaaS Applications

Google Cloud June 10 2024

Mandiant. (2024, June 10). UNC5537 Targets Snowflake Customer Instances for Data Theft and Extortion . Retrieved June 13, 2024.

Internal MISP references

UUID 0afe3662-b55c-4189-9c9a-2be55a9b6a70 which can be used as unique global reference for Google Cloud June 10 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-13T00:00:00Z
date_published 2024-06-10T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title UNC5537 Targets Snowflake Customer Instances for Data Theft and Extortion

Mandiant UNC961 March 23 2023

Ryan Tomcik, Rufus Brown, Josh Fleischer. (2023, March 23). UNC961 in the Multiverse of Mandiant: Three Encounters with a Financially Motivated Threat Actor. Retrieved November 1, 2023.

Internal MISP references

UUID cef19ceb-179f-4d49-acba-5ce40ab9f65e which can be used as unique global reference for Mandiant UNC961 March 23 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-11-01T00:00:00Z
date_published 2023-03-23T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title UNC961 in the Multiverse of Mandiant: Three Encounters with a Financially Motivated Threat Actor

Mandiant Uncharmed May 1 2024

Ofir Rozmann, Asli Koksal, Adrian Hernandez, Sarah Bock, Jonathan Leathery. (2024, May 1). Uncharmed: Untangling Iran's APT42 Operations. Retrieved August 30, 2024.

Internal MISP references

UUID 84c0313a-bea1-44a7-9396-8e12437852d1 which can be used as unique global reference for Mandiant Uncharmed May 1 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-30T00:00:00Z
date_published 2024-05-01T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Uncharmed: Untangling Iran's APT42 Operations

Mandiant APT42 Operations 2024

Ofir Rozmann, Asli Koksal, Adrian Hernandez, Sarah Bock, and Jonathan Leathery. (2024, May 1). Uncharmed: Untangling Iran's APT42 Operations. Retrieved May 28, 2024.

Internal MISP references

UUID 7a5d86f3-5afe-5d01-adcd-9511879207a7 which can be used as unique global reference for Mandiant APT42 Operations 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-28T00:00:00Z
date_published 2024-05-01T00:00:00Z
source MITRE
title Uncharmed: Untangling Iran's APT42 Operations

Trend Micro DRBControl February 2020

Lunghi, D. et al. (2020, February). Uncovering DRBControl. Retrieved November 12, 2021.

Internal MISP references

UUID 4dfbf26d-023b-41dd-82c8-12fe18cb10e6 which can be used as unique global reference for Trend Micro DRBControl February 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-11-12T00:00:00Z
date_published 2020-02-01T00:00:00Z
source MITRE, Tidal Cyber
title Uncovering DRBControl

Checkpoint MosesStaff Nov 2021

Checkpoint Research. (2021, November 15). Uncovering MosesStaff techniques: Ideology over Money. Retrieved August 11, 2022.

Internal MISP references

UUID d6da2849-cff0-408a-9f09-81a33fc88a56 which can be used as unique global reference for Checkpoint MosesStaff Nov 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-11T00:00:00Z
date_published 2021-11-15T00:00:00Z
source MITRE
title Uncovering MosesStaff techniques: Ideology over Money

bencane blog bashrc

Benjamin Cane. (2013, September 16). Understanding a little more about /etc/profile and /etc/bashrc. Retrieved September 25, 2024.

Internal MISP references

UUID 503a4cd6-5cfe-4cce-b363-0cf3c8bc9feb which can be used as unique global reference for bencane blog bashrc in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-25T00:00:00Z
date_published 2013-09-16T00:00:00Z
source MITRE
title Understanding a little more about /etc/profile and /etc/bashrc

Juniper DAI 2020

Juniper. (2020, September 23). Understanding and Using Dynamic ARP Inspection (DAI). Retrieved October 15, 2020.

Internal MISP references

UUID f63b099d-a316-42a1-b1ce-17f11d0f3d2e which can be used as unique global reference for Juniper DAI 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-15T00:00:00Z
date_published 2020-09-23T00:00:00Z
source MITRE
title Understanding and Using Dynamic ARP Inspection (DAI)

Understanding BumbleBee Loader The Delivery - VMRay 9 1 2023

Emre Güler Threat Researcher. (2023, September 1). Understanding BumbleBee Loader The Delivery. Retrieved February 19, 2024.

Internal MISP references

UUID ce1bddab-f63b-400f-ba49-0a06c4f5066a which can be used as unique global reference for Understanding BumbleBee Loader The Delivery - VMRay 9 1 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-19T00:00:00Z
date_published 2023-09-01T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Understanding BumbleBee Loader The Delivery

Understanding BumbleBee The malicious behavior - VMRay 9 1 2023

Emre Güler Threat Researcher. (2023, September 1). Understanding BumbleBee The malicious behavior. Retrieved February 19, 2024.

Internal MISP references

UUID b0bedc26-d075-448e-9adc-741c047a851c which can be used as unique global reference for Understanding BumbleBee The malicious behavior - VMRay 9 1 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-19T00:00:00Z
date_published 2023-09-01T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Understanding BumbleBee The malicious behavior

Google Cloud IAM Policies

Google Cloud. (2022, March 31). Understanding policies. Retrieved April 1, 2022.

Internal MISP references

UUID b23a0df2-923d-4a5d-a40c-3ae218a0be94 which can be used as unique global reference for Google Cloud IAM Policies in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-01T00:00:00Z
date_published 2022-03-31T00:00:00Z
source MITRE
title Understanding policies

Juniper Traffic Mirroring

Juniper. (n.d.). Understanding Port Mirroring on EX2200, EX3200, EX3300, EX4200, EX4500, EX4550, EX6200, and EX8200 Series Switches. Retrieved October 19, 2020.

Internal MISP references

UUID a6f62986-0b62-4316-b762-021f1bb14903 which can be used as unique global reference for Juniper Traffic Mirroring in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
source MITRE
title Understanding Port Mirroring on EX2200, EX3200, EX3300, EX4200, EX4500, EX4550, EX6200, and EX8200 Series Switches

U.S. CISA Understanding LockBit June 2023

Cybersecurity and Infrastructure Security Agency. (2023, June 14). Understanding Ransomware Threat Actors: LockBit. Retrieved June 30, 2023.

Internal MISP references

UUID 9c03b801-2ebe-4c7b-aa29-1b7a3625964a which can be used as unique global reference for U.S. CISA Understanding LockBit June 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-30T00:00:00Z
date_published 2023-06-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Understanding Ransomware Threat Actors: LockBit

Auth0 Understanding Refresh Tokens

Auth0 Inc.. (n.d.). Understanding Refresh Tokens. Retrieved December 16, 2021.

Internal MISP references

UUID 84eb3d8a-f6b1-4bb5-9411-2c8da29b5946 which can be used as unique global reference for Auth0 Understanding Refresh Tokens in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-12-16T00:00:00Z
source MITRE
title Understanding Refresh Tokens

Huntress ScreenConnect 2 19 2024

Team Huntress. (2024, February 19). Understanding the ConnectWise ScreenConnect CVE-2024-1709 & CVE-2024-1708 . Retrieved February 22, 2024.

Internal MISP references

UUID 8d08b5e2-13ed-4283-8bd2-f3d9a5d02bc5 which can be used as unique global reference for Huntress ScreenConnect 2 19 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-22T00:00:00Z
date_published 2024-02-19T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Understanding the ConnectWise ScreenConnect CVE-2024-1709 & CVE-2024-1708

baeldung Linux proc map 2022

baeldung. (2022, April 8). Understanding the Linux /proc/id/maps File. Retrieved March 31, 2023.

Internal MISP references

UUID b70d04e4-c5f9-5cb2-b896-9bd64e97369e which can be used as unique global reference for baeldung Linux proc map 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-31T00:00:00Z
date_published 2022-04-08T00:00:00Z
source MITRE
title Understanding the Linux /proc/id/maps File

Talos Phobos November 17 2023

Guilherme Venere. (2023, November 17). Understanding the Phobos affiliate structure and activity. Retrieved March 7, 2024.

Internal MISP references

UUID c049d198-efd0-40e2-a675-cf099b8211b3 which can be used as unique global reference for Talos Phobos November 17 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-07T00:00:00Z
date_published 2023-11-17T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Understanding the Phobos affiliate structure and activity

Mandiant APT44 April 17 2024

Gabby Roncone, Dan Black, John Wolfram, Tyler McLellan, Nick Simonian, Ryan Hall, Anton Prokopenkov, Luke Jenkins, Dan Perez, Lexie Aytes, Alden Wahlstrom. (2024, April 17). Unearthing APT44: Russia’s Notorious Cyber Sabotage Unit Sandworm. Retrieved April 17, 2024.

Internal MISP references

UUID a64f689e-2bb4-4253-86cd-545e7f633a7e which can be used as unique global reference for Mandiant APT44 April 17 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-17T00:00:00Z
date_published 2024-04-17T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Unearthing APT44: Russia’s Notorious Cyber Sabotage Unit Sandworm

FireEye KEGTAP SINGLEMALT October 2020

Kimberly Goody, Jeremy Kennelly, Joshua Shilko, Steve Elovitz, Douglas Bienstock. (2020, October 28). Unhappy Hour Special: KEGTAP and SINGLEMALT With a Ransomware Chaser. Retrieved October 28, 2020.

Internal MISP references

UUID 59162ffd-cb95-4757-bb1e-0c2a4ad5c083 which can be used as unique global reference for FireEye KEGTAP SINGLEMALT October 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-28T00:00:00Z
date_published 2020-10-28T00:00:00Z
source MITRE
title Unhappy Hour Special: KEGTAP and SINGLEMALT With a Ransomware Chaser

Wikipedia UEFI

Wikipedia. (2017, July 10). Unified Extensible Firmware Interface. Retrieved July 11, 2017.

Internal MISP references

UUID 681c6a57-76db-410b-82d6-4e614bcdb6e0 which can be used as unique global reference for Wikipedia UEFI in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-11T00:00:00Z
date_published 2017-07-10T00:00:00Z
source MITRE
title Unified Extensible Firmware Interface

New DragonOK

Miller-Osborn, J., Grunzweig, J.. (2015, April). Unit 42 Identifies New DragonOK Backdoor Malware Deployed Against Japanese Targets. Retrieved November 4, 2015.

Internal MISP references

UUID 82c1ed0d-a41d-4212-a3ae-a1d661bede2d which can be used as unique global reference for New DragonOK in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-11-04T00:00:00Z
date_published 2015-04-01T00:00:00Z
source MITRE
title Unit 42 Identifies New DragonOK Backdoor Malware Deployed Against Japanese Targets

Unit 42 Playbook Dec 2017

Unit 42. (2017, December 15). Unit 42 Playbook Viewer. Retrieved December 20, 2017.

Internal MISP references

UUID 9923f9ff-a7b8-4058-8213-3c83c54c10a6 which can be used as unique global reference for Unit 42 Playbook Dec 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-20T00:00:00Z
date_published 2017-12-15T00:00:00Z
source MITRE, Tidal Cyber
title Unit 42 Playbook Viewer

Unit 42 SeaDuke 2015

Grunzweig, J.. (2015, July 14). Unit 42 Technical Analysis: Seaduke. Retrieved August 3, 2016.

Internal MISP references

UUID 735d38da-9214-4141-86af-11eefa5c4d04 which can be used as unique global reference for Unit 42 SeaDuke 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-08-03T00:00:00Z
date_published 2015-07-14T00:00:00Z
source MITRE
title Unit 42 Technical Analysis: Seaduke

3OHA double-fork 2022

Juan Tapiador. (2022, April 11). UNIX daemonization and the double fork. Retrieved September 29, 2023.

Internal MISP references

UUID 521b79fe-bb7b-52fd-a899-b73e254027a5 which can be used as unique global reference for 3OHA double-fork 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-29T00:00:00Z
date_published 2022-04-11T00:00:00Z
source MITRE
title UNIX daemonization and the double fork

WhiteSnake Stealer RussianPanda July 4 2023

RussianPanda. (2023, July 4). Unleashing the Viper : A Technical Analysis of WhiteSnake Stealer. Retrieved October 14, 2024.

Internal MISP references

UUID e7b4651b-804a-47b7-bd74-341ac0e8a7a9 which can be used as unique global reference for WhiteSnake Stealer RussianPanda July 4 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-14T00:00:00Z
date_published 2023-07-04T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Unleashing the Viper : A Technical Analysis of WhiteSnake Stealer

Flashpoint Anonymous Sudan Timeline

Flashpoint. (2023, June 20). Unmasking Anonymous Sudan: Timeline of DDoS Attacks, Affiliations, and Motivations. Retrieved October 10, 2023.

Internal MISP references

UUID 2e7060d2-f7bc-457e-a2e6-12897d503ea6 which can be used as unique global reference for Flashpoint Anonymous Sudan Timeline in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-10T00:00:00Z
date_published 2023-06-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Unmasking Anonymous Sudan: Timeline of DDoS Attacks, Affiliations, and Motivations

Permiso GUI-Vil 2023

Ian Ahl. (2023, May 22). Unmasking GUI-Vil: Financially Motivated Cloud Threat Actor. Retrieved August 30, 2024.

Internal MISP references

UUID f3f16141-3420-5e72-b7d0-092bbd02f064 which can be used as unique global reference for Permiso GUI-Vil 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-30T00:00:00Z
date_published 2023-05-22T00:00:00Z
source MITRE
title Unmasking GUI-Vil: Financially Motivated Cloud Threat Actor

AADInternals Azure AD On-Prem to Cloud

Dr. Nestori Syynimaa. (2020, July 13). Unnoticed sidekick: Getting access to cloud as an on-prem admin. Retrieved September 28, 2022.

Internal MISP references

UUID 7a6a7ecd-b9c7-4371-9924-34733597556c which can be used as unique global reference for AADInternals Azure AD On-Prem to Cloud in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-28T00:00:00Z
date_published 2020-07-13T00:00:00Z
source MITRE
title Unnoticed sidekick: Getting access to cloud as an on-prem admin

Adsecurity Mimikatz Guide

Metcalf, S. (2015, November 13). Unofficial Guide to Mimikatz & Command Reference. Retrieved December 23, 2015.

Internal MISP references

UUID b251ed65-a145-4053-9dc2-bf0dad83d76c which can be used as unique global reference for Adsecurity Mimikatz Guide in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-12-23T00:00:00Z
date_published 2015-11-13T00:00:00Z
source MITRE
title Unofficial Guide to Mimikatz & Command Reference

InfoSec Write-ups 7 23 2023

Mov Eax. (2023, July 23). Unpacking Emotet Trojan. Retrieved February 27, 2024.

Internal MISP references

UUID 684835bb-7d67-440d-82c2-5f98c3e29341 which can be used as unique global reference for InfoSec Write-ups 7 23 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-27T00:00:00Z
date_published 2023-07-23T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Unpacking Emotet Trojan

Cyble Akira May 10 2023

Cybleinc. (2023, May 10). Unraveling Akira Ransomware. Retrieved February 27, 2024.

Internal MISP references

UUID 4a6cde5d-971e-4260-9ab4-777ee81d5af0 which can be used as unique global reference for Cyble Akira May 10 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-27T00:00:00Z
date_published 2023-05-10T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Unraveling Akira Ransomware

Kaspersky Lamberts Toolkit April 2017

GREAT. (2017, April 11). Unraveling the Lamberts Toolkit. Retrieved March 21, 2022.

Internal MISP references

UUID 2be23bfb-c6fb-455e-ae88-2ae910ccef60 which can be used as unique global reference for Kaspersky Lamberts Toolkit April 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-21T00:00:00Z
date_published 2017-04-11T00:00:00Z
source MITRE
title Unraveling the Lamberts Toolkit

CrowdStrike Grim Spider May 2019

John, E. and Carvey, H. (2019, May 30). Unraveling the Spiderweb: Timelining ATT&CK Artifacts Used by GRIM SPIDER. Retrieved May 12, 2020.

Internal MISP references

UUID 103f2b78-81ed-4096-a67a-dedaffd67e9b which can be used as unique global reference for CrowdStrike Grim Spider May 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-12T00:00:00Z
date_published 2019-05-30T00:00:00Z
source MITRE
title Unraveling the Spiderweb: Timelining ATT&CK Artifacts Used by GRIM SPIDER

Unregmp2.exe - LOLBAS Project

LOLBAS. (2021, December 6). Unregmp2.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 9ad11187-bf91-4205-98c7-c7b981e4ab6f which can be used as unique global reference for Unregmp2.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-12-06T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Unregmp2.exe

TrendMicro Patchwork Dec 2017

Lunghi, D., et al. (2017, December). Untangling the Patchwork Cyberespionage Group. Retrieved July 10, 2018.

Internal MISP references

UUID 15465b26-99e1-4956-8c81-cda3388169b8 which can be used as unique global reference for TrendMicro Patchwork Dec 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-10T00:00:00Z
date_published 2017-12-01T00:00:00Z
source MITRE
title Untangling the Patchwork Cyberespionage Group

Kaspersky Careto

Kaspersky Labs. (2014, February 11). Unveiling “Careto” - The Masked APT. Retrieved July 5, 2017.

Internal MISP references

UUID 547f1a4a-7e4a-461d-8c19-f4775cd60ac0 which can be used as unique global reference for Kaspersky Careto in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-05T00:00:00Z
date_published 2014-02-11T00:00:00Z
source MITRE
title Unveiling “Careto” - The Masked APT

trendmicro_redcurl

Tancio et al. (2024, March 6). Unveiling Earth Kapre aka RedCurl’s Cyberespionage Tactics With Trend Micro MDR, Threat Intelligence. Retrieved August 9, 2024.

Internal MISP references

UUID f0b8be1d-5174-5172-8a0d-1628ddd09092 which can be used as unique global reference for trendmicro_redcurl in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-09T00:00:00Z
date_published 2024-03-06T00:00:00Z
source MITRE
title Unveiling Earth Kapre aka RedCurl’s Cyberespionage Tactics With Trend Micro MDR, Threat Intelligence

NKAbuse SL

KASPERSKY GERT. (2023, December 14). Unveiling NKAbuse: a new multiplatform threat abusing the NKN protocol. Retrieved February 8, 2024.

Internal MISP references

UUID 96e199f8-1d33-574f-a507-05303db728e1 which can be used as unique global reference for NKAbuse SL in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-08T00:00:00Z
date_published 2023-12-14T00:00:00Z
source MITRE
title Unveiling NKAbuse: a new multiplatform threat abusing the NKN protocol

Cymmetria Patchwork

Cymmetria. (2016). Unveiling Patchwork - The Copy-Paste APT. Retrieved August 3, 2016.

Internal MISP references

UUID d4e43b2c-a858-4285-984f-f59db5c657bd which can be used as unique global reference for Cymmetria Patchwork in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-08-03T00:00:00Z
date_published 2016-01-01T00:00:00Z
source MITRE, Tidal Cyber
title Unveiling Patchwork - The Copy-Paste APT

Reichert aon sedexp 2024

Zachary Reichert. (2024, August 19). Unveiling "sedexp": A Stealthy Linux Malware Exploiting udev Rules. Retrieved September 26, 2024.

Internal MISP references

UUID ddcfe3d2-804f-52d1-bd9c-02bac8ad9023 which can be used as unique global reference for Reichert aon sedexp 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-26T00:00:00Z
date_published 2024-08-19T00:00:00Z
source MITRE
title Unveiling "sedexp": A Stealthy Linux Malware Exploiting udev Rules

Orange Residential Proxies

Orange Cyberdefense. (2024, March 14). Unveiling the depths of residential proxies providers. Retrieved April 11, 2024.

Internal MISP references

UUID df4b99f3-1796-57b3-a352-37be5380badc which can be used as unique global reference for Orange Residential Proxies in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-11T00:00:00Z
date_published 2024-03-14T00:00:00Z
source MITRE
title Unveiling the depths of residential proxies providers

The DFIR Report Ursnif January 2023

The DFIR Report. (2023, January 9). Unwrapping Ursnifs Gifts. Retrieved May 10, 2023.

Internal MISP references

UUID 0c017bf7-0ec7-4e45-8c20-7db284c4a51e which can be used as unique global reference for The DFIR Report Ursnif January 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-10T00:00:00Z
date_published 2023-01-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Unwrapping Ursnifs Gifts

Rapid7G20Espionage

Rapid7. (2013, August 26). Upcoming G20 Summit Fuels Espionage Operations. Retrieved March 6, 2017.

Internal MISP references

UUID 2235ff2a-07b8-4198-b91d-e50739e274f4 which can be used as unique global reference for Rapid7G20Espionage in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-06T00:00:00Z
date_published 2013-08-26T00:00:00Z
source MITRE
title Upcoming G20 Summit Fuels Espionage Operations

Unit 42 BackConfig May 2020

Hinchliffe, A. and Falcone, R. (2020, May 11). Updated BackConfig Malware Targeting Government and Military Organizations in South Asia. Retrieved June 17, 2020.

Internal MISP references

UUID f26629db-c641-4b6b-abbf-b55b9cc91cf1 which can be used as unique global reference for Unit 42 BackConfig May 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-17T00:00:00Z
date_published 2020-05-11T00:00:00Z
source MITRE
title Updated BackConfig Malware Targeting Government and Military Organizations in South Asia

Secureworks Karagany July 2019

Secureworks. (2019, July 24). Updated Karagany Malware Targets Energy Sector. Retrieved August 12, 2020.

Internal MISP references

UUID 61c05edf-24aa-4399-8cdf-01d27f6595a1 which can be used as unique global reference for Secureworks Karagany July 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-12T00:00:00Z
date_published 2019-07-24T00:00:00Z
source MITRE
title Updated Karagany Malware Targets Energy Sector

Update.exe - LOLBAS Project

LOLBAS. (2019, June 26). Update.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 2c85d5e5-2cb2-4af7-8c33-8aaac3360706 which can be used as unique global reference for Update.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2019-06-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Update.exe

GuidePoint Security INC Ransomware August 14 2024

Rui Ataide, Hermes Bojaxhi. (2024, August 14). Update from the Ransomware Trenches. Retrieved October 4, 2024.

Internal MISP references

UUID 414ff729-ba51-4c5a-a4ac-027e0d3c14df which can be used as unique global reference for GuidePoint Security INC Ransomware August 14 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-04T00:00:00Z
date_published 2024-08-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Update from the Ransomware Trenches

FBI SVR Update October 10 2024

U.S. Federal Bureau of Investigation. (2024, October 10). Update on SVR Cyber Operations and Vulnerability Exploitation. Retrieved October 14, 2024.

Internal MISP references

UUID 63a76e88-2cd1-4cfa-bd96-4c1c3eebb39b which can be used as unique global reference for FBI SVR Update October 10 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-14T00:00:00Z
date_published 2024-10-10T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Update on SVR Cyber Operations and Vulnerability Exploitation

Microsoft - Update or Repair Federated domain

Microsoft. (2020, September 14). Update or repair the settings of a federated domain in Office 365, Azure, or Intune. Retrieved December 30, 2020.

Internal MISP references

UUID 1db3856e-d581-42e6-8038-44b0a2a2b435 which can be used as unique global reference for Microsoft - Update or Repair Federated domain in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-30T00:00:00Z
date_published 2020-09-14T00:00:00Z
source MITRE
title Update or repair the settings of a federated domain in Office 365, Azure, or Intune

Trendmicro Evolving ThiefQuest 2020

Gabrielle Joyce Mabutas, Luis Magisa, Steven Du. (2020, July 17). Updates on Quickly-Evolving ThiefQuest macOS Malware. Retrieved April 26, 2021.

Internal MISP references

UUID 880c1b9e-55a1-404c-9754-1fc2ee30a72b which can be used as unique global reference for Trendmicro Evolving ThiefQuest 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-26T00:00:00Z
date_published 2020-07-17T00:00:00Z
source MITRE
title Updates on Quickly-Evolving ThiefQuest macOS Malware

AWS Update Trail

AWS. (n.d.). update-trail. Retrieved August 4, 2023.

Internal MISP references

UUID a94e1e4a-2963-5563-a8a6-ab9f64a86476 which can be used as unique global reference for AWS Update Trail in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-04T00:00:00Z
source MITRE
title update-trail

Unit 42 Pirpi July 2015

Falcone, R., Wartell, R.. (2015, July 27). UPS: Observations on CVE-2015-3113, Prior Zero-Days and the Pirpi Payload. Retrieved April 23, 2019.

Internal MISP references

UUID 42d35b93-2866-46d8-b8ff-675df05db9db which can be used as unique global reference for Unit 42 Pirpi July 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-23T00:00:00Z
date_published 2015-07-27T00:00:00Z
source MITRE
title UPS: Observations on CVE-2015-3113, Prior Zero-Days and the Pirpi Payload

PaperCut MF/NG vulnerability bulletin

PaperCut. (2023, March 8). URGENT MF/NG vulnerability bulletin (March 2023) | PaperCut. Retrieved August 3, 2023.

Internal MISP references

UUID d6e71b45-fc91-40f4-8201-2186994ae42a which can be used as unique global reference for PaperCut MF/NG vulnerability bulletin in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-03T00:00:00Z
date_published 2023-03-08T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title URGENT MF/NG vulnerability bulletin (March 2023)

URI Use

Nathan McFeters. Billy Kim Rios. Rob Carter.. (2008). URI Use and Abuse. Retrieved February 9, 2024.

Internal MISP references

UUID 8d0aea35-c1af-5dda-a4c9-814f0e9c9334 which can be used as unique global reference for URI Use in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-09T00:00:00Z
date_published 2008-01-01T00:00:00Z
source MITRE
title URI Use and Abuse

Url.dll - LOLBAS Project

LOLBAS. (2018, May 25). Url.dll. Retrieved December 4, 2023.

Internal MISP references

UUID 0c88fb72-6be5-4a01-af1c-553650779253 which can be used as unique global reference for Url.dll - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Url.dll

SCILabs Malteiro Threat Overlap 2023

SCILabs. (2023, October 8). URSA/Mispadu: Overlap analysis with other threats. Retrieved March 13, 2024.

Internal MISP references

UUID ed4aab9c-6b94-593b-b81e-47393197ee48 which can be used as unique global reference for SCILabs Malteiro Threat Overlap 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-13T00:00:00Z
date_published 2023-10-08T00:00:00Z
source MITRE
title URSA/Mispadu: Overlap analysis with other threats

NJCCIC Ursnif Sept 2016

NJCCIC. (2016, September 27). Ursnif. Retrieved September 12, 2024.

Internal MISP references

UUID d57a2efe-8c98-491e-aecd-e051241a1779 which can be used as unique global reference for NJCCIC Ursnif Sept 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2016-09-27T00:00:00Z
source MITRE
title Ursnif

TrendMicro Ursnif Mar 2015

Caragay, R. (2015, March 26). URSNIF: The Multifaceted Malware. Retrieved June 5, 2019.

Internal MISP references

UUID d02287df-9d93-4cbe-8e59-8f4ef3debc65 which can be used as unique global reference for TrendMicro Ursnif Mar 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-05T00:00:00Z
date_published 2015-03-26T00:00:00Z
source MITRE
title URSNIF: The Multifaceted Malware

Proofpoint August 29 2016

Proofpoint. (2016, August 29). Ursnif Variant Dreambot Adds Tor Functionality | Proofpoint. Retrieved May 11, 2023.

Internal MISP references

UUID f05ecd1b-7844-4920-8c3a-0b30ff126ac9 which can be used as unique global reference for Proofpoint August 29 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-11T00:00:00Z
date_published 2016-08-29T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Ursnif Variant Dreambot Adds Tor Functionality

Bleeping Computer US Cellular Hack 2022

Sergiu Gatlan. (2022, January 4). UScellular discloses data breach after billing system hack. Retrieved July 1, 2024.

Internal MISP references

UUID d7befaea-1b35-54c3-a086-83b490f6a0a1 which can be used as unique global reference for Bleeping Computer US Cellular Hack 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-01T00:00:00Z
date_published 2022-01-04T00:00:00Z
source MITRE
title UScellular discloses data breach after billing system hack

US Coast Guard Killnet August 17 2022

US Coast Guard Cyber Command. (2022, August 17). US Coast Guard Cyber Command Maritime Cyber Alert 03-22. Retrieved October 9, 2023.

Internal MISP references

UUID 2d2a6f76-9531-4b35-b247-ae5da8663a92 which can be used as unique global reference for US Coast Guard Killnet August 17 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-09T00:00:00Z
date_published 2022-08-17T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title US Coast Guard Cyber Command Maritime Cyber Alert 03-22

USCYBERCOM SLOTHFULMEDIA October 2020

USCYBERCOM. (2020, October 1). USCYBERCOM Cybersecurity Alert SLOTHFULMEDIA. Retrieved September 12, 2024.

Internal MISP references

UUID 600de668-f128-4368-8667-24ed9a9db47a which can be used as unique global reference for USCYBERCOM SLOTHFULMEDIA October 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2020-10-01T00:00:00Z
source MITRE
title USCYBERCOM Cybersecurity Alert SLOTHFULMEDIA

U.S. Justice Department Hive January 2023

Office of Public Affairs. (2023, January 26). U.S. Department of Justice Disrupts Hive Ransomware Variant. Retrieved June 18, 2024.

Internal MISP references

UUID 81bd5579-6a8a-40d2-b7b7-5cdb879ebdf0 which can be used as unique global reference for U.S. Justice Department Hive January 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-18T00:00:00Z
date_published 2023-01-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title U.S. Department of Justice Disrupts Hive Ransomware Variant

win10_asr

Microsoft. (2021, July 2). Use attack surface reduction rules to prevent malware infection. Retrieved June 24, 2021.

Internal MISP references

UUID 4499df4a-53c2-4f17-ac90-b99272f5f522 which can be used as unique global reference for win10_asr in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-24T00:00:00Z
date_published 2021-07-02T00:00:00Z
source MITRE
title Use attack surface reduction rules to prevent malware infection

Azure AD Conditional Access Exclusions

Microsoft. (2022, August 26). Use Azure AD access reviews to manage users excluded from Conditional Access policies. Retrieved August 30, 2022.

Internal MISP references

UUID 8cfb45ec-b660-4a3a-9175-af4ea01ef473 which can be used as unique global reference for Azure AD Conditional Access Exclusions in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-30T00:00:00Z
date_published 2022-08-26T00:00:00Z
source MITRE
title Use Azure AD access reviews to manage users excluded from Conditional Access policies

Docker Bind Mounts

Docker. (n.d.). Use Bind Mounts. Retrieved March 30, 2021.

Internal MISP references

UUID b298b3d1-30c1-4894-b1de-be11812cde6b which can be used as unique global reference for Docker Bind Mounts in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-30T00:00:00Z
source MITRE
title Use Bind Mounts

Chrome Roaming Profiles

Chrome Enterprise and Education Help. (n.d.). Use Chrome Browser with Roaming User Profiles. Retrieved March 28, 2023.

Internal MISP references

UUID cf0bb77d-c7f7-515b-9217-ba9120cdddec which can be used as unique global reference for Chrome Roaming Profiles in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-28T00:00:00Z
source MITRE
title Use Chrome Browser with Roaming User Profiles

Ars Technica GRU indictment Jul 2018

Gallagher, S. (2018, July 27). How they did it (and will likely try again): GRU hackers vs. US elections. Retrieved September 13, 2018.

Internal MISP references

UUID a1192cb3-4536-4900-93c7-a127ca06c690 which can be used as unique global reference for Ars Technica GRU indictment Jul 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-09-13T00:00:00Z
source MITRE
title US elections

Remote Management MDM macOS

Apple. (n.d.). Use MDM to enable Remote Management in macOS. Retrieved September 23, 2021.

Internal MISP references

UUID e5f59848-7014-487d-9bae-bed81af1b72b which can be used as unique global reference for Remote Management MDM macOS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-23T00:00:00Z
source MITRE
title Use MDM to enable Remote Management in macOS

Securelist Denis April 2017

Shulmin, A., Yunakovsky, S. (2017, April 28). Use of DNS Tunneling for C&C Communications. Retrieved November 5, 2018.

Internal MISP references

UUID 07855a81-1b72-4361-917e-a413b0124eca which can be used as unique global reference for Securelist Denis April 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-05T00:00:00Z
date_published 2017-04-28T00:00:00Z
source MITRE
title Use of DNS Tunneling for C&C Communications

Microsoft UAC

Microsoft. (n.d.). User Account Control. Retrieved January 18, 2018.

Internal MISP references

UUID 2eb2fb2f-0b43-4c8c-a69f-3f76a8fd90f3 which can be used as unique global reference for Microsoft UAC in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-18T00:00:00Z
source MITRE
title User Account Control

TechNet Inside UAC

Russinovich, M. (2009, July). User Account Control: Inside Windows 7 User Account Control. Retrieved July 26, 2016.

Internal MISP references

UUID dea47af6-677a-4625-8664-adf0e6839c9f which can be used as unique global reference for TechNet Inside UAC in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-07-26T00:00:00Z
date_published 2009-07-01T00:00:00Z
source MITRE
title User Account Control: Inside Windows 7 User Account Control

User Approved Kernel Extension Pike’s

Pikeralpha. (2017, August 29). User Approved Kernel Extension Loading…. Retrieved September 23, 2021.

Internal MISP references

UUID 7700928b-2d27-470c-a2d9-e5c5f9a43af3 which can be used as unique global reference for User Approved Kernel Extension Pike’s in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-23T00:00:00Z
date_published 2017-08-29T00:00:00Z
source MITRE
title User Approved Kernel Extension Loading…

Adlice Software IAT Hooks Oct 2014

Tigzy. (2014, October 15). Userland Rootkits: Part 1, IAT hooks. Retrieved December 12, 2017.

Internal MISP references

UUID 9a0e7054-9239-43cd-8e5f-aac8b665be72 which can be used as unique global reference for Adlice Software IAT Hooks Oct 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-12T00:00:00Z
date_published 2014-10-15T00:00:00Z
source MITRE
title Userland Rootkits: Part 1, IAT hooks

Linux Usermod

Man7. (n.d.). Usermod. Retrieved August 5, 2024.

Internal MISP references

UUID e2b4b672-4828-56eb-95eb-2abfbf7f9195 which can be used as unique global reference for Linux Usermod in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-05T00:00:00Z
source MITRE
title Usermod

cisco_username_cmd

Cisco. (2023, March 6). username - Cisco IOS Security Command Reference: Commands S to Z. Retrieved July 13, 2022.

Internal MISP references

UUID 8e7b99d7-ad94-5802-a1ee-6334842e7e0b which can be used as unique global reference for cisco_username_cmd in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-13T00:00:00Z
date_published 2023-03-06T00:00:00Z
source MITRE
title username - Cisco IOS Security Command Reference: Commands S to Z

Jamf User Password Policies

Holland, J. (2016, January 25). User password policies on non AD machines. Retrieved April 5, 2018.

Internal MISP references

UUID aa3846fd-a307-4be5-a487-9aa2688d5816 which can be used as unique global reference for Jamf User Password Policies in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-05T00:00:00Z
date_published 2016-01-25T00:00:00Z
source MITRE
title User password policies on non AD machines

MacOS Email Rules

Apple. (n.d.). Use rules to manage emails you receive in Mail on Mac. Retrieved June 14, 2021.

Internal MISP references

UUID f83283aa-3aaf-4ebd-8503-0d84c2c627c4 which can be used as unique global reference for MacOS Email Rules in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-14T00:00:00Z
source MITRE
title Use rules to manage emails you receive in Mail on Mac

Microsoft 365 Sharing Auditing

Microsoft. (2023, October 1). Use sharing auditing in the audit log. Retrieved March 4, 2024.

Internal MISP references

UUID f45d4d73-31b5-557d-b734-f5c186a2e31c which can be used as unique global reference for Microsoft 365 Sharing Auditing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-04T00:00:00Z
date_published 2023-10-01T00:00:00Z
source MITRE
title Use sharing auditing in the audit log

Kickstart Apple Remote Desktop commands

Apple. (n.d.). Use the kickstart command-line utility in Apple Remote Desktop. Retrieved September 23, 2021.

Internal MISP references

UUID f26542dd-aa61-4d2a-a05a-8f9674b49f82 which can be used as unique global reference for Kickstart Apple Remote Desktop commands in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-23T00:00:00Z
source MITRE
title Use the kickstart command-line utility in Apple Remote Desktop

Microsoft Windows Event Forwarding FEB 2018

Hardy, T. & Hall, J. (2018, February 15). Use Windows Event Forwarding to help with intrusion detection. Retrieved August 7, 2018.

Internal MISP references

UUID 4e7c36b9-415f-41f1-980e-251d92994eb4 which can be used as unique global reference for Microsoft Windows Event Forwarding FEB 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-07T00:00:00Z
date_published 2018-02-15T00:00:00Z
source MITRE
title Use Windows Event Forwarding to help with intrusion detection

Google Workspace Data Loss Prevention

Google. (n.d.). Use Workspace DLP to prevent data loss. Retrieved March 4, 2024.

Internal MISP references

UUID 81dc5818-342c-5efb-90c6-425c218e130f which can be used as unique global reference for Google Workspace Data Loss Prevention in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-04T00:00:00Z
source MITRE
title Use Workspace DLP to prevent data loss

Apple ZShell

Apple. (2020, January 28). Use zsh as the default shell on your Mac. Retrieved June 12, 2020.

Internal MISP references

UUID 5374ad8e-96a2-4d19-b2cf-28232fa97b52 which can be used as unique global reference for Apple ZShell in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-12T00:00:00Z
date_published 2020-01-28T00:00:00Z
source MITRE
title Use zsh as the default shell on your Mac

Kuberentes ABAC

Kuberenets. (n.d.). Using ABAC Authorization. Retrieved July 14, 2023.

Internal MISP references

UUID 7f960599-a3d6-53bb-91ff-f0e6117a30ed which can be used as unique global reference for Kuberentes ABAC in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-14T00:00:00Z
source MITRE
title Using ABAC Authorization

Cisco Umbrella DGA Brute Force

Kasza, A. (2015, February 18). Using Algorithms to Brute Force Algorithms. Retrieved February 18, 2019.

Internal MISP references

UUID d0eacad8-a6ff-4282-8fbc-d7984ad03b56 which can be used as unique global reference for Cisco Umbrella DGA Brute Force in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-18T00:00:00Z
date_published 2015-02-18T00:00:00Z
source MITRE
title Using Algorithms to Brute Force Algorithms

Www.huntress.com March 13 2024

Faith Stratton. (2024, March 13). Using Backup Utilities for Data Exfiltration . Retrieved October 4, 2024.

Internal MISP references

UUID e3931ba7-24de-4283-9941-fe927a75fb5e which can be used as unique global reference for Www.huntress.com March 13 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-04T00:00:00Z
date_published 2024-03-13T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Using Backup Utilities for Data Exfiltration

Exploit Monday Mitigate Device Guard Bypases

Graeber, M. (2016, September 8). Using Device Guard to Mitigate Against Device Guard Bypasses. Retrieved September 13, 2016.

Internal MISP references

UUID 8130e5e1-376f-4945-957a-aaf8684b361b which can be used as unique global reference for Exploit Monday Mitigate Device Guard Bypases in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-09-13T00:00:00Z
date_published 2016-09-08T00:00:00Z
source MITRE
title Using Device Guard to Mitigate Against Device Guard Bypasses

Microsoft DsAddSidHistory

Microsoft. (n.d.). Using DsAddSidHistory. Retrieved November 30, 2017.

Internal MISP references

UUID 11c44e1e-28d8-4d45-8539-6586466a5b3c which can be used as unique global reference for Microsoft DsAddSidHistory in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-30T00:00:00Z
source MITRE
title Using DsAddSidHistory

AWS Instance Profiles

AWS. (n.d.). Using instance profiles. Retrieved February 28, 2024.

Internal MISP references

UUID d114854b-50eb-5d60-896b-401df1e6cada which can be used as unique global reference for AWS Instance Profiles in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-28T00:00:00Z
source MITRE
title Using instance profiles

Microsoft 365 Defender Solorigate

Microsoft 365 Defender Team. (2020, December 28). Using Microsoft 365 Defender to protect against Solorigate. Retrieved January 7, 2021.

Internal MISP references

UUID 449cf112-535b-44af-9001-55123b342779 which can be used as unique global reference for Microsoft 365 Defender Solorigate in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-07T00:00:00Z
date_published 2020-12-28T00:00:00Z
source MITRE
title Using Microsoft 365 Defender to protect against Solorigate

TechNet Netsh

Microsoft. (n.d.). Using Netsh. Retrieved February 13, 2017.

Internal MISP references

UUID 58112a3a-06bd-4a46-8a09-4dba5f42a04f which can be used as unique global reference for TechNet Netsh in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-02-13T00:00:00Z
source MITRE
title Using Netsh

Demaske Netsh Persistence

Demaske, M. (2016, September 23). USING NETSHELL TO EXECUTE EVIL DLLS AND PERSIST ON A HOST. Retrieved April 8, 2017.

Internal MISP references

UUID 663b3fd6-0dd6-45c8-afba-dc0ea6d331b5 which can be used as unique global reference for Demaske Netsh Persistence in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-04-08T00:00:00Z
date_published 2016-09-23T00:00:00Z
source MITRE
title USING NETSHELL TO EXECUTE EVIL DLLS AND PERSIST ON A HOST

CrowdStrike Outlook Forms

Parisi, T., et al. (2017, July). Using Outlook Forms for Lateral Movement and Persistence. Retrieved February 5, 2019.

Internal MISP references

UUID ad412d39-c0c5-4119-9193-0ba1309edb3f which can be used as unique global reference for CrowdStrike Outlook Forms in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-05T00:00:00Z
date_published 2017-07-01T00:00:00Z
source MITRE
title Using Outlook Forms for Lateral Movement and Persistence

Red Hat PAM

Red Hat. (n.d.). CHAPTER 2. USING PLUGGABLE AUTHENTICATION MODULES (PAM). Retrieved June 25, 2020.

Internal MISP references

UUID 3dc88605-64c8-495a-9e3b-e5686fd2eb03 which can be used as unique global reference for Red Hat PAM in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-25T00:00:00Z
source MITRE
title USING PLUGGABLE AUTHENTICATION MODULES (PAM)

Varonis Power Automate Data Exfiltration

Eric Saraga. (2022, February 2). Using Power Automate for Covert Data Exfiltration in Microsoft 365. Retrieved May 27, 2022.

Internal MISP references

UUID 16436468-1daf-433d-bb3b-f842119594b4 which can be used as unique global reference for Varonis Power Automate Data Exfiltration in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-27T00:00:00Z
date_published 2022-02-02T00:00:00Z
source MITRE
title Using Power Automate for Covert Data Exfiltration in Microsoft 365

Microsoft Disable NTLM Nov 2012

Microsoft. (2012, November 29). Using security policies to restrict NTLM traffic. Retrieved December 4, 2017.

Internal MISP references

UUID 5861ed76-fedd-4ff9-8242-308c7206e4cb which can be used as unique global reference for Microsoft Disable NTLM Nov 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-04T00:00:00Z
date_published 2012-11-29T00:00:00Z
source MITRE
title Using security policies to restrict NTLM traffic

Microsoft SMB Packet Signing

Microsoft. (2008, September 10). Using SMB Packet Signing. Retrieved February 7, 2019.

Internal MISP references

UUID 32a30a3f-3ed1-4def-86b1-f40bbffa1cc5 which can be used as unique global reference for Microsoft SMB Packet Signing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-07T00:00:00Z
date_published 2008-09-10T00:00:00Z
source MITRE
title Using SMB Packet Signing

TechNet Applocker vs SRP

Microsoft. (2012, June 27). Using Software Restriction Policies and AppLocker Policies. Retrieved April 7, 2016.

Internal MISP references

UUID 84e1c53f-e858-4106-9c14-1b536d5b56f9 which can be used as unique global reference for TechNet Applocker vs SRP in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-07T00:00:00Z
date_published 2012-06-27T00:00:00Z
source MITRE
title Using Software Restriction Policies and AppLocker Policies

Microsoft Using Software Restriction

Microsoft. (2012, June 27). Using Software Restriction Policies and AppLocker Policies. Retrieved April 7, 2016.

Internal MISP references

UUID 774e6598-0926-4adb-890f-00824de07ae0 which can be used as unique global reference for Microsoft Using Software Restriction in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-07T00:00:00Z
date_published 2012-06-27T00:00:00Z
source MITRE
title Using Software Restriction Policies and AppLocker Policies

OSX Keychain Schaumann

Jan Schaumann. (2015, November 5). Using the OS X Keychain to store and retrieve passwords. Retrieved March 31, 2022.

Internal MISP references

UUID d0ac448a-7299-4ddc-8730-be72fb840ccb which can be used as unique global reference for OSX Keychain Schaumann in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-31T00:00:00Z
date_published 2015-11-05T00:00:00Z
source MITRE
title Using the OS X Keychain to store and retrieve passwords

AutoHotKey

AutoHotkey Foundation LLC. (n.d.). Using the Program. Retrieved March 29, 2024.

Internal MISP references

UUID 0ddfa2ec-a8a5-5cf0-b1b9-7ff6890bc666 which can be used as unique global reference for AutoHotKey in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-29T00:00:00Z
source MITRE
title Using the Program

USNYAG IranianBotnet March 2016

Preet Bharara, US Attorney. (2016, March 24). Retrieved April 23, 2019.

Internal MISP references

UUID 69ee73c1-359f-4584-a6e7-75119d24bbf5 which can be used as unique global reference for USNYAG IranianBotnet March 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-23T00:00:00Z
source MITRE
title USNYAG IranianBotnet March 2016

UtilityFunctions.ps1 - LOLBAS Project

LOLBAS. (2021, September 26). UtilityFunctions.ps1. Retrieved December 4, 2023.

Internal MISP references

UUID 8f15755b-2e32-420e-8463-497e3f8d8cfd which can be used as unique global reference for UtilityFunctions.ps1 - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-09-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title UtilityFunctions.ps1

Kernel.org Restrict Kernel Module

Vander Stoep, J. (2016, April 5). [v3] selinux: restrict kernel module loadinglogin register. Retrieved April 9, 2018.

Internal MISP references

UUID a7c3fc64-9b79-4324-8177-0061208d018c which can be used as unique global reference for Kernel.org Restrict Kernel Module in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-09T00:00:00Z
date_published 2016-04-05T00:00:00Z
source MITRE
title [v3] selinux: restrict kernel module loadinglogin register

SentinelOne Valak June 2020

Reaves, J. and Platt, J. (2020, June). Valak Malware and the Connection to Gozi Loader ConfCrew. Retrieved August 31, 2020.

Internal MISP references

UUID 92b8ff34-05ef-4139-a6bd-56eb8af9d5e9 which can be used as unique global reference for SentinelOne Valak June 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-31T00:00:00Z
date_published 2020-06-01T00:00:00Z
source MITRE
title Valak Malware and the Connection to Gozi Loader ConfCrew

Cybereason Valak May 2020

Salem, E. et al. (2020, May 28). VALAK: MORE THAN MEETS THE EYE . Retrieved June 19, 2020.

Internal MISP references

UUID 235d1cf1-2413-4620-96cf-083d348410c2 which can be used as unique global reference for Cybereason Valak May 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-19T00:00:00Z
date_published 2020-05-28T00:00:00Z
source MITRE
title VALAK: MORE THAN MEETS THE EYE

Walmart Roberts Oct 2018

Sayre, K., Ogden, H., Roberts, C. (2018, October 10). VBA Stomping — Advanced Maldoc Techniques. Retrieved September 17, 2020.

Internal MISP references

UUID d1c88a57-85f4-4a35-a7fa-35e8c7fcd943 which can be used as unique global reference for Walmart Roberts Oct 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-17T00:00:00Z
date_published 2018-10-10T00:00:00Z
source MITRE
title VBA Stomping — Advanced Maldoc Techniques

vbc.exe - LOLBAS Project

LOLBAS. (2020, February 27). vbc.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 25eb4048-ee6d-44ca-a70b-37605028bd3c which can be used as unique global reference for vbc.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2020-02-27T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title vbc.exe

Veil_Ref

Veil Framework. (n.d.). Retrieved December 4, 2014.

Internal MISP references

UUID 722755a8-305f-4e37-8278-afb360836bec which can be used as unique global reference for Veil_Ref in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-12-04T00:00:00Z
source MITRE
title Veil_Ref

HC3 Analyst Note Venus Ransomware November 2022

Health Sector Cybersecurity Coordination Center (HC3). (2022, November 9). Venus Ransomware Targets Publicly Exposed Remote Desktop Services. Retrieved May 19, 2023.

Internal MISP references

UUID bd6e6a59-3a73-48f6-84cd-e7c027c8671f which can be used as unique global reference for HC3 Analyst Note Venus Ransomware November 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-19T00:00:00Z
date_published 2022-11-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Venus Ransomware Targets Publicly Exposed Remote Desktop Services

LOLBAS Verclsid

LOLBAS. (n.d.). Verclsid.exe. Retrieved August 10, 2020.

Internal MISP references

UUID 63ac9e95-aad8-4735-9e63-f45d8c499030 which can be used as unique global reference for LOLBAS Verclsid in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-10T00:00:00Z
source MITRE
title Verclsid.exe

WinOSBite verclsid.exe

verclsid-exe. (2019, December 17). verclsid.exe File Information - What is it & How to Block . Retrieved August 10, 2020.

Internal MISP references

UUID 5d5fa25b-64a9-4fdb-87c5-1a69a7d2f874 which can be used as unique global reference for WinOSBite verclsid.exe in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-10T00:00:00Z
date_published 2019-12-17T00:00:00Z
source MITRE
title verclsid.exe File Information - What is it & How to Block

Unit 42 VERMIN Jan 2018

Lancaster, T., Cortes, J. (2018, January 29). VERMIN: Quasar RAT and Custom Malware Used In Ukraine. Retrieved July 5, 2018.

Internal MISP references

UUID 0d6db249-9368-495e-9f1f-c7f10041f5ff which can be used as unique global reference for Unit 42 VERMIN Jan 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-05T00:00:00Z
date_published 2018-01-29T00:00:00Z
source MITRE
title VERMIN: Quasar RAT and Custom Malware Used In Ukraine

Unit 42 Vice Society December 6 2022

JR Gumarin. (2022, December 6). Vice Society: Profiling a Persistent Threat to the Education Sector. Retrieved November 14, 2023.

Internal MISP references

UUID 6abf7387-0857-4938-b36e-1374a66d4ed8 which can be used as unique global reference for Unit 42 Vice Society December 6 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-11-14T00:00:00Z
date_published 2022-12-06T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Vice Society: Profiling a Persistent Threat to the Education Sector

Minerva Labs Vidar Stealer Evasion

Minerva Labs. (2021, September 23). Vidar Stealer Evasion Arsenal. Retrieved November 16, 2023.

Internal MISP references

UUID ce9714d3-7f7c-4068-bcc8-0f0eeaf0dc0b which can be used as unique global reference for Minerva Labs Vidar Stealer Evasion in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-11-16T00:00:00Z
date_published 2021-09-23T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Vidar Stealer Evasion Arsenal

Amnesty Intl. Ocean Lotus February 2021

Amnesty International. (2021, February 24). Vietnamese activists targeted by notorious hacking group. Retrieved March 1, 2021.

Internal MISP references

UUID a54a2f68-8406-43ab-8758-07edd49dfb83 which can be used as unique global reference for Amnesty Intl. Ocean Lotus February 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-01T00:00:00Z
date_published 2021-02-24T00:00:00Z
source MITRE
title Vietnamese activists targeted by notorious hacking group

FireEye APT32 April 2020

Henderson, S., et al. (2020, April 22). Vietnamese Threat Actors APT32 Targeting Wuhan Government and Chinese Ministry of Emergency Management in Latest Example of COVID-19 Related Espionage. Retrieved April 28, 2020.

Internal MISP references

UUID 347ad5a1-d0b1-4f2b-9abd-eff96d05987d which can be used as unique global reference for FireEye APT32 April 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-04-28T00:00:00Z
date_published 2020-04-22T00:00:00Z
source MITRE
title Vietnamese Threat Actors APT32 Targeting Wuhan Government and Chinese Ministry of Emergency Management in Latest Example of COVID-19 Related Espionage

Slack Help Center Access Logs

Slack Help Center. (n.d.). View Access Logs for your workspace. Retrieved April 10, 2023.

Internal MISP references

UUID b179d0d4-e115-59f1-86a7-7dcfc253e16f which can be used as unique global reference for Slack Help Center Access Logs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-04-10T00:00:00Z
source MITRE
title View Access Logs for your workspace

Azure Activity Logs

Microsoft. (n.d.). View Azure activity logs. Retrieved June 17, 2020.

Internal MISP references

UUID 19b55c10-f4fd-49c2-b267-0d3d8e9acdd7 which can be used as unique global reference for Azure Activity Logs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-17T00:00:00Z
source MITRE
title View Azure activity logs

DOJ GRU Indictment Jul 2018

Mueller, R. (2018, July 13). Indictment - United States of America vs. VIKTOR BORISOVICH NETYKSHO, et al. Retrieved September 13, 2018.

Internal MISP references

UUID d65f371b-19d0-49de-b92b-94a2bea1d988 which can be used as unique global reference for DOJ GRU Indictment Jul 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-09-13T00:00:00Z
source MITRE
title VIKTOR BORISOVICH NETYKSHO, et al

MalwareTech VFS Nov 2014

Hutchins, M. (2014, November 28). Virtual File Systems for Beginners. Retrieved June 22, 2020.

Internal MISP references

UUID c06af73d-5ed0-46a0-a5a9-161035075884 which can be used as unique global reference for MalwareTech VFS Nov 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-22T00:00:00Z
date_published 2014-11-28T00:00:00Z
source MITRE
title Virtual File Systems for Beginners

Virtualization/Sandbox Evasion

YUCEEL, Huseyin Can. Picus Labs. (2022, June 9). Virtualization/Sandbox Evasion - How Attackers Avoid Malware Analysis. Retrieved December 26, 2023.

Internal MISP references

UUID a3031616-f21a-574f-a9a5-a808a6230aa8 which can be used as unique global reference for Virtualization/Sandbox Evasion in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-26T00:00:00Z
date_published 2022-06-09T00:00:00Z
source MITRE
title Virtualization/Sandbox Evasion - How Attackers Avoid Malware Analysis

Ars Technica Pwn2Own 2017 VM Escape

Goodin, D. (2017, March 17). Virtual machine escape fetches $105,000 at Pwn2Own hacking contest - updated. Retrieved March 12, 2018.

Internal MISP references

UUID e75f2d0f-f63e-48c7-a0c3-8f00f371624e which can be used as unique global reference for Ars Technica Pwn2Own 2017 VM Escape in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-12T00:00:00Z
date_published 2017-03-17T00:00:00Z
source MITRE
title Virtual machine escape fetches $105,000 at Pwn2Own hacking contest - updated

Google VM

Google. (n.d.). Virtual machine instances. Retrieved October 13, 2021.

Internal MISP references

UUID 2b7ec610-5654-4c94-b5df-9cf5670eec33 which can be used as unique global reference for Google VM in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-13T00:00:00Z
source MITRE
title Virtual machine instances

Microsoft Virutal Machine API

Microsoft. (2019, March 1). Virtual Machines - Get. Retrieved October 8, 2019.

Internal MISP references

UUID f565c237-07c5-4e9e-9879-513627517109 which can be used as unique global reference for Microsoft Virutal Machine API in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-08T00:00:00Z
date_published 2019-03-01T00:00:00Z
source MITRE
title Virtual Machines - Get

Azure Update Virtual Machines

Microsoft. (n.d.). Virtual Machines - Update. Retrieved April 1, 2022.

Internal MISP references

UUID 299f231f-70d1-4c1a-818f-8a01cf65382c which can be used as unique global reference for Azure Update Virtual Machines in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-01T00:00:00Z
source MITRE
title Virtual Machines - Update

Azure Virtual Network TAP

Microsoft. (2022, February 9). Virtual network TAP. Retrieved March 17, 2022.

Internal MISP references

UUID 3f106d7e-f101-4adb-bbd1-d8c04a347f85 which can be used as unique global reference for Azure Virtual Network TAP in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-17T00:00:00Z
date_published 2022-02-09T00:00:00Z
source MITRE
title Virtual network TAP

Google VPC Overview

Google. (2019, September 23). Virtual Private Cloud (VPC) network overview. Retrieved October 6, 2019.

Internal MISP references

UUID 9ebe53cf-657f-475d-85e4-9e30f4af1e7d which can be used as unique global reference for Google VPC Overview in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-06T00:00:00Z
date_published 2019-09-23T00:00:00Z
source MITRE
title Virtual Private Cloud (VPC) network overview

Volexity Virtual Private Keylogging

Adair, S. (2015, October 7). Virtual Private Keylogging: Cisco Web VPNs Leveraged for Access and Persistence. Retrieved March 20, 2017.

Internal MISP references

UUID b299f8e7-01da-4d59-9657-ef93cf284cc0 which can be used as unique global reference for Volexity Virtual Private Keylogging in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-20T00:00:00Z
date_published 2015-10-07T00:00:00Z
source MITRE
title Virtual Private Keylogging: Cisco Web VPNs Leveraged for Access and Persistence

VirusTotal Behavior def.exe

VirusTotal. (2023, July 11). VirusTotal Behavior def.exe. Retrieved July 11, 2023.

Internal MISP references

UUID 3502c98d-b61d-42fa-b23e-7128a4042c03 which can be used as unique global reference for VirusTotal Behavior def.exe in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-11T00:00:00Z
date_published 2023-07-11T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title VirusTotal Behavior def.exe

VirusTotal FAQ

VirusTotal. (n.d.). VirusTotal FAQ. Retrieved May 23, 2019.

Internal MISP references

UUID 5cd965f6-c4af-40aa-8f08-620cf5f1242a which can be used as unique global reference for VirusTotal FAQ in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-05-23T00:00:00Z
source MITRE
title VirusTotal FAQ

Visa RawPOS March 2015

Visa. (2015, March). Visa Security Alert: "RawPOS" Malware Targeting Lodging Merchants. Retrieved October 6, 2017.

Internal MISP references

UUID a2371f44-0a88-4d68-bbe7-7e79f13f78c2 which can be used as unique global reference for Visa RawPOS March 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-10-06T00:00:00Z
date_published 2015-03-01T00:00:00Z
source MITRE
title Visa Security Alert: "RawPOS" Malware Targeting Lodging Merchants

ESET Recon Snake Nest

Boutin, J. and Faou, M. (2018). Visiting the snake nest. Retrieved May 7, 2019.

Internal MISP references

UUID b69d7c73-40c2-4cb2-b9ad-088ef61e2f7f which can be used as unique global reference for ESET Recon Snake Nest in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-05-07T00:00:00Z
date_published 2018-01-01T00:00:00Z
source MITRE
title Visiting the snake nest

VB Microsoft

Microsoft. (n.d.). Visual Basic documentation. Retrieved June 23, 2020.

Internal MISP references

UUID b23a1a5d-48dd-4346-bf8d-390624214081 which can be used as unique global reference for VB Microsoft in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-23T00:00:00Z
source MITRE
title Visual Basic documentation

Wikipedia VBA

Wikipedia. (n.d.). Visual Basic for Applications. Retrieved August 13, 2020.

Internal MISP references

UUID 70818420-c3ec-46c3-9e97-d8f989f2e3db which can be used as unique global reference for Wikipedia VBA in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-13T00:00:00Z
source MITRE
title Visual Basic for Applications

VB .NET Mar 2020

.NET Team. (2020, March 11). Visual Basic support planned for .NET 5.0. Retrieved June 23, 2020.

Internal MISP references

UUID da6d1b56-8e59-4125-b318-48a40a1c8e94 which can be used as unique global reference for VB .NET Mar 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-23T00:00:00Z
date_published 2020-03-11T00:00:00Z
source MITRE
title Visual Basic support planned for .NET 5.0

VisualUiaVerifyNative.exe - LOLBAS Project

LOLBAS. (2021, September 26). VisualUiaVerifyNative.exe. Retrieved December 4, 2023.

Internal MISP references

UUID b17be296-15ad-468f-8157-8cb4093b2e97 which can be used as unique global reference for VisualUiaVerifyNative.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-09-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title VisualUiaVerifyNative.exe

Carbon Black HotCroissant April 2020

Knight, S.. (2020, April 16). VMware Carbon Black TAU Threat Analysis: The Evolution of Lazarus. Retrieved May 1, 2020.

Internal MISP references

UUID 43bcb35b-56e1-47a8-9c74-f7543a25b2a6 which can be used as unique global reference for Carbon Black HotCroissant April 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-01T00:00:00Z
date_published 2020-04-16T00:00:00Z
source MITRE
title VMware Carbon Black TAU Threat Analysis: The Evolution of Lazarus

Offensive Security VNC Authentication Check

Offensive Security. (n.d.). VNC Authentication. Retrieved October 6, 2021.

Internal MISP references

UUID 90a5ab3c-c2a8-4b02-9bd7-628672907737 which can be used as unique global reference for Offensive Security VNC Authentication Check in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-06T00:00:00Z
source MITRE
title VNC Authentication

Trend Micro Void Banshee July 15 2024

Peter Girnus, Aliakbar Zahravi. (2024, July 15). Void Banshee Targets Windows Users. Retrieved September 19, 2024.

Internal MISP references

UUID 02c4dda2-3aae-43ec-9b14-df282b200def which can be used as unique global reference for Trend Micro Void Banshee July 15 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-19T00:00:00Z
date_published 2024-07-15T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Void Banshee Targets Windows Users

Trend Micro Void Rabisu May 30 2023

Feike Hacquebord, Stephen Hilt, Fernando Merces, Lord Alfred Remorin. (2023, May 30). Void Rabisu’s Use of RomCom Backdoor Shows a Growing Shift in Threat Actors’ Goals. Retrieved June 4, 2023.

Internal MISP references

UUID 5fd628ca-f366-4f0d-b493-8be19fa4dd4e which can be used as unique global reference for Trend Micro Void Rabisu May 30 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-04T00:00:00Z
date_published 2023-05-30T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Void Rabisu’s Use of RomCom Backdoor Shows a Growing Shift in Threat Actors’ Goals

CheckPoint Volatile Cedar March 2015

Threat Intelligence and Research. (2015, March 30). VOLATILE CEDAR. Retrieved February 8, 2021.

Internal MISP references

UUID a26344a2-63ca-422e-8cf9-0cf22a5bee72 which can be used as unique global reference for CheckPoint Volatile Cedar March 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-08T00:00:00Z
date_published 2015-03-30T00:00:00Z
source MITRE, Tidal Cyber
title VOLATILE CEDAR

Microsoft Volt Typhoon May 2023

Microsoft Threat Intelligence. (2023, May 24). Volt Typhoon targets US critical infrastructure with living-off-the-land techniques. Retrieved July 27, 2023.

Internal MISP references

UUID 8b74f0b7-9719-598c-b3ee-61d734393e6f which can be used as unique global reference for Microsoft Volt Typhoon May 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-27T00:00:00Z
date_published 2023-05-24T00:00:00Z
source MITRE
title Volt Typhoon targets US critical infrastructure with living-off-the-land techniques

Microsoft Volt Typhoon May 24 2023

Microsoft Threat Intelligence. (2023, May 24). Volt Typhoon targets US critical infrastructure with living-off-the-land techniques. Retrieved May 25, 2023.

Internal MISP references

UUID 2e94c44a-d2a7-4e56-ac8a-df315fc14ec1 which can be used as unique global reference for Microsoft Volt Typhoon May 24 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-25T00:00:00Z
date_published 2023-05-24T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Volt Typhoon targets US critical infrastructure with living-off-the-land techniques

VSDiagnostics.exe - LOLBAS Project

LOLBAS. (2023, July 12). VSDiagnostics.exe. Retrieved December 4, 2023.

Internal MISP references

UUID b4658fc0-af16-45b1-8403-a9676760a36a which can be used as unique global reference for VSDiagnostics.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2023-07-12T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title VSDiagnostics.exe

Vshadow.exe - LOLBAS Project

LOLBAS. (2023, September 6). Vshadow.exe. Retrieved December 4, 2023.

Internal MISP references

UUID ae3b1e26-d7d7-4049-b4a7-80cd2b149b7c which can be used as unique global reference for Vshadow.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2023-09-06T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Vshadow.exe

VSIISExeLauncher.exe - LOLBAS Project

LOLBAS. (2021, September 24). VSIISExeLauncher.exe. Retrieved December 4, 2023.

Internal MISP references

UUID e2fda344-77b8-4650-a7da-1e422db6d3a1 which can be used as unique global reference for VSIISExeLauncher.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-09-24T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title VSIISExeLauncher.exe

vsjitdebugger.exe - LOLBAS Project

LOLBAS. (2018, May 25). vsjitdebugger.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 94a880fa-70b0-46c3-997e-b22dc9180134 which can be used as unique global reference for vsjitdebugger.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title vsjitdebugger.exe

vsls-agent.exe - LOLBAS Project

LOLBAS. (2022, November 1). vsls-agent.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 325eab54-bcdd-4a12-ab41-aaf06a0405e9 which can be used as unique global reference for vsls-agent.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2022-11-01T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title vsls-agent.exe

vstest.console.exe - LOLBAS Project

LOLBAS. (2023, September 8). vstest.console.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 70c168a0-9ddf-408d-ba29-885c0c5c936a which can be used as unique global reference for vstest.console.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2023-09-08T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title vstest.console.exe

Vulnerability and Exploit Detector

Kanthak, S.. (2016, July 20). Vulnerability and Exploit Detector. Retrieved February 3, 2017.

Internal MISP references

UUID d63d6e14-8fe7-4893-a42f-3752eaec8770 which can be used as unique global reference for Vulnerability and Exploit Detector in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-02-03T00:00:00Z
date_published 2016-07-20T00:00:00Z
source MITRE
title Vulnerability and Exploit Detector

Kanthak Sentinel

Kanthak, S. (2016, July 20). Vulnerability and Exploit Detector. Retrieved February 3, 2017.

Internal MISP references

UUID 94f99326-1512-47ca-8c99-9b382e4d0261 which can be used as unique global reference for Kanthak Sentinel in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-02-03T00:00:00Z
date_published 2016-07-20T00:00:00Z
source MITRE
title Vulnerability and Exploit Detector

Electron Security 3

CertiK. (2020, June 30). Vulnerability in Electron-based Application: Unintentionally Giving Malicious Code Room to Run. Retrieved March 7, 2024.

Internal MISP references

UUID b425f1b5-0375-5747-abd0-c5cd7ba3b781 which can be used as unique global reference for Electron Security 3 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-07T00:00:00Z
date_published 2020-06-30T00:00:00Z
source MITRE
title Vulnerability in Electron-based Application: Unintentionally Giving Malicious Code Room to Run

Technet MS14-068

Microsoft. (2014, November 18). Vulnerability in Kerberos Could Allow Elevation of Privilege (3011780). Retrieved December 23, 2015.

Internal MISP references

UUID db78c095-b7b2-4422-8473-49d4a1129b76 which can be used as unique global reference for Technet MS14-068 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-12-23T00:00:00Z
date_published 2014-11-18T00:00:00Z
source MITRE
title Vulnerability in Kerberos Could Allow Elevation of Privilege (3011780)

vxunderground debug

vxunderground. (2021, June 30). VX-API. Retrieved April 1, 2022.

Internal MISP references

UUID 8c7fe2a2-64a1-4680-a4e6-f6eefe00407a which can be used as unique global reference for vxunderground debug in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-01T00:00:00Z
date_published 2021-06-30T00:00:00Z
source MITRE
title VX-API

Symantec W32.Duqu

Symantec Security Response. (2011, November). W32.Duqu: The precursor to the next Stuxnet. Retrieved September 17, 2015.

Internal MISP references

UUID 8660411a-6b9c-46c2-8f5f-049ec60c7d40 which can be used as unique global reference for Symantec W32.Duqu in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-09-17T00:00:00Z
date_published 2011-11-01T00:00:00Z
source MITRE
title W32.Duqu: The precursor to the next Stuxnet

Symantec W.32 Stuxnet Dossier

Nicolas Falliere, Liam O. Murchu, Eric Chien. (2011, February). W32.Stuxnet Dossier. Retrieved December 7, 2020.

Internal MISP references

UUID ef65ab18-fd84-4098-8805-df0268fc3a38 which can be used as unique global reference for Symantec W.32 Stuxnet Dossier in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-07T00:00:00Z
date_published 2011-02-01T00:00:00Z
source MITRE
title W32.Stuxnet Dossier

w32.tidserv.g

Symantec. (2009, March 22). W32.Tidserv.G. Retrieved January 14, 2022.

Internal MISP references

UUID 9d4ac51b-d870-43e8-bc6f-d7159343b00c which can be used as unique global reference for w32.tidserv.g in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-14T00:00:00Z
date_published 2009-03-22T00:00:00Z
source MITRE
title W32.Tidserv.G

Github W32Time Oct 2017

Lundgren, S. (2017, October 28). w32time. Retrieved March 26, 2018.

Internal MISP references

UUID a248fd87-c3c1-4de7-a9af-0436a10f71aa which can be used as unique global reference for Github W32Time Oct 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-26T00:00:00Z
date_published 2017-10-28T00:00:00Z
source MITRE
title w32time

Symantec Chernobyl W95.CIH

Yamamura, M. (2002, April 25). W95.CIH. Retrieved April 12, 2019.

Internal MISP references

UUID a35cab17-634d-4a7a-a42c-4a4280e8785d which can be used as unique global reference for Symantec Chernobyl W95.CIH in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-12T00:00:00Z
date_published 2002-04-25T00:00:00Z
source MITRE
title W95.CIH

Wab.exe - LOLBAS Project

LOLBAS. (2018, May 25). Wab.exe. Retrieved December 4, 2023.

Internal MISP references

UUID c432556e-c7f9-4e36-af7e-d7bea6f51e95 which can be used as unique global reference for Wab.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Wab.exe

GitLab WakeOnLAN

Perry, David. (2020, August 11). WakeOnLAN (WOL). Retrieved February 17, 2021.

Internal MISP references

UUID 120e3b14-f08b-40e0-9d20-4ddda6b8cc06 which can be used as unique global reference for GitLab WakeOnLAN in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-17T00:00:00Z
date_published 2020-08-11T00:00:00Z
source MITRE
title WakeOnLAN (WOL)

FireEye WannaCry 2017

Berry, A., Homan, J., and Eitzman, R. (2017, May 23). WannaCry Malware Profile. Retrieved March 15, 2019.

Internal MISP references

UUID 34b15fe1-c550-4150-87bc-ac9662547247 which can be used as unique global reference for FireEye WannaCry 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-15T00:00:00Z
date_published 2017-05-23T00:00:00Z
source MITRE
title WannaCry Malware Profile

BfV North Korea February 17 2024

Bundesamt fur Verfassungsschutz. (2024, February 17). Warning of North Korean cyber threats targeting the Defense Sector. Retrieved February 26, 2024.

Internal MISP references

UUID cc76be15-6d9d-40b2-b7f3-196bb0a7106a which can be used as unique global reference for BfV North Korea February 17 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-26T00:00:00Z
date_published 2024-02-17T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Warning of North Korean cyber threats targeting the Defense Sector

Trend Micro War of Crypto Miners

Oliveira, A., Fiser, D. (2020, September 10). War of Linux Cryptocurrency Miners: A Battle for Resources. Retrieved April 6, 2021.

Internal MISP references

UUID 1ba47efe-35f8-4d52-95c7-65cdc829c8e5 which can be used as unique global reference for Trend Micro War of Crypto Miners in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-06T00:00:00Z
date_published 2020-09-10T00:00:00Z
source MITRE
title War of Linux Cryptocurrency Miners: A Battle for Resources

Check Point Warzone Feb 2020

Harakhavik, Y. (2020, February 3). Warzone: Behind the enemy lines. Retrieved December 17, 2021.

Internal MISP references

UUID c214c36e-2bc7-4b98-a74e-529aae99f9cf which can be used as unique global reference for Check Point Warzone Feb 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-12-17T00:00:00Z
date_published 2020-02-03T00:00:00Z
source MITRE
title Warzone: Behind the enemy lines

Uptycs Warzone UAC Bypass November 2020

Mohanta, A. (2020, November 25). Warzone RAT comes with UAC bypass technique. Retrieved April 7, 2022.

Internal MISP references

UUID 1324b314-a4d9-43e7-81d6-70b6917fe527 which can be used as unique global reference for Uptycs Warzone UAC Bypass November 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-07T00:00:00Z
date_published 2020-11-25T00:00:00Z
source MITRE
title Warzone RAT comes with UAC bypass technique

Dragos WASSONITE

Dragos. (n.d.). WASSONITE. Retrieved January 20, 2021.

Internal MISP references

UUID 39e6ab06-9f9f-4292-9034-b2f56064164d which can be used as unique global reference for Dragos WASSONITE in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-20T00:00:00Z
source MITRE
title WASSONITE

NCC Group WastedLocker June 2020

Antenucci, S., Pantazopoulos, N., Sandee, M. (2020, June 23). WastedLocker: A New Ransomware Variant Developed By The Evil Corp Group. Retrieved September 14, 2021.

Internal MISP references

UUID 1520f2e5-2689-428f-9ee4-05e153a52381 which can be used as unique global reference for NCC Group WastedLocker June 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-14T00:00:00Z
date_published 2020-06-23T00:00:00Z
source MITRE
title WastedLocker: A New Ransomware Variant Developed By The Evil Corp Group

Sentinel Labs WastedLocker July 2020

Walter, J.. (2020, July 23). WastedLocker Ransomware: Abusing ADS and NTFS File Attributes. Retrieved September 14, 2021.

Internal MISP references

UUID 5ed4eb07-cc90-46bc-8527-0bb59e1eefe1 which can be used as unique global reference for Sentinel Labs WastedLocker July 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-14T00:00:00Z
date_published 2020-07-23T00:00:00Z
source MITRE
title WastedLocker Ransomware: Abusing ADS and NTFS File Attributes

Intezer Doki July 20

Fishbein, N., Kajiloti, M.. (2020, July 28). Watch Your Containers: Doki Infecting Docker Servers in the Cloud. Retrieved March 30, 2021.

Internal MISP references

UUID 688b2582-6602-44e1-aaac-3a4b8e168b04 which can be used as unique global reference for Intezer Doki July 20 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-30T00:00:00Z
date_published 2020-07-28T00:00:00Z
source MITRE
title Watch Your Containers: Doki Infecting Docker Servers in the Cloud

Trend Micro Waterbear December 2019

Su, V. et al. (2019, December 11). Waterbear Returns, Uses API Hooking to Evade Security. Retrieved February 22, 2021.

Internal MISP references

UUID bf320133-3823-4232-b7d2-d07da9bbccc2 which can be used as unique global reference for Trend Micro Waterbear December 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-22T00:00:00Z
date_published 2019-12-11T00:00:00Z
source MITRE
title Waterbear Returns, Uses API Hooking to Evade Security

Symantec Waterbug Jun 2019

Symantec DeepSight Adversary Intelligence Team. (2019, June 20). Waterbug: Espionage Group Rolls Out Brand-New Toolset in Attacks Against Governments. Retrieved July 8, 2019.

Internal MISP references

UUID ddd5c2c9-7126-4b89-b415-dc651a2ccc0e which can be used as unique global reference for Symantec Waterbug Jun 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-07-08T00:00:00Z
date_published 2019-06-20T00:00:00Z
source MITRE
title Waterbug: Espionage Group Rolls Out Brand-New Toolset in Attacks Against Governments

ESET DazzleSpy Jan 2022

M.Léveillé, M., Cherepanov, A.. (2022, January 25). Watering hole deploys new macOS malware, DazzleSpy, in Asia. Retrieved May 6, 2022.

Internal MISP references

UUID 212012ac-9084-490f-8dd2-5cc9ac6e6de1 which can be used as unique global reference for ESET DazzleSpy Jan 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-06T00:00:00Z
date_published 2022-01-25T00:00:00Z
source MITRE
title Watering hole deploys new macOS malware, DazzleSpy, in Asia

win_wbadmin_delete_catalog

Microsoft. (2017, October 16). wbadmin delete catalog. Retrieved September 20, 2021.

Internal MISP references

UUID 6adfba35-3bf1-4915-813e-40c4a843ae34 which can be used as unique global reference for win_wbadmin_delete_catalog in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-20T00:00:00Z
date_published 2017-10-16T00:00:00Z
source MITRE
title wbadmin delete catalog

SecureWorks WannaCry Analysis

Counter Threat Unit Research Team. (2017, May 18). WCry Ransomware Analysis. Retrieved March 26, 2019.

Internal MISP references

UUID 522b2a19-1d15-48f8-8801-c64d3abd945a which can be used as unique global reference for SecureWorks WannaCry Analysis in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-26T00:00:00Z
date_published 2017-05-18T00:00:00Z
source MITRE
title WCry Ransomware Analysis

Aleks Weapons Nov 2015

Nick Aleks. (2015, November 7). Weapons of a Pentester - Understanding the virtual & physical tools used by white/black hat hackers. Retrieved March 30, 2018.

Internal MISP references

UUID fd22c941-b0dc-4420-b363-2f5777981041 which can be used as unique global reference for Aleks Weapons Nov 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-30T00:00:00Z
date_published 2015-11-07T00:00:00Z
source MITRE
title Weapons of a Pentester - Understanding the virtual & physical tools used by white/black hat hackers

NIST Web Bug

NIST Information Technology Laboratory. (n.d.). web bug. Retrieved March 22, 2023.

Internal MISP references

UUID b4362602-faf0-5b28-a147-b3153da1903f which can be used as unique global reference for NIST Web Bug in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-22T00:00:00Z
source MITRE
title web bug

Sekoia.io Blog September 19 2024

Marc N; Sekoia TDR. (2024, September 19). WebDAV-as-a-Service Uncovering the infrastructure behind Emmenhtal loader distribution. Retrieved September 20, 2024.

Internal MISP references

UUID df9ff358-4d1e-4094-92cd-4703c53a384c which can be used as unique global reference for Sekoia.io Blog September 19 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-20T00:00:00Z
date_published 2024-09-19T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title WebDAV-as-a-Service Uncovering the infrastructure behind Emmenhtal loader distribution

Didier Stevens WebDAV Traffic

Stevens, D. (2017, November 13). WebDAV Traffic To Malicious Sites. Retrieved December 21, 2017.

Internal MISP references

UUID b521efe2-5c1c-48c5-a2a9-95da2367f537 which can be used as unique global reference for Didier Stevens WebDAV Traffic in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-21T00:00:00Z
date_published 2017-11-13T00:00:00Z
source MITRE
title WebDAV Traffic To Malicious Sites

Checkmarx Webhooks

Jossef Harush Kadouri. (2022, March 7). Webhook Party — Malicious packages caught exfiltrating data via legit webhook services. Retrieved July 20, 2023.

Internal MISP references

UUID f68f1151-839e-5ae7-bab1-aa2b4c0d11ec which can be used as unique global reference for Checkmarx Webhooks in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-20T00:00:00Z
date_published 2022-03-07T00:00:00Z
source MITRE
title Webhook Party — Malicious packages caught exfiltrating data via legit webhook services

Push Security SaaS Attacks Repository Webhooks

Push Security. (2023, July 31). Webhooks. Retrieved August 4, 2023.

Internal MISP references

UUID 519693e2-71c9-55d2-98fd-be451837582a which can be used as unique global reference for Push Security SaaS Attacks Repository Webhooks in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-04T00:00:00Z
date_published 2023-07-31T00:00:00Z
source MITRE
title Webhooks

acunetix Server Secuirty

Acunetix. (n.d.). Web Server Security and Database Server Security. Retrieved July 26, 2018.

Internal MISP references

UUID cedbdeb8-6669-4c5c-a8aa-d37576aaa1ba which can be used as unique global reference for acunetix Server Secuirty in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-26T00:00:00Z
source MITRE
title Web Server Security and Database Server Security

Microsoft Well Known SIDs Jun 2017

Microsoft. (2017, June 23). Well-known security identifiers in Windows operating systems. Retrieved November 30, 2017.

Internal MISP references

UUID 14b344ed-bde6-4755-b59a-595edb23a210 which can be used as unique global reference for Microsoft Well Known SIDs Jun 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-30T00:00:00Z
date_published 2017-06-23T00:00:00Z
source MITRE
title Well-known security identifiers in Windows operating systems

PWC WellMess C2 August 2020

PWC. (2020, August 17). WellMess malware: analysis of its Command and Control (C2) server. Retrieved September 29, 2020.

Internal MISP references

UUID 3afca6f1-680a-46ae-8cea-10b6b870d5e7 which can be used as unique global reference for PWC WellMess C2 August 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-29T00:00:00Z
date_published 2020-08-17T00:00:00Z
source MITRE
title WellMess malware: analysis of its Command and Control (C2) server

Cofense Astaroth Sept 2018

Doaty, J., Garrett, P.. (2018, September 10). We’re Seeing a Resurgence of the Demonic Astaroth WMIC Trojan. Retrieved September 25, 2024.

Internal MISP references

UUID d316c581-646d-48e7-956e-34e2f957c67d which can be used as unique global reference for Cofense Astaroth Sept 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-25T00:00:00Z
date_published 2018-09-10T00:00:00Z
source MITRE
title We’re Seeing a Resurgence of the Demonic Astaroth WMIC Trojan

Wevtutil Microsoft Documentation

Microsoft. (n.d.). wevtutil. Retrieved September 14, 2021.

Internal MISP references

UUID 25511dde-9e13-4e03-8ae4-2495e9f5eb5e which can be used as unique global reference for Wevtutil Microsoft Documentation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-14T00:00:00Z
source MITRE
title wevtutil

Microsoft wevtutil Oct 2017

Plett, C. et al.. (2017, October 16). wevtutil. Retrieved July 2, 2018.

Internal MISP references

UUID 8896d802-96c6-4546-8a82-c1f7f2d71ea1 which can be used as unique global reference for Microsoft wevtutil Oct 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-02T00:00:00Z
date_published 2017-10-16T00:00:00Z
source MITRE
title wevtutil

Wfc.exe - LOLBAS Project

LOLBAS. (2021, September 26). Wfc.exe. Retrieved December 4, 2023.

Internal MISP references

UUID a937012a-01c8-457c-8808-47c1753e8781 which can be used as unique global reference for Wfc.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-09-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Wfc.exe

Crowdstrike Downgrade

Bart Lenaerts-Bergman. (2023, March 14). WHAT ARE DOWNGRADE ATTACKS?. Retrieved May 24, 2023.

Internal MISP references

UUID 47856c5f-6c4c-5b4c-bbc1-ccb6848d9b74 which can be used as unique global reference for Crowdstrike Downgrade in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-24T00:00:00Z
date_published 2023-03-14T00:00:00Z
source MITRE
title WHAT ARE DOWNGRADE ATTACKS?

Chrome Extensions Definition

Chrome. (n.d.). What are Extensions?. Retrieved November 16, 2017.

Internal MISP references

UUID fe00cee9-54d9-4775-86da-b7db73295bf7 which can be used as unique global reference for Chrome Extensions Definition in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-16T00:00:00Z
source MITRE
title What are Extensions?

StackExchange Hooks Jul 2012

Stack Exchange - Security. (2012, July 31). What are the methods to find hooked functions and APIs?. Retrieved December 12, 2017.

Internal MISP references

UUID dfa76ff1-df9e-4cdf-aabe-476479cdcf13 which can be used as unique global reference for StackExchange Hooks Jul 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-12T00:00:00Z
date_published 2012-07-31T00:00:00Z
source MITRE
title What are the methods to find hooked functions and APIs?

macOS APT Activity Bradley

Jaron Bradley. (2021, November 14). What does APT Activity Look Like on macOS?. Retrieved January 19, 2022.

Internal MISP references

UUID 7ccda957-b38d-4c3f-a8f5-6cecdcb3f584 which can be used as unique global reference for macOS APT Activity Bradley in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-19T00:00:00Z
date_published 2021-11-14T00:00:00Z
source MITRE
title What does APT Activity Look Like on macOS?

okta

okta. (n.d.). What Happens If Your JWT Is Stolen?. Retrieved September 12, 2019.

Internal MISP references

UUID 61e2fb16-d04b-494c-8bea-fb34e81faa73 which can be used as unique global reference for okta in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-12T00:00:00Z
source MITRE
title What Happens If Your JWT Is Stolen?

Norton Botnet

Norton. (n.d.). What is a botnet?. Retrieved October 4, 2020.

Internal MISP references

UUID f97427f1-ea16-4e92-a4a2-4d62a800df15 which can be used as unique global reference for Norton Botnet in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-04T00:00:00Z
source MITRE
title What is a botnet?

Microsoft DLL

Microsoft. (2023, April 28). What is a DLL. Retrieved September 7, 2023.

Internal MISP references

UUID f0ae2788-537c-5644-ba1b-d06a612e73c1 which can be used as unique global reference for Microsoft DLL in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-07T00:00:00Z
date_published 2023-04-28T00:00:00Z
source MITRE
title What is a DLL

Cloudflare DNSamplficationDoS

Cloudflare. (n.d.). What is a DNS amplification attack?. Retrieved April 23, 2019.

Internal MISP references

UUID 734cb2bb-462a-4bdc-9774-6883f99379b9 which can be used as unique global reference for Cloudflare DNSamplficationDoS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-23T00:00:00Z
source MITRE
title What is a DNS amplification attack?

Amazon AWS VPC Guide

Amazon. (n.d.). What Is Amazon VPC?. Retrieved October 6, 2019.

Internal MISP references

UUID 7972332d-fbe9-4f14-9511-4298f65f2a86 which can be used as unique global reference for Amazon AWS VPC Guide in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-06T00:00:00Z
source MITRE
title What Is Amazon VPC?

Cloudflare HTTPflood

Cloudflare. (n.d.). What is an HTTP flood DDoS attack?. Retrieved April 22, 2019.

Internal MISP references

UUID 1a5934a4-35ce-4f7c-be9c-c1faf4ee0838 which can be used as unique global reference for Cloudflare HTTPflood in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-22T00:00:00Z
source MITRE
title What is an HTTP flood DDoS attack?

Cloudflare NTPamplifciationDoS

Cloudflare. (n.d.). What is a NTP amplificaiton attack?. Retrieved April 23, 2019.

Internal MISP references

UUID 09ce093a-d378-4915-a35f-bf18a278d873 which can be used as unique global reference for Cloudflare NTPamplifciationDoS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-23T00:00:00Z
source MITRE
title What is a NTP amplificaiton attack?

Microsoft Primary Refresh Token

Microsoft. (2022, September 9). What is a Primary Refresh Token?. Retrieved February 21, 2023.

Internal MISP references

UUID d23bf6dc-979b-5f34-86a7-637979a5f20e which can be used as unique global reference for Microsoft Primary Refresh Token in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-21T00:00:00Z
date_published 2022-09-09T00:00:00Z
source MITRE
title What is a Primary Refresh Token?

Comparitech Replay Attack

Justin Schamotta. (2022, October 28). What is a replay attack?. Retrieved September 27, 2023.

Internal MISP references

UUID a9f0b569-8f18-579f-bf98-f4f9b93e5524 which can be used as unique global reference for Comparitech Replay Attack in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-27T00:00:00Z
date_published 2022-10-28T00:00:00Z
source MITRE
title What is a replay attack?

Corero SYN-ACKflood

Corero. (n.d.). What is a SYN-ACK Flood Attack?. Retrieved April 22, 2019.

Internal MISP references

UUID ec41de8a-c673-41bf-b713-4a647b135532 which can be used as unique global reference for Corero SYN-ACKflood in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-22T00:00:00Z
source MITRE
title What is a SYN-ACK Flood Attack?

Cloudflare SynFlood

Cloudflare. (n.d.). What is a SYN flood attack?. Retrieved April 22, 2019.

Internal MISP references

UUID e292c4fe-ae77-4393-b666-fb6290cb4aa8 which can be used as unique global reference for Cloudflare SynFlood in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-22T00:00:00Z
source MITRE
title What is a SYN flood attack?

Amazon VM

Microsoft. (n.d.). What is a virtual machine (VM)?. Retrieved October 13, 2021.

Internal MISP references

UUID 9afbd6a5-1c31-4727-8f36-04d4d8e65660 which can be used as unique global reference for Amazon VM in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-13T00:00:00Z
source MITRE
title What is a virtual machine (VM)?

RedHat Webhooks

RedHat. (2022, June 1). What is a webhook?. Retrieved July 20, 2023.

Internal MISP references

UUID 37321591-40fd-537e-ba74-71042bc5064e which can be used as unique global reference for RedHat Webhooks in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-20T00:00:00Z
date_published 2022-06-01T00:00:00Z
source MITRE
title What is a webhook?

AWS System Manager

AWS. (2023, June 2). What is AWS System Manager?. Retrieved June 2, 2023.

Internal MISP references

UUID a7813928-4351-54c5-a64e-61bd4689e93b which can be used as unique global reference for AWS System Manager in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-02T00:00:00Z
date_published 2023-06-02T00:00:00Z
source MITRE
title What is AWS System Manager?

Microsoft Azure Virtual Network Overview

Annamalai, N., Casey, C., Almeida, M., et. al.. (2019, June 18). What is Azure Virtual Network?. Retrieved October 6, 2019.

Internal MISP references

UUID bf7f2e7a-f5ae-4b6e-8c90-fd41a92c4615 which can be used as unique global reference for Microsoft Azure Virtual Network Overview in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-06T00:00:00Z
date_published 2019-06-18T00:00:00Z
source MITRE
title What is Azure Virtual Network?

CrowdStrike-BEC

Bart Lenaerts-Bergmans. (2023, March 10). What is Business Email Compromise?. Retrieved August 8, 2023.

Internal MISP references

UUID 7e674a8d-e79f-5cb0-8ad2-a7678e647c6f which can be used as unique global reference for CrowdStrike-BEC in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-08T00:00:00Z
date_published 2023-03-10T00:00:00Z
source MITRE
title What is Business Email Compromise?

Microsoft Conditional Access

Microsoft. (2023, November 15). What is Conditional Access?. Retrieved January 2, 2024.

Internal MISP references

UUID 7d39522c-5a9c-5a19-a0e4-e5aec68f5f08 which can be used as unique global reference for Microsoft Conditional Access in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-02T00:00:00Z
date_published 2023-11-15T00:00:00Z
source MITRE
title What is Conditional Access?

PAN DNS Tunneling

Palo Alto Networks. (n.d.). What Is DNS Tunneling?. Retrieved March 15, 2020.

Internal MISP references

UUID efe1c443-475b-45fc-8d33-5bf3bdf941c5 which can be used as unique global reference for PAN DNS Tunneling in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-15T00:00:00Z
source MITRE
title What Is DNS Tunneling?

Proofpoint-spoof

Proofpoint. (n.d.). What Is Email Spoofing?. Retrieved February 24, 2023.

Internal MISP references

UUID fe9f7542-bbf0-5e34-b3a9-8596cc5aa754 which can be used as unique global reference for Proofpoint-spoof in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-24T00:00:00Z
source MITRE
title What Is Email Spoofing?

magnusviri emond Apr 2016

Reynolds, James. (2016, April 7). What is emond?. Retrieved September 10, 2019.

Internal MISP references

UUID 373f64a5-a30f-4b6e-b352-d0c6f8b65fdb which can be used as unique global reference for magnusviri emond Apr 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-10T00:00:00Z
date_published 2016-04-07T00:00:00Z
source MITRE
title What is emond?

Microsoft - Azure AD Federation

Microsoft. (2018, November 28). What is federation with Azure AD?. Retrieved December 30, 2020.

Internal MISP references

UUID fedb345f-b5a7-40cd-98c7-6b14bab95ed9 which can be used as unique global reference for Microsoft - Azure AD Federation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-30T00:00:00Z
date_published 2018-11-28T00:00:00Z
source MITRE
title What is federation with Azure AD?

What Is FormBook Malware?

www.blackberry.com. (n.d.). What Is FormBook Malware?. Retrieved May 18, 2023.

Internal MISP references

UUID d1f57ed6-8f44-46cc-afb7-53d9543f68ed which can be used as unique global reference for What Is FormBook Malware? in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title What Is FormBook Malware?

What is FormBook Malware? - Check Point Software

Check Point Software. (n.d.). What is FormBook Malware? - Check Point Software. Retrieved May 18, 2023.

Internal MISP references

UUID c7670c6d-014b-4937-ac0f-9f2aec60e2d8 which can be used as unique global reference for What is FormBook Malware? - Check Point Software in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title What is FormBook Malware? - Check Point Software

FRP GitHub

fatedier. (n.d.). What is frp?. Retrieved July 10, 2024.

Internal MISP references

UUID cc682467-1ad0-50d9-9d81-be84ed862df8 which can be used as unique global reference for FRP GitHub in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-10T00:00:00Z
source MITRE
title What is frp?

grsecurity official

grsecurity. (2017, December 12). What is grsecurity?. Retrieved December 20, 2017.

Internal MISP references

UUID f87c0c95-65bd-4b57-9b7d-1b7936f03c2a which can be used as unique global reference for grsecurity official in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-20T00:00:00Z
date_published 2017-12-12T00:00:00Z
source MITRE
title What is grsecurity?

VDSO Aug 2005

Petersson, J. (2005, August 14). What is linux-gate.so.1?. Retrieved June 16, 2020.

Internal MISP references

UUID ae70f799-ebb6-4ffe-898e-945cb754c1cb which can be used as unique global reference for VDSO Aug 2005 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-16T00:00:00Z
date_published 2005-08-14T00:00:00Z
source MITRE
title What is linux-gate.so.1?

what_is_mmc

Microsoft. (2020, September 27). What is Microsoft Management Console?. Retrieved October 5, 2021.

Internal MISP references

UUID 57e130ab-f981-423e-bafe-51d0d0e1abdf which can be used as unique global reference for what_is_mmc in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-05T00:00:00Z
date_published 2020-09-27T00:00:00Z
source MITRE
title What is Microsoft Management Console?

Microsoft NET - Duplicate

Microsoft. (n.d.). What is .NET Framework?. Retrieved March 15, 2020.

Internal MISP references

UUID b4727044-51bb-43b3-afdb-515bb4bb0f7e which can be used as unique global reference for Microsoft NET - Duplicate in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-15T00:00:00Z
source MITRE
title What is .NET Framework?

Pastebin EchoSec

Ciarniello, A. (2019, September 24). What is Pastebin and Why Do Hackers Love It?. Retrieved April 11, 2023.

Internal MISP references

UUID 3fc422e5-9a1d-5ac4-8e65-1df13d8a688e which can be used as unique global reference for Pastebin EchoSec in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-04-11T00:00:00Z
date_published 2019-09-24T00:00:00Z
source MITRE
title What is Pastebin and Why Do Hackers Love It?

polymorphic-blackberry

Blackberry. (n.d.). What is Polymorphic Malware?. Retrieved September 27, 2024.

Internal MISP references

UUID 1918a3fe-b7a2-5420-8671-f602d58566fd which can be used as unique global reference for polymorphic-blackberry in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-27T00:00:00Z
source MITRE
title What is Polymorphic Malware?

polymorphic-sentinelone

SentinelOne. (2023, March 18). What is Polymorphic Malware? Examples and Challenges. Retrieved September 27, 2024.

Internal MISP references

UUID cd7a1320-3bdd-5b26-8d6d-2e2897231dcb which can be used as unique global reference for polymorphic-sentinelone in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-27T00:00:00Z
date_published 2023-03-18T00:00:00Z
source MITRE
title What is Polymorphic Malware? Examples and Challenges

Microsoft Protected View

Microsoft. (n.d.). What is Protected View?. Retrieved November 22, 2017.

Internal MISP references

UUID 5261895f-367f-4c5d-b4df-7ff44bbbe28e which can be used as unique global reference for Microsoft Protected View in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-22T00:00:00Z
source MITRE
title What is Protected View?

TechNet RPC

Microsoft. (2003, March 28). What Is RPC?. Retrieved June 12, 2016.

Internal MISP references

UUID 7eaa0fa8-953a-482e-8f6b-02607e928525 which can be used as unique global reference for TechNet RPC in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-12T00:00:00Z
date_published 2003-03-28T00:00:00Z
source MITRE
title What Is RPC?

Twilio SMS Pumping Fraud

Twilio. (n.d.). What is SMS Pumping Fraud?. Retrieved September 25, 2024.

Internal MISP references

UUID 2a75c6ae-b7d1-5af4-b647-7ac6cb63e95a which can be used as unique global reference for Twilio SMS Pumping Fraud in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-25T00:00:00Z
source MITRE
title What is SMS Pumping Fraud?

Twilio SMS Pumping

Twilio. (2024, April 10). What Is SMS Pumping Fraud and How to Stop It. Retrieved September 25, 2024.

Internal MISP references

UUID fa3ae7e9-afbb-5aac-bbf7-e76e9425b01f which can be used as unique global reference for Twilio SMS Pumping in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-25T00:00:00Z
date_published 2024-04-10T00:00:00Z
source MITRE
title What Is SMS Pumping Fraud and How to Stop It

IOKit Fundamentals

Apple. (2014, April 9). What Is the I/O Kit?. Retrieved September 24, 2021.

Internal MISP references

UUID ac90279f-becd-4a96-a08e-8c4c26dba3c0 which can be used as unique global reference for IOKit Fundamentals in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-24T00:00:00Z
date_published 2014-04-09T00:00:00Z
source MITRE
title What Is the I/O Kit?

Baeldung LD_PRELOAD

baeldung. (2020, August 9). What Is the LD_PRELOAD Trick?. Retrieved March 24, 2021.

Internal MISP references

UUID 6fd6ea96-1cf4-4169-8069-4f29dbc9f217 which can be used as unique global reference for Baeldung LD_PRELOAD in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-24T00:00:00Z
date_published 2020-08-09T00:00:00Z
source MITRE
title What Is the LD_PRELOAD Trick?

Microsoft VBScript

Microsoft. (2011, April 19). What Is VBScript?. Retrieved March 28, 2020.

Internal MISP references

UUID 5ea8d8c7-8039-4210-967a-a4dcd566bf95 which can be used as unique global reference for Microsoft VBScript in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-28T00:00:00Z
date_published 2011-04-19T00:00:00Z
source MITRE
title What Is VBScript?

VEC

CloudFlare. (n.d.). What is vendor email compromise (VEC)?. Retrieved September 12, 2023.

Internal MISP references

UUID 4fd7c9f7-4731-524a-b332-9cb7f2c025ae which can be used as unique global reference for VEC in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-12T00:00:00Z
source MITRE
title What is vendor email compromise (VEC)?

Proofpoint Vishing

Proofpoint. (n.d.). What Is Vishing?. Retrieved September 8, 2023.

Internal MISP references

UUID 7a200d34-b4f3-5036-8582-23872ef27eb1 which can be used as unique global reference for Proofpoint Vishing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-08T00:00:00Z
source MITRE
title What Is Vishing?

taxonomy_downgrade_att_tls

Alashwali, E. S., Rasmussen, K. (2019, January 26). What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS. Retrieved December 7, 2021.

Internal MISP references

UUID 4459076e-7c79-4855-9091-5aabd274f586 which can be used as unique global reference for taxonomy_downgrade_att_tls in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-12-07T00:00:00Z
date_published 2019-01-26T00:00:00Z
source MITRE
title What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS

ESET Emotet July 6 2023

Jakub Kaloč. (2023, July 6). What’s up with Emotet?. Retrieved February 27, 2024.

Internal MISP references

UUID d351b4a1-72b8-488d-a926-176c77ee9d1c which can be used as unique global reference for ESET Emotet July 6 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-27T00:00:00Z
date_published 2023-07-06T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title What’s up with Emotet?

FireEye fxsst June 2011

Harbour, N. (2011, June 3). What the fxsst?. Retrieved November 17, 2020.

Internal MISP references

UUID 06f8f5b2-2ebe-4210-84b6-f86e911a7118 which can be used as unique global reference for FireEye fxsst June 2011 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-17T00:00:00Z
date_published 2011-06-03T00:00:00Z
source MITRE
title What the fxsst?

Krebs Capital One August 2019

Krebs, B.. (2019, August 19). What We Can Learn from the Capital One Hack. Retrieved March 25, 2020.

Internal MISP references

UUID 7d917231-735c-40d8-806d-7fee60d2f996 which can be used as unique global reference for Krebs Capital One August 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-25T00:00:00Z
date_published 2019-08-19T00:00:00Z
source MITRE
title What We Can Learn from the Capital One Hack

Symantec ADS May 2009

Pravs. (2009, May 25). What you need to know about alternate data streams in windows? Is your Data secure? Can you restore that?. Retrieved March 21, 2018.

Internal MISP references

UUID e2970bef-439d-435d-92e7-8c58abbd270c which can be used as unique global reference for Symantec ADS May 2009 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-21T00:00:00Z
date_published 2009-05-25T00:00:00Z
source MITRE
title What you need to know about alternate data streams in windows? Is your Data secure? Can you restore that?

BH Manul Aug 2016

Galperin, E., Et al.. (2016, August 4). When Governments Attack: State Sponsored Malware Attacks Against Activists, Lawyers, and Journalists. Retrieved May 23, 2018.

Internal MISP references

UUID 1debebac-6578-433f-b8c3-d17e704ee501 which can be used as unique global reference for BH Manul Aug 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-05-23T00:00:00Z
date_published 2016-08-04T00:00:00Z
source MITRE
title When Governments Attack: State Sponsored Malware Attacks Against Activists, Lawyers, and Journalists

Dragos Heroku Watering Hole

Kent Backman. (2021, May 18). When Intrusions Don’t Align: A New Water Watering Hole and Oldsmar. Retrieved August 18, 2022.

Internal MISP references

UUID 8768909c-f511-4067-9a97-6f7dee24f276 which can be used as unique global reference for Dragos Heroku Watering Hole in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-18T00:00:00Z
date_published 2021-05-18T00:00:00Z
source MITRE
title When Intrusions Don’t Align: A New Water Watering Hole and Oldsmar

SpectorOps Bifrost Kerberos macOS 2019

Cody Thomas. (2019, November 14). When Kirbi walks the Bifrost. Retrieved October 6, 2021.

Internal MISP references

UUID 58ecb4e9-25fc-487b-9fed-25c781cc531b which can be used as unique global reference for SpectorOps Bifrost Kerberos macOS 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-06T00:00:00Z
date_published 2019-11-14T00:00:00Z
source MITRE
title When Kirbi walks the Bifrost

Palo Alto Brute Ratel July 2022

Harbison, M. and Renals, P. (2022, July 5). When Pentest Tools Go Brutal: Red-Teaming Tool Being Abused by Malicious Actors. Retrieved February 1, 2023.

Internal MISP references

UUID a9ab0444-386b-5baf-84e1-0e6df4a21296 which can be used as unique global reference for Palo Alto Brute Ratel July 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-01T00:00:00Z
date_published 2022-07-05T00:00:00Z
source MITRE
title When Pentest Tools Go Brutal: Red-Teaming Tool Being Abused by Malicious Actors

Trend Micro When Phishing Starts from the Inside 2017

Chris Taylor. (2017, October 5). When Phishing Starts from the Inside. Retrieved October 8, 2019.

Internal MISP references

UUID dbdc2009-a468-439b-bd96-e6153b3fb8a1 which can be used as unique global reference for Trend Micro When Phishing Starts from the Inside 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-08T00:00:00Z
date_published 2017-10-05T00:00:00Z
source MITRE
title When Phishing Starts from the Inside

Booz Allen Hamilton

Booz Allen Hamilton. (n.d.). When The Lights Went Out. Retrieved October 22, 2019

Internal MISP references

UUID 7f0acd33-602e-5f07-a1ae-a87e3c8f2eb5 which can be used as unique global reference for Booz Allen Hamilton in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-22T00:00:00Z
source MITRE
title When The Lights Went Out

Microsoft Where to use TxF

Microsoft. (n.d.). When to Use Transactional NTFS. Retrieved December 20, 2017.

Internal MISP references

UUID f315072c-67cb-4166-aa18-8e92e00ef7e8 which can be used as unique global reference for Microsoft Where to use TxF in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-20T00:00:00Z
source MITRE
title When to Use Transactional NTFS

Brining MimiKatz to Unix

Tim Wadhwa-Brown. (2018, November). Where 2 worlds collide Bringing Mimikatz et al to UNIX. Retrieved October 13, 2021.

Internal MISP references

UUID 5ad06565-6694-4c42-81c9-880d66f6d07f which can be used as unique global reference for Brining MimiKatz to Unix in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-13T00:00:00Z
date_published 2018-11-01T00:00:00Z
source MITRE
title Where 2 worlds collide Bringing Mimikatz et al to UNIX

Dell Lateral Movement

Carvey, H.. (2014, September 2). Where you AT?: Indicators of lateral movement using at.exe on Windows 7 systems. Retrieved January 25, 2016.

Internal MISP references

UUID fcc9b52a-751f-4985-8c32-7aaf411706ad which can be used as unique global reference for Dell Lateral Movement in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-25T00:00:00Z
date_published 2014-09-02T00:00:00Z
source MITRE, Tidal Cyber
title Where you AT?: Indicators of lateral movement using at.exe on Windows 7 systems

Secureworks - AT.exe Scheduled Task

Carvey, H.. (2014, September). Where You AT?: Indicators of Lateral Movement Using at.exe on Windows 7 Systems. Retrieved November 27, 2019.

Internal MISP references

UUID cd197a24-3671-427f-8ee6-da001ec985c8 which can be used as unique global reference for Secureworks - AT.exe Scheduled Task in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-11-27T00:00:00Z
date_published 2014-09-01T00:00:00Z
source MITRE
title Where You AT?: Indicators of Lateral Movement Using at.exe on Windows 7 Systems

Cybereason WhisperGate February 2022

Cybereason Nocturnus. (2022, February 15). Cybereason vs. WhisperGate and HermeticWiper. Retrieved March 10, 2022.

Internal MISP references

UUID 464d9cac-04c7-4e57-a5d6-604fba90a982 which can be used as unique global reference for Cybereason WhisperGate February 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-10T00:00:00Z
source MITRE
title WhisperGate and HermeticWiper

RecordedFuture WhisperGate Jan 2022

Insikt Group. (2020, January 28). WhisperGate Malware Corrupts Computers in Ukraine. Retrieved September 16, 2024.

Internal MISP references

UUID 4610e4db-a75b-5fdd-826d-15099d131585 which can be used as unique global reference for RecordedFuture WhisperGate Jan 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-16T00:00:00Z
date_published 2020-01-28T00:00:00Z
source MITRE
title WhisperGate Malware Corrupts Computers in Ukraine

Symantec Whitefly March 2019

Symantec. (2019, March 6). Whitefly: Espionage Group has Singapore in Its Sights. Retrieved May 26, 2020.

Internal MISP references

UUID d0e48356-36d9-4b4c-b621-e3c4404378d2 which can be used as unique global reference for Symantec Whitefly March 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-26T00:00:00Z
date_published 2019-03-06T00:00:00Z
source MITRE, Tidal Cyber
title Whitefly: Espionage Group has Singapore in Its Sights

Accenture Lyceum Targets November 2021

Accenture. (2021, November 9). Who are latest targets of cyber group Lyceum?. Retrieved June 16, 2022.

Internal MISP references

UUID 127836ce-e459-405d-a75c-32fd5f0ab198 which can be used as unique global reference for Accenture Lyceum Targets November 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-16T00:00:00Z
date_published 2021-11-09T00:00:00Z
source MITRE
title Who are latest targets of cyber group Lyceum?

Who Hid My Desktop

Safran, Or. Asinovsky, Pavel. (2017, November). Who Hid My Desktop: Deep Dive Into HVNC. Retrieved November 28, 2023.

Internal MISP references

UUID f9c81b1d-b58c-54d4-8eb8-cd86e9121ce4 which can be used as unique global reference for Who Hid My Desktop in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-11-28T00:00:00Z
date_published 2017-11-01T00:00:00Z
source MITRE
title Who Hid My Desktop: Deep Dive Into HVNC

Krebs-Anna

Brian Krebs. (2017, January 18). Who is Anna-Senpai, the Mirai Worm Author?. Retrieved May 15, 2017.

Internal MISP references

UUID 028b7582-be46-4642-9e36-b781cac66340 which can be used as unique global reference for Krebs-Anna in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-05-15T00:00:00Z
date_published 2017-01-18T00:00:00Z
source MITRE
title Who is Anna-Senpai, the Mirai Worm Author?

CrowdStrike Ember Bear Profile March 2022

CrowdStrike. (2022, March 30). Who is EMBER BEAR?. Retrieved June 9, 2022.

Internal MISP references

UUID 0639c340-b495-4d91-8418-3069f3fe0df1 which can be used as unique global reference for CrowdStrike Ember Bear Profile March 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-09T00:00:00Z
date_published 2022-03-30T00:00:00Z
source MITRE
title Who is EMBER BEAR?

WHOIS

NTT America. (n.d.). Whois Lookup. Retrieved October 20, 2020.

Internal MISP references

UUID fa6cba30-66e9-4a6b-85e8-a8c3773a3efe which can be used as unique global reference for WHOIS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
source MITRE
title Whois Lookup

Meyers Numbered Panda

Meyers, A. (2013, March 29). Whois Numbered Panda. Retrieved January 14, 2016.

Internal MISP references

UUID 988dfcfc-0c16-4129-9523-a77539291951 which can be used as unique global reference for Meyers Numbered Panda in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-14T00:00:00Z
date_published 2013-03-29T00:00:00Z
source MITRE, Tidal Cyber
title Whois Numbered Panda

CrowdStrike PIONEER KITTEN August 2020

Orleans, A. (2020, August 31). Who Is PIONEER KITTEN?. Retrieved December 21, 2020.

Internal MISP references

UUID 4fce29cc-ddab-4b96-b295-83c282a87564 which can be used as unique global reference for CrowdStrike PIONEER KITTEN August 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-21T00:00:00Z
date_published 2020-08-31T00:00:00Z
source MITRE, Tidal Cyber
title Who Is PIONEER KITTEN?

SECURELIST Bright Star 2015

Baumgartner, K., Guerrero-Saade, J. (2015, March 4). Who’s Really Spreading through the Bright Star?. Retrieved December 18, 2020.

Internal MISP references

UUID 59cba16f-91ed-458c-91c9-5b02c03678f5 which can be used as unique global reference for SECURELIST Bright Star 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-18T00:00:00Z
date_published 2015-03-04T00:00:00Z
source MITRE
title Who’s Really Spreading through the Bright Star?

Trend Micro Privileged Container

Fiser, D., Oliveira, A.. (2019, December 20). Why a Privileged Container in Docker is a Bad Idea. Retrieved March 30, 2021.

Internal MISP references

UUID 92ac290c-4863-4774-b334-848ed72e3627 which can be used as unique global reference for Trend Micro Privileged Container in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-30T00:00:00Z
date_published 2019-12-20T00:00:00Z
source MITRE
title Why a Privileged Container in Docker is a Bad Idea

Mandiant UNC3944 September 14 2023

Mandiant Intelligence. (2023, September 14). Why Are You Texting Me? UNC3944 Leverages SMS Phishing Campaigns for SIM Swapping, Ransomware, Extortion, and Notoriety. Retrieved November 16, 2023.

Internal MISP references

UUID 7420d79f-c6a3-4932-9c2e-c9cc36e2ca35 which can be used as unique global reference for Mandiant UNC3944 September 14 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-11-16T00:00:00Z
date_published 2023-09-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Why Are You Texting Me? UNC3944 Leverages SMS Phishing Campaigns for SIM Swapping, Ransomware, Extortion, and Notoriety

Mandiant UNC3944 SMS Phishing 2023

Mandiant Intelligence. (2023, September 14). Why Are You Texting Me? UNC3944 Leverages SMS Phishing Campaigns for SIM Swapping, Ransomware, Extortion, and Notoriety. Retrieved January 2, 2024.

Internal MISP references

UUID 3a310dbd-4b5c-5eaf-a4ce-699e52007c9b which can be used as unique global reference for Mandiant UNC3944 SMS Phishing 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-02T00:00:00Z
date_published 2023-09-14T00:00:00Z
source MITRE
title Why Are You Texting Me? UNC3944 Leverages SMS Phishing Campaigns for SIM Swapping, Ransomware, Extortion, and Notoriety

Electron Security 2

Stack Overflow. (n.d.). Why do I see an "Electron Security Warning" after updating my Electron project to the latest version?. Retrieved March 7, 2024.

Internal MISP references

UUID 8ec05b76-ec57-5173-9e1e-cf4131d7bd51 which can be used as unique global reference for Electron Security 2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-07T00:00:00Z
source MITRE
title Why do I see an "Electron Security Warning" after updating my Electron project to the latest version?

Auth0 - Why You Should Always Use Access Tokens to Secure APIs Sept 2019

Auth0. (n.d.). Why You Should Always Use Access Tokens to Secure APIs. Retrieved September 12, 2019.

Internal MISP references

UUID 8ec52402-7e54-463d-8906-f373e5855018 which can be used as unique global reference for Auth0 - Why You Should Always Use Access Tokens to Secure APIs Sept 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-12T00:00:00Z
source MITRE
title Why You Should Always Use Access Tokens to Secure APIs

Securelist Digital Certificates

Ladikov, A. (2015, January 29). Why You Shouldn’t Completely Trust Files Signed with Digital Certificates. Retrieved March 31, 2016.

Internal MISP references

UUID 3568163b-24b8-42fd-b111-b9d83c34cc4f which can be used as unique global reference for Securelist Digital Certificates in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-03-31T00:00:00Z
date_published 2015-01-29T00:00:00Z
source MITRE
title Why You Shouldn’t Completely Trust Files Signed with Digital Certificates

Crowdstrike DNS Hijack 2019

Matt Dahl. (2019, January 25). Widespread DNS Hijacking Activity Targets Multiple Sectors. Retrieved February 14, 2022.

Internal MISP references

UUID 969ad6de-9415-464d-ba52-2e61e1814a92 which can be used as unique global reference for Crowdstrike DNS Hijack 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-14T00:00:00Z
date_published 2019-01-25T00:00:00Z
source MITRE
title Widespread DNS Hijacking Activity Targets Multiple Sectors

Browser Adrozek

Microsoft Threat Intelligence. (2020, December 10). Widespread malware campaign seeks to silently inject ads into search results, affects multiple browsers. Retrieved February 26, 2024.

Internal MISP references

UUID 48afb730-b5e1-5a85-bb60-9ef9b536e397 which can be used as unique global reference for Browser Adrozek in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-26T00:00:00Z
date_published 2020-12-10T00:00:00Z
source MITRE
title Widespread malware campaign seeks to silently inject ads into search results, affects multiple browsers

Wi-Fi Password of All Connected Networks in Windows/Linux

Geeks for Geeks. (n.d.). Wi-Fi Password of All Connected Networks in Windows/Linux. Retrieved September 8, 2023.

Internal MISP references

UUID 7005f62f-0239-56c7-964b-64384e17b8da which can be used as unique global reference for Wi-Fi Password of All Connected Networks in Windows/Linux in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-08T00:00:00Z
source MITRE
title Wi-Fi Password of All Connected Networks in Windows/Linux

Wikipedia Exe Compression

Executable compression. (n.d.). Retrieved December 4, 2014.

Internal MISP references

UUID 13ac05f8-f2a9-4243-8039-aff9ee1d5fc6 which can be used as unique global reference for Wikipedia Exe Compression in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-12-04T00:00:00Z
source MITRE
title Wikipedia Exe Compression

William Largent June 2018

William Largent. (2018, June 06) VPNFilter Update - VPNFilter exploits endpoints, targets new devices. Retrieved March 28, 2019

Internal MISP references

UUID ccc34a5f-e17d-5b4c-84cf-ccff3ff9d845 which can be used as unique global reference for William Largent June 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-28T00:00:00Z
source MITRE
title William Largent June 2018

ESET Carberp March 2012

Matrosov, A., Rodionov, E., Volkov, D., Harley, D. (2012, March 2). Win32/Carberp When You’re in a Black Hole, Stop Digging. Retrieved July 15, 2020.

Internal MISP references

UUID 806eadfc-f473-4f2b-b03b-8a1f1c0a2d96 which can be used as unique global reference for ESET Carberp March 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-07-15T00:00:00Z
date_published 2012-03-02T00:00:00Z
source MITRE
title Win32/Carberp When You’re in a Black Hole, Stop Digging

microsoft.com April 2 2012

Microsoft Corporation. (2012, April 2). Win32Gamarue threat description - Microsoft Security Intelligence. Retrieved September 27, 2024.

Internal MISP references

UUID de44abcc-9467-4c63-b0c4-c3a3b282ae39 which can be used as unique global reference for microsoft.com April 2 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-27T00:00:00Z
date_published 2012-04-02T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Win32Gamarue threat description - Microsoft Security Intelligence

ESET Industroyer

Anton Cherepanov. (2017, June 12). Win32/Industroyer: A new threat for industrial controls systems. Retrieved December 18, 2020.

Internal MISP references

UUID 9197f712-3c53-4746-9722-30e248511611 which can be used as unique global reference for ESET Industroyer in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-18T00:00:00Z
date_published 2017-06-12T00:00:00Z
source MITRE
title Win32/Industroyer: A new threat for industrial controls systems

Microsoft Kasidet

Manuel, J. and Plantado, R.. (2015, August 9). Win32/Kasidet. Retrieved March 24, 2016.

Internal MISP references

UUID 7c34c189-6581-4a56-aead-871400839d1a which can be used as unique global reference for Microsoft Kasidet in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-03-24T00:00:00Z
date_published 2015-08-09T00:00:00Z
source MITRE
title Win32/Kasidet

ESET Ebury Oct 2017

Vachon, F. (2017, October 30). Windigo Still not Windigone: An Ebury Update . Retrieved February 10, 2021.

Internal MISP references

UUID 5257a8ed-1cc8-42f8-86a7-8c0fd0e553a7 which can be used as unique global reference for ESET Ebury Oct 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-10T00:00:00Z
date_published 2017-10-30T00:00:00Z
source MITRE
title Windigo Still not Windigone: An Ebury Update

Microsoft AMSI June 2015

Microsoft. (2015, June 9). Windows 10 to offer application developers new malware defenses. Retrieved February 12, 2018.

Internal MISP references

UUID d3724d08-f89b-4fb9-a0ea-3a6f929e0b6a which can be used as unique global reference for Microsoft AMSI June 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-12T00:00:00Z
date_published 2015-06-09T00:00:00Z
source MITRE
title Windows 10 to offer application developers new malware defenses

Davidson Windows

Davidson, L. (n.d.). Windows 7 UAC whitelist. Retrieved November 12, 2014.

Internal MISP references

UUID 49af01f2-06c5-4b21-9882-901ad828ee28 which can be used as unique global reference for Davidson Windows in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-12T00:00:00Z
source MITRE
title Windows 7 UAC whitelist

IRED API Hashing

spotheplanet. (n.d.). Windows API Hashing in Malware. Retrieved August 22, 2022.

Internal MISP references

UUID 1b8b87d5-1b70-401b-8850-d8afd3b22356 which can be used as unique global reference for IRED API Hashing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-22T00:00:00Z
source MITRE
title Windows API Hashing in Malware

TrendMicro WindowsAppMac

Trend Micro. (2019, February 11). Windows App Runs on Mac, Downloads Info Stealer and Adware. Retrieved April 25, 2019.

Internal MISP references

UUID dc673650-1a37-4af1-aa03-8f57a064156b which can be used as unique global reference for TrendMicro WindowsAppMac in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-25T00:00:00Z
date_published 2019-02-11T00:00:00Z
source MITRE
title Windows App Runs on Mac, Downloads Info Stealer and Adware

Windows Commands JPCERT

Tomonaga, S. (2016, January 26). Windows Commands Abused by Attackers. Retrieved February 2, 2016.

Internal MISP references

UUID 9d935f7f-bc2a-4d09-a51a-82074ffd7d77 which can be used as unique global reference for Windows Commands JPCERT in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-02-02T00:00:00Z
date_published 2016-01-26T00:00:00Z
source MITRE
title Windows Commands Abused by Attackers

Amplia WCE

Amplia Security. (n.d.). Windows Credentials Editor (WCE) F.A.Q.. Retrieved September 12, 2024.

Internal MISP references

UUID 790ea33a-7a64-488e-ab90-d82e021e0c06 which can be used as unique global reference for Amplia WCE in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
source MITRE
title Windows Credentials Editor (WCE) F.A.Q.

Microsoft Windows Defender Application Control

Gorzelany, A., Hall, J., Poggemeyer, L.. (2019, January 7). Windows Defender Application Control. Retrieved July 16, 2019.

Internal MISP references

UUID 678ef307-d203-4b65-bed4-b844ada7ab83 which can be used as unique global reference for Microsoft Windows Defender Application Control in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-07-16T00:00:00Z
date_published 2019-01-07T00:00:00Z
source MITRE
title Windows Defender Application Control

Microsoft Operation Wilysupply

Florio, E.. (2017, May 4). Windows Defender ATP thwarts Operation WilySupply software supply chain cyberattack. Retrieved February 14, 2019.

Internal MISP references

UUID 567ce633-a061-460b-84af-01dfe3d818c7 which can be used as unique global reference for Microsoft Operation Wilysupply in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-14T00:00:00Z
date_published 2017-05-04T00:00:00Z
source MITRE
title Windows Defender ATP thwarts Operation WilySupply software supply chain cyberattack

PassLib mscache

Eli Collins. (2016, November 25). Windows' Domain Cached Credentials v2. Retrieved February 21, 2020.

Internal MISP references

UUID ce40e997-d04b-49a6-8838-13205c54243a which can be used as unique global reference for PassLib mscache in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-21T00:00:00Z
date_published 2016-11-25T00:00:00Z
source MITRE
title Windows' Domain Cached Credentials v2

Secure Team - Scriptrunner.exe

Secure Team - Information Assurance. (2023, January 8). Windows Error Reporting Tool Abused to Load Malware. Retrieved July 8, 2024.

Internal MISP references

UUID 930ca682-03e0-57e7-a1ec-5a3186f0ff64 which can be used as unique global reference for Secure Team - Scriptrunner.exe in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-08T00:00:00Z
date_published 2023-01-08T00:00:00Z
source MITRE
title Windows Error Reporting Tool Abused to Load Malware

ProjectZero File Write EoP Apr 2018

Forshaw, J. (2018, April 18). Windows Exploitation Tricks: Exploiting Arbitrary File Writes for Local Elevation of Privilege. Retrieved May 3, 2018.

Internal MISP references

UUID 2c49288b-438d-487a-8e6e-f9d9eda73e2f which can be used as unique global reference for ProjectZero File Write EoP Apr 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-05-03T00:00:00Z
date_published 2018-04-18T00:00:00Z
source MITRE
title Windows Exploitation Tricks: Exploiting Arbitrary File Writes for Local Elevation of Privilege

DBAPPSecurity BITTER zero-day Feb 2021

JinQuan, MaDongZe, TuXiaoYi, and LiHao. (2021, February 10). Windows kernel zero-day exploit (CVE-2021-1732) is used by BITTER APT in targeted attack. Retrieved June 1, 2022.

Internal MISP references

UUID fb98df9a-303d-4658-93da-0dcbd7bf9b1e which can be used as unique global reference for DBAPPSecurity BITTER zero-day Feb 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-01T00:00:00Z
date_published 2021-02-10T00:00:00Z
source MITRE
title Windows kernel zero-day exploit (CVE-2021-1732) is used by BITTER APT in targeted attack

EyeofRa Detecting Hooking June 2017

Eye of Ra. (2017, June 27). Windows Keylogger Part 2: Defense against user-land. Retrieved December 12, 2017.

Internal MISP references

UUID d2d2186c-040f-4045-b161-fc468aa09534 which can be used as unique global reference for EyeofRa Detecting Hooking June 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-12T00:00:00Z
date_published 2017-06-27T00:00:00Z
source MITRE
title Windows Keylogger Part 2: Defense against user-land

Passcape LSA Secrets

Passcape. (n.d.). Windows LSA secrets. Retrieved February 21, 2020.

Internal MISP references

UUID 64b0e13f-de5f-4964-bcfa-bb0f6206383a which can be used as unique global reference for Passcape LSA Secrets in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-21T00:00:00Z
source MITRE
title Windows LSA secrets

Windows Malware Infecting Android

Lucian Constantin. (2014, January 23). Windows malware tries to infect Android devices connected to PCs. Retrieved May 25, 2022.

Internal MISP references

UUID 3733386a-14bd-44a6-8241-a10660ba25d9 which can be used as unique global reference for Windows Malware Infecting Android in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-25T00:00:00Z
date_published 2014-01-23T00:00:00Z
source MITRE
title Windows malware tries to infect Android devices connected to PCs

MSDN WMI

Microsoft. (n.d.). Windows Management Instrumentation. Retrieved April 27, 2016.

Internal MISP references

UUID 210ca539-71f6-4494-91ea-402a3e0e2a10 which can be used as unique global reference for MSDN WMI in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-27T00:00:00Z
source MITRE
title Windows Management Instrumentation

FireEye WMI 2015

Ballenthin, W., et al. (2015). Windows Management Instrumentation (WMI) Offense, Defense, and Forensics. Retrieved March 30, 2016.

Internal MISP references

UUID 135ccd72-2714-4453-9c8f-f5fde31905ee which can be used as unique global reference for FireEye WMI 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-03-30T00:00:00Z
date_published 2015-01-01T00:00:00Z
source MITRE
title Windows Management Instrumentation (WMI) Offense, Defense, and Forensics

win_msc_files_overview

Brinkmann, M.. (2017, June 10). Windows .msc files overview. Retrieved September 20, 2021.

Internal MISP references

UUID 81aa896a-3498-4c37-8882-2b77933b71a8 which can be used as unique global reference for win_msc_files_overview in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-20T00:00:00Z
date_published 2017-06-10T00:00:00Z
source MITRE
title Windows .msc files overview

Hill NT Shell

Hill, T. (n.d.). Windows NT Command Shell. Retrieved December 5, 2014.

Internal MISP references

UUID 0e5dfc7e-c908-49b4-a54f-7dcecf332ee8 which can be used as unique global reference for Hill NT Shell in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-12-05T00:00:00Z
source MITRE
title Windows NT Command Shell

passcape Windows Vault

Passcape. (n.d.). Windows Password Recovery - Vault Explorer and Decoder. Retrieved November 24, 2020.

Internal MISP references

UUID a8a56a64-8e73-4331-9961-b1f9b6cbb348 which can be used as unique global reference for passcape Windows Vault in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-24T00:00:00Z
source MITRE
title Windows Password Recovery - Vault Explorer and Decoder

Malware Archaeology PowerShell Cheat Sheet

Malware Archaeology. (2016, June). WINDOWS POWERSHELL LOGGING CHEAT SHEET - Win 7/Win 2008 or later. Retrieved June 24, 2016.

Internal MISP references

UUID d7da4285-aeed-42dc-8f55-facbe6daf317 which can be used as unique global reference for Malware Archaeology PowerShell Cheat Sheet in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-24T00:00:00Z
date_published 2016-06-01T00:00:00Z
source MITRE
title WINDOWS POWERSHELL LOGGING CHEAT SHEET - Win 7/Win 2008 or later

TechNet PowerShell

Microsoft. (n.d.). Windows PowerShell Scripting. Retrieved April 28, 2016.

Internal MISP references

UUID 20ec94d1-4a5c-43f5-bb65-f3ea965d2b6e which can be used as unique global reference for TechNet PowerShell in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-28T00:00:00Z
source MITRE
title Windows PowerShell Scripting

Windows Privilege Escalation Guide

absolomb. (2018, January 26). Windows Privilege Escalation Guide. Retrieved August 10, 2018.

Internal MISP references

UUID 185154f2-5f2e-48bf-b609-991e9d6a037b which can be used as unique global reference for Windows Privilege Escalation Guide in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-10T00:00:00Z
date_published 2018-01-26T00:00:00Z
source MITRE
title Windows Privilege Escalation Guide

SploitSpren Windows Priv Jan 2018

McFarland, R. (2018, January 26). Windows Privilege Escalation Guide. Retrieved August 10, 2018.

Internal MISP references

UUID c52945dc-eb20-4e69-8f8e-a262f33c244c which can be used as unique global reference for SploitSpren Windows Priv Jan 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-10T00:00:00Z
date_published 2018-01-26T00:00:00Z
source MITRE
title Windows Privilege Escalation Guide

SecurityBoulevard Unquoted Services APR 2018

HackHappy. (2018, April 23). Windows Privilege Escalation – Unquoted Services. Retrieved August 10, 2018.

Internal MISP references

UUID 939c05ae-bb21-4ed2-8fa3-a729f717ee3a which can be used as unique global reference for SecurityBoulevard Unquoted Services APR 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-10T00:00:00Z
date_published 2018-04-23T00:00:00Z
source MITRE
title Windows Privilege Escalation – Unquoted Services

Windows Unquoted Services

HackHappy. (2018, April 23). Windows Privilege Escalation – Unquoted Services. Retrieved August 10, 2018.

Internal MISP references

UUID 30681a0a-a49f-416a-b5bc-621c60f1130a which can be used as unique global reference for Windows Unquoted Services in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-10T00:00:00Z
date_published 2018-04-23T00:00:00Z
source MITRE
title Windows Privilege Escalation – Unquoted Services

Windows Process Injection KernelCallbackTable

odzhan. (2019, May 25). Windows Process Injection: KernelCallbackTable used by FinFisher / FinSpy. Retrieved February 4, 2022.

Internal MISP references

UUID 01a3fc64-ff07-48f7-b0d9-5728012761c7 which can be used as unique global reference for Windows Process Injection KernelCallbackTable in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-04T00:00:00Z
date_published 2019-05-25T00:00:00Z
source MITRE
title Windows Process Injection: KernelCallbackTable used by FinFisher / FinSpy

Modexp Windows Process Injection

odzhan. (2019, April 25). Windows Process Injection: WordWarping, Hyphentension, AutoCourgette, Streamception, Oleum, ListPlanting, Treepoline. Retrieved November 15, 2021.

Internal MISP references

UUID 1bf45166-bfce-450e-87d1-b1e3b19fdb62 which can be used as unique global reference for Modexp Windows Process Injection in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-11-15T00:00:00Z
date_published 2019-04-25T00:00:00Z
source MITRE
title Windows Process Injection: WordWarping, Hyphentension, AutoCourgette, Streamception, Oleum, ListPlanting, Treepoline

Wikipedia Windows Registry

Wikipedia. (n.d.). Windows Registry. Retrieved February 2, 2015.

Internal MISP references

UUID 656f0ffd-33e0-40ef-bdf7-70758f855f18 which can be used as unique global reference for Wikipedia Windows Registry in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-02-02T00:00:00Z
source MITRE
title Windows Registry

Cylance Reg Persistence Sept 2013

Langendorf, S. (2013, September 24). Windows Registry Persistence, Part 2: The Run Keys and Search-Order. Retrieved April 11, 2018.

Internal MISP references

UUID 9e9c745f-19fd-4218-b8dc-85df804ecb70 which can be used as unique global reference for Cylance Reg Persistence Sept 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-11T00:00:00Z
date_published 2013-09-24T00:00:00Z
source MITRE
title Windows Registry Persistence, Part 2: The Run Keys and Search-Order

Microsoft WinRM

Microsoft. (n.d.). Windows Remote Management. Retrieved September 12, 2024.

Internal MISP references

UUID ddbe110c-88f1-4774-bcb9-cd18b6218fc4 which can be used as unique global reference for Microsoft WinRM in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
source MITRE
title Windows Remote Management

Symantec Windows Rootkits

Symantec. (n.d.). Windows Rootkit Overview. Retrieved December 21, 2017.

Internal MISP references

UUID 5b8d9094-dabf-4c29-a95b-b90dbcf07382 which can be used as unique global reference for Symantec Windows Rootkits in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-21T00:00:00Z
source MITRE
title Windows Rootkit Overview

insecure_reg_perms

Clément Labro. (2020, November 12). Windows RpcEptMapper Service Insecure Registry Permissions EoP. Retrieved August 25, 2021.

Internal MISP references

UUID d18717ae-7fe4-40f9-aff2-b35120d31dc8 which can be used as unique global reference for insecure_reg_perms in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-25T00:00:00Z
date_published 2020-11-12T00:00:00Z
source MITRE
title Windows RpcEptMapper Service Insecure Registry Permissions EoP

Microsoft Windows Scripts

Microsoft. (2017, January 18). Windows Script Interfaces. Retrieved June 23, 2020.

Internal MISP references

UUID 9e7cd4da-da18-4d20-809a-19abb4352807 which can be used as unique global reference for Microsoft Windows Scripts in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-23T00:00:00Z
date_published 2017-01-18T00:00:00Z
source MITRE
title Windows Script Interfaces

Microsoft Security Event 4670

Franklin Smith, R. (n.d.). Windows Security Log Event ID 4670. Retrieved November 4, 2019.

Internal MISP references

UUID 23a50cd5-ac76-4dbe-8937-0fe8aec8cbf6 which can be used as unique global reference for Microsoft Security Event 4670 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-11-04T00:00:00Z
source MITRE
title Windows Security Log Event ID 4670

Windows Log Events

Franklin Smith. (n.d.). Windows Security Log Events. Retrieved February 21, 2020.

Internal MISP references

UUID 53464503-6e6f-45d8-a208-1820678deeac which can be used as unique global reference for Windows Log Events in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-21T00:00:00Z
source MITRE
title Windows Security Log Events

winser19_file_overwrite_bug_twitter

Naceri, A. (2021, November 7). Windows Server 2019 file overwrite bug. Retrieved April 7, 2022.

Internal MISP references

UUID 158d971e-2f96-5200-8a87-d3887de30ff0 which can be used as unique global reference for winser19_file_overwrite_bug_twitter in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-07T00:00:00Z
date_published 2021-11-07T00:00:00Z
source MITRE
title Windows Server 2019 file overwrite bug

Windows Server Containers Are Open

Daniel Prizmant. (2020, July 15). Windows Server Containers Are Open, and Here's How You Can Break Out. Retrieved October 1, 2021.

Internal MISP references

UUID 9a801256-5852-433e-95bd-768f9b70b9fe which can be used as unique global reference for Windows Server Containers Are Open in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-01T00:00:00Z
date_published 2020-07-15T00:00:00Z
source MITRE
title Windows Server Containers Are Open, and Here's How You Can Break Out

Sysinternals AppCertDlls Oct 2007

Microsoft. (2007, October 24). Windows Sysinternals - AppCertDlls. Retrieved December 18, 2017.

Internal MISP references

UUID 68e006df-9fb6-4890-9952-7bad38b16dee which can be used as unique global reference for Sysinternals AppCertDlls Oct 2007 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-18T00:00:00Z
date_published 2007-10-24T00:00:00Z
source MITRE
title Windows Sysinternals - AppCertDlls

Russinovich Sysinternals

Russinovich, M. (2014, May 2). Windows Sysinternals PsExec v2.11. Retrieved May 13, 2015.

Internal MISP references

UUID 72d27aca-62c5-4e96-9977-c41951aaa888 which can be used as unique global reference for Russinovich Sysinternals in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-05-13T00:00:00Z
date_published 2014-05-02T00:00:00Z
source MITRE
title Windows Sysinternals PsExec v2.11

Microsoft System Services Fundamentals

Microsoft. (2018, February 17). Windows System Services Fundamentals. Retrieved March 28, 2022.

Internal MISP references

UUID 25d54a16-59a0-497d-a4a5-021420da8f1c which can be used as unique global reference for Microsoft System Services Fundamentals in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-28T00:00:00Z
date_published 2018-02-17T00:00:00Z
source MITRE
title Windows System Services Fundamentals

Technet Windows Time Service

Mathers, B. (2016, September 30). Windows Time Service Tools and Settings. Retrieved November 25, 2016.

Internal MISP references

UUID 0d908e07-abc1-40fc-b147-9b9fd483b262 which can be used as unique global reference for Technet Windows Time Service in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-11-25T00:00:00Z
date_published 2016-09-30T00:00:00Z
source MITRE
title Windows Time Service Tools and Settings

Microsoft W32Time May 2017

Mathers, B. (2017, May 31). Windows Time Service Tools and Settings. Retrieved March 26, 2018.

Internal MISP references

UUID 9e3d8dec-745a-4744-b80c-d65897ebba3c which can be used as unique global reference for Microsoft W32Time May 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-26T00:00:00Z
date_published 2017-05-31T00:00:00Z
source MITRE
title Windows Time Service Tools and Settings

Microsoft W32Time Feb 2018

Microsoft. (2018, February 1). Windows Time Service (W32Time). Retrieved March 26, 2018.

Internal MISP references

UUID 991f7a9f-4317-42fa-bc9b-f533fe36b517 which can be used as unique global reference for Microsoft W32Time Feb 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-26T00:00:00Z
date_published 2018-02-01T00:00:00Z
source MITRE
title Windows Time Service (W32Time)

Microsoft CVE-2021-1732 Feb 2021

Microsoft. (2018, February 9). Windows Win32k Elevation of Privilege Vulnerability CVE-2021-1732. Retrieved June 1, 2022.

Internal MISP references

UUID 7bbf39dd-851d-42dd-8be2-87de83f3abc0 which can be used as unique global reference for Microsoft CVE-2021-1732 Feb 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-01T00:00:00Z
date_published 2018-02-09T00:00:00Z
source MITRE
title Windows Win32k Elevation of Privilege Vulnerability CVE-2021-1732

win_xml_evt_log

Forensics Wiki. (2021, June 19). Windows XML Event Log (EVTX). Retrieved September 13, 2021.

Internal MISP references

UUID baeaad76-0acf-4921-9d6c-245649b32976 which can be used as unique global reference for win_xml_evt_log in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-13T00:00:00Z
date_published 2021-06-19T00:00:00Z
source MITRE
title Windows XML Event Log (EVTX)

Winexe Github Sept 2013

Skalkotos, N. (2013, September 20). WinExe. Retrieved January 22, 2018.

Internal MISP references

UUID 7003e2d4-83e5-4672-aaa9-53cc4bcb08b5 which can be used as unique global reference for Winexe Github Sept 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-22T00:00:00Z
date_published 2013-09-20T00:00:00Z
source MITRE
title WinExe

Microsoft WinExec

Microsoft. (n.d.). WinExec function. Retrieved September 12, 2024.

Internal MISP references

UUID 9e1ae9ae-bafc-460a-891e-e75df01c96c4 which can be used as unique global reference for Microsoft WinExec in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
source MITRE
title WinExec function

winget.exe - LOLBAS Project

LOLBAS. (2022, January 3). winget.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 5ef334f3-fe6f-4cc1-b37d-d147180a8b8d which can be used as unique global reference for winget.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2022-01-03T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title winget.exe

PreKageo Winhook Jul 2011

Prekas, G. (2011, July 11). Winhook. Retrieved December 12, 2017.

Internal MISP references

UUID 9461f70f-bb14-4e40-9136-97f93aa16f33 which can be used as unique global reference for PreKageo Winhook Jul 2011 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-12T00:00:00Z
date_published 2011-07-11T00:00:00Z
source MITRE
title Winhook

Novetta Winnti April 2015

Novetta Threat Research Group. (2015, April 7). Winnti Analysis. Retrieved February 8, 2017.

Internal MISP references

UUID cbe8373b-f14b-4890-99fd-35ffd7090dea which can be used as unique global reference for Novetta Winnti April 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-02-08T00:00:00Z
date_published 2015-04-07T00:00:00Z
source MITRE
title Winnti Analysis

Chronicle Winnti for Linux May 2019

Chronicle Blog. (2019, May 15). Winnti: More than just Windows and Gates. Retrieved April 29, 2020.

Internal MISP references

UUID e815e47a-c924-4b03-91e5-d41f2bb74773 which can be used as unique global reference for Chronicle Winnti for Linux May 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-04-29T00:00:00Z
date_published 2019-05-15T00:00:00Z
source MITRE
title Winnti: More than just Windows and Gates

WinRAR Website

WinRAR. (n.d.). WinRAR download free and support: WinRAR. Retrieved December 18, 2023.

Internal MISP references

UUID ad620d61-108c-4bb0-a897-02764ea9a903 which can be used as unique global reference for WinRAR Website in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title WinRAR download free and support: WinRAR

winrm.vbs - LOLBAS Project

LOLBAS. (2018, May 25). winrm.vbs. Retrieved December 4, 2023.

Internal MISP references

UUID 86107810-8a1d-4c13-80f0-c1624143d057 which can be used as unique global reference for winrm.vbs - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title winrm.vbs

DomainTools WinterVivern 2021

Chad Anderson. (2021, April 27). Winter Vivern: A Look At Re-Crafted Government MalDocs Targeting Multiple Languages. Retrieved July 29, 2024.

Internal MISP references

UUID 5f52274f-9d02-5e3c-a1da-48eee0804459 which can be used as unique global reference for DomainTools WinterVivern 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-29T00:00:00Z
date_published 2021-04-27T00:00:00Z
source MITRE
title Winter Vivern: A Look At Re-Crafted Government MalDocs Targeting Multiple Languages

ESET WinterVivern 2023

Matthieu Faou. (2023, October 25). Winter Vivern exploits zero-day vulnerability in Roundcube Webmail servers. Retrieved July 29, 2024.

Internal MISP references

UUID 7def830a-22d8-55b6-a1e5-a6a63a8bbd5a which can be used as unique global reference for ESET WinterVivern 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-29T00:00:00Z
date_published 2023-10-25T00:00:00Z
source MITRE
title Winter Vivern exploits zero-day vulnerability in Roundcube Webmail servers

SentinelOne WinterVivern 2023

Tom Hegel. (2023, March 16). Winter Vivern | Uncovering a Wave of Global Espionage. Retrieved July 29, 2024.

Internal MISP references

UUID f1b6b3b8-2068-5d80-a318-c77aaa9417c1 which can be used as unique global reference for SentinelOne WinterVivern 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-29T00:00:00Z
date_published 2023-03-16T00:00:00Z
source MITRE
title Winter Vivern

Microsoft WinVerifyTrust

Microsoft. (n.d.). WinVerifyTrust function. Retrieved January 31, 2018.

Internal MISP references

UUID cc14faff-c164-4135-ae36-ba68e1a50024 which can be used as unique global reference for Microsoft WinVerifyTrust in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-31T00:00:00Z
source MITRE
title WinVerifyTrust function

Winword.exe - LOLBAS Project

LOLBAS. (2019, July 19). Winword.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 6d75b154-a51d-4541-8353-22ee1d12ebed which can be used as unique global reference for Winword.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2019-07-19T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Winword.exe

WinZip Homepage

Corel Corporation. (2020). WinZip. Retrieved February 20, 2020.

Internal MISP references

UUID dc047688-2ea3-415c-b516-06542048b049 which can be used as unique global reference for WinZip Homepage in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-20T00:00:00Z
date_published 2020-01-01T00:00:00Z
source MITRE
title WinZip

Dell Wiper

Dell SecureWorks. (2013, March 21). Wiper Malware Analysis Attacking Korean Financial Sector. Retrieved May 13, 2015.

Internal MISP references

UUID be6629ef-e7c6-411c-9bd2-34e59062cadd which can be used as unique global reference for Dell Wiper in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-05-13T00:00:00Z
date_published 2013-03-21T00:00:00Z
source MITRE
title Wiper Malware Analysis Attacking Korean Financial Sector

medium evil twin

Gihan, Kavishka. (2021, August 8). Wireless Security— Evil Twin Attack. Retrieved September 17, 2024.

Internal MISP references

UUID af6cfe7c-a757-51e2-8e4f-52e2ca28ded0 which can be used as unique global reference for medium evil twin in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-17T00:00:00Z
date_published 2021-08-08T00:00:00Z
source MITRE
title Wireless Security— Evil Twin Attack

WireLurker

Claud Xiao. (n.d.). WireLurker: A New Era in iOS and OS X Malware. Retrieved July 10, 2017.

Internal MISP references

UUID fd33f71b-767d-4312-a8c9-5446939bb5ae which can be used as unique global reference for WireLurker in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-10T00:00:00Z
source MITRE
title WireLurker: A New Era in iOS and OS X Malware

Lab52 WIRTE Apr 2019

S2 Grupo. (2019, April 2). WIRTE Group attacking the Middle East. Retrieved May 24, 2019.

Internal MISP references

UUID 884b675e-390c-4f6d-8cb7-5d97d84115e5 which can be used as unique global reference for Lab52 WIRTE Apr 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-05-24T00:00:00Z
date_published 2019-04-02T00:00:00Z
source MITRE
title WIRTE Group attacking the Middle East

Kaspersky WIRTE November 2021

Yamout, M. (2021, November 29). WIRTE’s campaign in the Middle East ‘living off the land’ since at least 2019. Retrieved February 1, 2022.

Internal MISP references

UUID 143b4694-024d-49a5-be3c-d9ceca7295b2 which can be used as unique global reference for Kaspersky WIRTE November 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-01T00:00:00Z
date_published 2021-11-29T00:00:00Z
source MITRE
title WIRTE’s campaign in the Middle East ‘living off the land’ since at least 2019

Cofense RevengeRAT Feb 2019

Gannon, M. (2019, February 11). With Upgrades in Delivery and Support Infrastructure, Revenge RAT Malware is a Bigger Threat. Retrieved May 1, 2019.

Internal MISP references

UUID 3abfc3eb-7f9d-49e5-8048-4118cde3122e which can be used as unique global reference for Cofense RevengeRAT Feb 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-05-01T00:00:00Z
date_published 2019-02-11T00:00:00Z
source MITRE
title With Upgrades in Delivery and Support Infrastructure, Revenge RAT Malware is a Bigger Threat

CrowdStrike Wizard Spider October 2020

Podlosky, A., Hanel, A. et al. (2020, October 16). WIZARD SPIDER Update: Resilient, Reactive and Resolute. Retrieved June 15, 2021.

Internal MISP references

UUID 5c8d67ea-63bc-4765-b6f6-49fa5210abe6 which can be used as unique global reference for CrowdStrike Wizard Spider October 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-15T00:00:00Z
date_published 2020-10-16T00:00:00Z
source MITRE, Tidal Cyber
title WIZARD SPIDER Update: Resilient, Reactive and Resolute

Wlrmdr.exe - LOLBAS Project

LOLBAS. (2022, February 16). Wlrmdr.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 43bebdc3-3072-4a3d-a0b7-0b23f1119136 which can be used as unique global reference for Wlrmdr.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2022-02-16T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Wlrmdr.exe

WMI 1-3

Microsoft. (2023, March 7). Retrieved February 13, 2024.

Internal MISP references

UUID fe0a3b0c-8526-5a0d-acb8-660bbc0c9328 which can be used as unique global reference for WMI 1-3 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-13T00:00:00Z
source MITRE
title WMI 1-3

Microsoft WMI Architecture

Microsoft. (2018, May 31). WMI Architecture. Retrieved September 29, 2021.

Internal MISP references

UUID 3778449c-e8b4-4ee5-914b-746053e8ca70 which can be used as unique global reference for Microsoft WMI Architecture in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-29T00:00:00Z
date_published 2018-05-31T00:00:00Z
source MITRE
title WMI Architecture

WMI 7,8

Microsoft. (2024, January 26). WMIC Deprecation. Retrieved February 13, 2024.

Internal MISP references

UUID 819cecb2-5bd3-5c20-bbda-372516b00d6e which can be used as unique global reference for WMI 7,8 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-13T00:00:00Z
date_published 2024-01-26T00:00:00Z
source MITRE
title WMIC Deprecation

LOLBAS Wmic

LOLBAS. (n.d.). Wmic.exe. Retrieved July 31, 2019.

Internal MISP references

UUID 497e73d4-9f27-4b30-ba09-f152ce866d0f which can be used as unique global reference for LOLBAS Wmic in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-07-31T00:00:00Z
source MITRE
title Wmic.exe

Microsoft WMI System Classes

Microsoft. (2018, May 31). WMI System Classes. Retrieved September 29, 2021.

Internal MISP references

UUID 60a5c359-3523-4638-aee2-3e13e0077ba9 which can be used as unique global reference for Microsoft WMI System Classes in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-29T00:00:00Z
date_published 2018-05-31T00:00:00Z
source MITRE
title WMI System Classes

MalwareBytes WoodyRAT Aug 2022

MalwareBytes Threat Intelligence Team. (2022, August 3). Woody RAT: A new feature-rich malware spotted in the wild. Retrieved December 6, 2022.

Internal MISP references

UUID 5c2ecb15-14e9-5bd3-be5f-628fa4e98ee6 which can be used as unique global reference for MalwareBytes WoodyRAT Aug 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-12-06T00:00:00Z
date_published 2022-08-03T00:00:00Z
source MITRE
title Woody RAT: A new feature-rich malware spotted in the wild

WorkFolders.exe - LOLBAS Project

LOLBAS. (2021, August 16). WorkFolders.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 42cfa3eb-7a8c-482e-b8d8-78ae5c30b843 which can be used as unique global reference for WorkFolders.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-08-16T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title WorkFolders.exe

AWS DB VPC

AWS. (n.d.). Working with a DB instance in a VPC. Retrieved September 24, 2024.

Internal MISP references

UUID c38d6dfc-e866-5b81-b6e9-46106637f142 which can be used as unique global reference for AWS DB VPC in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-24T00:00:00Z
source MITRE
title Working with a DB instance in a VPC

Confluence Logs

Confluence Support. (2021, April 22). Working with Confluence Logs. Retrieved September 23, 2021.

Internal MISP references

UUID f715468d-7d72-4ca4-a828-9fc909ca4f37 which can be used as unique global reference for Confluence Logs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-23T00:00:00Z
date_published 2021-04-22T00:00:00Z
source MITRE
title Working with Confluence Logs

AppInit Registry

Microsoft. (2006, October). Working with the AppInit_DLLs registry value. Retrieved July 15, 2015.

Internal MISP references

UUID dd3f98d9-0228-45a6-9e7b-1babf911a9ac which can be used as unique global reference for AppInit Registry in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-07-15T00:00:00Z
date_published 2006-10-01T00:00:00Z
source MITRE
title Working with the AppInit_DLLs registry value

Kubernetes Workload Management

Kubernetes. (n.d.). Workload Management. Retrieved March 28, 2024.

Internal MISP references

UUID f207163b-08a8-5219-aca8-812e83e0dad3 which can be used as unique global reference for Kubernetes Workload Management in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-28T00:00:00Z
source MITRE
title Workload Management

ESF_filemonitor

Patrick Wardle. (2019, September 17). Writing a File Monitor with Apple's Endpoint Security Framework. Retrieved December 17, 2020.

Internal MISP references

UUID 280ddf42-92d1-4850-9241-96c1ef9c0609 which can be used as unique global reference for ESF_filemonitor in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-17T00:00:00Z
date_published 2019-09-17T00:00:00Z
source MITRE
title Writing a File Monitor with Apple's Endpoint Security Framework

Writing Bad Malware for OSX

Patrick Wardle. (2015). Writing Bad @$$ Malware for OS X. Retrieved July 10, 2017.

Internal MISP references

UUID 5628ecd9-48da-4a50-94ba-4b70abe56089 which can be used as unique global reference for Writing Bad Malware for OSX in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-10T00:00:00Z
date_published 2015-01-01T00:00:00Z
source MITRE
title Writing Bad @$$ Malware for OS X

Trails-DNS

SecurityTrails. (2018, March 14). Wrong Bind Configuration Exposes the Complete List of Russian TLD's to the Internet. Retrieved June 5, 2024.

Internal MISP references

UUID 9f3b77a1-a60d-5ede-af9c-2684a75c4bb9 which can be used as unique global reference for Trails-DNS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-05T00:00:00Z
date_published 2018-03-14T00:00:00Z
source MITRE
title Wrong Bind Configuration Exposes the Complete List of Russian TLD's to the Internet

Wscript.exe - LOLBAS Project

LOLBAS. (2018, May 25). Wscript.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 6c536675-84dd-44c3-8771-70120b413db7 which can be used as unique global reference for Wscript.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Wscript.exe

Enigma0x3 PubPrn Bypass

Nelson, M. (2017, August 3). WSH INJECTION: A CASE STUDY. Retrieved April 9, 2018.

Internal MISP references

UUID 8b12e87b-3836-4c79-877b-0a2761b34533 which can be used as unique global reference for Enigma0x3 PubPrn Bypass in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-09T00:00:00Z
date_published 2017-08-03T00:00:00Z
source MITRE
title WSH INJECTION: A CASE STUDY

Wsl.exe - LOLBAS Project

LOLBAS. (2019, June 27). Wsl.exe. Retrieved December 4, 2023.

Internal MISP references

UUID c147902a-e8e4-449f-8106-9e268d5367d8 which can be used as unique global reference for Wsl.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2019-06-27T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Wsl.exe

Wsreset.exe - LOLBAS Project

LOLBAS. (2019, March 18). Wsreset.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 24b73a27-f2ec-4cfa-a9df-59d4d4c1dd89 which can be used as unique global reference for Wsreset.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2019-03-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Wsreset.exe

wt.exe - LOLBAS Project

LOLBAS. (2022, July 27). wt.exe. Retrieved December 4, 2023.

Internal MISP references

UUID bbdd85b0-fdbb-4bd2-b962-a915c23c83c2 which can be used as unique global reference for wt.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2022-07-27T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title wt.exe

wuauclt.exe - LOLBAS Project

LOLBAS. (2020, September 23). wuauclt.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 09229ea3-ffd8-4d97-9728-f8c683ef6f26 which can be used as unique global reference for wuauclt.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2020-09-23T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title wuauclt.exe

XAgentOSX 2017

Robert Falcone. (2017, February 14). XAgentOSX: Sofacy's Xagent macOS Tool. Retrieved July 12, 2017.

Internal MISP references

UUID 2dc7a8f1-ccee-46f0-a995-268694f11b02 which can be used as unique global reference for XAgentOSX 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-12T00:00:00Z
date_published 2017-02-14T00:00:00Z
source MITRE
title XAgentOSX: Sofacy's Xagent macOS Tool

XAgentOSX

Robert Falcone. (2017, February 14). XAgentOSX: Sofacy's Xagent macOS Tool. Retrieved July 12, 2017.

Internal MISP references

UUID b4fd246d-9bd1-4bed-a9cb-92233c5c45c4 which can be used as unique global reference for XAgentOSX in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-12T00:00:00Z
date_published 2017-02-14T00:00:00Z
source MITRE
title XAgentOSX: Sofacy's Xagent macOS Tool

Unit42 Xbash Sept 2018

Xiao, C. (2018, September 17). Xbash Combines Botnet, Ransomware, Coinmining in Worm that Targets Linux and Windows. Retrieved November 14, 2018.

Internal MISP references

UUID 21b890f7-82db-4840-a05e-2155b8ddce8c which can be used as unique global reference for Unit42 Xbash Sept 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-14T00:00:00Z
date_published 2018-09-17T00:00:00Z
source MITRE
title Xbash Combines Botnet, Ransomware, Coinmining in Worm that Targets Linux and Windows

xCmd

Rayaprolu, A.. (2011, April 12). xCmd an Alternative to PsExec. Retrieved August 10, 2016.

Internal MISP references

UUID 430fc6ef-33c5-4cd8-b785-358e4aae5230 which can be used as unique global reference for xCmd in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-08-10T00:00:00Z
date_published 2011-04-12T00:00:00Z
source MITRE
title xCmd an Alternative to PsExec

xcopy Microsoft

Microsoft. (2023, February 3). xcopy Microsoft. Retrieved July 11, 2023.

Internal MISP references

UUID 05e01751-ebb4-4b09-be89-4e405ab7e7e4 which can be used as unique global reference for xcopy Microsoft in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-11T00:00:00Z
date_published 2023-02-03T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title xcopy Microsoft

Dragos Xenotime 2018

Dragos, Inc.. (n.d.). Xenotime. Retrieved April 16, 2019.

Internal MISP references

UUID b20fe65f-df43-4a59-af3f-43afafba15ab which can be used as unique global reference for Dragos Xenotime 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-16T00:00:00Z
source MITRE
title Xenotime

gist Arch package compromise 10JUL2018

Catalin Cimpanu. (2018, July 10). ~x file downloaded in public Arch package compromise. Retrieved April 23, 2019.

Internal MISP references

UUID b2900049-444a-4fe5-af1f-b9cd2cd9491c which can be used as unique global reference for gist Arch package compromise 10JUL2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-23T00:00:00Z
date_published 2018-07-10T00:00:00Z
source MITRE
title ~x file downloaded in public Arch package compromise

Cyble July 01 2022

Cybleinc. (2022, July 1). Xloader Returns with New Infection Technique. Retrieved May 7, 2023.

Internal MISP references

UUID 1b0e143a-3c5d-4445-9a99-8e42815130ac which can be used as unique global reference for Cyble July 01 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2022-07-01T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Xloader Returns with New Infection Technique

SentinelOne 8 21 2023

Dinesh Devadoss; Phil Stokes. (2023, August 21). XLoader's Latest Trick . Retrieved January 1, 2024.

Internal MISP references

UUID fc9b3eac-a638-4b84-92ae-591bc16a845e which can be used as unique global reference for SentinelOne 8 21 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-01T00:00:00Z
date_published 2023-08-21T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title XLoader's Latest Trick

Trend Micro Exposed Docker Server

Remillano II, A., et al. (2020, June 20). XORDDoS, Kaiji Variants Target Exposed Docker Servers. Retrieved April 5, 2021.

Internal MISP references

UUID 05c8909c-749c-4153-9a05-173d5d7a80a9 which can be used as unique global reference for Trend Micro Exposed Docker Server in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-05T00:00:00Z
date_published 2020-06-20T00:00:00Z
source MITRE
title XORDDoS, Kaiji Variants Target Exposed Docker Servers

Microsoft xp_cmdshell 2017

Microsoft. (2017, March 15). xp_cmdshell (Transact-SQL). Retrieved September 9, 2019.

Internal MISP references

UUID 1945b8b2-de29-4f7a-8957-cc96fbad3b11 which can be used as unique global reference for Microsoft xp_cmdshell 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-09T00:00:00Z
date_published 2017-03-15T00:00:00Z
source MITRE
title xp_cmdshell (Transact-SQL)

Microsoft XSLT Script Mar 2017

Wenzel, M. et al. (2017, March 30). XSLT Stylesheet Scripting Using . Retrieved July 3, 2018.

Internal MISP references

UUID 7ff47640-2a98-4a55-939a-ab6c8c8d2d09 which can be used as unique global reference for Microsoft XSLT Script Mar 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-03T00:00:00Z
date_published 2017-03-30T00:00:00Z
source MITRE
title XSLT Stylesheet Scripting Using

Xwizard.exe - LOLBAS Project

LOLBAS. (2018, May 25). Xwizard.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 573df5d1-83e7-4437-bdad-604f093b3cfd which can be used as unique global reference for Xwizard.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Xwizard.exe

Linux kernel Yama

Linux Kernel Archives. (n.d.). Yama Documentation - ptrace_scope. Retrieved December 20, 2017.

Internal MISP references

UUID 615d7744-327e-4f14-bce0-a16c352e7486 which can be used as unique global reference for Linux kernel Yama in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-20T00:00:00Z
source MITRE
title Yama Documentation - ptrace_scope

Red Canary Yellow Cockatoo June 2022

RED CANARY INTELLIGENCE. (2022, June 7). Yellow Cockatoo: Search engine redirects, in-memory remote access trojan, and more. Retrieved May 10, 2023.

Internal MISP references

UUID f97537c2-f080-4438-8728-4d2a91388132 which can be used as unique global reference for Red Canary Yellow Cockatoo June 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-10T00:00:00Z
date_published 2022-06-07T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Yellow Cockatoo: Search engine redirects, in-memory remote access trojan, and more

PwC Yellow Liderc October 25 2023

PwC Threat Intelligence. (2023, October 25). Yellow Liderc ships its scripts and delivers IMAPLoader malware. Retrieved October 25, 2023.

Internal MISP references

UUID cbeaf9b5-865f-44a1-a913-9eec28d7a5ff which can be used as unique global reference for PwC Yellow Liderc October 25 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-25T00:00:00Z
date_published 2023-10-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Yellow Liderc ships its scripts and delivers IMAPLoader malware

PWC Yellow Liderc 2023

PwC Threat Intelligence. (2023, October 25). Yellow Liderc ships its scripts and delivers IMAPLoader malware. Retrieved August 14, 2024.

Internal MISP references

UUID e473a371-2f34-5391-8888-42082b0a1904 which can be used as unique global reference for PWC Yellow Liderc 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-14T00:00:00Z
date_published 2023-10-25T00:00:00Z
source MITRE
title Yellow Liderc ships its scripts and delivers IMAPLoader malware

PwC Yellow Liderc

PwC Threat Intelligence. (2023, October 25). Yellow Liderc ships its scripts and delivers IMAPLoader malware. Retrieved March 29, 2024.

Internal MISP references

UUID b6544ea7-befa-53ae-95fa-5c227c848c46 which can be used as unique global reference for PwC Yellow Liderc in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-29T00:00:00Z
date_published 2023-10-25T00:00:00Z
source MITRE
title Yellow Liderc ships its scripts and delivers IMAPLoader malware

Mandiant APT29 Microsoft 365 2022

Douglas Bienstock. (2022, August 18). You Can’t Audit Me: APT29 Continues Targeting Microsoft 365. Retrieved February 23, 2023.

Internal MISP references

UUID e141408e-d22b-58e4-884f-0cbff25444da which can be used as unique global reference for Mandiant APT29 Microsoft 365 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-23T00:00:00Z
date_published 2022-08-18T00:00:00Z
source MITRE
title You Can’t Audit Me: APT29 Continues Targeting Microsoft 365

BlackHat Mac OSX Rootkit

Pan, M., Tsai, S. (2014). You can’t see me: A Mac OS X Rootkit uses the tricks you haven't known yet. Retrieved December 21, 2017.

Internal MISP references

UUID e01a6d46-5b38-42df-bd46-3995d38bb60e which can be used as unique global reference for BlackHat Mac OSX Rootkit in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-21T00:00:00Z
date_published 2014-01-01T00:00:00Z
source MITRE
title You can’t see me: A Mac OS X Rootkit uses the tricks you haven't known yet

Malwarebytes DarkComet March 2018

Kujawa, A. (2018, March 27). You dirty RAT! Part 1: DarkComet. Retrieved November 6, 2018.

Internal MISP references

UUID 6a765a99-8d9f-4076-8741-6415a5ab918b which can be used as unique global reference for Malwarebytes DarkComet March 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-06T00:00:00Z
date_published 2018-03-27T00:00:00Z
source MITRE
title You dirty RAT! Part 1: DarkComet

FireEye Mail CDS 2018

Caban, D. and Hirani, M. (2018, October 3). You’ve Got Mail! Enterprise Email Compromise. Retrieved April 22, 2019.

Internal MISP references

UUID 0af1795c-9cdd-43fa-8184-73f33d9f5366 which can be used as unique global reference for FireEye Mail CDS 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-22T00:00:00Z
date_published 2018-10-03T00:00:00Z
source MITRE
title You’ve Got Mail! Enterprise Email Compromise

US District Court Indictment GRU Unit 74455 October 2020

Scott W. Brady. (2020, October 15). United States vs. Yuriy Sergeyevich Andrienko et al.. Retrieved November 25, 2020.

Internal MISP references

UUID 77788d05-30ff-4308-82e6-d123a3c2fd80 which can be used as unique global reference for US District Court Indictment GRU Unit 74455 October 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-25T00:00:00Z
source MITRE
title Yuriy Sergeyevich Andrienko et al.

Sophos ZeroAccess

Wyke, J. (2012, April). ZeroAccess. Retrieved July 18, 2016.

Internal MISP references

UUID 41b51767-62f1-45c2-98cb-47c44c975a58 which can be used as unique global reference for Sophos ZeroAccess in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-07-18T00:00:00Z
date_published 2012-04-01T00:00:00Z
source MITRE
title ZeroAccess

Mandiant MOVEit Transfer June 2 2023

Nader Zaveri, Jeremy Kennelly, Genevieve Stark, Matthew Mcwhirt, Dan Nutting, Kimberly Goody, Justin Moore, Joe Pisano, Zander Work, Peter Ukhanov, Juraj Sucik, Will Silverstone, Zach Schramm, Greg Blaum, Ollie Styles, Nicholas Bennett, Josh Murchie. (2023, June 2). Zero-Day Vulnerability in MOVEit Transfer Exploited for Data Theft. Retrieved June 16, 2023.

Internal MISP references

UUID 232c7555-0483-4a57-88cb-71a990f7d683 which can be used as unique global reference for Mandiant MOVEit Transfer June 2 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-16T00:00:00Z
date_published 2023-06-02T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Zero-Day Vulnerability in MOVEit Transfer Exploited for Data Theft

Kaspersky RTLO Cyber Crime

Firsh, A.. (2018, February 13). Zero-day vulnerability in Telegram - Cybercriminals exploited Telegram flaw to launch multipurpose attacks. Retrieved April 22, 2019.

Internal MISP references

UUID 38fbd993-de98-49e9-8437-bc6a1493d6ed which can be used as unique global reference for Kaspersky RTLO Cyber Crime in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-22T00:00:00Z
date_published 2018-02-13T00:00:00Z
source MITRE
title Zero-day vulnerability in Telegram - Cybercriminals exploited Telegram flaw to launch multipurpose attacks

DOJ APT10 Dec 2018

United States District Court Southern District of New York (USDC SDNY) . (2018, December 17). United States of America v. Zhu Hua and Zhang Shilong. Retrieved April 17, 2019.

Internal MISP references

UUID 3ddc68b4-53f1-4fa5-b7f3-4e5d7d9661f2 which can be used as unique global reference for DOJ APT10 Dec 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-17T00:00:00Z
source MITRE, Tidal Cyber
title Zhu Hua and Zhang Shilong

District Court of NY APT10 Indictment December 2018

US District Court Southern District of New York. (2018, December 17). United States v. Zhu Hua Indictment. Retrieved December 17, 2020.

Internal MISP references

UUID 79ccbc74-b9c4-4dc8-91ae-1d15c4db563b which can be used as unique global reference for District Court of NY APT10 Indictment December 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-17T00:00:00Z
source MITRE
title Zhu Hua Indictment

Zipfldr.dll - LOLBAS Project

LOLBAS. (2018, May 25). Zipfldr.dll. Retrieved December 4, 2023.

Internal MISP references

UUID 3bee0640-ea48-4164-be57-ac565d8cbea7 which can be used as unique global reference for Zipfldr.dll - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Zipfldr.dll

Zlib Github

madler. (2017). zlib. Retrieved February 20, 2020.

Internal MISP references

UUID 982bcacc-afb2-4bbb-9197-f44d765b9e07 which can be used as unique global reference for Zlib Github in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-20T00:00:00Z
date_published 2017-01-01T00:00:00Z
source MITRE
title zlib

Microsoft Zone.Identifier 2020

Microsoft. (2020, August 31). Zone.Identifier Stream Name. Retrieved February 22, 2021.

Internal MISP references

UUID 2efbb7be-3ca1-444a-8584-7ceb08101e74 which can be used as unique global reference for Microsoft Zone.Identifier 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-22T00:00:00Z
date_published 2020-08-31T00:00:00Z
source MITRE
title Zone.Identifier Stream Name

Sysdig Kinsing November 2020

Huang, K. (2020, November 23). Zoom into Kinsing. Retrieved April 1, 2021.

Internal MISP references

UUID 4922dbb5-d3fd-4bf2-8af7-3b8889579c31 which can be used as unique global reference for Sysdig Kinsing November 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-01T00:00:00Z
date_published 2020-11-23T00:00:00Z
source MITRE
title Zoom into Kinsing