Skip to content

Hide Navigation Hide TOC

Edit

Tidal References

Tidal References Cluster

Authors
Authors and/or Contributors
Tidal Cyber

D3Secutrity CTI Feeds

Banerd, W. (2019, April 30). 10 of the Best Open Source Threat Intelligence Feeds. Retrieved October 20, 2020.

Internal MISP references

UUID 088f2cbd-cce1-477f-9ffb-319477d74b69 which can be used as unique global reference for D3Secutrity CTI Feeds in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
date_published 2019-04-30T00:00:00Z
source MITRE
title 10 of the Best Open Source Threat Intelligence Feeds

Linux Logs

Marcel. (2018, April 19). 12 Critical Linux Log Files You Must be Monitoring. Retrieved March 29, 2020.

Internal MISP references

UUID aa25e385-802c-4f04-81bb-bb7d1a7599ec which can be used as unique global reference for Linux Logs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-29T00:00:00Z
date_published 2018-04-19T00:00:00Z
source MITRE
title 12 Critical Linux Log Files You Must be Monitoring

Netspi PowerShell Execution Policy Bypass

Sutherland, S. (2014, September 9). 15 Ways to Bypass the PowerShell Execution Policy. Retrieved July 23, 2015.

Internal MISP references

UUID 0ee90db4-f21c-4c68-bd35-aa6c5edd3b4e which can be used as unique global reference for Netspi PowerShell Execution Policy Bypass in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-07-23T00:00:00Z
date_published 2014-09-09T00:00:00Z
source MITRE
title 15 Ways to Bypass the PowerShell Execution Policy

Mandiant-leaks

DANIEL KAPELLMANN ZAFRA, COREY HIDELBRANDT, NATHAN BRUBAKER, KEITH LUNDEN. (2022, January 31). 1 in 7 OT Ransomware Extortion Attacks Leak Critical Operational Technology Information. Retrieved August 18, 2023.

Internal MISP references

UUID aecc3ffb-c524-5ad9-b621-7228f53e27c3 which can be used as unique global reference for Mandiant-leaks in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-18T00:00:00Z
date_published 2022-01-31T00:00:00Z
source MITRE
title 1 in 7 OT Ransomware Extortion Attacks Leak Critical Operational Technology Information

Tilbury Windows Credentials

Chad Tilbury. (2017, August 8). 1Windows Credentials: Attack, Mitigation, Defense. Retrieved February 21, 2020.

Internal MISP references

UUID 2ddae0c9-910c-4c1a-b524-de3a58dbba13 which can be used as unique global reference for Tilbury Windows Credentials in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-21T00:00:00Z
date_published 2017-08-08T00:00:00Z
source MITRE
title 1Windows Credentials: Attack, Mitigation, Defense

CWE top 25

Christey, S., Brown, M., Kirby, D., Martin, B., Paller, A.. (2011, September 13). 2011 CWE/SANS Top 25 Most Dangerous Software Errors. Retrieved April 10, 2019.

Internal MISP references

UUID d8ee8b1f-c18d-48f3-9758-6860cd31c3e3 which can be used as unique global reference for CWE top 25 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-10T00:00:00Z
date_published 2011-09-13T00:00:00Z
source MITRE
title 2011 CWE/SANS Top 25 Most Dangerous Software Errors

CrowdStrike 2015 Global Threat Report

CrowdStrike Intelligence. (2016). 2015 Global Threat Report. Retrieved April 11, 2018.

Internal MISP references

UUID 50d467da-286b-45f3-8d5a-e9d8632f7bf1 which can be used as unique global reference for CrowdStrike 2015 Global Threat Report in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-11T00:00:00Z
date_published 2016-01-01T00:00:00Z
source MITRE
title 2015 Global Threat Report

Prolific OSX Malware History

Bit9 + Carbon Black Threat Research Team. (2015). 2015: The Most Prolific Year in History for OS X Malware. Retrieved July 8, 2017.

Internal MISP references

UUID 74b0f1a9-5822-4dcf-9a92-9a6df0b4db1e which can be used as unique global reference for Prolific OSX Malware History in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-08T00:00:00Z
date_published 2015-01-01T00:00:00Z
source MITRE
title 2015: The Most Prolific Year in History for OS X Malware

CERN Windigo June 2019

CERN. (2019, June 4). 2019/06/04 Advisory: Windigo attacks. Retrieved February 10, 2021.

Internal MISP references

UUID e9f1289f-a32e-441c-8787-cb32a26216d1 which can be used as unique global reference for CERN Windigo June 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-10T00:00:00Z
date_published 2019-06-04T00:00:00Z
source MITRE
title 2019/06/04 Advisory: Windigo attacks

CrowdStrike GTR 2019

CrowdStrike. (2019, January). 2019 Global Threat Report. Retrieved June 10, 2020.

Internal MISP references

UUID d6aa917e-baee-4379-8e69-a04b9aa5192a which can be used as unique global reference for CrowdStrike GTR 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-10T00:00:00Z
date_published 2019-01-01T00:00:00Z
source MITRE
title 2019 Global Threat Report

Crowdstrike GTR2020 Mar 2020

Crowdstrike. (2020, March 2). 2020 Global Threat Report. Retrieved December 11, 2020.

Internal MISP references

UUID a2325ace-e5a1-458d-80c1-5037bd7fa727 which can be used as unique global reference for Crowdstrike GTR2020 Mar 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-11T00:00:00Z
date_published 2020-03-02T00:00:00Z
source MITRE
title 2020 Global Threat Report

RecordedFuture 2021 Ad Infra

Insikt Group. (2022, January 18). 2021 Adversary Infrastructure Report. Retrieved March 25, 2022.

Internal MISP references

UUID d509e6f2-c317-4483-a51e-ad15a78a12c0 which can be used as unique global reference for RecordedFuture 2021 Ad Infra in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-25T00:00:00Z
date_published 2022-01-18T00:00:00Z
source MITRE
title 2021 Adversary Infrastructure Report

Red Canary 2021 Threat Detection Report March 2021

Red Canary. (2021, March 31). 2021 Threat Detection Report. Retrieved August 31, 2021.

Internal MISP references

UUID 83b906fc-ac2a-4f49-b87e-31f046e95fb7 which can be used as unique global reference for Red Canary 2021 Threat Detection Report March 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-31T00:00:00Z
date_published 2021-03-31T00:00:00Z
source MITRE
title 2021 Threat Detection Report

ACSC BlackCat Apr 2022

Australian Cyber Security Centre. (2022, April 14). 2022-004: ACSC Ransomware Profile - ALPHV (aka BlackCat). Retrieved December 20, 2022.

Internal MISP references

UUID 3b85eaeb-6bf5-529b-80a4-439ceb6c5d6d which can be used as unique global reference for ACSC BlackCat Apr 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-12-20T00:00:00Z
date_published 2022-04-14T00:00:00Z
source MITRE
title 2022-004: ACSC Ransomware Profile - ALPHV (aka BlackCat)

Crowdstrike HuntReport 2022

CrowdStrike. (2023). 2022 Falcon OverWatch Threat Hunting Report. Retrieved May 20, 2024.

Internal MISP references

UUID cae1043a-2473-5b7e-b9ed-27d4f9c5b9b0 which can be used as unique global reference for Crowdstrike HuntReport 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-20T00:00:00Z
date_published 2023-01-01T00:00:00Z
source MITRE
title 2022 Falcon OverWatch Threat Hunting Report

Internet crime report 2022

IC3. (2022). 2022 Internet Crime Report. Retrieved August 18, 2023.

Internal MISP references

UUID ef30c4eb-3da3-5c7b-a304-188acd2f7ebc which can be used as unique global reference for Internet crime report 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-18T00:00:00Z
date_published 2022-01-01T00:00:00Z
source MITRE
title 2022 Internet Crime Report

RC PowerShell

Red Canary. (n.d.). 2022 Threat Detection Report: PowerShell. Retrieved March 17, 2023.

Internal MISP references

UUID 0f154aa6-8c9d-5bfc-a3c4-5f3e1420f55f which can be used as unique global reference for RC PowerShell in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-17T00:00:00Z
source MITRE
title 2022 Threat Detection Report: PowerShell

ASD Royal Ransomware January 24 2023

Australian Signals Directorate. (2023, January 24). 2023-01: ASD's ACSC Ransomware Profile - Royal. Retrieved June 28, 2024.

Internal MISP references

UUID 514b704c-8668-4b61-8411-5b682e3b8471 which can be used as unique global reference for ASD Royal Ransomware January 24 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-28T00:00:00Z
date_published 2023-01-24T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title 2023-01: ASD's ACSC Ransomware Profile - Royal

Palo Alto Latrodectus Activity June 2024

Unit 42. (2024, June 25). 2024-06-25-IOCs-from-Latrodectus-activity. Retrieved September 13, 2024.

Internal MISP references

UUID 00f32246-e19b-5b20-b5c1-27b75c6667ca which can be used as unique global reference for Palo Alto Latrodectus Activity June 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-13T00:00:00Z
date_published 2024-06-25T00:00:00Z
source MITRE
title 2024-06-25-IOCs-from-Latrodectus-activity

20 macOS Common Tools and Techniques

Phil Stokes. (2021, February 16). 20 Common Tools & Techniques Used by macOS Threat Actors & Malware. Retrieved August 23, 2021.

Internal MISP references

UUID 3ee99ff4-daf4-4776-9d94-f7cf193c2b0c which can be used as unique global reference for 20 macOS Common Tools and Techniques in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-23T00:00:00Z
date_published 2021-02-16T00:00:00Z
source MITRE
title 20 Common Tools & Techniques Used by macOS Threat Actors & Malware

Microsoft GPP Key

Microsoft. (n.d.). 2.2.1.1.4 Password Encryption. Retrieved April 11, 2018.

Internal MISP references

UUID 24d8847b-d5de-4513-a55f-62c805dfa1dc which can be used as unique global reference for Microsoft GPP Key in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-11T00:00:00Z
source MITRE
title 2.2.1.1.4 Password Encryption

Microsoft _VBA_PROJECT Stream

Microsoft. (2020, February 19). 2.3.4.1 _VBA_PROJECT Stream: Version Dependent Project Information. Retrieved September 18, 2020.

Internal MISP references

UUID 70c75ee4-4ba4-4124-8001-0fadb49a5ac6 which can be used as unique global reference for Microsoft _VBA_PROJECT Stream in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-18T00:00:00Z
date_published 2020-02-19T00:00:00Z
source MITRE
title 2.3.4.1 _VBA_PROJECT Stream: Version Dependent Project Information

Microsoft Learn

Microsoft. (2021, April 6). 2.5 ExtraData. Retrieved September 30, 2022.

Internal MISP references

UUID 73ba4e07-cfbd-4b23-b52a-1ebbd7cc0fe4 which can be used as unique global reference for Microsoft Learn in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-30T00:00:00Z
date_published 2021-04-06T00:00:00Z
source MITRE
title 2.5 ExtraData

Hybrid Analysis Icacls2 May 2018

Hybrid Analysis. (2018, May 30). 2a8efbfadd798f6111340f7c1c956bee.dll. Retrieved August 19, 2018.

Internal MISP references

UUID 5d33fcb4-0f01-4b88-b1ee-dad6dcc867f4 which can be used as unique global reference for Hybrid Analysis Icacls2 May 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-19T00:00:00Z
date_published 2018-05-30T00:00:00Z
source MITRE
title 2a8efbfadd798f6111340f7c1c956bee.dll

Bleeping Computer 2easy 2021

Bill Toulas. (2021, December 21). 2easy now a significant dark web marketplace for stolen data. Retrieved October 7, 2024.

Internal MISP references

UUID 23ebd169-3ac6-5074-a238-a8e7d96f48ab which can be used as unique global reference for Bleeping Computer 2easy 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-07T00:00:00Z
date_published 2021-12-21T00:00:00Z
source MITRE
title 2easy now a significant dark web marketplace for stolen data

Microsoft Wow6432Node 2018

Microsoft. (2018, May 31). 32-bit and 64-bit Application Data in the Registry. Retrieved August 3, 2020.

Internal MISP references

UUID cbc14af8-f0d9-46c9-ae2c-d93d706ac84e which can be used as unique global reference for Microsoft Wow6432Node 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-03T00:00:00Z
date_published 2018-05-31T00:00:00Z
source MITRE
title 32-bit and 64-bit Application Data in the Registry

DOJ-DPRK Heist

Department of Justice. (2021). 3 North Korean Military Hackers Indicted in Wide-Ranging Scheme to Commit Cyber-attacks and Financial Crimes Across the Globe. Retrieved August 18, 2023.

Internal MISP references

UUID c50d2a5b-1d44-5f18-aaff-4be9f6d3f3ac which can be used as unique global reference for DOJ-DPRK Heist in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-18T00:00:00Z
date_published 2021-01-01T00:00:00Z
source MITRE
title 3 North Korean Military Hackers Indicted in Wide-Ranging Scheme to Commit Cyber-attacks and Financial Crimes Across the Globe

ITWorld Hard Disk Health Dec 2014

Pinola, M. (2014, December 14). 3 tools to check your hard drive's health and make sure it's not already dying on you. Retrieved October 2, 2018.

Internal MISP references

UUID e48fab76-7e38-420e-b69b-709f37bde847 which can be used as unique global reference for ITWorld Hard Disk Health Dec 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-10-02T00:00:00Z
date_published 2014-12-14T00:00:00Z
source MITRE
title 3 tools to check your hard drive's health and make sure it's not already dying on you

Microsoft 4657 APR 2017

Miroshnikov, A. & Hall, J. (2017, April 18). 4657(S): A registry value was modified. Retrieved August 9, 2018.

Internal MISP references

UUID ee681893-edd6-46c7-bb11-38fc24eef899 which can be used as unique global reference for Microsoft 4657 APR 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-09T00:00:00Z
date_published 2017-04-18T00:00:00Z
source MITRE
title 4657(S): A registry value was modified

Microsoft 4697 APR 2017

Miroshnikov, A. & Hall, J. (2017, April 18). 4697(S): A service was installed in the system. Retrieved August 7, 2018.

Internal MISP references

UUID 17473dc7-39cd-4c90-85cb-05d4c1364fff which can be used as unique global reference for Microsoft 4697 APR 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-07T00:00:00Z
date_published 2017-04-18T00:00:00Z
source MITRE
title 4697(S): A service was installed in the system

Microsoft User Creation Event

Lich, B., Miroshnikov, A. (2017, April 5). 4720(S): A user account was created. Retrieved June 30, 2017.

Internal MISP references

UUID 01e2068b-83bc-4479-8fc9-dfaafdbf272b which can be used as unique global reference for Microsoft User Creation Event in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-06-30T00:00:00Z
date_published 2017-04-05T00:00:00Z
source MITRE
title 4720(S): A user account was created

Microsoft User Modified Event

Lich, B., Miroshnikov, A. (2017, April 5). 4738(S): A user account was changed. Retrieved June 30, 2017.

Internal MISP references

UUID fb4164f9-1e03-43f1-8143-179c9f08dff2 which can be used as unique global reference for Microsoft User Modified Event in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-06-30T00:00:00Z
date_published 2017-04-05T00:00:00Z
source MITRE
title 4738(S): A user account was changed

Microsoft 4768 TGT 2017

Microsoft. (2017, April 19). 4768(S, F): A Kerberos authentication ticket (TGT) was requested. Retrieved August 24, 2020.

Internal MISP references

UUID 19237af4-e535-4059-a8a9-63280cdf4722 which can be used as unique global reference for Microsoft 4768 TGT 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-24T00:00:00Z
date_published 2017-04-19T00:00:00Z
source MITRE
title 4768(S, F): A Kerberos authentication ticket (TGT) was requested

HIPAA Journal S3 Breach, 2017

HIPAA Journal. (2017, October 11). 47GB of Medical Records and Test Results Found in Unsecured Amazon S3 Bucket. Retrieved October 4, 2019.

Internal MISP references

UUID b0fbf593-4aeb-4167-814b-ed3d4479ded0 which can be used as unique global reference for HIPAA Journal S3 Breach, 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-04T00:00:00Z
date_published 2017-10-11T00:00:00Z
source MITRE
title 47GB of Medical Records and Test Results Found in Unsecured Amazon S3 Bucket

Slack Security Risks

Michael Osakwe. (2020, November 18). 4 SaaS and Slack Security Risks to Consider. Retrieved March 17, 2023.

Internal MISP references

UUID 4332430a-0dec-5942-88ce-21f6d02cc9a9 which can be used as unique global reference for Slack Security Risks in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-17T00:00:00Z
date_published 2020-11-18T00:00:00Z
source MITRE
title 4 SaaS and Slack Security Risks to Consider

PurpleSec Data Loss Prevention

Michael Swanagan. (2020, October 24). 7 Data Loss Prevention Best Practices & Strategies. Retrieved August 30, 2021.

Internal MISP references

UUID b7d786db-c50e-4d1f-947e-205e8eefa2da which can be used as unique global reference for PurpleSec Data Loss Prevention in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-30T00:00:00Z
date_published 2020-10-24T00:00:00Z
source MITRE
title 7 Data Loss Prevention Best Practices & Strategies

7zip Homepage

I. Pavlov. (2019). 7-Zip. Retrieved February 20, 2020.

Internal MISP references

UUID fc1396d2-1ffd-4fd9-ba60-3f6e0a9dfffb which can be used as unique global reference for 7zip Homepage in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-20T00:00:00Z
date_published 2019-01-01T00:00:00Z
source MITRE
title 7-Zip

VMWare 8Base June 28 2023

Deborah Snyder, Fae Carlisle, Dana Behling, Bria Beathley. (2023, June 28). 8Base Ransomware: A Heavy Hitting Player. Retrieved August 4, 2023.

Internal MISP references

UUID 573e9520-6181-4535-9ed3-2338688a8e9f which can be used as unique global reference for VMWare 8Base June 28 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-04T00:00:00Z
date_published 2023-06-28T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title 8Base Ransomware: A Heavy Hitting Player

Acronis 8Base July 17 2023

Acronis Security Team. (2023, July 17). 8Base ransomware stays unseen for a year. Retrieved August 4, 2023.

Internal MISP references

UUID c9822477-1578-4068-9882-41e4d6eaee3f which can be used as unique global reference for Acronis 8Base July 17 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-04T00:00:00Z
date_published 2023-07-17T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title 8Base ransomware stays unseen for a year

MicroFocus 9002 Aug 2016

Petrovsky, O. (2016, August 30). “9002 RAT” -- a second building on the left. Retrieved February 20, 2018.

Internal MISP references

UUID a4d6bdd1-e70c-491b-a569-72708095c809 which can be used as unique global reference for MicroFocus 9002 Aug 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-20T00:00:00Z
date_published 2016-08-30T00:00:00Z
source MITRE
title “9002 RAT” -- a second building on the left

CISA AA21-200A APT40 July 2021

CISA. (2021, July 19). (AA21-200A) Joint Cybersecurity Advisory – Tactics, Techniques, and Procedures of Indicted APT40 Actors Associated with China’s MSS Hainan State Security Department. Retrieved August 12, 2021.

Internal MISP references

UUID 3a2dbd8b-54e3-406a-b77c-b6fae5541b6d which can be used as unique global reference for CISA AA21-200A APT40 July 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-12T00:00:00Z
date_published 2021-07-19T00:00:00Z
source MITRE, Tidal Cyber
title (AA21-200A) Joint Cybersecurity Advisory – Tactics, Techniques, and Procedures of Indicted APT40 Actors Associated with China’s MSS Hainan State Security Department

CISA Iran Albanian Attacks September 2022

CISA. (2022, September 23). AA22-264A Iranian State Actors Conduct Cyber Operations Against the Government of Albania. Retrieved August 6, 2024.

Internal MISP references

UUID c5d37bde-52bc-525a-b25a-e097f77a924a which can be used as unique global reference for CISA Iran Albanian Attacks September 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-06T00:00:00Z
date_published 2022-09-23T00:00:00Z
source MITRE
title AA22-264A Iranian State Actors Conduct Cyber Operations Against the Government of Albania

AADInternals

Dr. Nestori Syynimaa. (2018, October 25). AADInternals. Retrieved February 1, 2022.

Internal MISP references

UUID d6faadde-690d-44d1-b1aa-0991a5374604 which can be used as unique global reference for AADInternals in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-01T00:00:00Z
date_published 2018-10-25T00:00:00Z
source MITRE
title AADInternals

AADInternals Documentation

Dr. Nestori Syynimaa. (2018, October 25). AADInternals. Retrieved February 18, 2022.

Internal MISP references

UUID 320231a1-4dbe-4eaa-b14d-48de738ba697 which can be used as unique global reference for AADInternals Documentation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-18T00:00:00Z
date_published 2018-10-25T00:00:00Z
source MITRE
title AADInternals Documentation

AADInternals Github

Dr. Nestori Syynimaa. (2021, December 13). AADInternals. Retrieved February 1, 2022.

Internal MISP references

UUID 643d3947-c0ec-47c4-bb58-5e546084433c which can be used as unique global reference for AADInternals Github in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-01T00:00:00Z
date_published 2021-12-13T00:00:00Z
source MITRE
title AADInternals Github

Gigamon BADHATCH Jul 2019

Savelesky, K., et al. (2019, July 23). ABADBABE 8BADFOOD: Discovering BADHATCH and a Detailed Look at FIN8's Tooling. Retrieved September 8, 2021.

Internal MISP references

UUID 69a45479-e982-58ee-9e2d-caaf825f0ad4 which can be used as unique global reference for Gigamon BADHATCH Jul 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-08T00:00:00Z
date_published 2019-07-23T00:00:00Z
source MITRE
title ABADBABE 8BADFOOD: Discovering BADHATCH and a Detailed Look at FIN8's Tooling

bad_luck_blackcat

Kaspersky Global Research & Analysis Team (GReAT). (2022). A Bad Luck BlackCat. Retrieved May 5, 2022.

Internal MISP references

UUID 0d1e9635-b7b6-454b-9482-b1fc7d33bfff which can be used as unique global reference for bad_luck_blackcat in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-05T00:00:00Z
date_published 2022-01-01T00:00:00Z
source MITRE
title A Bad Luck BlackCat

Cybereason Bazar July 2020

Cybereason Nocturnus. (2020, July 16). A BAZAR OF TRICKS: FOLLOWING TEAM9’S DEVELOPMENT CYCLES. Retrieved November 18, 2020.

Internal MISP references

UUID 8819875a-5139-4dae-94c8-e7cc9f847580 which can be used as unique global reference for Cybereason Bazar July 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-18T00:00:00Z
date_published 2020-07-16T00:00:00Z
source MITRE
title A BAZAR OF TRICKS: FOLLOWING TEAM9’S DEVELOPMENT CYCLES

Red Canary Hospital Thwarted Ryuk October 2020

Brian Donohue, Katie Nickels, Paul Michaud, Adina Bodkins, Taylor Chapman, Tony Lambert, Jeff Felling, Kyle Rainey, Mike Haag, Matt Graeber, Aaron Didier.. (2020, October 29). A Bazar start: How one hospital thwarted a Ryuk ransomware outbreak. Retrieved October 30, 2020.

Internal MISP references

UUID ae5d4c47-54c9-4f7b-9357-88036c524217 which can be used as unique global reference for Red Canary Hospital Thwarted Ryuk October 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-30T00:00:00Z
date_published 2020-10-29T00:00:00Z
source MITRE
title A Bazar start: How one hospital thwarted a Ryuk ransomware outbreak

CyberCX Anonymous Sudan June 19 2023

CyberCX Intelligence. (2023, June 19). A bear in wolf’s clothing: Insights into the infrastructure used by Anonymous Sudan to attack Australian organisations. Retrieved October 10, 2023.

Internal MISP references

UUID 68ded9b7-3042-44e0-8bf7-cdba2174a3d8 which can be used as unique global reference for CyberCX Anonymous Sudan June 19 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-10T00:00:00Z
date_published 2023-06-19T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title A bear in wolf’s clothing: Insights into the infrastructure used by Anonymous Sudan to attack Australian organisations

Netskope Cloud Phishing

Ashwin Vamshi. (2020, August 12). A Big Catch: Cloud Phishing from Google App Engine and Azure App Service. Retrieved August 18, 2022.

Internal MISP references

UUID 25d46bc1-4c05-48d3-95f0-aa3ee1100bf9 which can be used as unique global reference for Netskope Cloud Phishing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-18T00:00:00Z
date_published 2020-08-12T00:00:00Z
source MITRE
title A Big Catch: Cloud Phishing from Google App Engine and Azure App Service

Elastic Abnormal Process ID or Lock File Created

Elastic. (n.d.). Abnormal Process ID or Lock File Created. Retrieved September 19, 2024.

Internal MISP references

UUID 99091ea0-35b3-590d-bd6c-0cc20b6be8f9 which can be used as unique global reference for Elastic Abnormal Process ID or Lock File Created in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-19T00:00:00Z
source MITRE
title Abnormal Process ID or Lock File Created

Microsoft O365 Admin Roles

Ako-Adjei, K., Dickhaus, M., Baumgartner, P., Faigel, D., et. al.. (2019, October 8). About admin roles. Retrieved October 18, 2019.

Internal MISP references

UUID 8014a0cc-f793-4d9a-a2cc-ef9e9c5a826a which can be used as unique global reference for Microsoft O365 Admin Roles in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-18T00:00:00Z
date_published 2019-10-08T00:00:00Z
source MITRE
title About admin roles

Microsoft Atom Table

Microsoft. (n.d.). About Atom Tables. Retrieved December 8, 2017.

Internal MISP references

UUID a22636c8-8e39-4583-93ef-f0b7f0a218d8 which can be used as unique global reference for Microsoft Atom Table in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-08T00:00:00Z
source MITRE
title About Atom Tables

Microsoft About BITS

Microsoft. (2019, July 12). About BITS. Retrieved March 16, 2020.

Internal MISP references

UUID 8d6d47d1-a6ea-4673-8ade-ba61bfeef084 which can be used as unique global reference for Microsoft About BITS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-16T00:00:00Z
date_published 2019-07-12T00:00:00Z
source MITRE
title About BITS

Microsoft About Event Tracing 2018

Microsoft. (2018, May 30). About Event Tracing. Retrieved June 7, 2019.

Internal MISP references

UUID 689d944f-ad66-4908-91fb-bb1ecdafe8d9 which can be used as unique global reference for Microsoft About Event Tracing 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-07T00:00:00Z
date_published 2018-05-30T00:00:00Z
source MITRE
title About Event Tracing

Microsoft PowerShell Command History

Microsoft. (2020, May 13). About History. Retrieved September 4, 2020.

Internal MISP references

UUID 6c873fb4-db43-4bad-b5e4-a7d45cbe796f which can be used as unique global reference for Microsoft PowerShell Command History in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-04T00:00:00Z
date_published 2020-05-13T00:00:00Z
source MITRE
title About History

Microsoft List View Controls

Microsoft. (2021, May 25). About List-View Controls. Retrieved January 4, 2022.

Internal MISP references

UUID 7d6c6ba6-cda6-4f27-bfc8-af5b759305ed which can be used as unique global reference for Microsoft List View Controls in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-04T00:00:00Z
date_published 2021-05-25T00:00:00Z
source MITRE
title About List-View Controls

Microsoft PowerShell Logging

Microsoft. (2020, March 30). about_Logging_Windows. Retrieved September 28, 2021.

Internal MISP references

UUID 81c94686-741d-45d7-90f3-0c7979374e87 which can be used as unique global reference for Microsoft PowerShell Logging in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-28T00:00:00Z
date_published 2020-03-30T00:00:00Z
source MITRE
title about_Logging_Windows

Apple About Mac Scripting 2016

Apple. (2016, June 13). About Mac Scripting. Retrieved April 14, 2021.

Internal MISP references

UUID d2f32ac1-9b5b-408d-a7ab-d92dd9efe0ed which can be used as unique global reference for Apple About Mac Scripting 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-14T00:00:00Z
date_published 2016-06-13T00:00:00Z
source MITRE
title About Mac Scripting

PowerShell About 2019

Wheeler, S. et al.. (2019, May 1). About PowerShell.exe. Retrieved October 11, 2019.

Internal MISP references

UUID 2c504602-4f5d-47fc-9780-e1e5041a0b3a which can be used as unique global reference for PowerShell About 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-11T00:00:00Z
date_published 2019-05-01T00:00:00Z
source MITRE
title About PowerShell.exe

Microsoft PowerShellB64

Microsoft. (2023, February 8). about_PowerShell_exe: EncodedCommand. Retrieved March 17, 2023.

Internal MISP references

UUID 7e50721c-c6d5-5449-8326-529da4cf5465 which can be used as unique global reference for Microsoft PowerShellB64 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-17T00:00:00Z
date_published 2023-02-08T00:00:00Z
source MITRE
title about_PowerShell_exe: EncodedCommand

Microsoft Profiles

Microsoft. (2021, September 27). about_Profiles. Retrieved February 4, 2022.

Internal MISP references

UUID b25ab0bf-c28b-4747-b075-30bcdfbc0e35 which can be used as unique global reference for Microsoft Profiles in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-04T00:00:00Z
date_published 2021-09-27T00:00:00Z
source MITRE
title about_Profiles

Microsoft About Profiles

Microsoft. (2017, November 29). About Profiles. Retrieved June 14, 2019.

Internal MISP references

UUID 1da63665-7a96-4bc3-9606-a3575b913819 which can be used as unique global reference for Microsoft About Profiles in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-14T00:00:00Z
date_published 2017-11-29T00:00:00Z
source MITRE
title About Profiles

Microsoft Remote Desktop Services

Microsoft. (2019, August 23). About Remote Desktop Services. Retrieved March 28, 2022.

Internal MISP references

UUID a981e013-f839-46e9-9c8a-128c4897f77a which can be used as unique global reference for Microsoft Remote Desktop Services in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-28T00:00:00Z
date_published 2019-08-23T00:00:00Z
source MITRE
title About Remote Desktop Services

systemsetup mac time

Apple Support. (n.d.). About systemsetup in Remote Desktop. Retrieved March 27, 2024.

Internal MISP references

UUID a85bd111-a2ca-5e66-b90e-f52ff780fc5c which can be used as unique global reference for systemsetup mac time in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-27T00:00:00Z
source MITRE
title About systemsetup in Remote Desktop

MSDN Clipboard

Microsoft. (n.d.). About the Clipboard. Retrieved March 29, 2016.

Internal MISP references

UUID 2c1b2d58-a5dc-4aee-8bdb-129a81c10408 which can be used as unique global reference for MSDN Clipboard in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-03-29T00:00:00Z
source MITRE
title About the Clipboard

Microsoft HTML Help Executable Program

Microsoft. (n.d.). About the HTML Help Executable Program. Retrieved October 3, 2018.

Internal MISP references

UUID 1af226cc-bb93-43c8-972e-367482c5d487 which can be used as unique global reference for Microsoft HTML Help Executable Program in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-10-03T00:00:00Z
source MITRE
title About the HTML Help Executable Program

About UEFI

UEFI Forum. (n.d.). About UEFI Forum. Retrieved January 5, 2016.

Internal MISP references

UUID 2e6fe82c-d90f-42b6-8247-397ab8823c7c which can be used as unique global reference for About UEFI in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-05T00:00:00Z
source MITRE
title About UEFI Forum

Microsoft Window Classes

Microsoft. (n.d.). About Window Classes. Retrieved December 16, 2017.

Internal MISP references

UUID cc620fcd-1f4a-4670-84b5-3f12c9b85053 which can be used as unique global reference for Microsoft Window Classes in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-16T00:00:00Z
source MITRE
title About Window Classes

Picus Sodinokibi January 2020

Ozarslan, S. (2020, January 15). A Brief History of Sodinokibi. Retrieved August 5, 2020.

Internal MISP references

UUID 2e9c2206-a04e-4278-9492-830cc9347ff9 which can be used as unique global reference for Picus Sodinokibi January 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-05T00:00:00Z
date_published 2020-01-15T00:00:00Z
source MITRE
title A Brief History of Sodinokibi

Application Bundle Manipulation Brandon Dalton

Brandon Dalton. (2022, August 9). A bundle of nerves: Tweaking macOS security controls to thwart application bundle manipulation. Retrieved September 27, 2022.

Internal MISP references

UUID 2a8fd573-6ab0-403b-b813-88d9d3edab36 which can be used as unique global reference for Application Bundle Manipulation Brandon Dalton in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-27T00:00:00Z
date_published 2022-08-09T00:00:00Z
source MITRE
title A bundle of nerves: Tweaking macOS security controls to thwart application bundle manipulation

NCC Group Chimera January 2021

Jansen, W . (2021, January 12). Abusing cloud services to fly under the radar. Retrieved September 12, 2024.

Internal MISP references

UUID 70c217c3-83a2-40f2-8f47-b68d8bd4cdf0 which can be used as unique global reference for NCC Group Chimera January 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2021-01-12T00:00:00Z
source MITRE
title Abusing cloud services to fly under the radar

Electron 2

Trend Micro. (2023, June 6). Abusing Electronbased applications in targeted attacks. Retrieved March 7, 2024.

Internal MISP references

UUID 0be977fd-7b7e-5ddb-aa0c-def81b97b2a5 which can be used as unique global reference for Electron 2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-07T00:00:00Z
date_published 2023-06-06T00:00:00Z
source MITRE
title Abusing Electronbased applications in targeted attacks

Harmj0y Abusing GPO Permissions

Schroeder, W. (2016, March 17). Abusing GPO Permissions. Retrieved September 23, 2024.

Internal MISP references

UUID 18cc9426-9b51-46fa-9106-99688385ebe4 which can be used as unique global reference for Harmj0y Abusing GPO Permissions in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-23T00:00:00Z
date_published 2016-03-17T00:00:00Z
source MITRE
title Abusing GPO Permissions

on security kerberos linux

Boal, Calum. (2020, January 28). Abusing Kerberos From Linux - An Overview of Available Tools. Retrieved September 17, 2024.

Internal MISP references

UUID 7d0870a0-db94-5213-a1b7-fc3c6557dcc0 which can be used as unique global reference for on security kerberos linux in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-17T00:00:00Z
date_published 2020-01-28T00:00:00Z
source MITRE
title Abusing Kerberos From Linux - An Overview of Available Tools

Retwin Directory Share Pivot

Routin, D. (2017, November 13). Abusing network shares for efficient lateral movements and privesc (DirSharePivot). Retrieved April 12, 2018.

Internal MISP references

UUID 027c5274-6b61-447a-9058-edb844f112dd which can be used as unique global reference for Retwin Directory Share Pivot in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-12T00:00:00Z
date_published 2017-11-13T00:00:00Z
source MITRE
title Abusing network shares for efficient lateral movements and privesc (DirSharePivot)

BOHOPS Abusing the COM Registry

BOHOPS. (2018, August 18). Abusing the COM Registry Structure (Part 2): Hijacking & Loading Techniques. Retrieved August 10, 2020.

Internal MISP references

UUID 3b5c0e62-7ac9-42e1-b2dd-8f2e0739b9d7 which can be used as unique global reference for BOHOPS Abusing the COM Registry in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-10T00:00:00Z
date_published 2018-08-18T00:00:00Z
source MITRE
title Abusing the COM Registry Structure (Part 2): Hijacking & Loading Techniques

abusing_com_reg

bohops. (2018, August 18). ABUSING THE COM REGISTRY STRUCTURE (PART 2): HIJACKING & LOADING TECHNIQUES. Retrieved September 20, 2021.

Internal MISP references

UUID 7f0f223f-09b1-4f8f-b6f1-1044e2ac7066 which can be used as unique global reference for abusing_com_reg in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-20T00:00:00Z
date_published 2018-08-18T00:00:00Z
source MITRE
title ABUSING THE COM REGISTRY STRUCTURE (PART 2): HIJACKING & LOADING TECHNIQUES

Rhino Security Labs AWS VPC Traffic Mirroring

Spencer Gietzen. (2019, September 17). Abusing VPC Traffic Mirroring in AWS. Retrieved March 17, 2022.

Internal MISP references

UUID 09cac813-862c-47c8-a47f-154c5436afbb which can be used as unique global reference for Rhino Security Labs AWS VPC Traffic Mirroring in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-17T00:00:00Z
date_published 2019-09-17T00:00:00Z
source MITRE
title Abusing VPC Traffic Mirroring in AWS

Narrator Accessibility Abuse

Comi, G. (2019, October 19). Abusing Windows 10 Narrator's 'Feedback-Hub' URI for Fileless Persistence. Retrieved April 28, 2020.

Internal MISP references

UUID fc889ba3-79a5-445a-81ea-dfe81c1cc542 which can be used as unique global reference for Narrator Accessibility Abuse in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-04-28T00:00:00Z
date_published 2019-10-19T00:00:00Z
source MITRE
title Abusing Windows 10 Narrator's 'Feedback-Hub' URI for Fileless Persistence

Intezer ACBackdoor

Sanmillan, I. (2019, November 18). ACBackdoor: Analysis of a New Multiplatform Backdoor. Retrieved October 4, 2021.

Internal MISP references

UUID e6cb833f-cf18-498b-a233-848853423412 which can be used as unique global reference for Intezer ACBackdoor in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-04T00:00:00Z
date_published 2019-11-18T00:00:00Z
source MITRE
title ACBackdoor: Analysis of a New Multiplatform Backdoor

AccCheckConsole.exe - LOLBAS Project

LOLBAS. (2022, January 2). AccCheckConsole.exe. Retrieved December 4, 2023.

Internal MISP references

UUID de5523bd-e735-4751-84e9-a1be1d2980ec which can be used as unique global reference for AccCheckConsole.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2022-01-02T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title AccCheckConsole.exe

CyberScoop APT28 Nov 2018

Shoorbajee, Z. (2018, November 29). Accenture: Russian hackers using Brexit talks to disguise phishing lures. Retrieved July 16, 2019.

Internal MISP references

UUID ef8f0990-b2da-4538-8b02-7401dc5a4120 which can be used as unique global reference for CyberScoop APT28 Nov 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-07-16T00:00:00Z
date_published 2018-11-29T00:00:00Z
source MITRE
title Accenture: Russian hackers using Brexit talks to disguise phishing lures

Microsoft Azure Kubernetes Service Service Accounts

Microsoft Azure. (2023, April 28). Access and identity options for Azure Kubernetes Service (AKS). Retrieved July 14, 2023.

Internal MISP references

UUID bf374b41-b2a3-5c07-bf84-9ea0e1a9e6c5 which can be used as unique global reference for Microsoft Azure Kubernetes Service Service Accounts in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-14T00:00:00Z
date_published 2023-04-28T00:00:00Z
source MITRE
title Access and identity options for Azure Kubernetes Service (AKS)

CrowdStrike Access Brokers

CrowdStrike Intelligence Team. (2022, February 23). Access Brokers: Who Are the Targets, and What Are They Worth?. Retrieved March 10, 2023.

Internal MISP references

UUID 0f772693-e09d-5c82-85c2-77f5fee39ef0 which can be used as unique global reference for CrowdStrike Access Brokers in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-10T00:00:00Z
date_published 2022-02-23T00:00:00Z
source MITRE
title Access Brokers: Who Are the Targets, and What Are They Worth?

Microsoft Access Control Lists May 2018

M. Satran, M. Jacobs. (2018, May 30). Access Control Lists. Retrieved February 4, 2020.

Internal MISP references

UUID 2aeda95a-7741-4a74-a5a4-29a9e7a89451 which can be used as unique global reference for Microsoft Access Control Lists May 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-04T00:00:00Z
date_published 2018-05-30T00:00:00Z
source MITRE
title Access Control Lists

Auth0 Access Tokens

Auth0. (n.d.). Access Tokens. Retrieved September 29, 2021.

Internal MISP references

UUID 43e8e178-a0da-44d8-be1b-853307e0d4ae which can be used as unique global reference for Auth0 Access Tokens in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-29T00:00:00Z
source MITRE
title Access Tokens

BSidesSLC 2020 - LNK Elastic

French, D., Filar, B.. (2020, March 21). A Chain Is No Stronger Than Its Weakest LNK. Retrieved November 30, 2020.

Internal MISP references

UUID 4c2ede51-33f6-4d09-9186-43b023b079c0 which can be used as unique global reference for BSidesSLC 2020 - LNK Elastic in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-30T00:00:00Z
date_published 2020-03-21T00:00:00Z
source MITRE
title A Chain Is No Stronger Than Its Weakest LNK

Mythic SpecterOps

Thomas, C. (2020, August 13). A Change of Mythic Proportions. Retrieved March 25, 2022.

Internal MISP references

UUID 98d4453e-2e80-422a-ac8c-47f650f46e3c which can be used as unique global reference for Mythic SpecterOps in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-25T00:00:00Z
date_published 2020-08-13T00:00:00Z
source MITRE
title A Change of Mythic Proportions

FireEye Chinese Espionage October 2019

Nalani Fraser, Kelli Vanderlee. (2019, October 10). Achievement Unlocked - Chinese Cyber Espionage Evolves to Support Higher Level Missions. Retrieved October 17, 2021.

Internal MISP references

UUID d37c069c-7fb8-44e1-8377-da97e8bbcf67 which can be used as unique global reference for FireEye Chinese Espionage October 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-17T00:00:00Z
date_published 2019-10-10T00:00:00Z
source MITRE, Tidal Cyber
title Achievement Unlocked - Chinese Cyber Espionage Evolves to Support Higher Level Missions

Unit42 AcidBox June 2020

Reichel, D. and Idrizovic, E. (2020, June 17). AcidBox: Rare Malware Repurposing Turla Group Exploit Targeted Russian Organizations. Retrieved March 16, 2021.

Internal MISP references

UUID f3f2eca0-fda3-451e-bf13-aacb14668e48 which can be used as unique global reference for Unit42 AcidBox June 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-16T00:00:00Z
date_published 2020-06-17T00:00:00Z
source MITRE
title AcidBox: Rare Malware Repurposing Turla Group Exploit Targeted Russian Organizations

AcidRain JAGS 2022

Juan Andres Guerrero-Saade and Max van Amerongen, SentinelOne. (2022, March 31). AcidRain | A Modem Wiper Rains Down on Europe. Retrieved March 25, 2024.

Internal MISP references

UUID bd4a7b2e-a387-5e1b-9d9e-52464a8e25c9 which can be used as unique global reference for AcidRain JAGS 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-25T00:00:00Z
date_published 2022-03-31T00:00:00Z
source MITRE
title AcidRain

acroread package compromised Arch Linux Mail 8JUL2018

Eli Schwartz. (2018, June 8). acroread package compromised. Retrieved April 23, 2019.

Internal MISP references

UUID 99245022-2130-404d-bf7a-095d84a515cd which can be used as unique global reference for acroread package compromised Arch Linux Mail 8JUL2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-23T00:00:00Z
date_published 2018-06-08T00:00:00Z
source MITRE
title acroread package compromised

Microsoft Actinium February 2022

Microsoft Threat Intelligence Center. (2022, February 4). ACTINIUM targets Ukrainian organizations. Retrieved February 18, 2022.

Internal MISP references

UUID 5ab658db-7f71-4213-8146-e22da54160b3 which can be used as unique global reference for Microsoft Actinium February 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-18T00:00:00Z
date_published 2022-02-04T00:00:00Z
source MITRE
title ACTINIUM targets Ukrainian organizations

Wikipedia Active Directory

Wikipedia. (2018, March 10). Active Directory. Retrieved April 11, 2018.

Internal MISP references

UUID 924e1186-57e5-43db-94ab-29afa3fdaa7b which can be used as unique global reference for Wikipedia Active Directory in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-11T00:00:00Z
date_published 2018-03-10T00:00:00Z
source MITRE
title Active Directory

Microsoft AD Accounts

Microsoft. (2019, August 23). Active Directory Accounts. Retrieved March 13, 2020.

Internal MISP references

UUID df734659-2441-487a-991d-59064c61b771 which can be used as unique global reference for Microsoft AD Accounts in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-13T00:00:00Z
date_published 2019-08-23T00:00:00Z
source MITRE
title Active Directory Accounts

Microsoft AD Admin Tier Model

Microsoft. (2019, February 14). Active Directory administrative tier model. Retrieved February 21, 2020.

Internal MISP references

UUID 3afba81a-3b1d-41ec-938e-24f055698d52 which can be used as unique global reference for Microsoft AD Admin Tier Model in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-21T00:00:00Z
date_published 2019-02-14T00:00:00Z
source MITRE
title Active Directory administrative tier model

Microsoft AD CS Overview

Microsoft. (2016, August 31). Active Directory Certificate Services Overview. Retrieved August 2, 2022.

Internal MISP references

UUID f1b2526a-1bf6-4954-a9b3-a5e008761ceb which can be used as unique global reference for Microsoft AD CS Overview in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-02T00:00:00Z
date_published 2016-08-31T00:00:00Z
source MITRE
title Active Directory Certificate Services Overview

Microsoft Get-ADUser

Microsoft. (n.d.). Active Directory Cmdlets - Get-ADUser. Retrieved November 30, 2017.

Internal MISP references

UUID b68ac85e-a007-4a72-9185-2877e9184fad which can be used as unique global reference for Microsoft Get-ADUser in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-30T00:00:00Z
source MITRE
title Active Directory Cmdlets - Get-ADUser

Active Directory Enumeration with LDIFDE

Microsoft. (2023, June 26). Active Directory Enumeration with LDIFDE. Retrieved July 11, 2023.

Internal MISP references

UUID 51e6623a-4448-4244-8c81-4eab102e5926 which can be used as unique global reference for Active Directory Enumeration with LDIFDE in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-11T00:00:00Z
date_published 2023-06-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Active Directory Enumeration with LDIFDE

Microsoft SID-History Attribute

Microsoft. (n.d.). Active Directory Schema - SID-History attribute. Retrieved November 30, 2017.

Internal MISP references

UUID 32150673-5593-4a2c-9872-aaa96a21aa5c which can be used as unique global reference for Microsoft SID-History Attribute in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-30T00:00:00Z
source MITRE
title Active Directory Schema - SID-History attribute

Volexity Ivanti Zero-Day Exploitation January 2024

Meltzer, M. et al. (2024, January 10). Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN. Retrieved February 27, 2024.

Internal MISP references

UUID 93eda380-ea21-59e0-97e8-5bec1f9a0e71 which can be used as unique global reference for Volexity Ivanti Zero-Day Exploitation January 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-27T00:00:00Z
date_published 2024-01-10T00:00:00Z
source MITRE
title Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN

ActiveMalwareEnergy

Dan Goodin. (2014, June 30). Active malware operation let attackers sabotage US energy industry. Retrieved March 9, 2017.

Internal MISP references

UUID f2ef73c6-5d4c-423e-a3f5-194cba121eb1 which can be used as unique global reference for ActiveMalwareEnergy in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-09T00:00:00Z
date_published 2014-06-30T00:00:00Z
source MITRE
title Active malware operation let attackers sabotage US energy industry

Klein Active Setup 2010

Klein, H. (2010, April 22). Active Setup Explained. Retrieved December 18, 2020.

Internal MISP references

UUID cbdd6290-1dda-48af-a101-fb3db6581276 which can be used as unique global reference for Klein Active Setup 2010 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-18T00:00:00Z
date_published 2010-04-22T00:00:00Z
source MITRE
title Active Setup Explained

Dark Vortex Brute Ratel C4

Dark Vortex. (n.d.). A Customized Command and Control Center for Red Team and Adversary Simulation. Retrieved February 7, 2023.

Internal MISP references

UUID 47992cb5-df11-56c2-b266-6f58d75f8315 which can be used as unique global reference for Dark Vortex Brute Ratel C4 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-07T00:00:00Z
source MITRE
title A Customized Command and Control Center for Red Team and Adversary Simulation

ad_blocker_with_miner

Kuzmenko, A.. (2021, March 10). Ad blocker with miner included. Retrieved October 28, 2021.

Internal MISP references

UUID 8e30f71e-80b8-4662-bc95-bf3cf7cfcf40 which can be used as unique global reference for ad_blocker_with_miner in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-28T00:00:00Z
date_published 2021-03-10T00:00:00Z
source MITRE
title Ad blocker with miner included

Microsoft Support O365 Add Another Admin, October 2019

Microsoft. (n.d.). Add Another Admin. Retrieved October 18, 2019.

Internal MISP references

UUID c31cfc48-289e-42aa-8046-b41261fdeb96 which can be used as unique global reference for Microsoft Support O365 Add Another Admin, October 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-18T00:00:00Z
source MITRE
title Add Another Admin

Amazon AWS IMDS V2

MacCarthaigh, C. (2019, November 19). Add defense in depth against open firewalls, reverse proxies, and SSRF vulnerabilities with enhancements to the EC2 Instance Metadata Service. Retrieved October 14, 2020.

Internal MISP references

UUID f252eb18-86e9-4ed0-b9da-2c81f12a6e13 which can be used as unique global reference for Amazon AWS IMDS V2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-14T00:00:00Z
date_published 2019-11-19T00:00:00Z
source MITRE
title Add defense in depth against open firewalls, reverse proxies, and SSRF vulnerabilities with enhancements to the EC2 Instance Metadata Service

Adding Login Items

Apple. (2016, September 13). Adding Login Items. Retrieved July 11, 2017.

Internal MISP references

UUID 5ab3e243-37a6-46f1-b28f-6846ecdef0ae which can be used as unique global reference for Adding Login Items in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-11T00:00:00Z
date_published 2016-09-13T00:00:00Z
source MITRE
title Adding Login Items

MRWLabs Office Persistence Add-ins

Knowles, W. (2017, April 21). Add-In Opportunities for Office Persistence. Retrieved July 3, 2017.

Internal MISP references

UUID a5b6ab63-0e6f-4789-a017-ceab1719ed85 which can be used as unique global reference for MRWLabs Office Persistence Add-ins in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-03T00:00:00Z
date_published 2017-04-21T00:00:00Z
source MITRE
title Add-In Opportunities for Office Persistence

AddinUtil.exe - LOLBAS Project

LOLBAS. (2023, October 5). AddinUtil.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 91af546d-0a56-4c17-b292-6257943a8aba which can be used as unique global reference for AddinUtil.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2023-10-05T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title AddinUtil.exe

Microsoft - Add-MailboxPermission

Microsoft. (n.d.). Add-Mailbox Permission. Retrieved September 13, 2019.

Internal MISP references

UUID b8d40efb-c78d-47dd-9d83-e5a31af73691 which can be used as unique global reference for Microsoft - Add-MailboxPermission in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-13T00:00:00Z
source MITRE
title Add-Mailbox Permission

AddMonitor

Microsoft. (n.d.). AddMonitor function. Retrieved November 12, 2014.

Internal MISP references

UUID 8c1a719e-6ca1-4b41-966d-ddb87c849fe0 which can be used as unique global reference for AddMonitor in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-12T00:00:00Z
source MITRE
title AddMonitor function

Microsoft Azure AD Users

Microsoft. (2019, November 11). Add or delete users using Azure Active Directory. Retrieved January 30, 2020.

Internal MISP references

UUID b69468a2-693e-4bd0-8dc1-ccfd7d5630c0 which can be used as unique global reference for Microsoft Azure AD Users in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-01-30T00:00:00Z
date_published 2019-11-11T00:00:00Z
source MITRE
title Add or delete users using Azure Active Directory

Microsoft Office Add-ins

Microsoft. (n.d.). Add or remove add-ins. Retrieved July 3, 2017.

Internal MISP references

UUID 99b20e30-76a8-4108-84ae-daf92058b44b which can be used as unique global reference for Microsoft Office Add-ins in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-03T00:00:00Z
source MITRE
title Add or remove add-ins

Microsoft AddPrintProcessor May 2018

Microsoft. (2018, May 31). AddPrintProcessor function. Retrieved October 5, 2020.

Internal MISP references

UUID 12c7160b-c93c-44cd-b108-68d4823aec8c which can be used as unique global reference for Microsoft AddPrintProcessor May 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-05T00:00:00Z
date_published 2018-05-31T00:00:00Z
source MITRE
title AddPrintProcessor function

RFC1918

IETF Network Working Group. (1996, February). Address Allocation for Private Internets. Retrieved October 20, 2020.

Internal MISP references

UUID f2cdf62e-cb9b-4a48-99a2-d46e7d9e7a9e which can be used as unique global reference for RFC1918 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
date_published 1996-02-01T00:00:00Z
source MITRE
title Address Allocation for Private Internets

Microsoft Exchange Address Lists

Microsoft. (2020, February 7). Address lists in Exchange Server. Retrieved March 26, 2020.

Internal MISP references

UUID 138ec24a-4361-4ce0-b78e-508c11db397c which can be used as unique global reference for Microsoft Exchange Address Lists in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-26T00:00:00Z
date_published 2020-02-07T00:00:00Z
source MITRE
title Address lists in Exchange Server

Microsoft AD DS Getting Started

Foulds, I. et al. (2018, August 7). AD DS Getting Started. Retrieved September 23, 2021.

Internal MISP references

UUID 82d01c77-571b-4f33-a286-878f325462ae which can be used as unique global reference for Microsoft AD DS Getting Started in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-23T00:00:00Z
date_published 2018-08-07T00:00:00Z
source MITRE
title AD DS Getting Started

Akamai DGA Mitigation

Liu, H. and Yuzifovich, Y. (2018, January 9). A Death Match of Domain Generation Algorithms. Retrieved February 18, 2019.

Internal MISP references

UUID 5b14cdf6-261a-4d7e-acb4-74e7fafa9467 which can be used as unique global reference for Akamai DGA Mitigation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-18T00:00:00Z
date_published 2018-01-09T00:00:00Z
source MITRE
title A Death Match of Domain Generation Algorithms

Keychain Decryption Passware

Yana Gourenko. (n.d.). A Deep Dive into Apple Keychain Decryption. Retrieved April 13, 2022.

Internal MISP references

UUID 6a426ab4-5b0b-46d4-9dfe-e2587f69e111 which can be used as unique global reference for Keychain Decryption Passware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-13T00:00:00Z
source MITRE
title A Deep Dive into Apple Keychain Decryption

Trend Micro Deep Dive Into Defacement

Marco Balduzzi, Ryan Flores, Lion Gu, Federico Maggi, Vincenzo Ciancaglini, Roel Reyes, Akira Urano. (n.d.). A Deep Dive into Defacement: How Geopolitical Events Trigger Web Attacks. Retrieved April 19, 2019.

Internal MISP references

UUID 4886418b-3a2e-4f12-b91e-3bb2a8134112 which can be used as unique global reference for Trend Micro Deep Dive Into Defacement in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-19T00:00:00Z
source MITRE
title A Deep Dive into Defacement: How Geopolitical Events Trigger Web Attacks

Talos Lokibot Jan 2021

Muhammad, I., Unterbrink, H.. (2021, January 6). A Deep Dive into Lokibot Infection Chain. Retrieved August 31, 2021.

Internal MISP references

UUID 3baba4e6-0cf5-45eb-8abb-6c389743af89 which can be used as unique global reference for Talos Lokibot Jan 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-31T00:00:00Z
date_published 2021-01-06T00:00:00Z
source MITRE
title A Deep Dive into Lokibot Infection Chain

Malwarebytes Saint Bot April 2021

Hasherezade. (2021, April 6). A deep dive into Saint Bot, a new downloader. Retrieved June 9, 2022.

Internal MISP references

UUID 3a1faa47-7bd3-453f-9b7a-bb17efb8bb3c which can be used as unique global reference for Malwarebytes Saint Bot April 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-09T00:00:00Z
date_published 2021-04-06T00:00:00Z
source MITRE
title A deep dive into Saint Bot, a new downloader

SecurityScorecard CredoMap September 2022

Vlad Pasca. (2022, September 27). A Deep Dive Into the APT28’s stealer called CredoMap. Retrieved December 5, 2023.

Internal MISP references

UUID 3e683efc-4712-4397-8d55-4354ff7ad9f0 which can be used as unique global reference for SecurityScorecard CredoMap September 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-05T00:00:00Z
date_published 2022-09-27T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title A Deep Dive Into the APT28’s stealer called CredoMap

Krebs DNS Hijack 2019

Brian Krebs. (2019, February 18). A Deep Dive on the Recent Widespread DNS Hijacking Attacks. Retrieved February 14, 2022.

Internal MISP references

UUID 9bdc618d-ff55-4ac8-8967-6039c6c24cb1 which can be used as unique global reference for Krebs DNS Hijack 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-14T00:00:00Z
date_published 2019-02-18T00:00:00Z
source MITRE
title A Deep Dive on the Recent Widespread DNS Hijacking Attacks

Reaqta MuddyWater November 2017

Reaqta. (2017, November 22). A dive into MuddyWater APT targeting Middle-East. Retrieved May 18, 2020.

Internal MISP references

UUID ecd28ccf-edb6-478d-a8f1-da630df42127 which can be used as unique global reference for Reaqta MuddyWater November 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-18T00:00:00Z
date_published 2017-11-22T00:00:00Z
source MITRE
title A dive into MuddyWater APT targeting Middle-East

ESET Turla PowerShell May 2019

Faou, M. and Dumont R.. (2019, May 29). A dive into Turla PowerShell usage. Retrieved June 14, 2019.

Internal MISP references

UUID 68c0f34b-691a-4847-8d49-f18b7f4e5188 which can be used as unique global reference for ESET Turla PowerShell May 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-14T00:00:00Z
date_published 2019-05-29T00:00:00Z
source MITRE
title A dive into Turla PowerShell usage

Kubernetes Admission Controllers

Kubernetes. (n.d.). Admission Controllers Reference. Retrieved March 8, 2023.

Internal MISP references

UUID ea035e41-159b-5f12-96fc-0638eace9fd2 which can be used as unique global reference for Kubernetes Admission Controllers in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-08T00:00:00Z
source MITRE
title Admission Controllers Reference

Krebs Adobe

Brian Krebs. (2013, October 3). Adobe To Announce Source Code, Customer Data Breach. Retrieved May 17, 2021.

Internal MISP references

UUID bc2b0b89-e00d-4beb-bf27-fe81d8c826a4 which can be used as unique global reference for Krebs Adobe in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-05-17T00:00:00Z
date_published 2013-10-03T00:00:00Z
source MITRE
title Adobe To Announce Source Code, Customer Data Breach

Github AD-Pentest-Script

Twi1ight. (2015, July 11). AD-Pentest-Script - wmiexec.vbs. Retrieved June 29, 2017.

Internal MISP references

UUID 45a5f6c2-b52e-4518-a10e-19797e6fdcc3 which can be used as unique global reference for Github AD-Pentest-Script in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-06-29T00:00:00Z
date_published 2015-07-11T00:00:00Z
source MITRE
title AD-Pentest-Script - wmiexec.vbs

adplus.exe - LOLBAS Project

LOLBAS. (2021, September 1). adplus.exe. Retrieved December 4, 2023.

Internal MISP references

UUID d407ca0a-7ace-4dc5-947d-69a1e5a1d459 which can be used as unique global reference for adplus.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-09-01T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title adplus.exe

Microsoft ADV170021 Dec 2017

Microsoft. (2017, December 12). ADV170021 - Microsoft Office Defense in Depth Update. Retrieved February 3, 2018.

Internal MISP references

UUID ce960e76-848f-440d-9843-54773f7b11cf which can be used as unique global reference for Microsoft ADV170021 Dec 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-03T00:00:00Z
date_published 2017-12-12T00:00:00Z
source MITRE
title ADV170021 - Microsoft Office Defense in Depth Update

CISA AA20-352A 2021

CISA. (2021, April 15). Advanced Persistent Threat Compromise of Government Agencies, Critical Infrastructure, and Private Sector Organizations. Retrieved August 30, 2024.

Internal MISP references

UUID 1e68b9ef-0aee-5d69-be72-3bc4d5cfa6b9 which can be used as unique global reference for CISA AA20-352A 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-30T00:00:00Z
date_published 2021-04-15T00:00:00Z
source MITRE
title Advanced Persistent Threat Compromise of Government Agencies, Critical Infrastructure, and Private Sector Organizations

FireEye APT Groups

FireEye. (n.d.). Advanced Persistent Threat Groups. Retrieved August 3, 2018.

Internal MISP references

UUID 5b6b909d-870a-4d14-85ec-6aa14e598740 which can be used as unique global reference for FireEye APT Groups in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-03T00:00:00Z
source MITRE, Tidal Cyber
title Advanced Persistent Threat Groups

Mandiant Advanced Persistent Threats

Mandiant. (n.d.). Advanced Persistent Threats (APTs). Retrieved February 14, 2024.

Internal MISP references

UUID 2d16615b-09fc-5925-8f59-6d20f334d236 which can be used as unique global reference for Mandiant Advanced Persistent Threats in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-14T00:00:00Z
source MITRE
title Advanced Persistent Threats (APTs)

Mandiant APT Groups List

Mandiant. (n.d.). Advanced Persistent Threats (APTs). Retrieved September 14, 2023.

Internal MISP references

UUID c984fcfc-1bfd-4b1e-9034-a6ff3e6ebf97 which can be used as unique global reference for Mandiant APT Groups List in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Advanced Persistent Threats (APTs)

Advanced_sec_audit_policy_settings

Simpson, D. et al. (2017, April 19). Advanced security audit policy settings. Retrieved September 14, 2021.

Internal MISP references

UUID 9aef57b1-1a2e-4833-815e-887616cc0570 which can be used as unique global reference for Advanced_sec_audit_policy_settings in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-14T00:00:00Z
date_published 2017-04-19T00:00:00Z
source MITRE
title Advanced security audit policy settings

Adversaries Hijack DLLs

CrowdStrike, Falcon OverWatch Team. (2022, December 30). Retrieved October 19, 2023.

Internal MISP references

UUID 01836e53-4316-51a7-852c-01e585212276 which can be used as unique global reference for Adversaries Hijack DLLs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-19T00:00:00Z
source MITRE
title Adversaries Hijack DLLs

CrowdStrike Richochet Chollima September 2021

CrowdStrike. (2021, September 30). Adversary Profile - Ricochet Chollima. Retrieved September 30, 2021.

Internal MISP references

UUID 69a23467-c55c-43a3-951d-c208e6ead6f7 which can be used as unique global reference for CrowdStrike Richochet Chollima September 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-30T00:00:00Z
date_published 2021-09-30T00:00:00Z
source MITRE
title Adversary Profile - Ricochet Chollima

Elastic - Hunting for Persistence Part 1

French, D., Murphy, B. (2020, March 24). Adversary tradecraft 101: Hunting for persistence using Elastic Security (Part 1). Retrieved December 21, 2020.

Internal MISP references

UUID bd9406d3-c3e3-4737-97a1-a4bc997c88cd which can be used as unique global reference for Elastic - Hunting for Persistence Part 1 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-21T00:00:00Z
date_published 2020-03-24T00:00:00Z
source MITRE
title Adversary tradecraft 101: Hunting for persistence using Elastic Security (Part 1)

NCSC APT29 July 2020

National Cyber Security Centre. (2020, July 16). Advisory: APT29 targets COVID-19 vaccine development. Retrieved September 29, 2020.

Internal MISP references

UUID 28da86a6-4ca1-4bb4-a401-d4aa469c0034 which can be used as unique global reference for NCSC APT29 July 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-29T00:00:00Z
date_published 2020-07-16T00:00:00Z
source MITRE
title Advisory: APT29 targets COVID-19 vaccine development

Advpack.dll - LOLBAS Project

LOLBAS. (2018, May 25). Advpack.dll. Retrieved December 4, 2023.

Internal MISP references

UUID 837ccb3c-316d-4d96-8a33-b5df40870aba which can be used as unique global reference for Advpack.dll - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Advpack.dll

Kaspersky Adwind Feb 2016

Kamluk, V. & Gostev, A. (2016, February). Adwind - A Cross-Platform RAT. Retrieved April 23, 2019.

Internal MISP references

UUID 69fd8de4-81bc-4165-b77d-c5fc72cfa699 which can be used as unique global reference for Kaspersky Adwind Feb 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-23T00:00:00Z
date_published 2016-02-01T00:00:00Z
source MITRE
title Adwind - A Cross-Platform RAT

Bitdefender Trickbot VNC module Whitepaper 2021

Radu Tudorica. (2021, July 12). A Fresh Look at Trickbot’s Ever-Improving VNC Module. Retrieved September 28, 2021.

Internal MISP references

UUID ee2709d7-2b33-48ac-8e90-a2770d469d80 which can be used as unique global reference for Bitdefender Trickbot VNC module Whitepaper 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-28T00:00:00Z
date_published 2021-07-12T00:00:00Z
source MITRE
title A Fresh Look at Trickbot’s Ever-Improving VNC Module

Mac Backdoors are back

Dan Goodin. (2016, July 6). After hiatus, in-the-wild Mac backdoors are suddenly back. Retrieved July 8, 2017.

Internal MISP references

UUID c37f00dc-ee53-4be1-9046-0a28bdc5649a which can be used as unique global reference for Mac Backdoors are back in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-08T00:00:00Z
date_published 2016-07-06T00:00:00Z
source MITRE
title After hiatus, in-the-wild Mac backdoors are suddenly back

SentinelOne January 30 2023

SentinelOne. (2023, January 30). Agenda (Qilin). Retrieved June 7, 2024.

Internal MISP references

UUID 290e84bc-7dae-46ec-81de-78c94b98e45b which can be used as unique global reference for SentinelOne January 30 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-07T00:00:00Z
date_published 2023-01-30T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Agenda (Qilin)

Trend Micro March 26 2024

Arianne Dela Cruz; Raymart Yambot; Raighen Sanchez; Darrel Tristan Virtusio Read time. (2024, March 26). Agenda Ransomware Propagates to vCenters and ESXi via Custom PowerShell Script. Retrieved April 5, 2024.

Internal MISP references

UUID d5634b8e-420a-4721-a3d2-19d9f36697f4 which can be used as unique global reference for Trend Micro March 26 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-05T00:00:00Z
date_published 2024-03-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Agenda Ransomware Propagates to vCenters and ESXi via Custom PowerShell Script

Kaspersky MSSQL Aug 2019

Plakhov, A., Sitchikhin, D. (2019, August 22). Agent 1433: remote attack on Microsoft SQL Server. Retrieved September 4, 2019.

Internal MISP references

UUID 569a6be3-7a10-4aa4-be26-a62ed562a4ce which can be used as unique global reference for Kaspersky MSSQL Aug 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-04T00:00:00Z
date_published 2019-08-22T00:00:00Z
source MITRE
title Agent 1433: remote attack on Microsoft SQL Server

Securelist Agent.btz

Gostev, A.. (2014, March 12). Agent.btz: a Source of Inspiration?. Retrieved April 8, 2016.

Internal MISP references

UUID 3b876c56-1d18-49e3-9a96-5cee4af7ab72 which can be used as unique global reference for Securelist Agent.btz in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-08T00:00:00Z
date_published 2014-03-12T00:00:00Z
source MITRE
title Agent.btz: a Source of Inspiration?

ThreatExpert Agent.btz

Shevchenko, S.. (2008, November 30). Agent.btz - A Threat That Hit Pentagon. Retrieved April 8, 2016.

Internal MISP references

UUID b710c404-b02e-444c-9388-9a5e751971d2 which can be used as unique global reference for ThreatExpert Agent.btz in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-08T00:00:00Z
date_published 2008-11-30T00:00:00Z
source MITRE
title Agent.btz - A Threat That Hit Pentagon

AgentExecutor.exe - LOLBAS Project

LOLBAS. (2020, July 23). AgentExecutor.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 633d7f25-df9d-4619-9aa9-92d1d9d225d7 which can be used as unique global reference for AgentExecutor.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2020-07-23T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title AgentExecutor.exe

SentinelLabs Agent Tesla Aug 2020

Walter, J. (2020, August 10). Agent Tesla | Old RAT Uses New Tricks to Stay on Top. Retrieved December 11, 2020.

Internal MISP references

UUID 5f712e3f-5a9d-4af3-b846-a61dc1d59b3a which can be used as unique global reference for SentinelLabs Agent Tesla Aug 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-11T00:00:00Z
date_published 2020-08-10T00:00:00Z
source MITRE
title Agent Tesla

LogPoint Agent Tesla March 23 2023

Anish Bogati. (2023, March 23). AgentTesla's Capabilities: A Review and Detection Strategies. Retrieved May 7, 2023.

Internal MISP references

UUID 28bfb97b-4b58-408a-bef9-9081f6ddedb8 which can be used as unique global reference for LogPoint Agent Tesla March 23 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2023-03-23T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title AgentTesla's Capabilities: A Review and Detection Strategies

Sekoia.io Blog September 9 2024

Sekoia TDR; Felix Aimé; Pierre-Antoine D; Charles M. (2024, September 9). A glimpse into the Quad7 operators' next moves and associated botnets. Retrieved September 11, 2024.

Internal MISP references

UUID eb4a1888-3b04-449b-9738-d96ae26adfee which can be used as unique global reference for Sekoia.io Blog September 9 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-11T00:00:00Z
date_published 2024-09-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title A glimpse into the Quad7 operators' next moves and associated botnets

ATT Sidewinder January 2021

Hegel, T. (2021, January 13). A Global Perspective of the SideWinder APT. Retrieved January 27, 2021.

Internal MISP references

UUID d6644f88-d727-4f62-897a-bfa18f86380d which can be used as unique global reference for ATT Sidewinder January 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-27T00:00:00Z
date_published 2021-01-13T00:00:00Z
source MITRE, Tidal Cyber
title A Global Perspective of the SideWinder APT

Unit42 Agrius 2023

Or Chechik, Tom Fakterman, Daniel Frank & Assaf Dahan. (2023, November 6). Agonizing Serpens (Aka Agrius) Targeting the Israeli Higher Education and Tech Sectors. Retrieved May 22, 2024.

Internal MISP references

UUID 70fb43bd-f8e1-56a5-a0e9-884e85f16b10 which can be used as unique global reference for Unit42 Agrius 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-22T00:00:00Z
date_published 2023-11-06T00:00:00Z
source MITRE
title Agonizing Serpens (Aka Agrius) Targeting the Israeli Higher Education and Tech Sectors

CheckPoint Agrius 2023

Marc Salinas Fernandez & Jiri Vinopal. (2023, May 23). AGRIUS DEPLOYS MONEYBIRD IN TARGETED ATTACKS AGAINST ISRAELI ORGANIZATIONS. Retrieved May 21, 2024.

Internal MISP references

UUID b3034b5d-1fe5-5677-a2e8-9329141875d4 which can be used as unique global reference for CheckPoint Agrius 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-21T00:00:00Z
date_published 2023-05-23T00:00:00Z
source MITRE
title AGRIUS DEPLOYS MONEYBIRD IN TARGETED ATTACKS AGAINST ISRAELI ORGANIZATIONS

Harmj0y Domain Trusts

Schroeder, W. (2017, October 30). A Guide to Attacking Domain Trusts. Retrieved February 14, 2019.

Internal MISP references

UUID 23a9ef6c-9f71-47bb-929f-9a92f24553eb which can be used as unique global reference for Harmj0y Domain Trusts in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-14T00:00:00Z
date_published 2017-10-30T00:00:00Z
source MITRE
title A Guide to Attacking Domain Trusts

airwalk backdoor unix systems

airwalk. (2023, January 1). A guide to backdooring Unix systems. Retrieved May 31, 2023.

Internal MISP references

UUID 3f3bca4a-68fa-5d4a-b86f-36f82345ff36 which can be used as unique global reference for airwalk backdoor unix systems in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-31T00:00:00Z
date_published 2023-01-01T00:00:00Z
source MITRE
title A guide to backdooring Unix systems

Wired Lockergoga 2019

Greenberg, A. (2019, March 25). A Guide to LockerGoga, the Ransomware Crippling Industrial Firms. Retrieved July 17, 2019.

Internal MISP references

UUID de12f263-f76d-4b63-beb8-b210f7a8310d which can be used as unique global reference for Wired Lockergoga 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-07-17T00:00:00Z
date_published 2019-03-25T00:00:00Z
source MITRE
title A Guide to LockerGoga, the Ransomware Crippling Industrial Firms

ZDNET Selling Data

Cimpanu, C. (2020, May 9). A hacker group is selling more than 73 million user records on the dark web. Retrieved October 20, 2020.

Internal MISP references

UUID 61d00ae2-5494-4c6c-8860-6826e701ade8 which can be used as unique global reference for ZDNET Selling Data in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
date_published 2020-05-09T00:00:00Z
source MITRE
title A hacker group is selling more than 73 million user records on the dark web

ESET Zebrocy May 2019

ESET Research. (2019, May 22). A journey to Zebrocy land. Retrieved June 20, 2019.

Internal MISP references

UUID f8b837fb-e46c-4153-8e86-dc4b909b393a which can be used as unique global reference for ESET Zebrocy May 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-20T00:00:00Z
date_published 2019-05-22T00:00:00Z
source MITRE
title A journey to Zebrocy land

Kersten Akira 2023

Max Kersten & Alexandre Mundo. (2023, November 29). Akira Ransomware. Retrieved April 4, 2024.

Internal MISP references

UUID df191993-a2cb-5d26-960c-11d1c6d3d73b which can be used as unique global reference for Kersten Akira 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-04T00:00:00Z
date_published 2023-11-29T00:00:00Z
source MITRE
title Akira Ransomware

Akira Ransomware Analysis August 2023

SEQBOSS. (2023, August 10). AKIRA RANSOMWARE ANALYSIS. Retrieved April 3, 2024.

Internal MISP references

UUID b34d6a98-158e-4fe7-8fcd-79554c07631a which can be used as unique global reference for Akira Ransomware Analysis August 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-03T00:00:00Z
date_published 2023-08-10T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title AKIRA RANSOMWARE ANALYSIS

Sophos Akira May 9 2023

Paul Jaramillo. (2023, May 9). Akira Ransomware is “bringin’ 1988 back”. Retrieved February 27, 2024.

Internal MISP references

UUID 1343b052-b158-4dad-9ed4-9dbb7bb778dd which can be used as unique global reference for Sophos Akira May 9 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-27T00:00:00Z
date_published 2023-05-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Akira Ransomware is “bringin’ 1988 back”

BlackBerry Akira July 11 2024

BlackBerry Research and Intelligence Team. (2024, July 11). Akira Ransomware Targets the LATAM Airline Industry. Retrieved September 16, 2024.

Internal MISP references

UUID 59a1bd0f-a907-4918-90e1-d163bf84f927 which can be used as unique global reference for BlackBerry Akira July 11 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-16T00:00:00Z
date_published 2024-07-11T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Akira Ransomware Targets the LATAM Airline Industry

Microsoft AKS Azure AD 2023

Microsoft. (2023, February 27). AKS-managed Azure Active Directory integration. Retrieved March 8, 2023.

Internal MISP references

UUID 809db259-3557-5597-9d1a-7c00cc10b89c which can be used as unique global reference for Microsoft AKS Azure AD 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-08T00:00:00Z
date_published 2023-02-27T00:00:00Z
source MITRE
title AKS-managed Azure Active Directory integration

Okta DPoP 2023

Venkat Viswanathan. (2023, June 13). A leap forward in token security: Okta adds support for DPoP. Retrieved January 2, 2024.

Internal MISP references

UUID d792ede9-6ff6-5fae-a045-fd8b57abd3d3 which can be used as unique global reference for Okta DPoP 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-02T00:00:00Z
date_published 2023-06-13T00:00:00Z
source MITRE
title A leap forward in token security: Okta adds support for DPoP

US-CERT SamSam 2018

US-CERT. (2018, December 3). Alert (AA18-337A): SamSam Ransomware. Retrieved March 15, 2019.

Internal MISP references

UUID b9d14fea-2330-4eed-892c-b4e05a35d273 which can be used as unique global reference for US-CERT SamSam 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-15T00:00:00Z
date_published 2018-12-03T00:00:00Z
source MITRE
title Alert (AA18-337A): SamSam Ransomware

CISA MSS Sep 2020

CISA. (2020, September 14). Alert (AA20-258A): Chinese Ministry of State Security-Affiliated Cyber Threat Actor Activity. Retrieved October 1, 2020.

Internal MISP references

UUID ffe613e3-b528-42bf-81d5-4d8de38b3457 which can be used as unique global reference for CISA MSS Sep 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-01T00:00:00Z
date_published 2020-09-14T00:00:00Z
source MITRE
title Alert (AA20-258A): Chinese Ministry of State Security-Affiliated Cyber Threat Actor Activity

CISA Lokibot September 2020

DHS/CISA. (2020, September 22). Alert (AA20-266A) LokiBot Malware . Retrieved September 15, 2021.

Internal MISP references

UUID df979f7b-6de8-4029-ae47-700f29157db0 which can be used as unique global reference for CISA Lokibot September 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-15T00:00:00Z
date_published 2020-09-22T00:00:00Z
source MITRE
title Alert (AA20-266A) LokiBot Malware

CISA_AA21_200B

CISA. (2021, August 20). Alert (AA21-200B) Chinese State-Sponsored Cyber Operations: Observed TTPs. Retrieved June 21, 2022.

Internal MISP references

UUID 633c6045-8990-58ae-85f0-00139aa9a091 which can be used as unique global reference for CISA_AA21_200B in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-21T00:00:00Z
date_published 2021-08-20T00:00:00Z
source MITRE
title Alert (AA21-200B) Chinese State-Sponsored Cyber Operations: Observed TTPs

cisa_malware_orgs_ukraine

CISA. (2022, April 28). Alert (AA22-057A) Update: Destructive Malware Targeting Organizations in Ukraine. Retrieved July 29, 2022.

Internal MISP references

UUID ebe89b36-f87f-4e09-8030-a1328c0b8683 which can be used as unique global reference for cisa_malware_orgs_ukraine in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-29T00:00:00Z
date_published 2022-04-28T00:00:00Z
source MITRE
title Alert (AA22-057A) Update: Destructive Malware Targeting Organizations in Ukraine

US-CERT Ransomware 2016

US-CERT. (2016, March 31). Alert (TA16-091A): Ransomware and Recent Variants. Retrieved March 15, 2019.

Internal MISP references

UUID 866484fa-836d-4c5b-bbad-3594ef60599c which can be used as unique global reference for US-CERT Ransomware 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-15T00:00:00Z
date_published 2016-03-31T00:00:00Z
source MITRE
title Alert (TA16-091A): Ransomware and Recent Variants

US-CERT WannaCry 2017

US-CERT. (2017, May 12). Alert (TA17-132A): Indicators Associated With WannaCry Ransomware. Retrieved March 25, 2019.

Internal MISP references

UUID 349b8e9d-7172-4d01-b150-f0371d038b7e which can be used as unique global reference for US-CERT WannaCry 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-25T00:00:00Z
date_published 2017-05-12T00:00:00Z
source MITRE
title Alert (TA17-132A): Indicators Associated With WannaCry Ransomware

US-CERT HIDDEN COBRA June 2017

US-CERT. (2017, June 13). Alert (TA17-164A) HIDDEN COBRA – North Korea’s DDoS Botnet Infrastructure. Retrieved July 13, 2017.

Internal MISP references

UUID 8e57cea3-ee37-4507-bb56-7445050ec8ca which can be used as unique global reference for US-CERT HIDDEN COBRA June 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-13T00:00:00Z
date_published 2017-06-13T00:00:00Z
source MITRE
title Alert (TA17-164A) HIDDEN COBRA – North Korea’s DDoS Botnet Infrastructure

US-CERT NotPetya 2017

US-CERT. (2017, July 1). Alert (TA17-181A): Petya Ransomware. Retrieved March 15, 2019.

Internal MISP references

UUID 6a009850-834b-4178-9028-2745921b6743 which can be used as unique global reference for US-CERT NotPetya 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-15T00:00:00Z
date_published 2017-07-01T00:00:00Z
source MITRE
title Alert (TA17-181A): Petya Ransomware

US-CERT APT Energy Oct 2017

US-CERT. (2017, October 20). Alert (TA17-293A): Advanced Persistent Threat Activity Targeting Energy and Other Critical Infrastructure Sectors. Retrieved November 2, 2017.

Internal MISP references

UUID e34ddf0a-a112-4557-ac09-1ff540241a89 which can be used as unique global reference for US-CERT APT Energy Oct 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-02T00:00:00Z
date_published 2017-10-20T00:00:00Z
source MITRE
title Alert (TA17-293A): Advanced Persistent Threat Activity Targeting Energy and Other Critical Infrastructure Sectors

US-CERT FALLCHILL Nov 2017

US-CERT. (2017, November 22). Alert (TA17-318A): HIDDEN COBRA – North Korean Remote Administration Tool: FALLCHILL. Retrieved December 7, 2017.

Internal MISP references

UUID 045e03f9-af83-4442-b69e-b80f68e570ac which can be used as unique global reference for US-CERT FALLCHILL Nov 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-07T00:00:00Z
date_published 2017-11-22T00:00:00Z
source MITRE
title Alert (TA17-318A): HIDDEN COBRA – North Korean Remote Administration Tool: FALLCHILL

US-CERT Volgmer Nov 2017

US-CERT. (2017, November 22). Alert (TA17-318B): HIDDEN COBRA – North Korean Trojan: Volgmer. Retrieved December 7, 2017.

Internal MISP references

UUID c48c7ac0-8d55-4b62-9606-a9ce420459b6 which can be used as unique global reference for US-CERT Volgmer Nov 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-07T00:00:00Z
date_published 2017-11-22T00:00:00Z
source MITRE
title Alert (TA17-318B): HIDDEN COBRA – North Korean Trojan: Volgmer

US-CERT TA18-074A

US-CERT. (2018, March 16). Alert (TA18-074A): Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors. Retrieved June 6, 2018.

Internal MISP references

UUID 94e87a92-bf80-43e2-a3ab-cd7d4895f2fc which can be used as unique global reference for US-CERT TA18-074A in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-06-06T00:00:00Z
date_published 2018-03-16T00:00:00Z
source MITRE
title Alert (TA18-074A): Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors

US-CERT-TA18-106A

US-CERT. (2018, April 20). Alert (TA18-106A) Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. Retrieved October 19, 2020.

Internal MISP references

UUID 1fe55557-94af-4697-a675-884701f70f2a which can be used as unique global reference for US-CERT-TA18-106A in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
date_published 2018-04-20T00:00:00Z
source MITRE
title Alert (TA18-106A) Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices

US-CERT Emotet Jul 2018

US-CERT. (2018, July 20). Alert (TA18-201A) Emotet Malware. Retrieved March 25, 2019.

Internal MISP references

UUID 0043043a-4741-41c2-a6f2-f88d5caa8b7a which can be used as unique global reference for US-CERT Emotet Jul 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-25T00:00:00Z
date_published 2018-07-20T00:00:00Z
source MITRE
title Alert (TA18-201A) Emotet Malware

Sysdig LLMJacking 2024

LLMjacking: Stolen Cloud Credentials Used in New AI Attack. (2024, May 6). Alessandro Brucato. Retrieved September 25, 2024.

Internal MISP references

UUID 20d3128e-0900-5373-97f0-fcf26fc86271 which can be used as unique global reference for Sysdig LLMJacking 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-25T00:00:00Z
date_published 2024-05-06T00:00:00Z
source MITRE
title Alessandro Brucato

Alexa-dns

Scanning Alexa's Top 1M for AXFR. (2015, March 29). Retrieved June 5, 2024.

Internal MISP references

UUID 154a5d86-4478-5cf5-ac39-19ac7581a440 which can be used as unique global reference for Alexa-dns in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-05T00:00:00Z
source MITRE
title Alexa-dns

AlKhaser Debug

Noteworthy. (2019, January 6). Al-Khaser. Retrieved April 1, 2022.

Internal MISP references

UUID d9773aaf-e3ec-4ce3-b5c8-1ca3c4751622 which can be used as unique global reference for AlKhaser Debug in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-01T00:00:00Z
date_published 2019-01-06T00:00:00Z
source MITRE
title Al-Khaser

Microsoft RDP Logons

Microsoft. (2017, April 9). Allow log on through Remote Desktop Services. Retrieved August 5, 2024.

Internal MISP references

UUID 2b460644-dc33-5cf4-a80a-8509d9f7e152 which can be used as unique global reference for Microsoft RDP Logons in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-05T00:00:00Z
date_published 2017-04-09T00:00:00Z
source MITRE
title Allow log on through Remote Desktop Services

NetSPI ClickOnce

Ryan Gandrud. (2015, March 23). All You Need Is One – A ClickOnce Love Story. Retrieved September 9, 2024.

Internal MISP references

UUID be17ae41-52d0-51bd-b48f-5c1d3c5c8dc1 which can be used as unique global reference for NetSPI ClickOnce in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-09T00:00:00Z
date_published 2015-03-23T00:00:00Z
source MITRE
title All You Need Is One – A ClickOnce Love Story

Fysbis Palo Alto Analysis

Bryan Lee and Rob Downs. (2016, February 12). A Look Into Fysbis: Sofacy’s Linux Backdoor. Retrieved September 10, 2017.

Internal MISP references

UUID 3e527ad6-6b56-473d-8178-e1c3c14f2311 which can be used as unique global reference for Fysbis Palo Alto Analysis in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-09-10T00:00:00Z
date_published 2016-02-12T00:00:00Z
source MITRE
title A Look Into Fysbis: Sofacy’s Linux Backdoor

Medium KONNI Jan 2020

Karmi, D. (2020, January 4). A Look Into Konni 2019 Campaign. Retrieved April 28, 2020.

Internal MISP references

UUID e117a6ac-eaa2-4494-b4ae-2d9ae52c3251 which can be used as unique global reference for Medium KONNI Jan 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-04-28T00:00:00Z
date_published 2020-01-04T00:00:00Z
source MITRE
title A Look Into Konni 2019 Campaign

Unit 42 Palo Alto Ransomware in Public Clouds 2022

Jay Chen. (2022, May 16). A Look Into Public Clouds From the Ransomware Actor's Perspective. Retrieved March 21, 2023.

Internal MISP references

UUID cc6c2b69-ca51-513e-9666-a03be2ea5fcd which can be used as unique global reference for Unit 42 Palo Alto Ransomware in Public Clouds 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-21T00:00:00Z
date_published 2022-05-16T00:00:00Z
source MITRE
title A Look Into Public Clouds From the Ransomware Actor's Perspective

Cyber Centre ALPHV/BlackCat July 25 2023

Canadian Centre for Cyber Security. (2023, July 25). ALPHV/BlackCat Ransomware Targeting of Canadian Industries. Retrieved September 13, 2023.

Internal MISP references

UUID 610c8f22-1a96-42d2-934d-8467d136eed2 which can be used as unique global reference for Cyber Centre ALPHV/BlackCat July 25 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-13T00:00:00Z
date_published 2023-07-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title ALPHV/BlackCat Ransomware Targeting of Canadian Industries

Mandiant ALPHV Affiliate April 3 2023

Jason Deyalsingh, Nick Smith, Eduardo Mattos, Tyler Mclellan. (2023, April 3). ALPHV Ransomware Affiliate Targets Vulnerable Backup Installations to Gain Initial Access. Retrieved March 5, 2024.

Internal MISP references

UUID b8375832-f6a9-4617-a2ac-d23aacbf2bfe which can be used as unique global reference for Mandiant ALPHV Affiliate April 3 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-05T00:00:00Z
date_published 2023-04-03T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title ALPHV Ransomware Affiliate Targets Vulnerable Backup Installations to Gain Initial Access

Microsoft ADS Mar 2014

Marlin, J. (2013, March 24). Alternate Data Streams in NTFS. Retrieved March 21, 2018.

Internal MISP references

UUID eae434ff-97c0-4a82-9f80-215e515befae which can be used as unique global reference for Microsoft ADS Mar 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-21T00:00:00Z
date_published 2013-03-24T00:00:00Z
source MITRE
title Alternate Data Streams in NTFS

XPNSec PPID Nov 2017

Chester, A. (2017, November 20). Alternative methods of becoming SYSTEM. Retrieved June 4, 2019.

Internal MISP references

UUID 0dbf093e-4b54-4972-b048-2a6411037da4 which can be used as unique global reference for XPNSec PPID Nov 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-04T00:00:00Z
date_published 2017-11-20T00:00:00Z
source MITRE
title Alternative methods of becoming SYSTEM

Microsoft AlwaysInstallElevated 2018

Microsoft. (2018, May 31). AlwaysInstallElevated. Retrieved December 14, 2020.

Internal MISP references

UUID 19026f4c-ad65-435e-8c0e-a8ccc9895348 which can be used as unique global reference for Microsoft AlwaysInstallElevated 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-14T00:00:00Z
date_published 2018-05-31T00:00:00Z
source MITRE
title AlwaysInstallElevated

ASEC BLOG July 21 2022

Sanseo. (2022, July 21). Amadey Bot Being Distributed Through SmokeLoader - ASEC BLOG. Retrieved May 15, 2023.

Internal MISP references

UUID e320cc74-005a-46db-8a04-6ec487df327f which can be used as unique global reference for ASEC BLOG July 21 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-15T00:00:00Z
date_published 2022-07-21T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Amadey Bot Being Distributed Through SmokeLoader - ASEC BLOG

Amazon Snapshots

Amazon. (n.d.). Amazon EBS snapshots. Retrieved October 13, 2021.

Internal MISP references

UUID 3961a653-b53c-4ba4-9ea6-709e1d1bdb55 which can be used as unique global reference for Amazon Snapshots in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-13T00:00:00Z
source MITRE
title Amazon EBS snapshots

Amazon AMI

Amazon. (n.d.). Amazon Machine Images (AMI). Retrieved October 13, 2021.

Internal MISP references

UUID bc9ecf45-2a20-47df-a634-064237e5f126 which can be used as unique global reference for Amazon AMI in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-13T00:00:00Z
source MITRE
title Amazon Machine Images (AMI)

Amazon S3

Amazon. (n.d.). Amazon S3. Retrieved October 13, 2021.

Internal MISP references

UUID 7fecbd5d-626f-496a-a72f-5f166c78c204 which can be used as unique global reference for Amazon S3 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-13T00:00:00Z
source MITRE
title Amazon S3

Trend Micro S3 Exposed PII, 2017

Trend Micro. (2017, November 6). A Misconfigured Amazon S3 Exposed Almost 50 Thousand PII in Australia. Retrieved October 4, 2019.

Internal MISP references

UUID 1ba37b48-1219-4f87-af36-9bdd8d6265ca which can be used as unique global reference for Trend Micro S3 Exposed PII, 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-04T00:00:00Z
date_published 2017-11-06T00:00:00Z
source MITRE
title A Misconfigured Amazon S3 Exposed Almost 50 Thousand PII in Australia

Recorded Future Beacon Certificates

Insikt Group. (2019, June 18). A Multi-Method Approach to Identifying Rogue Cobalt Strike Servers. Retrieved September 16, 2024.

Internal MISP references

UUID 792ca8a7-c9b2-4e7f-8562-e1ccb60a402a which can be used as unique global reference for Recorded Future Beacon Certificates in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-16T00:00:00Z
date_published 2019-06-18T00:00:00Z
source MITRE
title A Multi-Method Approach to Identifying Rogue Cobalt Strike Servers

Botnet Scan

Dainotti, A. et al. (2012). Analysis of a “/0” Stealth Scan from a Botnet. Retrieved October 20, 2020.

Internal MISP references

UUID ca09941c-fcc8-460b-8b02-d1608a7d3813 which can be used as unique global reference for Botnet Scan in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
date_published 2012-01-01T00:00:00Z
source MITRE
title Analysis of a “/0” Stealth Scan from a Botnet

Trend Micro Ngrok September 2020

Borja, A. Camba, A. et al (2020, September 14). Analysis of a Convoluted Attack Chain Involving Ngrok. Retrieved September 15, 2020.

Internal MISP references

UUID e7b57e64-3532-4b98-9fa5-b832e6fcd53a which can be used as unique global reference for Trend Micro Ngrok September 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-15T00:00:00Z
source MITRE
title Analysis of a Convoluted Attack Chain Involving Ngrok

CIRCL PlugX March 2013

Computer Incident Response Center Luxembourg. (2013, March 29). Analysis of a PlugX variant. Retrieved November 5, 2018.

Internal MISP references

UUID 8ab89236-6994-43a3-906c-383e294f65d1 which can be used as unique global reference for CIRCL PlugX March 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-05T00:00:00Z
date_published 2013-03-29T00:00:00Z
source MITRE
title Analysis of a PlugX variant

Apple Unified Log Analysis Remote Login and Screen Sharing

Sarah Edwards. (2020, April 30). Analysis of Apple Unified Logs: Quarantine Edition [Entry 6] – Working From Home? Remote Logins. Retrieved August 19, 2021.

Internal MISP references

UUID a2169171-8e4a-4faa-811c-98b6204a5a57 which can be used as unique global reference for Apple Unified Log Analysis Remote Login and Screen Sharing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-19T00:00:00Z
date_published 2020-04-30T00:00:00Z
source MITRE
title Analysis of Apple Unified Logs: Quarantine Edition [Entry 6] – Working From Home? Remote Logins

Medium S2W WhisperGate January 2022

S2W. (2022, January 18). Analysis of Destructive Malware (WhisperGate) targeting Ukraine. Retrieved March 14, 2022.

Internal MISP references

UUID 06cf7197-244a-431b-a288-4c2bbd431ad5 which can be used as unique global reference for Medium S2W WhisperGate January 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-14T00:00:00Z
date_published 2022-01-18T00:00:00Z
source MITRE
title Analysis of Destructive Malware (WhisperGate) targeting Ukraine

Analysis of FG-IR-22-369

Guillaume Lovet and Alex Kong. (2023, March 9). Analysis of FG-IR-22-369. Retrieved May 15, 2023.

Internal MISP references

UUID f12b141e-6bb2-5563-9665-5756fec2d5e7 which can be used as unique global reference for Analysis of FG-IR-22-369 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-15T00:00:00Z
date_published 2023-03-09T00:00:00Z
source MITRE
title Analysis of FG-IR-22-369

Graeber 2014

Graeber, M. (2014, October). Analysis of Malicious Security Support Provider DLLs. Retrieved March 1, 2017.

Internal MISP references

UUID f2f9a6bf-b4d9-461e-b961-0610ea72faf0 which can be used as unique global reference for Graeber 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-01T00:00:00Z
date_published 2014-10-01T00:00:00Z
source MITRE
title Analysis of Malicious Security Support Provider DLLs

Fortinet Agent Tesla April 2018

Zhang, X. (2018, April 05). Analysis of New Agent Tesla Spyware Variant. Retrieved November 5, 2018.

Internal MISP references

UUID 86a65be7-0f70-4755-b526-a26b92eabaa2 which can be used as unique global reference for Fortinet Agent Tesla April 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-05T00:00:00Z
date_published 2018-04-05T00:00:00Z
source MITRE
title Analysis of New Agent Tesla Spyware Variant

Antiy CERT Ramsay April 2020

Antiy CERT. (2020, April 20). Analysis of Ramsay components of Darkhotel's infiltration and isolation network. Retrieved March 24, 2021.

Internal MISP references

UUID 280636da-fa21-472c-947c-651a628ea2cd which can be used as unique global reference for Antiy CERT Ramsay April 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-24T00:00:00Z
date_published 2020-04-20T00:00:00Z
source MITRE
title Analysis of Ramsay components of Darkhotel's infiltration and isolation network

Storm-0558 techniques for unauthorized email access

Microsoft Threat Intelligence. (2023, July 14). Analysis of Storm-0558 techniques for unauthorized email access. Retrieved September 18, 2023.

Internal MISP references

UUID 74fd79a9-09f7-5149-a457-687a1e2989de which can be used as unique global reference for Storm-0558 techniques for unauthorized email access in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-18T00:00:00Z
date_published 2023-07-14T00:00:00Z
source MITRE
title Analysis of Storm-0558 techniques for unauthorized email access

ESET Telebots July 2017

Cherepanov, A.. (2017, July 4). Analysis of TeleBots’ cunning backdoor . Retrieved June 11, 2020.

Internal MISP references

UUID 5d62c323-6626-4aad-8bf2-0d988e436f3d which can be used as unique global reference for ESET Telebots July 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-11T00:00:00Z
date_published 2017-07-04T00:00:00Z
source MITRE
title Analysis of TeleBots’ cunning backdoor

EST Kimsuky SmokeScreen April 2019

ESTSecurity. (2019, April 17). Analysis of the APT Campaign ‘Smoke Screen’ targeting to Korea and US 출처: https://blog.alyac.co.kr/2243 [이스트시큐리티 알약 블로그]. Retrieved September 29, 2021.

Internal MISP references

UUID 15213a3c-1e9f-47fa-9864-8ef2707c7fb6 which can be used as unique global reference for EST Kimsuky SmokeScreen April 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-29T00:00:00Z
date_published 2019-04-17T00:00:00Z
source MITRE
title Analysis of the APT Campaign ‘Smoke Screen’ targeting to Korea and US 출처: https://blog.alyac.co.kr/2243 [이스트시큐리티 알약 블로그]

Ukraine15 - EISAC - 201603

Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems. (2016, March 18). Analysis of the Cyber Attack on the Ukranian Power Grid: Defense Use Case. Retrieved March 27, 2018.

Internal MISP references

UUID 8adc6d36-3aa0-5d7b-8bb3-23f4426be8a6 which can be used as unique global reference for Ukraine15 - EISAC - 201603 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-27T00:00:00Z
date_published 2016-03-18T00:00:00Z
source MITRE
title Analysis of the Cyber Attack on the Ukranian Power Grid: Defense Use Case

Check Point Havij Analysis

Ganani, M. (2015, May 14). Analysis of the Havij SQL Injection tool. Retrieved March 19, 2018.

Internal MISP references

UUID 2e00a539-acbe-4462-a30f-43da4e8b9c4f which can be used as unique global reference for Check Point Havij Analysis in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-19T00:00:00Z
date_published 2015-05-14T00:00:00Z
source MITRE
title Analysis of the Havij SQL Injection tool

ESET Emotet Dec 2018

Perez, D.. (2018, December 28). Analysis of the latest Emotet propagation campaign. Retrieved April 16, 2019.

Internal MISP references

UUID 3fab9e25-e83e-4c90-ae32-dcd0c30757f8 which can be used as unique global reference for ESET Emotet Dec 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-16T00:00:00Z
date_published 2018-12-28T00:00:00Z
source MITRE
title Analysis of the latest Emotet propagation campaign

Rewterz Sidewinder COVID-19 June 2020

Rewterz. (2020, June 22). Analysis on Sidewinder APT Group – COVID-19. Retrieved January 29, 2021.

Internal MISP references

UUID cdd779f1-30c2-40be-a500-332920f0e21c which can be used as unique global reference for Rewterz Sidewinder COVID-19 June 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-29T00:00:00Z
date_published 2020-06-22T00:00:00Z
source MITRE
title Analysis on Sidewinder APT Group – COVID-19

CISA AR18-352A Quasar RAT December 2018

CISA. (2018, December 18). Analysis Report (AR18-352A) Quasar Open-Source Remote Administration Tool. Retrieved August 1, 2022.

Internal MISP references

UUID a109e42d-604f-4885-ada3-5d6895addc96 which can be used as unique global reference for CISA AR18-352A Quasar RAT December 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-01T00:00:00Z
date_published 2018-12-18T00:00:00Z
source MITRE
title Analysis Report (AR18-352A) Quasar Open-Source Remote Administration Tool

CISA AR21-126A FIVEHANDS May 2021

CISA. (2021, May 6). Analysis Report (AR21-126A) FiveHands Ransomware. Retrieved June 7, 2021.

Internal MISP references

UUID f98604dd-2881-4024-8e43-6f5f48c6c9fa which can be used as unique global reference for CISA AR21-126A FIVEHANDS May 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-07T00:00:00Z
date_published 2021-05-06T00:00:00Z
source MITRE
title Analysis Report (AR21-126A) FiveHands Ransomware

JoeSecurity Egregor 2020

Joe Security. (n.d.). Analysis Report fasm.dll. Retrieved January 6, 2021.

Internal MISP references

UUID d403e610-fa83-4c17-842f-223063864009 which can be used as unique global reference for JoeSecurity Egregor 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-06T00:00:00Z
source MITRE
title Analysis Report fasm.dll

GDATA Zeus Panda June 2017

Ebach, L. (2017, June 22). Analysis Results of Zeus.Variant.Panda. Retrieved November 5, 2018.

Internal MISP references

UUID 2d9a6957-5645-4863-968b-4a3c8736564b which can be used as unique global reference for GDATA Zeus Panda June 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-05T00:00:00Z
date_published 2017-06-22T00:00:00Z
source MITRE
title Analysis Results of Zeus.Variant.Panda

jstnk9.github.io June 01 2022

jstnk9.github.io. (2022, June 1). Analyzing AsyncRAT distributed in Colombia | Welcome to Jstnk webpage. Retrieved May 7, 2023.

Internal MISP references

UUID 4e7f573d-f8cc-4538-9f8d-b945f037e46f which can be used as unique global reference for jstnk9.github.io June 01 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2022-06-01T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Analyzing AsyncRAT distributed in Colombia

Analyzing CS Dec 2020

Maynier, E. (2020, December 20). Analyzing Cobalt Strike for Fun and Profit. Retrieved October 12, 2021.

Internal MISP references

UUID f2cb06bc-66d5-4c60-a2a4-74e5a0c23bee which can be used as unique global reference for Analyzing CS Dec 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-12T00:00:00Z
date_published 2020-12-20T00:00:00Z
source MITRE
title Analyzing Cobalt Strike for Fun and Profit

Objective_See 1 4 2024

Objective_See. (2024, January 4). Analyzing DPRK's SpectralBlur. Retrieved March 8, 2024.

Internal MISP references

UUID c96535be-4859-4ae3-9ba0-d482f1195863 which can be used as unique global reference for Objective_See 1 4 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-08T00:00:00Z
date_published 2024-01-04T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Analyzing DPRK's SpectralBlur

Microsoft Security Blog 4 22 2024

Microsoft Threat Intelligence. (2024, April 22). Analyzing Forest Blizzard's custom post-compromise tool for exploiting CVE-2022-38028 to obtain credentials . Retrieved April 22, 2024.

Internal MISP references

UUID 050ff793-d81d-499f-a136-905e76bce321 which can be used as unique global reference for Microsoft Security Blog 4 22 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-22T00:00:00Z
date_published 2024-04-22T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Analyzing Forest Blizzard's custom post-compromise tool for exploiting CVE-2022-38028 to obtain credentials

Uperesia Malicious Office Documents

Felix. (2016, September). Analyzing Malicious Office Documents. Retrieved April 11, 2018.

Internal MISP references

UUID f6ffb916-ac14-44d1-8566-26bafa06e77b which can be used as unique global reference for Uperesia Malicious Office Documents in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-11T00:00:00Z
date_published 2016-09-01T00:00:00Z
source MITRE
title Analyzing Malicious Office Documents

Unit42 OilRig Nov 2018

Falcone, R., Wilhoit, K.. (2018, November 16). Analyzing OilRig’s Ops Tempo from Testing to Weaponization to Delivery. Retrieved April 23, 2019.

Internal MISP references

UUID 9bc09d8a-d890-473b-a8cf-ea319fcc3462 which can be used as unique global reference for Unit42 OilRig Nov 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-23T00:00:00Z
date_published 2018-11-16T00:00:00Z
source MITRE
title Analyzing OilRig’s Ops Tempo from Testing to Weaponization to Delivery

McAfee GhostSecret

Sherstobitoff, R., Malhotra, A. (2018, April 24). Analyzing Operation GhostSecret: Attack Seeks to Steal Data Worldwide. Retrieved May 16, 2018.

Internal MISP references

UUID d1cd4f5b-253c-4833-8905-49fb58e7c016 which can be used as unique global reference for McAfee GhostSecret in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-05-16T00:00:00Z
date_published 2018-04-24T00:00:00Z
source MITRE
title Analyzing Operation GhostSecret: Attack Seeks to Steal Data Worldwide

McAfee-GhostSecret-fixurl

Ryan Sherstobitoff. (2018, April 24). Analyzing Operation GhostSecret: Attack Seeks to Steal Data Worldwide. Retrieved August 15, 2024.

Internal MISP references

UUID 8c88bc0d-102a-59ff-99e7-0d8a789c08a0 which can be used as unique global reference for McAfee-GhostSecret-fixurl in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-15T00:00:00Z
date_published 2018-04-24T00:00:00Z
source MITRE
title Analyzing Operation GhostSecret: Attack Seeks to Steal Data Worldwide

Microsoft Analyzing Solorigate Dec 2020

MSTIC. (2020, December 18). Analyzing Solorigate, the compromised DLL file that started a sophisticated cyberattack, and how Microsoft Defender helps protect customers . Retrieved January 5, 2021.

Internal MISP references

UUID 8ad72d46-ba2c-426f-bb0d-eb47723c8e11 which can be used as unique global reference for Microsoft Analyzing Solorigate Dec 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-05T00:00:00Z
date_published 2020-12-18T00:00:00Z
source MITRE
title Analyzing Solorigate, the compromised DLL file that started a sophisticated cyberattack, and how Microsoft Defender helps protect customers

Lastline PlugX Analysis

Vasilenko, R. (2013, December 17). An Analysis of PlugX Malware. Retrieved November 24, 2015.

Internal MISP references

UUID 9f7fa262-cede-4f47-94ca-1534c65c86e2 which can be used as unique global reference for Lastline PlugX Analysis in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-11-24T00:00:00Z
date_published 2013-12-17T00:00:00Z
source MITRE
title An Analysis of PlugX Malware

TrendMicro Sandworm October 2014

Wu, W. (2014, October 14). An Analysis of Windows Zero-day Vulnerability ‘CVE-2014-4114’ aka “Sandworm”. Retrieved June 18, 2020.

Internal MISP references

UUID 84f289ce-c7b9-4f67-b6cc-bd058e5e6bcb which can be used as unique global reference for TrendMicro Sandworm October 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-18T00:00:00Z
date_published 2014-10-14T00:00:00Z
source MITRE
title An Analysis of Windows Zero-day Vulnerability ‘CVE-2014-4114’ aka “Sandworm”

Dragos Crashoverride 2018

Joe Slowik. (2018, October 12). Anatomy of an Attack: Detecting and Defeating CRASHOVERRIDE. Retrieved December 18, 2020.

Internal MISP references

UUID d14442d5-2557-4a92-9a29-b15a20752f56 which can be used as unique global reference for Dragos Crashoverride 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-18T00:00:00Z
date_published 2018-10-12T00:00:00Z
source MITRE
title Anatomy of an Attack: Detecting and Defeating CRASHOVERRIDE

Anatomy of an hVNC Attack

Keshet, Lior. Kessem, Limor. (2017, January 25). Anatomy of an hVNC Attack. Retrieved November 28, 2023.

Internal MISP references

UUID 293c5d41-cd23-5da5-9d2b-754b626bc22a which can be used as unique global reference for Anatomy of an hVNC Attack in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-11-28T00:00:00Z
date_published 2017-01-25T00:00:00Z
source MITRE
title Anatomy of an hVNC Attack

Syscall 2014

Drysdale, D. (2014, July 16). Anatomy of a system call, part 2. Retrieved June 16, 2020.

Internal MISP references

UUID 4e8fe849-ab1a-4c51-b5eb-16fcd10e8bd0 which can be used as unique global reference for Syscall 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-16T00:00:00Z
date_published 2014-07-16T00:00:00Z
source MITRE
title Anatomy of a system call, part 2

SCADAfence_ransomware

Shaked, O. (2020, January 20). Anatomy of a Targeted Ransomware Attack. Retrieved June 18, 2022.

Internal MISP references

UUID 24c80db5-37a7-46ee-b232-f3c3ffb10f0a which can be used as unique global reference for SCADAfence_ransomware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-18T00:00:00Z
date_published 2020-01-20T00:00:00Z
source MITRE
title Anatomy of a Targeted Ransomware Attack

ESET IIS Malware 2021

Hromcová, Z., Cherepanov, A. (2021). Anatomy of Native IIS Malware. Retrieved September 9, 2021.

Internal MISP references

UUID d9c6e55b-39b7-4097-8ab2-8b87421ce2f4 which can be used as unique global reference for ESET IIS Malware 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-09T00:00:00Z
date_published 2021-01-01T00:00:00Z
source MITRE
title Anatomy of Native IIS Malware

Medium Anchor DNS July 2020

Grange, W. (2020, July 13). Anchor_dns malware goes cross platform. Retrieved September 10, 2020.

Internal MISP references

UUID de246d53-385f-44be-bf0f-25a76442b835 which can be used as unique global reference for Medium Anchor DNS July 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-10T00:00:00Z
date_published 2020-07-13T00:00:00Z
source MITRE
title Anchor_dns malware goes cross platform

NSA Joint Advisory SVR SolarWinds April 2021

NSA, FBI, DHS. (2021, April 15). Russian SVR Targets U.S. and Allied Networks. Retrieved April 16, 2021.

Internal MISP references

UUID 43d9c469-1d54-454b-ba67-74e7f1de9c10 which can be used as unique global reference for NSA Joint Advisory SVR SolarWinds April 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-16T00:00:00Z
source MITRE
title and Allied Networks

Kaspersky Andariel Ransomware June 2021

Park, S. (2021, June 15). Andariel evolves to target South Korea with ransomware. Retrieved September 29, 2021.

Internal MISP references

UUID f4efbcb5-494c-40e0-8734-5df1b92ec39c which can be used as unique global reference for Kaspersky Andariel Ransomware June 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-29T00:00:00Z
date_published 2021-06-15T00:00:00Z
source MITRE
title Andariel evolves to target South Korea with ransomware

CISA GRU29155 2024

US Cybersecurity & Infrastructure Security Agency et al. (2024, September 5). Russian Military Cyber Actors Target U.S. and Global Critical Infrastructure. Retrieved September 6, 2024.

Internal MISP references

UUID c4dba764-d864-59bf-a80d-f1263bc904e4 which can be used as unique global reference for CISA GRU29155 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-06T00:00:00Z
source MITRE
title and Global Critical Infrastructure

Sophos X-Ops C-23

Pankaj Kohli. (2021, November 23). Android APT spyware, targeting Middle East victims, enhances evasiveness. Retrieved October 30, 2023.

Internal MISP references

UUID 305c201b-ccc6-4e28-a1cb-97ca697bb214 which can be used as unique global reference for Sophos X-Ops C-23 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-30T00:00:00Z
date_published 2021-11-23T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Android APT spyware, targeting Middle East victims, enhances evasiveness

RFC826 ARP

Plummer, D. (1982, November). An Ethernet Address Resolution Protocol. Retrieved October 15, 2020.

Internal MISP references

UUID 8eef2b68-f932-4cba-8646-bff9a7848532 which can be used as unique global reference for RFC826 ARP in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-15T00:00:00Z
date_published 1982-11-01T00:00:00Z
source MITRE
title An Ethernet Address Resolution Protocol

HP SVCReady Jun 2022

Schlapfer, Patrick. (2022, June 6). A New Loader Gets Ready. Retrieved December 13, 2022.

Internal MISP references

UUID 48d5ec83-f1b9-595c-bb9a-d6d5cc513a41 which can be used as unique global reference for HP SVCReady Jun 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-12-13T00:00:00Z
date_published 2022-06-06T00:00:00Z
source MITRE
title A New Loader Gets Ready

SecureList Fileless

Legezo, D. (2022, May 4). A new secret stash for “fileless” malware. Retrieved March 23, 2023.

Internal MISP references

UUID 03eb080d-0b83-5cbb-9317-c50b35996c9b which can be used as unique global reference for SecureList Fileless in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-23T00:00:00Z
date_published 2022-05-04T00:00:00Z
source MITRE
title A new secret stash for “fileless” malware

ESET Ebury Feb 2014

M.Léveillé, M.. (2014, February 21). An In-depth Analysis of Linux/Ebury. Retrieved April 19, 2019.

Internal MISP references

UUID eb6d4f77-ac63-4cb8-8487-20f9e709334b which can be used as unique global reference for ESET Ebury Feb 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-19T00:00:00Z
date_published 2014-02-21T00:00:00Z
source MITRE
title An In-depth Analysis of Linux/Ebury

Welivesecurity Ebury SSH

M.Léveillé, M. (2014, February 21). An In-depth Analysis of Linux/Ebury. Retrieved January 8, 2018.

Internal MISP references

UUID 39384c7a-3032-4b45-a5eb-8ebe7de22aa2 which can be used as unique global reference for Welivesecurity Ebury SSH in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-08T00:00:00Z
date_published 2014-02-21T00:00:00Z
source MITRE
title An In-depth Analysis of Linux/Ebury

Avertium Black Basta June 2022

Avertium. (2022, June 1). AN IN-DEPTH LOOK AT BLACK BASTA RANSOMWARE. Retrieved March 7, 2023.

Internal MISP references

UUID 31c2ef62-2852-5418-9d52-2479a3a619d0 which can be used as unique global reference for Avertium Black Basta June 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-07T00:00:00Z
date_published 2022-06-01T00:00:00Z
source MITRE
title AN IN-DEPTH LOOK AT BLACK BASTA RANSOMWARE

Myers 2007

Myers, M., and Youndt, S. (2007). An Introduction to Hardware-Assisted Virtual Machine (HVM) Rootkits. Retrieved November 13, 2014.

Internal MISP references

UUID 689dfe75-9c06-4438-86fa-5fbbb09f0fe7 which can be used as unique global reference for Myers 2007 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-13T00:00:00Z
date_published 2007-01-01T00:00:00Z
source MITRE
title An Introduction to Hardware-Assisted Virtual Machine (HVM) Rootkits

Linux Services Run Levels

The Linux Foundation. (2006, January 11). An introduction to services, runlevels, and rc.d scripts. Retrieved September 28, 2021.

Internal MISP references

UUID 091aa85d-7d30-4800-9b2d-97f96d257798 which can be used as unique global reference for Linux Services Run Levels in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-28T00:00:00Z
date_published 2006-01-11T00:00:00Z
source MITRE
title An introduction to services, runlevels, and rc.d scripts

Anomali Pirate Panda April 2020

Moore, S. et al. (2020, April 30). Anomali Suspects that China-Backed APT Pirate Panda May Be Seeking Access to Vietnam Government Data Center. Retrieved May 19, 2020.

Internal MISP references

UUID f1d28b91-a529-439d-9548-c597baa245d4 which can be used as unique global reference for Anomali Pirate Panda April 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-19T00:00:00Z
date_published 2020-04-30T00:00:00Z
source MITRE
title Anomali Suspects that China-Backed APT Pirate Panda May Be Seeking Access to Vietnam Government Data Center

AnonGhost Team Profile

ADL. (2015, July 6). AnonGhost Team. Retrieved October 10, 2023.

Internal MISP references

UUID f868f5fa-df66-435f-8b32-d58e4785e46c which can be used as unique global reference for AnonGhost Team Profile in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-10T00:00:00Z
date_published 2015-07-06T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title AnonGhost Team

AnonHBGary

Bright, P. (2011, February 15). Anonymous speaks: the inside story of the HBGary hack. Retrieved March 9, 2017.

Internal MISP references

UUID 19ab02ea-883f-441c-bebf-4be64855374a which can be used as unique global reference for AnonHBGary in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-09T00:00:00Z
date_published 2011-02-15T00:00:00Z
source MITRE
title Anonymous speaks: the inside story of the HBGary hack

Fortinet Metamorfo Feb 2020

Zhang, X. (2020, February 4). Another Metamorfo Variant Targeting Customers of Financial Institutions in More Countries. Retrieved July 30, 2020.

Internal MISP references

UUID e89e3825-85df-45cf-b309-e449afed0288 which can be used as unique global reference for Fortinet Metamorfo Feb 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-07-30T00:00:00Z
date_published 2020-02-04T00:00:00Z
source MITRE
title Another Metamorfo Variant Targeting Customers of Financial Institutions in More Countries

MuddyWater TrendMicro June 2018

Villanueva, M., Co, M. (2018, June 14). Another Potential MuddyWater Campaign uses Powershell-based PRB-Backdoor. Retrieved July 3, 2018.

Internal MISP references

UUID b2c415e4-edbe-47fe-9820-b968114f81f0 which can be used as unique global reference for MuddyWater TrendMicro June 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-03T00:00:00Z
date_published 2018-06-14T00:00:00Z
source MITRE
title Another Potential MuddyWater Campaign uses Powershell-based PRB-Backdoor

AlienVault Sykipot 2011

Blasco, J. (2011, December 12). Another Sykipot sample likely targeting US federal agencies. Retrieved March 28, 2016.

Internal MISP references

UUID 800363c1-60df-47e7-8ded-c0f4b6e758f4 which can be used as unique global reference for AlienVault Sykipot 2011 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-03-28T00:00:00Z
date_published 2011-12-12T00:00:00Z
source MITRE
title Another Sykipot sample likely targeting US federal agencies

RiskIQ Newegg September 2018

Klijnsma, Y. (2018, September 19). Another Victim of the Magecart Assault Emerges: Newegg. Retrieved September 9, 2020.

Internal MISP references

UUID 095a705f-810b-4c4f-90ce-016117a5b4b6 which can be used as unique global reference for RiskIQ Newegg September 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-09T00:00:00Z
date_published 2018-09-19T00:00:00Z
source MITRE
title Another Victim of the Magecart Assault Emerges: Newegg

Dell WMI Persistence

Dell SecureWorks Counter Threat Unit™ (CTU) Research Team. (2016, March 28). A Novel WMI Persistence Implementation. Retrieved March 30, 2016.

Internal MISP references

UUID a88dd548-ac8f-4297-9e23-de2643294846 which can be used as unique global reference for Dell WMI Persistence in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-03-30T00:00:00Z
date_published 2016-03-28T00:00:00Z
source MITRE
title A Novel WMI Persistence Implementation

iDefense Rootkit Overview

Chuvakin, A. (2003, February). An Overview of Rootkits. Retrieved April 6, 2018.

Internal MISP references

UUID c1aef861-9e31-42e6-a2eb-5151b056762b which can be used as unique global reference for iDefense Rootkit Overview in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-06T00:00:00Z
date_published 2003-02-01T00:00:00Z
source MITRE
title An Overview of Rootkits

Trend Micro Rhysida August 09 2023

Trend Micro Research. (2023, August 9). An Overview of the New Rhysida Ransomware Targeting the Healthcare Sector. Retrieved August 11, 2023.

Internal MISP references

UUID 71704a3a-cf48-4764-af4e-8d2096bf5012 which can be used as unique global reference for Trend Micro Rhysida August 09 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-11T00:00:00Z
date_published 2023-08-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title An Overview of the New Rhysida Ransomware Targeting the Healthcare Sector

Mandiant Ukraine Cyber Threats January 2022

Hultquist, J. (2022, January 20). Anticipating Cyber Threats as the Ukraine Crisis Escalates. Retrieved January 24, 2022.

Internal MISP references

UUID 6f53117f-2e94-4981-be61-c3da4b783ce2 which can be used as unique global reference for Mandiant Ukraine Cyber Threats January 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-24T00:00:00Z
date_published 2022-01-20T00:00:00Z
source MITRE
title Anticipating Cyber Threats as the Ukraine Crisis Escalates

Microsoft AMSI

Microsoft. (2019, April 19). Antimalware Scan Interface (AMSI). Retrieved September 28, 2021.

Internal MISP references

UUID 32a4b7b5-8560-4600-aba9-15a6342b4dc3 which can be used as unique global reference for Microsoft AMSI in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-28T00:00:00Z
date_published 2019-04-19T00:00:00Z
source MITRE
title Antimalware Scan Interface (AMSI)

Microsoft Anti Spoofing

Microsoft. (2020, October 13). Anti-spoofing protection in EOP. Retrieved October 19, 2020.

Internal MISP references

UUID b3ac28ac-3f98-40fd-b1da-2461a9e3ffca which can be used as unique global reference for Microsoft Anti Spoofing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
date_published 2020-10-13T00:00:00Z
source MITRE
title Anti-spoofing protection in EOP

Fox-It Anunak Feb 2015

Prins, R. (2015, February 16). Anunak (aka Carbanak) Update. Retrieved January 20, 2017.

Internal MISP references

UUID d74a8d0b-887a-40b9-bd43-366764157990 which can be used as unique global reference for Fox-It Anunak Feb 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-01-20T00:00:00Z
date_published 2015-02-16T00:00:00Z
source MITRE
title Anunak (aka Carbanak) Update

Group-IB Anunak

Group-IB and Fox-IT. (2014, December). Anunak: APT against financial institutions. Retrieved April 20, 2016.

Internal MISP references

UUID fd254ecc-a076-4b9f-97f2-acb73c6a1695 which can be used as unique global reference for Group-IB Anunak in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-20T00:00:00Z
date_published 2014-12-01T00:00:00Z
source MITRE
title Anunak: APT against financial institutions

Google TAG Ukraine Threat Landscape March 2022

Huntley, S. (2022, March 7). An update on the threat landscape. Retrieved March 16, 2022.

Internal MISP references

UUID a6070f95-fbee-472e-a737-a8adbedbb4f8 which can be used as unique global reference for Google TAG Ukraine Threat Landscape March 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-16T00:00:00Z
date_published 2022-03-07T00:00:00Z
source MITRE
title An update on the threat landscape

Zairon Hooking Dec 2006

Felici, M. (2006, December 6). Any application-defined hook procedure on my machine?. Retrieved December 12, 2017.

Internal MISP references

UUID e816127a-04e4-4145-a784-50b1215612f2 which can be used as unique global reference for Zairon Hooking Dec 2006 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-12T00:00:00Z
date_published 2006-12-06T00:00:00Z
source MITRE
title Any application-defined hook procedure on my machine?

SentinelOne Aoqin Dragon June 2022

Chen, Joey. (2022, June 9). Aoqin Dragon | Newly-Discovered Chinese-linked APT Has Been Quietly Spying On Organizations For 10 Years. Retrieved July 14, 2022.

Internal MISP references

UUID b4e792e0-b1fa-4639-98b1-233aaec53594 which can be used as unique global reference for SentinelOne Aoqin Dragon June 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-14T00:00:00Z
date_published 2022-06-09T00:00:00Z
source MITRE
title Aoqin Dragon

Apache Server 2018

Apache. (n.d.). Apache HTTP Server Version 2.4 Documentation - Web Site Content. Retrieved July 27, 2018.

Internal MISP references

UUID 46f62435-bfb3-44b6-8c79-54af584cc35f which can be used as unique global reference for Apache Server 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-27T00:00:00Z
source MITRE
title Apache HTTP Server Version 2.4 Documentation - Web Site Content

Secureworks BRONZEUNION Feb 2019

Counter Threat Unit Research Team. (2019, February 27). A Peek into BRONZE UNION’s Toolbox. Retrieved September 24, 2019.

Internal MISP references

UUID 691df278-fd7d-4b73-a22c-227bc7641dec which can be used as unique global reference for Secureworks BRONZEUNION Feb 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-24T00:00:00Z
date_published 2019-02-27T00:00:00Z
source MITRE
title A Peek into BRONZE UNION’s Toolbox

AppArmor official

AppArmor. (2017, October 19). AppArmor Security Project Wiki. Retrieved December 20, 2017.

Internal MISP references

UUID 12df02e3-bbdd-4682-9662-1810402ad918 which can be used as unique global reference for AppArmor official in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-20T00:00:00Z
date_published 2017-10-19T00:00:00Z
source MITRE
title AppArmor Security Project Wiki

PenTestLabs AppDomainManagerInject

Administrator. (2020, May 26). APPDOMAINMANAGER INJECTION AND DETECTION. Retrieved March 28, 2024.

Internal MISP references

UUID f681fd40-5bfc-50c6-a654-f9a128af5ff1 which can be used as unique global reference for PenTestLabs AppDomainManagerInject in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-28T00:00:00Z
date_published 2020-05-26T00:00:00Z
source MITRE
title APPDOMAINMANAGER INJECTION AND DETECTION

Rapid7 AppDomain Manager Injection

Spagnola, N. (2023, May 5). AppDomain Manager Injection: New Techniques For Red Teams. Retrieved March 29, 2024.

Internal MISP references

UUID 881f8d23-908f-58cf-904d-5ef7b959eb39 which can be used as unique global reference for Rapid7 AppDomain Manager Injection in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-29T00:00:00Z
date_published 2023-05-05T00:00:00Z
source MITRE
title AppDomain Manager Injection: New Techniques For Red Teams

Mandiant APT1 Appendix

Mandiant. (n.d.). Appendix C (Digital) - The Malware Arsenal. Retrieved July 18, 2016.

Internal MISP references

UUID 1f31c09c-6a93-4142-8333-154138c1d70a which can be used as unique global reference for Mandiant APT1 Appendix in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-07-18T00:00:00Z
source MITRE
title Appendix C (Digital) - The Malware Arsenal

AppInit Secure Boot

Microsoft. (n.d.). AppInit DLLs and Secure Boot. Retrieved July 15, 2015.

Internal MISP references

UUID 2b951be3-5105-4665-972f-7809c057fd3f which can be used as unique global reference for AppInit Secure Boot in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-07-15T00:00:00Z
source MITRE
title AppInit DLLs and Secure Boot

AppInstaller.exe - LOLBAS Project

LOLBAS. (2020, December 2). AppInstaller.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 9a777e7c-e76c-465c-8b45-67503e715f7e which can be used as unique global reference for AppInstaller.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2020-12-02T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title AppInstaller.exe

objectivesee osx.shlayer apple approved 2020

Patrick Wardle. (2020, August 30). Apple Approved Malware malicious code ...now notarized!? #2020. Retrieved September 13, 2021.

Internal MISP references

UUID a2127d3d-c320-4637-a85c-16e20c2654f6 which can be used as unique global reference for objectivesee osx.shlayer apple approved 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-13T00:00:00Z
date_published 2020-08-30T00:00:00Z
source MITRE
title Apple Approved Malware malicious code ...now notarized!? #2020

AppleDocs AuthorizationExecuteWithPrivileges

Apple. (n.d.). Apple Developer Documentation - AuthorizationExecuteWithPrivileges. Retrieved August 8, 2019.

Internal MISP references

UUID 7b8875e8-5b93-4d49-a12b-2683bab2ba6e which can be used as unique global reference for AppleDocs AuthorizationExecuteWithPrivileges in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-08-08T00:00:00Z
source MITRE
title Apple Developer Documentation - AuthorizationExecuteWithPrivileges

AppleDocs Scheduling Timed Jobs

Apple. (n.d.). Retrieved July 17, 2017.

Internal MISP references

UUID 66dd8a7d-521f-4610-b478-52d748185ad3 which can be used as unique global reference for AppleDocs Scheduling Timed Jobs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-17T00:00:00Z
source MITRE
title AppleDocs Scheduling Timed Jobs

CISA AppleJeus Feb 2021

Cybersecurity and Infrastructure Security Agency. (2021, February 21). AppleJeus: Analysis of North Korea’s Cryptocurrency Malware. Retrieved March 1, 2021.

Internal MISP references

UUID 6873e14d-eba4-4e3c-9ccf-cec1d760f0be which can be used as unique global reference for CISA AppleJeus Feb 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-01T00:00:00Z
date_published 2021-02-21T00:00:00Z
source MITRE
title AppleJeus: Analysis of North Korea’s Cryptocurrency Malware

Apple Remote Desktop Admin Guide 3.3

Apple. (n.d.). Apple Remote Desktop Administrator Guide Version 3.3. Retrieved October 5, 2021.

Internal MISP references

UUID c57c2bba-a398-4e68-b2a7-fddcf0740b61 which can be used as unique global reference for Apple Remote Desktop Admin Guide 3.3 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-05T00:00:00Z
source MITRE
title Apple Remote Desktop Administrator Guide Version 3.3

applescript signing

Steven Sande. (2013, December 23). AppleScript and Automator gain new features in OS X Mavericks. Retrieved September 21, 2018.

Internal MISP references

UUID dd76c7ab-c3df-4f34-aaf0-684b56499065 which can be used as unique global reference for applescript signing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-09-21T00:00:00Z
date_published 2013-12-23T00:00:00Z
source MITRE
title AppleScript and Automator gain new features in OS X Mavericks

Microsoft Entra ID Service Principals

Microsoft. (2023, December 15). Application and service principal objects in Microsoft Entra ID. Retrieved February 28, 2024.

Internal MISP references

UUID 2a20c574-3e69-5da6-887e-68e34cee7562 which can be used as unique global reference for Microsoft Entra ID Service Principals in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-28T00:00:00Z
date_published 2023-12-15T00:00:00Z
source MITRE
title Application and service principal objects in Microsoft Entra ID

Microsoft App Domains

Microsoft. (2021, September 15). Application domains. Retrieved March 28, 2024.

Internal MISP references

UUID 268e7ade-c0a8-5859-8b16-6fa8aa3b0cb7 which can be used as unique global reference for Microsoft App Domains in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-28T00:00:00Z
date_published 2021-09-15T00:00:00Z
source MITRE
title Application domains

Corio 2008

Corio, C., & Sayana, D. P. (2008, June). Application Lockdown with Software Restriction Policies. Retrieved November 18, 2014.

Internal MISP references

UUID cae409ca-1c77-45df-88cd-c0998ac724ec which can be used as unique global reference for Corio 2008 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-18T00:00:00Z
date_published 2008-06-01T00:00:00Z
source MITRE
title Application Lockdown with Software Restriction Policies

Microsoft Application Lockdown

Corio, C., & Sayana, D. P.. (2008, June). Application Lockdown with Software Restriction Policies. Retrieved November 18, 2014.

Internal MISP references

UUID 5dab4466-0871-486a-84ad-0e648b2e937d which can be used as unique global reference for Microsoft Application Lockdown in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-18T00:00:00Z
date_published 2008-06-01T00:00:00Z
source MITRE
title Application Lockdown with Software Restriction Policies

SANS Application Whitelisting

Beechey, J.. (2014, November 18). Application Whitelisting: Panacea or Propaganda?. Retrieved November 18, 2014.

Internal MISP references

UUID a333f45f-1760-443a-9208-f3682ea32f67 which can be used as unique global reference for SANS Application Whitelisting in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-18T00:00:00Z
date_published 2014-11-18T00:00:00Z
source MITRE
title Application Whitelisting: Panacea or Propaganda?

Beechey 2010

Beechey, J. (2010, December). Application Whitelisting: Panacea or Propaganda?. Retrieved November 18, 2014.

Internal MISP references

UUID 4994e065-c6e4-4b41-8ae3-d72023135429 which can be used as unique global reference for Beechey 2010 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-18T00:00:00Z
date_published 2010-12-01T00:00:00Z
source MITRE
title Application Whitelisting: Panacea or Propaganda?

NSA MS AppLocker

NSA Information Assurance Directorate. (2014, August). Application Whitelisting Using Microsoft AppLocker. Retrieved March 31, 2016.

Internal MISP references

UUID 0db5c3ea-5392-4fd3-9f1d-9fa69aba4259 which can be used as unique global reference for NSA MS AppLocker in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-03-31T00:00:00Z
date_published 2014-08-01T00:00:00Z
source MITRE
title Application Whitelisting Using Microsoft AppLocker

Penetration Testing Lab MSXSL July 2017

netbiosX. (2017, July 6). AppLocker Bypass – MSXSL. Retrieved July 3, 2018.

Internal MISP references

UUID 2f1adf20-a4b8-48c1-861f-0a44271765d7 which can be used as unique global reference for Penetration Testing Lab MSXSL July 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-03T00:00:00Z
date_published 2017-07-06T00:00:00Z
source MITRE
title AppLocker Bypass – MSXSL

Burke/CISA ClickOnce Paper

William J. Burke IV. (n.d.). Appref-ms Abuse for Code Execution & C2. Retrieved September 9, 2024.

Internal MISP references

UUID 1bb14130-f819-5666-ab57-8f96fd4e7b05 which can be used as unique global reference for Burke/CISA ClickOnce Paper in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-09T00:00:00Z
source MITRE
title Appref-ms Abuse for Code Execution & C2

Microsoft Requests for Azure AD Roles in Privileged Identity Management

Microsoft. (2023, January 30). Approve or deny requests for Azure AD roles in Privileged Identity Management. Retrieved February 21, 2023.

Internal MISP references

UUID 1495effe-16a6-5b4e-9b50-1d1f7db48fa7 which can be used as unique global reference for Microsoft Requests for Azure AD Roles in Privileged Identity Management in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-21T00:00:00Z
date_published 2023-01-30T00:00:00Z
source MITRE
title Approve or deny requests for Azure AD roles in Privileged Identity Management

Apple App Security Overview

Apple Inc. (2021, February 18). App security overview. Retrieved October 12, 2021.

Internal MISP references

UUID 3b1e9a5d-7940-43b5-bc11-3112c0762740 which can be used as unique global reference for Apple App Security Overview in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-12T00:00:00Z
date_published 2021-02-18T00:00:00Z
source MITRE
title App security overview

Tripwire AppUNBlocker

Smith, T. (2016, October 27). AppUNBlocker: Bypassing AppLocker. Retrieved December 19, 2017.

Internal MISP references

UUID 2afb9a5f-c023-49df-90d1-e0ffb6d192f3 which can be used as unique global reference for Tripwire AppUNBlocker in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-19T00:00:00Z
date_published 2016-10-27T00:00:00Z
source MITRE
title AppUNBlocker: Bypassing AppLocker

Appvlp.exe - LOLBAS Project

LOLBAS. (2018, May 25). Appvlp.exe. Retrieved December 4, 2023.

Internal MISP references

UUID b0afe3e8-9f1d-4295-8811-8dfbe993c337 which can be used as unique global reference for Appvlp.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Appvlp.exe

BlackHat Atkinson Winchester Token Manipulation

Atkinson, J., Winchester, R. (2017, December 7). A Process is No One: Hunting for Token Manipulation. Retrieved December 21, 2017.

Internal MISP references

UUID 2eaee06d-529d-4fe0-9ca3-c62419f47a90 which can be used as unique global reference for BlackHat Atkinson Winchester Token Manipulation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-21T00:00:00Z
date_published 2017-12-07T00:00:00Z
source MITRE
title A Process is No One: Hunting for Token Manipulation

FireEye APT10 April 2017

FireEye iSIGHT Intelligence. (2017, April 6). APT10 (MenuPass Group): New Tools, Global Campaign Latest Manifestation of Longstanding Threat. Retrieved June 29, 2017.

Internal MISP references

UUID 2d494df8-83e3-45d2-b798-4c3bcf55f675 which can be used as unique global reference for FireEye APT10 April 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-06-29T00:00:00Z
date_published 2017-04-06T00:00:00Z
source MITRE
title APT10 (MenuPass Group): New Tools, Global Campaign Latest Manifestation of Longstanding Threat

Securelist APT10 March 2021

GREAT. (2021, March 30). APT10: sophisticated multi-layered loader Ecipekac discovered in A41APT campaign. Retrieved June 17, 2021.

Internal MISP references

UUID 90450a1e-59c3-491f-b842-2cf81023fc9e which can be used as unique global reference for Securelist APT10 March 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-17T00:00:00Z
date_published 2021-03-30T00:00:00Z
source MITRE
title APT10: sophisticated multi-layered loader Ecipekac discovered in A41APT campaign

FireEye APT10 Sept 2018

Matsuda, A., Muhammad I. (2018, September 13). APT10 Targeting Japanese Corporations Using Updated TTPs. Retrieved September 17, 2018.

Internal MISP references

UUID 5f122a27-2137-4016-a482-d04106187594 which can be used as unique global reference for FireEye APT10 Sept 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-09-17T00:00:00Z
date_published 2018-09-13T00:00:00Z
source MITRE
title APT10 Targeting Japanese Corporations Using Updated TTPs

NCC Group APT15 Alive and Strong

Smallridge, R. (2018, March 10). APT15 is alive and strong: An analysis of RoyalCli and RoyalDNS. Retrieved April 4, 2018.

Internal MISP references

UUID 02a50445-de06-40ab-9ea4-da5c37e066cd which can be used as unique global reference for NCC Group APT15 Alive and Strong in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-04T00:00:00Z
date_published 2018-03-10T00:00:00Z
source MITRE
title APT15 is alive and strong: An analysis of RoyalCli and RoyalDNS

Mandiant APT1

Mandiant. (n.d.). APT1 Exposing One of China’s Cyber Espionage Units. Retrieved July 18, 2016.

Internal MISP references

UUID 865eba93-cf6a-4e41-bc09-de9b0b3c2669 which can be used as unique global reference for Mandiant APT1 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-07-18T00:00:00Z
source MITRE, Tidal Cyber
title APT1 Exposing One of China’s Cyber Espionage Units

Profero APT27 December 2020

Global Threat Center, Intelligence Team. (2020, December). APT27 Turns to Ransomware. Retrieved November 12, 2021.

Internal MISP references

UUID 0290ea31-f817-471e-85ae-c3855c63f5c3 which can be used as unique global reference for Profero APT27 December 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-11-12T00:00:00Z
date_published 2020-12-01T00:00:00Z
source MITRE
title APT27 Turns to Ransomware

FireEye APT28 January 2017

FireEye iSIGHT Intelligence. (2017, January 11). APT28: At the Center of the Storm. Retrieved January 11, 2017.

Internal MISP references

UUID 61d80b8f-5bdb-41e6-b59a-d2d996392873 which can be used as unique global reference for FireEye APT28 January 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-01-11T00:00:00Z
date_published 2017-01-11T00:00:00Z
source MITRE, Tidal Cyber
title APT28: At the Center of the Storm

FireEye APT28

FireEye. (2015). APT28: A WINDOW INTO RUSSIA’S CYBER ESPIONAGE OPERATIONS?. Retrieved August 19, 2015.

Internal MISP references

UUID c423b2b2-25a3-4a8d-b89a-83ab07c0cd20 which can be used as unique global reference for FireEye APT28 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-08-19T00:00:00Z
date_published 2015-01-01T00:00:00Z
source MITRE, Tidal Cyber
title APT28: A WINDOW INTO RUSSIA’S CYBER ESPIONAGE OPERATIONS?

U.S. CISA APT28 Cisco Routers April 18 2023

Cybersecurity and Infrastructure Security Agency. (2023, April 18). APT28 Exploits Known Vulnerability to Carry Out Reconnaissance and Deploy Malware on Cisco Routers. Retrieved August 23, 2023.

Internal MISP references

UUID c532a6fc-b27f-4240-a071-3eaa866bce89 which can be used as unique global reference for U.S. CISA APT28 Cisco Routers April 18 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-23T00:00:00Z
date_published 2023-04-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title APT28 Exploits Known Vulnerability to Carry Out Reconnaissance and Deploy Malware on Cisco Routers

Symantec APT28 Oct 2018

Symantec Security Response. (2018, October 04). APT28: New Espionage Operations Target Military and Government Organizations. Retrieved November 14, 2018.

Internal MISP references

UUID 777bc94a-6c21-4f8c-9efa-a1cf52ececc0 which can be used as unique global reference for Symantec APT28 Oct 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-14T00:00:00Z
date_published 2018-10-04T00:00:00Z
source MITRE
title APT28: New Espionage Operations Target Military and Government Organizations

FireEye APT28 Hospitality Aug 2017

Smith, L. and Read, B.. (2017, August 11). APT28 Targets Hospitality Sector, Presents Threat to Travelers. Retrieved August 17, 2017.

Internal MISP references

UUID 7887dc90-3f05-411a-81ea-b86aa392104b which can be used as unique global reference for FireEye APT28 Hospitality Aug 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-08-17T00:00:00Z
date_published 2017-08-11T00:00:00Z
source MITRE
title APT28 Targets Hospitality Sector, Presents Threat to Travelers

Bitdefender APT28 Dec 2015

Bitdefender. (2015, December). APT28 Under the Scope. Retrieved February 23, 2017.

Internal MISP references

UUID 3dd67aae-7feb-4b07-a985-ccadc1b16f1d which can be used as unique global reference for Bitdefender APT28 Dec 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-02-23T00:00:00Z
date_published 2015-12-01T00:00:00Z
source MITRE
title APT28 Under the Scope

FireEye APT29 Domain Fronting With TOR March 2017

Matthew Dunwoody. (2017, March 27). APT29 Domain Fronting With TOR. Retrieved November 20, 2017.

Internal MISP references

UUID 1d919991-bc87-41bf-9e58-edf1b3806bb8 which can be used as unique global reference for FireEye APT29 Domain Fronting With TOR March 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-20T00:00:00Z
date_published 2017-03-27T00:00:00Z
source MITRE
title APT29 Domain Fronting With TOR

FireEye APT29 Domain Fronting

Dunwoody, M. (2017, March 27). APT29 Domain Fronting With TOR. Retrieved March 27, 2017.

Internal MISP references

UUID 3e013b07-deaf-4387-acd7-2d0565d196a9 which can be used as unique global reference for FireEye APT29 Domain Fronting in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-27T00:00:00Z
date_published 2017-03-27T00:00:00Z
source MITRE
title APT29 Domain Fronting With TOR

FireEye APT30

FireEye Labs. (2015, April). APT30 AND THE MECHANICS OF A LONG-RUNNING CYBER ESPIONAGE OPERATION. Retrieved May 1, 2015.

Internal MISP references

UUID c48d2084-61cf-4e86-8072-01e5d2de8416 which can be used as unique global reference for FireEye APT30 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-05-01T00:00:00Z
date_published 2015-04-01T00:00:00Z
source MITRE, Tidal Cyber
title APT30 AND THE MECHANICS OF A LONG-RUNNING CYBER ESPIONAGE OPERATION

Zscaler APT31 Covid-19 October 2020

Singh, S. and Antil, S. (2020, October 27). APT-31 Leverages COVID-19 Vaccine Theme and Abuses Legitimate Online Services. Retrieved March 24, 2021.

Internal MISP references

UUID 1647c9a6-e475-4a9a-a202-0133dbeef9a0 which can be used as unique global reference for Zscaler APT31 Covid-19 October 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-24T00:00:00Z
date_published 2020-10-27T00:00:00Z
source MITRE
title APT-31 Leverages COVID-19 Vaccine Theme and Abuses Legitimate Online Services

sentinelone apt32 macOS backdoor 2020

Phil Stokes. (2020, December 2). APT32 Multi-stage macOS Trojan Innovates on Crimeware Scripting Technique. Retrieved September 13, 2021.

Internal MISP references

UUID d31dcbe6-06ec-475e-b121-fd25a93c3ef7 which can be used as unique global reference for sentinelone apt32 macOS backdoor 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-13T00:00:00Z
date_published 2020-12-02T00:00:00Z
source MITRE
title APT32 Multi-stage macOS Trojan Innovates on Crimeware Scripting Technique

FireEye APT33 Webinar Sept 2017

Davis, S. and Carr, N. (2017, September 21). APT33: New Insights into Iranian Cyber Espionage Group. Retrieved February 15, 2018.

Internal MISP references

UUID 9b378592-5737-403d-8a07-27077f5b2d61 which can be used as unique global reference for FireEye APT33 Webinar Sept 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-15T00:00:00Z
date_published 2017-09-21T00:00:00Z
source MITRE
title APT33: New Insights into Iranian Cyber Espionage Group

FireEye APT34 Webinar Dec 2017

Davis, S. and Caban, D. (2017, December 19). APT34 - New Targeted Attack in the Middle East. Retrieved December 20, 2017.

Internal MISP references

UUID 4eef7032-de14-44a2-a403-82aefdc85c50 which can be used as unique global reference for FireEye APT34 Webinar Dec 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-20T00:00:00Z
date_published 2017-12-19T00:00:00Z
source MITRE
title APT34 - New Targeted Attack in the Middle East

DFIR Report APT35 ProxyShell March 2022

DFIR Report. (2022, March 21). APT35 Automates Initial Access Using ProxyShell. Retrieved May 25, 2022.

Internal MISP references

UUID 1837e917-d80b-4632-a1ca-c70d4b712ac7 which can be used as unique global reference for DFIR Report APT35 ProxyShell March 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-25T00:00:00Z
date_published 2022-03-21T00:00:00Z
source MITRE
title APT35 Automates Initial Access Using ProxyShell

Check Point APT35 CharmPower January 2022

Check Point. (2022, January 11). APT35 exploits Log4j vulnerability to distribute new modular PowerShell toolkit. Retrieved January 24, 2022.

Internal MISP references

UUID 81dce660-93ea-42a4-902f-0c6021d30f59 which can be used as unique global reference for Check Point APT35 CharmPower January 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-24T00:00:00Z
date_published 2022-01-11T00:00:00Z
source MITRE
title APT35 exploits Log4j vulnerability to distribute new modular PowerShell toolkit

FireEye APT37 Feb 2018

FireEye. (2018, February 20). APT37 (Reaper): The Overlooked North Korean Actor. Retrieved March 1, 2018.

Internal MISP references

UUID 4d575c1a-4ff9-49ce-97cd-f9d0637c2271 which can be used as unique global reference for FireEye APT37 Feb 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-01T00:00:00Z
date_published 2018-02-20T00:00:00Z
source MITRE, Tidal Cyber
title APT37 (Reaper): The Overlooked North Korean Actor

FireEye APT38 Oct 2018

FireEye. (2018, October 03). APT38: Un-usual Suspects. Retrieved November 6, 2018.

Internal MISP references

UUID 7c916329-af56-4723-820c-ef932a6e3409 which can be used as unique global reference for FireEye APT38 Oct 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-06T00:00:00Z
date_published 2018-10-03T00:00:00Z
source MITRE, Tidal Cyber
title APT38: Un-usual Suspects

FireEye APT39 Jan 2019

Hawley et al. (2019, January 29). APT39: An Iranian Cyber Espionage Group Focused on Personal Information. Retrieved February 19, 2019.

Internal MISP references

UUID ba366cfc-cc04-41a5-903b-a7bb73136bc3 which can be used as unique global reference for FireEye APT39 Jan 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-19T00:00:00Z
date_published 2019-01-29T00:00:00Z
source MITRE
title APT39: An Iranian Cyber Espionage Group Focused on Personal Information

APT3 Adversary Emulation Plan

Korban, C, et al. (2017, September). APT3 Adversary Emulation Plan. Retrieved January 16, 2018.

Internal MISP references

UUID 64c01921-c33f-402e-b30d-a2ba26583a24 which can be used as unique global reference for APT3 Adversary Emulation Plan in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-16T00:00:00Z
date_published 2017-09-01T00:00:00Z
source MITRE
title APT3 Adversary Emulation Plan

evolution of pirpi

Yates, M. (2017, June 18). APT3 Uncovered: The code evolution of Pirpi. Retrieved September 28, 2017.

Internal MISP references

UUID 9c8bd493-bf08-431b-9d53-29eb14a6eef5 which can be used as unique global reference for evolution of pirpi in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-09-28T00:00:00Z
date_published 2017-06-18T00:00:00Z
source MITRE
title APT3 Uncovered: The code evolution of Pirpi

FireEye APT40 March 2019

Plan, F., et al. (2019, March 4). APT40: Examining a China-Nexus Espionage Actor. Retrieved March 18, 2019.

Internal MISP references

UUID 8a44368f-3348-4817-aca7-81bfaca5ae6d which can be used as unique global reference for FireEye APT40 March 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-18T00:00:00Z
date_published 2019-03-04T00:00:00Z
source MITRE
title APT40: Examining a China-Nexus Espionage Actor

apt41_mandiant

Mandiant. (n.d.). APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION. Retrieved June 11, 2024.

Internal MISP references

UUID 599f4411-6829-5a2d-865c-ac59e80afe83 which can be used as unique global reference for apt41_mandiant in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-11T00:00:00Z
source MITRE
title APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION

Mandiant APT41 July 18 2024

Mike Stokkel, Pierre Gerlings, Renato Fontana, Luis Rocha, Jared Wilson, Stephen Eckels, Jonathan Lepore. (2024, July 18). APT41 Has Arisen From the DUST. Retrieved August 2, 2024.

Internal MISP references

UUID 34ee3a7c-27c0-492f-a3c6-a5a3e86915f0 which can be used as unique global reference for Mandiant APT41 July 18 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-02T00:00:00Z
date_published 2024-07-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title APT41 Has Arisen From the DUST

Google Cloud APT41 2024

Mike Stokkel et al. (2024, July 18). APT41 Has Arisen From the DUST. Retrieved September 16, 2024.

Internal MISP references

UUID 33bb9f8a-db9d-5dda-b4ae-2ba7fee0a0ae which can be used as unique global reference for Google Cloud APT41 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-16T00:00:00Z
date_published 2024-07-18T00:00:00Z
source MITRE
title APT41 Has Arisen From the DUST

apt41_dcsocytec_dec2022

DCSO CyTec Blog. (2022, December 24). APT41 — The spy who failed to encrypt me. Retrieved June 13, 2024.

Internal MISP references

UUID fad90e96-93fd-59bd-970e-f0b37cac331d which can be used as unique global reference for apt41_dcsocytec_dec2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-13T00:00:00Z
date_published 2022-12-24T00:00:00Z
source MITRE
title APT41 — The spy who failed to encrypt me

Rostovcev APT41 2021

Nikita Rostovcev. (2022, August 18). APT41 World Tour 2021 on a tight schedule. Retrieved February 22, 2024.

Internal MISP references

UUID b6e7fb29-7935-5454-8fb2-37585c46324a which can be used as unique global reference for Rostovcev APT41 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-22T00:00:00Z
date_published 2022-08-18T00:00:00Z
source MITRE
title APT41 World Tour 2021 on a tight schedule

Mandiant APT42

Mandiant. (n.d.). APT42: Crooked Charms, Cons and Compromise. Retrieved September 16, 2022.

Internal MISP references

UUID 10b3e476-a0c5-41fd-8cb8-5bfb245b118f which can be used as unique global reference for Mandiant APT42 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-16T00:00:00Z
source MITRE
title APT42: Crooked Charms, Cons and Compromise

Mandiant Crooked Charms August 12 2022

Mandiant. (2022, August 12). APT42: Crooked Charms, Cons and Compromises. Retrieved August 30, 2024.

Internal MISP references

UUID 53bab956-be5b-4d8d-b553-9926bc5d9fee which can be used as unique global reference for Mandiant Crooked Charms August 12 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-30T00:00:00Z
date_published 2022-08-12T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title APT42: Crooked Charms, Cons and Compromises

Mandiant APT43 March 2024

Mandiant. (2024, March 14). APT43: North Korean Group Uses Cybercrime to Fund Espionage Operations. Retrieved May 3, 2024.

Internal MISP references

UUID 8ac3fd0a-4a93-5262-9ac2-f676c5d11fda which can be used as unique global reference for Mandiant APT43 March 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-03T00:00:00Z
date_published 2024-03-14T00:00:00Z
source MITRE
title APT43: North Korean Group Uses Cybercrime to Fund Espionage Operations

mandiant_apt44_unearthing_sandworm

Roncone, G. et al. (n.d.). APT44: Unearthing Sandworm. Retrieved July 11, 2024.

Internal MISP references

UUID cc03d668-e4d9-5dc1-b365-203db84938f2 which can be used as unique global reference for mandiant_apt44_unearthing_sandworm in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-11T00:00:00Z
source MITRE
title APT44: Unearthing Sandworm

Mandiant APT45 July 25 2024

Taylor Long, Jeff Johnson, Alice Revelli, Fred Plan, Michael Barnhart. (2024, July 25). APT45: North Korea’s Digital Military Machine. Retrieved July 26, 2024.

Internal MISP references

UUID a9673491-7493-4b85-b5fc-595e91bc7fdc which can be used as unique global reference for Mandiant APT45 July 25 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-26T00:00:00Z
date_published 2024-07-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title APT45: North Korea’s Digital Military Machine

NSA APT5 Citrix Threat Hunting December 2022

National Security Agency. (2022, December). APT5: Citrix ADC Threat Hunting Guidance. Retrieved February 5, 2024.

Internal MISP references

UUID 916e2137-46e6-53c2-a917-5b5b5c4bae3a which can be used as unique global reference for NSA APT5 Citrix Threat Hunting December 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-05T00:00:00Z
date_published 2022-12-01T00:00:00Z
source MITRE
title APT5: Citrix ADC Threat Hunting Guidance

welivesecurity_apt-c-23

Stefanko, L. (2020, September 30). APT‑C‑23 group evolves its Android spyware. Retrieved March 4, 2024.

Internal MISP references

UUID 7196226e-7d0d-5e14-a4e3-9b6322537039 which can be used as unique global reference for welivesecurity_apt-c-23 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-04T00:00:00Z
date_published 2020-09-30T00:00:00Z
source MITRE
title APT‑C‑23 group evolves its Android spyware

QiAnXin APT-C-36 Feb2019

QiAnXin Threat Intelligence Center. (2019, February 18). APT-C-36: Continuous Attacks Targeting Colombian Government Institutions and Corporations. Retrieved May 5, 2020.

Internal MISP references

UUID cae075ea-42cb-4695-ac66-9187241393d1 which can be used as unique global reference for QiAnXin APT-C-36 Feb2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-05T00:00:00Z
date_published 2019-02-18T00:00:00Z
source MITRE, Tidal Cyber
title APT-C-36: Continuous Attacks Targeting Colombian Government Institutions and Corporations

360 Machete Sep 2020

kate. (2020, September 25). APT-C-43 steals Venezuelan military secrets to provide intelligence support for the reactionaries — HpReact campaign. Retrieved November 20, 2020.

Internal MISP references

UUID 682c843d-1bb8-4f30-9d2e-35e8d41b1976 which can be used as unique global reference for 360 Machete Sep 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-20T00:00:00Z
date_published 2020-09-25T00:00:00Z
source MITRE, Tidal Cyber
title APT-C-43 steals Venezuelan military secrets to provide intelligence support for the reactionaries — HpReact campaign

Cycraft Chimera April 2020

Cycraft. (2020, April 15). APT Group Chimera - APT Operation Skeleton key Targets Taiwan Semiconductor Vendors. Retrieved August 24, 2020..

Internal MISP references

UUID a5a14a4e-2214-44ab-9067-75429409d744 which can be used as unique global reference for Cycraft Chimera April 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-24T00:00:00Z
date_published 2020-04-15T00:00:00Z
source MITRE
title APT Group Chimera - APT Operation Skeleton key Targets Taiwan Semiconductor Vendors

CISA IT Service Providers

CISA. (n.d.). APTs Targeting IT Service Provider Customers. Retrieved November 16, 2020.

Internal MISP references

UUID b8bee7f9-155e-4765-9492-01182e4435b7 which can be used as unique global reference for CISA IT Service Providers in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-16T00:00:00Z
source MITRE
title APTs Targeting IT Service Provider Customers

Securelist GCMAN

Kaspersky Lab's Global Research & Analysis Team. (2016, February 8). APT-style bank robberies increase with Metel, GCMAN and Carbanak 2.0 attacks. Retrieved April 20, 2016.

Internal MISP references

UUID 1f07f234-50f0-4c1e-942a-a01d3f733161 which can be used as unique global reference for Securelist GCMAN in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-20T00:00:00Z
date_published 2016-02-08T00:00:00Z
source MITRE, Tidal Cyber
title APT-style bank robberies increase with Metel, GCMAN and Carbanak 2.0 attacks

Proofpoint TA459 April 2017

Axel F. (2017, April 27). APT Targets Financial Analysts with CVE-2017-0199. Retrieved February 15, 2018.

Internal MISP references

UUID dabad6df-1e31-4c16-9217-e079f2493b02 which can be used as unique global reference for Proofpoint TA459 April 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-15T00:00:00Z
date_published 2017-04-27T00:00:00Z
source MITRE, Tidal Cyber
title APT Targets Financial Analysts with CVE-2017-0199

Kaspersky ToddyCat June 2022

Dedola, G. (2022, June 21). APT ToddyCat. Retrieved January 3, 2024.

Internal MISP references

UUID 285c038b-e5fc-57ef-9a98-d9e24c52e2cf which can be used as unique global reference for Kaspersky ToddyCat June 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-03T00:00:00Z
date_published 2022-06-21T00:00:00Z
source MITRE
title APT ToddyCat

Global Research and Analysis Team . (2018, April 12). APT Trends report Q1 2018. Retrieved January 27, 2021.

Internal MISP references

UUID 587f5195-e696-4a3c-8c85-90b9c002cd11 which can be used as unique global reference for Securelist APT Trends April 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-27T00:00:00Z
date_published 2018-04-12T00:00:00Z
source MITRE
title APT Trends report Q1 2018

Global Research and Analysis Team. (2020, April 30). APT trends report Q1 2020. Retrieved September 19, 2022.

Internal MISP references

UUID 23c91719-5ebe-4d03-8018-df1809fffd2f which can be used as unique global reference for Kaspersky APT Trends Q1 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-19T00:00:00Z
date_published 2020-04-30T00:00:00Z
source MITRE
title APT trends report Q1 2020

GReAT . (2021, April 27). APT trends report Q1 2021. Retrieved June 6, 2022.

Internal MISP references

UUID 3fd0ba3b-7919-46d3-a444-50508603956f which can be used as unique global reference for Kaspersky APT Trends Q1 April 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-06T00:00:00Z
date_published 2021-04-27T00:00:00Z
source MITRE
title APT trends report Q1 2021

Kaspersky Lab's Global Research & Analysis Team. (2017, August 8). APT Trends report Q2 2017. Retrieved February 15, 2018.

Internal MISP references

UUID fe28042c-d289-463f-9ece-1a75a70b966e which can be used as unique global reference for Securelist APT Trends Q2 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-15T00:00:00Z
date_published 2017-08-08T00:00:00Z
source MITRE
title APT Trends report Q2 2017

Wired ArcaneDoor April 24 2024

Andy Greenberg. (2024, April 24). ‘ArcaneDoor’ Cyberspies Hacked Cisco Firewalls to Access Government Networks. Retrieved May 6, 2024.

Internal MISP references

UUID 05a8afd3-0173-41ca-b23b-196ea0f3b1c1 which can be used as unique global reference for Wired ArcaneDoor April 24 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-06T00:00:00Z
date_published 2024-04-24T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title ‘ArcaneDoor’ Cyberspies Hacked Cisco Firewalls to Access Government Networks

Cisco Talos ArcaneDoor April 24 2024

Cisco Talos. (2024, April 24). ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices. Retrieved May 6, 2024.

Internal MISP references

UUID 531c3f6f-2d2b-4774-b069-e2b7a13602c1 which can be used as unique global reference for Cisco Talos ArcaneDoor April 24 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-06T00:00:00Z
date_published 2024-04-24T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices

Wald0 Guide to GPOs

Robbins, A. (2018, April 2). A Red Teamer’s Guide to GPOs and OUs. Retrieved March 5, 2019.

Internal MISP references

UUID 48bb84ac-56c8-4840-9a11-2cc76213e24e which can be used as unique global reference for Wald0 Guide to GPOs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-05T00:00:00Z
date_published 2018-04-02T00:00:00Z
source MITRE
title A Red Teamer’s Guide to GPOs and OUs

Lau 2011

Lau, H. (2011, August 8). Are MBR Infections Back in Fashion? (Infographic). Retrieved November 13, 2014.

Internal MISP references

UUID fa809aab-5051-4f9c-8e27-b5989608b03c which can be used as unique global reference for Lau 2011 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-13T00:00:00Z
date_published 2011-08-08T00:00:00Z
source MITRE
title Are MBR Infections Back in Fashion? (Infographic)

Krebs-Booter

Brian Krebs. (2016, October 27). Are the Days of “Booter” Services Numbered?. Retrieved May 15, 2017.

Internal MISP references

UUID d29a88ae-273b-439e-8808-dc9931f1ff72 which can be used as unique global reference for Krebs-Booter in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-05-15T00:00:00Z
date_published 2016-10-27T00:00:00Z
source MITRE
title Are the Days of “Booter” Services Numbered?

RSA Forfiles Aug 2017

Partington, E. (2017, August 14). Are you looking out for forfiles.exe (if you are watching for cmd.exe). Retrieved January 22, 2018.

Internal MISP references

UUID 923d6d3e-6117-43a5-92c6-ea0c131355c2 which can be used as unique global reference for RSA Forfiles Aug 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-22T00:00:00Z
date_published 2017-08-14T00:00:00Z
source MITRE
title Are you looking out for forfiles.exe (if you are watching for cmd.exe)

FireEye Respond Webinar July 2017

Scavella, T. and Rifki, A. (2017, July 20). Are you Ready to Respond? (Webinar). Retrieved October 4, 2017.

Internal MISP references

UUID e7091d66-7faa-49d6-b16f-be1f79db4471 which can be used as unique global reference for FireEye Respond Webinar July 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-10-04T00:00:00Z
date_published 2017-07-20T00:00:00Z
source MITRE
title Are you Ready to Respond? (Webinar)

Browser-updates

Dusty Miller. (2023, October 17). Are You Sure Your Browser is Up to Date? The Current Landscape of Fake Browser Updates . Retrieved February 13, 2024.

Internal MISP references

UUID 89e913a8-1d52-53fe-b692-fb72e21d794f which can be used as unique global reference for Browser-updates in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-13T00:00:00Z
date_published 2023-10-17T00:00:00Z
source MITRE
title Are You Sure Your Browser is Up to Date? The Current Landscape of Fake Browser Updates

Sekoia.io AridViper

Threat & Detection Research Team. (2023, October 26). AridViper, an intrusion set allegedly associated with Hamas. Retrieved October 30, 2023.

Internal MISP references

UUID 963a97b9-71b2-46e7-8315-1d7ef76d832c which can be used as unique global reference for Sekoia.io AridViper in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-30T00:00:00Z
date_published 2023-10-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title AridViper, an intrusion set allegedly associated with Hamas

TechNet Arp

Microsoft. (n.d.). Arp. Retrieved April 17, 2016.

Internal MISP references

UUID 7714222e-8046-4884-b460-493d9ef46305 which can be used as unique global reference for TechNet Arp in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-17T00:00:00Z
source MITRE
title Arp

Cisco ARP Poisoning Mitigation 2016

King, J., Lauerman, K. (2016, January 22). ARP Poisoning (Man-in-the-Middle) Attack and Mitigation Technique. Retrieved October 15, 2020.

Internal MISP references

UUID 715cd044-f5ef-4cad-8741-308d104f05a5 which can be used as unique global reference for Cisco ARP Poisoning Mitigation 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-15T00:00:00Z
date_published 2016-01-22T00:00:00Z
source MITRE
title ARP Poisoning (Man-in-the-Middle) Attack and Mitigation Technique

ASEC Emotet 2017

ASEC. (2017). ASEC REPORT VOL.88. Retrieved April 16, 2019.

Internal MISP references

UUID a02e3bbf-5864-4ccf-8b6f-5f8452395670 which can be used as unique global reference for ASEC Emotet 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-16T00:00:00Z
date_published 2017-01-01T00:00:00Z
source MITRE
title ASEC REPORT VOL.88

ASERT Seven Pointed Dagger Aug 2015

ASERT. (2015, August). ASERT Threat Intelligence Report – Uncovering the Seven Pointed Dagger. Retrieved March 19, 2018.

Internal MISP references

UUID a8f323c7-82bc-46e6-bd6c-0b631abc644a which can be used as unique global reference for ASERT Seven Pointed Dagger Aug 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-19T00:00:00Z
date_published 2015-08-01T00:00:00Z
source MITRE
title ASERT Threat Intelligence Report – Uncovering the Seven Pointed Dagger

Securelist Sofacy Feb 2018

Kaspersky Lab's Global Research & Analysis Team. (2018, February 20). A Slice of 2017 Sofacy Activity. Retrieved November 27, 2018.

Internal MISP references

UUID 3a043bba-2451-4765-946b-c1f3bf4aea36 which can be used as unique global reference for Securelist Sofacy Feb 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-27T00:00:00Z
date_published 2018-02-20T00:00:00Z
source MITRE
title A Slice of 2017 Sofacy Activity

THE FINANCIAL TIMES LTD 2019.

THE FINANCIAL TIMES. (2019, September 2). A sobering day. Retrieved October 8, 2019.

Internal MISP references

UUID 5a01f0b7-86f7-44a1-bf35-46a631402ceb which can be used as unique global reference for THE FINANCIAL TIMES LTD 2019. in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-08T00:00:00Z
date_published 2019-09-02T00:00:00Z
source MITRE
title A sobering day

Aspnet_Compiler.exe - LOLBAS Project

LOLBAS. (2021, September 26). Aspnet_Compiler.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 15864c56-115e-4163-b816-03bdb9bfd5c5 which can be used as unique global reference for Aspnet_Compiler.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-09-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Aspnet_Compiler.exe

Mandiant UNC2452 APT29 April 2022

Mandiant. (2020, April 27). Assembling the Russian Nesting Doll: UNC2452 Merged into APT29. Retrieved March 26, 2023.

Internal MISP references

UUID 5276508c-6792-56be-b757-e4b495ef6c37 which can be used as unique global reference for Mandiant UNC2452 APT29 April 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-26T00:00:00Z
date_published 2020-04-27T00:00:00Z
source MITRE
title Assembling the Russian Nesting Doll: UNC2452 Merged into APT29

Microsoft AssemblyLoad

Microsoft. (n.d.). Assembly.Load Method. Retrieved February 9, 2024.

Internal MISP references

UUID 3d980d7a-7074-5812-9bb1-ca8e27e028bd which can be used as unique global reference for Microsoft AssemblyLoad in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-09T00:00:00Z
source MITRE
title Assembly.Load Method

Kubernetes Assigning Pods to Nodes

Kubernetes. (n.d.). Assigning Pods to Nodes. Retrieved February 15, 2024.

Internal MISP references

UUID fe6ba97b-ff61-541b-9a67-a835290dc4ab which can be used as unique global reference for Kubernetes Assigning Pods to Nodes in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-15T00:00:00Z
source MITRE
title Assigning Pods to Nodes

Microsoft Assoc Oct 2017

Plett, C. et al.. (2017, October 15). assoc. Retrieved August 7, 2018.

Internal MISP references

UUID 63fb65d7-6423-42de-b868-37fbc2bc133d which can be used as unique global reference for Microsoft Assoc Oct 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-07T00:00:00Z
date_published 2017-10-15T00:00:00Z
source MITRE
title assoc

Rhino Security Labs Enumerating AWS Roles

Spencer Gietzen. (2018, August 8). Assume the Worst: Enumerating AWS Roles through ‘AssumeRole’. Retrieved April 1, 2022.

Internal MISP references

UUID f403fc54-bdac-415a-9cc0-78803dd84214 which can be used as unique global reference for Rhino Security Labs Enumerating AWS Roles in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-01T00:00:00Z
date_published 2018-08-08T00:00:00Z
source MITRE
title Assume the Worst: Enumerating AWS Roles through ‘AssumeRole’

Cybereason Astaroth Feb 2019

Salem, E. (2019, February 13). ASTAROTH MALWARE USES LEGITIMATE OS AND ANTIVIRUS PROCESSES TO STEAL PASSWORDS AND PERSONAL DATA. Retrieved April 17, 2019.

Internal MISP references

UUID eb4dc1f8-c6e7-4d6c-9258-b03a0ae64d2e which can be used as unique global reference for Cybereason Astaroth Feb 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-17T00:00:00Z
date_published 2019-02-13T00:00:00Z
source MITRE
title ASTAROTH MALWARE USES LEGITIMATE OS AND ANTIVIRUS PROCESSES TO STEAL PASSWORDS AND PERSONAL DATA

spamhaus-malvertising

Miller, Sarah. (2023, February 2). A surge of malvertising across Google Ads is distributing dangerous malware. Retrieved February 21, 2023.

Internal MISP references

UUID 15a4d429-28c3-52be-aeb8-d94ad2743866 which can be used as unique global reference for spamhaus-malvertising in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-21T00:00:00Z
date_published 2023-02-02T00:00:00Z
source MITRE
title A surge of malvertising across Google Ads is distributing dangerous malware

Lua Proofpoint Sunseed

Raggi, Michael. Cass, Zydeca. The Proofpoint Threat Research Team.. (2022, March 1). Asylum Ambuscade: State Actor Uses Lua-based Sunseed Malware to Target European Governments and Refugee Movement. Retrieved August 5, 2024.

Internal MISP references

UUID 313e8333-0512-50d4-a7f6-4294dc935003 which can be used as unique global reference for Lua Proofpoint Sunseed in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-05T00:00:00Z
date_published 2022-03-01T00:00:00Z
source MITRE
title Asylum Ambuscade: State Actor Uses Lua-based Sunseed Malware to Target European Governments and Refugee Movement

Microsoft APC

Microsoft. (n.d.). Asynchronous Procedure Calls. Retrieved December 8, 2017.

Internal MISP references

UUID 37f1ef6c-fc0e-4e47-85ab-20d53caba77e which can be used as unique global reference for Microsoft APC in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-08T00:00:00Z
source MITRE
title Asynchronous Procedure Calls

Medium February 08 2023

Hack sydney. (2023, February 8). AsyncRAT: Analysing the Three Stages of Execution. Retrieved May 7, 2023.

Internal MISP references

UUID 86a69887-8d23-460f-9a51-96a10bfb3c29 which can be used as unique global reference for Medium February 08 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2023-02-08T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title AsyncRAT: Analysing the Three Stages of Execution

AsyncRAT Crusade: Detections and Defense | Splunk

Splunk-Blogs. (n.d.). AsyncRAT Crusade: Detections and Defense. Retrieved May 7, 2023.

Internal MISP references

UUID 2869d93c-d3fe-475e-adc9-ab6eb7e26c0f which can be used as unique global reference for AsyncRAT Crusade: Detections and Defense | Splunk in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title AsyncRAT Crusade: Detections and Defense

TechNet At

Microsoft. (n.d.). At. Retrieved April 28, 2016.

Internal MISP references

UUID 31b40c09-d68f-4889-b585-c077bd9cef28 which can be used as unique global reference for TechNet At in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-28T00:00:00Z
source MITRE
title At

Die.net Linux at Man Page

Thomas Koenig. (n.d.). at(1) - Linux man page. Retrieved December 19, 2017.

Internal MISP references

UUID 4bc1389d-9586-4dfc-a67c-58c6d3f6796a which can be used as unique global reference for Die.net Linux at Man Page in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-19T00:00:00Z
source MITRE
title at(1) - Linux man page

Linux at

IEEE/The Open Group. (2017). at(1p) — Linux manual page. Retrieved February 25, 2022.

Internal MISP references

UUID 3e3a84bc-ab6d-460d-8abc-cafae6eaaedd which can be used as unique global reference for Linux at in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-25T00:00:00Z
date_published 2017-01-01T00:00:00Z
source MITRE
title at(1p) — Linux manual page

PWC Pirpi Scanbox

Lancaster, T. (2015, July 25). A tale of Pirpi, Scanbox & CVE-2015-3113. Retrieved March 30, 2016.

Internal MISP references

UUID 4904261a-a3a9-4c3e-b6a7-079890026ee2 which can be used as unique global reference for PWC Pirpi Scanbox in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-03-30T00:00:00Z
date_published 2015-07-25T00:00:00Z
source MITRE
title A tale of Pirpi, Scanbox & CVE-2015-3113

Atbroker.exe - LOLBAS Project

LOLBAS. (2018, May 25). Atbroker.exe. Retrieved December 4, 2023.

Internal MISP references

UUID b0c21b56-6591-49c3-8e67-328ddb7b436d which can be used as unique global reference for Atbroker.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Atbroker.exe

ESET Attor Oct 2019

Hromcova, Z. (2019, October). AT COMMANDS, TOR-BASED COMMUNICATIONS: MEET ATTOR, A FANTASY CREATURE AND ALSO A SPY PLATFORM. Retrieved May 6, 2020.

Internal MISP references

UUID fdd57c56-d989-4a6f-8cc5-5b3713605dec which can be used as unique global reference for ESET Attor Oct 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-06T00:00:00Z
date_published 2019-10-01T00:00:00Z
source MITRE
title AT COMMANDS, TOR-BASED COMMUNICATIONS: MEET ATTOR, A FANTASY CREATURE AND ALSO A SPY PLATFORM

LogRhythm WannaCry

Noerenberg, E., Costis, A., and Quist, N. (2017, May 16). A Technical Analysis of WannaCry Ransomware. Retrieved March 25, 2019.

Internal MISP references

UUID 305d0742-154a-44af-8686-c6d8bd7f8636 which can be used as unique global reference for LogRhythm WannaCry in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-25T00:00:00Z
date_published 2017-05-16T00:00:00Z
source MITRE
title A Technical Analysis of WannaCry Ransomware

Malwarebytes Dyreza November 2015

hasherezade. (2015, November 4). A Technical Look At Dyreza. Retrieved June 15, 2020.

Internal MISP references

UUID 0a5719f2-8a88-44e2-81c5-2d16a39f1f8d which can be used as unique global reference for Malwarebytes Dyreza November 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-15T00:00:00Z
date_published 2015-11-04T00:00:00Z
source MITRE
title A Technical Look At Dyreza

At.exe - LOLBAS Project

LOLBAS. (2019, September 20). At.exe. Retrieved December 4, 2023.

Internal MISP references

UUID a31e1f5c-9b8d-4af4-875b-5c03d2400c12 which can be used as unique global reference for At.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2019-09-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title At.exe

ENSIL AtomBombing Oct 2016

Liberman, T. (2016, October 27). ATOMBOMBING: BRAND NEW CODE INJECTION FOR WINDOWS. Retrieved December 8, 2017.

Internal MISP references

UUID 9282dbab-391c-4ffd-ada9-1687413b686b which can be used as unique global reference for ENSIL AtomBombing Oct 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-08T00:00:00Z
date_published 2016-10-27T00:00:00Z
source MITRE
title ATOMBOMBING: BRAND NEW CODE INJECTION FOR WINDOWS

SentinelOne 5 3 2023

Phil Stokes. (2023, May 3). Atomic Stealer . Retrieved January 1, 2024.

Internal MISP references

UUID c4721cab-2895-48ed-bfde-748aa3c80209 which can be used as unique global reference for SentinelOne 5 3 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-01T00:00:00Z
date_published 2023-05-03T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Atomic Stealer

Malwarebytes 1 10 2024

Jerome Segura. (2024, January 10). Atomic Stealer rings in the new year with updated version . Retrieved January 11, 2024.

Internal MISP references

UUID 660de1b0-574d-48df-865a-257b8ed4b928 which can be used as unique global reference for Malwarebytes 1 10 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-11T00:00:00Z
date_published 2024-01-10T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Atomic Stealer rings in the new year with updated version

FireEye TRITON 2018

Miller, S. Reese, E. (2018, June 7). A Totally Tubular Treatise on TRITON and TriStation. Retrieved January 6, 2021.

Internal MISP references

UUID bfa5886a-a7f4-40d1-98d0-c3358abcf265 which can be used as unique global reference for FireEye TRITON 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-06T00:00:00Z
date_published 2018-06-07T00:00:00Z
source MITRE
title A Totally Tubular Treatise on TRITON and TriStation

The DFIR Report Truebot June 12 2023

The DFIR Report. (2023, June 12). A Truly Graceful Wipe Out. Retrieved June 15, 2023.

Internal MISP references

UUID a6311a66-bb36-4cad-a98f-2b0b89aafa3d which can be used as unique global reference for The DFIR Report Truebot June 12 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-15T00:00:00Z
date_published 2023-06-12T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title A Truly Graceful Wipe Out

DFIR Report Trickbot June 2023

The DFIR Report. (2023, June 12). A Truly Graceful Wipe Out. Retrieved May 31, 2024.

Internal MISP references

UUID b65988a7-3469-54d2-804c-e8ce1f698b5c which can be used as unique global reference for DFIR Report Trickbot June 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-31T00:00:00Z
date_published 2023-06-12T00:00:00Z
source MITRE
title A Truly Graceful Wipe Out

att_def_ps_logging

Hao, M. (2019, February 27). Attack and Defense Around PowerShell Event Logging. Retrieved November 24, 2021.

Internal MISP references

UUID 52212570-b1a6-4249-99d4-3bcf66c27140 which can be used as unique global reference for att_def_ps_logging in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-11-24T00:00:00Z
date_published 2019-02-27T00:00:00Z
source MITRE
title Attack and Defense Around PowerShell Event Logging

Attack chain leads to XWORM and AGENTTESLA | Elastic

Elastic Blog. (2023, April 7). Attack chain leads to XWORM and AGENTTESLA. Retrieved May 10, 2023.

Internal MISP references

UUID 9b32397b-58be-4275-a701-fe0351ff2982 which can be used as unique global reference for Attack chain leads to XWORM and AGENTTESLA | Elastic in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-10T00:00:00Z
date_published 2023-04-07T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Attack chain leads to XWORM and AGENTTESLA

Intezer TeamTNT September 2020

Fishbein, N. (2020, September 8). Attackers Abusing Legitimate Cloud Monitoring Tools to Conduct Cyber Attacks. Retrieved September 22, 2021.

Internal MISP references

UUID 1155a45e-86f4-497a-9a03-43b6dcb25202 which can be used as unique global reference for Intezer TeamTNT September 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-22T00:00:00Z
date_published 2020-09-08T00:00:00Z
source MITRE
title Attackers Abusing Legitimate Cloud Monitoring Tools to Conduct Cyber Attacks

Metcalf 2015

Metcalf, S. (2015, January 19). Attackers Can Now Use Mimikatz to Implant Skeleton Key on Domain Controllers & BackDoor Your Active Directory Forest. Retrieved February 3, 2015.

Internal MISP references

UUID 1c899028-466c-49b0-8d64-1a954c812508 which can be used as unique global reference for Metcalf 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-02-03T00:00:00Z
date_published 2015-01-19T00:00:00Z
source MITRE
title Attackers Can Now Use Mimikatz to Implant Skeleton Key on Domain Controllers & BackDoor Your Active Directory Forest

Cisco Blog Legacy Device Attacks

Omar Santos. (2020, October 19). Attackers Continue to Target Legacy Devices. Retrieved October 20, 2020.

Internal MISP references

UUID f7ce5099-7e04-4c0b-8767-e0eec664b18e which can be used as unique global reference for Cisco Blog Legacy Device Attacks in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
date_published 2020-10-19T00:00:00Z
source MITRE
title Attackers Continue to Target Legacy Devices

FireEye TRITON 2017

Johnson, B, et. al. (2017, December 14). Attackers Deploy New ICS Attack Framework "TRITON" and Cause Operational Disruption to Critical Infrastructure. Retrieved January 6, 2021.

Internal MISP references

UUID 597a4d8b-ffb2-4551-86db-b319f5a5b707 which can be used as unique global reference for FireEye TRITON 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-06T00:00:00Z
date_published 2017-12-14T00:00:00Z
source MITRE
title Attackers Deploy New ICS Attack Framework "TRITON" and Cause Operational Disruption to Critical Infrastructure

FireEye TRITON Dec 2017

Blake Johnson, Dan Caban, Marina Krotofil, Dan Scali, Nathan Brubaker, Christopher Glyer. (2017, December 14). Attackers Deploy New ICS Attack Framework “TRITON” and Cause Operational Disruption to Critical Infrastructure. Retrieved January 12, 2018.

Internal MISP references

UUID d4ca3351-eeb8-5342-8c85-806614e22c48 which can be used as unique global reference for FireEye TRITON Dec 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-12T00:00:00Z
date_published 2017-12-14T00:00:00Z
source MITRE
title Attackers Deploy New ICS Attack Framework “TRITON” and Cause Operational Disruption to Critical Infrastructure

Forbes GitHub Creds

Sandvik, R. (2014, January 14). Attackers Scrape GitHub For Cloud Service Credentials, Hijack Account To Mine Virtual Currency. Retrieved October 19, 2020.

Internal MISP references

UUID 303f8801-bdd6-4a0c-a90a-37867898c99c which can be used as unique global reference for Forbes GitHub Creds in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
date_published 2014-01-14T00:00:00Z
source MITRE
title Attackers Scrape GitHub For Cloud Service Credentials, Hijack Account To Mine Virtual Currency

GitHub Cloud Service Credentials

Runa A. Sandvik. (2014, January 14). Attackers Scrape GitHub For Cloud Service Credentials, Hijack Account To Mine Virtual Currency. Retrieved August 9, 2022.

Internal MISP references

UUID d2186b8c-10c9-493b-8e25-7d69fce006e4 which can be used as unique global reference for GitHub Cloud Service Credentials in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-09T00:00:00Z
date_published 2014-01-14T00:00:00Z
source MITRE
title Attackers Scrape GitHub For Cloud Service Credentials, Hijack Account To Mine Virtual Currency

Unit 42 Unsecured Docker Daemons

Chen, J.. (2020, January 29). Attacker's Tactics and Techniques in Unsecured Docker Daemons Revealed. Retrieved March 31, 2021.

Internal MISP references

UUID efcbbbdd-9af1-46c2-8538-3fd22f2b67d2 which can be used as unique global reference for Unit 42 Unsecured Docker Daemons in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-31T00:00:00Z
date_published 2020-01-29T00:00:00Z
source MITRE
title Attacker's Tactics and Techniques in Unsecured Docker Daemons Revealed

Talos Roblox Scam 2023

Tiago Pereira. (2023, November 2). Attackers use JavaScript URLs, API forms and more to scam users in popular online game “Roblox”. Retrieved January 2, 2024.

Internal MISP references

UUID 9371ee4a-ac23-5acb-af3f-132ef3645392 which can be used as unique global reference for Talos Roblox Scam 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-02T00:00:00Z
date_published 2023-11-02T00:00:00Z
source MITRE
title Attackers use JavaScript URLs, API forms and more to scam users in popular online game “Roblox”

Black Hills Attacking Exchange MailSniper, 2016

Bullock, B.. (2016, October 3). Attacking Exchange with MailSniper. Retrieved October 6, 2019.

Internal MISP references

UUID adedfddc-29b7-4245-aa67-cc590acb7434 which can be used as unique global reference for Black Hills Attacking Exchange MailSniper, 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-06T00:00:00Z
date_published 2016-10-03T00:00:00Z
source MITRE
title Attacking Exchange with MailSniper

SANS Attacking Kerberos Nov 2014

Medin, T. (2014, November). Attacking Kerberos - Kicking the Guard Dog of Hades. Retrieved March 22, 2018.

Internal MISP references

UUID f20d6bd0-d699-4ee4-8ef6-3c45ec12cd42 which can be used as unique global reference for SANS Attacking Kerberos Nov 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-22T00:00:00Z
date_published 2014-11-01T00:00:00Z
source MITRE
title Attacking Kerberos - Kicking the Guard Dog of Hades

NetSPI SQL Server CLR

Sutherland, S. (2017, July 13). Attacking SQL Server CLR Assemblies. Retrieved September 12, 2024.

Internal MISP references

UUID 6f3d8c89-9d5d-4754-98d5-44fe3a5dd0d5 which can be used as unique global reference for NetSPI SQL Server CLR in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2017-07-13T00:00:00Z
source MITRE
title Attacking SQL Server CLR Assemblies

Mandiant FIN5 GrrCON Oct 2016

Bromiley, M. and Lewis, P. (2016, October 7). Attacking the Hospitality and Gaming Industries: Tracking an Attacker Around the World in 7 Years. Retrieved October 6, 2017.

Internal MISP references

UUID 2bd39baf-4223-4344-ba93-98aa8453dc11 which can be used as unique global reference for Mandiant FIN5 GrrCON Oct 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-10-06T00:00:00Z
date_published 2016-10-07T00:00:00Z
source MITRE
title Attacking the Hospitality and Gaming Industries: Tracking an Attacker Around the World in 7 Years

Attacking VNC Servers PentestLab

Administrator, Penetration Testing Lab. (2012, October 30). Attacking VNC Servers. Retrieved October 6, 2021.

Internal MISP references

UUID f953ea41-f9ca-4f4e-a46f-ef1d2def1d07 which can be used as unique global reference for Attacking VNC Servers PentestLab in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-06T00:00:00Z
date_published 2012-10-30T00:00:00Z
source MITRE
title Attacking VNC Servers

Talos Template Injection July 2017

Baird, S. et al.. (2017, July 7). Attack on Critical Infrastructure Leverages Template Injection. Retrieved July 21, 2018.

Internal MISP references

UUID 175ea537-2a94-42c7-a83b-bec8906ee6b9 which can be used as unique global reference for Talos Template Injection July 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-21T00:00:00Z
date_published 2017-07-07T00:00:00Z
source MITRE
title Attack on Critical Infrastructure Leverages Template Injection

Lotus Blossom Dec 2015

Falcone, R. and Miller-Osborn, J.. (2015, December 18). Attack on French Diplomat Linked to Operation Lotus Blossom. Retrieved February 15, 2016.

Internal MISP references

UUID dcbe51a0-6d63-4401-b19e-46cd3c42204c which can be used as unique global reference for Lotus Blossom Dec 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-02-15T00:00:00Z
date_published 2015-12-18T00:00:00Z
source MITRE
title Attack on French Diplomat Linked to Operation Lotus Blossom

Symantec Attacks Against Government Sector

Symantec. (2021, June 10). Attacks Against the Government Sector. Retrieved September 28, 2021.

Internal MISP references

UUID f5940cc2-1bbd-4e42-813a-f50867b01035 which can be used as unique global reference for Symantec Attacks Against Government Sector in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-28T00:00:00Z
date_published 2021-06-10T00:00:00Z
source MITRE
title Attacks Against the Government Sector

Aqua Security Cloud Native Threat Report June 2021

Team Nautilus. (2021, June). Attacks in the Wild on the Container Supply Chain and Infrastructure. Retrieved August 26, 2021.

Internal MISP references

UUID be9652d5-7531-4143-9c44-aefd019b7a32 which can be used as unique global reference for Aqua Security Cloud Native Threat Report June 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-26T00:00:00Z
date_published 2021-06-01T00:00:00Z
source MITRE
title Attacks in the Wild on the Container Supply Chain and Infrastructure

CERT-FR PYSA April 2020

CERT-FR. (2020, April 1). ATTACKS INVOLVING THE MESPINOZA/PYSA RANSOMWARE. Retrieved March 1, 2021.

Internal MISP references

UUID 4e502db6-2e09-4422-9dcc-1e10e701e122 which can be used as unique global reference for CERT-FR PYSA April 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-01T00:00:00Z
date_published 2020-04-01T00:00:00Z
source MITRE
title ATTACKS INVOLVING THE MESPINOZA/PYSA RANSOMWARE

InsiderThreat NTFS EA Oct 2017

Sander, J. (2017, October 12). Attack Step 3: Persistence with NTFS Extended Attributes – File System Attacks. Retrieved March 21, 2018.

Internal MISP references

UUID 6d270128-0461-43ec-8925-204c7b5aacc9 which can be used as unique global reference for InsiderThreat NTFS EA Oct 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-21T00:00:00Z
date_published 2017-10-12T00:00:00Z
source MITRE
title Attack Step 3: Persistence with NTFS Extended Attributes – File System Attacks

Microsoft ASR Obfuscation

Microsoft. (2023, February 22). Attack surface reduction (ASR) rules reference: Block execution of potentially obfuscated scripts. Retrieved March 17, 2023.

Internal MISP references

UUID dec646d4-8b32-5091-b097-abe887aeca96 which can be used as unique global reference for Microsoft ASR Obfuscation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-17T00:00:00Z
date_published 2023-02-22T00:00:00Z
source MITRE
title Attack surface reduction (ASR) rules reference: Block execution of potentially obfuscated scripts

Obfuscated scripts

Microsoft. (2024, March 4). Attack surface reduction rules reference. Retrieved March 29, 2024.

Internal MISP references

UUID 2b4dcb27-f32e-50f0-83e0-350659e49f0b which can be used as unique global reference for Obfuscated scripts in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-29T00:00:00Z
date_published 2024-03-04T00:00:00Z
source MITRE
title Attack surface reduction rules reference

Sophos News August 27 2024

Andreas Klopsch. (2024, August 27). Attack tool update impairs Windows computers. Retrieved August 30, 2024.

Internal MISP references

UUID af1dfc7b-fdc2-448f-a4bf-34f8ee7d55bc which can be used as unique global reference for Sophos News August 27 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-30T00:00:00Z
date_published 2024-08-27T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Attack tool update impairs Windows computers

TrendMicro Msiexec Feb 2018

Co, M. and Sison, G. (2018, February 8). Attack Using Windows Installer msiexec.exe leads to LokiBot. Retrieved April 18, 2019.

Internal MISP references

UUID 768c99f3-ee28-47dc-bc33-06d50ac72dea which can be used as unique global reference for TrendMicro Msiexec Feb 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-18T00:00:00Z
date_published 2018-02-08T00:00:00Z
source MITRE
title Attack Using Windows Installer msiexec.exe leads to LokiBot

GitHub ATTACK Empire

Stepanic, D. (2018, September 2). attck_empire: Generate ATT&CK Navigator layer file from PowerShell Empire agent logs. Retrieved March 11, 2019.

Internal MISP references

UUID b3d6bb33-2b23-4c0a-b8fa-e002a5c7edfc which can be used as unique global reference for GitHub ATTACK Empire in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-11T00:00:00Z
date_published 2018-09-02T00:00:00Z
source MITRE
title attck_empire: Generate ATT&CK Navigator layer file from PowerShell Empire agent logs

lambert systemd 2022

Tony Lambert. (2022, November 13). ATT&CK T1501: Understanding systemd service persistence. Retrieved March 20, 2023.

Internal MISP references

UUID 196f0c77-4c98-57e7-ad79-eb43bdd2c848 which can be used as unique global reference for lambert systemd 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-20T00:00:00Z
date_published 2022-11-13T00:00:00Z
source MITRE
title ATT&CK T1501: Understanding systemd service persistence

TechNet Credential Theft

Microsoft. (2016, April 15). Attractive Accounts for Credential Theft. Retrieved June 3, 2016.

Internal MISP references

UUID 5c183c97-0ab2-4b75-8dbc-9db92a929ff4 which can be used as unique global reference for TechNet Credential Theft in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-03T00:00:00Z
date_published 2016-04-15T00:00:00Z
source MITRE
title Attractive Accounts for Credential Theft

AcidRain State Department 2022

Antony J. Blinken, US Department of State. (2022, May 10). Attribution of Russia’s Malicious Cyber Activity Against Ukraine. Retrieved March 25, 2024.

Internal MISP references

UUID 9d514c52-9def-5b11-aa06-fdf3ee9923ed which can be used as unique global reference for AcidRain State Department 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-25T00:00:00Z
date_published 2022-05-10T00:00:00Z
source MITRE
title Attribution of Russia’s Malicious Cyber Activity Against Ukraine

Audit OSX

Gagliardi, R. (n.d.). Audit in a OS X System. Retrieved September 23, 2021.

Internal MISP references

UUID c5181c95-0a94-4ea0-9940-04a9663d0069 which can be used as unique global reference for Audit OSX in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-23T00:00:00Z
source MITRE
title Audit in a OS X System

Microsoft Audit Logon Events

Microsoft. (2021, September 6). Audit logon events. Retrieved September 28, 2021.

Internal MISP references

UUID 050d6da7-a78c-489d-8bef-b06d802b55d7 which can be used as unique global reference for Microsoft Audit Logon Events in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-28T00:00:00Z
date_published 2021-09-06T00:00:00Z
source MITRE
title Audit logon events

Cloud Audit Logs

Google. (n.d.). Audit Logs. Retrieved June 1, 2020.

Internal MISP references

UUID 500bdcea-5f49-4949-80fb-5eec1ce5e09e which can be used as unique global reference for Cloud Audit Logs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-01T00:00:00Z
source MITRE
title Audit Logs

Microsoft Scheduled Task Events Win10

Microsoft. (2017, May 28). Audit Other Object Access Events. Retrieved June 27, 2019.

Internal MISP references

UUID 79e54b41-69ba-4738-86ef-88c4f540bce3 which can be used as unique global reference for Microsoft Scheduled Task Events Win10 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-27T00:00:00Z
date_published 2017-05-28T00:00:00Z
source MITRE
title Audit Other Object Access Events

auditpol

Jason Gerend, et al. (2017, October 16). auditpol. Retrieved September 1, 2021.

Internal MISP references

UUID 20d18ecf-d7d3-4433-9a3c-c28be71de4b1 which can be used as unique global reference for auditpol in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-01T00:00:00Z
date_published 2017-10-16T00:00:00Z
source MITRE
title auditpol

auditpol.exe_STRONTIC

STRONTIC. (n.d.). auditpol.exe. Retrieved September 9, 2021.

Internal MISP references

UUID c8a305b3-cd17-4415-a740-32787da703cd which can be used as unique global reference for auditpol.exe_STRONTIC in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-09T00:00:00Z
source MITRE
title auditpol.exe

Audit_Policy_Microsoft

Daniel Simpson. (2017, April 19). Audit Policy. Retrieved September 13, 2021.

Internal MISP references

UUID 9ff43f64-7fcb-4aa3-9599-9d00774d8da5 which can be used as unique global reference for Audit_Policy_Microsoft in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-13T00:00:00Z
date_published 2017-04-19T00:00:00Z
source MITRE
title Audit Policy

TechNet Audit Policy

Microsoft. (2016, April 15). Audit Policy Recommendations. Retrieved June 3, 2016.

Internal MISP references

UUID 406cd8ff-e539-4853-85ed-775726155cf1 which can be used as unique global reference for TechNet Audit Policy in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-03T00:00:00Z
date_published 2016-04-15T00:00:00Z
source MITRE
title Audit Policy Recommendations

Microsoft Audit Registry July 2012

Microsoft. (2012, July 2). Audit Registry. Retrieved January 31, 2018.

Internal MISP references

UUID 4e95ad81-cbc4-4f66-ba95-fb781d7d9c3c which can be used as unique global reference for Microsoft Audit Registry July 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-31T00:00:00Z
date_published 2012-07-02T00:00:00Z
source MITRE
title Audit Registry

audits linikatz

Wadhwa-Brown, Tim. (2022). audit.rules. Retrieved September 17, 2024.

Internal MISP references

UUID b9f940cf-74fb-5a33-992c-82bdb538adbb which can be used as unique global reference for audits linikatz in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-17T00:00:00Z
date_published 2022-01-01T00:00:00Z
source MITRE
title audit.rules

Security Affairs Elderwood Sept 2012

Paganini, P. (2012, September 9). Elderwood project, who is behind Op. Aurora and ongoing attacks?. Retrieved February 13, 2018.

Internal MISP references

UUID ebfc56c5-0490-4b91-b49f-548c00a59162 which can be used as unique global reference for Security Affairs Elderwood Sept 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-13T00:00:00Z
source MITRE
title Aurora and ongoing attacks?

Australia ‘Evil Twin’

Toulas, Bill. (2024, July 1). Australian charged for ‘Evil Twin’ WiFi attack on plane. Retrieved September 17, 2024.

Internal MISP references

UUID b50c354b-cdca-57e6-b8d6-a43ee334f091 which can be used as unique global reference for Australia ‘Evil Twin’ in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-17T00:00:00Z
date_published 2024-07-01T00:00:00Z
source MITRE
title Australian charged for ‘Evil Twin’ WiFi attack on plane

NIST Authentication

NIST. (n.d.). Authentication. Retrieved January 30, 2020.

Internal MISP references

UUID f3cfb9b9-62f4-4066-a2b9-7e6f25bd7a46 which can be used as unique global reference for NIST Authentication in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-01-30T00:00:00Z
source MITRE
title Authentication

MSDN Authentication Packages

Microsoft. (n.d.). Authentication Packages. Retrieved March 1, 2017.

Internal MISP references

UUID e9bb8434-9b6d-4301-bfe2-5c83ceabb020 which can be used as unique global reference for MSDN Authentication Packages in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-01T00:00:00Z
source MITRE
title Authentication Packages

Microsoft Authenticode

Microsoft. (n.d.). Authenticode. Retrieved January 31, 2018.

Internal MISP references

UUID 33efd1a3-ffe9-42b3-ae12-970ed11454bf which can be used as unique global reference for Microsoft Authenticode in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-31T00:00:00Z
source MITRE
title Authenticode

K8s Authorization Overview

Kubernetes. (n.d.). Authorization Overview. Retrieved June 24, 2021.

Internal MISP references

UUID 120f968a-c81f-4902-9b76-7544577b768d which can be used as unique global reference for K8s Authorization Overview in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-24T00:00:00Z
source MITRE
title Authorization Overview

SSH Authorized Keys

ssh.com. (n.d.). Authorized_keys File in SSH. Retrieved June 24, 2020.

Internal MISP references

UUID ff100b76-894e-4d7c-9b8d-5f0eedcf59cc which can be used as unique global reference for SSH Authorized Keys in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-24T00:00:00Z
source MITRE
title Authorized_keys File in SSH

Trend Micro njRAT 2018

Pascual, C. (2018, November 27). AutoIt-Compiled Worm Affecting Removable Media Delivers Fileless Version of BLADABINDI/njRAT Backdoor. Retrieved June 4, 2019.

Internal MISP references

UUID d8e7b428-84dd-4d96-b3f3-70e7ed7f8271 which can be used as unique global reference for Trend Micro njRAT 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-04T00:00:00Z
date_published 2018-11-27T00:00:00Z
source MITRE
title AutoIt-Compiled Worm Affecting Removable Media Delivers Fileless Version of BLADABINDI/njRAT Backdoor

Re-Open windows on Mac

Apple. (2016, December 6). Automatically re-open windows, apps, and documents on your Mac. Retrieved July 11, 2017.

Internal MISP references

UUID ed907f1e-71d6-45db-8ef3-75bec59c238b which can be used as unique global reference for Re-Open windows on Mac in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-11T00:00:00Z
date_published 2016-12-06T00:00:00Z
source MITRE
title Automatically re-open windows, apps, and documents on your Mac

TechNet Autoruns

Russinovich, M. (2016, January 4). Autoruns for Windows v13.51. Retrieved June 6, 2016.

Internal MISP references

UUID 709f4509-9d69-4033-8aa6-a947496a1703 which can be used as unique global reference for TechNet Autoruns in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-06T00:00:00Z
date_published 2016-01-04T00:00:00Z
source MITRE
title Autoruns for Windows v13.51

Autoruns for Windows

Mark Russinovich. (2019, June 28). Autoruns for Windows v13.96. Retrieved March 13, 2020.

Internal MISP references

UUID aaf66ad0-c444-48b5-875f-a0f66b82031c which can be used as unique global reference for Autoruns for Windows in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-13T00:00:00Z
date_published 2019-06-28T00:00:00Z
source MITRE
title Autoruns for Windows v13.96

Hornet Security Avaddon June 2020

Security Lab. (2020, June 5). Avaddon: From seeking affiliates to in-the-wild in 2 days. Retrieved August 19, 2021.

Internal MISP references

UUID 41377d56-2e7b-48a8-8561-681e04a65907 which can be used as unique global reference for Hornet Security Avaddon June 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-19T00:00:00Z
date_published 2020-06-05T00:00:00Z
source MITRE
title Avaddon: From seeking affiliates to in-the-wild in 2 days

Arxiv Avaddon Feb 2021

Yuste, J. Pastrana, S. (2021, February 9). Avaddon ransomware: an in-depth analysis and decryption of infected systems. Retrieved August 19, 2021.

Internal MISP references

UUID dbee8e7e-f477-4bd5-8225-84e0e222617e which can be used as unique global reference for Arxiv Avaddon Feb 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-19T00:00:00Z
date_published 2021-02-09T00:00:00Z
source MITRE
title Avaddon ransomware: an in-depth analysis and decryption of infected systems

CISA Phishing

CISA. (2021, February 1). Avoiding Social Engineering and Phishing Attacks. Retrieved September 8, 2023.

Internal MISP references

UUID 0c98bf66-f43c-5b09-ae43-d10c682f51e7 which can be used as unique global reference for CISA Phishing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-08T00:00:00Z
date_published 2021-02-01T00:00:00Z
source MITRE
title Avoiding Social Engineering and Phishing Attacks

Malwarebytes AvosLocker Jul 2021

Hasherezade. (2021, July 23). AvosLocker enters the ransomware scene, asks for partners. Retrieved January 11, 2023.

Internal MISP references

UUID 88dffb14-a7a7-5b36-b269-8283dec0f1a3 which can be used as unique global reference for Malwarebytes AvosLocker Jul 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-01-11T00:00:00Z
date_published 2021-07-23T00:00:00Z
source MITRE
title AvosLocker enters the ransomware scene, asks for partners

avoslocker_ransomware

Lakshmanan, R. (2022, May 2). AvosLocker Ransomware Variant Using New Trick to Disable Antivirus Protection. Retrieved May 17, 2022.

Internal MISP references

UUID ea2756ce-a183-4c80-af11-92374ad045b2 which can be used as unique global reference for avoslocker_ransomware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-17T00:00:00Z
date_published 2022-05-02T00:00:00Z
source MITRE
title AvosLocker Ransomware Variant Using New Trick to Disable Antivirus Protection

Cisco Talos Avos Jun 2022

Venere, G. Neal, C. (2022, June 21). Avos ransomware group expands with new attack arsenal. Retrieved January 11, 2023.

Internal MISP references

UUID 1170fdc2-6d8e-5b60-bf9e-ca915790e534 which can be used as unique global reference for Cisco Talos Avos Jun 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-01-11T00:00:00Z
date_published 2022-06-21T00:00:00Z
source MITRE
title Avos ransomware group expands with new attack arsenal

Awesome Executable Packing

Alexandre D'Hondt. (n.d.). Awesome Executable Packing. Retrieved March 11, 2022.

Internal MISP references

UUID 565bf600-5657-479b-9678-803e991c88a5 which can be used as unique global reference for Awesome Executable Packing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-11T00:00:00Z
source MITRE
title Awesome Executable Packing

ESET Kobalos Jan 2021

M.Leveille, M., Sanmillan, I. (2021, January). A WILD KOBALOS APPEARS Tricksy Linux malware goes after HPCs. Retrieved August 24, 2021.

Internal MISP references

UUID 745e963e-33fd-40d4-a8c6-1a9f321017f4 which can be used as unique global reference for ESET Kobalos Jan 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-24T00:00:00Z
date_published 2021-01-01T00:00:00Z
source MITRE
title A WILD KOBALOS APPEARS Tricksy Linux malware goes after HPCs

AWS Root User

Amazon. (n.d.). AWS Account Root User. Retrieved April 5, 2021.

Internal MISP references

UUID 5f315c21-f02f-4c9e-aac6-d648deff3ff9 which can be used as unique global reference for AWS Root User in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-05T00:00:00Z
source MITRE
title AWS Account Root User

GitHub AWS-ADFS-Credential-Generator

Damian Hickey. (2017, January 28). AWS-ADFS-Credential-Generator. Retrieved September 27, 2024.

Internal MISP references

UUID 340a3a20-0ee1-4fd8-87ab-10ac0d2a50c8 which can be used as unique global reference for GitHub AWS-ADFS-Credential-Generator in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-27T00:00:00Z
date_published 2017-01-28T00:00:00Z
source MITRE
title AWS-ADFS-Credential-Generator

AWS GetPasswordPolicy

Amazon Web Services. (n.d.). AWS API GetAccountPasswordPolicy. Retrieved June 8, 2021.

Internal MISP references

UUID dd44d565-b9d9-437e-a31a-a52c6a21e3b3 which can be used as unique global reference for AWS GetPasswordPolicy in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-08T00:00:00Z
source MITRE
title AWS API GetAccountPasswordPolicy

AWS Console Sign-in Events

Amazon. (n.d.). AWS Console Sign-in Events. Retrieved October 23, 2019.

Internal MISP references

UUID 72578d0b-f68a-40fa-9a5d-379a66792be8 which can be used as unique global reference for AWS Console Sign-in Events in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-23T00:00:00Z
source MITRE
title AWS Console Sign-in Events

AWS Describe DB Instances

Amazon Web Services. (n.d.). Retrieved May 28, 2021.

Internal MISP references

UUID 85bda17d-7b7c-4d0e-a0d2-2adb5f0a6b82 which can be used as unique global reference for AWS Describe DB Instances in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-05-28T00:00:00Z
source MITRE
title AWS Describe DB Instances

AWS Get Bucket ACL

Amazon Web Services. (n.d.). Retrieved May 28, 2021.

Internal MISP references

UUID 1eddbd32-8314-4f95-812a-550904eac2fa which can be used as unique global reference for AWS Get Bucket ACL in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-05-28T00:00:00Z
source MITRE
title AWS Get Bucket ACL

AWS Get Public Access Block

Amazon Web Services. (n.d.). Retrieved May 28, 2021.

Internal MISP references

UUID f2887980-569a-4bc2-949e-bd8ff266c43c which can be used as unique global reference for AWS Get Public Access Block in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-05-28T00:00:00Z
source MITRE
title AWS Get Public Access Block

AWS Head Bucket

Amazon Web Services. (n.d.). AWS HeadBucket. Retrieved February 14, 2022.

Internal MISP references

UUID 1388a78e-9f86-4927-a619-e0fcbac5b7a1 which can be used as unique global reference for AWS Head Bucket in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-14T00:00:00Z
source MITRE
title AWS HeadBucket

Rhino Security Labs AWS Privilege Escalation

Spencer Gietzen. (n.d.). AWS IAM Privilege Escalation – Methods and Mitigation. Retrieved May 27, 2022.

Internal MISP references

UUID 693e5783-4aa1-40ce-8080-cec01c3e7b59 which can be used as unique global reference for Rhino Security Labs AWS Privilege Escalation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-27T00:00:00Z
source MITRE
title AWS IAM Privilege Escalation – Methods and Mitigation

AWS Lambda Redirector

Adam Chester. (2020, February 25). AWS Lambda Redirector. Retrieved July 8, 2022.

Internal MISP references

UUID 9ba87a5d-a140-4959-9905-c4a80e684d56 which can be used as unique global reference for AWS Lambda Redirector in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-08T00:00:00Z
date_published 2020-02-25T00:00:00Z
source MITRE
title AWS Lambda Redirector

Sysdig AMBERSQUID September 18 2023

Alessandro Brucato. (2023, September 18). AWS’s Hidden Threat: AMBERSQUID Cloud-Native Cryptojacking Operation. Retrieved April 11, 2024.

Internal MISP references

UUID 7ffa880f-5854-4b8a-83f5-da42c1c39345 which can be used as unique global reference for Sysdig AMBERSQUID September 18 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-11T00:00:00Z
date_published 2023-09-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title AWS’s Hidden Threat: AMBERSQUID Cloud-Native Cryptojacking Operation

Rhino Security Labs AWS S3 Ransomware

Spencer Gietzen. (n.d.). AWS Simple Storage Service S3 Ransomware Part 2: Prevention and Defense. Retrieved March 21, 2023.

Internal MISP references

UUID 785c6b11-c5f0-5cb4-931b-cf75fcc368a1 which can be used as unique global reference for Rhino Security Labs AWS S3 Ransomware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-21T00:00:00Z
source MITRE
title AWS Simple Storage Service S3 Ransomware Part 2: Prevention and Defense

AWS Systems Manager Run Command

AWS. (n.d.). AWS Systems Manager Run Command. Retrieved March 13, 2023.

Internal MISP references

UUID ef66f17b-6a5b-5eb8-83de-943e2bddd114 which can be used as unique global reference for AWS Systems Manager Run Command in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-13T00:00:00Z
source MITRE
title AWS Systems Manager Run Command

Pylos Xenotime 2019

Slowik, J.. (2019, April 12). A XENOTIME to Remember: Veles in the Wild. Retrieved April 16, 2019.

Internal MISP references

UUID e2f246d8-c75e-4e0f-bba8-869d82be26da which can be used as unique global reference for Pylos Xenotime 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-16T00:00:00Z
date_published 2019-04-12T00:00:00Z
source MITRE
title A XENOTIME to Remember: Veles in the Wild

objective-see ay mami 2018

Patrick Wardle. (2018, January 11). Ay MaMi. Retrieved March 19, 2018.

Internal MISP references

UUID 1b1d656c-4fe6-47d1-9ce5-a70c33003507 which can be used as unique global reference for objective-see ay mami 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-19T00:00:00Z
date_published 2018-01-11T00:00:00Z
source MITRE
title Ay MaMi

Microsoft AZ CLI

Microsoft. (n.d.). az ad user. Retrieved October 6, 2019.

Internal MISP references

UUID cfd94553-272b-466b-becb-3859942bcaa5 which can be used as unique global reference for Microsoft AZ CLI in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-06T00:00:00Z
source MITRE
title az ad user

Intezer Russian APT Dec 2020

Kennedy, J. (2020, December 9). A Zebra in Gopher's Clothing: Russian APT Uses COVID-19 Lures to Deliver Zebrocy. Retrieved February 22, 2021.

Internal MISP references

UUID 88d8a3b7-d994-4fd2-9aa1-83b79bccda7e which can be used as unique global reference for Intezer Russian APT Dec 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-22T00:00:00Z
date_published 2020-12-09T00:00:00Z
source MITRE
title A Zebra in Gopher's Clothing: Russian APT Uses COVID-19 Lures to Deliver Zebrocy

az monitor diagnostic-settings

Microsoft. (n.d.). az monitor diagnostic-settings. Retrieved October 16, 2020.

Internal MISP references

UUID 6ddd92ee-1014-4b7a-953b-18ac396b100e which can be used as unique global reference for az monitor diagnostic-settings in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-16T00:00:00Z
source MITRE
title az monitor diagnostic-settings

Microsoft Azure AD Security Operations for Devices

Microsoft. (2020, September 16). Azure Active Directory security operations for devices. Retrieved February 21, 2023.

Internal MISP references

UUID eeba5eab-a9d8-55c0-b555-0414f65d2c2d which can be used as unique global reference for Microsoft Azure AD Security Operations for Devices in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-21T00:00:00Z
date_published 2020-09-16T00:00:00Z
source MITRE
title Azure Active Directory security operations for devices

Microsoft Azure Active Directory security operations guide

Microsoft . (2022, September 16). Azure Active Directory security operations guide. Retrieved February 21, 2023.

Internal MISP references

UUID b75a3f28-a028-50e6-b971-cc85e7d52e0c which can be used as unique global reference for Microsoft Azure Active Directory security operations guide in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-21T00:00:00Z
date_published 2022-09-16T00:00:00Z
source MITRE
title Azure Active Directory security operations guide

Azure AD Connect for Read Teamers

Adam Chester. (2019, February 18). Azure AD Connect for Red Teamers. Retrieved September 28, 2022.

Internal MISP references

UUID 0b9946ff-8c1c-4d93-8401-e1e4dd186305 which can be used as unique global reference for Azure AD Connect for Read Teamers in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-28T00:00:00Z
date_published 2019-02-18T00:00:00Z
source MITRE
title Azure AD Connect for Red Teamers

Microsoft - Azure PowerShell

Microsoft. (2014, December 12). Azure/azure-powershell. Retrieved March 24, 2023.

Internal MISP references

UUID 3b17b649-9efa-525f-aa49-cf6c9ad559d7 which can be used as unique global reference for Microsoft - Azure PowerShell in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-24T00:00:00Z
date_published 2014-12-12T00:00:00Z
source MITRE
title Azure/azure-powershell

Azure Blob Storage

Microsoft. (n.d.). Azure Blob Storage. Retrieved October 13, 2021.

Internal MISP references

UUID 7a392b85-872a-4a5a-984c-185a8e8f8a3f which can be used as unique global reference for Azure Blob Storage in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-13T00:00:00Z
source MITRE
title Azure Blob Storage

Microsoft Azure Instance Metadata 2021

Microsoft. (2021, February 21). Azure Instance Metadata Service (Windows). Retrieved April 2, 2021.

Internal MISP references

UUID 66e93b75-0067-4cdb-b695-8f8109ef26e0 which can be used as unique global reference for Microsoft Azure Instance Metadata 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-02T00:00:00Z
date_published 2021-02-21T00:00:00Z
source MITRE
title Azure Instance Metadata Service (Windows)

Microsoft Azure Policy

Microsoft. (2023, August 30). Azure Policy built-in policy definitions. Retrieved September 5, 2023.

Internal MISP references

UUID 761d102e-768a-5536-a098-0b1819029d33 which can be used as unique global reference for Microsoft Azure Policy in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-05T00:00:00Z
date_published 2023-08-30T00:00:00Z
source MITRE
title Azure Policy built-in policy definitions

SpecterOps Azure Privilege Escalation

Andy Robbins. (2021, October 12). Azure Privilege Escalation via Service Principal Abuse. Retrieved April 1, 2022.

Internal MISP references

UUID 5dba5a6d-465e-4489-bc4d-299a891b62f6 which can be used as unique global reference for SpecterOps Azure Privilege Escalation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-01T00:00:00Z
date_published 2021-10-12T00:00:00Z
source MITRE
title Azure Privilege Escalation via Service Principal Abuse

Azure Products

Microsoft. (n.d.). Azure products. Retrieved October 13, 2021.

Internal MISP references

UUID 12a72e05-ada4-4f77-8d6e-03024f88cab6 which can be used as unique global reference for Azure Products in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-13T00:00:00Z
source MITRE
title Azure products

Azure - Resource Manager API

Microsoft. (2019, May 20). Azure Resource Manager. Retrieved June 17, 2020.

Internal MISP references

UUID 223cc020-e88a-4236-9c34-64fe606a1729 which can be used as unique global reference for Azure - Resource Manager API in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-17T00:00:00Z
date_published 2019-05-20T00:00:00Z
source MITRE
title Azure Resource Manager

Mandiant Azure Run Command 2021

Adrien Bataille, Anders Vejlby, Jared Scott Wilson, and Nader Zaveri. (2021, December 14). Azure Run Command for Dummies. Retrieved March 13, 2023.

Internal MISP references

UUID e15d38de-bc15-525b-bd03-27c0edca768d which can be used as unique global reference for Mandiant Azure Run Command 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-13T00:00:00Z
date_published 2021-12-14T00:00:00Z
source MITRE
title Azure Run Command for Dummies

Microsoft Azure security baseline for Azure Active Directory

Microsoft. (2022, November 14). Azure security baseline for Azure Active Directory. Retrieved February 21, 2023.

Internal MISP references

UUID 2bc66dc9-2ed2-52ad-8ae2-5497be3b0c53 which can be used as unique global reference for Microsoft Azure security baseline for Azure Active Directory in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-21T00:00:00Z
date_published 2022-11-14T00:00:00Z
source MITRE
title Azure security baseline for Azure Active Directory

Microsoft - Azure Sentinel ADFSDomainTrustMods

Microsoft. (2020, December). Azure Sentinel Detections. Retrieved December 30, 2020.

Internal MISP references

UUID 34314090-33c2-4276-affa-3d0b527bbcef which can be used as unique global reference for Microsoft - Azure Sentinel ADFSDomainTrustMods in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-30T00:00:00Z
date_published 2020-12-01T00:00:00Z
source MITRE
title Azure Sentinel Detections

Azure Serial Console

Microsoft. (2022, October 17). Azure Serial Console. Retrieved June 2, 2023.

Internal MISP references

UUID fd75d136-e818-5233-b2c2-5d8ed033b9e6 which can be used as unique global reference for Azure Serial Console in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-02T00:00:00Z
date_published 2022-10-17T00:00:00Z
source MITRE
title Azure Serial Console

Microsoft Azure Storage Security, 2019

Amlekar, M., Brooks, C., Claman, L., et. al.. (2019, March 20). Azure Storage security guide. Retrieved October 4, 2019.

Internal MISP references

UUID 95bda448-bb13-4fa6-b663-e48a9d1b866f which can be used as unique global reference for Microsoft Azure Storage Security, 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-04T00:00:00Z
date_published 2019-03-20T00:00:00Z
source MITRE
title Azure Storage security guide

Azure - Stormspotter

Microsoft. (2020). Azure Stormspotter GitHub. Retrieved June 17, 2020.

Internal MISP references

UUID 42383ed1-9705-4313-8068-28a22a23f50e which can be used as unique global reference for Azure - Stormspotter in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-17T00:00:00Z
date_published 2020-01-01T00:00:00Z
source MITRE
title Azure Stormspotter GitHub

Medium Babuk February 2021

Sebdraven. (2021, February 8). Babuk is distributed packed. Retrieved August 11, 2021.

Internal MISP references

UUID 58759b1c-8e2c-44fa-8e37-8bf7325c330d which can be used as unique global reference for Medium Babuk February 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-11T00:00:00Z
date_published 2021-02-08T00:00:00Z
source MITRE
title Babuk is distributed packed

Sogeti CERT ESEC Babuk March 2021

Sogeti. (2021, March). Babuk Ransomware. Retrieved August 11, 2021.

Internal MISP references

UUID e85e3bd9-6ddc-4d0f-a16c-b525a75baa7e which can be used as unique global reference for Sogeti CERT ESEC Babuk March 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-11T00:00:00Z
date_published 2021-03-01T00:00:00Z
source MITRE
title Babuk Ransomware

Unit42 BabyShark Apr 2019

Lim, M.. (2019, April 26). BabyShark Malware Part Two – Attacks Continue Using KimJongRAT and PCRat . Retrieved October 7, 2019.

Internal MISP references

UUID c020569d-9c85-45fa-9f0b-97be5bdbab08 which can be used as unique global reference for Unit42 BabyShark Apr 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-07T00:00:00Z
date_published 2019-04-26T00:00:00Z
source MITRE
title BabyShark Malware Part Two – Attacks Continue Using KimJongRAT and PCRat

Symantec Briba May 2012

Ladley, F. (2012, May 15). Backdoor.Briba. Retrieved February 21, 2018.

Internal MISP references

UUID bcf0f82b-1b26-4c0c-905e-0dd8b88d0903 which can be used as unique global reference for Symantec Briba May 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-21T00:00:00Z
date_published 2012-05-15T00:00:00Z
source MITRE
title Backdoor.Briba

TrendMicro Squiblydoo Aug 2017

Bermejo, L., Giagone, R., Wu, R., and Yarochkin, F. (2017, August 7). Backdoor-carrying Emails Set Sights on Russian-speaking Businesses. Retrieved March 7, 2019.

Internal MISP references

UUID efeb475c-2a7c-4ab6-814d-3ee7866fa322 which can be used as unique global reference for TrendMicro Squiblydoo Aug 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-07T00:00:00Z
date_published 2017-08-07T00:00:00Z
source MITRE
title Backdoor-carrying Emails Set Sights on Russian-speaking Businesses

Symantec Darkmoon Aug 2005

Hayashi, K. (2005, August 18). Backdoor.Darkmoon. Retrieved February 23, 2018.

Internal MISP references

UUID 7088234d-a6fc-49ad-b4fd-2fe8ca333c1d which can be used as unique global reference for Symantec Darkmoon Aug 2005 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-23T00:00:00Z
date_published 2005-08-18T00:00:00Z
source MITRE
title Backdoor.Darkmoon

ESET BackdoorDiplomacy Jun 2021

Adam Burgher. (2021, June 10). BackdoorDiplomacy: Upgrading from Quarian to Turian. Retrieved September 1, 2021

Internal MISP references

UUID 127d4b10-8d61-4bdf-b5b9-7d86bbc065b6 which can be used as unique global reference for ESET BackdoorDiplomacy Jun 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-01T00:00:00Z
date_published 2021-06-10T00:00:00Z
source MITRE, Tidal Cyber
title BackdoorDiplomacy: Upgrading from Quarian to Turian

Backdooring an AWS account

Daniel Grzelak. (2016, July 9). Backdooring an AWS account. Retrieved May 27, 2022.

Internal MISP references

UUID 2c867527-1584-44f7-b5e5-8ca54ea79619 which can be used as unique global reference for Backdooring an AWS account in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-27T00:00:00Z
date_published 2016-07-09T00:00:00Z
source MITRE
title Backdooring an AWS account

Symantec Linfo May 2012

Zhou, R. (2012, May 15). Backdoor.Linfo. Retrieved February 23, 2018.

Internal MISP references

UUID e6b88cd4-a58e-4139-b266-48d0f5957407 which can be used as unique global reference for Symantec Linfo May 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-23T00:00:00Z
date_published 2012-05-15T00:00:00Z
source MITRE
title Backdoor.Linfo

Symantec Backdoor.Mivast

Stama, D.. (2015, February 6). Backdoor.Mivast. Retrieved February 15, 2016.

Internal MISP references

UUID 800780e3-7d00-4cfc-8458-74fe17da2f71 which can be used as unique global reference for Symantec Backdoor.Mivast in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-02-15T00:00:00Z
date_published 2015-02-06T00:00:00Z
source MITRE
title Backdoor.Mivast

Symantec Nerex May 2012

Ladley, F. (2012, May 15). Backdoor.Nerex. Retrieved February 23, 2018.

Internal MISP references

UUID 1613fd6b-4d62-464b-9cda-6f7d3f0192e1 which can be used as unique global reference for Symantec Nerex May 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-23T00:00:00Z
date_published 2012-05-15T00:00:00Z
source MITRE
title Backdoor.Nerex

Symantec Backdoor.Nidiran

Sponchioni, R.. (2016, March 11). Backdoor.Nidiran. Retrieved August 3, 2016.

Internal MISP references

UUID 01852772-c333-47a3-9e3f-e234a87f0b9b which can be used as unique global reference for Symantec Backdoor.Nidiran in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-08-03T00:00:00Z
date_published 2016-03-11T00:00:00Z
source MITRE
title Backdoor.Nidiran

Symantec Remsec IOCs

Symantec Security Response. (2016, August 8). Backdoor.Remsec indicators of compromise. Retrieved August 17, 2016.

Internal MISP references

UUID b00bf616-96e6-42c9-a56c-380047ad5acb which can be used as unique global reference for Symantec Remsec IOCs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-08-17T00:00:00Z
date_published 2016-08-08T00:00:00Z
source MITRE
title Backdoor.Remsec indicators of compromise

Symantec Ristol May 2012

Ladley, F. (2012, May 15). Backdoor.Ritsol. Retrieved February 23, 2018.

Internal MISP references

UUID 1c8b1762-8abd-479b-b78c-43d8c7be7c27 which can be used as unique global reference for Symantec Ristol May 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-23T00:00:00Z
date_published 2012-05-15T00:00:00Z
source MITRE
title Backdoor.Ritsol

Symantec Vasport May 2012

Zhou, R. (2012, May 15). Backdoor.Vasport. Retrieved February 22, 2018.

Internal MISP references

UUID 2dc7d7fb-3d13-4647-b15b-5e501946d606 which can be used as unique global reference for Symantec Vasport May 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-22T00:00:00Z
date_published 2012-05-15T00:00:00Z
source MITRE
title Backdoor.Vasport

FSecure Hupigon

FSecure. (n.d.). Backdoor - W32/Hupigon.EMV - Threat Description. Retrieved December 18, 2017.

Internal MISP references

UUID 08ceb57f-065e-45e9-98e9-d58a92caa755 which can be used as unique global reference for FSecure Hupigon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-18T00:00:00Z
source MITRE
title Backdoor - W32/Hupigon.EMV - Threat Description

Symantec Wiarp May 2012

Zhou, R. (2012, May 15). Backdoor.Wiarp. Retrieved February 22, 2018.

Internal MISP references

UUID 78285833-4b0d-4077-86d2-f34b010a5862 which can be used as unique global reference for Symantec Wiarp May 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-22T00:00:00Z
date_published 2012-05-15T00:00:00Z
source MITRE
title Backdoor.Wiarp

Microsoft Lamin Sept 2017

Microsoft. (2009, May 17). Backdoor:Win32/Lamin.A. Retrieved September 6, 2018.

Internal MISP references

UUID 84b8b159-6e85-4329-8903-aca156f4ed84 which can be used as unique global reference for Microsoft Lamin Sept 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-09-06T00:00:00Z
date_published 2009-05-17T00:00:00Z
source MITRE
title Backdoor:Win32/Lamin.A

Microsoft PoisonIvy 2017

McCormack, M. (2017, September 15). Backdoor:Win32/Poisonivy.E. Retrieved December 21, 2020.

Internal MISP references

UUID fc97a89c-c912-4b0c-b151-916695dbbca4 which can be used as unique global reference for Microsoft PoisonIvy 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-21T00:00:00Z
date_published 2017-09-15T00:00:00Z
source MITRE
title Backdoor:Win32/Poisonivy.E

Microsoft Win Defender Truvasys Sep 2017

Microsoft. (2017, September 15). Backdoor:Win32/Truvasys.A!dha. Retrieved November 30, 2017.

Internal MISP references

UUID 3c8ba6ef-8edc-44bf-9abe-655ba0f45912 which can be used as unique global reference for Microsoft Win Defender Truvasys Sep 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-30T00:00:00Z
date_published 2017-09-15T00:00:00Z
source MITRE
title Backdoor:Win32/Truvasys.A!dha

Microsoft Wingbird Nov 2017

Microsoft. (2017, November 9). Backdoor:Win32/Wingbird.A!dha. Retrieved November 27, 2017.

Internal MISP references

UUID 6c7e2b89-8f3a-443c-9b72-12934b9dc364 which can be used as unique global reference for Microsoft Wingbird Nov 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-27T00:00:00Z
date_published 2017-11-09T00:00:00Z
source MITRE
title Backdoor:Win32/Wingbird.A!dha

Microsoft BITS

Microsoft. (n.d.). Background Intelligent Transfer Service. Retrieved January 12, 2018.

Internal MISP references

UUID 3d925a69-35f3-4337-8e1e-275de4c1783e which can be used as unique global reference for Microsoft BITS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-12T00:00:00Z
source MITRE
title Background Intelligent Transfer Service

NCC Group Research Blog August 19 2022

NCC Group Research Blog. (2022, August 19). Back in Black: Unlocking a LockBit 3.0 Ransomware Attack. Retrieved May 7, 2023.

Internal MISP references

UUID 8c1fbe98-5fc1-4e67-9b96-b740ffc9b1ae which can be used as unique global reference for NCC Group Research Blog August 19 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2022-08-19T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Back in Black: Unlocking a LockBit 3.0 Ransomware Attack

Tech Republic - Restore AWS Snapshots

Hardiman, N.. (2012, March 20). Backing up and restoring snapshots on Amazon EC2 machines. Retrieved October 8, 2019.

Internal MISP references

UUID bfe848a3-c855-4bca-a6ea-44804d48c7eb which can be used as unique global reference for Tech Republic - Restore AWS Snapshots in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-08T00:00:00Z
date_published 2012-03-20T00:00:00Z
source MITRE
title Backing up and restoring snapshots on Amazon EC2 machines

Secureworks COBALT DICKENS August 2018

Counter Threat Unit Research Team. (2018, August 24). Back to School: COBALT DICKENS Targets Universities. Retrieved February 3, 2021.

Internal MISP references

UUID addbb46b-b2b5-4844-b4be-f6294cf51caa which can be used as unique global reference for Secureworks COBALT DICKENS August 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-03T00:00:00Z
date_published 2018-08-24T00:00:00Z
source MITRE
title Back to School: COBALT DICKENS Targets Universities

Cybereason Kimsuky November 2020

Dahan, A. et al. (2020, November 2). Back to the Future: Inside the Kimsuky KGH Spyware Suite. Retrieved November 6, 2020.

Internal MISP references

UUID ecc2f5ad-b2a8-470b-b919-cb184d12d00f which can be used as unique global reference for Cybereason Kimsuky November 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-06T00:00:00Z
date_published 2020-11-02T00:00:00Z
source MITRE, Tidal Cyber
title Back to the Future: Inside the Kimsuky KGH Spyware Suite

Proofpoint TA453 March 2021

Miller, J. et al. (2021, March 30). BadBlood: TA453 Targets US and Israeli Medical Research Personnel in Credential Phishing Campaigns. Retrieved May 4, 2021.

Internal MISP references

UUID 5ba4217c-813b-4cc5-b694-3a4dcad776e4 which can be used as unique global reference for Proofpoint TA453 March 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-05-04T00:00:00Z
date_published 2021-03-30T00:00:00Z
source MITRE
title BadBlood: TA453 Targets US and Israeli Medical Research Personnel in Credential Phishing Campaigns

Unit 42 BadPatch Oct 2017

Bar, T., Conant, S. (2017, October 20). BadPatch. Retrieved November 13, 2018.

Internal MISP references

UUID 9c294bf7-24ba-408a-90b8-5b9885838e1b which can be used as unique global reference for Unit 42 BadPatch Oct 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-13T00:00:00Z
date_published 2017-10-20T00:00:00Z
source MITRE
title BadPatch

ESET Bad Rabbit

M.Léveille, M-E.. (2017, October 24). Bad Rabbit: Not‑Petya is back with improved ransomware. Retrieved January 28, 2021.

Internal MISP references

UUID a9664f01-78f0-4461-a757-12f54ec99a56 which can be used as unique global reference for ESET Bad Rabbit in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-28T00:00:00Z
date_published 2017-10-24T00:00:00Z
source MITRE
title Bad Rabbit: Not‑Petya is back with improved ransomware

Secure List Bad Rabbit

Mamedov, O. Sinitsyn, F. Ivanov, A.. (2017, October 24). Bad Rabbit ransomware. Retrieved January 28, 2021.

Internal MISP references

UUID f4cec03a-ea94-4874-9bea-16189e967ff9 which can be used as unique global reference for Secure List Bad Rabbit in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-28T00:00:00Z
date_published 2017-10-24T00:00:00Z
source MITRE
title Bad Rabbit ransomware

BlackBerry Bahamut

The BlackBerry Research & Intelligence Team. (2020, October). BAHAMUT: Hack-for-Hire Masters of Phishing, Fake News, and Fake Apps. Retrieved February 8, 2021.

Internal MISP references

UUID 872c377b-724b-454c-8432-e38062a7c331 which can be used as unique global reference for BlackBerry Bahamut in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-08T00:00:00Z
date_published 2020-10-01T00:00:00Z
source MITRE
title BAHAMUT: Hack-for-Hire Masters of Phishing, Fake News, and Fake Apps

BaltimoreSun RobbinHood May 2019

Duncan, I., Campbell, C. (2019, May 7). Baltimore city government computer network hit by ransomware attack. Retrieved July 29, 2019.

Internal MISP references

UUID f578de81-ea6b-49d0-9a0a-111e07249cd8 which can be used as unique global reference for BaltimoreSun RobbinHood May 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-07-29T00:00:00Z
date_published 2019-05-07T00:00:00Z
source MITRE
title Baltimore city government computer network hit by ransomware attack

ESET Research Bandook July 7 2021

Fernando Tavella, Matías Porolli. (2021, July 7). Bandidos at large: A spying campaign in Latin America. Retrieved October 25, 2023.

Internal MISP references

UUID da6cac04-a318-4972-bd78-8272116b4ad7 which can be used as unique global reference for ESET Research Bandook July 7 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-25T00:00:00Z
date_published 2021-07-07T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Bandidos at large: A spying campaign in Latin America

CheckPoint Bandook Nov 2020

Check Point. (2020, November 26). Bandook: Signed & Delivered. Retrieved May 31, 2021.

Internal MISP references

UUID 352652a9-86c9-42e1-8ee0-968180c6a51e which can be used as unique global reference for CheckPoint Bandook Nov 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-05-31T00:00:00Z
date_published 2020-11-26T00:00:00Z
source MITRE
title Bandook: Signed & Delivered

Banker Google Chrome Extension Steals Creds

Marinho, R. (n.d.). (Banker(GoogleChromeExtension)).targeting. Retrieved November 18, 2017.

Internal MISP references

UUID 93f37adc-d060-4b35-9a4d-62d2ad61cdf3 which can be used as unique global reference for Banker Google Chrome Extension Steals Creds in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-18T00:00:00Z
source MITRE
title (Banker(GoogleChromeExtension)).targeting

Unit42 Banking Trojans Hooking 2022

Or Chechik. (2022, October 31). Banking Trojan Techniques: How Financially Motivated Malware Became Infrastructure. Retrieved September 27, 2023.

Internal MISP references

UUID 411c3df4-08e6-518a-953d-19988b663dc4 which can be used as unique global reference for Unit42 Banking Trojans Hooking 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-27T00:00:00Z
date_published 2022-10-31T00:00:00Z
source MITRE
title Banking Trojan Techniques: How Financially Motivated Malware Became Infrastructure

Linux manual bash invocation

ArchWiki. (2021, January 19). Bash. Retrieved February 25, 2021.

Internal MISP references

UUID 06185cbd-6635-46c7-9783-67bd8742b66f which can be used as unique global reference for Linux manual bash invocation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-25T00:00:00Z
date_published 2021-01-19T00:00:00Z
source MITRE
title Bash

DieNet Bash

die.net. (n.d.). bash(1) - Linux man page. Retrieved June 12, 2020.

Internal MISP references

UUID c5b362ce-6bae-46f7-b047-e3a0b2bf2580 which can be used as unique global reference for DieNet Bash in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-12T00:00:00Z
source MITRE
title bash(1) - Linux man page

Bash.exe - LOLBAS Project

LOLBAS. (2018, May 25). Bash.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 7d3efbc7-6abf-4f3f-aec8-686100bb90ad which can be used as unique global reference for Bash.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Bash.exe

Bashfuscator Command Obfuscators

LeFevre, A. (n.d.). Bashfuscator Command Obfuscators. Retrieved March 17, 2023.

Internal MISP references

UUID c0256889-3ff0-59de-b0d1-39a947a4c89d which can be used as unique global reference for Bashfuscator Command Obfuscators in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-17T00:00:00Z
source MITRE
title Bashfuscator Command Obfuscators

Microsoft Basic TxF Concepts

Microsoft. (n.d.). Basic TxF Concepts. Retrieved December 20, 2017.

Internal MISP references

UUID 72798536-a7e3-43e2-84e3-b5b8b54f0bca which can be used as unique global reference for Microsoft Basic TxF Concepts in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-20T00:00:00Z
source MITRE
title Basic TxF Concepts

eSentire | BatLoader Continues to Abuse Google Search Ads to Deliver Vidar Stealer and Ursnif

eSentire. (2023, March 9). BatLoader Continues to Abuse Google Search Ads to Deliver Vidar Stealer and Ursnif. Retrieved May 10, 2023.

Internal MISP references

UUID 1bf10604-708f-4c4f-abe5-816768873496 which can be used as unique global reference for eSentire | BatLoader Continues to Abuse Google Search Ads to Deliver Vidar Stealer and Ursnif in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-10T00:00:00Z
date_published 2023-03-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title BatLoader Continues to Abuse Google Search Ads to Deliver Vidar Stealer and Ursnif

BATLOADER: The Evasive Downloader Malware

Bethany Hardin, Lavine Oluoch, Tatiana Vollbrecht. (2022, November 14). BATLOADER: The Evasive Downloader Malware. Retrieved June 5, 2023.

Internal MISP references

UUID 53e12ade-99ed-51ee-b5c8-32180f144658 which can be used as unique global reference for BATLOADER: The Evasive Downloader Malware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-05T00:00:00Z
date_published 2022-11-14T00:00:00Z
source MITRE
title BATLOADER: The Evasive Downloader Malware

AdvIntel Bazar Call August 10 2022

AdvIntel. (2022, August 10). “BazarCall” Advisory: Essential Guide to Attack Vector that Revolutionized Data Breaches. Retrieved June 28, 2024.

Internal MISP references

UUID 5d3dff70-28c2-42a5-bf58-211fe6491fd2 which can be used as unique global reference for AdvIntel Bazar Call August 10 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-28T00:00:00Z
date_published 2022-08-10T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title “BazarCall” Advisory: Essential Guide to Attack Vector that Revolutionized Data Breaches

Palo Alto Networks BBSRAT

Lee, B. Grunzweig, J. (2015, December 22). BBSRAT Attacks Targeting Russian Organizations Linked to Roaming Tiger. Retrieved August 19, 2016.

Internal MISP references

UUID 8c5d61ba-24c5-4f6c-a208-e0a5d23ebb49 which can be used as unique global reference for Palo Alto Networks BBSRAT in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-08-19T00:00:00Z
date_published 2015-12-22T00:00:00Z
source MITRE
title BBSRAT Attacks Targeting Russian Organizations Linked to Roaming Tiger

Microsoft bcdedit 2021

Microsoft. (2021, May 27). bcdedit. Retrieved June 23, 2021.

Internal MISP references

UUID 40dedfcb-f666-4f2d-a518-5cd4ae2e273c which can be used as unique global reference for Microsoft bcdedit 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-23T00:00:00Z
date_published 2021-05-27T00:00:00Z
source MITRE
title bcdedit

Securelist BlackEnergy Nov 2014

Baumgartner, K. and Garnaeva, M.. (2014, November 3). BE2 custom plugins, router abuse, and target profiles. Retrieved March 24, 2016.

Internal MISP references

UUID c64696d0-ee42-41e5-92cb-13cf43fac0c9 which can be used as unique global reference for Securelist BlackEnergy Nov 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-03-24T00:00:00Z
date_published 2014-11-03T00:00:00Z
source MITRE
title BE2 custom plugins, router abuse, and target profiles

Securelist BlackEnergy Feb 2015

Baumgartner, K. and Garnaeva, M.. (2015, February 17). BE2 extraordinary plugins, Siemens targeting, dev fails. Retrieved March 24, 2016.

Internal MISP references

UUID ef043c07-6ae6-4cd2-82cf-7cbdb259f676 which can be used as unique global reference for Securelist BlackEnergy Feb 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-03-24T00:00:00Z
date_published 2015-02-17T00:00:00Z
source MITRE
title BE2 extraordinary plugins, Siemens targeting, dev fails

Crowdstrike DNC June 2016

Alperovitch, D.. (2016, June 15). Bears in the Midst: Intrusion into the Democratic National Committee. Retrieved August 3, 2016.

Internal MISP references

UUID 7f4edc06-ac67-4d71-b39c-5df9ce521bbb which can be used as unique global reference for Crowdstrike DNC June 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-08-03T00:00:00Z
date_published 2016-06-15T00:00:00Z
source MITRE, Tidal Cyber
title Bears in the Midst: Intrusion into the Democratic National Committee

Deep Instinct Black Basta August 2022

Vilkomir-Preisman, S. (2022, August 18). Beating Black Basta Ransomware. Retrieved March 8, 2023.

Internal MISP references

UUID 72b64d7d-f8eb-54d3-83c8-a883906ceea1 which can be used as unique global reference for Deep Instinct Black Basta August 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-08T00:00:00Z
date_published 2022-08-18T00:00:00Z
source MITRE
title Beating Black Basta Ransomware

Bienstock, D. - Defending O365 - 2019

Bienstock, D.. (2019). BECS and Beyond: Investigating and Defending O365. Retrieved September 13, 2019.

Internal MISP references

UUID 4866e6c3-c1b2-4131-bd8f-0ac228168a10 which can be used as unique global reference for Bienstock, D. - Defending O365 - 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-13T00:00:00Z
date_published 2019-01-01T00:00:00Z
source MITRE
title BECS and Beyond: Investigating and Defending O365

Kevin Mandia Statement to US Senate Committee on Intelligence

Kevin Mandia. (2017, March 30). Prepared Statement of Kevin Mandia, CEO of FireEye, Inc. before the United States Senate Select Committee on Intelligence. Retrieved April 19, 2019.

Internal MISP references

UUID c40a3f96-75f4-4b1c-98a5-cb38129c6dc4 which can be used as unique global reference for Kevin Mandia Statement to US Senate Committee on Intelligence in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-19T00:00:00Z
source MITRE
title before the United States Senate Select Committee on Intelligence

Microsoft Dofoil 2018

Windows Defender Research. (2018, March 7). Behavior monitoring combined with machine learning spoils a massive Dofoil coin mining campaign. Retrieved March 20, 2018.

Internal MISP references

UUID 85069317-2c25-448b-9ff4-504e429dc1bf which can be used as unique global reference for Microsoft Dofoil 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-20T00:00:00Z
date_published 2018-03-07T00:00:00Z
source MITRE
title Behavior monitoring combined with machine learning spoils a massive Dofoil coin mining campaign

Obsidian SSPR Abuse 2023

Noah Corradin and Shuyang Wang. (2023, August 1). Behind The Breach: Self-Service Password Reset (SSPR) Abuse in Azure AD. Retrieved March 28, 2024.

Internal MISP references

UUID 7f28f770-ef06-5923-b759-b731ceabe08a which can be used as unique global reference for Obsidian SSPR Abuse 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-28T00:00:00Z
date_published 2023-08-01T00:00:00Z
source MITRE
title Behind The Breach: Self-Service Password Reset (SSPR) Abuse in Azure AD

FireEye CARBANAK June 2017

Bennett, J., Vengerik, B. (2017, June 12). Behind the CARBANAK Backdoor. Retrieved June 11, 2018.

Internal MISP references

UUID 39105492-6044-460c-9dc9-3d4473ee862e which can be used as unique global reference for FireEye CARBANAK June 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-06-11T00:00:00Z
date_published 2017-06-12T00:00:00Z
source MITRE
title Behind the CARBANAK Backdoor

Expel Behind the Scenes

S. Lipton, L. Easterly, A. Randazzo and J. Hencinski. (2020, July 28). Behind the scenes in the Expel SOC: Alert-to-fix in AWS. Retrieved October 1, 2020.

Internal MISP references

UUID d538026c-da30-48d2-bc30-fde3776db1a8 which can be used as unique global reference for Expel Behind the Scenes in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-01T00:00:00Z
date_published 2020-07-28T00:00:00Z
source MITRE
title Behind the scenes in the Expel SOC: Alert-to-fix in AWS

Microsoft BEC Campaign

Carr, N., Sellmer, S. (2021, June 14). Behind the scenes of business email compromise: Using cross-domain threat data to disrupt a large BEC campaign. Retrieved June 15, 2021.

Internal MISP references

UUID 1de8c853-2b0c-439b-a31b-a2c4fa9f4206 which can be used as unique global reference for Microsoft BEC Campaign in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-15T00:00:00Z
date_published 2021-06-14T00:00:00Z
source MITRE
title Behind the scenes of business email compromise: Using cross-domain threat data to disrupt a large BEC campaign

Unit42 BendyBear Feb 2021

Harbison, M. (2021, February 9). BendyBear: Novel Chinese Shellcode Linked With Cyber Espionage Group BlackTech. Retrieved February 16, 2021.

Internal MISP references

UUID f5cbc08f-6f2c-4c81-9d68-07f61e16f138 which can be used as unique global reference for Unit42 BendyBear Feb 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-16T00:00:00Z
date_published 2021-02-09T00:00:00Z
source MITRE
title BendyBear: Novel Chinese Shellcode Linked With Cyber Espionage Group BlackTech

Google Cloud Storage Best Practices, 2019

Google. (2019, September 16). Best practices for Cloud Storage. Retrieved October 4, 2019.

Internal MISP references

UUID 752ad355-0f10-4c8d-bad8-42bf2fc75fa0 which can be used as unique global reference for Google Cloud Storage Best Practices, 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-04T00:00:00Z
date_published 2019-09-16T00:00:00Z
source MITRE
title Best practices for Cloud Storage

AWS Management Account Best Practices

AWS. (n.d.). Best practices for the management account. Retrieved October 16, 2024.

Internal MISP references

UUID f20b5870-d82d-5c50-893a-73248c8f5900 which can be used as unique global reference for AWS Management Account Best Practices in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-16T00:00:00Z
source MITRE
title Best practices for the management account

Shadowbunny VM Defense Evasion

Johann Rehberger. (2020, September 23). Beware of the Shadowbunny - Using virtual machines to persist and evade detections. Retrieved September 22, 2021.

Internal MISP references

UUID eef7cd8a-8cb6-4b24-ba49-9b17353d20b5 which can be used as unique global reference for Shadowbunny VM Defense Evasion in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-22T00:00:00Z
date_published 2020-09-23T00:00:00Z
source MITRE
title Beware of the Shadowbunny - Using virtual machines to persist and evade detections

Akamai Corona Zero-Day August 28 2024

Kyle Lefton, Larry Cashdollar, Aline Eliovich. (2024, August 28). Beware the Unpatchable: Corona Mirai Botnet Spreads via Zero-Day. Retrieved September 5, 2024.

Internal MISP references

UUID 140284f8-075c-4225-99dd-519ba5cebabe which can be used as unique global reference for Akamai Corona Zero-Day August 28 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-05T00:00:00Z
date_published 2024-08-28T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Beware the Unpatchable: Corona Mirai Botnet Spreads via Zero-Day

T1105: Trellix_search-ms

Mathanraj Thangaraju, Sijo Jacob. (2023, July 26). Beyond File Search: A Novel Method for Exploiting the "search-ms" URI Protocol Handler. Retrieved March 15, 2024.

Internal MISP references

UUID 7079d170-9ead-5be4-bbc8-13c3f082b3dd which can be used as unique global reference for T1105: Trellix_search-ms in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-15T00:00:00Z
date_published 2023-07-26T00:00:00Z
source MITRE
title Beyond File Search: A Novel Method for Exploiting the "search-ms" URI Protocol Handler

Hexacorn Office Test

Hexacorn. (2014, April 16). Beyond good ol’ Run key, Part 10. Retrieved July 3, 2017.

Internal MISP references

UUID 60d90852-ea00-404d-b613-9ad1589aff31 which can be used as unique global reference for Hexacorn Office Test in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-03T00:00:00Z
date_published 2014-04-16T00:00:00Z
source MITRE
title Beyond good ol’ Run key, Part 10

Hexacorn Logon Scripts

Hexacorn. (2014, November 14). Beyond good ol’ Run key, Part 18. Retrieved November 15, 2019.

Internal MISP references

UUID bdcdfe9e-1f22-4472-9a86-faefcb5c5618 which can be used as unique global reference for Hexacorn Logon Scripts in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-11-15T00:00:00Z
date_published 2014-11-14T00:00:00Z
source MITRE
title Beyond good ol’ Run key, Part 18

Hexacorn DLL Hijacking

Hexacorn. (2013, December 8). Beyond good ol’ Run key, Part 5. Retrieved August 14, 2024.

Internal MISP references

UUID bbe0690e-f368-5715-8a41-aa95836a5e4c which can be used as unique global reference for Hexacorn DLL Hijacking in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-14T00:00:00Z
date_published 2013-12-08T00:00:00Z
source MITRE
title Beyond good ol’ Run key, Part 5

Hexacorn Office Template Macros

Hexacorn. (2017, April 17). Beyond good ol’ Run key, Part 62. Retrieved July 3, 2017.

Internal MISP references

UUID 7d558a35-a5c0-4e4c-92bf-cb2435c41a95 which can be used as unique global reference for Hexacorn Office Template Macros in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-03T00:00:00Z
date_published 2017-04-17T00:00:00Z
source MITRE
title Beyond good ol’ Run key, Part 62

Bginfo.exe - LOLBAS Project

LOLBAS. (2018, May 25). Bginfo.exe. Retrieved December 4, 2023.

Internal MISP references

UUID ca1eaac2-7449-4a76-bec2-9dc5971fd808 which can be used as unique global reference for Bginfo.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Bginfo.exe

Cyble August 18 2022

Cybleinc. (2022, August 18). BianLian: New Ransomware variant on the rise. Retrieved May 18, 2023.

Internal MISP references

UUID 2de00d16-9b9e-4e03-925f-4fcdae4d6e1a which can be used as unique global reference for Cyble August 18 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-18T00:00:00Z
date_published 2022-08-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title BianLian: New Ransomware variant on the rise

BianLian Ransomware Gang Gives It a Go! | [redacted]

Ben Armstrong, Lauren Pearce, Brad Pittack, Danny Quist. (2022, September 1). BianLian Ransomware Gang Gives It a Go!. Retrieved May 18, 2023.

Internal MISP references

UUID fc1aa979-7dbc-4fff-a8d1-b35a3b2bec3d which can be used as unique global reference for BianLian Ransomware Gang Gives It a Go! | [redacted] in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-18T00:00:00Z
date_published 2022-09-01T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title BianLian Ransomware Gang Gives It a Go!

Group IB APT 41 June 2021

Rostovcev, N. (2021, June 10). Big airline heist APT41 likely behind a third-party attack on Air India. Retrieved August 26, 2021.

Internal MISP references

UUID a2bf43a0-c7da-4cb9-8f9a-b34fac92b625 which can be used as unique global reference for Group IB APT 41 June 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-26T00:00:00Z
date_published 2021-06-10T00:00:00Z
source MITRE
title Big airline heist APT41 likely behind a third-party attack on Air India

Crowdstrike Indrik November 2018

Frankoff, S., Hartley, B. (2018, November 14). Big Game Hunting: The Evolution of INDRIK SPIDER From Dridex Wire Fraud to BitPaymer Targeted Ransomware. Retrieved January 6, 2021.

Internal MISP references

UUID 0f85f611-90db-43ba-8b71-5d0d4ec8cdd5 which can be used as unique global reference for Crowdstrike Indrik November 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-06T00:00:00Z
date_published 2018-11-14T00:00:00Z
source MITRE, Tidal Cyber
title Big Game Hunting: The Evolution of INDRIK SPIDER From Dridex Wire Fraud to BitPaymer Targeted Ransomware

CrowdStrike Ryuk January 2019

Hanel, A. (2019, January 10). Big Game Hunting with Ryuk: Another Lucrative Targeted Ransomware. Retrieved May 12, 2020.

Internal MISP references

UUID df471757-2ce0-48a7-922f-a84c57704914 which can be used as unique global reference for CrowdStrike Ryuk January 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-12T00:00:00Z
date_published 2019-01-10T00:00:00Z
source MITRE, Tidal Cyber
title Big Game Hunting with Ryuk: Another Lucrative Targeted Ransomware

Elastic Binary Executed from Shared Memory Directory

Elastic. (n.d.). Binary Executed from Shared Memory Directory. Retrieved September 24, 2024.

Internal MISP references

UUID 025912f5-531c-5a14-b300-e42f00077264 which can be used as unique global reference for Elastic Binary Executed from Shared Memory Directory in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-24T00:00:00Z
source MITRE
title Binary Executed from Shared Memory Directory

OWASP Binary Planting

OWASP. (2013, January 30). Binary planting. Retrieved June 7, 2016.

Internal MISP references

UUID 86fc5a62-385e-4c56-9812-138db0808fba which can be used as unique global reference for OWASP Binary Planting in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-07T00:00:00Z
date_published 2013-01-30T00:00:00Z
source MITRE
title Binary planting

Wikipedia Binary-to-text Encoding

Wikipedia. (2016, December 26). Binary-to-text encoding. Retrieved March 1, 2017.

Internal MISP references

UUID 9b3820e8-f094-4e87-9ed6-ab0207d509fb which can be used as unique global reference for Wikipedia Binary-to-text Encoding in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-01T00:00:00Z
date_published 2016-12-26T00:00:00Z
source MITRE
title Binary-to-text encoding

Sucuri BIND9 August 2015

Cid, D.. (2015, August 2). BIND9 – Denial of Service Exploit in the Wild. Retrieved April 26, 2019.

Internal MISP references

UUID 5e108782-2f32-4704-be01-055d9e767216 which can be used as unique global reference for Sucuri BIND9 August 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-26T00:00:00Z
date_published 2015-08-02T00:00:00Z
source MITRE
title BIND9 – Denial of Service Exploit in the Wild

Wikipedia BIOS

Wikipedia. (n.d.). BIOS. Retrieved January 5, 2016.

Internal MISP references

UUID 0c4a2cb3-d663-47ee-87af-c5e9e68fe15f which can be used as unique global reference for Wikipedia BIOS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-05T00:00:00Z
source MITRE
title BIOS

Ge 2011

Ge, L. (2011, September 9). BIOS Threat is Showing up Again!. Retrieved November 14, 2014.

Internal MISP references

UUID dd6032fb-8913-4593-81b9-86d1239e01f4 which can be used as unique global reference for Ge 2011 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-14T00:00:00Z
date_published 2011-09-09T00:00:00Z
source MITRE
title BIOS Threat is Showing up Again!

Broadcom BirdyClient Microsoft Graph API 2024

Broadcom. (2024, May 2). BirdyClient malware leverages Microsoft Graph API for C&C communication. Retrieved July 1, 2024.

Internal MISP references

UUID a55197e2-3ed7-5b6f-8ab5-06218c2226a4 which can be used as unique global reference for Broadcom BirdyClient Microsoft Graph API 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-01T00:00:00Z
date_published 2024-05-02T00:00:00Z
source MITRE
title BirdyClient malware leverages Microsoft Graph API for C&C communication

Talos Bisonal Mar 2020

Mercer, W., et al. (2020, March 5). Bisonal: 10 years of play. Retrieved January 26, 2022.

Internal MISP references

UUID eaecccff-e0a0-4fa0-81e5-799b23c26b5a which can be used as unique global reference for Talos Bisonal Mar 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-26T00:00:00Z
date_published 2020-03-05T00:00:00Z
source MITRE
title Bisonal: 10 years of play

Talos Bisonal 10 Years March 2020

Warren Mercer, Paul Rascagneres, Vitor Ventura. (2020, March 6). Bisonal 10 Years of Play. Retrieved October 17, 2021.

Internal MISP references

UUID 6844e59b-d393-43df-9978-e3e3cc7b8db6 which can be used as unique global reference for Talos Bisonal 10 Years March 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-17T00:00:00Z
date_published 2020-03-06T00:00:00Z
source MITRE
title Bisonal 10 Years of Play

Unit 42 Bisonal July 2018

Hayashi, K., Ray, V. (2018, July 31). Bisonal Malware Used in Attacks Against Russia and South Korea. Retrieved August 7, 2018.

Internal MISP references

UUID 30b2ec12-b785-43fb-ab72-b37387046d15 which can be used as unique global reference for Unit 42 Bisonal July 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-07T00:00:00Z
date_published 2018-07-31T00:00:00Z
source MITRE
title Bisonal Malware Used in Attacks Against Russia and South Korea

Bitsadmin.exe - LOLBAS Project

LOLBAS. (2018, May 25). Bitsadmin.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 89bdc17b-553c-4245-acde-f6c56602e357 which can be used as unique global reference for Bitsadmin.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Bitsadmin.exe

Microsoft BITSAdmin

Microsoft. (n.d.). BITSAdmin Tool. Retrieved January 12, 2018.

Internal MISP references

UUID 5b8c2a8c-f01e-491a-aaf9-504ee7a1caed which can be used as unique global reference for Microsoft BITSAdmin in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-12T00:00:00Z
source MITRE
title BITSAdmin Tool

Cisco Talos Bitter Bangladesh May 2022

Raghuprasad, C . (2022, May 11). Bitter APT adds Bangladesh to their targets. Retrieved June 1, 2022.

Internal MISP references

UUID 097583ed-03b0-41cd-bf85-66d473f46439 which can be used as unique global reference for Cisco Talos Bitter Bangladesh May 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-01T00:00:00Z
date_published 2022-05-11T00:00:00Z
source MITRE
title Bitter APT adds Bangladesh to their targets

Forcepoint BITTER Pakistan Oct 2016

Dela Paz, R. (2016, October 21). BITTER: a targeted attack against Pakistan. Retrieved June 1, 2022.

Internal MISP references

UUID 9fc54fb0-b7d9-49dc-b6dd-ab4cb2cd34fa which can be used as unique global reference for Forcepoint BITTER Pakistan Oct 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-01T00:00:00Z
date_published 2016-10-21T00:00:00Z
source MITRE
title BITTER: a targeted attack against Pakistan

Camba RARSTONE

Camba, A. (2013, February 27). BKDR_RARSTONE: New RAT to Watch Out For. Retrieved January 8, 2016.

Internal MISP references

UUID bca93846-457d-4644-ba43-f9293982916f which can be used as unique global reference for Camba RARSTONE in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-08T00:00:00Z
date_published 2013-02-27T00:00:00Z
source MITRE
title BKDR_RARSTONE: New RAT to Watch Out For

TrendMicro BKDR_URSNIF.SM

Sioting, S. (2013, June 15). BKDR_URSNIF.SM. Retrieved June 5, 2019.

Internal MISP references

UUID aa791512-039e-4230-ab49-f184ca0e38c5 which can be used as unique global reference for TrendMicro BKDR_URSNIF.SM in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-05T00:00:00Z
date_published 2013-06-15T00:00:00Z
source MITRE
title BKDR_URSNIF.SM

Cyble September 28 2022

Cybleinc. (2023, September 28). Bl00dy – New Ransomware Strain Active in the Wild. Retrieved August 3, 2023.

Internal MISP references

UUID ae2daa9c-6741-4ab7-854d-bee1170b3d7a which can be used as unique global reference for Cyble September 28 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-03T00:00:00Z
date_published 2023-09-28T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Bl00dy – New Ransomware Strain Active in the Wild

Trend Micro Pikabot January 9 2024

Shinji Robert Arasawa, Joshua Aquino, Charles Steven Derion, Juhn Emmanuel Atanque, Francisrey Joshua Castillo, John Carlo Marquez, Henry Salcedo, John Rainier Navato, Arianne Dela Cruz, Raymart Yambot, Ian Kenefick. (2024, January 9). Black Basta-Affiliated Water Curupira’s Pikabot Spam Campaign. Retrieved January 11, 2024.

Internal MISP references

UUID dc7d882b-4e83-42da-8e2f-f557b675930a which can be used as unique global reference for Trend Micro Pikabot January 9 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-11T00:00:00Z
date_published 2024-01-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Black Basta-Affiliated Water Curupira’s Pikabot Spam Campaign

TrendMicro Pikabot 2024

Shinji Robert Arasawa, Joshua Aquino, Charles Steven Derion, Juhn Emmanuel Atanque, Francisrey Joshua Castillo, John Carlo Marquez, Henry Salcedo, John Rainier Navato, Arianne Dela Cruz, Raymart Yambot & Ian Kenefick. (2024, January 9). Black Basta-Affiliated Water Curupira’s Pikabot Spam Campaign. Retrieved July 17, 2024.

Internal MISP references

UUID a2a22246-d49e-5847-9d20-dac64f1df3ea which can be used as unique global reference for TrendMicro Pikabot 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-17T00:00:00Z
date_published 2024-01-09T00:00:00Z
source MITRE
title Black Basta-Affiliated Water Curupira’s Pikabot Spam Campaign

Check Point Black Basta October 2022

Check Point. (2022, October 20). BLACK BASTA AND THE UNNOTICED DELIVERY. Retrieved March 8, 2023.

Internal MISP references

UUID 7a00457b-ae72-5aea-904f-9ca7f4cb9fe9 which can be used as unique global reference for Check Point Black Basta October 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-08T00:00:00Z
date_published 2022-10-20T00:00:00Z
source MITRE
title BLACK BASTA AND THE UNNOTICED DELIVERY

BlackBasta

Antonio Cocomazzi and Antonio Pirozzi. (2022, November 3). Black Basta Ransomware | Attacks Deploy Custom EDR Evasion Tools Tied to FIN7 Threat Actor. Retrieved March 14, 2023.

Internal MISP references

UUID c7e55e37-d051-5111-8d0a-738656f88650 which can be used as unique global reference for BlackBasta in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-14T00:00:00Z
date_published 2022-11-03T00:00:00Z
source MITRE
title Black Basta Ransomware

Trend Micro Black Basta October 2022

Kenefick, I. et al. (2022, October 12). Black Basta Ransomware Gang Infiltrates Networks via QAKBOT, Brute Ratel, and Cobalt Strike. Retrieved February 6, 2023.

Internal MISP references

UUID 6e4a1565-4a30-5a6b-961c-226a6f1967ae which can be used as unique global reference for Trend Micro Black Basta October 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-06T00:00:00Z
date_published 2022-10-12T00:00:00Z
source MITRE
title Black Basta Ransomware Gang Infiltrates Networks via QAKBOT, Brute Ratel, and Cobalt Strike

Uptycs Black Basta ESXi June 2022

Sharma, S. and Hegde, N. (2022, June 7). Black basta Ransomware Goes Cross-Platform, Now Targets ESXi Systems. Retrieved March 8, 2023.

Internal MISP references

UUID a8145e38-c2a4-5021-824d-5a831299b9d9 which can be used as unique global reference for Uptycs Black Basta ESXi June 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-08T00:00:00Z
date_published 2022-06-07T00:00:00Z
source MITRE
title Black basta Ransomware Goes Cross-Platform, Now Targets ESXi Systems

Elliptic Black Basta November 29 2023

Elliptic Research. (2023, November 29). Black Basta ransomware victims have paid over $100 million. Retrieved May 14, 2024.

Internal MISP references

UUID dc7579c0-911d-417d-bba5-bc36e078b640 which can be used as unique global reference for Elliptic Black Basta November 29 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-14T00:00:00Z
date_published 2023-11-29T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Black Basta ransomware victims have paid over $100 million

BlackBerry Black Basta May 2022

Ballmer, D. (2022, May 6). Black Basta: Rebrand of Conti or Something New?. Retrieved March 7, 2023.

Internal MISP references

UUID 32a272fe-ac10-5478-88a0-b3dd366ec540 which can be used as unique global reference for BlackBerry Black Basta May 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-07T00:00:00Z
date_published 2022-05-06T00:00:00Z
source MITRE
title Black Basta: Rebrand of Conti or Something New?

WMI 6

Microsoft. (2022, June 13). BlackCat. Retrieved February 13, 2024.

Internal MISP references

UUID df07a086-0d38-570b-b0c5-9f5061212db7 which can be used as unique global reference for WMI 6 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-13T00:00:00Z
date_published 2022-06-13T00:00:00Z
source MITRE
title BlackCat

FBI BlackCat April 19 2022

FBI. (2022, April 19). BlackCat/ALPHV Ransomware Indicators of Compromise. Retrieved September 14, 2023.

Internal MISP references

UUID 2640b58c-8413-4691-80e1-33aec9b6c7f6 which can be used as unique global reference for FBI BlackCat April 19 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-14T00:00:00Z
date_published 2022-04-19T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title BlackCat/ALPHV Ransomware Indicators of Compromise

X-Force BlackCat May 30 2023

IBM Security X-Force Team. (2023, May 30). BlackCat (ALPHV) ransomware levels up for stealth, speed and exfiltration. Retrieved September 14, 2023.

Internal MISP references

UUID b80c1f70-9d05-4f4b-bdc2-6157c6837202 which can be used as unique global reference for X-Force BlackCat May 30 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-14T00:00:00Z
date_published 2023-05-30T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title BlackCat (ALPHV) ransomware levels up for stealth, speed and exfiltration

BlackBerry BlackCat Threat Overview

BlackBerry. (n.d.). BlackCat Malware (AKA ALPHV). Retrieved September 14, 2023.

Internal MISP references

UUID 59f98ae1-c62d-460f-8d2a-9ae287b59953 which can be used as unique global reference for BlackBerry BlackCat Threat Overview in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title BlackCat Malware (AKA ALPHV)

Huntress BlackCat

Carvey, H. (2024, February 28). BlackCat Ransomware Affiliate TTPs. Retrieved March 27, 2024.

Internal MISP references

UUID faa60cf9-0fc5-5728-90be-d0e11b48a921 which can be used as unique global reference for Huntress BlackCat in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-27T00:00:00Z
date_published 2024-02-28T00:00:00Z
source MITRE
title BlackCat Ransomware Affiliate TTPs

Sophos BlackCat Jul 2022

Brandt, Andrew. (2022, July 14). BlackCat ransomware attacks not merely a byproduct of bad luck. Retrieved December 20, 2022.

Internal MISP references

UUID 481a0106-d5b6-532c-8f5b-6c0c477185f4 which can be used as unique global reference for Sophos BlackCat Jul 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-12-20T00:00:00Z
date_published 2022-07-14T00:00:00Z
source MITRE
title BlackCat ransomware attacks not merely a byproduct of bad luck

ESEST Black Energy Jan 2016

Cherepanov, A.. (2016, January 3). BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry. Retrieved May 18, 2016.

Internal MISP references

UUID 4d626eb9-3722-4aa4-b95e-1650cc2865c2 which can be used as unique global reference for ESEST Black Energy Jan 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-05-18T00:00:00Z
date_published 2016-01-03T00:00:00Z
source MITRE
title BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry

ESET BlackEnergy Jan 2016

Cherepanov, A.. (2016, January 3). BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry . Retrieved June 10, 2020.

Internal MISP references

UUID a0103079-c966-46b6-8871-c01f7f0eea4c which can be used as unique global reference for ESET BlackEnergy Jan 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-10T00:00:00Z
date_published 2016-01-03T00:00:00Z
source MITRE
title BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry

F-Secure BlackEnergy 2014

F-Secure Labs. (2014). BlackEnergy & Quedagh: The convergence of crimeware and APT attacks. Retrieved March 24, 2016.

Internal MISP references

UUID 5f228fb5-d959-4c4a-bb8c-f9dc01d5af07 which can be used as unique global reference for F-Secure BlackEnergy 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-03-24T00:00:00Z
date_published 2014-01-01T00:00:00Z
source MITRE
title BlackEnergy & Quedagh: The convergence of crimeware and APT attacks

ESET BlackLotus March 01 2023

Martin Smolár. (2023, March 1). BlackLotus UEFI bootkit: Myth confirmed. Retrieved September 29, 2023.

Internal MISP references

UUID 1a4c134b-c701-400f-beee-e6b3cc835042 which can be used as unique global reference for ESET BlackLotus March 01 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-29T00:00:00Z
date_published 2023-03-01T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title BlackLotus UEFI bootkit: Myth confirmed

Securelist BlackOasis Oct 2017

Kaspersky Lab's Global Research & Analysis Team. (2017, October 16). BlackOasis APT and new targeted attacks leveraging zero-day exploit. Retrieved February 15, 2018.

Internal MISP references

UUID 66121c37-6b66-4ab2-9f63-1adb80dcec62 which can be used as unique global reference for Securelist BlackOasis Oct 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-15T00:00:00Z
date_published 2017-10-16T00:00:00Z
source MITRE, Tidal Cyber
title BlackOasis APT and new targeted attacks leveraging zero-day exploit

ReliaQuest May 28 2024

ReliaQuest Threat Research Team. (2024, May 28). BlackSuit Attack Analysis - ReliaQuest. Retrieved June 5, 2024.

Internal MISP references

UUID 2a67b1df-9a15-487e-a777-8a3fe46b0179 which can be used as unique global reference for ReliaQuest May 28 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-05T00:00:00Z
date_published 2024-05-28T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title BlackSuit Attack Analysis - ReliaQuest

HC3 Analyst Note BlackSuit Ransomware November 2023

Health Sector Cybersecurity Coordination Center (HC3). (2023, November 6). BlackSuit Ransomware. Retrieved June 7, 2024.

Internal MISP references

UUID d956f0c6-d90e-49e8-a64c-a46bfc177cc6 which can be used as unique global reference for HC3 Analyst Note BlackSuit Ransomware November 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-07T00:00:00Z
date_published 2023-11-06T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title BlackSuit Ransomware

Cyble May 12 2023

Cybleinc. (2023, May 12). BlackSuit Ransomware Strikes Windows and Linux Users. Retrieved January 1, 2024.

Internal MISP references

UUID 7e335494-86a7-49cd-a9f3-783d73c36d9d which can be used as unique global reference for Cyble May 12 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-01T00:00:00Z
date_published 2023-05-12T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title BlackSuit Ransomware Strikes Windows and Linux Users

Palo Alto Black-T October 2020

Quist, N. (2020, October 5). Black-T: New Cryptojacking Variant from TeamTNT. Retrieved September 22, 2021.

Internal MISP references

UUID d4351c8e-026d-4660-9344-166481ecf64a which can be used as unique global reference for Palo Alto Black-T October 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-22T00:00:00Z
date_published 2020-10-05T00:00:00Z
source MITRE
title Black-T: New Cryptojacking Variant from TeamTNT

BlackWater Malware Cloudflare Workers

Lawrence Abrams. (2020, March 14). BlackWater Malware Abuses Cloudflare Workers for C2 Communication. Retrieved July 8, 2022.

Internal MISP references

UUID 053895e8-da3f-4291-a728-2198fde774e7 which can be used as unique global reference for BlackWater Malware Cloudflare Workers in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-08T00:00:00Z
date_published 2020-03-14T00:00:00Z
source MITRE
title BlackWater Malware Abuses Cloudflare Workers for C2 Communication

NHS UK BLINDINGCAN Aug 2020

NHS Digital . (2020, August 20). BLINDINGCAN Remote Access Trojan. Retrieved August 20, 2020.

Internal MISP references

UUID acca4c89-acce-4916-88b6-f4dac7d8ab19 which can be used as unique global reference for NHS UK BLINDINGCAN Aug 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-20T00:00:00Z
date_published 2020-08-20T00:00:00Z
source MITRE
title BLINDINGCAN Remote Access Trojan

Azure Blob Snapshots

Microsoft Azure. (2021, December 29). Blob snapshots. Retrieved March 2, 2022.

Internal MISP references

UUID 152628ab-3244-4cc7-a68e-a220b652039b which can be used as unique global reference for Azure Blob Snapshots in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-02T00:00:00Z
date_published 2021-12-29T00:00:00Z
source MITRE
title Blob snapshots

objsee block blocking login items

Patrick Wardle. (2018, July 23). Block Blocking Login Items. Retrieved October 1, 2021.

Internal MISP references

UUID 76511800-8331-476b-ab4f-0daa587f5e22 which can be used as unique global reference for objsee block blocking login items in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-01T00:00:00Z
date_published 2018-07-23T00:00:00Z
source MITRE
title Block Blocking Login Items

Technospot Chrome Extensions GP

Mohta, A. (n.d.). Block Chrome Extensions using Google Chrome Group Policy Settings. Retrieved January 10, 2018.

Internal MISP references

UUID 76faf20c-27d3-4e67-8ab7-8480f8f88ae5 which can be used as unique global reference for Technospot Chrome Extensions GP in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-10T00:00:00Z
source MITRE
title Block Chrome Extensions using Google Chrome Group Policy Settings

Evi1cg Forfiles Nov 2017

Evi1cg. (2017, November 26). block cmd.exe ? try this :. Retrieved September 12, 2024.

Internal MISP references

UUID b292b85e-68eb-43c3-9b5b-222810e2f26a which can be used as unique global reference for Evi1cg Forfiles Nov 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2017-11-26T00:00:00Z
source MITRE
title block cmd.exe ? try this :

Fifield Blocking Resistent Communication through domain fronting 2015

David Fifield, Chang Lan, Rod Hynes, Percy Wegmann, and Vern Paxson. (2015). Blocking-resistant communication through domain fronting. Retrieved November 20, 2017.

Internal MISP references

UUID 52671075-c425-40c7-a49a-b75e44a0c58a which can be used as unique global reference for Fifield Blocking Resistent Communication through domain fronting 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-20T00:00:00Z
date_published 2015-01-01T00:00:00Z
source MITRE
title Blocking-resistant communication through domain fronting

GitHub Bloodhound

Robbins, A., Vazarkar, R., and Schroeder, W. (2016, April 17). Bloodhound: Six Degrees of Domain Admin. Retrieved March 5, 2019.

Internal MISP references

UUID e90b4941-5dff-4f38-b4dd-af3426fd621e which can be used as unique global reference for GitHub Bloodhound in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-05T00:00:00Z
date_published 2016-04-17T00:00:00Z
source MITRE
title Bloodhound: Six Degrees of Domain Admin

PwC Blue Callisto December 6 2022

PwC Threat Intelligence. (2022, December 6). Blue Callisto orbits around US Laboratories in 2022. Retrieved October 1, 2024.

Internal MISP references

UUID ab48a205-ca06-4328-96a4-876007024a7d which can be used as unique global reference for PwC Blue Callisto December 6 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-01T00:00:00Z
date_published 2022-12-06T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Blue Callisto orbits around US Laboratories in 2022

Blue Cloud of Death

Kunz, Bryce. (2018, May 11). Blue Cloud of Death: Red Teaming Azure. Retrieved October 23, 2019.

Internal MISP references

UUID 0c764280-9d8c-4fa4-9088-170f02550d4c which can be used as unique global reference for Blue Cloud of Death in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-23T00:00:00Z
date_published 2018-05-11T00:00:00Z
source MITRE
title Blue Cloud of Death: Red Teaming Azure

Blue Cloud of Death Video

Kunz, Bruce. (2018, October 14). Blue Cloud of Death: Red Teaming Azure. Retrieved November 21, 2019.

Internal MISP references

UUID 39b0adf6-c71e-4501-b8bb-fab82718486b which can be used as unique global reference for Blue Cloud of Death Video in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-11-21T00:00:00Z
date_published 2018-10-14T00:00:00Z
source MITRE
title Blue Cloud of Death: Red Teaming Azure

1 - appv

SEONGSU PARK. (2022, December 27). BlueNoroff introduces new methods bypassing MoTW. Retrieved February 6, 2024.

Internal MISP references

UUID acdf0a7f-f341-5bec-bfe0-f879827f0185 which can be used as unique global reference for 1 - appv in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-06T00:00:00Z
date_published 2022-12-27T00:00:00Z
source MITRE
title BlueNoroff introduces new methods bypassing MoTW

apple doco bonjour description

Apple Inc. (2013, April 23). Bonjour Overview. Retrieved October 11, 2021.

Internal MISP references

UUID b8538d67-ab91-41c2-9cc3-a7b00c6b372a which can be used as unique global reference for apple doco bonjour description in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-11T00:00:00Z
date_published 2013-04-23T00:00:00Z
source MITRE
title Bonjour Overview

Booby Trap Shortcut 2017

Weyne, F. (2017, April). Booby trap a shortcut with a backdoor. Retrieved October 3, 2023.

Internal MISP references

UUID 1a820fb8-3cff-584b-804f-9bad0592873b which can be used as unique global reference for Booby Trap Shortcut 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-03T00:00:00Z
date_published 2017-04-01T00:00:00Z
source MITRE
title Booby trap a shortcut with a backdoor

Microsoft Bootcfg

Gerend, J. et al. (2017, October 16). bootcfg. Retrieved August 30, 2021.

Internal MISP references

UUID 44ffaa60-4461-4463-a1b5-abc868368c0a which can be used as unique global reference for Microsoft Bootcfg in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-30T00:00:00Z
date_published 2017-10-16T00:00:00Z
source MITRE
title bootcfg

Imperva DDoS for Hire

Imperva. (n.d.). Booters, Stressers and DDoSers. Retrieved October 4, 2020.

Internal MISP references

UUID 86f87ec6-058e-45a7-9314-0579a2b4e8f2 which can be used as unique global reference for Imperva DDoS for Hire in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-04T00:00:00Z
source MITRE
title Booters, Stressers and DDoSers

Wikipedia Booting

Wikipedia. (n.d.). Booting. Retrieved November 13, 2019.

Internal MISP references

UUID 6d9c72cb-6cda-445e-89ea-7e695063d49a which can be used as unique global reference for Wikipedia Booting in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-11-13T00:00:00Z
source MITRE
title Booting

FireEye BOOTRASH SANS

Glyer, C.. (2017, June 22). Boot What?. Retrieved May 4, 2020.

Internal MISP references

UUID 835c9e5d-b291-43d9-9b8a-2978aa8c8cd3 which can be used as unique global reference for FireEye BOOTRASH SANS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-04T00:00:00Z
date_published 2017-06-22T00:00:00Z
source MITRE
title Boot What?

Unit42 LockerGoga 2019

Harbison, M. (2019, March 26). Born This Way? Origins of LockerGoga. Retrieved April 16, 2019.

Internal MISP references

UUID 8f058923-f2f7-4c0e-b90a-c7a0d5e62186 which can be used as unique global reference for Unit42 LockerGoga 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-16T00:00:00Z
date_published 2019-03-26T00:00:00Z
source MITRE
title Born This Way? Origins of LockerGoga

Threatexpress MetaTwin 2017

Vest, J. (2017, October 9). Borrowing Microsoft MetaData and Signatures to Hide Binary Payloads. Retrieved September 10, 2019.

Internal MISP references

UUID 156efefd-793f-4219-8904-ef160a45c9ec which can be used as unique global reference for Threatexpress MetaTwin 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-10T00:00:00Z
date_published 2017-10-09T00:00:00Z
source MITRE
title Borrowing Microsoft MetaData and Signatures to Hide Binary Payloads

Sandfly BPFDoor 2022

The Sandfly Security Team. (2022, May 11). BPFDoor - An Evasive Linux Backdoor Technical Analysis. Retrieved September 29, 2023.

Internal MISP references

UUID 01c8337f-614b-5f63-870f-5c880b390922 which can be used as unique global reference for Sandfly BPFDoor 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-29T00:00:00Z
date_published 2022-05-11T00:00:00Z
source MITRE
title BPFDoor - An Evasive Linux Backdoor Technical Analysis

Deep Instinct BPFDoor 2023

Shaul Vilkomir-Preisman and Eliran Nissan. (2023, May 10). BPFDoor Malware Evolves – Stealthy Sniffing Backdoor Ups Its Game. Retrieved September 19, 2024.

Internal MISP references

UUID c246b4da-75fb-5b41-ba9c-c0eb1b261e37 which can be used as unique global reference for Deep Instinct BPFDoor 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-19T00:00:00Z
date_published 2023-05-10T00:00:00Z
source MITRE
title BPFDoor Malware Evolves – Stealthy Sniffing Backdoor Ups Its Game

AADInternals - BPRT

Dr. Nestori Syynimaa. (2021, January 31). BPRT unleashed: Joining multiple devices to Azure AD and Intune. Retrieved March 4, 2022.

Internal MISP references

UUID 19af3fce-eb57-4e67-9678-1968e9ea9677 which can be used as unique global reference for AADInternals - BPRT in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-04T00:00:00Z
date_published 2021-01-31T00:00:00Z
source MITRE
title BPRT unleashed: Joining multiple devices to Azure AD and Intune

Brazking-Websockets

Shahar Tavor. (n.d.). BrazKing Android Malware Upgraded and Targeting Brazilian Banks. Retrieved March 24, 2023.

Internal MISP references

UUID fa813afd-b8f0-535b-9108-6d3d3989b6b9 which can be used as unique global reference for Brazking-Websockets in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-24T00:00:00Z
source MITRE
title BrazKing Android Malware Upgraded and Targeting Brazilian Banks

Morphisec 3 26 2024

Arnold Osipov. (2024, March 26). Breaking Boundaries Mispadu's Infiltration Beyond LATAM. Retrieved April 4, 2024.

Internal MISP references

UUID 38d88851-1b71-4ed7-88e3-2ee5c3876c06 which can be used as unique global reference for Morphisec 3 26 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-04T00:00:00Z
date_published 2024-03-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Breaking Boundaries Mispadu's Infiltration Beyond LATAM

MSTIC Nobelium Toolset May 2021

MSTIC. (2021, May 28). Breaking down NOBELIUM’s latest early-stage toolset. Retrieved August 4, 2021.

Internal MISP references

UUID 52464e69-ff9e-4101-9596-dd0c6404bf76 which can be used as unique global reference for MSTIC Nobelium Toolset May 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-04T00:00:00Z
date_published 2021-05-28T00:00:00Z
source MITRE
title Breaking down NOBELIUM’s latest early-stage toolset

Lee 2013

Lee, T., Hanzlik, D., Ahl, I. (2013, August 7). Breaking Down the China Chopper Web Shell - Part I. Retrieved March 27, 2015.

Internal MISP references

UUID 6d1e2b0a-fed2-490b-be25-6580dfb7d6aa which can be used as unique global reference for Lee 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-03-27T00:00:00Z
date_published 2013-08-07T00:00:00Z
source MITRE
title Breaking Down the China Chopper Web Shell - Part I

sentinelone-malvertising

Hegel, Tom. (2023, January 19). Breaking Down the SEO Poisoning Attack | How Attackers Are Hijacking Search Results. Retrieved February 21, 2023.

Internal MISP references

UUID 7989f0de-90b8-5e6d-bc20-1764610d1568 which can be used as unique global reference for sentinelone-malvertising in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-21T00:00:00Z
date_published 2023-01-19T00:00:00Z
source MITRE
title Breaking Down the SEO Poisoning Attack

OS X Keychain

Juuso Salonen. (2012, September 5). Breaking into the OS X keychain. Retrieved July 15, 2017.

Internal MISP references

UUID bde3ff9c-fbf9-49c4-b414-70dc8356d57d which can be used as unique global reference for OS X Keychain in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-15T00:00:00Z
date_published 2012-09-05T00:00:00Z
source MITRE
title Breaking into the OS X keychain

Brown Exploiting Linkers

Tim Brown. (2011, June 29). Breaking the links: Exploiting the linker. Retrieved March 29, 2021.

Internal MISP references

UUID 24674e91-5cbf-4023-98ae-a9f0968ad99a which can be used as unique global reference for Brown Exploiting Linkers in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-29T00:00:00Z
date_published 2011-06-29T00:00:00Z
source MITRE
title Breaking the links: Exploiting the linker

FireEye Outlook Dec 2019

McWhirt, M., Carr, N., Bienstock, D. (2019, December 4). Breaking the Rules: A Tough Outlook for Home Page Attacks (CVE-2017-11774). Retrieved June 23, 2020.

Internal MISP references

UUID f23a773f-9c50-4193-877d-97f7c13f48f1 which can be used as unique global reference for FireEye Outlook Dec 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-23T00:00:00Z
date_published 2019-12-04T00:00:00Z
source MITRE
title Breaking the Rules: A Tough Outlook for Home Page Attacks (CVE-2017-11774)

Cisco Talos Blog December 08 2022

Cisco Talos Blog. (2022, December 8). Breaking the silence - Recent Truebot activity. Retrieved May 8, 2023.

Internal MISP references

UUID bcf92374-48a3-480f-a679-9fd34b67bcdd which can be used as unique global reference for Cisco Talos Blog December 08 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-08T00:00:00Z
date_published 2022-12-08T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Breaking the silence - Recent Truebot activity

PaloAlto Preventing Opportunistic Attacks Apr 2016

Kiwi. (2016, April 6). Breakout Recap: Cybersecurity Best Practices Part 1 - Preventing Opportunistic Attacks. Retrieved October 3, 2018.

Internal MISP references

UUID 60fac434-2815-4568-b951-4bde55c2e3af which can be used as unique global reference for PaloAlto Preventing Opportunistic Attacks Apr 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-10-03T00:00:00Z
date_published 2016-04-06T00:00:00Z
source MITRE
title Breakout Recap: Cybersecurity Best Practices Part 1 - Preventing Opportunistic Attacks

Mandiant BYOL

Kirk, N. (2018, June 18). Bring Your Own Land (BYOL) – A Novel Red Teaming Technique. Retrieved October 4, 2021.

Internal MISP references

UUID 445efe8b-659a-4023-afc7-aa7cd21ee5a1 which can be used as unique global reference for Mandiant BYOL in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-04T00:00:00Z
date_published 2018-06-18T00:00:00Z
source MITRE
title Bring Your Own Land (BYOL) – A Novel Red Teaming Technique

Mandiant BYOL 2018

Kirk, N. (2018, June 18). Bring Your Own Land (BYOL) – A Novel Red Teaming Technique. Retrieved October 8, 2021.

Internal MISP references

UUID 104a1c1c-0899-4ff9-a5c4-73de702c467d which can be used as unique global reference for Mandiant BYOL 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-08T00:00:00Z
date_published 2018-06-18T00:00:00Z
source MITRE
title Bring Your Own Land (BYOL) – A Novel Red Teaming Technique

Comparitech Leak

Bischoff, P. (2020, October 15). Broadvoice database of more than 350 million customer records exposed online. Retrieved October 20, 2020.

Internal MISP references

UUID fa0eac56-45ea-4628-88cf-b843874b4a4d which can be used as unique global reference for Comparitech Leak in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
date_published 2020-10-15T00:00:00Z
source MITRE
title Broadvoice database of more than 350 million customer records exposed online

ThreatPost Broadvoice Leak

Seals, T. (2020, October 15). Broadvoice Leak Exposes 350M Records, Personal Voicemail Transcripts. Retrieved October 20, 2020.

Internal MISP references

UUID 91d20979-d4e7-4372-8a83-1e1512c8d3a9 which can be used as unique global reference for ThreatPost Broadvoice Leak in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
date_published 2020-10-15T00:00:00Z
source MITRE
title Broadvoice Leak Exposes 350M Records, Personal Voicemail Transcripts

Secureworks BRONZE BUTLER Oct 2017

Counter Threat Unit Research Team. (2017, October 12). BRONZE BUTLER Targets Japanese Enterprises. Retrieved January 4, 2018.

Internal MISP references

UUID c62d8d1a-cd1b-4b39-95b6-68f3f063dacf which can be used as unique global reference for Secureworks BRONZE BUTLER Oct 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-04T00:00:00Z
date_published 2017-10-12T00:00:00Z
source MITRE, Tidal Cyber
title BRONZE BUTLER Targets Japanese Enterprises

Secureworks BRONZE FLEETWOOD Profile

Secureworks CTU. (n.d.). BRONZE FLEETWOOD. Retrieved February 5, 2024.

Internal MISP references

UUID 4fbb113c-94b4-56fd-b292-1ccf84e1c8f3 which can be used as unique global reference for Secureworks BRONZE FLEETWOOD Profile in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-05T00:00:00Z
source MITRE
title BRONZE FLEETWOOD

Secureworks BRONZE HUNTLEY

Secureworks. (2021, January 1). BRONZE HUNTLEY Threat Profile. Retrieved May 5, 2021.

Internal MISP references

UUID 9558ebc5-4de3-4b1d-b32c-a170adbc3451 which can be used as unique global reference for Secureworks BRONZE HUNTLEY in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-05-05T00:00:00Z
date_published 2021-01-01T00:00:00Z
source MITRE
title BRONZE HUNTLEY Threat Profile

Secureworks BRONZE PRESIDENT December 2019

Counter Threat Unit Research Team. (2019, December 29). BRONZE PRESIDENT Targets NGOs. Retrieved April 13, 2021.

Internal MISP references

UUID 019889e0-a2ce-476f-9a31-2fc394de2821 which can be used as unique global reference for Secureworks BRONZE PRESIDENT December 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-13T00:00:00Z
date_published 2019-12-29T00:00:00Z
source MITRE, Tidal Cyber
title BRONZE PRESIDENT Targets NGOs

Dell SecureWorks BRONZE STARLIGHT Profile

SecureWorks. (n.d.). BRONZE STARLIGHT. Retrieved December 6, 2023.

Internal MISP references

UUID d2e8cd95-fcd5-58e4-859a-c4724ec94ab4 which can be used as unique global reference for Dell SecureWorks BRONZE STARLIGHT Profile in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-06T00:00:00Z
source MITRE
title BRONZE STARLIGHT

SecureWorks BRONZE STARLIGHT Ransomware Operations June 2022

Counter Threat Unit Research Team . (2022, June 23). BRONZE STARLIGHT RANSOMWARE OPERATIONS USE HUI LOADER. Retrieved December 7, 2023.

Internal MISP references

UUID 0b275cf9-a885-58cc-b859-112090a711e3 which can be used as unique global reference for SecureWorks BRONZE STARLIGHT Ransomware Operations June 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-07T00:00:00Z
date_published 2022-06-23T00:00:00Z
source MITRE
title BRONZE STARLIGHT RANSOMWARE OPERATIONS USE HUI LOADER

SecureWorks BRONZE UNION June 2017

Counter Threat Unit Research Team. (2017, June 27). BRONZE UNION Cyberespionage Persists Despite Disclosures. Retrieved July 13, 2017.

Internal MISP references

UUID 42adda47-f5d6-4d34-9b3d-3748a782f886 which can be used as unique global reference for SecureWorks BRONZE UNION June 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-13T00:00:00Z
date_published 2017-06-27T00:00:00Z
source MITRE, Tidal Cyber
title BRONZE UNION Cyberespionage Persists Despite Disclosures

Wikipedia Browser Extension

Wikipedia. (2017, October 8). Browser Extension. Retrieved January 11, 2018.

Internal MISP references

UUID 52aef082-3f8e-41b4-af95-6631ce4c9e91 which can be used as unique global reference for Wikipedia Browser Extension in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-11T00:00:00Z
date_published 2017-10-08T00:00:00Z
source MITRE
title Browser Extension

Mr. D0x BitB 2022

mr.d0x. (2022, March 15). Browser In The Browser (BITB) Attack. Retrieved March 8, 2023.

Internal MISP references

UUID 447f6b34-ac3a-58d9-af96-aa1d947a3e0e which can be used as unique global reference for Mr. D0x BitB 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-08T00:00:00Z
date_published 2022-03-15T00:00:00Z
source MITRE
title Browser In The Browser (BITB) Attack

Cobalt Strike Browser Pivot

Mudge, R. (n.d.). Browser Pivoting. Retrieved January 10, 2018.

Internal MISP references

UUID 0c1dd453-7281-4ee4-9c8f-bdc401cf48d7 which can be used as unique global reference for Cobalt Strike Browser Pivot in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-10T00:00:00Z
source MITRE
title Browser Pivoting

Symantec Buckeye

Symantec Security Response. (2016, September 6). Buckeye cyberespionage group shifts gaze from US to Hong Kong. Retrieved September 26, 2016.

Internal MISP references

UUID dbf3ce3e-bcf2-4e47-ad42-839e51967395 which can be used as unique global reference for Symantec Buckeye in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-09-26T00:00:00Z
date_published 2016-09-06T00:00:00Z
source MITRE, Tidal Cyber
title Buckeye cyberespionage group shifts gaze from US to Hong Kong

ESET Buhtrap and Buran April 2019

ESET Research. (2019, April 30). Buhtrap backdoor and Buran ransomware distributed via major advertising platform. Retrieved May 11, 2020.

Internal MISP references

UUID e308a957-fb5c-44e8-a846-be6daef4b940 which can be used as unique global reference for ESET Buhtrap and Buran April 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-11T00:00:00Z
date_published 2019-04-30T00:00:00Z
source MITRE
title Buhtrap backdoor and Buran ransomware distributed via major advertising platform

S1 Custom Shellcode Tool

Bunce, D. (2019, October 31). Building A Custom Tool For Shellcode Analysis. Retrieved October 4, 2021.

Internal MISP references

UUID f49bfd00-48d5-4d84-a7b7-cb23fcdf861b which can be used as unique global reference for S1 Custom Shellcode Tool in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-04T00:00:00Z
date_published 2019-10-31T00:00:00Z
source MITRE
title Building A Custom Tool For Shellcode Analysis

Data Driven Security DGA

Jacobs, J. (2014, October 2). Building a DGA Classifier: Part 2, Feature Engineering. Retrieved February 18, 2019.

Internal MISP references

UUID c92fb2ec-c144-42d4-bd42-179d3d737db0 which can be used as unique global reference for Data Driven Security DGA in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-18T00:00:00Z
date_published 2014-10-02T00:00:00Z
source MITRE
title Building a DGA Classifier: Part 2, Feature Engineering

CTD PPID Spoofing Macro Mar 2019

Tafani-Dereeper, C. (2019, March 12). Building an Office macro to spoof parent processes and command line arguments. Retrieved June 3, 2019.

Internal MISP references

UUID b06b72ba-dbd6-4190-941a-0cdd3d659ab6 which can be used as unique global reference for CTD PPID Spoofing Macro Mar 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-03T00:00:00Z
date_published 2019-03-12T00:00:00Z
source MITRE
title Building an Office macro to spoof parent processes and command line arguments

Trend Micro September 02 2022

Trend Micro. (2022, September 2). BumbleBee a New Modular Backdoor Evolved From BookWorm. Retrieved May 7, 2023.

Internal MISP references

UUID acb25abb-23c7-4b5d-849b-346388dde15c which can be used as unique global reference for Trend Micro September 02 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2022-09-02T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title BumbleBee a New Modular Backdoor Evolved From BookWorm

Proofpoint 2 12 2024

Axel F; Selena Larson; The Proofpoint Threat Research Team. (2024, February 12). Bumblebee Buzzes Back in Black . Retrieved February 14, 2024.

Internal MISP references

UUID 643968ec-bc01-4317-ba91-b2bafeb421c9 which can be used as unique global reference for Proofpoint 2 12 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-14T00:00:00Z
date_published 2024-02-12T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Bumblebee Buzzes Back in Black

Toxin Labs 3 4 2023

Toxin Labs. (2023, March 4). BumbleBee DocuSign Campaign. Retrieved February 19, 2024.

Internal MISP references

UUID 8404527a-9197-47ea-8bdf-c824b66ffede which can be used as unique global reference for Toxin Labs 3 4 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-19T00:00:00Z
date_published 2023-03-04T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title BumbleBee DocuSign Campaign

SEC Consult Bumblebee April 11 2023

Angelo Violetti. (2023, April 11). BumbleBee hunting with a Velociraptor. Retrieved May 6, 2023.

Internal MISP references

UUID c4cdaaeb-5776-4899-bdcf-8daf9d6ea615 which can be used as unique global reference for SEC Consult Bumblebee April 11 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-06T00:00:00Z
date_published 2023-04-11T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title BumbleBee hunting with a Velociraptor

Cybereason Bumblebee August 2022

Cybereason. (2022, August 17). Bumblebee Loader – The High Road to Enterprise Domain Control. Retrieved August 29, 2022.

Internal MISP references

UUID 64bfb605-af69-4df0-ae56-32fa997516bc which can be used as unique global reference for Cybereason Bumblebee August 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-29T00:00:00Z
date_published 2022-08-17T00:00:00Z
source MITRE
title Bumblebee Loader – The High Road to Enterprise Domain Control

Secureworks Bumblebee April 20 2023

Counter Threat Unit Research Team. (2023, April 20). Bumblebee Malware Distributed Via Trojanized Installer Downloads. Retrieved May 6, 2023.

Internal MISP references

UUID ac31c45d-ba78-4158-b163-723ab22c4dc4 which can be used as unique global reference for Secureworks Bumblebee April 20 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-06T00:00:00Z
date_published 2023-04-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Bumblebee Malware Distributed Via Trojanized Installer Downloads

Symantec Bumblebee June 2022

Kamble, V. (2022, June 28). Bumblebee: New Loader Rapidly Assuming Central Position in Cyber-crime Ecosystem. Retrieved August 24, 2022.

Internal MISP references

UUID 81bfabad-b5b3-4e45-ac1d-1e2e829fca33 which can be used as unique global reference for Symantec Bumblebee June 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-24T00:00:00Z
date_published 2022-06-28T00:00:00Z
source MITRE
title Bumblebee: New Loader Rapidly Assuming Central Position in Cyber-crime Ecosystem

Cyble September 07 2022

Cybleinc. (2022, September 7). Bumblebee Returns with New Infection Technique. Retrieved May 7, 2023.

Internal MISP references

UUID 9d194526-2d01-4f92-9055-39e66d26081a which can be used as unique global reference for Cyble September 07 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2022-09-07T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Bumblebee Returns with New Infection Technique

The DFIR Report Bumblebee September 26 2022

The DFIR Report. (2022, September 26). BumbleBee: Round Two. Retrieved May 7, 2023.

Internal MISP references

UUID 8b51d35c-7a2a-4f03-95b1-c0b319f73c05 which can be used as unique global reference for The DFIR Report Bumblebee September 26 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2022-09-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title BumbleBee: Round Two

The DFIR Report Bumblebee November 14 2022

The DFIR Report. (2022, November 14). BumbleBee Zeros in on Meterpreter. Retrieved May 7, 2023.

Internal MISP references

UUID 831e1b4e-6edd-498f-863c-606d2392b622 which can be used as unique global reference for The DFIR Report Bumblebee November 14 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2022-11-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title BumbleBee Zeros in on Meterpreter

objsee netwire backdoor 2019

Patrick Wardle. (2019, June 20). Burned by Fire(fox). Retrieved October 1, 2021.

Internal MISP references

UUID 866c5305-8629-4f09-8dfe-192c8573ffb0 which can be used as unique global reference for objsee netwire backdoor 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-01T00:00:00Z
date_published 2019-06-20T00:00:00Z
source MITRE
title Burned by Fire(fox)

401 TRG Winnti Umbrella May 2018

Hegel, T. (2018, May 3). Burning Umbrella: An Intelligence Report on the Winnti Umbrella and Associated State-Sponsored Attackers. Retrieved July 8, 2018.

Internal MISP references

UUID e3f1f2e4-dc1c-4d9c-925d-47013f44a69f which can be used as unique global reference for 401 TRG Winnti Umbrella May 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-08T00:00:00Z
date_published 2018-05-03T00:00:00Z
source MITRE
title Burning Umbrella: An Intelligence Report on the Winnti Umbrella and Associated State-Sponsored Attackers

Bypassing Gatekeeper

Thomas Reed. (2016, March 31). Bypassing Apple's Gatekeeper. Retrieved July 5, 2017.

Internal MISP references

UUID 957a0916-614e-4c7b-a6dd-1baa4fc6f93e which can be used as unique global reference for Bypassing Gatekeeper in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-05T00:00:00Z
date_published 2016-03-31T00:00:00Z
source MITRE
title Bypassing Apple's Gatekeeper

engima0x3 DNX Bypass

Nelson, M. (2017, November 17). Bypassing Application Whitelisting By Using dnx.exe. Retrieved May 25, 2017.

Internal MISP references

UUID e0186f1d-100d-4e52-b6f7-0a7e1c1a35f0 which can be used as unique global reference for engima0x3 DNX Bypass in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-05-25T00:00:00Z
date_published 2017-11-17T00:00:00Z
source MITRE
title Bypassing Application Whitelisting By Using dnx.exe

engima0x3 RCSI Bypass

Nelson, M. (2016, November 21). Bypassing Application Whitelisting By Using rcsi.exe. Retrieved May 26, 2017.

Internal MISP references

UUID 0b815bd9-6c7f-4bd8-9031-667fa6252f89 which can be used as unique global reference for engima0x3 RCSI Bypass in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-05-26T00:00:00Z
date_published 2016-11-21T00:00:00Z
source MITRE
title Bypassing Application Whitelisting By Using rcsi.exe

Exploit Monday WinDbg

Graeber, M. (2016, August 15). Bypassing Application Whitelisting by using WinDbg/CDB as a Shellcode Runner. Retrieved May 26, 2017.

Internal MISP references

UUID abd5f871-e12e-4355-af72-d4be79cb0291 which can be used as unique global reference for Exploit Monday WinDbg in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-05-26T00:00:00Z
date_published 2016-08-15T00:00:00Z
source MITRE
title Bypassing Application Whitelisting by using WinDbg/CDB as a Shellcode Runner

SubTee MSBuild

Smith, C. (2016, September 13). Bypassing Application Whitelisting using MSBuild.exe - Device Guard Example and Mitigations. Retrieved September 13, 2016.

Internal MISP references

UUID 82a762d0-c59f-456d-a7d3-1cab3fa02526 which can be used as unique global reference for SubTee MSBuild in MISP communities and other software using the MISP galaxy

Associated metadata
Metadata key Value
date_accessed 2016-09-13T00:00:00Z
date_published 2016-09-13T00:00:00Z
source MITRE
title Bypassing Application Whitelisting using MSBuild.exe - Device Guard Example and Mitigations

Bypassing CloudTrail in AWS Service Catalog

Nick Frichette. (2023, March 20). Bypassing CloudTrail in AWS Service Catalog, and Other Logging Research. Retrieved September 18, 2023.

Internal MISP references

UUID de50bd67-96bb-537c-b91d-e541a717b7a1 which can be used as unique global reference for Bypassing CloudTrail in AWS Service Catalog in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-18T00:00:00Z
date_published 2023-03-20T00:00:00Z
source MITRE
title Bypassing CloudTrail in AWS Service Catalog, and Other Logging Research

AADInternals - Conditional Access Bypass

Dr. Nestori Syynimaa. (2020, September 6). Bypassing conditional access by faking device compliance. Retrieved March 4, 2022.

Internal MISP references

UUID 832841a1-92d1-4fcc-90f7-afbabad84aec which can be used as unique global reference for AADInternals - Conditional Access Bypass in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-04T00:00:00Z
date_published 2020-09-06T00:00:00Z
source MITRE
title Bypassing conditional access by faking device compliance

MsitPros CHM Aug 2017

Moe, O. (2017, August 13). Bypassing Device guard UMCI using CHM – CVE-2017-8625. Retrieved October 3, 2018.

Internal MISP references

UUID d4e4cc8a-3246-463f-ba06-d68459d907d4 which can be used as unique global reference for MsitPros CHM Aug 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-10-03T00:00:00Z
date_published 2017-08-13T00:00:00Z
source MITRE
title Bypassing Device guard UMCI using CHM – CVE-2017-8625

TCC macOS bypass

Phil Stokes. (2021, July 1). Bypassing macOS TCC User Privacy Protections By Accident and Design. Retrieved March 21, 2024.

Internal MISP references

UUID 4fc68e85-cd7a-5a15-84e3-8fbea0b28fd5 which can be used as unique global reference for TCC macOS bypass in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-21T00:00:00Z
date_published 2021-07-01T00:00:00Z
source MITRE
title Bypassing macOS TCC User Privacy Protections By Accident and Design

enigma0x3 sdclt app paths

Nelson, M. (2017, March 14). Bypassing UAC using App Paths. Retrieved May 25, 2017.

Internal MISP references

UUID 2e69a4a7-dc7f-4b7d-99b2-190c60d7efd1 which can be used as unique global reference for enigma0x3 sdclt app paths in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-05-25T00:00:00Z
date_published 2017-03-14T00:00:00Z
source MITRE
title Bypassing UAC using App Paths

MDSec System Calls

MDSec Research. (2020, December). Bypassing User-Mode Hooks and Direct Invocation of System Calls for Red Teams. Retrieved September 29, 2021.

Internal MISP references

UUID b461e226-1317-4ce4-a195-ba4c4957db99 which can be used as unique global reference for MDSec System Calls in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-29T00:00:00Z
date_published 2020-12-01T00:00:00Z
source MITRE
title Bypassing User-Mode Hooks and Direct Invocation of System Calls for Red Teams

Hybrid Analysis Icacls1 June 2018

Hybrid Analysis. (2018, June 12). c9b65b764985dfd7a11d3faf599c56b8.exe. Retrieved August 19, 2018.

Internal MISP references

UUID 74df644a-06b8-4331-85a3-932358d65b62 which can be used as unique global reference for Hybrid Analysis Icacls1 June 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-19T00:00:00Z
date_published 2018-06-12T00:00:00Z
source MITRE
title c9b65b764985dfd7a11d3faf599c56b8.exe

Microsoft Credential Manager store

Microsoft. (2016, August 31). Cached and Stored Credentials Technical Overview. Retrieved November 24, 2020.

Internal MISP references

UUID c949a29b-bb31-4bd7-a967-ddd48c7efb8e which can be used as unique global reference for Microsoft Credential Manager store in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-24T00:00:00Z
date_published 2016-08-31T00:00:00Z
source MITRE
title Cached and Stored Credentials Technical Overview

Microsoft - Cached Creds

Microsoft. (2016, August 21). Cached and Stored Credentials Technical Overview. Retrieved February 21, 2020.

Internal MISP references

UUID 590ea63f-f800-47e4-8d39-df11a184ba84 which can be used as unique global reference for Microsoft - Cached Creds in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-21T00:00:00Z
date_published 2016-08-21T00:00:00Z
source MITRE
title Cached and Stored Credentials Technical Overview

Kaspersky CactusPete Aug 2020

Zykov, K. (2020, August 13). CactusPete APT group’s updated Bisonal backdoor. Retrieved May 5, 2021.

Internal MISP references

UUID 1c393964-e717-45ad-8eb6-5df5555d3c70 which can be used as unique global reference for Kaspersky CactusPete Aug 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-05-05T00:00:00Z
date_published 2020-08-13T00:00:00Z
source MITRE, Tidal Cyber
title CactusPete APT group’s updated Bisonal backdoor

Kroll CACTUS Ransomware May 10 2023

Laurie Iacono, Stephen Green, Dave Truman. (2023, May 10). CACTUS Ransomware: Prickly New Variant Evades Detection. Retrieved August 10, 2023.

Internal MISP references

UUID f50de2f6-465f-4cae-a79c-cc135ebfee4f which can be used as unique global reference for Kroll CACTUS Ransomware May 10 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-10T00:00:00Z
date_published 2023-05-10T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title CACTUS Ransomware: Prickly New Variant Evades Detection

ESET CaddyWiper March 2022

ESET. (2022, March 15). CaddyWiper: New wiper malware discovered in Ukraine. Retrieved March 23, 2022.

Internal MISP references

UUID 9fa97444-311f-40c1-8728-c5f91634c750 which can be used as unique global reference for ESET CaddyWiper March 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-23T00:00:00Z
date_published 2022-03-15T00:00:00Z
source MITRE
title CaddyWiper: New wiper malware discovered in Ukraine

Cadet Blizzard emerges as novel threat actor

Microsoft Threat Intelligence. (2023, June 14). Cadet Blizzard emerges as a novel and distinct Russian threat actor. Retrieved July 10, 2023.

Internal MISP references

UUID 7180c6a7-e6ea-54bf-bcd7-c5238bbc5f5b which can be used as unique global reference for Cadet Blizzard emerges as novel threat actor in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-10T00:00:00Z
date_published 2023-06-14T00:00:00Z
source MITRE
title Cadet Blizzard emerges as a novel and distinct Russian threat actor

Cado Denonia April 3 2022

jbowen. (2022, April 3). Cado Discovers Denonia: The First Malware Specifically Targeting Lambda. Retrieved April 11, 2024.

Internal MISP references

UUID b276c28d-1488-4a21-86d1-7acdfd77794b which can be used as unique global reference for Cado Denonia April 3 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-11T00:00:00Z
date_published 2022-04-03T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Cado Discovers Denonia: The First Malware Specifically Targeting Lambda

Cado Security Denonia

Matt Muir. (2022, April 6). Cado Discovers Denonia: The First Malware Specifically Targeting Lambda. Retrieved May 27, 2022.

Internal MISP references

UUID 584e7ace-ef33-423b-9801-4728a447cb34 which can be used as unique global reference for Cado Security Denonia in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-27T00:00:00Z
date_published 2022-04-06T00:00:00Z
source MITRE
title Cado Discovers Denonia: The First Malware Specifically Targeting Lambda

Caesars Scattered Spider September 13 2023

William Turton. (2023, September 13). Caesars Entertainment Paid Millions to Hackers in Attack. Retrieved September 14, 2023.

Internal MISP references

UUID 6915c003-7c8b-451c-8fb1-3541f00c14fb which can be used as unique global reference for Caesars Scattered Spider September 13 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-14T00:00:00Z
date_published 2023-09-13T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Caesars Entertainment Paid Millions to Hackers in Attack

Sekoia Calisto December 5 2022

Felix Aimé, Maxime A., Sekoia TDR. (2022, December 5). Calisto show interests into entities involved in Ukraine war support. Retrieved October 1, 2024.

Internal MISP references

UUID 02fed1d1-b8a9-4bca-9e96-2cffe6f7ba89 which can be used as unique global reference for Sekoia Calisto December 5 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-01T00:00:00Z
date_published 2022-12-05T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Calisto show interests into entities involved in Ukraine war support

Securelist Calisto July 2018

Kuzin, M., Zelensky S. (2018, July 20). Calisto Trojan for macOS. Retrieved September 7, 2018.

Internal MISP references

UUID a292d77b-9150-46ea-b217-f51e091fdb57 which can be used as unique global reference for Securelist Calisto July 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-09-07T00:00:00Z
date_published 2018-07-20T00:00:00Z
source MITRE
title Calisto Trojan for macOS

CERTFR-2023-CTI-009

CERT-FR. (2023, October 26). Campagnes d'attaques du mode opératoire APT28 depuis 2021. Retrieved October 26, 2023.

Internal MISP references

UUID 5365ac4c-fbb8-4389-989e-a64cb7693371 which can be used as unique global reference for CERTFR-2023-CTI-009 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-26T00:00:00Z
date_published 2023-10-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Campagnes d'attaques du mode opératoire APT28 depuis 2021

FSI Andariel Campaign Rifle July 2017

FSI. (2017, July 27). Campaign Rifle - Andariel, the Maiden of Anguish. Retrieved September 12, 2024.

Internal MISP references

UUID bde61ee9-16f9-4bd9-a847-5cc9df21335c which can be used as unique global reference for FSI Andariel Campaign Rifle July 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2017-07-27T00:00:00Z
source MITRE
title Campaign Rifle - Andariel, the Maiden of Anguish

Check Point Research January 5 2022

Check Point Research. (2022, January 5). Can You Trust a File's Digital Signature? New Zloader Campaign Exploits Microsoft's Signature Verification Putting Users at Risk. Retrieved May 11, 2023.

Internal MISP references

UUID d26dfc4d-e563-4262-b527-0fffb7228234 which can be used as unique global reference for Check Point Research January 5 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-11T00:00:00Z
date_published 2022-01-05T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Can You Trust a File's Digital Signature? New Zloader Campaign Exploits Microsoft's Signature Verification Putting Users at Risk

Polak NPPSPY 2004

Sergey Polak. (2004, August). Capturing Windows Passwords using the Network Provider API. Retrieved May 17, 2024.

Internal MISP references

UUID ab5872b0-a755-5d85-8750-0b22f00ccb37 which can be used as unique global reference for Polak NPPSPY 2004 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-17T00:00:00Z
date_published 2004-08-01T00:00:00Z
source MITRE
title Capturing Windows Passwords using the Network Provider API

KasperskyCarbanak

Kaspersky Lab's Global Research & Analysis Team. (2015, February). CARBANAK APT THE GREAT BANK ROBBERY. Retrieved March 27, 2017.

Internal MISP references

UUID 053a2bbb-5509-4aba-bbd7-ccc3d8074291 which can be used as unique global reference for KasperskyCarbanak in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-27T00:00:00Z
date_published 2015-02-01T00:00:00Z
source MITRE
title CARBANAK APT THE GREAT BANK ROBBERY

Kaspersky Carbanak

Kaspersky Lab's Global Research and Analysis Team. (2015, February). CARBANAK APT THE GREAT BANK ROBBERY. Retrieved August 23, 2018.

Internal MISP references

UUID 2f7e77db-fe39-4004-9945-3c8943708494 which can be used as unique global reference for Kaspersky Carbanak in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-23T00:00:00Z
date_published 2015-02-01T00:00:00Z
source MITRE, Tidal Cyber
title CARBANAK APT THE GREAT BANK ROBBERY

Forcepoint Carbanak Google C2

Griffin, N. (2017, January 17). CARBANAK GROUP USES GOOGLE FOR MALWARE COMMAND-AND-CONTROL. Retrieved February 15, 2017.

Internal MISP references

UUID 3da6084f-5e12-4472-afb9-82efd3e22cf6 which can be used as unique global reference for Forcepoint Carbanak Google C2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-02-15T00:00:00Z
date_published 2017-01-17T00:00:00Z
source MITRE
title CARBANAK GROUP USES GOOGLE FOR MALWARE COMMAND-AND-CONTROL

Trend Micro Carberp February 2014

Trend Micro. (2014, February 27). CARBERP. Retrieved July 29, 2020.

Internal MISP references

UUID 069e458f-d780-47f9-8ebe-21b195fe9b33 which can be used as unique global reference for Trend Micro Carberp February 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-07-29T00:00:00Z
date_published 2014-02-27T00:00:00Z
source MITRE
title CARBERP

Prevx Carberp March 2011

Giuliani, M., Allievi, A. (2011, February 28). Carberp - a modular information stealing trojan. Retrieved September 12, 2024.

Internal MISP references

UUID 8f95d81a-ea8c-44bf-950d-9eb868182d39 which can be used as unique global reference for Prevx Carberp March 2011 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2011-02-28T00:00:00Z
source MITRE
title Carberp - a modular information stealing trojan

Trusteer Carberp October 2010

Trusteer Fraud Prevention Center. (2010, October 7). Carberp Under the Hood of Carberp: Malware & Configuration Analysis. Retrieved July 15, 2020.

Internal MISP references

UUID f7af5be2-0cb4-4b41-9d08-2f652b6bac3c which can be used as unique global reference for Trusteer Carberp October 2010 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-07-15T00:00:00Z
date_published 2010-10-07T00:00:00Z
source MITRE
title Carberp Under the Hood of Carberp: Malware & Configuration Analysis

ESET Carbon Mar 2017

ESET. (2017, March 30). Carbon Paper: Peering into Turla’s second stage backdoor. Retrieved November 7, 2018.

Internal MISP references

UUID 5d2a3a81-e7b7-430d-b748-b773f89d3c77 which can be used as unique global reference for ESET Carbon Mar 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-07T00:00:00Z
date_published 2017-03-30T00:00:00Z
source MITRE
title Carbon Paper: Peering into Turla’s second stage backdoor

CrowdStrike Carbon Spider August 2021

Loui, E. and Reynolds, J. (2021, August 30). CARBON SPIDER Embraces Big Game Hunting, Part 1. Retrieved September 20, 2021.

Internal MISP references

UUID 36f0ddb0-94af-494c-ad10-9d3f75d1d810 which can be used as unique global reference for CrowdStrike Carbon Spider August 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-20T00:00:00Z
date_published 2021-08-30T00:00:00Z
source MITRE
title CARBON SPIDER Embraces Big Game Hunting, Part 1

PaloAlto CardinalRat Apr 2017

Grunzweig, J.. (2017, April 20). Cardinal RAT Active for Over Two Years. Retrieved December 8, 2018.

Internal MISP references

UUID 8d978b94-75c9-46a1-812a-bafe3396eda9 which can be used as unique global reference for PaloAlto CardinalRat Apr 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-12-08T00:00:00Z
date_published 2017-04-20T00:00:00Z
source MITRE
title Cardinal RAT Active for Over Two Years

Carl Hurd March 2019

Carl Hurd. (2019, March 26) VPNFilter Deep Dive. Retrieved March 28, 2019

Internal MISP references

UUID 8a4e28f9-b0ba-56ad-a957-b5913bf9a7d5 which can be used as unique global reference for Carl Hurd March 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-28T00:00:00Z
source MITRE
title Carl Hurd March 2019

ESET Casbaneiro Oct 2019

ESET Research. (2019, October 3). Casbaneiro: peculiarities of this banking Trojan that affects Brazil and Mexico. Retrieved September 23, 2021.

Internal MISP references

UUID a5cb3ee6-9a0b-4e90-bf32-be7177a858b1 which can be used as unique global reference for ESET Casbaneiro Oct 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-23T00:00:00Z
date_published 2019-10-03T00:00:00Z
source MITRE
title Casbaneiro: peculiarities of this banking Trojan that affects Brazil and Mexico

Microsoft Catalog Files and Signatures April 2017

Hudek, T. (2017, April 20). Catalog Files and Digital Signatures. Retrieved January 31, 2018.

Internal MISP references

UUID 5b6ae460-a1cf-4afe-a0c8-d6ea24741ebe which can be used as unique global reference for Microsoft Catalog Files and Signatures April 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-31T00:00:00Z
date_published 2017-04-20T00:00:00Z
source MITRE
title Catalog Files and Digital Signatures

Catch All Chrome Extension

Marinho, R. (n.d.). "Catch-All" Google Chrome Malicious Extension Steals All Posted Data. Retrieved November 16, 2017.

Internal MISP references

UUID eddd2ea8-89c1-40f9-b6e3-37cbdebd210e which can be used as unique global reference for Catch All Chrome Extension in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-16T00:00:00Z
source MITRE
title "Catch-All" Google Chrome Malicious Extension Steals All Posted Data

Akamai JS

Katz, O. (2020, October 26). Catch Me if You Can—JavaScript Obfuscation. Retrieved March 17, 2023.

Internal MISP references

UUID 379a177b-0c31-5840-ad54-3fdfc9904a88 which can be used as unique global reference for Akamai JS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-17T00:00:00Z
date_published 2020-10-26T00:00:00Z
source MITRE
title Catch Me if You Can—JavaScript Obfuscation

Categorisation_not_boundary

MDSec Research. (2017, July). Categorisation is not a Security Boundary. Retrieved September 20, 2019.

Internal MISP references

UUID 3c320f38-e691-46f7-a20d-58b024ea2fa2 which can be used as unique global reference for Categorisation_not_boundary in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-20T00:00:00Z
date_published 2017-07-01T00:00:00Z
source MITRE
title Categorisation is not a Security Boundary

CrowdStrike Flying Kitten

Dahl, M.. (2014, May 13). Cat Scratch Fever: CrowdStrike Tracks Newly Reported Iranian Actor as FLYING KITTEN. Retrieved May 27, 2020.

Internal MISP references

UUID ab669ded-e659-4313-b5ab-8c5362562f39 which can be used as unique global reference for CrowdStrike Flying Kitten in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-27T00:00:00Z
date_published 2014-05-13T00:00:00Z
source MITRE
title Cat Scratch Fever: CrowdStrike Tracks Newly Reported Iranian Actor as FLYING KITTEN

Telephone Attack Delivery

Selena Larson, Sam Scholten, Timothy Kromphardt. (2021, November 4). Caught Beneath the Landline: A 411 on Telephone Oriented Attack Delivery. Retrieved January 5, 2022.

Internal MISP references

UUID 9670da7b-0600-4072-9ecc-65a918b89ac5 which can be used as unique global reference for Telephone Attack Delivery in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-05T00:00:00Z
date_published 2021-11-04T00:00:00Z
source MITRE
title Caught Beneath the Landline: A 411 on Telephone Oriented Attack Delivery

Tetra Defense Sodinokibi March 2020

Tetra Defense. (2020, March). CAUSE AND EFFECT: SODINOKIBI RANSOMWARE ANALYSIS. Retrieved December 14, 2020.

Internal MISP references

UUID a6ef0302-7bf4-4c5c-a6fc-4bd1c3d67d50 which can be used as unique global reference for Tetra Defense Sodinokibi March 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-14T00:00:00Z
date_published 2020-03-01T00:00:00Z
source MITRE
title CAUSE AND EFFECT: SODINOKIBI RANSOMWARE ANALYSIS

CarbonBlack RobbinHood May 2019

Lee, S. (2019, May 17). CB TAU Threat Intelligence Notification: RobbinHood Ransomware Stops 181 Windows Services Before Encryption. Retrieved July 29, 2019.

Internal MISP references

UUID cb9e49fa-253a-447a-9c88-c6e507bae0bb which can be used as unique global reference for CarbonBlack RobbinHood May 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-07-29T00:00:00Z
date_published 2019-05-17T00:00:00Z
source MITRE
title CB TAU Threat Intelligence Notification: RobbinHood Ransomware Stops 181 Windows Services Before Encryption

Talos CCleanup 2017

Brumaghin, E. et al. (2017, September 18). CCleanup: A Vast Number of Machines at Risk. Retrieved March 9, 2018.

Internal MISP references

UUID f2522cf4-dc65-4dc5-87e3-9e88212fcfe9 which can be used as unique global reference for Talos CCleanup 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-09T00:00:00Z
date_published 2017-09-18T00:00:00Z
source MITRE
title CCleanup: A Vast Number of Machines at Risk

Cdb.exe - LOLBAS Project

LOLBAS. (2018, May 25). Cdb.exe. Retrieved December 4, 2023.

Internal MISP references

UUID e61b035f-6247-47e3-918c-2892815dfddf which can be used as unique global reference for Cdb.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Cdb.exe

Slowik Sandworm 2021

Joseph Slowik, DomainTools. (2021, March 3). Centreon to Exim and Back: On the Trail of Sandworm. Retrieved April 6, 2024.

Internal MISP references

UUID e1753588-bc53-5265-935e-cbbaf3e13a82 which can be used as unique global reference for Slowik Sandworm 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-06T00:00:00Z
date_published 2021-03-03T00:00:00Z
source MITRE
title Centreon to Exim and Back: On the Trail of Sandworm

ESET PLEAD Malware July 2018

Cherepanov, A.. (2018, July 9). Certificates stolen from Taiwanese tech‑companies misused in Plead malware campaign. Retrieved May 6, 2020.

Internal MISP references

UUID 2c28640d-e4ee-47db-a8f1-b34def7d2e9a which can be used as unique global reference for ESET PLEAD Malware July 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-06T00:00:00Z
date_published 2018-07-09T00:00:00Z
source MITRE
title Certificates stolen from Taiwanese tech‑companies misused in Plead malware campaign

Medium Certified Pre Owned

Schroeder, W. (2021, June 17). Certified Pre-Owned. Retrieved August 2, 2022.

Internal MISP references

UUID 04e53c69-3f29-4bb4-83c9-ff3a2db1526b which can be used as unique global reference for Medium Certified Pre Owned in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-02T00:00:00Z
date_published 2021-06-17T00:00:00Z
source MITRE
title Certified Pre-Owned

SpecterOps Certified Pre Owned

Schroeder, W. & Christensen, L. (2021, June 22). Certified Pre-Owned - Abusing Active Directory Certificate Services. Retrieved August 2, 2022.

Internal MISP references

UUID 73b6a6a6-c2b8-4aed-9cbc-d3bdcbb97698 which can be used as unique global reference for SpecterOps Certified Pre Owned in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-02T00:00:00Z
date_published 2021-06-22T00:00:00Z
source MITRE
title Certified Pre-Owned - Abusing Active Directory Certificate Services

GitHub Certify

HarmJ0y et al. (2021, June 9). Certify. Retrieved August 4, 2022.

Internal MISP references

UUID 27fce38b-07d6-43ed-a3da-174458c4acbe which can be used as unique global reference for GitHub Certify in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-04T00:00:00Z
date_published 2021-06-09T00:00:00Z
source MITRE
title Certify

CertOC.exe - LOLBAS Project

LOLBAS. (2021, October 7). CertOC.exe. Retrieved December 4, 2023.

Internal MISP references

UUID b906498e-2773-419b-8c6d-3e974925ac18 which can be used as unique global reference for CertOC.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-10-07T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title CertOC.exe

CertReq.exe - LOLBAS Project

LOLBAS. (2020, July 7). CertReq.exe. Retrieved December 4, 2023.

Internal MISP references

UUID be446484-8ecc-486e-8940-658c147f6978 which can be used as unique global reference for CertReq.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2020-07-07T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title CertReq.exe

GitHub CertStealer

TheWover. (2021, April 21). CertStealer. Retrieved August 2, 2022.

Internal MISP references

UUID da06ce8f-f950-4ae8-a62a-b59b236e91a3 which can be used as unique global reference for GitHub CertStealer in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-02T00:00:00Z
date_published 2021-04-21T00:00:00Z
source MITRE
title CertStealer

TechNet Certutil

Microsoft. (2012, November 14). Certutil. Retrieved July 3, 2017.

Internal MISP references

UUID 8d095aeb-c72c-49c1-8482-dbf4ce9203ce which can be used as unique global reference for TechNet Certutil in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-03T00:00:00Z
date_published 2012-11-14T00:00:00Z
source MITRE
title Certutil

LOLBAS Certutil

LOLBAS. (n.d.). Certutil.exe. Retrieved July 31, 2019.

Internal MISP references

UUID 4c875710-9b5d-47b5-bc9e-69ef95797c8f which can be used as unique global reference for LOLBAS Certutil in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-07-31T00:00:00Z
source MITRE
title Certutil.exe

FireEye CFR Watering Hole 2012

Kindlund, D. (2012, December 30). CFR Watering Hole Attack Details. Retrieved December 18, 2020.

Internal MISP references

UUID 6108ab77-e4fd-43f2-9d49-8ce9c219ca9c which can be used as unique global reference for FireEye CFR Watering Hole 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-18T00:00:00Z
date_published 2012-12-30T00:00:00Z
source MITRE
title CFR Watering Hole Attack Details

Twitter Cglyer Status Update APT3 eml

Glyer, C. (2018, April 14). @cglyer Status Update. Retrieved September 12, 2024.

Internal MISP references

UUID cfcb0839-0736-489f-9779-72e5c96cce3d which can be used as unique global reference for Twitter Cglyer Status Update APT3 eml in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2018-04-14T00:00:00Z
source MITRE
title @cglyer Status Update

Cybereason Chaes Nov 2020

Salem, E. (2020, November 17). CHAES: Novel Malware Targeting Latin American E-Commerce. Retrieved June 30, 2021.

Internal MISP references

UUID aaefa162-82a8-4b6d-b7be-fd31fafd9246 which can be used as unique global reference for Cybereason Chaes Nov 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-30T00:00:00Z
date_published 2020-11-17T00:00:00Z
source MITRE
title CHAES: Novel Malware Targeting Latin American E-Commerce

Symantec Chafer February 2018

Symantec. (2018, February 28). Chafer: Latest Attacks Reveal Heightened Ambitions. Retrieved May 22, 2020.

Internal MISP references

UUID 3daaa402-5477-4868-b8f1-a2f6e38f04ef which can be used as unique global reference for Symantec Chafer February 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-22T00:00:00Z
date_published 2018-02-28T00:00:00Z
source MITRE
title Chafer: Latest Attacks Reveal Heightened Ambitions

Securelist Remexi Jan 2019

Legezo, D. (2019, January 30). Chafer used Remexi malware to spy on Iran-based foreign diplomatic entities. Retrieved April 17, 2019.

Internal MISP references

UUID 07dfd8e7-4e51-4c6e-a4f6-aaeb74ff8845 which can be used as unique global reference for Securelist Remexi Jan 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-17T00:00:00Z
date_published 2019-01-30T00:00:00Z
source MITRE
title Chafer used Remexi malware to spy on Iran-based foreign diplomatic entities

change_rdp_port_conti

The DFIR Report. (2022, March 1). "Change RDP port" #ContiLeaks. Retrieved September 12, 2024.

Internal MISP references

UUID c0deb077-6c26-52f1-9e7c-d1fb535a02a0 which can be used as unique global reference for change_rdp_port_conti in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2022-03-01T00:00:00Z
source MITRE
title "Change RDP port" #ContiLeaks

Microsoft Change Normal Template

Microsoft. (n.d.). Change the Normal template (Normal.dotm). Retrieved July 3, 2017.

Internal MISP references

UUID 76bf3ce1-b94c-4b3d-9707-aca8a1ae5555 which can be used as unique global reference for Microsoft Change Normal Template in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-03T00:00:00Z
source MITRE
title Change the Normal template (Normal.dotm)

Microsoft Change Default Programs

Microsoft. (n.d.). Change which programs Windows 7 uses by default. Retrieved July 26, 2016.

Internal MISP references

UUID de515277-a280-40e5-ba34-3e8f16a5c703 which can be used as unique global reference for Microsoft Change Default Programs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-07-26T00:00:00Z
source MITRE
title Change which programs Windows 7 uses by default

Chaos Stolen Backdoor

Sebastian Feldmann. (2018, February 14). Chaos: a Stolen Backdoor Rising Again. Retrieved March 5, 2018.

Internal MISP references

UUID 8e6916c1-f102-4b54-b6a5-a58fed825c2e which can be used as unique global reference for Chaos Stolen Backdoor in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-05T00:00:00Z
date_published 2018-02-14T00:00:00Z
source MITRE
title Chaos: a Stolen Backdoor Rising Again

Wardle Persistence Chapter

Patrick Wardle. (n.d.). Chapter 0x2: Persistence. Retrieved April 13, 2022.

Internal MISP references

UUID 6272b9a2-d704-43f3-9e25-6c434bb5d1ef which can be used as unique global reference for Wardle Persistence Chapter in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-13T00:00:00Z
source MITRE
title Chapter 0x2: Persistence

cisco_deploy_rsa_keys

Cisco. (2023, February 17). Chapter: Deploying RSA Keys Within a PKI . Retrieved March 27, 2023.

Internal MISP references

UUID 132f387e-4ee3-51d3-a3b6-d61102ada152 which can be used as unique global reference for cisco_deploy_rsa_keys in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-27T00:00:00Z
date_published 2023-02-17T00:00:00Z
source MITRE
title Chapter: Deploying RSA Keys Within a PKI

Wikipedia Character Encoding

Wikipedia. (2017, February 19). Character Encoding. Retrieved March 1, 2017.

Internal MISP references

UUID 3e7df20f-5d11-4102-851f-04e89c25d12f which can be used as unique global reference for Wikipedia Character Encoding in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-01T00:00:00Z
date_published 2017-02-19T00:00:00Z
source MITRE
title Character Encoding

ClearSky Charming Kitten Dec 2017

ClearSky Cyber Security. (2017, December). Charming Kitten. Retrieved December 27, 2017.

Internal MISP references

UUID 23ab1ad2-e9d4-416a-926f-6220a59044ab which can be used as unique global reference for ClearSky Charming Kitten Dec 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-27T00:00:00Z
date_published 2017-12-01T00:00:00Z
source MITRE
title Charming Kitten

Certfa Charming Kitten January 2021

Certfa Labs. (2021, January 8). Charming Kitten’s Christmas Gift. Retrieved May 3, 2021.

Internal MISP references

UUID c38a8af6-3f9b-40c3-8122-a2a51eb50664 which can be used as unique global reference for Certfa Charming Kitten January 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-05-03T00:00:00Z
date_published 2021-01-08T00:00:00Z
source MITRE
title Charming Kitten’s Christmas Gift

Proofpoint TA2541 February 2022

Larson, S. and Wise, J. (2022, February 15). Charting TA2541's Flight. Retrieved September 12, 2023.

Internal MISP references

UUID db0b1425-8bd7-51b5-bae3-53c5ccccb8da which can be used as unique global reference for Proofpoint TA2541 February 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-12T00:00:00Z
date_published 2022-02-15T00:00:00Z
source MITRE
title Charting TA2541's Flight

JPCERT ChChes Feb 2017

Nakamura, Y.. (2017, February 17). ChChes - Malware that Communicates with C&C Servers Using Cookie Headers. Retrieved March 1, 2017.

Internal MISP references

UUID 657b43aa-ead2-41d3-911a-d714d9b28e19 which can be used as unique global reference for JPCERT ChChes Feb 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-01T00:00:00Z
date_published 2017-02-17T00:00:00Z
source MITRE
title ChChes - Malware that Communicates with C&C Servers Using Cookie Headers

Check Point Iranian Proxies December 4 2023

Check Point Research. (2023, December 4). Check Point Research Report: Iranian Hacktivist Proxies Escalate Activities Beyond Israel. Retrieved August 8, 2024.

Internal MISP references

UUID 60432d84-8f46-4934-951f-df8e0f297ff0 which can be used as unique global reference for Check Point Iranian Proxies December 4 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-08T00:00:00Z
date_published 2023-12-04T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Check Point Research Report: Iranian Hacktivist Proxies Escalate Activities Beyond Israel

EclecticLightChecksonEXECodeSigning

Howard Oakley. (2020, November 16). Checks on executable code in Catalina and Big Sur: a first draft. Retrieved September 21, 2022.

Internal MISP references

UUID 2885db46-4f8c-4c35-901c-7641c7701293 which can be used as unique global reference for EclecticLightChecksonEXECodeSigning in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-21T00:00:00Z
date_published 2020-11-16T00:00:00Z
source MITRE
title Checks on executable code in Catalina and Big Sur: a first draft

Mandiant Pulse Secure Zero-Day April 2021

Perez, D. et al. (2021, April 20). Check Your Pulse: Suspected APT Actors Leverage Authentication Bypass Techniques and Pulse Secure Zero-Day. Retrieved February 5, 2024.

Internal MISP references

UUID 0760480c-97be-5fc9-a6aa-f1df91a314a3 which can be used as unique global reference for Mandiant Pulse Secure Zero-Day April 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-05T00:00:00Z
date_published 2021-04-20T00:00:00Z
source MITRE
title Check Your Pulse: Suspected APT Actors Leverage Authentication Bypass Techniques and Pulse Secure Zero-Day

Anomali MUSTANG PANDA October 2019

Anomali Threat Research. (2019, October 7). China-Based APT Mustang Panda Targets Minority Groups, Public and Private Sector Organizations. Retrieved April 12, 2021.

Internal MISP references

UUID 70277fa4-60a8-475e-993a-c74241b76127 which can be used as unique global reference for Anomali MUSTANG PANDA October 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-12T00:00:00Z
date_published 2019-10-07T00:00:00Z
source MITRE, Tidal Cyber
title China-Based APT Mustang Panda Targets Minority Groups, Public and Private Sector Organizations

FireEye admin@338

FireEye Threat Intelligence. (2015, December 1). China-based Cyber Threat Group Uses Dropbox for Malware Communications and Targets Hong Kong Media Outlets. Retrieved December 4, 2015.

Internal MISP references

UUID f3470275-9652-440e-914d-ad4fc5165413 which can be used as unique global reference for FireEye admin@338 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-12-04T00:00:00Z
date_published 2015-12-01T00:00:00Z
source MITRE, Tidal Cyber
title China-based Cyber Threat Group Uses Dropbox for Malware Communications and Targets Hong Kong Media Outlets

IronNet BlackTech Oct 2021

Demboski, M., et al. (2021, October 26). China cyber attacks: the current threat landscape. Retrieved March 25, 2022.

Internal MISP references

UUID 98b2d114-4246-409d-934a-238682fd5ae6 which can be used as unique global reference for IronNet BlackTech Oct 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-25T00:00:00Z
date_published 2021-10-26T00:00:00Z
source MITRE
title China cyber attacks: the current threat landscape

Recorded Future RedEcho Feb 2021

Insikt Group. (2021, February 28). China-Linked Group RedEcho Targets the Indian Power Sector Amid Heightened Border Tensions. Retrieved March 22, 2021.

Internal MISP references

UUID 6da7eb8a-aab4-41ea-a0b7-5313d88cbe91 which can be used as unique global reference for Recorded Future RedEcho Feb 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-22T00:00:00Z
date_published 2021-02-28T00:00:00Z
source MITRE
title China-Linked Group RedEcho Targets the Indian Power Sector Amid Heightened Border Tensions

WSJ Salt Typhoon September 26 2024

Sarah Krouse, Robert McMillan, Dustin Volz. (2024, September 26). China-Linked Hackers Breach U.S. Internet Providers in New ‘Salt Typhoon’ Cyberattack. Retrieved October 24, 2024.

Internal MISP references

UUID 15b4c5c3-edf2-4f6b-b398-62767cfabf5a which can be used as unique global reference for WSJ Salt Typhoon September 26 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-24T00:00:00Z
date_published 2024-09-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title China-Linked Hackers Breach U.S. Internet Providers in New ‘Salt Typhoon’ Cyberattack

Sygnia Velvet Ant June 17 2024

Sygnia Team. (2024, June 17). China-Nexus Threat Group ‘Velvet Ant’ Abuses F5 Load Balancers for Persistence. Retrieved June 20, 2024.

Internal MISP references

UUID 5c313af4-61a8-449d-a6c7-f7ead6c72e19 which can be used as unique global reference for Sygnia Velvet Ant June 17 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-20T00:00:00Z
date_published 2024-06-17T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title China-Nexus Threat Group ‘Velvet Ant’ Abuses F5 Load Balancers for Persistence

Sygnia Velvet Ant July 1 2024

Sygnia. (2024, July 1). China-Nexus Threat Group ‘Velvet Ant’ Exploits Cisco Zero-Day (CVE-2024-20399) to Compromise Nexus Switch Devices. Retrieved July 3, 2024.

Internal MISP references

UUID a0cfeeb6-4617-4dea-80d2-290eaf2bcf5b which can be used as unique global reference for Sygnia Velvet Ant July 1 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-03T00:00:00Z
date_published 2024-07-01T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title China-Nexus Threat Group ‘Velvet Ant’ Exploits Cisco Zero-Day (CVE-2024-20399) to Compromise Nexus Switch Devices

EFF China GitHub Attack

Budington, B. (2015, April 2). China Uses Unencrypted Websites to Hijack Browsers in GitHub Attack. Retrieved September 1, 2023.

Internal MISP references

UUID b8405628-6366-5cc9-a9af-b97d5c9176dd which can be used as unique global reference for EFF China GitHub Attack in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-01T00:00:00Z
date_published 2015-04-02T00:00:00Z
source MITRE
title China Uses Unencrypted Websites to Hijack Browsers in GitHub Attack

PaloAlto 3102 Sept 2015

Falcone, R. & Miller-Osborn, J. (2015, September 23). Chinese Actors Use ‘3102’ Malware in Attacks on US Government and EU Media. Retrieved March 19, 2018.

Internal MISP references

UUID db340043-43a7-4b16-a570-92a0d879b2bf which can be used as unique global reference for PaloAlto 3102 Sept 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-19T00:00:00Z
date_published 2015-09-23T00:00:00Z
source MITRE
title Chinese Actors Use ‘3102’ Malware in Attacks on US Government and EU Media

ZScaler Hacking Team

Desai, D.. (2015, August 14). Chinese cyber espionage APT group leveraging recently leaked Hacking Team exploits to target a Financial Services Firm. Retrieved January 26, 2016.

Internal MISP references

UUID 83e6ab22-1f01-4c9b-90e5-0279af487805 which can be used as unique global reference for ZScaler Hacking Team in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-26T00:00:00Z
date_published 2015-08-14T00:00:00Z
source MITRE
title Chinese cyber espionage APT group leveraging recently leaked Hacking Team exploits to target a Financial Services Firm

Hacker News LuckyMouse June 2018

Khandelwal, S. (2018, June 14). Chinese Hackers Carried Out Country-Level Watering Hole Attack. Retrieved August 18, 2018.

Internal MISP references

UUID de78446a-cb46-4422-820b-9ddf07557b1a which can be used as unique global reference for Hacker News LuckyMouse June 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-18T00:00:00Z
date_published 2018-06-14T00:00:00Z
source MITRE
title Chinese Hackers Carried Out Country-Level Watering Hole Attack

The Hacker News Velvet Ant Cisco July 2 2024

Newsroom. (2024, July 2). Chinese Hackers Exploiting Cisco Switches Zero-Day to Deliver Malware. Retrieved July 3, 2024.

Internal MISP references

UUID e3949201-c949-4126-9e02-34bfad4713c0 which can be used as unique global reference for The Hacker News Velvet Ant Cisco July 2 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-03T00:00:00Z
date_published 2024-07-02T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Chinese Hackers Exploiting Cisco Switches Zero-Day to Deliver Malware

BleepingComputer Mustang Panda September 9 2024

Bill Toulas. (2024, September 9). Chinese hackers use new data theft malware in govt attacks. Retrieved September 13, 2024.

Internal MISP references

UUID 40774c9c-daca-4ea0-a504-ca73b11e4f29 which can be used as unique global reference for BleepingComputer Mustang Panda September 9 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-13T00:00:00Z
date_published 2024-09-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Chinese hackers use new data theft malware in govt attacks

The Record APT31 Router Hacks

Catalin Cimpanu. (2021, July 20). Chinese hacking group APT31 uses mesh of home routers to disguise attacks. Retrieved April 25, 2024.

Internal MISP references

UUID 41fc3724-85a0-4ad0-9494-47f89f3b079b which can be used as unique global reference for The Record APT31 Router Hacks in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-25T00:00:00Z
date_published 2021-07-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Chinese hacking group APT31 uses mesh of home routers to disguise attacks

ORB APT31

Cimpanu, Catalin. (2021, July 20). Chinese hacking group APT31 uses mesh of home routers to disguise attacks. Retrieved July 8, 2024.

Internal MISP references

UUID 67b5e2ef-21cc-52f6-95c9-88a8cdcbe74e which can be used as unique global reference for ORB APT31 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-08T00:00:00Z
date_published 2021-07-20T00:00:00Z
source MITRE
title Chinese hacking group APT31 uses mesh of home routers to disguise attacks

Dark Reading Codoso Feb 2015

Chickowski, E. (2015, February 10). Chinese Hacking Group Codoso Team Uses Forbes.com As Watering Hole. Retrieved September 13, 2018.

Internal MISP references

UUID c24035b1-2021-44ae-b01e-651e44526737 which can be used as unique global reference for Dark Reading Codoso Feb 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-09-13T00:00:00Z
date_published 2015-02-10T00:00:00Z
source MITRE
title Chinese Hacking Group Codoso Team Uses Forbes.com As Watering Hole

Recorded Future TAG-22 July 2021

INSIKT GROUP. (2021, July 8). Chinese State-Sponsored Activity Group TAG-22 Targets Nepal, the Philippines, and Taiwan Using Winnti and Other Tooling. Retrieved September 16, 2024.

Internal MISP references

UUID 258433e7-f829-4365-adbb-c5690159070f which can be used as unique global reference for Recorded Future TAG-22 July 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-16T00:00:00Z
date_published 2021-07-08T00:00:00Z
source MITRE
title Chinese State-Sponsored Activity Group TAG-22 Targets Nepal, the Philippines, and Taiwan Using Winnti and Other Tooling

Recorded Future Chinese Activity in Southeast Asia December 2021

Insikt Group. (2021, December 8). Chinese State-Sponsored Cyber Espionage Activity Supports Expansion of Regional Power and Influence in Southeast Asia. Retrieved September 19, 2022.

Internal MISP references

UUID 0809db3b-81a8-475d-920a-cb913b30f42e which can be used as unique global reference for Recorded Future Chinese Activity in Southeast Asia December 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-19T00:00:00Z
date_published 2021-12-08T00:00:00Z
source MITRE
title Chinese State-Sponsored Cyber Espionage Activity Supports Expansion of Regional Power and Influence in Southeast Asia

Recorded Future REDDELTA July 2020

Insikt Group. (2020, July 28). CHINESE STATE-SPONSORED GROUP ‘REDDELTA’ TARGETS THE VATICAN AND CATHOLIC ORGANIZATIONS. Retrieved April 13, 2021.

Internal MISP references

UUID e2bc037e-d483-4670-8281-70e51b16effe which can be used as unique global reference for Recorded Future REDDELTA July 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-13T00:00:00Z
date_published 2020-07-28T00:00:00Z
source MITRE
title CHINESE STATE-SPONSORED GROUP ‘REDDELTA’ TARGETS THE VATICAN AND CATHOLIC ORGANIZATIONS

Github CHIPSEC

Intel. (2017, March 18). CHIPSEC Platform Security Assessment Framework. Retrieved March 20, 2017.

Internal MISP references

UUID 47501334-56cb-453b-a9e3-33990d88018b which can be used as unique global reference for Github CHIPSEC in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-20T00:00:00Z
date_published 2017-03-18T00:00:00Z
source MITRE
title CHIPSEC Platform Security Assessment Framework

McAfee CHIPSEC Blog

Beek, C., Samani, R. (2017, March 8). CHIPSEC Support Against Vault 7 Disclosure Scanning. Retrieved March 13, 2017.

Internal MISP references

UUID b65ed687-c279-4f64-9dd2-839164cd269c which can be used as unique global reference for McAfee CHIPSEC Blog in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-13T00:00:00Z
date_published 2017-03-08T00:00:00Z
source MITRE
title CHIPSEC Support Against Vault 7 Disclosure Scanning

Chkrootkit Main

Murilo, N., Steding-Jessen, K. (2017, August 23). Chkrootkit. Retrieved April 9, 2018.

Internal MISP references

UUID 828fb4b9-17a6-4a87-ac2a-631643adb18d which can be used as unique global reference for Chkrootkit Main in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-09T00:00:00Z
date_published 2017-08-23T00:00:00Z
source MITRE
title Chkrootkit

Azure AD Hybrid Identity

Microsoft. (2022, August 26). Choose the right authentication method for your Azure Active Directory hybrid identity solution. Retrieved September 28, 2022.

Internal MISP references

UUID b019406c-6e39-41a2-a8b4-97f8d6482147 which can be used as unique global reference for Azure AD Hybrid Identity in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-28T00:00:00Z
date_published 2022-08-26T00:00:00Z
source MITRE
title Choose the right authentication method for your Azure Active Directory hybrid identity solution

Red Canary May 25 2022

Aedan Russell. (2022, May 25). ChromeLoader a pushy malvertiser. Retrieved September 26, 2024.

Internal MISP references

UUID bffc87ac-e51b-47e3-8a9f-547e762e95c2 which can be used as unique global reference for Red Canary May 25 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-26T00:00:00Z
date_published 2022-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title ChromeLoader a pushy malvertiser

Chrome Remote Desktop

Huntress. (n.d.). Retrieved March 14, 2024.

Internal MISP references

UUID c1b2d0e9-2396-5080-aea3-58a99c027d20 which can be used as unique global reference for Chrome Remote Desktop in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-14T00:00:00Z
source MITRE
title Chrome Remote Desktop

Truesec AB August 30 2024

Simon Hertzberg. (2024, August 30). Cicada 3301 - Ransomware-as-a-Service - Technical Analysis. Retrieved September 4, 2024.

Internal MISP references

UUID de2de0a9-17d2-41c2-838b-7850762b80ae which can be used as unique global reference for Truesec AB August 30 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-04T00:00:00Z
date_published 2024-08-30T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Cicada 3301 - Ransomware-as-a-Service - Technical Analysis

BleepingComputer Void Banshee September 16 2024

Sergiu Gatlan. (2024, September 20). CISA warns of Windows flaw used in infostealer malware attacks. Retrieved September 19, 2024.

Internal MISP references

UUID 2c9a2355-02c5-4718-ad6e-b2fac9ad4096 which can be used as unique global reference for BleepingComputer Void Banshee September 16 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-19T00:00:00Z
date_published 2024-09-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title CISA warns of Windows flaw used in infostealer malware attacks

show_ssh_users_cmd_cisco

Cisco. (2023, March 7). Cisco IOS Security Command Reference: Commands S to Z . Retrieved July 13, 2022.

Internal MISP references

UUID 11d34884-4559-57ad-8910-54e517c6493e which can be used as unique global reference for show_ssh_users_cmd_cisco in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-13T00:00:00Z
date_published 2023-03-07T00:00:00Z
source MITRE
title Cisco IOS Security Command Reference: Commands S to Z

Cisco IOS Shellcode

George Nosenko. (2015). CISCO IOS SHELLCODE: ALL-IN-ONE. Retrieved October 21, 2020.

Internal MISP references

UUID 55a45f9b-7be4-4f1b-8b19-a0addf9da8d8 which can be used as unique global reference for Cisco IOS Shellcode in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-21T00:00:00Z
date_published 2015-01-01T00:00:00Z
source MITRE
title CISCO IOS SHELLCODE: ALL-IN-ONE

Cisco IOS Software Integrity Assurance - AAA

Cisco. (n.d.). Cisco IOS Software Integrity Assurance - AAA. Retrieved October 19, 2020.

Internal MISP references

UUID 2d1b5021-91ad-43c9-8527-4978fa779168 which can be used as unique global reference for Cisco IOS Software Integrity Assurance - AAA in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
source MITRE
title Cisco IOS Software Integrity Assurance - AAA

Cisco IOS Software Integrity Assurance - Boot Information

Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Boot Information. Retrieved October 21, 2020.

Internal MISP references

UUID 5349863a-00c1-42bf-beac-4e7d053d6311 which can be used as unique global reference for Cisco IOS Software Integrity Assurance - Boot Information in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-21T00:00:00Z
source MITRE
title Cisco IOS Software Integrity Assurance - Boot Information

Cisco IOS Software Integrity Assurance - Change Control

Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Change Control. Retrieved October 21, 2020.

Internal MISP references

UUID 8fb532f2-c730-4b86-b8d2-2314ce559289 which can be used as unique global reference for Cisco IOS Software Integrity Assurance - Change Control in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-21T00:00:00Z
source MITRE
title Cisco IOS Software Integrity Assurance - Change Control

Cisco IOS Software Integrity Assurance - Image File Verification

Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Cisco IOS Image File Verification. Retrieved October 19, 2020.

Internal MISP references

UUID f1d736cb-63c1-43e8-a83b-ed86b7c27606 which can be used as unique global reference for Cisco IOS Software Integrity Assurance - Image File Verification in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
source MITRE
title Cisco IOS Software Integrity Assurance - Cisco IOS Image File Verification

Cisco IOS Software Integrity Assurance - Run-Time Memory Verification

Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Cisco IOS Run-Time Memory Integrity Verification. Retrieved October 19, 2020.

Internal MISP references

UUID 284608ea-3769-470e-950b-cbd67796b20f which can be used as unique global reference for Cisco IOS Software Integrity Assurance - Run-Time Memory Verification in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
source MITRE
title Cisco IOS Software Integrity Assurance - Cisco IOS Run-Time Memory Integrity Verification

Cisco IOS Software Integrity Assurance - Command History

Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Command History. Retrieved October 21, 2020.

Internal MISP references

UUID dbca06dd-1184-4d52-9ee8-b059e368033c which can be used as unique global reference for Cisco IOS Software Integrity Assurance - Command History in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-21T00:00:00Z
source MITRE
title Cisco IOS Software Integrity Assurance - Command History

Cisco IOS Software Integrity Assurance - Credentials Management

Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Credentials Management. Retrieved October 19, 2020.

Internal MISP references

UUID 9a7428e3-bd77-4c3e-ac90-c4e30d504ba6 which can be used as unique global reference for Cisco IOS Software Integrity Assurance - Credentials Management in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
source MITRE
title Cisco IOS Software Integrity Assurance - Credentials Management

Cisco IOS Software Integrity Assurance - Deploy Signed IOS

Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Deploy Signed IOS. Retrieved October 21, 2020.

Internal MISP references

UUID 71ea5591-6e46-4c58-a4e8-c629eba1b6c5 which can be used as unique global reference for Cisco IOS Software Integrity Assurance - Deploy Signed IOS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-21T00:00:00Z
source MITRE
title Cisco IOS Software Integrity Assurance - Deploy Signed IOS

Cisco IOS Software Integrity Assurance - Image File Integrity

Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Image File Integrity. Retrieved October 21, 2020.

Internal MISP references

UUID 90909bd4-15e8-48ee-8067-69f04736c583 which can be used as unique global reference for Cisco IOS Software Integrity Assurance - Image File Integrity in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-21T00:00:00Z
source MITRE
title Cisco IOS Software Integrity Assurance - Image File Integrity

Cisco IOS Software Integrity Assurance - Secure Boot

Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Secure Boot. Retrieved October 19, 2020.

Internal MISP references

UUID 4f6f686e-bcda-480a-88a1-ad7b00084c13 which can be used as unique global reference for Cisco IOS Software Integrity Assurance - Secure Boot in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
source MITRE
title Cisco IOS Software Integrity Assurance - Secure Boot

Cisco IOS Software Integrity Assurance - TACACS

Cisco. (n.d.). Cisco IOS Software Integrity Assurance - TACACS. Retrieved October 19, 2020.

Internal MISP references

UUID 54506dc2-6496-4edb-a5bf-fe64bf235ac0 which can be used as unique global reference for Cisco IOS Software Integrity Assurance - TACACS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
source MITRE
title Cisco IOS Software Integrity Assurance - TACACS

Cisco Traffic Mirroring

Cisco. (n.d.). Cisco IOS XR Interface and Hardware Component Configuration Guide for the Cisco CRS Router, Release 5.1.x. Retrieved October 19, 2020.

Internal MISP references

UUID 1a5c86ad-d3b1-408b-a6b4-14ca0e572020 which can be used as unique global reference for Cisco Traffic Mirroring in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
source MITRE
title Cisco IOS XR Interface and Hardware Component Configuration Guide for the Cisco CRS Router, Release 5.1.x

Talos - Cisco Attack 2022

Nick Biasini. (2022, August 10). Cisco Talos shares insights related to recent cyber attack on Cisco. Retrieved March 9, 2023.

Internal MISP references

UUID 143182ad-6a16-5a0d-a5c4-7dae721a9e26 which can be used as unique global reference for Talos - Cisco Attack 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-09T00:00:00Z
date_published 2022-08-10T00:00:00Z
source MITRE
title Cisco Talos shares insights related to recent cyber attack on Cisco

Citrix Bulletin CVE-2023-3519

Citrix. (2023, July 18). Citrix ADC and Citrix Gateway Security Bulletin for CVE-2023-3519, CVE-2023-3466, CVE-2023-3467. Retrieved July 24, 2023.

Internal MISP references

UUID 245ef1b7-778d-4df2-99a9-b51c95c57580 which can be used as unique global reference for Citrix Bulletin CVE-2023-3519 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-24T00:00:00Z
date_published 2023-07-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Citrix ADC and Citrix Gateway Security Bulletin for CVE-2023-3519, CVE-2023-3466, CVE-2023-3467

Malwarebytes Citrix Bleed November 24 2023

Pieter Arntz. (2023, November 24). Citrix Bleed widely exploited, warn government agencies. Retrieved November 30, 2023.

Internal MISP references

UUID fdc86cea-0015-48d1-934f-b22244de6306 which can be used as unique global reference for Malwarebytes Citrix Bleed November 24 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-11-30T00:00:00Z
date_published 2023-11-24T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Citrix Bleed widely exploited, warn government agencies

Cyble April 28 2023

Cybleinc. (2023, April 28). Citrix Users at Risk: AresLoader Spreading Through Disguised GitLab Repo. Retrieved May 7, 2023.

Internal MISP references

UUID 2d6bea2c-cc19-4ff7-873f-151f1ff354cb which can be used as unique global reference for Cyble April 28 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2023-04-28T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Citrix Users at Risk: AresLoader Spreading Through Disguised GitLab Repo

Cyble April 03 2023

Cybleinc. (2023, April 3). Cl0p Ransomware: Active Threat Plaguing Businesses Worldwide. Retrieved May 25, 2023.

Internal MISP references

UUID 8c7815c4-ed8d-47c3-84af-b7cdabd49652 which can be used as unique global reference for Cyble April 03 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-25T00:00:00Z
date_published 2023-04-03T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Cl0p Ransomware: Active Threat Plaguing Businesses Worldwide

Talent-Jump Clambling February 2020

Chen, T. and Chen, Z. (2020, February 17). CLAMBLING - A New Backdoor Base On Dropbox. Retrieved November 12, 2021.

Internal MISP references

UUID 51144a8a-0cd4-4d5d-826b-21c2dc8422be which can be used as unique global reference for Talent-Jump Clambling February 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-11-12T00:00:00Z
date_published 2020-02-17T00:00:00Z
source MITRE
title CLAMBLING - A New Backdoor Base On Dropbox

FireEye Clandestine Fox Part 2

Scott, M.. (2014, June 10). Clandestine Fox, Part Deux. Retrieved January 14, 2016.

Internal MISP references

UUID 82500741-984d-4039-8f53-b303845c2849 which can be used as unique global reference for FireEye Clandestine Fox Part 2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-14T00:00:00Z
date_published 2014-06-10T00:00:00Z
source MITRE
title Clandestine Fox, Part Deux

Microsoft Clear-EventLog

Microsoft. (n.d.). Clear-EventLog. Retrieved July 2, 2018.

Internal MISP references

UUID 35944ff0-2bbd-4055-8e8a-cfff27241a8a which can be used as unique global reference for Microsoft Clear-EventLog in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-02T00:00:00Z
source MITRE
title Clear-EventLog

Clearing quarantine attribute

Rich Trouton. (2012, November 20). Clearing the quarantine extended attribute from downloaded applications. Retrieved July 5, 2017.

Internal MISP references

UUID 4115ab53-751c-4016-9151-a55eab7d6ddf which can be used as unique global reference for Clearing quarantine attribute in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-05T00:00:00Z
date_published 2012-11-20T00:00:00Z
source MITRE
title Clearing the quarantine extended attribute from downloaded applications

Huntress NPPSPY 2022

Dray Agha. (2022, August 16). Cleartext Shenanigans: Gifting User Passwords to Adversaries With NPPSPY. Retrieved May 17, 2024.

Internal MISP references

UUID 833c22ac-4f65-521a-9eda-8d22e255577e which can be used as unique global reference for Huntress NPPSPY 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-17T00:00:00Z
date_published 2022-08-16T00:00:00Z
source MITRE
title Cleartext Shenanigans: Gifting User Passwords to Adversaries With NPPSPY

NPPSPY - Huntress

Dray Agha. (2022, August 16). Cleartext Shenanigans: Gifting User Passwords to Adversaries With NPPSPY. Retrieved March 30, 2023.

Internal MISP references

UUID df1f7379-38c3-5ca9-8333-d684022c000c which can be used as unique global reference for NPPSPY - Huntress in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-30T00:00:00Z
date_published 2022-08-16T00:00:00Z
source MITRE
title Cleartext Shenanigans: Gifting User Passwords to Adversaries With NPPSPY

Microsoft Learn ClickOnce and Authenticode

Microsoft. (2023, March 9). ClickOnce and Authenticode. Retrieved September 9, 2024.

Internal MISP references

UUID 5e5c02cf-02fe-591a-b597-778999ab31c4 which can be used as unique global reference for Microsoft Learn ClickOnce and Authenticode in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-09T00:00:00Z
date_published 2023-03-09T00:00:00Z
source MITRE
title ClickOnce and Authenticode

Burke/CISA ClickOnce BlackHat

William Joseph Burke III. (2019, August 7). CLICKONCE AND YOU’RE IN: When .appref-ms abuse is operating as intended. Retrieved September 9, 2024.

Internal MISP references

UUID 5a1b4ee9-1c22-5f12-9fd9-723cc0055f4b which can be used as unique global reference for Burke/CISA ClickOnce BlackHat in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-09T00:00:00Z
date_published 2019-08-07T00:00:00Z
source MITRE
title CLICKONCE AND YOU’RE IN: When .appref-ms abuse is operating as intended

Microsoft Learn ClickOnce

Microsoft. (2023, September 14). ClickOnce security and deployment. Retrieved September 9, 2024.

Internal MISP references

UUID 2e91b430-81e7-54e1-8e8c-763f71146e0c which can be used as unique global reference for Microsoft Learn ClickOnce in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-09T00:00:00Z
date_published 2023-09-14T00:00:00Z
source MITRE
title ClickOnce security and deployment

CL_Invocation.ps1 - LOLBAS Project

LOLBAS. (2018, May 25). CL_Invocation.ps1. Retrieved December 4, 2023.

Internal MISP references

UUID a53e093a-973c-491d-91e3-bc7804d87b8b which can be used as unique global reference for CL_Invocation.ps1 - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title CL_Invocation.ps1

clip_win_server

Microsoft, JasonGerend, et al. (2023, February 3). clip. Retrieved June 21, 2022.

Internal MISP references

UUID 8a961fa1-def0-5efe-8599-62e884d4ea22 which can be used as unique global reference for clip_win_server in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-21T00:00:00Z
date_published 2023-02-03T00:00:00Z
source MITRE
title clip

Red Canary Silver Sparrow Feb2021

Tony Lambert. (2021, February 18). Clipping Silver Sparrow’s wings: Outing macOS malware before it takes flight. Retrieved April 20, 2021.

Internal MISP references

UUID f08a856d-6c3e-49e2-b7ba-399831c637e5 which can be used as unique global reference for Red Canary Silver Sparrow Feb2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-20T00:00:00Z
date_published 2021-02-18T00:00:00Z
source MITRE
title Clipping Silver Sparrow’s wings: Outing macOS malware before it takes flight

CL_LoadAssembly.ps1 - LOLBAS Project

LOLBAS. (2021, September 26). CL_LoadAssembly.ps1. Retrieved December 4, 2023.

Internal MISP references

UUID 31a14027-1181-49b9-87bf-78a65a551312 which can be used as unique global reference for CL_LoadAssembly.ps1 - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-09-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title CL_LoadAssembly.ps1

CL_Mutexverifiers.ps1 - LOLBAS Project

LOLBAS. (2018, May 25). CL_Mutexverifiers.ps1. Retrieved December 4, 2023.

Internal MISP references

UUID 75b89502-21ed-4920-95cc-212eaf17f281 which can be used as unique global reference for CL_Mutexverifiers.ps1 - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title CL_Mutexverifiers.ps1

Google Cloud Mandiant UNC3886 2024

Punsaen Boonyakarn, Shawn Chew, Logeswaran Nadarajan, Mathew Potaczek, Jakub Jozwiak, and Alex Marvi. (2024, June 18). Cloaked and Covert: Uncovering UNC3886 Espionage Operations. Retrieved September 24, 2024.

Internal MISP references

UUID 77b32efe-b936-5541-b0fb-aa442a7d11b7 which can be used as unique global reference for Google Cloud Mandiant UNC3886 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-24T00:00:00Z
date_published 2024-06-18T00:00:00Z
source MITRE
title Cloaked and Covert: Uncovering UNC3886 Espionage Operations

Cybereason Clop Dec 2020

Cybereason Nocturnus. (2020, December 23). Cybereason vs. Clop Ransomware. Retrieved May 11, 2021.

Internal MISP references

UUID f54d682d-100e-41bb-96be-6a79ea422066 which can be used as unique global reference for Cybereason Clop Dec 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-05-11T00:00:00Z
source MITRE
title Clop Ransomware

Mcafee Clop Aug 2019

Mundo, A. (2019, August 1). Clop Ransomware. Retrieved May 10, 2021.

Internal MISP references

UUID 458141bd-7dd2-41fd-82e8-7ea2e4a477ab which can be used as unique global reference for Mcafee Clop Aug 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-05-10T00:00:00Z
date_published 2019-08-01T00:00:00Z
source MITRE
title Clop Ransomware

Bleeping Computer Clop February 2023

Sergiu Gatlan. (2023, February 10). Clop ransomware claims it breached 130 orgs using GoAnywhere zero-day. Retrieved May 8, 2023.

Internal MISP references

UUID ccfa7e78-1ee9-4d46-9f03-137eb12cf474 which can be used as unique global reference for Bleeping Computer Clop February 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-08T00:00:00Z
date_published 2023-02-10T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Clop ransomware claims it breached 130 orgs using GoAnywhere zero-day

Kaspersky Cloud Atlas December 2014

GReAT. (2014, December 10). Cloud Atlas: RedOctober APT is back in style. Retrieved May 8, 2020.

Internal MISP references

UUID 41a9b3e3-0953-4bde-9e1d-c2f51de1120e which can be used as unique global reference for Kaspersky Cloud Atlas December 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-08T00:00:00Z
date_published 2014-12-10T00:00:00Z
source MITRE
title Cloud Atlas: RedOctober APT is back in style

Kandji 4 8 2024

Adam Kohler; Christopher Lopez. (2024, April 8). CloudChat Infostealer How It Works, What It Does. Retrieved April 19, 2024.

Internal MISP references

UUID f2e74613-f578-4408-bc76-144ec671808b which can be used as unique global reference for Kandji 4 8 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-19T00:00:00Z
date_published 2024-04-08T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title CloudChat Infostealer How It Works, What It Does

Rhino Labs Cloud Backdoor September 2019

Rhino Labs. (2019, September). Cloud Container Attack Tool (CCAT). Retrieved September 12, 2019.

Internal MISP references

UUID ac31b781-dbe4-49c2-b7af-dfb23d435ce8 which can be used as unique global reference for Rhino Labs Cloud Backdoor September 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-12T00:00:00Z
date_published 2019-09-01T00:00:00Z
source MITRE
title Cloud Container Attack Tool (CCAT)

Google Cloud Storage

Google. (n.d.). Cloud Storage. Retrieved October 13, 2021.

Internal MISP references

UUID 5fe51b4e-9b82-4e97-bb65-73708349538a which can be used as unique global reference for Google Cloud Storage in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-13T00:00:00Z
source MITRE
title Cloud Storage

Office 265 Azure Domain Availability

Microsoft. (2017, January 23). (Cloud) Tip of the Day: Advanced way to check domain availability for Office 365 and Azure. Retrieved May 27, 2022.

Internal MISP references

UUID dddf33ea-d074-4bc4-98d2-39b7e843e37d which can be used as unique global reference for Office 265 Azure Domain Availability in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-27T00:00:00Z
date_published 2017-01-23T00:00:00Z
source MITRE
title (Cloud) Tip of the Day: Advanced way to check domain availability for Office 365 and Azure

Datadog S3 Lifecycle CloudTrail Logs

Stratus Red Team. (n.d.). CloudTrail Logs Impairment Through S3 Lifecycle Rule. Retrieved September 25, 2024.

Internal MISP references

UUID 08efef52-40f6-5c76-a1b6-76ac1b7f423b which can be used as unique global reference for Datadog S3 Lifecycle CloudTrail Logs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-25T00:00:00Z
source MITRE
title CloudTrail Logs Impairment Through S3 Lifecycle Rule

Mandiant Cloudy Logs 2023

Pany, D. & Hanley, C. (2023, May 3). Cloudy with a Chance of Bad Logs: Cloud Platform Log Configurations to Consider in Investigations. Retrieved October 16, 2023.

Internal MISP references

UUID a9835fe9-8227-5310-a728-1d09f19342b3 which can be used as unique global reference for Mandiant Cloudy Logs 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-16T00:00:00Z
date_published 2023-05-03T00:00:00Z
source MITRE
title Cloudy with a Chance of Bad Logs: Cloud Platform Log Configurations to Consider in Investigations

win_clsid_key

Microsoft. (2018, May 31). CLSID Key. Retrieved September 24, 2021.

Internal MISP references

UUID 239bb629-2733-4da3-87c2-47a7ab55433f which can be used as unique global reference for win_clsid_key in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-24T00:00:00Z
date_published 2018-05-31T00:00:00Z
source MITRE
title CLSID Key

Kube Cluster Admin

kubernetes. (2021, January 16). Cluster Administration. Retrieved October 13, 2021.

Internal MISP references

UUID 6c5f2465-1db3-46cc-8d2a-9763c21aa8cc which can be used as unique global reference for Kube Cluster Admin in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-13T00:00:00Z
date_published 2021-01-16T00:00:00Z
source MITRE
title Cluster Administration

Kube Cluster Info

kubernetes. (n.d.). cluster-info. Retrieved October 13, 2021.

Internal MISP references

UUID 0f8b5d79-2393-45a2-b6d4-df394e513e39 which can be used as unique global reference for Kube Cluster Info in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-13T00:00:00Z
source MITRE
title cluster-info

TechNet Cmd

Microsoft. (n.d.). Cmd. Retrieved April 18, 2016.

Internal MISP references

UUID dbfc01fe-c300-4c27-ab9a-a20508c1e04b which can be used as unique global reference for TechNet Cmd in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-18T00:00:00Z
source MITRE
title Cmd

Cmd.exe - LOLBAS Project

LOLBAS. (2019, June 26). Cmd.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 887aa9af-3f0e-42bb-8c40-39149f34b922 which can be used as unique global reference for Cmd.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2019-06-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Cmd.exe

Cmdkey.exe - LOLBAS Project

LOLBAS. (2018, May 25). Cmdkey.exe. Retrieved December 4, 2023.

Internal MISP references

UUID c9ca075a-8327-463d-96ec-adddf6f1a7bb which can be used as unique global reference for Cmdkey.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Cmdkey.exe

cmdl32.exe - LOLBAS Project

LOLBAS. (2021, August 26). cmdl32.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 2628e452-caa1-4058-a405-7c4657fa3245 which can be used as unique global reference for cmdl32.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-08-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title cmdl32.exe

Cmstp.exe - LOLBAS Project

LOLBAS. (2018, May 25). Cmstp.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 86c21dcd-464a-4870-8aae-25fcaccc889d which can be used as unique global reference for Cmstp.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Cmstp.exe

Twitter CMSTP Jan 2018

Tyrer, N. (2018, January 30). CMSTP.exe - remote .sct execution applocker bypass. Retrieved September 12, 2024.

Internal MISP references

UUID 3847149c-1463-4d94-be19-0a8cf1db0b58 which can be used as unique global reference for Twitter CMSTP Jan 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2018-01-30T00:00:00Z
source MITRE
title CMSTP.exe - remote .sct execution applocker bypass

Secureworks COBALT DICKENS September 2019

Counter Threat Unit Research Team. (2019, September 11). COBALT DICKENS Goes Back to School…Again. Retrieved February 3, 2021.

Internal MISP references

UUID 45815e4d-d678-4823-8315-583893e263e6 which can be used as unique global reference for Secureworks COBALT DICKENS September 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-03T00:00:00Z
date_published 2019-09-11T00:00:00Z
source MITRE
title COBALT DICKENS Goes Back to School…Again

Morphisec Cobalt Gang Oct 2018

Gorelik, M. (2018, October 08). Cobalt Group 2.0. Retrieved November 5, 2018.

Internal MISP references

UUID 0a0bdd4b-a680-4a38-967d-3ad92f04d619 which can be used as unique global reference for Morphisec Cobalt Gang Oct 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-05T00:00:00Z
date_published 2018-10-08T00:00:00Z
source MITRE
title Cobalt Group 2.0

Secureworks COBALT GYPSY Threat Profile

Secureworks. (n.d.). COBALT GYPSY Threat Profile. Retrieved April 14, 2021.

Internal MISP references

UUID f1c21834-7536-430b-8539-e68373718b4d which can be used as unique global reference for Secureworks COBALT GYPSY Threat Profile in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-14T00:00:00Z
source MITRE
title COBALT GYPSY Threat Profile

Secureworks COBALT ILLUSION Threat Profile

Secureworks. (n.d.). COBALT ILLUSION Threat Profile. Retrieved April 14, 2021.

Internal MISP references

UUID 8d9a5b77-2516-4ad5-9710-4c8165df2882 which can be used as unique global reference for Secureworks COBALT ILLUSION Threat Profile in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-14T00:00:00Z
source MITRE
title COBALT ILLUSION Threat Profile

PTSecurity Cobalt Dec 2016

Positive Technologies. (2016, December 16). Cobalt Snatch. Retrieved October 9, 2018.

Internal MISP references

UUID 2de4d38f-c99d-4149-89e6-0349a4902aa2 which can be used as unique global reference for PTSecurity Cobalt Dec 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-10-09T00:00:00Z
date_published 2016-12-16T00:00:00Z
source MITRE
title Cobalt Snatch

CobaltStrike Daddy May 2017

Mudge, R. (2017, May 23). Cobalt Strike 3.8 – Who’s Your Daddy?. Retrieved June 4, 2019.

Internal MISP references

UUID 056ef3cd-885d-41d6-9547-a2a575b03662 which can be used as unique global reference for CobaltStrike Daddy May 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-04T00:00:00Z
date_published 2017-05-23T00:00:00Z
source MITRE
title Cobalt Strike 3.8 – Who’s Your Daddy?

Cobalt Strike Manual 4.3 November 2020

Strategic Cyber LLC. (2020, November 5). Cobalt Strike: Advanced Threat Tactics for Penetration Testers. Retrieved April 13, 2021.

Internal MISP references

UUID eb7abdb2-b270-46ae-a950-5a93d09b3565 which can be used as unique global reference for Cobalt Strike Manual 4.3 November 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-13T00:00:00Z
date_published 2020-11-05T00:00:00Z
source MITRE
title Cobalt Strike: Advanced Threat Tactics for Penetration Testers

Malleable-C2-U42

Chris Navarrete Durgesh Sangvikar Andrew Guan Yu Fu Yanhui Jia Siddhart Shibiraj. (2022, March 16). Cobalt Strike Analysis and Tutorial: How Malleable C2 Profiles Make Cobalt Strike Difficult to Detect. Retrieved September 24, 2024.

Internal MISP references

UUID 49cf201e-d3da-5ba9-98df-edc50514a612 which can be used as unique global reference for Malleable-C2-U42 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-24T00:00:00Z
date_published 2022-03-16T00:00:00Z
source MITRE
title Cobalt Strike Analysis and Tutorial: How Malleable C2 Profiles Make Cobalt Strike Difficult to Detect

cobaltstrike manual

Strategic Cyber LLC. (2017, March 14). Cobalt Strike Manual. Retrieved May 24, 2017.

Internal MISP references

UUID 43277d05-0aa4-4cee-ac41-6f03a49851a9 which can be used as unique global reference for cobaltstrike manual in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-05-24T00:00:00Z
date_published 2017-03-14T00:00:00Z
source MITRE
title Cobalt Strike Manual

TrendMicro Cobalt Group Nov 2017

Giagone, R., Bermejo, L., and Yarochkin, F. (2017, November 20). Cobalt Strikes Again: Spam Runs Use Macros and CVE-2017-8759 Exploit Against Russian Banks. Retrieved March 7, 2019.

Internal MISP references

UUID 81847e06-fea0-4d90-8a9e-5bc99a2bf3f0 which can be used as unique global reference for TrendMicro Cobalt Group Nov 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-07T00:00:00Z
date_published 2017-11-20T00:00:00Z
source MITRE
title Cobalt Strikes Again: Spam Runs Use Macros and CVE-2017-8759 Exploit Against Russian Banks

PTSecurity Cobalt Group Aug 2017

Positive Technologies. (2017, August 16). Cobalt Strikes Back: An Evolving Multinational Threat to Finance. Retrieved September 5, 2018.

Internal MISP references

UUID f4ce1b4d-4f01-4083-8bc6-931cbac9ac38 which can be used as unique global reference for PTSecurity Cobalt Group Aug 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-09-05T00:00:00Z
date_published 2017-08-16T00:00:00Z
source MITRE, Tidal Cyber
title Cobalt Strikes Back: An Evolving Multinational Threat to Finance

Zscaler Cobian Aug 2017

Yadav, A., et al. (2017, August 31). Cobian RAT – A backdoored RAT. Retrieved November 13, 2018.

Internal MISP references

UUID 46541bb9-15cb-4a7c-a624-48a1c7e838e3 which can be used as unique global reference for Zscaler Cobian Aug 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-13T00:00:00Z
date_published 2017-08-31T00:00:00Z
source MITRE
title Cobian RAT – A backdoored RAT

MACOS Cocoa

Apple. (2015, September 16). Cocoa Application Layer. Retrieved June 25, 2020.

Internal MISP references

UUID 6ada4c6a-23dc-4469-a3a1-1d3b4935db97 which can be used as unique global reference for MACOS Cocoa in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-25T00:00:00Z
date_published 2015-09-16T00:00:00Z
source MITRE
title Cocoa Application Layer

code.exe - LOLBAS Project

LOLBAS. (2023, February 1). code.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 4a93063b-f3a3-4726-870d-b8f744651363 which can be used as unique global reference for code.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2023-02-01T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title code.exe

Dark Reading Code Spaces Cyber Attack

Brian Prince. (2014, June 20). Code Hosting Service Shuts Down After Cyber Attack. Retrieved March 21, 2023.

Internal MISP references

UUID e5a3028a-f4cc-537c-9ddd-769792ab33be which can be used as unique global reference for Dark Reading Code Spaces Cyber Attack in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-21T00:00:00Z
date_published 2014-06-20T00:00:00Z
source MITRE
title Code Hosting Service Shuts Down After Cyber Attack

Medium Ptrace JUL 2018

Jain, S. (2018, July 25). Code injection in running process using ptrace. Retrieved February 21, 2020.

Internal MISP references

UUID 6dbfe4b5-9430-431b-927e-e8e775874cd9 which can be used as unique global reference for Medium Ptrace JUL 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-21T00:00:00Z
date_published 2018-07-25T00:00:00Z
source MITRE
title Code injection in running process using ptrace

Wikipedia Code Signing

Wikipedia. (2015, November 10). Code Signing. Retrieved March 31, 2016.

Internal MISP references

UUID 363e860d-e14c-4fcd-985f-f76353018908 which can be used as unique global reference for Wikipedia Code Signing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-03-31T00:00:00Z
date_published 2015-11-10T00:00:00Z
source MITRE
title Code Signing

SpectorOps Code Signing Dec 2017

Graeber, M. (2017, December 22). Code Signing Certificate Cloning Attacks and Defenses. Retrieved April 3, 2018.

Internal MISP references

UUID 3efc5ae9-c63a-4a07-bbbd-d7324acdbaf5 which can be used as unique global reference for SpectorOps Code Signing Dec 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-03T00:00:00Z
date_published 2017-12-22T00:00:00Z
source MITRE
title Code Signing Certificate Cloning Attacks and Defenses

CoinLoader: A Sophisticated Malware Loader Campaign

Avira. (2019, November 28). CoinLoader: A Sophisticated Malware Loader Campaign. Retrieved June 5, 2023.

Internal MISP references

UUID 83469ab3-0199-5679-aa25-7b6885019552 which can be used as unique global reference for CoinLoader: A Sophisticated Malware Loader Campaign in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-05T00:00:00Z
date_published 2019-11-28T00:00:00Z
source MITRE
title CoinLoader: A Sophisticated Malware Loader Campaign

NYT-Colonial

Nicole Perlroth. (2021, May 13). Colonial Pipeline paid 75 Bitcoin, or roughly $5 million, to hackers.. Retrieved August 18, 2023.

Internal MISP references

UUID 58900911-ab4b-5157-968c-67fa69cc122d which can be used as unique global reference for NYT-Colonial in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-18T00:00:00Z
date_published 2021-05-13T00:00:00Z
source MITRE
title Colonial Pipeline paid 75 Bitcoin, or roughly $5 million, to hackers.

Colorcpl.exe - LOLBAS Project

LOLBAS. (2023, June 26). Colorcpl.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 53ff662d-a0b3-41bd-ab9e-a9bb8bbdea25 which can be used as unique global reference for Colorcpl.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2023-06-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Colorcpl.exe

mod_rewrite

Bluescreenofjeff.com. (2015, April 12). Combatting Incident Responders with Apache mod_rewrite. Retrieved February 13, 2024.

Internal MISP references

UUID 3568b09c-7368-5fc2-85b3-d16ee9b9c686 which can be used as unique global reference for mod_rewrite in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-13T00:00:00Z
date_published 2015-04-12T00:00:00Z
source MITRE
title Combatting Incident Responders with Apache mod_rewrite

sentinelone shlayer to zshlayer

Phil Stokes. (2020, September 8). Coming Out of Your Shell: From Shlayer to ZShlayer. Retrieved September 13, 2021.

Internal MISP references

UUID 17277b12-af29-475a-bc9a-0731bbe0bae2 which can be used as unique global reference for sentinelone shlayer to zshlayer in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-13T00:00:00Z
date_published 2020-09-08T00:00:00Z
source MITRE
title Coming Out of Your Shell: From Shlayer to ZShlayer

University of Birmingham C2

Gardiner, J., Cova, M., Nagaraja, S. (2014, February). Command & Control Understanding, Denying and Detecting. Retrieved April 20, 2016.

Internal MISP references

UUID 113ce14e-147f-4a86-8b83-7b49b43a4e88 which can be used as unique global reference for University of Birmingham C2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-20T00:00:00Z
date_published 2014-02-01T00:00:00Z
source MITRE
title Command & Control Understanding, Denying and Detecting

Microsoft Command-line Logging

Mathers, B. (2017, March 7). Command line process auditing. Retrieved April 21, 2017.

Internal MISP references

UUID 4a58170b-906c-4df4-ad1e-0e5bc15366fa which can be used as unique global reference for Microsoft Command-line Logging in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-04-21T00:00:00Z
date_published 2017-03-07T00:00:00Z
source MITRE
title Command line process auditing

Microsoft Netdom Trust Sept 2012

Microsoft. (2012, September 11). Command-Line Reference - Netdom Trust. Retrieved November 30, 2017.

Internal MISP references

UUID 380dc9fe-d490-4914-9595-05d765b27a85 which can be used as unique global reference for Microsoft Netdom Trust Sept 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-30T00:00:00Z
date_published 2012-09-11T00:00:00Z
source MITRE
title Command-Line Reference - Netdom Trust

Microsoft msxsl.exe

Microsoft. (n.d.). Command Line Transformation Utility (msxsl.exe). Retrieved July 3, 2018.

Internal MISP references

UUID a25d664c-d109-466f-9b6a-7e9ea8c57895 which can be used as unique global reference for Microsoft msxsl.exe in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-03T00:00:00Z
source MITRE
title Command Line Transformation Utility (msxsl.exe)

Kettle CSV DDE Aug 2014

Kettle, J. (2014, August 29). Comma Separated Vulnerabilities. Retrieved November 22, 2017.

Internal MISP references

UUID 2badfb63-19a3-4829-bbb5-7c3dfab877d5 which can be used as unique global reference for Kettle CSV DDE Aug 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-22T00:00:00Z
date_published 2014-08-29T00:00:00Z
source MITRE
title Comma Separated Vulnerabilities

Microsoft CLR Integration 2017

Microsoft. (2017, June 19). Common Language Runtime Integration. Retrieved July 8, 2019.

Internal MISP references

UUID 83fc7522-5eb1-4710-8391-090389948686 which can be used as unique global reference for Microsoft CLR Integration 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-07-08T00:00:00Z
date_published 2017-06-19T00:00:00Z
source MITRE
title Common Language Runtime Integration

Palo Alto Comnie

Grunzweig, J. (2018, January 31). Comnie Continues to Target Organizations in East Asia. Retrieved June 7, 2018.

Internal MISP references

UUID ff3cc105-2798-45de-8561-983bf57eb9d9 which can be used as unique global reference for Palo Alto Comnie in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-06-07T00:00:00Z
date_published 2018-01-31T00:00:00Z
source MITRE
title Comnie Continues to Target Organizations in East Asia

GDATA COM Hijacking

G DATA. (2014, October). COM Object hijacking: the discreet way of persistence. Retrieved August 13, 2016.

Internal MISP references

UUID 98e88505-b916-430d-aef6-616ba7ddd88e which can be used as unique global reference for GDATA COM Hijacking in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-08-13T00:00:00Z
date_published 2014-10-01T00:00:00Z
source MITRE
title COM Object hijacking: the discreet way of persistence

AP-NotPetya

FRANK BAJAK AND RAPHAEL SATTER. (2017, June 30). Companies still hobbled from fearsome cyberattack. Retrieved August 18, 2023.

Internal MISP references

UUID 7f1af58a-33fd-538f-b092-789a8776780c which can be used as unique global reference for AP-NotPetya in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-18T00:00:00Z
date_published 2017-06-30T00:00:00Z
source MITRE
title Companies still hobbled from fearsome cyberattack

Microsoft COM

Microsoft. (n.d.). Component Object Model (COM). Retrieved November 22, 2017.

Internal MISP references

UUID edcd917d-ca5b-4e5c-b3be-118e828abe97 which can be used as unique global reference for Microsoft COM in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-22T00:00:00Z
source MITRE
title Component Object Model (COM)

Unit 42 12 8 2022

Dror Alon. (2022, December 8). Compromised Cloud Compute Credentials Case Studies From the Wild. Retrieved April 17, 2024.

Internal MISP references

UUID e7a4a0cf-ffa2-48cc-9b21-a2333592c773 which can be used as unique global reference for Unit 42 12 8 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-17T00:00:00Z
date_published 2022-12-08T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Compromised Cloud Compute Credentials Case Studies From the Wild

Palo Alto Unit 42 Compromised Cloud Compute Credentials 2022

Dror Alon. (2022, December 8). Compromised Cloud Compute Credentials: Case Studies From the Wild. Retrieved March 9, 2023.

Internal MISP references

UUID af755ba2-97c2-5152-ab00-2e24740f69f3 which can be used as unique global reference for Palo Alto Unit 42 Compromised Cloud Compute Credentials 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-09T00:00:00Z
date_published 2022-12-08T00:00:00Z
source MITRE
title Compromised Cloud Compute Credentials: Case Studies From the Wild

US-CERT Alert TA15-314A Web Shells

US-CERT. (2015, November 13). Compromised Web Servers and Web Shells - Threat Awareness and Guidance. Retrieved June 8, 2016.

Internal MISP references

UUID 61ceb0c4-62f6-46cd-b42b-5736c869421f which can be used as unique global reference for US-CERT Alert TA15-314A Web Shells in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-08T00:00:00Z
date_published 2015-11-13T00:00:00Z
source MITRE
title Compromised Web Servers and Web Shells - Threat Awareness and Guidance

Comsvcs.dll - LOLBAS Project

LOLBAS. (2019, August 30). Comsvcs.dll. Retrieved December 4, 2023.

Internal MISP references

UUID 2eb2756d-5a49-4df3-9e2f-104c41c645cd which can be used as unique global reference for Comsvcs.dll - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2019-08-30T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Comsvcs.dll

Condi-Botnet-binaries

Joie Salvio and Roy Tay. (2023, June 20). Condi DDoS Botnet Spreads via TP-Link's CVE-2023-1389. Retrieved September 5, 2023.

Internal MISP references

UUID a92b0d6c-b3e8-56a4-b1b4-1d117e59db84 which can be used as unique global reference for Condi-Botnet-binaries in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-05T00:00:00Z
date_published 2023-06-20T00:00:00Z
source MITRE
title Condi DDoS Botnet Spreads via TP-Link's CVE-2023-1389

Okta Conditional Access Policies

Okta. (2023, November 30). Conditional Access Based on Device Security Posture. Retrieved January 2, 2024.

Internal MISP references

UUID c914578c-dcc2-539e-bb3d-50bf7a0e7101 which can be used as unique global reference for Okta Conditional Access Policies in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-02T00:00:00Z
date_published 2023-11-30T00:00:00Z
source MITRE
title Conditional Access Based on Device Security Posture

Microsoft Common Conditional Access Policies

Microsoft. (2022, December 14). Conditional Access templates. Retrieved February 21, 2023.

Internal MISP references

UUID 9ed9870b-d09a-511d-96f9-4956f26d46bf which can be used as unique global reference for Microsoft Common Conditional Access Policies in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-21T00:00:00Z
date_published 2022-12-14T00:00:00Z
source MITRE
title Conditional Access templates

Microsoft Token Protection 2023

Microsoft. (2023, October 23). Conditional Access: Token protection (preview). Retrieved January 2, 2024.

Internal MISP references

UUID aa4629cf-f11f-5921-9f72-5a8d3f752603 which can be used as unique global reference for Microsoft Token Protection 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-02T00:00:00Z
date_published 2023-10-23T00:00:00Z
source MITRE
title Conditional Access: Token protection (preview)

Trend Micro Conficker

Trend Micro. (2014, March 18). Conficker. Retrieved February 18, 2021.

Internal MISP references

UUID 62cf7f3a-9011-45eb-a7d9-91c76a2177e9 which can be used as unique global reference for Trend Micro Conficker in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-18T00:00:00Z
date_published 2014-03-18T00:00:00Z
source MITRE
title Conficker

ConfigSecurityPolicy.exe - LOLBAS Project

LOLBAS. (2020, September 4). ConfigSecurityPolicy.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 30b8a5d8-596c-4ab3-b3db-b799cc8923e1 which can be used as unique global reference for ConfigSecurityPolicy.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2020-09-04T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title ConfigSecurityPolicy.exe

Microsoft SAML Token Lifetimes

Microsoft. (2020, December 14). Configurable token lifetimes in Microsoft Identity Platform. Retrieved December 22, 2020.

Internal MISP references

UUID 8b810f7c-1f26-420b-9014-732f1469f145 which can be used as unique global reference for Microsoft SAML Token Lifetimes in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-22T00:00:00Z
date_published 2020-12-14T00:00:00Z
source MITRE
title Configurable token lifetimes in Microsoft Identity Platform

Apple Developer Configuration Profile

Apple. (2019, May 3). Configuration Profile Reference. Retrieved September 23, 2021.

Internal MISP references

UUID 8453f06d-5007-4e53-a9a2-1c0edb99be3d which can be used as unique global reference for Apple Developer Configuration Profile in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-23T00:00:00Z
date_published 2019-05-03T00:00:00Z
source MITRE
title Configuration Profile Reference

MDMProfileConfigMacOS

Apple. (2019, May 3). Configuration Profile Reference, Developer. Retrieved April 15, 2022.

Internal MISP references

UUID a7078eee-5478-4a93-9a7e-8db1d020e1da which can be used as unique global reference for MDMProfileConfigMacOS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-15T00:00:00Z
date_published 2019-05-03T00:00:00Z
source MITRE
title Configuration Profile Reference, Developer

Azure Storage Lifecycles

Microsoft Azure. (2024, July 3). Configure a lifecycle management policy. Retrieved September 25, 2024.

Internal MISP references

UUID 7ac4c481-7798-53b3-b7ad-bc09a40f99b7 which can be used as unique global reference for Azure Storage Lifecycles in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-25T00:00:00Z
date_published 2024-07-03T00:00:00Z
source MITRE
title Configure a lifecycle management policy

Azure Just in Time Access 2023

Microsoft. (2023, August 29). Configure and approve just-in-time access for Azure Managed Applications. Retrieved September 21, 2023.

Internal MISP references

UUID ee35e13f-ca39-5faf-81ae-230d33329a28 which can be used as unique global reference for Azure Just in Time Access 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-21T00:00:00Z
date_published 2023-08-29T00:00:00Z
source MITRE
title Configure and approve just-in-time access for Azure Managed Applications

capture_embedded_packet_on_software

Cisco. (2022, August 17). Configure and Capture Embedded Packet on Software. Retrieved July 13, 2022.

Internal MISP references

UUID 5d973180-a28a-5c8f-b13a-45d21331700f which can be used as unique global reference for capture_embedded_packet_on_software in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-13T00:00:00Z
date_published 2022-08-17T00:00:00Z
source MITRE
title Configure and Capture Embedded Packet on Software

Kubernetes Security Context

Kubernetes. (n.d.). Configure a Security Context for a Pod or Container. Retrieved March 8, 2023.

Internal MISP references

UUID bd91ec00-95bb-572f-9452-8040ec633e00 which can be used as unique global reference for Kubernetes Security Context in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-08T00:00:00Z
source MITRE
title Configure a Security Context for a Pod or Container

Microsoft SharePoint Logging

Microsoft. (2017, July 19). Configure audit settings for a site collection. Retrieved April 4, 2018.

Internal MISP references

UUID 9a6a08c0-94f2-4dbc-a0b3-01d5234e7753 which can be used as unique global reference for Microsoft SharePoint Logging in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-04T00:00:00Z
date_published 2017-07-19T00:00:00Z
source MITRE
title Configure audit settings for a site collection

TechNet RDP NLA

Microsoft. (n.d.). Configure Network Level Authentication for Remote Desktop Services Connections. Retrieved June 6, 2016.

Internal MISP references

UUID 39e28cae-a35a-4cf2-a281-c35f4ebd16ba which can be used as unique global reference for TechNet RDP NLA in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-06T00:00:00Z
source MITRE
title Configure Network Level Authentication for Remote Desktop Services Connections

Microsoft Security Alerts for Azure AD Roles

Microsoft. (2022, November 14). Configure security alerts for Azure AD roles in Privileged Identity Management. Retrieved February 21, 2023.

Internal MISP references

UUID 7bde8cd2-6c10-5342-9a4b-a45e84a861b6 which can be used as unique global reference for Microsoft Security Alerts for Azure AD Roles in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-21T00:00:00Z
date_published 2022-11-14T00:00:00Z
source MITRE
title Configure security alerts for Azure AD roles in Privileged Identity Management

Kubernetes Service Accounts

Kubernetes. (2022, February 26). Configure Service Accounts for Pods. Retrieved April 1, 2022.

Internal MISP references

UUID a74ffa28-8a2e-4bfd-bc66-969b463bebd9 which can be used as unique global reference for Kubernetes Service Accounts in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-01T00:00:00Z
date_published 2022-02-26T00:00:00Z
source MITRE
title Configure Service Accounts for Pods

Microsoft Learn ClickOnce Config

Microsoft. (2023, August 4). Configure the ClickOnce trust prompt behavior. Retrieved September 9, 2024.

Internal MISP references

UUID 3a75c7d6-b3f3-5f25-bbcb-e0a18982dfed which can be used as unique global reference for Microsoft Learn ClickOnce Config in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-09T00:00:00Z
date_published 2023-08-04T00:00:00Z
source MITRE
title Configure the ClickOnce trust prompt behavior

Windows RDP Sessions

Microsoft. (n.d.). Configure Timeout and Reconnection Settings for Remote Desktop Services Sessions. Retrieved December 11, 2017.

Internal MISP references

UUID ccd0d241-4ff7-4a15-b2b4-06945980c6bf which can be used as unique global reference for Windows RDP Sessions in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-11T00:00:00Z
source MITRE
title Configure Timeout and Reconnection Settings for Remote Desktop Services Sessions

Microsoft Configure LSA

Microsoft. (2013, July 31). Configuring Additional LSA Protection. Retrieved June 24, 2015.

Internal MISP references

UUID 4adfc72b-cd32-46a6-bdf4-a4c2c6cffa73 which can be used as unique global reference for Microsoft Configure LSA in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-06-24T00:00:00Z
date_published 2013-07-31T00:00:00Z
source MITRE
title Configuring Additional LSA Protection

Microsoft LSA Protection Mar 2014

Microsoft. (2014, March 12). Configuring Additional LSA Protection. Retrieved November 27, 2017.

Internal MISP references

UUID da3f1d7d-188f-4500-9bc6-3299ba043b5c which can be used as unique global reference for Microsoft LSA Protection Mar 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-27T00:00:00Z
date_published 2014-03-12T00:00:00Z
source MITRE
title Configuring Additional LSA Protection

Microsoft LSA

Microsoft. (2013, July 31). Configuring Additional LSA Protection. Retrieved February 13, 2015.

Internal MISP references

UUID 3ad49746-4e42-4663-a49e-ae64152b9463 which can be used as unique global reference for Microsoft LSA in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-02-13T00:00:00Z
date_published 2013-07-31T00:00:00Z
source MITRE
title Configuring Additional LSA Protection

Configuring Data Access audit logs

Google. (n.d.). Configuring Data Access audit logs. Retrieved October 16, 2020.

Internal MISP references

UUID bd310606-f472-4eda-a696-50a3a25f07b3 which can be used as unique global reference for Configuring Data Access audit logs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-16T00:00:00Z
source MITRE
title Configuring Data Access audit logs

cisco dhcp snooping

Cisco. (n.d.). Configuring DHCP Snooping. Retrieved September 17, 2024.

Internal MISP references

UUID cc5eda1b-5e64-52e8-b98f-8df2f3e10475 which can be used as unique global reference for cisco dhcp snooping in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-17T00:00:00Z
source MITRE
title Configuring DHCP Snooping

Microsoft SID Filtering Quarantining Jan 2009

Microsoft. (n.d.). Configuring SID Filter Quarantining on External Trusts. Retrieved November 30, 2017.

Internal MISP references

UUID 134169f1-7bd3-4d04-81a8-f01e1407a4b6 which can be used as unique global reference for Microsoft SID Filtering Quarantining Jan 2009 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-30T00:00:00Z
source MITRE
title Configuring SID Filter Quarantining on External Trusts

TechRepublic Wireless GPO FEB 2009

Schauland, D. (2009, February 24). Configuring Wireless settings via Group Policy. Retrieved July 26, 2018.

Internal MISP references

UUID b62415f8-76bd-4585-ae81-a4d04ccfc703 which can be used as unique global reference for TechRepublic Wireless GPO FEB 2009 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-26T00:00:00Z
date_published 2009-02-24T00:00:00Z
source MITRE
title Configuring Wireless settings via Group Policy

ZDNet Dtrack

Catalin Cimpanu. (2019, October 30). Confirmed: North Korean malware found on Indian nuclear plant's network. Retrieved January 20, 2021.

Internal MISP references

UUID 6e6e02da-b805-47d7-b410-343a1b5da042 which can be used as unique global reference for ZDNet Dtrack in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-20T00:00:00Z
date_published 2019-10-30T00:00:00Z
source MITRE
title Confirmed: North Korean malware found on Indian nuclear plant's network

Uptycs Confucius APT Jan 2021

Uptycs Threat Research Team. (2021, January 12). Confucius APT deploys Warzone RAT. Retrieved December 17, 2021.

Internal MISP references

UUID d74f2c25-cd53-4587-b087-7ba0b8427dc4 which can be used as unique global reference for Uptycs Confucius APT Jan 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-12-17T00:00:00Z
date_published 2021-01-12T00:00:00Z
source MITRE
title Confucius APT deploys Warzone RAT

TrendMicro Confucius APT Aug 2021

Lunghi, D. (2021, August 17). Confucius Uses Pegasus Spyware-related Lures to Target Pakistani Military. Retrieved December 26, 2021.

Internal MISP references

UUID 5c16aae9-d253-463b-8bbc-f14402ce77e4 which can be used as unique global reference for TrendMicro Confucius APT Aug 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-12-26T00:00:00Z
date_published 2021-08-17T00:00:00Z
source MITRE, Tidal Cyber
title Confucius Uses Pegasus Spyware-related Lures to Target Pakistani Military

Conhost.exe - LOLBAS Project

LOLBAS. (2022, April 5). Conhost.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 5ed807c1-15d1-48aa-b497-8cd74fe5b299 which can be used as unique global reference for Conhost.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2022-04-05T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Conhost.exe

EC2 Instance Connect

AWS. (2023, June 2). Connect using EC2 Instance Connect. Retrieved June 2, 2023.

Internal MISP references

UUID deefa5b7-5a28-524c-b500-bc5574aa9920 which can be used as unique global reference for EC2 Instance Connect in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-02T00:00:00Z
date_published 2023-06-02T00:00:00Z
source MITRE
title Connect using EC2 Instance Connect

Sophos News 2 23 2024

Andrew Brandt. (2024, February 23). ConnectWise ScreenConnect attacks deliver malware. Retrieved February 23, 2024.

Internal MISP references

UUID 3d342acf-a451-4473-82ac-8afee61bc984 which can be used as unique global reference for Sophos News 2 23 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-23T00:00:00Z
date_published 2024-02-23T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title ConnectWise ScreenConnect attacks deliver malware

Docker Docs Container

docker docs. (n.d.). Containers. Retrieved October 13, 2021.

Internal MISP references

UUID 3475b705-3ab8-401d-bee6-e187c43ad3c2 which can be used as unique global reference for Docker Docs Container in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-13T00:00:00Z
source MITRE
title Containers

DigitalShadows CDN

Swisscom & Digital Shadows. (2017, September 6). Content Delivery Networks (CDNs) Can Leave You Exposed – How You Might Be Affected And What You Can Do About It. Retrieved October 20, 2020.

Internal MISP references

UUID 183a070f-6c8c-46e3-915b-6edc58bb5e91 which can be used as unique global reference for DigitalShadows CDN in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
date_published 2017-09-06T00:00:00Z
source MITRE
title Content Delivery Networks (CDNs) Can Leave You Exposed – How You Might Be Affected And What You Can Do About It

Content trust in Azure Container Registry

Microsoft. (2019, September 5). Content trust in Azure Container Registry. Retrieved October 16, 2019.

Internal MISP references

UUID fcd211a1-ac81-4ebc-b395-c8fa2a4d614a which can be used as unique global reference for Content trust in Azure Container Registry in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-16T00:00:00Z
date_published 2019-09-05T00:00:00Z
source MITRE
title Content trust in Azure Container Registry

Content trust in Docker

Docker. (2019, October 10). Content trust in Docker. Retrieved October 16, 2019.

Internal MISP references

UUID 57691166-5a22-44a0-8724-6b3b19658c3b which can be used as unique global reference for Content trust in Docker in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-16T00:00:00Z
date_published 2019-10-10T00:00:00Z
source MITRE
title Content trust in Docker

Microsoft File Folder Exclusions

Microsoft. (2024, February 27). Contextual file and folder exclusions. Retrieved March 29, 2024.

Internal MISP references

UUID 7a511f0d-8feb-5370-87db-b33b96ea2367 which can be used as unique global reference for Microsoft File Folder Exclusions in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-29T00:00:00Z
date_published 2024-02-27T00:00:00Z
source MITRE
title Contextual file and folder exclusions

Arctic Wolf Akira 2023

Steven Campbell, Akshay Suthar, & Connor Belfiorre. (2023, July 26). Conti and Akira: Chained Together. Retrieved February 20, 2024.

Internal MISP references

UUID aa34f2a1-a398-5dc4-b898-cdc02afeca5d which can be used as unique global reference for Arctic Wolf Akira 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-20T00:00:00Z
date_published 2023-07-26T00:00:00Z
source MITRE
title Conti and Akira: Chained Together

Arctic Wolf Conti Akira July 26 2023

Steven Campbell, Akshay Suthar, Connor Belfiore, Arctic Wolf Labs Team. (2023, July 26). Conti and Akira: Chained Together. Retrieved March 13, 2024.

Internal MISP references

UUID 72e1b75b-edf7-45b0-9c14-14776a146d0e which can be used as unique global reference for Arctic Wolf Conti Akira July 26 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-13T00:00:00Z
date_published 2023-07-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Conti and Akira: Chained Together

DFIR Conti Bazar Nov 2021

DFIR Report. (2021, November 29). CONTInuing the Bazar Ransomware Story. Retrieved September 29, 2022.

Internal MISP references

UUID a6f1a15d-448b-41d4-81f0-ee445cba83bd which can be used as unique global reference for DFIR Conti Bazar Nov 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-29T00:00:00Z
date_published 2021-11-29T00:00:00Z
source MITRE
title CONTInuing the Bazar Ransomware Story

Cybereason Conti Jan 2021

Rochberger, L. (2021, January 12). Cybereason vs. Conti Ransomware. Retrieved February 17, 2021.

Internal MISP references

UUID 3c0e82a2-41ab-4e63-ac10-bd691c786234 which can be used as unique global reference for Cybereason Conti Jan 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-17T00:00:00Z
source MITRE
title Conti Ransomware

Cybleinc Conti January 2020

Cybleinc. (2021, January 21). Conti Ransomware Resurfaces, Targeting Government & Large Organizations. Retrieved April 13, 2021.

Internal MISP references

UUID 5ef0ad9d-f34d-4771-a595-7ee4994f6c91 which can be used as unique global reference for Cybleinc Conti January 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-13T00:00:00Z
date_published 2021-01-21T00:00:00Z
source MITRE
title Conti Ransomware Resurfaces, Targeting Government & Large Organizations

Microsoft Developer Support Power Apps Conditional Access

Microsoft Developer Support. (2020, May 9). Control Access to Power Apps and Power Automate with Azure AD Conditional Access Policies. Retrieved July 1, 2024.

Internal MISP references

UUID d198608c-2676-5f44-bbc8-5455c2b36cdb which can be used as unique global reference for Microsoft Developer Support Power Apps Conditional Access in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-01T00:00:00Z
date_published 2020-05-09T00:00:00Z
source MITRE
title Control Access to Power Apps and Power Automate with Azure AD Conditional Access Policies

Control.exe - LOLBAS Project

LOLBAS. (2018, May 25). Control.exe. Retrieved December 4, 2023.

Internal MISP references

UUID d0c821b9-7d37-4158-89fa-0dabe6e06800 which can be used as unique global reference for Control.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Control.exe

Wikipedia Control Flow Integrity

Wikipedia. (2018, January 11). Control-flow integrity. Retrieved March 12, 2018.

Internal MISP references

UUID a9b2f525-d812-4dea-b4a6-c0d057d5f071 which can be used as unique global reference for Wikipedia Control Flow Integrity in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-12T00:00:00Z
date_published 2018-01-11T00:00:00Z
source MITRE
title Control-flow integrity

Kubernetes API Control Access

The Kubernetes Authors. (n.d.). Controlling Access to The Kubernetes API. Retrieved March 29, 2021.

Internal MISP references

UUID fd4577b6-0085-44c0-b4c3-4d66dcb39fe7 which can be used as unique global reference for Kubernetes API Control Access in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-29T00:00:00Z
source MITRE
title Controlling Access to The Kubernetes API

TrendMicro CPL Malware Dec 2013

Bernardino, J. (2013, December 17). Control Panel Files Used As Malicious Attachments. Retrieved January 18, 2018.

Internal MISP references

UUID fd38f1fd-37e9-4173-b319-3f92c2743055 which can be used as unique global reference for TrendMicro CPL Malware Dec 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-18T00:00:00Z
date_published 2013-12-17T00:00:00Z
source MITRE
title Control Panel Files Used As Malicious Attachments

GitHub Conveigh

Robertson, K. (2016, August 28). Conveigh. Retrieved November 17, 2017.

Internal MISP references

UUID 4deb8c8e-2da1-4634-bf04-5ccf620a2143 which can be used as unique global reference for GitHub Conveigh in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-17T00:00:00Z
date_published 2016-08-28T00:00:00Z
source MITRE
title Conveigh

MITRE Copernicus

Butterworth, J. (2013, July 30). Copernicus: Question Your Assumptions about BIOS Security. Retrieved December 11, 2015.

Internal MISP references

UUID 55d139fe-f5e5-4b5e-9123-8133b459ea72 which can be used as unique global reference for MITRE Copernicus in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-12-11T00:00:00Z
date_published 2013-07-30T00:00:00Z
source MITRE
title Copernicus: Question Your Assumptions about BIOS Security

Secureworks COPPER FIELDSTONE Profile

Secureworks. (n.d.). COPPER FIELDSTONE. Retrieved October 6, 2021.

Internal MISP references

UUID d7f5f154-3638-47c1-8e1e-a30a6504a735 which can be used as unique global reference for Secureworks COPPER FIELDSTONE Profile in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-06T00:00:00Z
source MITRE
title COPPER FIELDSTONE

TechNet Copy

Microsoft. (n.d.). Copy. Retrieved April 26, 2016.

Internal MISP references

UUID 4e0d4b94-6b4c-4104-86e6-499b6aa7ba78 which can be used as unique global reference for TechNet Copy in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-26T00:00:00Z
source MITRE
title Copy

copy_cmd_cisco

Cisco. (2022, August 16). copy - Cisco IOS Configuration Fundamentals Command Reference . Retrieved July 13, 2022.

Internal MISP references

UUID 88138372-550f-5da5-be5e-b5ba0fe32f64 which can be used as unique global reference for copy_cmd_cisco in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-13T00:00:00Z
date_published 2022-08-16T00:00:00Z
source MITRE
title copy - Cisco IOS Configuration Fundamentals Command Reference

CopyKittens Nov 2015

Minerva Labs LTD and ClearSky Cyber Security. (2015, November 23). CopyKittens Attack Group. Retrieved September 11, 2017.

Internal MISP references

UUID 04e3ce40-5487-4931-98db-f55da83f412e which can be used as unique global reference for CopyKittens Nov 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-09-11T00:00:00Z
date_published 2015-11-23T00:00:00Z
source MITRE
title CopyKittens Attack Group

coregen.exe - LOLBAS Project

LOLBAS. (2020, October 9). coregen.exe. Retrieved December 4, 2023.

Internal MISP references

UUID f24d4cf5-9ca9-46bd-bd43-86b37e2a638a which can be used as unique global reference for coregen.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2020-10-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title coregen.exe

Apple Core Services

Apple. (n.d.). Core Services. Retrieved June 25, 2020.

Internal MISP references

UUID 0ef05e47-1305-4715-a677-67f1b55b24a3 which can be used as unique global reference for Apple Core Services in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-25T00:00:00Z
source MITRE
title Core Services

Microsoft IoT Compromises August 05 2019

MSRC Team. (2019, August 5). Corporate IoT - a path to intrusion. Retrieved August 24, 2023.

Internal MISP references

UUID 037ace78-e997-40f3-a891-916bc596a9c0 which can be used as unique global reference for Microsoft IoT Compromises August 05 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-24T00:00:00Z
date_published 2019-08-05T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Corporate IoT - a path to intrusion

Microsoft STRONTIUM Aug 2019

MSRC Team. (2019, August 5). Corporate IoT – a path to intrusion. Retrieved August 16, 2019.

Internal MISP references

UUID 7efd3c8d-5e69-4b6f-8edb-9186abdf0e1a which can be used as unique global reference for Microsoft STRONTIUM Aug 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-08-16T00:00:00Z
date_published 2019-08-05T00:00:00Z
source MITRE
title Corporate IoT – a path to intrusion

Palo Alto ARP

Palo Alto Networks. (2021, November 24). Cortex XDR Analytics Alert Reference: Uncommon ARP cache listing via arp.exe. Retrieved December 7, 2021.

Internal MISP references

UUID 96ce4324-57d2-422b-8403-f5d4f3ce410c which can be used as unique global reference for Palo Alto ARP in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-12-07T00:00:00Z
date_published 2021-11-24T00:00:00Z
source MITRE
title Cortex XDR Analytics Alert Reference: Uncommon ARP cache listing via arp.exe

WeLiveSecurity CosmicBeetle September 10 2024

Jakub Souček. (2024, September 10). CosmicBeetle steps up: Probation period at RansomHub. Retrieved September 13, 2024.

Internal MISP references

UUID 8debba29-4d6d-41d2-8772-f97c7d49056b which can be used as unique global reference for WeLiveSecurity CosmicBeetle September 10 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-13T00:00:00Z
date_published 2024-09-10T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title CosmicBeetle steps up: Probation period at RansomHub

F-Secure Cosmicduke

F-Secure Labs. (2014, July). COSMICDUKE Cosmu with a twist of MiniDuke. Retrieved July 3, 2014.

Internal MISP references

UUID d0d5ecbe-1051-4ceb-b558-b8b451178358 which can be used as unique global reference for F-Secure Cosmicduke in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-07-03T00:00:00Z
date_published 2014-07-01T00:00:00Z
source MITRE
title COSMICDUKE Cosmu with a twist of MiniDuke

Costin Raiu IAmTheKing October 2020

Costin Raiu. (2020, October 2). Costin Raiu Twitter IAmTheKing SlothfulMedia. Retrieved September 12, 2024.

Internal MISP references

UUID 2be88843-ed3a-460e-87c1-85aa50e827c8 which can be used as unique global reference for Costin Raiu IAmTheKing October 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2020-10-02T00:00:00Z
source MITRE
title Costin Raiu Twitter IAmTheKing SlothfulMedia

Google Iran Threats October 2021

Bash, A. (2021, October 14). Countering threats from Iran. Retrieved January 4, 2023.

Internal MISP references

UUID 6d568141-eb54-5001-b880-ae8ac1156746 which can be used as unique global reference for Google Iran Threats October 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-01-04T00:00:00Z
date_published 2021-10-14T00:00:00Z
source MITRE
title Countering threats from Iran

Github Covenant

cobbr. (2021, April 21). Covenant. Retrieved September 4, 2024.

Internal MISP references

UUID b717c3ae-8ae0-53c9-90ba-a34cf7694f3c which can be used as unique global reference for Github Covenant in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-04T00:00:00Z
date_published 2021-04-21T00:00:00Z
source MITRE
title Covenant

Cisco DNSMessenger March 2017

Brumaghin, E. and Grady, C.. (2017, March 2). Covert Channels and Poor Decisions: The Tale of DNSMessenger. Retrieved March 8, 2017.

Internal MISP references

UUID 49f22ba2-5aca-4204-858e-c2499a7050ae which can be used as unique global reference for Cisco DNSMessenger March 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-08T00:00:00Z
date_published 2017-03-02T00:00:00Z
source MITRE
title Covert Channels and Poor Decisions: The Tale of DNSMessenger

Juniper IcedID June 2020

Kimayong, P. (2020, June 18). COVID-19 and FMLA Campaigns used to install new IcedID banking malware. Retrieved July 14, 2020.

Internal MISP references

UUID 426886d0-cdf2-4af7-a0e4-366c1b0a1942 which can be used as unique global reference for Juniper IcedID June 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-07-14T00:00:00Z
date_published 2020-06-18T00:00:00Z
source MITRE
title COVID-19 and FMLA Campaigns used to install new IcedID banking malware

PTSecurity Higaisa 2020

PT ESC Threat Intelligence. (2020, June 4). COVID-19 and New Year greetings: an investigation into the tools and methods used by the Higaisa group. Retrieved March 2, 2021.

Internal MISP references

UUID cf8f3d9c-0d21-4587-a707-46848a15bd46 which can be used as unique global reference for PTSecurity Higaisa 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-02T00:00:00Z
date_published 2020-06-04T00:00:00Z
source MITRE, Tidal Cyber
title COVID-19 and New Year greetings: an investigation into the tools and methods used by the Higaisa group

F-Secure CozyDuke

F-Secure Labs. (2015, April 22). CozyDuke: Malware Analysis. Retrieved December 10, 2015.

Internal MISP references

UUID 08e1d233-0580-484e-b737-af091e2aa9ea which can be used as unique global reference for F-Secure CozyDuke in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-12-10T00:00:00Z
date_published 2015-04-22T00:00:00Z
source MITRE
title CozyDuke: Malware Analysis

TrendMicro CPL Malware Jan 2014

Mercês, F. (2014, January 27). CPL Malware - Malicious Control Panel Items. Retrieved January 18, 2018.

Internal MISP references

UUID 9549f9b6-b771-4500-bd82-426c7abdfd8f which can be used as unique global reference for TrendMicro CPL Malware Jan 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-18T00:00:00Z
date_published 2014-01-27T00:00:00Z
source MITRE
title CPL Malware - Malicious Control Panel Items

Trend Micro CPL

Merces, F. (2014). CPL Malware Malicious Control Panel Items. Retrieved November 1, 2017.

Internal MISP references

UUID d90a33aa-8f20-49cb-aa27-771249cb65eb which can be used as unique global reference for Trend Micro CPL in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-01T00:00:00Z
date_published 2014-01-01T00:00:00Z
source MITRE
title CPL Malware Malicious Control Panel Items

SANS Brute Ratel October 2022

Thomas, W. (2022, October 5). Cracked Brute Ratel C4 framework proliferates across the cybercriminal underground. Retrieved February 6, 2023.

Internal MISP references

UUID 9544e762-6f72-59e7-8384-5bbef13bfe96 which can be used as unique global reference for SANS Brute Ratel October 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-06T00:00:00Z
date_published 2022-10-05T00:00:00Z
source MITRE
title Cracked Brute Ratel C4 framework proliferates across the cybercriminal underground

Stealthbits Cracking AS-REP Roasting Jun 2019

Jeff Warren. (2019, June 27). Cracking Active Directory Passwords with AS-REP Roasting. Retrieved August 24, 2020.

Internal MISP references

UUID 3af06034-8384-4de8-9356-e9aaa35b95a2 which can be used as unique global reference for Stealthbits Cracking AS-REP Roasting Jun 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-24T00:00:00Z
date_published 2019-06-27T00:00:00Z
source MITRE
title Cracking Active Directory Passwords with AS-REP Roasting

AdSecurity Cracking Kerberos Dec 2015

Metcalf, S. (2015, December 31). Cracking Kerberos TGS Tickets Using Kerberoast – Exploiting Kerberos to Compromise the Active Directory Domain. Retrieved March 22, 2018.

Internal MISP references

UUID 1b018fc3-515a-4ec4-978f-6d5649ceb0c5 which can be used as unique global reference for AdSecurity Cracking Kerberos Dec 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-22T00:00:00Z
date_published 2015-12-31T00:00:00Z
source MITRE
title Cracking Kerberos TGS Tickets Using Kerberoast – Exploiting Kerberos to Compromise the Active Directory Domain

Dragos Crashoverride 2017

Dragos Inc.. (2017, June 13). CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Retrieved December 18, 2020.

Internal MISP references

UUID c8f624e3-2ba2-4564-bd1c-f06b9a6a8bce which can be used as unique global reference for Dragos Crashoverride 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-18T00:00:00Z
date_published 2017-06-13T00:00:00Z
source MITRE
title CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations

Unit 42 ATOM Crawling Taurus

Unit 42. (n.d.). Crawling Taurus. Retrieved September 14, 2023.

Internal MISP references

UUID 75098b2c-4928-4e3f-9bcc-b4f6b8de96f8 which can be used as unique global reference for Unit 42 ATOM Crawling Taurus in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Crawling Taurus

Microsoft Image

Microsoft. (2021, August 23). Create a managed image of a generalized VM in Azure. Retrieved October 13, 2021.

Internal MISP references

UUID 5317c625-d0be-45eb-9321-0cc9aa295cc9 which can be used as unique global reference for Microsoft Image in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-13T00:00:00Z
date_published 2021-08-23T00:00:00Z
source MITRE
title Create a managed image of a generalized VM in Azure

Microsoft Snapshot

Microsoft. (2021, September 16). Create a snapshot of a virtual hard disk. Retrieved October 13, 2021.

Internal MISP references

UUID 693549da-d9b9-4b67-a1bb-c8ea4a099842 which can be used as unique global reference for Microsoft Snapshot in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-13T00:00:00Z
date_published 2021-09-16T00:00:00Z
source MITRE
title Create a snapshot of a virtual hard disk

Microsoft Create Token

Brower, N., Lich, B. (2017, April 19). Create a token object. Retrieved December 19, 2017.

Internal MISP references

UUID d36d4f06-007e-4ff0-8660-4c65721d0b92 which can be used as unique global reference for Microsoft Create Token in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-19T00:00:00Z
date_published 2017-04-19T00:00:00Z
source MITRE
title Create a token object

GCP Create Cloud Identity Users

Google. (n.d.). Create Cloud Identity user accounts. Retrieved January 29, 2020.

Internal MISP references

UUID e91748b2-1432-4203-a1fe-100aa70458d2 which can be used as unique global reference for GCP Create Cloud Identity Users in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-01-29T00:00:00Z
source MITRE
title Create Cloud Identity user accounts

Createdump.exe - LOLBAS Project

LOLBAS. (2022, January 20). Createdump.exe. Retrieved December 4, 2023.

Internal MISP references

UUID f3ccacc1-3b42-4042-9a5c-f5b483a5e801 which can be used as unique global reference for Createdump.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2022-01-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Createdump.exe

Google Cloud Kubernetes IAM

Google Cloud. (n.d.). Create IAM policies. Retrieved July 14, 2023.

Internal MISP references

UUID e8ee3ac6-ae7c-5fd3-a339-b579a419dd96 which can be used as unique global reference for Google Cloud Kubernetes IAM in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-14T00:00:00Z
source MITRE
title Create IAM policies

Microsoft CreateMutexA

Microsoft. (2023, February 8). CreateMutexA function (synchapi.h). Retrieved September 19, 2024.

Internal MISP references

UUID 20939374-30c1-515a-b672-28a030bf0c64 which can be used as unique global reference for Microsoft CreateMutexA in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-19T00:00:00Z
date_published 2023-02-08T00:00:00Z
source MITRE
title CreateMutexA function (synchapi.h)

Microsoft CreateProcess

Microsoft. (n.d.). CreateProcess function. Retrieved September 12, 2024.

Internal MISP references

UUID aa336e3a-464d-48ce-bebb-760b73764610 which can be used as unique global reference for Microsoft CreateProcess in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
source MITRE
title CreateProcess function

Microsoft CLI Create Subscription

Microsoft . (n.d.). Create subscription. Retrieved August 4, 2023.

Internal MISP references

UUID 1331b524-7d6f-59d9-a2bd-78ff7b3e371f which can be used as unique global reference for Microsoft CLI Create Subscription in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-04T00:00:00Z
source MITRE
title Create subscription

Microsoft. (2021, October 28). Create symbolic links. Retrieved April 27, 2022.

Internal MISP references

UUID 06bfdf8f-8671-47f7-9d0c-baf234c7ae96 which can be used as unique global reference for create_sym_links in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-27T00:00:00Z
date_published 2021-10-28T00:00:00Z
source MITRE
title Create symbolic links

GCP - Creating and Starting a VM

Google. (2020, April 23). Creating and Starting a VM instance. Retrieved May 1, 2020.

Internal MISP references

UUID c1b87a56-115a-46d7-9117-80442091ac3c which can be used as unique global reference for GCP - Creating and Starting a VM in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-01T00:00:00Z
date_published 2020-04-23T00:00:00Z
source MITRE
title Creating and Starting a VM instance

AWS Create IAM User

AWS. (n.d.). Creating an IAM User in Your AWS Account. Retrieved January 29, 2020.

Internal MISP references

UUID bb474e88-b7bb-4b92-837c-95fe7bdd03f7 which can be used as unique global reference for AWS Create IAM User in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-01-29T00:00:00Z
source MITRE
title Creating an IAM User in Your AWS Account

GNU Fork

Free Software Foundation, Inc.. (2020, June 18). Creating a Process. Retrieved June 25, 2020.

Internal MISP references

UUID c46331cb-328a-46e3-89c4-e43fa345d6e8 which can be used as unique global reference for GNU Fork in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-25T00:00:00Z
date_published 2020-06-18T00:00:00Z
source MITRE
title Creating a Process

AppleDocs Launch Agent Daemons

Apple. (n.d.). Creating Launch Daemons and Agents. Retrieved July 10, 2017.

Internal MISP references

UUID 310d18f8-6f9a-48b7-af12-6b921209d1ab which can be used as unique global reference for AppleDocs Launch Agent Daemons in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-10T00:00:00Z
source MITRE
title Creating Launch Daemons and Agents

TechNet Logon Scripts

Microsoft. (2005, January 21). Creating logon scripts. Retrieved April 27, 2016.

Internal MISP references

UUID 896cf5dd-3fe7-44ab-bbaf-d8b2b9980dca which can be used as unique global reference for TechNet Logon Scripts in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-27T00:00:00Z
date_published 2005-01-21T00:00:00Z
source MITRE
title Creating logon scripts

Google Cloud Service Account Credentials

Google Cloud. (2022, March 31). Creating short-lived service account credentials. Retrieved April 1, 2022.

Internal MISP references

UUID c4befa09-3c7f-49f3-bfcc-4fcbb7bace22 which can be used as unique global reference for Google Cloud Service Account Credentials in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-01T00:00:00Z
date_published 2022-03-31T00:00:00Z
source MITRE
title Creating short-lived service account credentials

creatingXPCservices

Apple. (2016, September 9). Creating XPC Services. Retrieved April 19, 2022.

Internal MISP references

UUID 029acdee-95d6-47a7-86de-0f6b925cef9c which can be used as unique global reference for creatingXPCservices in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-19T00:00:00Z
date_published 2016-09-09T00:00:00Z
source MITRE
title Creating XPC Services

GitHub Creddump7

Flathers, R. (2018, February 19). creddump7. Retrieved April 11, 2018.

Internal MISP references

UUID 276975da-7b5f-49aa-975e-4ac9bc527cf2 which can be used as unique global reference for GitHub Creddump7 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-11T00:00:00Z
date_published 2018-02-19T00:00:00Z
source MITRE
title creddump7

Microsoft Midnight Blizzard Replay Attack

Microsoft Threat Intelligence. (2023, June 21). Credential Attacks. Retrieved September 12, 2024.

Internal MISP references

UUID 5af0008b-0ced-5d1d-bbc9-6c9d60835071 which can be used as unique global reference for Microsoft Midnight Blizzard Replay Attack in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2023-06-21T00:00:00Z
source MITRE
title Credential Attacks

Anomali Template Injection MAR 2018

Intel_Acquisition_Team. (2018, March 1). Credential Harvesting and Malicious File Delivery using Microsoft Office Template Injection. Retrieved July 20, 2018.

Internal MISP references

UUID 3cdeb2a2-9582-4725-a132-6503dbe04e1d which can be used as unique global reference for Anomali Template Injection MAR 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-20T00:00:00Z
date_published 2018-03-01T00:00:00Z
source MITRE
title Credential Harvesting and Malicious File Delivery using Microsoft Office Template Injection

Microsoft Credential Locker

Microsoft. (2013, October 23). Credential Locker Overview. Retrieved November 24, 2020.

Internal MISP references

UUID 77505354-bb08-464c-9176-d0015a62c7c9 which can be used as unique global reference for Microsoft Credential Locker in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-24T00:00:00Z
date_published 2013-10-23T00:00:00Z
source MITRE
title Credential Locker Overview

Microsoft CredEnumerate

Microsoft. (2018, December 5). CredEnumarateA function (wincred.h). Retrieved November 24, 2020.

Internal MISP references

UUID ec3e7b3f-99dd-4f2f-885b-09d66b01fe3e which can be used as unique global reference for Microsoft CredEnumerate in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-24T00:00:00Z
date_published 2018-12-05T00:00:00Z
source MITRE
title CredEnumarateA function (wincred.h)

SentinelLabs Intermittent Encryption September 08 2022

Aleksandar Milenkoski, Jim Walter. (2022, September 8). Crimeware Trends | Ransomware Developers Turn to Intermittent Encryption to Evade Detection. Retrieved August 10, 2023.

Internal MISP references

UUID 09cae6de-e026-43a5-a8bc-7ff8e8205232 which can be used as unique global reference for SentinelLabs Intermittent Encryption September 08 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-10T00:00:00Z
date_published 2022-09-08T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Crimeware Trends

TrendmicroHideoutsLease

Max Goncharov. (2015, July 15). Criminal Hideouts for Lease: Bulletproof Hosting Services. Retrieved March 6, 2017.

Internal MISP references

UUID 527de869-3c76-447c-98c4-c37a2acf75e2 which can be used as unique global reference for TrendmicroHideoutsLease in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-06T00:00:00Z
date_published 2015-07-15T00:00:00Z
source MITRE
title Criminal Hideouts for Lease: Bulletproof Hosting Services

doppelpaymer_crowdstrike

Hurley, S. (2021, December 7). Critical Hit: How DoppelPaymer Hunts and Kills Windows Processes. Retrieved January 26, 2022.

Internal MISP references

UUID 54b5d8af-21f0-4d1c-ada8-b87db85dd742 which can be used as unique global reference for doppelpaymer_crowdstrike in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-26T00:00:00Z
date_published 2021-12-07T00:00:00Z
source MITRE
title Critical Hit: How DoppelPaymer Hunts and Kills Windows Processes

CISA AA24-038A PRC Critical Infrastructure February 2024

CISA et al.. (2024, February 7). PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure. Retrieved May 15, 2024.

Internal MISP references

UUID bfa16dc6-f075-5bd3-9d9d-255df8789298 which can be used as unique global reference for CISA AA24-038A PRC Critical Infrastructure February 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-15T00:00:00Z
source MITRE
title Critical Infrastructure

Critical Vulnerabilities in PaperCut Print Management Software

Team Huntress. (2023, April 21). Critical Vulnerabilities in PaperCut Print Management Software. Retrieved May 8, 2023.

Internal MISP references

UUID 874f40f9-146d-4a52-93fd-9b2e7981b6da which can be used as unique global reference for Critical Vulnerabilities in PaperCut Print Management Software in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-08T00:00:00Z
date_published 2023-04-21T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Critical Vulnerabilities in PaperCut Print Management Software

Security Affairs SILENTTRINITY July 2019

Paganini, P. (2019, July 7). Croatia government agencies targeted with news SilentTrinity malware. Retrieved March 23, 2022.

Internal MISP references

UUID b4945fc0-b89b-445c-abfb-14959deba3d0 which can be used as unique global reference for Security Affairs SILENTTRINITY July 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-23T00:00:00Z
date_published 2019-07-07T00:00:00Z
source MITRE
title Croatia government agencies targeted with news SilentTrinity malware

Die.net Linux crontab Man Page

Paul Vixie. (n.d.). crontab(5) - Linux man page. Retrieved December 19, 2017.

Internal MISP references

UUID 0339c2ab-7a08-4976-90eb-1637c23c5644 which can be used as unique global reference for Die.net Linux crontab Man Page in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-19T00:00:00Z
source MITRE
title crontab(5) - Linux man page

Symantec Frutas Feb 2013

Bingham, J. (2013, February 11). Cross-Platform Frutas RAT Builder and Back Door. Retrieved April 23, 2019.

Internal MISP references

UUID 8d9f88be-9ddf-485b-9333-7e41704ec64f which can be used as unique global reference for Symantec Frutas Feb 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-23T00:00:00Z
date_published 2013-02-11T00:00:00Z
source MITRE
title Cross-Platform Frutas RAT Builder and Back Door

Bishop Fox Sliver Framework August 2019

Kervella, R. (2019, August 4). Cross-platform General Purpose Implant Framework Written in Golang. Retrieved July 30, 2021.

Internal MISP references

UUID 51e67e37-2d61-4228-999b-bec6f80cf106 which can be used as unique global reference for Bishop Fox Sliver Framework August 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-07-30T00:00:00Z
date_published 2019-08-04T00:00:00Z
source MITRE
title Cross-platform General Purpose Implant Framework Written in Golang

Okta Cross-Tenant Impersonation 2023

Okta Defensive Cyber Operations. (2023, August 31). Cross-Tenant Impersonation: Prevention and Detection. Retrieved February 15, 2024.

Internal MISP references

UUID d54188b5-86eb-52a0-8384-823c45431762 which can be used as unique global reference for Okta Cross-Tenant Impersonation 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-15T00:00:00Z
date_published 2023-08-31T00:00:00Z
source MITRE
title Cross-Tenant Impersonation: Prevention and Detection

Okta Cross-Tenant Impersonation

Okta Defensive Cyber Operations. (2023, August 31). Cross-Tenant Impersonation: Prevention and Detection. Retrieved March 4, 2024.

Internal MISP references

UUID 77dbd22f-ce57-50f7-9c6b-8dc874a4d80d which can be used as unique global reference for Okta Cross-Tenant Impersonation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-04T00:00:00Z
date_published 2023-08-31T00:00:00Z
source MITRE
title Cross-Tenant Impersonation: Prevention and Detection

Crowdstrike CrowdCast Oct 2013

Crowdstrike. (2013, October 16). CrowdCasts Monthly: You Have an Adversary Problem. Retrieved March 1, 2017.

Internal MISP references

UUID 2062a229-58b3-4610-99cb-8907e7fbb350 which can be used as unique global reference for Crowdstrike CrowdCast Oct 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-01T00:00:00Z
date_published 2013-10-16T00:00:00Z
source MITRE
title CrowdCasts Monthly: You Have an Adversary Problem

Crowdstrike Global Threat Report Feb 2018

CrowdStrike. (2018, February 26). CrowdStrike 2018 Global Threat Report. Retrieved October 10, 2018.

Internal MISP references

UUID 6c1ace5b-66b2-4c56-9301-822aad2c3c16 which can be used as unique global reference for Crowdstrike Global Threat Report Feb 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-10-10T00:00:00Z
date_published 2018-02-26T00:00:00Z
source MITRE
title CrowdStrike 2018 Global Threat Report

CrowdStrike GTR 2021 June 2021

CrowdStrike. (2021, June 7). CrowdStrike 2021 Global Threat Report. Retrieved September 29, 2021.

Internal MISP references

UUID ec58e524-6de5-4cbb-a5d3-984b9b652f26 which can be used as unique global reference for CrowdStrike GTR 2021 June 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-29T00:00:00Z
date_published 2021-06-07T00:00:00Z
source MITRE
title CrowdStrike 2021 Global Threat Report

CrowdStrike Adversary Carbon Spider

CrowdStrike. (2022, June 01). CrowdStrike Adversary Carbon Spider. Retrieved June 01, 2022.

Internal MISP references

UUID 9e28d375-c4a7-405f-9fff-7374c19f3af7 which can be used as unique global reference for CrowdStrike Adversary Carbon Spider in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-01T00:00:00Z
source Tidal Cyber
title CrowdStrike Adversary Carbon Spider

CrowdStrike Adversary Cozy Bear

CrowdStrike. (2022, May 4). CrowdStrike Adversary Cozy Bear. Retrieved May 4, 2022.

Internal MISP references

UUID 0998ad7a-b4aa-44af-a665-dc58a3a6f800 which can be used as unique global reference for CrowdStrike Adversary Cozy Bear in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-04T00:00:00Z
source Tidal Cyber
title CrowdStrike Adversary Cozy Bear

CrowdStrike Labyrinth Chollima Feb 2022

CrowdStrike. (2022, February 1). CrowdStrike Adversary Labyrinth Chollima. Retrieved February 1, 2022.

Internal MISP references

UUID ffe31bbf-a40d-4285-96a0-53c54298a680 which can be used as unique global reference for CrowdStrike Labyrinth Chollima Feb 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-01T00:00:00Z
date_published 2022-02-01T00:00:00Z
source MITRE
title CrowdStrike Adversary Labyrinth Chollima

CrowdStrike Adversary Ocean Buffalo

CrowdStrike. (2022, June 25). CrowdStrike Adversary Ocean Bufallo. Retrieved June 25, 2022.

Internal MISP references

UUID 466795cb-0269-4d0c-a48c-d71e9dfd9a3c which can be used as unique global reference for CrowdStrike Adversary Ocean Buffalo in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-25T00:00:00Z
source Tidal Cyber
title CrowdStrike Adversary Ocean Buffalo

CrowdStrike Adversary Venomous Bear

CrowdStrike. (2022, May 4). CrowdStrike Adversary Venomous Bear. Retrieved May 4, 2022.

Internal MISP references

UUID 8c04f2b8-74ba-44a5-9580-96eabdbbcda9 which can be used as unique global reference for CrowdStrike Adversary Venomous Bear in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-04T00:00:00Z
source Tidal Cyber
title CrowdStrike Adversary Venomous Bear

CrowdStrike Adversary Wizard Spider

CrowdStrike. (2022, June 23). CrowdStrike Adversary Wizard Spider. Retrieved June 23, 2022.

Internal MISP references

UUID 05f382c4-5163-49e0-a8a0-cf3a5992ef18 which can be used as unique global reference for CrowdStrike Adversary Wizard Spider in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-23T00:00:00Z
source Tidal Cyber
title CrowdStrike Adversary Wizard Spider

Crowdstrike DriveSlayer February 2022

Thomas, W. et al. (2022, February 25). CrowdStrike Falcon Protects from New Wiper Malware Used in Ukraine Cyberattacks. Retrieved March 25, 2022.

Internal MISP references

UUID 4f01e901-58f8-4fdb-ac8c-ef4b6bfd068e which can be used as unique global reference for Crowdstrike DriveSlayer February 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-25T00:00:00Z
date_published 2022-02-25T00:00:00Z
source MITRE
title CrowdStrike Falcon Protects from New Wiper Malware Used in Ukraine Cyberattacks

CrowdStrike Putter Panda

Crowdstrike Global Intelligence Team. (2014, June 9). CrowdStrike Intelligence Report: Putter Panda. Retrieved January 22, 2016.

Internal MISP references

UUID 413962d0-bd66-4000-a077-38c2677995d1 which can be used as unique global reference for CrowdStrike Putter Panda in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-22T00:00:00Z
date_published 2014-06-09T00:00:00Z
source MITRE, Tidal Cyber
title CrowdStrike Intelligence Report: Putter Panda

Softpedia MinerC

Cimpanu, C.. (2016, September 9). Cryptocurrency Mining Malware Discovered Targeting Seagate NAS Hard Drives. Retrieved September 12, 2024.

Internal MISP references

UUID 087b9bf1-bd9e-4cd6-a386-d9d2c812c927 which can be used as unique global reference for Softpedia MinerC in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2016-09-09T00:00:00Z
source MITRE
title Cryptocurrency Mining Malware Discovered Targeting Seagate NAS Hard Drives

Microsoft Cryptojacking 2023

Microsoft Threat Intelligence. (2023, July 25). Cryptojacking: Understanding and defending against cloud compute resource abuse. Retrieved September 5, 2023.

Internal MISP references

UUID e2dbc963-b913-5a44-bb61-88a3f0d8d8a3 which can be used as unique global reference for Microsoft Cryptojacking 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-05T00:00:00Z
date_published 2023-07-25T00:00:00Z
source MITRE
title Cryptojacking: Understanding and defending against cloud compute resource abuse

Microsoft CryptUnprotectData April 2018

Microsoft. (2018, April 12). CryptUnprotectData function. Retrieved June 18, 2019.

Internal MISP references

UUID 258088ae-96c2-4520-8eb5-1a7e540a9a24 which can be used as unique global reference for Microsoft CryptUnprotectData April 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-18T00:00:00Z
date_published 2018-04-12T00:00:00Z
source MITRE
title CryptUnprotectData function

Csc.exe - LOLBAS Project

LOLBAS. (2018, May 25). Csc.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 276c9e55-4673-426d-8f49-06edee2e3b30 which can be used as unique global reference for Csc.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Csc.exe

Cscript.exe - LOLBAS Project

LOLBAS. (2018, May 25). Cscript.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 428b6223-63b7-497f-b13a-e472b4583a9f which can be used as unique global reference for Cscript.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Cscript.exe

csi.exe - LOLBAS Project

LOLBAS. (2018, May 25). csi.exe. Retrieved December 4, 2023.

Internal MISP references

UUID b810ee91-de4e-4c7b-8fa8-24dca95133e5 which can be used as unique global reference for csi.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title csi.exe

OWASP CSV Injection

Albinowax Timo Goosen. (n.d.). CSV Injection. Retrieved February 7, 2022.

Internal MISP references

UUID 0cdde66c-a7ae-48a2-8ade-067643de304d which can be used as unique global reference for OWASP CSV Injection in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-07T00:00:00Z
source MITRE
title CSV Injection

Elastic CUBA Ransomware 2022

Daniel Stepanic, Derek Ditch, Seth Goodwin, Salim Bitam, Andrew Pease. (2022, September 7). CUBA Ransomware Campaign Analysis. Retrieved August 5, 2024.

Internal MISP references

UUID 79299d27-dbbf-56d0-87fd-15e3f9167cf8 which can be used as unique global reference for Elastic CUBA Ransomware 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-05T00:00:00Z
date_published 2022-09-07T00:00:00Z
source MITRE
title CUBA Ransomware Campaign Analysis

Microsoft Subkey

Microsoft. (n.d.). CurrentControlSet\Services Subkey Entries. Retrieved November 30, 2014.

Internal MISP references

UUID be233077-7bb4-48be-aecf-03258931527d which can be used as unique global reference for Microsoft Subkey in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-30T00:00:00Z
source MITRE
title CurrentControlSet\Services Subkey Entries

Microsoft - Customer Guidance on Recent Nation-State Cyber Attacks

MSRC. (2020, December 13). Customer Guidance on Recent Nation-State Cyber Attacks. Retrieved December 30, 2020.

Internal MISP references

UUID 47031992-841f-4ef4-87c6-bb4c077fb8dc which can be used as unique global reference for Microsoft - Customer Guidance on Recent Nation-State Cyber Attacks in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-30T00:00:00Z
date_published 2020-12-13T00:00:00Z
source MITRE
title Customer Guidance on Recent Nation-State Cyber Attacks

Microsoft SolarWinds Customer Guidance

MSRC. (2020, December 13). Customer Guidance on Recent Nation-State Cyber Attacks. Retrieved December 17, 2020.

Internal MISP references

UUID b486ae40-a854-4998-bf1b-aaf6ea2047ed which can be used as unique global reference for Microsoft SolarWinds Customer Guidance in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-17T00:00:00Z
date_published 2020-12-13T00:00:00Z
source MITRE
title Customer Guidance on Recent Nation-State Cyber Attacks

Bleeping Computer Bank Hack 2020

Ionut Ilascu. (2020, January 16). Customer-Owned Bank Informs 100k of Breach Exposing Account Balance, PII. Retrieved July 1, 2024.

Internal MISP references

UUID 027b281d-79d5-50aa-9ff3-d6f4e647d477 which can be used as unique global reference for Bleeping Computer Bank Hack 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-01T00:00:00Z
date_published 2020-01-16T00:00:00Z
source MITRE
title Customer-Owned Bank Informs 100k of Breach Exposing Account Balance, PII

Login Scripts Apple Dev

Apple. (2016, September 13). Customizing Login and Logout. Retrieved April 1, 2022.

Internal MISP references

UUID 9c0094b6-a8e3-4f4d-8d2e-33b408d44a06 which can be used as unique global reference for Login Scripts Apple Dev in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-01T00:00:00Z
date_published 2016-09-13T00:00:00Z
source MITRE
title Customizing Login and Logout

TechNet Screensaver GP

Microsoft. (n.d.). Customizing the Desktop. Retrieved December 5, 2017.

Internal MISP references

UUID 7cf8056e-6d3b-4930-9d2c-160d7d9636ac which can be used as unique global reference for TechNet Screensaver GP in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-05T00:00:00Z
source MITRE
title Customizing the Desktop

CustomShellHost.exe - LOLBAS Project

LOLBAS. (2021, November 14). CustomShellHost.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 96324ab1-7eb8-42dc-b19a-fa1d9f85e239 which can be used as unique global reference for CustomShellHost.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-11-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title CustomShellHost.exe

Mandiant Cutting Edge Part 2 January 2024

Lin, M. et al. (2024, January 31). Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation. Retrieved February 27, 2024.

Internal MISP references

UUID 5209d259-4293-58c0-bbdc-f30ff77d57f7 which can be used as unique global reference for Mandiant Cutting Edge Part 2 January 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-27T00:00:00Z
date_published 2024-01-31T00:00:00Z
source MITRE
title Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation

Mandiant Cutting Edge Part 3 February 2024

Lin, M. et al. (2024, February 27). Cutting Edge, Part 3: Investigating Ivanti Connect Secure VPN Exploitation and Persistence Attempts. Retrieved March 1, 2024.

Internal MISP references

UUID 49e5b125-5503-5cb0-9a56-a93f82b55753 which can be used as unique global reference for Mandiant Cutting Edge Part 3 February 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-01T00:00:00Z
date_published 2024-02-27T00:00:00Z
source MITRE
title Cutting Edge, Part 3: Investigating Ivanti Connect Secure VPN Exploitation and Persistence Attempts

Mandiant Cutting Edge January 2024

McLellan, T. et al. (2024, January 12). Cutting Edge: Suspected APT Targets Ivanti Connect Secure VPN in New Zero-Day Exploitation. Retrieved February 27, 2024.

Internal MISP references

UUID 9d9ec923-89c1-5155-ae6e-98d4776d4250 which can be used as unique global reference for Mandiant Cutting Edge January 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-27T00:00:00Z
date_published 2024-01-12T00:00:00Z
source MITRE
title Cutting Edge: Suspected APT Targets Ivanti Connect Secure VPN in New Zero-Day Exploitation

Symantec Naid in the Wild June 2012

Symantec Security Response. (2012, June 18). CVE-2012-1875 Exploited in the Wild - Part 1 (Trojan.Naid). Retrieved February 22, 2018.

Internal MISP references

UUID e1531171-709c-4043-9e3a-af9e37f3ac57 which can be used as unique global reference for Symantec Naid in the Wild June 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-22T00:00:00Z
date_published 2012-06-18T00:00:00Z
source MITRE
title CVE-2012-1875 Exploited in the Wild - Part 1 (Trojan.Naid)

NVD CVE-2014-7169

National Vulnerability Database. (2017, September 24). CVE-2014-7169 Detail. Retrieved April 3, 2018.

Internal MISP references

UUID c3aab918-51c6-4773-8677-a89b27a00eb1 which can be used as unique global reference for NVD CVE-2014-7169 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-03T00:00:00Z
date_published 2017-09-24T00:00:00Z
source MITRE
title CVE-2014-7169 Detail

NVD CVE-2016-6662

National Vulnerability Database. (2017, February 2). CVE-2016-6662 Detail. Retrieved April 3, 2018.

Internal MISP references

UUID 1813c26d-da68-4a82-a959-27351dd5e51b which can be used as unique global reference for NVD CVE-2016-6662 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-03T00:00:00Z
date_published 2017-02-02T00:00:00Z
source MITRE
title CVE-2016-6662 Detail

NVD CVE-2017-0176

National Vulnerability Database. (2017, June 22). CVE-2017-0176 Detail. Retrieved April 3, 2018.

Internal MISP references

UUID 82602351-0ab0-48d7-90dd-f4536b4d009b which can be used as unique global reference for NVD CVE-2017-0176 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-03T00:00:00Z
date_published 2017-06-22T00:00:00Z
source MITRE
title CVE-2017-0176 Detail

FireEye Attacks Leveraging HTA

Berry, A., Galang, L., Jiang, G., Leathery, J., Mohandas, R. (2017, April 11). CVE-2017-0199: In the Wild Attacks Leveraging HTA Handler. Retrieved October 27, 2017.

Internal MISP references

UUID 1876a476-b2ff-4605-a78b-89443d21b063 which can be used as unique global reference for FireEye Attacks Leveraging HTA in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-10-27T00:00:00Z
date_published 2017-04-11T00:00:00Z
source MITRE
title CVE-2017-0199: In the Wild Attacks Leveraging HTA Handler

Microsoft CVE-2017-8625 Aug 2017

Microsoft. (2017, August 8). CVE-2017-8625 - Internet Explorer Security Feature Bypass Vulnerability. Retrieved October 3, 2018.

Internal MISP references

UUID 402cb526-ef57-4d27-b96b-f98008abe716 which can be used as unique global reference for Microsoft CVE-2017-8625 Aug 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-10-03T00:00:00Z
date_published 2017-08-08T00:00:00Z
source MITRE
title CVE-2017-8625 - Internet Explorer Security Feature Bypass Vulnerability

NVD CVE-2019-3610

National Vulnerability Database. (2019, October 9). CVE-2019-3610 Detail. Retrieved April 14, 2021.

Internal MISP references

UUID 889b742e-7572-4aad-8944-7f071483b613 which can be used as unique global reference for NVD CVE-2019-3610 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-14T00:00:00Z
date_published 2019-10-09T00:00:00Z
source MITRE
title CVE-2019-3610 Detail

CVMServer Vuln

Mickey Jin. (2021, June 3). CVE-2021-30724: CVMServer Vulnerability in macOS and iOS. Retrieved October 12, 2021.

Internal MISP references

UUID 6f83da0c-d2ce-4923-ba32-c6886eb22587 which can be used as unique global reference for CVMServer Vuln in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-12T00:00:00Z
date_published 2021-06-03T00:00:00Z
source MITRE
title CVE-2021-30724: CVMServer Vulnerability in macOS and iOS

Crowdstrike Kubernetes Container Escape

Manoj Ahuje. (2022, January 31). CVE-2022-0185: Kubernetes Container Escape Using Linux Kernel Exploit. Retrieved July 6, 2022.

Internal MISP references

UUID 84d5f015-9014-417c-b2a9-f650fe19d448 which can be used as unique global reference for Crowdstrike Kubernetes Container Escape in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-06T00:00:00Z
date_published 2022-01-31T00:00:00Z
source MITRE
title CVE-2022-0185: Kubernetes Container Escape Using Linux Kernel Exploit

Trend Micro March 13 2024

Peter Girnus; Aliakbar Zahravi; Simon Zuckerbraun Read time. (2024, March 13). CVE-2024-21412 DarkGate Operators Exploit Microsoft Windows SmartScreen Bypass in Zero-Day Campaign. Retrieved March 14, 2024.

Internal MISP references

UUID 0574a0a7-694b-4858-b053-8f7911c8ce54 which can be used as unique global reference for Trend Micro March 13 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-14T00:00:00Z
date_published 2024-03-13T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title CVE-2024-21412 DarkGate Operators Exploit Microsoft Windows SmartScreen Bypass in Zero-Day Campaign

CyberArk Labs Safe Mode 2016

Naim, D.. (2016, September 15). CyberArk Labs: From Safe Mode to Domain Compromise. Retrieved June 23, 2021.

Internal MISP references

UUID bd9c14dd-0e2a-447b-a245-f548734d2400 which can be used as unique global reference for CyberArk Labs Safe Mode 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-23T00:00:00Z
date_published 2016-09-15T00:00:00Z
source MITRE
title CyberArk Labs: From Safe Mode to Domain Compromise

PJ Cyber Army of Russia 2023

PJ04857920. (2023, November 30). Cyber Army of Russia — DDoS Tool. Retrieved April 30, 2024.

Internal MISP references

UUID 3e42ff96-fc7e-418e-8d8b-076a1a47981e which can be used as unique global reference for PJ Cyber Army of Russia 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-30T00:00:00Z
date_published 2023-11-30T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Cyber Army of Russia — DDoS Tool

Cyware Ngrok May 2019

Cyware. (2019, May 29). Cyber attackers leverage tunneling service to drop Lokibot onto victims’ systems. Retrieved September 15, 2020.

Internal MISP references

UUID 583a01b6-cb4e-41e7-aade-ac2fd19bda4e which can be used as unique global reference for Cyware Ngrok May 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-15T00:00:00Z
date_published 2019-05-29T00:00:00Z
source MITRE
title Cyber attackers leverage tunneling service to drop Lokibot onto victims’ systems

The Record RansomHub June 3 2024

Jonathan Greig. (2024, June 3). Cyberattack on telecom giant Frontier claimed by RansomHub. Retrieved June 7, 2024.

Internal MISP references

UUID 1e474240-bd12-4472-8e69-1631b0e4c102 which can be used as unique global reference for The Record RansomHub June 3 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-07T00:00:00Z
date_published 2024-06-03T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Cyberattack on telecom giant Frontier claimed by RansomHub

Microsoft Phosphorus Oct 2020

Burt, T. (2020, October 28). Cyberattacks target international conference attendees. Retrieved March 8, 2021.

Internal MISP references

UUID 8986c21c-16a0-4a53-8e37-9935bbbfaa4b which can be used as unique global reference for Microsoft Phosphorus Oct 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-08T00:00:00Z
date_published 2020-10-28T00:00:00Z
source MITRE
title Cyberattacks target international conference attendees

Check Point Mid-Year Report 2022

Check Point Software. (2022, August 3). Cyber Attack Trends: Check Point's 2022 Mid-Year Report. Retrieved May 18, 2022.

Internal MISP references

UUID e929cd86-9903-481c-a841-ba387831cb77 which can be used as unique global reference for Check Point Mid-Year Report 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-18T00:00:00Z
date_published 2022-08-03T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Cyber Attack Trends: Check Point's 2022 Mid-Year Report

Talos Seduploader Oct 2017

Mercer, W., et al. (2017, October 22). "Cyber Conflict" Decoy Document Used in Real Cyber Conflict. Retrieved November 2, 2018.

Internal MISP references

UUID 2db77619-72df-461f-84bf-2d1c3499a5c0 which can be used as unique global reference for Talos Seduploader Oct 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-02T00:00:00Z
date_published 2017-10-22T00:00:00Z
source MITRE
title "Cyber Conflict" Decoy Document Used in Real Cyber Conflict

FBI. (2022, December 21). Cyber Criminals Impersonating Brands Using Search Engine Advertisement Services to Defraud Users. Retrieved February 21, 2023.

Internal MISP references

UUID deea5b42-bfab-50af-8d85-cc04fd317a82 which can be used as unique global reference for FBI-search in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-21T00:00:00Z
date_published 2022-12-21T00:00:00Z
source MITRE
title Cyber Criminals Impersonating Brands Using Search Engine Advertisement Services to Defraud Users

Resecurity GXC Team January 3 2024

Resecurity. (2024, January 3). Cybercriminals Implemented Artificial Intelligence (AI) for Invoice Fraud. Retrieved September 9, 2024.

Internal MISP references

UUID 6d55aa2c-3f52-4bff-8003-f78b386a4952 which can be used as unique global reference for Resecurity GXC Team January 3 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-09T00:00:00Z
date_published 2024-01-03T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Cybercriminals Implemented Artificial Intelligence (AI) for Invoice Fraud

Secureworks GOLD KINGSWOOD September 2018

CTU. (2018, September 27). Cybercriminals Increasingly Trying to Ensnare the Big Financial Fish. Retrieved September 20, 2021.

Internal MISP references

UUID cda529b2-e152-4ff0-a6b3-d0305b09fef9 which can be used as unique global reference for Secureworks GOLD KINGSWOOD September 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-20T00:00:00Z
date_published 2018-09-27T00:00:00Z
source MITRE
title Cybercriminals Increasingly Trying to Ensnare the Big Financial Fish

Cybereason OSX Pirrit

Amit Serper. (2016). Cybereason Lab Analysis OSX.Pirrit. Retrieved December 10, 2021.

Internal MISP references

UUID ebdf09ed-6eec-450f-aaea-067504ec25ca which can be used as unique global reference for Cybereason OSX Pirrit in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-12-10T00:00:00Z
date_published 2016-01-01T00:00:00Z
source MITRE
title Cybereason Lab Analysis OSX.Pirrit

Cybereason Quantum Ransomware May 9 2022

Cybereason Nocturnus. (2022, May 9). Cybereason vs. Quantum Locker Ransomware. Retrieved June 28, 2024.

Internal MISP references

UUID 19027620-216a-4921-8d78-f56377778a12 which can be used as unique global reference for Cybereason Quantum Ransomware May 9 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-28T00:00:00Z
date_published 2022-05-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Cybereason vs. Quantum Locker Ransomware

Zdnet Kimsuky Dec 2018

Cimpanu, C.. (2018, December 5). Cyber-espionage group uses Chrome extension to infect victims. Retrieved August 26, 2019.

Internal MISP references

UUID b17acdc3-0163-4c98-b5fb-a457a7e6b58d which can be used as unique global reference for Zdnet Kimsuky Dec 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-08-26T00:00:00Z
date_published 2018-12-05T00:00:00Z
source MITRE
title Cyber-espionage group uses Chrome extension to infect victims

FireEye APT32 May 2017

Carr, N.. (2017, May 14). Cyber Espionage is Alive and Well: APT32 and the Threat to Global Corporations. Retrieved June 18, 2017.

Internal MISP references

UUID b72d017b-a70f-4003-b3d9-90d79aca812d which can be used as unique global reference for FireEye APT32 May 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-06-18T00:00:00Z
date_published 2017-05-14T00:00:00Z
source MITRE, Tidal Cyber
title Cyber Espionage is Alive and Well: APT32 and the Threat to Global Corporations

Shadowserver Strategic Web Compromise

Adair, S., Moran, N. (2012, May 15). Cyber Espionage & Strategic Web Compromises – Trusted Websites Serving Dangerous Results. Retrieved March 13, 2018.

Internal MISP references

UUID cf531866-ac3c-4078-b847-5b4af7eb161f which can be used as unique global reference for Shadowserver Strategic Web Compromise in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-13T00:00:00Z
date_published 2012-05-15T00:00:00Z
source MITRE
title Cyber Espionage & Strategic Web Compromises – Trusted Websites Serving Dangerous Results

CyberKnow Tweet July 7 2022

Cyberknow20. (2022, July 7). CyberKnow Tweet July 7 2022. Retrieved October 10, 2023.

Internal MISP references

UUID a37564a4-ff83-4ce0-818e-80750172f302 which can be used as unique global reference for CyberKnow Tweet July 7 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-10T00:00:00Z
date_published 2022-07-07T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title CyberKnow Tweet July 7 2022

Cyber Safety Review Board: Lapsus

CISA. (2023, August). Cyber Safety Review Board: Lapsus. Retrieved January 5, 2024.

Internal MISP references

UUID 4b713738-d767-5243-b9af-4d7ac7b0b349 which can be used as unique global reference for Cyber Safety Review Board: Lapsus in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-05T00:00:00Z
date_published 2023-08-01T00:00:00Z
source MITRE
title Cyber Safety Review Board: Lapsus

CISA Scattered Spider Advisory November 2023

CISA. (2023, November 16). Cybersecurity Advisory: Scattered Spider (AA23-320A). Retrieved March 18, 2024.

Internal MISP references

UUID deae8b2c-39dd-5252-b846-88e1cab099c2 which can be used as unique global reference for CISA Scattered Spider Advisory November 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-18T00:00:00Z
date_published 2023-11-16T00:00:00Z
source MITRE
title Cybersecurity Advisory: Scattered Spider (AA23-320A)

NSA NCSC Turla OilRig

NSA/NCSC. (2019, October 21). Cybersecurity Advisory: Turla Group Exploits Iranian APT To Expand Coverage Of Victims. Retrieved October 16, 2020.

Internal MISP references

UUID 3e86a807-5188-4278-9a58-babd23b86410 which can be used as unique global reference for NSA NCSC Turla OilRig in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-16T00:00:00Z
date_published 2019-10-21T00:00:00Z
source MITRE
title Cybersecurity Advisory: Turla Group Exploits Iranian APT To Expand Coverage Of Victims

OPM Leak

Cybersecurity Resource Center. (n.d.). CYBERSECURITY INCIDENTS. Retrieved September 16, 2024.

Internal MISP references

UUID b67ed4e9-ed44-460a-bd59-c978bdfda32f which can be used as unique global reference for OPM Leak in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-16T00:00:00Z
source MITRE
title CYBERSECURITY INCIDENTS

ExpressVPN PATH env Windows 2021

ExpressVPN Security Team. (2021, November 16). Cybersecurity lessons: A PATH vulnerability in Windows. Retrieved September 28, 2023.

Internal MISP references

UUID 26096485-1dd6-512a-a2a1-27dbbfb6fde0 which can be used as unique global reference for ExpressVPN PATH env Windows 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-28T00:00:00Z
date_published 2021-11-16T00:00:00Z
source MITRE
title Cybersecurity lessons: A PATH vulnerability in Windows

SCILabs Malteiro 2021

SCILabs. (2021, December 23). Cyber Threat Profile Malteiro. Retrieved March 13, 2024.

Internal MISP references

UUID c6948dfc-b133-556b-a8ac-b3a4dba09c0e which can be used as unique global reference for SCILabs Malteiro 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-13T00:00:00Z
date_published 2021-12-23T00:00:00Z
source MITRE
title Cyber Threat Profile Malteiro

Cyber Threat Profile MALTEIRO – Sciblog

blog.scilabs.mx. (2021, December 23). Cyber Threat Profile MALTEIRO – Sciblog. Retrieved May 17, 2023.

Internal MISP references

UUID 1f46872c-6255-4ce0-a6c3-2bfa9e767765 which can be used as unique global reference for Cyber Threat Profile MALTEIRO – Sciblog in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-17T00:00:00Z
date_published 2021-12-23T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Cyber Threat Profile MALTEIRO – Sciblog

DoublePulsar Cyber Toufan

Kevin Beaumont. (2023, December 28). Cyber Toufan goes Oprah mode with free Linux system wipes of over 100 organisations. Retrieved August 8, 2024.

Internal MISP references

UUID 2fc1f6de-e01c-4225-bd29-8d547bf91e9e which can be used as unique global reference for DoublePulsar Cyber Toufan in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-08T00:00:00Z
date_published 2023-12-28T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Cyber Toufan goes Oprah mode with free Linux system wipes of over 100 organisations

NCSC. (2022, February 23). Cyclops Blink Malware Analysis Report. Retrieved March 3, 2022.

Internal MISP references

UUID 91ed6adf-f066-49e4-8ec7-1989bc6615a6 which can be used as unique global reference for NCSC Cyclops Blink February 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-03T00:00:00Z
date_published 2022-02-23T00:00:00Z
source MITRE
title Cyclops Blink Malware Analysis Report

Haquebord, F. et al. (2022, March 17). Cyclops Blink Sets Sights on Asus Routers. Retrieved March 17, 2022.

Internal MISP references

UUID 64e9a24f-f386-4774-9874-063e0ebfb8e1 which can be used as unique global reference for Trend Micro Cyclops Blink March 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-17T00:00:00Z
date_published 2022-03-17T00:00:00Z
source MITRE
title Cyclops Blink Sets Sights on Asus Routers

Cynet Ragnar Apr 2020

Gold, B. (2020, April 27). Cynet Detection Report: Ragnar Locker Ransomware. Retrieved June 29, 2020.

Internal MISP references

UUID aeb637ea-0b83-42a0-8f68-9fdc59aa462a which can be used as unique global reference for Cynet Ragnar Apr 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-29T00:00:00Z
date_published 2020-04-27T00:00:00Z
source MITRE
title Cynet Detection Report: Ragnar Locker Ransomware

Microsoft DACL May 2018

Microsoft. (2018, May 30). DACLs and ACEs. Retrieved August 19, 2018.

Internal MISP references

UUID 32a250ca-a7eb-4d7f-af38-f3e6a09540e2 which can be used as unique global reference for Microsoft DACL May 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-19T00:00:00Z
date_published 2018-05-30T00:00:00Z
source MITRE
title DACLs and ACEs

Apple Developer Doco Archive Launchd

Apple. (2016, September 13). Daemons and Services Programming Guide - Creating Launch Daemons and Agents. Retrieved February 24, 2021.

Internal MISP references

UUID 41311827-3d81-422a-9b07-ee8ddc2fc7f1 which can be used as unique global reference for Apple Developer Doco Archive Launchd in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-24T00:00:00Z
date_published 2016-09-13T00:00:00Z
source MITRE
title Daemons and Services Programming Guide - Creating Launch Daemons and Agents

Kubernetes DaemonSet

Kubernetes. (n.d.). DaemonSet. Retrieved February 15, 2024.

Internal MISP references

UUID 4e4668bd-9bef-597e-ad41-8afe1974b7f6 which can be used as unique global reference for Kubernetes DaemonSet in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-15T00:00:00Z
source MITRE
title DaemonSet

Symantec Daggerfly 2023

Threat Hunter Team. (2023, April 20). Daggerfly: APT Actor Targets Telecoms Company in Africa. Retrieved July 25, 2024.

Internal MISP references

UUID cb0a51f5-fe5b-5dd0-8f55-4e7536cb61a4 which can be used as unique global reference for Symantec Daggerfly 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-25T00:00:00Z
date_published 2023-04-20T00:00:00Z
source MITRE
title Daggerfly: APT Actor Targets Telecoms Company in Africa

Symantec Daggerfly 2024

Threat Hunter Team. (2024, July 23). Daggerfly: Espionage Group Makes Major Update to Toolset. Retrieved July 25, 2024.

Internal MISP references

UUID 1dadd09e-e7b0-50a1-ba3d-413780dbeb80 which can be used as unique global reference for Symantec Daggerfly 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-25T00:00:00Z
date_published 2024-07-23T00:00:00Z
source MITRE
title Daggerfly: Espionage Group Makes Major Update to Toolset

Picus Daixin Team October 24 2022

Huseyin Can Yuceel. (2022, October 24). Daixin Team Targets Healthcare Organizations with Ransomware Attacks. Retrieved December 1, 2023.

Internal MISP references

UUID eba3b1b9-d0a0-4c03-8c14-21f7bbcc8a02 which can be used as unique global reference for Picus Daixin Team October 24 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-01T00:00:00Z
date_published 2022-10-24T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Daixin Team Targets Healthcare Organizations with Ransomware Attacks

Medium Eli Salem GuLoader April 2021

Salem, E. (2021, April 19). Dancing With Shellcodes: Cracking the latest version of Guloader. Retrieved July 7, 2021.

Internal MISP references

UUID 87c5e84a-b96d-489d-aa10-db95b78c5a93 which can be used as unique global reference for Medium Eli Salem GuLoader April 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-07-07T00:00:00Z
date_published 2021-04-19T00:00:00Z
source MITRE
title Dancing With Shellcodes: Cracking the latest version of Guloader

Lookout Dark Caracal Jan 2018

Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018.

Internal MISP references

UUID c558f5db-a426-4041-b883-995ec56e7155 which can be used as unique global reference for Lookout Dark Caracal Jan 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-11T00:00:00Z
date_published 2018-01-18T00:00:00Z
source MITRE, Tidal Cyber
title Dark Caracal: Cyber-espionage at a Global Scale

Dark Clouds_Usenix_Mulazzani_08_2011

Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, and Edgar Weippl. (2011, August). Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space. Retrieved July 14, 2022.

Internal MISP references

UUID ee5d2c9c-c704-4f35-baeb-055a35dd04b5 which can be used as unique global reference for Dark Clouds_Usenix_Mulazzani_08_2011 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-14T00:00:00Z
date_published 2011-08-01T00:00:00Z
source MITRE
title Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space

TrendMicro DarkComet Sept 2014

TrendMicro. (2014, September 03). DARKCOMET. Retrieved November 6, 2018.

Internal MISP references

UUID fb365600-4961-43ed-8292-1c07cbc530ef which can be used as unique global reference for TrendMicro DarkComet Sept 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-06T00:00:00Z
date_published 2014-09-03T00:00:00Z
source MITRE
title DARKCOMET

DarkGate Loader delivered via Teams - Truesec

Jakob Nordenlund. (2023, September 6). DarkGate Loader delivered via Teams - Truesec. Retrieved October 20, 2023.

Internal MISP references

UUID 4222a06f-9528-4076-8037-a27012c2930c which can be used as unique global reference for DarkGate Loader delivered via Teams - Truesec in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-20T00:00:00Z
date_published 2023-09-06T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title DarkGate Loader delivered via Teams - Truesec

Bleeping Computer DarkGate October 14 2023

Sergiu Gatlan. (2023, October 14). DarkGate malware spreads through compromised Skype accounts. Retrieved October 20, 2023.

Internal MISP references

UUID 313e5558-d8f9-4457-9004-810d9fa5340c which can be used as unique global reference for Bleeping Computer DarkGate October 14 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-20T00:00:00Z
date_published 2023-10-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title DarkGate malware spreads through compromised Skype accounts

Trend Micro DarkGate October 12 2023

Trent Bessell, Ryan Maglaque, Aira Marcelo, Jack Walsh, David Walsh. (2023, October 12). DarkGate Opens Organizations for Attack via Skype, Teams. Retrieved October 20, 2023.

Internal MISP references

UUID 81650f5b-628b-4e76-80d6-2c15cf70d37a which can be used as unique global reference for Trend Micro DarkGate October 12 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-20T00:00:00Z
date_published 2023-10-12T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title DarkGate Opens Organizations for Attack via Skype, Teams

DarkGate - Threat Breakdown Journey

0xToxin. (n.d.). DarkGate - Threat Breakdown Journey. Retrieved October 20, 2023.

Internal MISP references

UUID 8a1ac4b8-05f6-4be9-a866-e3026bc92c7f which can be used as unique global reference for DarkGate - Threat Breakdown Journey in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title DarkGate - Threat Breakdown Journey

Kaspersky Tomiris Sep 2021

Kwiatkoswki, I. and Delcher, P. (2021, September 29). DarkHalo After SolarWinds: the Tomiris connection. Retrieved December 27, 2021.

Internal MISP references

UUID a881a7e4-a1df-4ad2-b67f-ef03caddb721 which can be used as unique global reference for Kaspersky Tomiris Sep 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-12-27T00:00:00Z
date_published 2021-09-29T00:00:00Z
source MITRE
title DarkHalo After SolarWinds: the Tomiris connection

Volexity SolarWinds

Cash, D. et al. (2020, December 14). Dark Halo Leverages SolarWinds Compromise to Breach Organizations. Retrieved December 29, 2020.

Internal MISP references

UUID 355cecf8-ef3e-4a6e-a652-3bf26fe46d88 which can be used as unique global reference for Volexity SolarWinds in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-29T00:00:00Z
date_published 2020-12-14T00:00:00Z
source MITRE
title Dark Halo Leverages SolarWinds Compromise to Breach Organizations

Securelist Darkhotel Aug 2015

Kaspersky Lab's Global Research & Analysis Team. (2015, August 10). Darkhotel's attacks in 2015. Retrieved November 2, 2018.

Internal MISP references

UUID 5a45be49-f5f1-4d5b-b7da-0a2f38194ec1 which can be used as unique global reference for Securelist Darkhotel Aug 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-02T00:00:00Z
date_published 2015-08-10T00:00:00Z
source MITRE, Tidal Cyber
title Darkhotel's attacks in 2015

Unit42 DarkHydrus Jan 2019

Lee, B., Falcone, R. (2019, January 18). DarkHydrus delivers new Trojan that can use Google Drive for C2 communications. Retrieved April 17, 2019.

Internal MISP references

UUID eb235504-d142-4c6d-9ffd-3c0b0dd23e80 which can be used as unique global reference for Unit42 DarkHydrus Jan 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-17T00:00:00Z
date_published 2019-01-18T00:00:00Z
source MITRE
title DarkHydrus delivers new Trojan that can use Google Drive for C2 communications

Unit 42 Phishery Aug 2018

Falcone, R. (2018, August 07). DarkHydrus Uses Phishery to Harvest Credentials in the Middle East. Retrieved August 10, 2018.

Internal MISP references

UUID ab9d59c1-8ea5-4f9c-b733-b16223ffe84a which can be used as unique global reference for Unit 42 Phishery Aug 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-10T00:00:00Z
date_published 2018-08-07T00:00:00Z
source MITRE
title DarkHydrus Uses Phishery to Harvest Credentials in the Middle East

Darkside Ransomware Cybereason

Cybereason Nocturnus. (2021, April 1). Cybereason vs. Darkside Ransomware. Retrieved August 18, 2021.

Internal MISP references

UUID eded380e-33e9-4fdc-8e1f-b51d650b9731 which can be used as unique global reference for Darkside Ransomware Cybereason in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-18T00:00:00Z
source MITRE
title Darkside Ransomware

DarkSide Ransomware Gang

Ramarcus Baylor. (2021, May 12). DarkSide Ransomware Gang: An Overview. Retrieved August 30, 2022.

Internal MISP references

UUID 5f8d49e8-22da-425f-b63b-a799b97ec2b5 which can be used as unique global reference for DarkSide Ransomware Gang in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-30T00:00:00Z
date_published 2021-05-12T00:00:00Z
source MITRE
title DarkSide Ransomware Gang: An Overview

Secureworks DarkTortilla Aug 2022

Secureworks Counter Threat Unit Research Team. (2022, August 17). DarkTortilla Malware Analysis. Retrieved November 3, 2022.

Internal MISP references

UUID 4b48cc22-55ac-5b61-b183-9008f7db37fd which can be used as unique global reference for Secureworks DarkTortilla Aug 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-11-03T00:00:00Z
date_published 2022-08-17T00:00:00Z
source MITRE
title DarkTortilla Malware Analysis

Securelist DarkVishnya Dec 2018

Golovanov, S. (2018, December 6). DarkVishnya: Banks attacked through direct connection to local network. Retrieved May 15, 2020.

Internal MISP references

UUID da9ac5a7-c644-45fa-ab96-30ac6bfc9f81 which can be used as unique global reference for Securelist DarkVishnya Dec 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-15T00:00:00Z
date_published 2018-12-06T00:00:00Z
source MITRE, Tidal Cyber
title DarkVishnya: Banks attacked through direct connection to local network

Prevailion DarkWatchman 2021

Smith, S., Stafford, M. (2021, December 14). DarkWatchman: A new evolution in fileless techniques. Retrieved January 10, 2022.

Internal MISP references

UUID 449e7b5c-7c62-4a63-a676-80026a597fc9 which can be used as unique global reference for Prevailion DarkWatchman 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-10T00:00:00Z
date_published 2021-12-14T00:00:00Z
source MITRE
title DarkWatchman: A new evolution in fileless techniques

SOCRadar APT42 December 12 2022

SOCRadar Research. (2022, December 12). Dark Web Profile: APT42 – Iranian Cyber Espionage Group. Retrieved August 30, 2024.

Internal MISP references

UUID 6077faed-b162-4850-969a-2abedc842198 which can be used as unique global reference for SOCRadar APT42 December 12 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-30T00:00:00Z
date_published 2022-12-12T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Dark Web Profile: APT42 – Iranian Cyber Espionage Group

SOCRadar Cyber Toufan Profile

SOCRadar. (2023, December 20). Dark Web Profile: Cyber Toufan Al-aqsa. Retrieved August 8, 2024.

Internal MISP references

UUID a9aa6361-8c4d-4456-bb3f-c64ca5260695 which can be used as unique global reference for SOCRadar Cyber Toufan Profile in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-08T00:00:00Z
date_published 2023-12-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Dark Web Profile: Cyber Toufan Al-aqsa

SOCRadar INC Ransom January 2024

SOCRadar. (2024, January 24). Dark Web Profile: INC Ransom. Retrieved June 5, 2024.

Internal MISP references

UUID 6c78b422-7d46-58a4-a403-421db0531147 which can be used as unique global reference for SOCRadar INC Ransom January 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-05T00:00:00Z
date_published 2024-01-24T00:00:00Z
source MITRE
title Dark Web Profile: INC Ransom

Moran 2014

Moran, N., Oppenheim, M., Engle, S., & Wartell, R.. (2014, September 3). Darwin’s Favorite APT Group [Blog]. Retrieved November 12, 2014.

Internal MISP references

UUID 15ef155b-7628-4b18-bc53-1d30be4eac5d which can be used as unique global reference for Moran 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-12T00:00:00Z
date_published 2014-09-03T00:00:00Z
source MITRE, Tidal Cyber
title Darwin’s Favorite APT Group [Blog]

AWS Data Perimeters

AWS. (n.d.). Data perimeters on AWS. Retrieved October 16, 2024.

Internal MISP references

UUID de628ad0-9608-5af0-8c93-21a1d5cd4998 which can be used as unique global reference for AWS Data Perimeters in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-16T00:00:00Z
source MITRE
title Data perimeters on AWS

DataSvcUtil.exe - LOLBAS Project

LOLBAS. (2020, December 1). DataSvcUtil.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 0c373780-3202-4036-8c83-f3d468155b35 which can be used as unique global reference for DataSvcUtil.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2020-12-01T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title DataSvcUtil.exe

Operation Emmental

botconf eu. (2014, December 31). David Sancho - Finding Holes in Banking 2FA: Operation Emmental. Retrieved January 4, 2024.

Internal MISP references

UUID 36443369-4fa9-4802-8b21-68cc382b949f which can be used as unique global reference for Operation Emmental in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-04T00:00:00Z
date_published 2014-12-31T00:00:00Z
source MITRE
title David Sancho - Finding Holes in Banking 2FA: Operation Emmental

Hijacking VNC

Z3RO. (2019, March 10). Day 70: Hijacking VNC (Enum, Brute, Access and Crack). Retrieved September 20, 2021.

Internal MISP references

UUID 7a58938f-058b-4c84-aa95-9c37dcdda1fb which can be used as unique global reference for Hijacking VNC in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-20T00:00:00Z
date_published 2019-03-10T00:00:00Z
source MITRE
title Day 70: Hijacking VNC (Enum, Brute, Access and Crack)

DBatLoader Actively Distributing Malwares Targeting European Businesses

Zscaler. (2023, March 27). DBatLoader Actively Distributing Malwares Targeting European Businesses. Retrieved May 7, 2023.

Internal MISP references

UUID 42ee2e91-4dac-41ce-b2ec-fde21c258a28 which can be used as unique global reference for DBatLoader Actively Distributing Malwares Targeting European Businesses in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2023-03-27T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title DBatLoader Actively Distributing Malwares Targeting European Businesses

Microsoft COM ACL

Microsoft. (n.d.). DCOM Security Enhancements in Windows XP Service Pack 2 and Windows Server 2003 Service Pack 1. Retrieved November 22, 2017.

Internal MISP references

UUID 88769217-57f1-46d4-977c-2cb2969db437 which can be used as unique global reference for Microsoft COM ACL in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-22T00:00:00Z
source MITRE
title DCOM Security Enhancements in Windows XP Service Pack 2 and Windows Server 2003 Service Pack 1

DCShadow Blog

Delpy, B. & LE TOUX, V. (n.d.). DCShadow. Retrieved March 20, 2018.

Internal MISP references

UUID 37514816-b8b3-499f-842b-2d8cce9e140b which can be used as unique global reference for DCShadow Blog in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-20T00:00:00Z
source MITRE
title DCShadow

GitHub DCSYNCMonitor

Spencer S. (2018, February 22). DCSYNCMonitor. Retrieved March 30, 2018.

Internal MISP references

UUID be03c794-d9f3-4678-8198-257abf6dcdbd which can be used as unique global reference for GitHub DCSYNCMonitor in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-30T00:00:00Z
date_published 2018-02-22T00:00:00Z
source MITRE
title DCSYNCMonitor

DD Man

Kerrisk, M. (2020, February 2). DD(1) User Commands. Retrieved February 21, 2020.

Internal MISP references

UUID f64bee0d-e37d-45d5-9968-58e622e89bfe which can be used as unique global reference for DD Man in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-21T00:00:00Z
date_published 2020-02-02T00:00:00Z
source MITRE
title DD(1) User Commands

Arbor SSLDoS April 2012

ASERT Team, Netscout Arbor. (2012, April 24). DDoS Attacks on SSL: Something Old, Something New. Retrieved April 22, 2019.

Internal MISP references

UUID b5de4376-0deb-45de-83a0-09df98480464 which can be used as unique global reference for Arbor SSLDoS April 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-22T00:00:00Z
date_published 2012-04-24T00:00:00Z
source MITRE
title DDoS Attacks on SSL: Something Old, Something New

CERT-EU DDoS March 2017

Meintanis, S., Revuelto, V., Socha, K.. (2017, March 10). DDoS Overview and Response Guide. Retrieved April 24, 2019.

Internal MISP references

UUID 64341348-f448-4e56-bf78-442b92e6d435 which can be used as unique global reference for CERT-EU DDoS March 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-24T00:00:00Z
date_published 2017-03-10T00:00:00Z
source MITRE
title DDoS Overview and Response Guide

Unit42 Sofacy Dec 2018

Lee, B., Falcone, R. (2018, December 12). Dear Joohn: The Sofacy Group’s Global Campaign. Retrieved April 19, 2019.

Internal MISP references

UUID 540c4c33-d4c2-4324-94cd-f57646666e32 which can be used as unique global reference for Unit42 Sofacy Dec 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-19T00:00:00Z
date_published 2018-12-12T00:00:00Z
source MITRE
title Dear Joohn: The Sofacy Group’s Global Campaign

Death by 1000 installers; it's all broken!

Patrick Wardle. (2017). Death by 1000 installers; it's all broken!. Retrieved August 8, 2019.

Internal MISP references

UUID 2ae99e9b-cd00-4e60-ba9e-bcc50e709e88 which can be used as unique global reference for Death by 1000 installers; it's all broken! in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-08-08T00:00:00Z
date_published 2017-01-01T00:00:00Z
source MITRE
title Death by 1000 installers; it's all broken!

SpecterOps Lateral Movement from Azure to On-Prem AD 2020

Andy Robbins. (2020, August 17). Death from Above: Lateral Movement from Azure to On-Prem AD. Retrieved March 13, 2023.

Internal MISP references

UUID eb97d3d6-21cb-5f27-9a78-1e8576acecdc which can be used as unique global reference for SpecterOps Lateral Movement from Azure to On-Prem AD 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-13T00:00:00Z
date_published 2020-08-17T00:00:00Z
source MITRE
title Death from Above: Lateral Movement from Azure to On-Prem AD

Microsoft PowerShell SilentlyContinue

Microsoft. (2023, March 2). $DebugPreference. Retrieved August 30, 2023.

Internal MISP references

UUID ece52a64-1c8d-547d-aedc-ff43d7418cd2 which can be used as unique global reference for Microsoft PowerShell SilentlyContinue in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-30T00:00:00Z
date_published 2023-03-02T00:00:00Z
source MITRE
title $DebugPreference

virtualization.info 2006

virtualization.info. (Interviewer) & Liguori, A. (Interviewee). (2006, August 11). Debunking Blue Pill myth [Interview transcript]. Retrieved November 13, 2014.

Internal MISP references

UUID 8ff8fb53-e468-4df7-b7e3-b344be1507ae which can be used as unique global reference for virtualization.info 2006 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-13T00:00:00Z
date_published 2006-08-11T00:00:00Z
source MITRE
title Debunking Blue Pill myth [Interview transcript]

TrendMicro Confucius APT Feb 2018

Lunghi, D and Horejsi, J. (2018, February 13). Deciphering Confucius: A Look at the Group's Cyberespionage Operations. Retrieved December 26, 2021.

Internal MISP references

UUID d1d5a708-75cb-4d41-b2a3-d035a14ac956 which can be used as unique global reference for TrendMicro Confucius APT Feb 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-12-26T00:00:00Z
date_published 2018-02-13T00:00:00Z
source MITRE, Tidal Cyber
title Deciphering Confucius: A Look at the Group's Cyberespionage Operations

Ciberseguridad Decoding malicious RTF files

Pedrero, R.. (2021, July). Decoding malicious RTF files. Retrieved November 16, 2021.

Internal MISP references

UUID 82d2451b-300f-4891-b1e7-ade53dff1126 which can be used as unique global reference for Ciberseguridad Decoding malicious RTF files in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-11-16T00:00:00Z
date_published 2021-07-01T00:00:00Z
source MITRE
title Decoding malicious RTF files

Nccgroup Gh0st April 2018

Pantazopoulos, N. (2018, April 17). Decoding network data from a Gh0st RAT variant. Retrieved November 2, 2018.

Internal MISP references

UUID 4476aa0a-b1ef-4ac6-9e44-5721a0b3e92b which can be used as unique global reference for Nccgroup Gh0st April 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-02T00:00:00Z
date_published 2018-04-17T00:00:00Z
source MITRE
title Decoding network data from a Gh0st RAT variant

Morphisec September 3 2024

Michael Gorelik. (2024, September 3). Decoding the Puzzle Cicada3301 Ransomware Threat Analysis. Retrieved September 5, 2024.

Internal MISP references

UUID 90549699-8815-45e8-820c-4f5a7fc584b8 which can be used as unique global reference for Morphisec September 3 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-05T00:00:00Z
date_published 2024-09-03T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Decoding the Puzzle Cicada3301 Ransomware Threat Analysis

MalwareBytes Template Injection OCT 2017

Segura, J. (2017, October 13). Decoy Microsoft Word document delivers malware through a RAT. Retrieved July 21, 2018.

Internal MISP references

UUID 7ef0ab1f-c7d6-46fe-b489-fab4db623e0a which can be used as unique global reference for MalwareBytes Template Injection OCT 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-21T00:00:00Z
date_published 2017-10-13T00:00:00Z
source MITRE
title Decoy Microsoft Word document delivers malware through a RAT

Crowdstrike PartyTicket March 2022

Crowdstrike. (2022, March 1). Decryptable PartyTicket Ransomware Reportedly Targeting Ukrainian Entities. Retrieved March 1, 2022.

Internal MISP references

UUID 8659fea7-7d65-4ee9-8ceb-cf41204b57e0 which can be used as unique global reference for Crowdstrike PartyTicket March 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-01T00:00:00Z
date_published 2022-03-01T00:00:00Z
source MITRE
title Decryptable PartyTicket Ransomware Reportedly Targeting Ukrainian Entities

Fortinet Emotet May 2017

Xiaopeng Zhang. (2017, May 3). Deep Analysis of New Emotet Variant – Part 1. Retrieved April 1, 2019.

Internal MISP references

UUID 2b8b6ab4-906f-4732-94f8-eaac5ec0151d which can be used as unique global reference for Fortinet Emotet May 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-01T00:00:00Z
date_published 2017-05-03T00:00:00Z
source MITRE
title Deep Analysis of New Emotet Variant – Part 1

Aqua TeamTNT August 2020

Kol, Roi. Morag, A. (2020, August 25). Deep Analysis of TeamTNT Techniques Using Container Images to Attack. Retrieved September 22, 2021.

Internal MISP references

UUID ca10ad0d-1a47-4006-8f76-c2246aee7752 which can be used as unique global reference for Aqua TeamTNT August 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-22T00:00:00Z
date_published 2020-08-25T00:00:00Z
source MITRE
title Deep Analysis of TeamTNT Techniques Using Container Images to Attack

Bitdefender FIN8 July 2021

Martin Zugec. (2021, July 27). Deep Dive Into a FIN8 Attack - A Forensic Investigation. Retrieved September 1, 2021.

Internal MISP references

UUID aee3179e-1536-40ab-9965-1c10bdaa6dff which can be used as unique global reference for Bitdefender FIN8 July 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-01T00:00:00Z
date_published 2021-07-27T00:00:00Z
source MITRE
title Deep Dive Into a FIN8 Attack - A Forensic Investigation

Cyble Ragnar Locker January 20 2022

Cybleinc. (2022, January 20). Deep dive into Ragnar_locker Ransomware Gang. Retrieved September 29, 2023.

Internal MISP references

UUID 390b3063-8d7b-4dee-b5f7-bfd0804f2e30 which can be used as unique global reference for Cyble Ragnar Locker January 20 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-29T00:00:00Z
date_published 2022-01-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Deep dive into Ragnar_locker Ransomware Gang

Sophos Pikabot June 12 2023

Karl Ackerman. (2023, June 12). Deep dive into the Pikabot cyber threat. Retrieved January 11, 2024.

Internal MISP references

UUID f10c37d8-2efe-4d9e-8987-8978beef7e9d which can be used as unique global reference for Sophos Pikabot June 12 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-11T00:00:00Z
date_published 2023-06-12T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Deep dive into the Pikabot cyber threat

Microsoft Deep Dive Solorigate January 2021

MSTIC, CDOC, 365 Defender Research Team. (2021, January 20). Deep dive into the Solorigate second-stage activation: From SUNBURST to TEARDROP and Raindrop . Retrieved January 22, 2021.

Internal MISP references

UUID ddd70eef-ab94-45a9-af43-c396c9e3fbc6 which can be used as unique global reference for Microsoft Deep Dive Solorigate January 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-22T00:00:00Z
date_published 2021-01-20T00:00:00Z
source MITRE
title Deep dive into the Solorigate second-stage activation: From SUNBURST to TEARDROP and Raindrop

AADInternals - Device Registration

Dr. Nestori Syynimaa. (2021, March 3). Deep-dive to Azure AD device join. Retrieved March 9, 2022.

Internal MISP references

UUID 978b408d-f9e9-422c-b2d7-741f6cc298d4 which can be used as unique global reference for AADInternals - Device Registration in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-09T00:00:00Z
date_published 2021-03-03T00:00:00Z
source MITRE
title Deep-dive to Azure AD device join

Alperovitch 2014

Alperovitch, D. (2014, July 7). Deep in Thought: Chinese Targeting of National Security Think Tanks. Retrieved November 12, 2014.

Internal MISP references

UUID 72e19be9-35dd-4199-bc07-bd9d0c664df6 which can be used as unique global reference for Alperovitch 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-12T00:00:00Z
date_published 2014-07-07T00:00:00Z
source MITRE, Tidal Cyber
title Deep in Thought: Chinese Targeting of National Security Think Tanks

DefaultPack.EXE - LOLBAS Project

LOLBAS. (2020, October 1). DefaultPack.EXE. Retrieved December 4, 2023.

Internal MISP references

UUID 106efc3e-5816-44ae-a384-5e026e68ab89 which can be used as unique global reference for DefaultPack.EXE - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2020-10-01T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title DefaultPack.EXE

Lastline DarkHotel Just In Time Decryption Nov 2015

Arunpreet Singh, Clemens Kolbitsch. (2015, November 5). Defeating Darkhotel Just-In-Time Decryption. Retrieved April 15, 2021.

Internal MISP references

UUID e43341ae-178f-43ba-9d66-f4d0380d2c59 which can be used as unique global reference for Lastline DarkHotel Just In Time Decryption Nov 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-15T00:00:00Z
date_published 2015-11-05T00:00:00Z
source MITRE
title Defeating Darkhotel Just-In-Time Decryption

piazza launch agent mitigation

Antonio Piazza (4n7m4n). (2021, November 23). Defeating Malicious Launch Persistence. Retrieved April 19, 2022.

Internal MISP references

UUID 8a3591f2-34b0-4914-bb42-d4621966faed which can be used as unique global reference for piazza launch agent mitigation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-19T00:00:00Z
date_published 2021-11-23T00:00:00Z
source MITRE
title Defeating Malicious Launch Persistence

Inversecos Timestomping 2022

Lina Lau. (2022, April 28). Defence Evasion Technique: Timestomping Detection – NTFS Forensics. Retrieved September 30, 2024.

Internal MISP references

UUID 48bc7943-0384-5b6e-a0c5-854b6a08203f which can be used as unique global reference for Inversecos Timestomping 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-30T00:00:00Z
date_published 2022-04-28T00:00:00Z
source MITRE
title Defence Evasion Technique: Timestomping Detection – NTFS Forensics

VectorSec ForFiles Aug 2017

vector_sec. (2017, August 11). Defenders watching launches of cmd? What about forfiles?. Retrieved September 12, 2024.

Internal MISP references

UUID 8088d15d-9512-4d12-a99a-c76ad9dc3390 which can be used as unique global reference for VectorSec ForFiles Aug 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2017-08-11T00:00:00Z
source MITRE
title Defenders watching launches of cmd? What about forfiles?

Black Hat 2015 App Shim

Pierce, Sean. (2015, November). Defending Against Malicious Application Compatibility Shims. Retrieved June 22, 2017.

Internal MISP references

UUID 19e3cddb-b077-40cf-92e0-131b12efa4f7 which can be used as unique global reference for Black Hat 2015 App Shim in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-06-22T00:00:00Z
date_published 2015-11-01T00:00:00Z
source MITRE
title Defending Against Malicious Application Compatibility Shims

TechNet O365 Outlook Rules

Koeller, B.. (2018, February 21). Defending Against Rules and Forms Injection. Retrieved November 5, 2019.

Internal MISP references

UUID c7f9bd2f-254a-4254-8a92-a3ab02455fcb which can be used as unique global reference for TechNet O365 Outlook Rules in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-11-05T00:00:00Z
date_published 2018-02-21T00:00:00Z
source MITRE
title Defending Against Rules and Forms Injection

Defending Against Scheduled Task Attacks in Windows Environments

Harshal Tupsamudre. (2022, June 20). Defending Against Scheduled Tasks. Retrieved July 5, 2022.

Internal MISP references

UUID 111d21df-5531-4927-a173-fac9cd7672b3 which can be used as unique global reference for Defending Against Scheduled Task Attacks in Windows Environments in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-05T00:00:00Z
date_published 2022-06-20T00:00:00Z
source MITRE
title Defending Against Scheduled Tasks

Rapid7 HAFNIUM Mar 2021

Eoin Miller. (2021, March 23). Defending Against the Zero Day: Analyzing Attacker Behavior Post-Exploitation of Microsoft Exchange. Retrieved October 27, 2022.

Internal MISP references

UUID cf05d229-c2ba-54f2-a79d-4b7c9185c663 which can be used as unique global reference for Rapid7 HAFNIUM Mar 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-10-27T00:00:00Z
date_published 2021-03-23T00:00:00Z
source MITRE
title Defending Against the Zero Day: Analyzing Attacker Behavior Post-Exploitation of Microsoft Exchange

Microsoft SQL Server

Microsoft Threat Intelligence. (2023, October 3). Defending new vectors: Threat actors attempt SQL Server to cloud lateral movement. Retrieved October 3, 2023.

Internal MISP references

UUID a904fde8-b8f9-5411-ab46-0dacf39cc81f which can be used as unique global reference for Microsoft SQL Server in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-03T00:00:00Z
date_published 2023-10-03T00:00:00Z
source MITRE
title Defending new vectors: Threat actors attempt SQL Server to cloud lateral movement

rundll32.exe defense evasion

Ariel silver. (2022, February 1). Defense Evasion Techniques. Retrieved April 8, 2022.

Internal MISP references

UUID 0f31f0ff-9ddb-4ea9-88d0-7b3b688764af which can be used as unique global reference for rundll32.exe defense evasion in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-08T00:00:00Z
date_published 2022-02-01T00:00:00Z
source MITRE
title Defense Evasion Techniques

def_ev_win_event_logging

Chandel, R. (2021, April 22). Defense Evasion: Windows Event Logging (T1562.002). Retrieved September 14, 2021.

Internal MISP references

UUID 166e3a8a-047a-4798-b6cb-5aa36903a764 which can be used as unique global reference for def_ev_win_event_logging in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-14T00:00:00Z
date_published 2021-04-22T00:00:00Z
source MITRE
title Defense Evasion: Windows Event Logging (T1562.002)

Kaspersky DeftTorero October 3 2022

Global Research & Analysis Team. (2022, October 3). DeftTorero: tactics, techniques and procedures of intrusions revealed. Retrieved October 25, 2023.

Internal MISP references

UUID f6b43988-4d8b-455f-865e-3150e43d4f11 which can be used as unique global reference for Kaspersky DeftTorero October 3 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-25T00:00:00Z
date_published 2022-10-03T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title DeftTorero: tactics, techniques and procedures of intrusions revealed

TechNet Del

Microsoft. (n.d.). Del. Retrieved April 22, 2016.

Internal MISP references

UUID 01fc44b9-0eb3-4fd2-b755-d611825374ae which can be used as unique global reference for TechNet Del in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-22T00:00:00Z
source MITRE
title Del

Hunters Domain Wide Delegation Google Workspace 2023

Yonatan Khanashvilli. (2023, November 28). DeleFriend: Severe design flaw in Domain Wide Delegation could leave Google Workspace vulnerable for takeover. Retrieved January 16, 2024.

Internal MISP references

UUID 290cebe1-a2fd-5ccd-8ef6-afa9d4c3c9df which can be used as unique global reference for Hunters Domain Wide Delegation Google Workspace 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-16T00:00:00Z
date_published 2023-11-28T00:00:00Z
source MITRE
title DeleFriend: Severe design flaw in Domain Wide Delegation could leave Google Workspace vulnerable for takeover

Azure Shared Access Signature

Delegate access with a shared access signature. (2019, December 18). Delegate access with a shared access signature. Retrieved March 2, 2022.

Internal MISP references

UUID f6ffe1ef-13f3-4225-b714-cfb89aaaf3fa which can be used as unique global reference for Azure Shared Access Signature in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-02T00:00:00Z
date_published 2019-12-18T00:00:00Z
source MITRE
title Delegate access with a shared access signature

Register Deloitte

Thomson, I. (2017, September 26). Deloitte is a sitting duck: Key systems with RDP open, VPN and proxy 'login details leaked'. Retrieved October 19, 2020.

Internal MISP references

UUID e6b10687-8666-4c9c-ac77-1988378e096d which can be used as unique global reference for Register Deloitte in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
date_published 2017-09-26T00:00:00Z
source MITRE
title Deloitte is a sitting duck: Key systems with RDP open, VPN and proxy 'login details leaked'

Talos Micropsia June 2017

Rascagneres, P., Mercer, W. (2017, June 19). Delphi Used To Score Against Palestine. Retrieved November 13, 2018.

Internal MISP references

UUID c727152c-079a-4ff9-a0e5-face919cf59b which can be used as unique global reference for Talos Micropsia June 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-13T00:00:00Z
date_published 2017-06-19T00:00:00Z
source MITRE
title Delphi Used To Score Against Palestine

TrendMicro EarthLusca 2022

Chen, J., et al. (2022). Delving Deep: An Analysis of Earth Lusca’s Operations. Retrieved July 1, 2022.

Internal MISP references

UUID f6e1bffd-e35b-4eae-b9bf-c16a82bf7004 which can be used as unique global reference for TrendMicro EarthLusca 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-01T00:00:00Z
date_published 2022-01-01T00:00:00Z
source MITRE
title Delving Deep: An Analysis of Earth Lusca’s Operations

Warren, R. (2017, August 2). Demiguise: virginkey.js. Retrieved January 17, 2019.

Internal MISP references

UUID 2e55d33a-fe75-4397-b6f0-a28d397b4c24 which can be used as unique global reference for Demiguise Guardrail Router Logo in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-01-17T00:00:00Z
date_published 2017-08-02T00:00:00Z
source MITRE
title Demiguise: virginkey.js

FireEye Hacking Team

FireEye Threat Intelligence. (2015, July 13). Demonstrating Hustle, Chinese APT Groups Quickly Use Zero-Day Vulnerability (CVE-2015-5119) Following Hacking Team Leak. Retrieved January 25, 2016.

Internal MISP references

UUID c1e798b8-6771-4ba7-af25-69c640321e40 which can be used as unique global reference for FireEye Hacking Team in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-25T00:00:00Z
date_published 2015-07-13T00:00:00Z
source MITRE
title Demonstrating Hustle, Chinese APT Groups Quickly Use Zero-Day Vulnerability (CVE-2015-5119) Following Hacking Team Leak

Demystifying Azure AD Service Principals

Bellavance, Ned. (2019, July 16). Demystifying Azure AD Service Principals. Retrieved January 19, 2020.

Internal MISP references

UUID 3e285884-2191-4773-9243-74100ce177c8 which can be used as unique global reference for Demystifying Azure AD Service Principals in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-01-19T00:00:00Z
date_published 2019-07-16T00:00:00Z
source MITRE
title Demystifying Azure AD Service Principals

demystifying_ryuk

Tran, T. (2020, November 24). Demystifying Ransomware Attacks Against Microsoft Defender Solution. Retrieved January 26, 2022.

Internal MISP references

UUID 3dc684c7-14de-4dc0-9f11-79160c4f5038 which can be used as unique global reference for demystifying_ryuk in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-26T00:00:00Z
date_published 2020-11-24T00:00:00Z
source MITRE
title Demystifying Ransomware Attacks Against Microsoft Defender Solution

DOJ Iran Indictments September 2020

DOJ. (2020, September 17). Department of Justice and Partner Departments and Agencies Conduct Coordinated Actions to Disrupt and Deter Iranian Malicious Cyber Activities Targeting the United States and the Broader International Community. Retrieved December 10, 2020.

Internal MISP references

UUID f30a77dd-d1d0-41b8-b82a-461dd6cd126f which can be used as unique global reference for DOJ Iran Indictments September 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-10T00:00:00Z
date_published 2020-09-17T00:00:00Z
source MITRE
title Department of Justice and Partner Departments and Agencies Conduct Coordinated Actions to Disrupt and Deter Iranian Malicious Cyber Activities Targeting the United States and the Broader International Community

Microsoft GitHub Device Guard CI Policies

Microsoft. (2017, June 16). Deploy code integrity policies: steps. Retrieved June 28, 2017.

Internal MISP references

UUID 9646af1a-19fe-44c9-96ca-3c8ec097c3db which can be used as unique global reference for Microsoft GitHub Device Guard CI Policies in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-06-28T00:00:00Z
date_published 2017-06-16T00:00:00Z
source MITRE
title Deploy code integrity policies: steps

Microsoft Deploying AD Federation

Microsoft. (n.d.). Deploying Active Directory Federation Services in Azure. Retrieved March 13, 2020.

Internal MISP references

UUID beeb460e-4dba-42fb-8109-0861cd0df562 which can be used as unique global reference for Microsoft Deploying AD Federation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-13T00:00:00Z
source MITRE
title Deploying Active Directory Federation Services in Azure

Apple Kernel Extension Deprecation

Apple. (n.d.). Deprecated Kernel Extensions and System Extension Alternatives. Retrieved November 4, 2020.

Internal MISP references

UUID 86053c5a-f2dd-4eb3-9dc2-6a6a4e1c2ae5 which can be used as unique global reference for Apple Kernel Extension Deprecation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-04T00:00:00Z
source MITRE
title Deprecated Kernel Extensions and System Extension Alternatives

Black Lotus Raptor Train September 18 2024

Black Lotus Labs. (2024, September 18). Derailing the Raptor Train. Retrieved September 19, 2024.

Internal MISP references

UUID 21e26577-887b-4b8c-a3f8-4ab8868bed69 which can be used as unique global reference for Black Lotus Raptor Train September 18 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-19T00:00:00Z
date_published 2024-09-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Derailing the Raptor Train

Amazon Describe Instance

Amazon. (n.d.). describe-instance-information. Retrieved March 3, 2020.

Internal MISP references

UUID c0b6a8a4-0d94-414d-b5ab-cf5485240dee which can be used as unique global reference for Amazon Describe Instance in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-03T00:00:00Z
source MITRE
title describe-instance-information

Amazon Describe Instances API

Amazon. (n.d.). DescribeInstances. Retrieved May 26, 2020.

Internal MISP references

UUID 95629746-43d2-4f41-87da-4bd44a43ef4a which can be used as unique global reference for Amazon Describe Instances API in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-26T00:00:00Z
source MITRE
title DescribeInstances

DescribeSecurityGroups - Amazon Elastic Compute Cloud

Amazon Web Services, Inc. . (2022). DescribeSecurityGroups. Retrieved January 28, 2022.

Internal MISP references

UUID aa953df5-40b5-42d2-9e33-a227a093497f which can be used as unique global reference for DescribeSecurityGroups - Amazon Elastic Compute Cloud in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-28T00:00:00Z
date_published 2022-01-01T00:00:00Z
source MITRE
title DescribeSecurityGroups

Microsoft RunOnceEx APR 2018

Microsoft. (2018, August 20). Description of the RunOnceEx Registry Key. Retrieved June 29, 2018.

Internal MISP references

UUID f80bb86f-ce75-4778-bdee-777cf37a6de7 which can be used as unique global reference for Microsoft RunOnceEx APR 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-06-29T00:00:00Z
date_published 2018-08-20T00:00:00Z
source MITRE
title Description of the RunOnceEx Registry Key

Designing Daemons Apple Dev

Apple. (n.d.). Retrieved October 12, 2021.

Internal MISP references

UUID 4baac228-1f6a-4c65-ae98-5a542600dfc6 which can be used as unique global reference for Designing Daemons Apple Dev in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-12T00:00:00Z
source MITRE
title Designing Daemons Apple Dev

Desk.cpl - LOLBAS Project

LOLBAS. (2022, April 21). Desk.cpl. Retrieved December 4, 2023.

Internal MISP references

UUID 487a54d9-9f90-478e-b305-bd041af55e12 which can be used as unique global reference for Desk.cpl - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2022-04-21T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Desk.cpl

Free Desktop Application Autostart Feb 2006

Free Desktop. (2006, February 13). Desktop Application Autostart Specification. Retrieved September 12, 2019.

Internal MISP references

UUID 0885434e-3908-4425-9597-ce6abe531ca5 which can be used as unique global reference for Free Desktop Application Autostart Feb 2006 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-12T00:00:00Z
date_published 2006-02-13T00:00:00Z
source MITRE
title Desktop Application Autostart Specification

Desktopimgdownldr.exe - LOLBAS Project

LOLBAS. (2020, June 28). Desktopimgdownldr.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 1df3aacf-76c4-472a-92c8-2a85ae9e2860 which can be used as unique global reference for Desktopimgdownldr.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2020-06-28T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Desktopimgdownldr.exe

CISA AA22-057A Destructive Malware February 2022

CISA. (2022, February 26). Destructive Malware Targeting Organizations in Ukraine. Retrieved March 25, 2022.

Internal MISP references

UUID 18684085-c156-4610-8b1f-cc9646f2c06e which can be used as unique global reference for CISA AA22-057A Destructive Malware February 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-25T00:00:00Z
date_published 2022-02-26T00:00:00Z
source MITRE
title Destructive Malware Targeting Organizations in Ukraine

Microsoft WhisperGate January 2022

MSTIC. (2022, January 15). Destructive malware targeting Ukrainian organizations. Retrieved March 10, 2022.

Internal MISP references

UUID e0c1fcd3-b7a8-42af-8984-873a6f969975 which can be used as unique global reference for Microsoft WhisperGate January 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-10T00:00:00Z
date_published 2022-01-15T00:00:00Z
source MITRE
title Destructive malware targeting Ukrainian organizations

S2W DarkGate January 16 2024

S2W. (2024, January 16). Detailed Analysis of DarkGate. Retrieved July 12, 2024.

Internal MISP references

UUID 62d6a280-06df-4b96-85c8-13174e496256 which can be used as unique global reference for S2W DarkGate January 16 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-12T00:00:00Z
date_published 2024-01-16T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Detailed Analysis of DarkGate

URI Unique

Australian Cyber Security Centre. National Security Agency. (2020, April 21). Detect and Prevent Web Shell Malware. Retrieved February 9, 2024.

Internal MISP references

UUID b91963c4-07ea-5e36-9cc8-8a2149ee7473 which can be used as unique global reference for URI Unique in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-09T00:00:00Z
date_published 2020-04-21T00:00:00Z
source MITRE
title Detect and Prevent Web Shell Malware

NSA and ASD Detect and Prevent Web Shells 2020

NSA and ASD. (2020, April 3). Detect and Prevent Web Shell Malware. Retrieved July 23, 2021.

Internal MISP references

UUID e9a882a5-1a88-4fdf-9349-205f4fa167c9 which can be used as unique global reference for NSA and ASD Detect and Prevent Web Shells 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-07-23T00:00:00Z
date_published 2020-04-03T00:00:00Z
source MITRE
title Detect and Prevent Web Shell Malware

Microsoft Detect Outlook Forms

Fox, C., Vangel, D. (2018, April 22). Detect and Remediate Outlook Rules and Custom Forms Injections Attacks in Office 365. Retrieved February 4, 2019.

Internal MISP references

UUID fd63775c-8482-477d-ab41-8c64ca17b602 which can be used as unique global reference for Microsoft Detect Outlook Forms in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-04T00:00:00Z
date_published 2018-04-22T00:00:00Z
source MITRE
title Detect and Remediate Outlook Rules and Custom Forms Injections Attacks in Office 365

ADDSecurity DCShadow Feb 2018

Lucand,G. (2018, February 18). Detect DCShadow, impossible?. Retrieved March 30, 2018.

Internal MISP references

UUID c1cd4767-b5a1-4821-8574-b5782a83920f which can be used as unique global reference for ADDSecurity DCShadow Feb 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-30T00:00:00Z
date_published 2018-02-18T00:00:00Z
source MITRE
title Detect DCShadow, impossible?

Lacework LLMJacking 2024

Lacework Labs. (2024, June 6). Detecting AI resource-hijacking with Composite Alerts. Retrieved September 25, 2024.

Internal MISP references

UUID 4742569e-80ed-5d70-948b-9457d9371ca8 which can be used as unique global reference for Lacework LLMJacking 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-25T00:00:00Z
date_published 2024-06-06T00:00:00Z
source MITRE
title Detecting AI resource-hijacking with Composite Alerts

Pace University Detecting DGA May 2017

Chen, L., Wang, T.. (2017, May 5). Detecting Algorithmically Generated Domains Using Data Visualization and N-Grams Methods . Retrieved April 26, 2019.

Internal MISP references

UUID 7a4e7e05-986b-4549-a021-8c3c729bd3cc which can be used as unique global reference for Pace University Detecting DGA May 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-26T00:00:00Z
date_published 2017-05-05T00:00:00Z
source MITRE
title Detecting Algorithmically Generated Domains Using Data Visualization and N-Grams Methods

MDSec Detecting DOTNET

MDSec Research. (n.d.). Detecting and Advancing In-Memory .NET Tradecraft. Retrieved October 4, 2021.

Internal MISP references

UUID a7952f0e-6690-48de-ad93-9922d6d6989c which can be used as unique global reference for MDSec Detecting DOTNET in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-04T00:00:00Z
source MITRE
title Detecting and Advancing In-Memory .NET Tradecraft

Cisco DoSdetectNetflow

Cisco. (n.d.). Detecting and Analyzing Network Threats With NetFlow. Retrieved April 25, 2019.

Internal MISP references

UUID ce447063-ec9a-4729-aaec-64ec123077ce which can be used as unique global reference for Cisco DoSdetectNetflow in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-25T00:00:00Z
source MITRE
title Detecting and Analyzing Network Threats With NetFlow

RSA2017 Detect and Respond Adair

Adair, S. (2017, February 17). Detecting and Responding to Advanced Threats within Exchange Environments. Retrieved March 20, 2017.

Internal MISP references

UUID 005a276c-3369-4d29-bf0e-c7fa4e7d90bb which can be used as unique global reference for RSA2017 Detect and Respond Adair in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-20T00:00:00Z
date_published 2017-02-17T00:00:00Z
source MITRE
title Detecting and Responding to Advanced Threats within Exchange Environments

Nmap Firewalls NIDS

Nmap. (n.d.). Chapter 10. Detecting and Subverting Firewalls and Intrusion Detection Systems. Retrieved October 20, 2020.

Internal MISP references

UUID c696ac8c-2c7a-4708-a369-0832a493e0a6 which can be used as unique global reference for Nmap Firewalls NIDS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
source MITRE
title Detecting and Subverting Firewalls and Intrusion Detection Systems

Medium Detecting Attempts to Steal Passwords from Memory

French, D. (2018, October 2). Detecting Attempts to Steal Passwords from Memory. Retrieved October 11, 2019.

Internal MISP references

UUID 63955204-3cf9-4628-88d2-361de4dae94f which can be used as unique global reference for Medium Detecting Attempts to Steal Passwords from Memory in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-11T00:00:00Z
date_published 2018-10-02T00:00:00Z
source MITRE
title Detecting Attempts to Steal Passwords from Memory

Merces BPFDOOR 2023

Fernando Merces. (2023, July 13). Detecting BPFDoor Backdoor Variants Abusing BPF Filters. Retrieved September 23, 2024.

Internal MISP references

UUID bf4f5736-0506-5ecf-a73e-86ab18c2b71b which can be used as unique global reference for Merces BPFDOOR 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-23T00:00:00Z
date_published 2023-07-13T00:00:00Z
source MITRE
title Detecting BPFDoor Backdoor Variants Abusing BPF Filters

Endurant CMSTP July 2018

Seetharaman, N. (2018, July 7). Detecting CMSTP-Enabled Code Execution and UAC Bypass With Sysmon.. Retrieved August 6, 2018.

Internal MISP references

UUID d67901a4-8774-42d3-98de-c20158f88eb6 which can be used as unique global reference for Endurant CMSTP July 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-06T00:00:00Z
date_published 2018-07-07T00:00:00Z
source MITRE
title Detecting CMSTP-Enabled Code Execution and UAC Bypass With Sysmon.

Red Canary COR_PROFILER May 2020

Brown, J. (2020, May 7). Detecting COR_PROFILER manipulation for persistence. Retrieved June 24, 2020.

Internal MISP references

UUID 3d8cb4d3-1cbe-416a-95b5-15003cbc2beb which can be used as unique global reference for Red Canary COR_PROFILER May 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-24T00:00:00Z
date_published 2020-05-07T00:00:00Z
source MITRE
title Detecting COR_PROFILER manipulation for persistence

NVisio Labs DDE Detection Oct 2017

NVISO Labs. (2017, October 11). Detecting DDE in MS Office documents. Retrieved November 21, 2017.

Internal MISP references

UUID 75ccde9a-2d51-4492-9a8a-02fce30f9167 which can be used as unique global reference for NVisio Labs DDE Detection Oct 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-21T00:00:00Z
date_published 2017-10-11T00:00:00Z
source MITRE
title Detecting DDE in MS Office documents

Zhang 2013

Zhang, H., Papadopoulos, C., & Massey, D. (2013, April). Detecting encrypted botnet traffic. Retrieved August 19, 2015.

Internal MISP references

UUID 29edb7ad-3b3a-4fdb-9c4e-bb99fc2a1c67 which can be used as unique global reference for Zhang 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-08-19T00:00:00Z
date_published 2013-04-01T00:00:00Z
source MITRE
title Detecting encrypted botnet traffic

ADSecurity Detecting Forged Tickets

Metcalf, S. (2015, May 03). Detecting Forged Kerberos Ticket (Golden Ticket & Silver Ticket) Use in Active Directory. Retrieved December 23, 2015.

Internal MISP references

UUID 4c328a1a-6a83-4399-86c5-d6e1586da8a3 which can be used as unique global reference for ADSecurity Detecting Forged Tickets in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-12-23T00:00:00Z
date_published 2015-05-03T00:00:00Z
source MITRE
title Detecting Forged Kerberos Ticket (Golden Ticket & Silver Ticket) Use in Active Directory

Microsoft Detecting Kerberoasting Feb 2018

Bani, M. (2018, February 23). Detecting Kerberoasting activity using Azure Security Center. Retrieved March 23, 2018.

Internal MISP references

UUID b36d82a8-82ca-4f22-85c0-ee82be3b6940 which can be used as unique global reference for Microsoft Detecting Kerberoasting Feb 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-23T00:00:00Z
date_published 2018-02-23T00:00:00Z
source MITRE
title Detecting Kerberoasting activity using Azure Security Center

Medium Detecting Lateral Movement

French, D. (2018, September 30). Detecting Lateral Movement Using Sysmon and Splunk. Retrieved October 11, 2019.

Internal MISP references

UUID 91bea3c2-df54-424e-8667-035e6e15fe38 which can be used as unique global reference for Medium Detecting Lateral Movement in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-11T00:00:00Z
date_published 2018-09-30T00:00:00Z
source MITRE
title Detecting Lateral Movement Using Sysmon and Splunk

macOS root VNC login without authentication

Nick Miles. (2017, November 30). Detecting macOS High Sierra root account without authentication. Retrieved September 20, 2021.

Internal MISP references

UUID 4dc6ea85-a41b-4218-a9ae-e1eea841f2f2 which can be used as unique global reference for macOS root VNC login without authentication in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-20T00:00:00Z
date_published 2017-11-30T00:00:00Z
source MITRE
title Detecting macOS High Sierra root account without authentication

Sans Virtual Jan 2016

Keragala, D. (2016, January 16). Detecting Malware and Sandbox Evasion Techniques. Retrieved April 17, 2019.

Internal MISP references

UUID 5d3d567c-dc25-44c1-8d2a-71ae00b60dbe which can be used as unique global reference for Sans Virtual Jan 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-17T00:00:00Z
date_published 2016-01-16T00:00:00Z
source MITRE
title Detecting Malware and Sandbox Evasion Techniques

Mandiant Azure AD Backdoors

Mike Burns. (2020, September 30). Detecting Microsoft 365 and Azure Active Directory Backdoors. Retrieved September 28, 2022.

Internal MISP references

UUID 7b4502ff-a45c-4ba7-b00e-ca9f6e9c2ac8 which can be used as unique global reference for Mandiant Azure AD Backdoors in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-28T00:00:00Z
date_published 2020-09-30T00:00:00Z
source MITRE
title Detecting Microsoft 365 and Azure Active Directory Backdoors

CounterCept PPID Spoofing Dec 2018

Loh, I. (2018, December 21). Detecting Parent PID Spoofing. Retrieved June 3, 2019.

Internal MISP references

UUID a1fdb8db-4c5f-4fb9-a013-b232cd8471f8 which can be used as unique global reference for CounterCept PPID Spoofing Dec 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-03T00:00:00Z
date_published 2018-12-21T00:00:00Z
source MITRE
title Detecting Parent PID Spoofing

CISA SolarWinds Cloud Detection

CISA. (2021, January 8). Detecting Post-Compromise Threat Activity in Microsoft Cloud Environments. Retrieved January 8, 2021.

Internal MISP references

UUID b8fd5fe3-dbfa-4f28-a9b5-39f1d7db9e62 which can be used as unique global reference for CISA SolarWinds Cloud Detection in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-08T00:00:00Z
date_published 2021-01-08T00:00:00Z
source MITRE
title Detecting Post-Compromise Threat Activity in Microsoft Cloud Environments

Detecting Rclone

Aaron Greetham. (2021, May 27). Detecting Rclone – An Effective Tool for Exfiltration. Retrieved August 30, 2022.

Internal MISP references

UUID 2e44290c-32f5-4e7f-96de-9874df79fe89 which can be used as unique global reference for Detecting Rclone in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-30T00:00:00Z
date_published 2021-05-27T00:00:00Z
source MITRE
title Detecting Rclone – An Effective Tool for Exfiltration

Medium Detecting WMI Persistence

French, D. (2018, October 9). Detecting & Removing an Attacker’s WMI Persistence. Retrieved October 11, 2019.

Internal MISP references

UUID 539e7cd0-d1e9-46ba-96fe-d8a1061c857e which can be used as unique global reference for Medium Detecting WMI Persistence in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-11T00:00:00Z
date_published 2018-10-09T00:00:00Z
source MITRE
title Detecting & Removing an Attacker’s WMI Persistence

Okta Scatter Swine 2022

Okta. (2022, August 25). Detecting Scatter Swine: Insights into a Relentless Phishing Campaign. Retrieved February 24, 2023.

Internal MISP references

UUID 66d1b6e2-c069-5832-b549-fc5f0edeed40 which can be used as unique global reference for Okta Scatter Swine 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-24T00:00:00Z
date_published 2022-08-25T00:00:00Z
source MITRE
title Detecting Scatter Swine: Insights into a Relentless Phishing Campaign

Splunk Supernova Jan 2021

Stoner, J. (2021, January 21). Detecting Supernova Malware: SolarWinds Continued. Retrieved February 22, 2021.

Internal MISP references

UUID 7e43bda5-0978-46aa-b3b3-66ffb62b9fdb which can be used as unique global reference for Splunk Supernova Jan 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-22T00:00:00Z
date_published 2021-01-21T00:00:00Z
source MITRE
title Detecting Supernova Malware: SolarWinds Continued

Microsoft Winnti Jan 2017

Cap, P., et al. (2017, January 25). Detecting threat actors in recent German industrial attacks with Windows Defender ATP. Retrieved February 8, 2017.

Internal MISP references

UUID 6b63fac9-4bde-4fc8-a016-e77c8485fab7 which can be used as unique global reference for Microsoft Winnti Jan 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-02-08T00:00:00Z
date_published 2017-01-25T00:00:00Z
source MITRE
title Detecting threat actors in recent German industrial attacks with Windows Defender ATP

Chokepoint preload rootkits

stderr. (2014, February 14). Detecting Userland Preload Rootkits. Retrieved December 20, 2017.

Internal MISP references

UUID 16c00830-eade-40e2-9ee6-6e1af4b58e5d which can be used as unique global reference for Chokepoint preload rootkits in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-20T00:00:00Z
date_published 2014-02-14T00:00:00Z
source MITRE
title Detecting Userland Preload Rootkits

Sygnia Golden SAML

Sygnia. (2020, December). Detection and Hunting of Golden SAML Attack. Retrieved January 6, 2021.

Internal MISP references

UUID 1a6673b0-2a30-481e-a2a4-9e17e2676c5d which can be used as unique global reference for Sygnia Golden SAML in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-06T00:00:00Z
date_published 2020-12-01T00:00:00Z
source MITRE
title Detection and Hunting of Golden SAML Attack

FireEye Exchange Zero Days March 2021

Bromiley, M. et al. (2021, March 4). Detection and Response to Exploitation of Microsoft Exchange Zero-Day Vulnerabilities. Retrieved March 9, 2021.

Internal MISP references

UUID 5e5452a4-c3f5-4802-bcb4-198612cc8282 which can be used as unique global reference for FireEye Exchange Zero Days March 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-09T00:00:00Z
date_published 2021-03-04T00:00:00Z
source MITRE
title Detection and Response to Exploitation of Microsoft Exchange Zero-Day Vulnerabilities

Microsoft DEV-0139 December 6 2022

Microsoft Threat Intelligence. (2022, December 6). DEV-0139 launches targeted attacks against the cryptocurrency industry. Retrieved September 30, 2024.

Internal MISP references

UUID f9c070f1-aa83-45a3-bffb-c90f4caf5926 which can be used as unique global reference for Microsoft DEV-0139 December 6 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-30T00:00:00Z
date_published 2022-12-06T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title DEV-0139 launches targeted attacks against the cryptocurrency industry

Microsoft DEV-0537

Microsoft. (2022, March 22). DEV-0537 criminal actor targeting organizations for data exfiltration and destruction. Retrieved March 23, 2022.

Internal MISP references

UUID 2f7a59f3-620d-4e2e-8595-af96cd4e16c3 which can be used as unique global reference for Microsoft DEV-0537 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-23T00:00:00Z
date_published 2022-03-22T00:00:00Z
source MITRE
title DEV-0537 criminal actor targeting organizations for data exfiltration and destruction

MSTIC DEV-0537 Mar 2022

MSTIC, DART, M365 Defender. (2022, March 24). DEV-0537 Criminal Actor Targeting Organizations for Data Exfiltration and Destruction. Retrieved May 17, 2022.

Internal MISP references

UUID a9ce7e34-6e7d-4681-9869-8e8f2b5b0390 which can be used as unique global reference for MSTIC DEV-0537 Mar 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-17T00:00:00Z
date_published 2022-03-24T00:00:00Z
source MITRE
title DEV-0537 Criminal Actor Targeting Organizations for Data Exfiltration and Destruction

Microsoft Royal ransomware November 2022

MSTIC. (2022, November 17). DEV-0569 finds new ways to deliver Royal ransomware, various payloads. Retrieved March 30, 2023.

Internal MISP references

UUID 91efc6bf-e15c-514a-96c1-e838268d222f which can be used as unique global reference for Microsoft Royal ransomware November 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-30T00:00:00Z
date_published 2022-11-17T00:00:00Z
source MITRE
title DEV-0569 finds new ways to deliver Royal ransomware, various payloads

MSTIC DEV-0832 October 25 2022

Microsoft Threat Intelligence. (2022, October 25). DEV-0832 (Vice Society) opportunistic ransomware campaigns impacting US education sector. Retrieved September 19, 2024.

Internal MISP references

UUID 5b667611-649d-44d5-86e0-a79527608b3c which can be used as unique global reference for MSTIC DEV-0832 October 25 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-19T00:00:00Z
date_published 2022-10-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title DEV-0832 (Vice Society) opportunistic ransomware campaigns impacting US education sector

Cisco IOS Forensics Developments

Felix 'FX' Lindner. (2008, February). Developments in Cisco IOS Forensics. Retrieved October 21, 2020.

Internal MISP references

UUID 95fdf251-f40d-4f7a-bb12-8762e9c961b9 which can be used as unique global reference for Cisco IOS Forensics Developments in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-21T00:00:00Z
date_published 2008-02-01T00:00:00Z
source MITRE
title Developments in Cisco IOS Forensics

DeviceCredentialDeployment.exe - LOLBAS Project

LOLBAS. (2021, August 16). DeviceCredentialDeployment.exe. Retrieved December 4, 2023.

Internal MISP references

UUID fef281e8-8138-4420-b11b-66d1e6a19805 which can be used as unique global reference for DeviceCredentialDeployment.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-08-16T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title DeviceCredentialDeployment.exe

GitHub mattifestation DeviceGuardBypass

Graeber, M. (2016, November 13). DeviceGuardBypassMitigationRules. Retrieved November 30, 2016.

Internal MISP references

UUID 4ecd64b4-8014-447a-91d2-a431f4adbfcd which can be used as unique global reference for GitHub mattifestation DeviceGuardBypass in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-11-30T00:00:00Z
date_published 2016-11-13T00:00:00Z
source MITRE
title DeviceGuardBypassMitigationRules

Devinit.exe - LOLBAS Project

LOLBAS. (2022, January 20). Devinit.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 27343583-c17d-4c11-a7e3-14d725756556 which can be used as unique global reference for Devinit.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2022-01-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Devinit.exe

Devtoolslauncher.exe - LOLBAS Project

LOLBAS. (2019, October 4). Devtoolslauncher.exe. Retrieved December 4, 2023.

Internal MISP references

UUID cb263978-019c-40c6-b6de-61db0e7a8941 which can be used as unique global reference for Devtoolslauncher.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2019-10-04T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Devtoolslauncher.exe

devtunnel.exe - LOLBAS Project

LOLBAS. (2023, September 16). devtunnel.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 657c8b4c-1eee-4997-8461-c7592eaed9e8 which can be used as unique global reference for devtunnel.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2023-09-16T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title devtunnel.exe

Dfshim.dll - LOLBAS Project

LOLBAS. (2018, May 25). Dfshim.dll. Retrieved December 4, 2023.

Internal MISP references

UUID 30503e42-6047-46a9-8189-e6caa5f4deb0 which can be used as unique global reference for Dfshim.dll - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Dfshim.dll

LOLBAS /Dfsvc.exe

LOLBAS. (n.d.). /Dfsvc.exe. Retrieved September 9, 2024.

Internal MISP references

UUID caef4593-a7ac-57f7-9e06-b6ace2c9623d which can be used as unique global reference for LOLBAS /Dfsvc.exe in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-09T00:00:00Z
source MITRE
title /Dfsvc.exe

Dfsvc.exe - LOLBAS Project

LOLBAS. (2018, May 25). Dfsvc.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 7f3a78c0-68b2-4a9d-ae6a-6e63e8ddac3f which can be used as unique global reference for Dfsvc.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Dfsvc.exe

dhcp_serv_op_events

Microsoft. (2006, August 31). DHCP Server Operational Events. Retrieved March 7, 2022.

Internal MISP references

UUID e2b1e810-2a78-4553-8927-38ed5fba0f38 which can be used as unique global reference for dhcp_serv_op_events in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-07T00:00:00Z
date_published 2006-08-31T00:00:00Z
source MITRE
title DHCP Server Operational Events

GitHub Diamorphine

Mello, V. (2018, March 8). Diamorphine - LMK rootkit for Linux Kernels 2.6.x/3.x/4.x (x86 and x86_64). Retrieved April 9, 2018.

Internal MISP references

UUID 92993055-d2e6-46b2-92a3-ad70b62e4cc0 which can be used as unique global reference for GitHub Diamorphine in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-09T00:00:00Z
date_published 2018-03-08T00:00:00Z
source MITRE
title Diamorphine - LMK rootkit for Linux Kernels 2.6.x/3.x/4.x (x86 and x86_64)

diantz.exe_lolbas

Living Off The Land Binaries, Scripts and Libraries (LOLBAS). (n.d.). Diantz.exe. Retrieved October 25, 2021.

Internal MISP references

UUID 66652db8-5594-414f-8a6b-83d708a0c1fa which can be used as unique global reference for diantz.exe_lolbas in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-25T00:00:00Z
source MITRE
title Diantz.exe

Fortinet Diavol July 2021

Neeamni, D., Rubinfeld, A.. (2021, July 1). Diavol - A New Ransomware Used By Wizard Spider?. Retrieved November 12, 2021.

Internal MISP references

UUID 28c650f2-8ce8-4c78-ab4a-cae56c1548ed which can be used as unique global reference for Fortinet Diavol July 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-11-12T00:00:00Z
date_published 2021-07-01T00:00:00Z
source MITRE
title Diavol - A New Ransomware Used By Wizard Spider?

DFIR Diavol Ransomware December 2021

DFIR Report. (2021, December 13). Diavol Ransomware. Retrieved March 9, 2022.

Internal MISP references

UUID eb89f18d-684c-4220-b2a8-967f1f8f9162 which can be used as unique global reference for DFIR Diavol Ransomware December 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-09T00:00:00Z
date_published 2021-12-13T00:00:00Z
source MITRE
title Diavol Ransomware

Überwachung APT28 Forfiles June 2015

Guarnieri, C. (2015, June 19). Digital Attack on German Parliament: Investigative Report on the Hack of the Left Party Infrastructure in Bundestag. Retrieved January 22, 2018.

Internal MISP references

UUID 3b85fff0-88d8-4df6-af0b-66e57492732e which can be used as unique global reference for Überwachung APT28 Forfiles June 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-22T00:00:00Z
date_published 2015-06-19T00:00:00Z
source MITRE
title Digital Attack on German Parliament: Investigative Report on the Hack of the Left Party Infrastructure in Bundestag

Microsoft DSE June 2017

Microsoft. (2017, June 1). Digital Signatures for Kernel Modules on Windows. Retrieved April 22, 2021.

Internal MISP references

UUID 451bdfe3-0b30-425c-97a0-44727b70c1da which can be used as unique global reference for Microsoft DSE June 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-22T00:00:00Z
date_published 2017-06-01T00:00:00Z
source MITRE
title Digital Signatures for Kernel Modules on Windows

Microsoft East Asia Threats September 2023

Microsoft Threat Intelligence. (2023, September). Digital threats from East Asia increase in breadth and effectiveness. Retrieved February 5, 2024.

Internal MISP references

UUID 31f2c61e-cefe-5df7-9c2b-780bf03c88ec which can be used as unique global reference for Microsoft East Asia Threats September 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-05T00:00:00Z
date_published 2023-09-01T00:00:00Z
source MITRE
title Digital threats from East Asia increase in breadth and effectiveness

ESET Turla Mosquito Jan 2018

ESET, et al. (2018, January). Diplomats in Eastern Europe bitten by a Turla mosquito. Retrieved July 3, 2018.

Internal MISP references

UUID cd177c2e-ef22-47be-9926-61e25fd5f33b which can be used as unique global reference for ESET Turla Mosquito Jan 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-03T00:00:00Z
date_published 2018-01-01T00:00:00Z
source MITRE
title Diplomats in Eastern Europe bitten by a Turla mosquito

TechNet Dir

Microsoft. (n.d.). Dir. Retrieved April 18, 2016.

Internal MISP references

UUID f1eb8631-6bea-4688-a5ff-a388b1fdceb0 which can be used as unique global reference for TechNet Dir in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-18T00:00:00Z
source MITRE
title Dir

Frisk DMA August 2016

Ulf Frisk. (2016, August 5). Direct Memory Attack the Kernel. Retrieved March 30, 2018.

Internal MISP references

UUID c504485b-2daa-4159-96da-481a0b97a979 which can be used as unique global reference for Frisk DMA August 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-30T00:00:00Z
date_published 2016-08-05T00:00:00Z
source MITRE
title Direct Memory Attack the Kernel

Redops Syscalls

Feichter, D. (2023, June 30). Direct Syscalls vs Indirect Syscalls. Retrieved September 27, 2023.

Internal MISP references

UUID dd8c2edd-b5ba-5a41-b65d-c3a2951d07b8 which can be used as unique global reference for Redops Syscalls in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-27T00:00:00Z
date_published 2023-06-30T00:00:00Z
source MITRE
title Direct Syscalls vs Indirect Syscalls

GitHub Disable DDEAUTO Oct 2017

Dormann, W. (2017, October 20). Disable DDEAUTO for Outlook, Word, OneNote, and Excel versions 2010, 2013, 2016. Retrieved February 3, 2018.

Internal MISP references

UUID eea0dd34-4efa-4093-bd11-a59d1601868f which can be used as unique global reference for GitHub Disable DDEAUTO Oct 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-03T00:00:00Z
date_published 2017-10-20T00:00:00Z
source MITRE
title Disable DDEAUTO for Outlook, Word, OneNote, and Excel versions 2010, 2013, 2016

Disable automount for ISO

wordmann. (2022, February 8). Disable Disc Imgage. Retrieved February 8, 2022.

Internal MISP references

UUID 2155591e-eacf-4575-b7a6-f031675ef1b3 which can be used as unique global reference for Disable automount for ISO in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-08T00:00:00Z
date_published 2022-02-08T00:00:00Z
source MITRE
title Disable Disc Imgage

Disable_Win_Event_Logging

dmcxblue. (n.d.). Disable Windows Event Logging. Retrieved September 10, 2021.

Internal MISP references

UUID 0fa5e507-33dc-40ea-b960-bcd9aa024ab1 which can be used as unique global reference for Disable_Win_Event_Logging in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-10T00:00:00Z
source MITRE
title Disable Windows Event Logging

GitHub MOTW

wdormann. (2019, August 29). Disable Windows Explorer file associations for Disc Image Mount. Retrieved April 16, 2022.

Internal MISP references

UUID 044aa74a-9320-496a-9d15-37d8b934c244 which can be used as unique global reference for GitHub MOTW in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-16T00:00:00Z
date_published 2019-08-29T00:00:00Z
source MITRE
title Disable Windows Explorer file associations for Disc Image Mount

Apple Disable SIP

Apple. (n.d.). Disabling and Enabling System Integrity Protection. Retrieved April 22, 2021.

Internal MISP references

UUID d7545e0c-f0b7-4be4-800b-06a02240385e which can be used as unique global reference for Apple Disable SIP in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-22T00:00:00Z
source MITRE
title Disabling and Enabling System Integrity Protection

Microsoft GPO Bluetooth FEB 2009

Microsoft. (2009, February 9). Disabling Bluetooth and Infrared Beaming. Retrieved July 26, 2018.

Internal MISP references

UUID 27573597-5269-4894-87fb-24afcdb8f30a which can be used as unique global reference for Microsoft GPO Bluetooth FEB 2009 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-26T00:00:00Z
date_published 2009-02-09T00:00:00Z
source MITRE
title Disabling Bluetooth and Infrared Beaming

ITSyndicate Disabling PHP functions

Kondratiev, A. (n.d.). Disabling dangerous PHP functions. Retrieved July 26, 2021.

Internal MISP references

UUID 6e91f485-5777-4a06-94a3-cdc4718a8e39 which can be used as unique global reference for ITSyndicate Disabling PHP functions in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-07-26T00:00:00Z
source MITRE
title Disabling dangerous PHP functions

disable_notif_synology_ransom

TheDFIRReport. (2022, March 1). Disabling notifications on Synology servers before ransom. Retrieved September 12, 2024.

Internal MISP references

UUID d53e8f89-df78-565b-a316-cf2644c5ed36 which can be used as unique global reference for disable_notif_synology_ransom in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2022-03-01T00:00:00Z
source MITRE
title Disabling notifications on Synology servers before ransom

Krebs Discord Bookmarks 2023

Brian Krebs. (2023, May 30). Discord Admins Hacked by Malicious Bookmarks. Retrieved January 2, 2024.

Internal MISP references

UUID 1d0a21f4-9a8e-5514-894a-3d55263ff973 which can be used as unique global reference for Krebs Discord Bookmarks 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-02T00:00:00Z
date_published 2023-05-30T00:00:00Z
source MITRE
title Discord Admins Hacked by Malicious Bookmarks

Diskshadow

Microsoft Windows Server. (2023, February 3). Diskshadow. Retrieved November 21, 2023.

Internal MISP references

UUID 9e8b57a5-7e31-5add-ac3e-8b9c0f7f27aa which can be used as unique global reference for Diskshadow in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-11-21T00:00:00Z
date_published 2023-02-03T00:00:00Z
source MITRE
title Diskshadow

Diskshadow.exe - LOLBAS Project

LOLBAS. (2018, May 25). Diskshadow.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 27a3f0b4-e699-4319-8b52-8eae4581faa2 which can be used as unique global reference for Diskshadow.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Diskshadow.exe

OpenAI-CTI

OpenAI. (2024, February 14). Disrupting malicious uses of AI by state-affiliated threat actors. Retrieved September 12, 2024.

Internal MISP references

UUID d8f576cb-0afc-54a7-a449-570c4311ef7a which can be used as unique global reference for OpenAI-CTI in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2024-02-14T00:00:00Z
source MITRE
title Disrupting malicious uses of AI by state-affiliated threat actors

Microsoft Star Blizzard August 2022

Microsoft Threat Intelligence. (2022, August 15). Disrupting SEABORGIUM’s ongoing phishing operations. Retrieved June 13, 2024.

Internal MISP references

UUID d5fc25ad-2337-55f5-9eac-050178a533d6 which can be used as unique global reference for Microsoft Star Blizzard August 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-13T00:00:00Z
date_published 2022-08-15T00:00:00Z
source MITRE
title Disrupting SEABORGIUM’s ongoing phishing operations

Bitdefender FunnyDream Campaign November 2020

Vrabie, V. (2020, November). Dissecting a Chinese APT Targeting South Eastern Asian Government Institutions. Retrieved September 19, 2022.

Internal MISP references

UUID b62a9f2c-02ca-4dfa-95fc-5dc6ad9568de which can be used as unique global reference for Bitdefender FunnyDream Campaign November 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-19T00:00:00Z
date_published 2020-11-01T00:00:00Z
source MITRE
title Dissecting a Chinese APT Targeting South Eastern Asian Government Institutions

FireEye NETWIRE March 2019

Maniath, S. and Kadam P. (2019, March 19). Dissecting a NETWIRE Phishing Campaign's Usage of Process Hollowing. Retrieved January 7, 2021.

Internal MISP references

UUID 404d4f7e-62de-4483-9320-a90fb255e783 which can be used as unique global reference for FireEye NETWIRE March 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-07T00:00:00Z
date_published 2019-03-19T00:00:00Z
source MITRE
title Dissecting a NETWIRE Phishing Campaign's Usage of Process Hollowing

Cybereason Dissecting DGAs

Sternfeld, U. (2016). Dissecting Domain Generation Algorithms: Eight Real World DGA Variants. Retrieved February 18, 2019.

Internal MISP references

UUID 9888cdb6-fe85-49b4-937c-75005ac9660d which can be used as unique global reference for Cybereason Dissecting DGAs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-18T00:00:00Z
date_published 2016-01-01T00:00:00Z
source MITRE
title Dissecting Domain Generation Algorithms: Eight Real World DGA Variants

FireEye POSHSPY April 2017

Dunwoody, M.. (2017, April 3). Dissecting One of APT29’s Fileless WMI and PowerShell Backdoors (POSHSPY). Retrieved April 5, 2017.

Internal MISP references

UUID b1271e05-80d7-4761-a13f-b6f0db7d7e5a which can be used as unique global reference for FireEye POSHSPY April 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-04-05T00:00:00Z
date_published 2017-04-03T00:00:00Z
source MITRE
title Dissecting One of APT29’s Fileless WMI and PowerShell Backdoors (POSHSPY)

Bleeping Computer Stealer Logs 2023

Flare. (2023, June 6). Dissecting the Dark Web Supply Chain: Stealer Logs in Context. Retrieved October 10, 2024.

Internal MISP references

UUID 3bcbc294-91f1-56af-9eb9-9ce556c09602 which can be used as unique global reference for Bleeping Computer Stealer Logs 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-10T00:00:00Z
date_published 2023-06-06T00:00:00Z
source MITRE
title Dissecting the Dark Web Supply Chain: Stealer Logs in Context

Microsoft DTC

Microsoft. (2011, January 12). Distributed Transaction Coordinator. Retrieved February 25, 2016.

Internal MISP references

UUID d2a1aab3-a4c9-4583-9cf8-170eeb77d828 which can be used as unique global reference for Microsoft DTC in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-02-25T00:00:00Z
date_published 2011-01-12T00:00:00Z
source MITRE
title Distributed Transaction Coordinator

Mandiant UNC4841 August 29 2023

Austin Larsen, John Palmisano, John Wolfram, Mathew Potaczek, Michael Raggi. (2023, August 29). Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation. Retrieved October 24, 2024.

Internal MISP references

UUID f990745d-06c1-4b0a-8394-66c7a3cf0818 which can be used as unique global reference for Mandiant UNC4841 August 29 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-24T00:00:00Z
date_published 2023-08-29T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation

Mandiant Search Order

Mandiant. (2010, August 31). DLL Search Order Hijacking Revisited. Retrieved December 5, 2014.

Internal MISP references

UUID 2f602a6c-0305-457c-b329-a17b55d8e094 which can be used as unique global reference for Mandiant Search Order in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-12-05T00:00:00Z
date_published 2010-08-31T00:00:00Z
source MITRE
title DLL Search Order Hijacking Revisited

FireEye DLL Search Order Hijacking

Nick Harbour. (2010, September 1). DLL Search Order Hijacking Revisited. Retrieved March 13, 2020.

Internal MISP references

UUID 0ba2675d-4d7f-406a-81fa-b87e62d7a539 which can be used as unique global reference for FireEye DLL Search Order Hijacking in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-13T00:00:00Z
date_published 2010-09-01T00:00:00Z
source MITRE
title DLL Search Order Hijacking Revisited

Stewart 2014

Stewart, A. (2014). DLL SIDE-LOADING: A Thorn in the Side of the Anti-Virus Industry. Retrieved November 12, 2014.

Internal MISP references

UUID 813905b5-7aa5-4bab-b2ac-eaafdea55805 which can be used as unique global reference for Stewart 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-12T00:00:00Z
date_published 2014-01-01T00:00:00Z
source MITRE
title DLL SIDE-LOADING: A Thorn in the Side of the Anti-Virus Industry

Dnscmd.exe - LOLBAS Project

LOLBAS. (2018, May 25). Dnscmd.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 3571ca9d-3388-4e74-8b30-dd92ef2b5f10 which can be used as unique global reference for Dnscmd.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Dnscmd.exe

Dnscmd Microsoft

Microsoft. (2023, February 3). Dnscmd Microsoft. Retrieved July 11, 2023.

Internal MISP references

UUID 24b1cb7b-357f-470f-9715-fa0ec3958cbb which can be used as unique global reference for Dnscmd Microsoft in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-11T00:00:00Z
date_published 2023-02-03T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Dnscmd Microsoft

DNS Dumpster

Hacker Target. (n.d.). DNS Dumpster. Retrieved October 20, 2020.

Internal MISP references

UUID 0bbe1e50-28af-4265-a493-4bb4fd693bad which can be used as unique global reference for DNS Dumpster in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
source MITRE
title DNS Dumpster

Talos DNSpionage Nov 2018

Mercer, W., Rascagneres, P. (2018, November 27). DNSpionage Campaign Targets Middle East. Retrieved October 9, 2020.

Internal MISP references

UUID d597ad7d-f808-4289-b42a-79807248c2d6 which can be used as unique global reference for Talos DNSpionage Nov 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-09T00:00:00Z
date_published 2018-11-27T00:00:00Z
source MITRE
title DNSpionage Campaign Targets Middle East

DNS-msft

Microsoft. (2022). DNS Policies Overview. Retrieved June 6, 2024.

Internal MISP references

UUID bb420420-d03c-53b9-8bd9-e4357df8930a which can be used as unique global reference for DNS-msft in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-06T00:00:00Z
date_published 2022-01-01T00:00:00Z
source MITRE
title DNS Policies Overview

Unit42 DNS Mar 2019

Hinchliffe, A. (2019, March 15). DNS Tunneling: how DNS can be (ab)used by malicious actors. Retrieved October 3, 2020.

Internal MISP references

UUID e41fde80-5ced-4f66-9852-392d1ef79520 which can be used as unique global reference for Unit42 DNS Mar 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-03T00:00:00Z
date_published 2019-03-15T00:00:00Z
source MITRE
title DNS Tunneling: how DNS can be (ab)used by malicious actors

DNS-CISA

CISA. (2016, September 29). DNS Zone Transfer AXFR Requests May Leak Domain Information. Retrieved June 5, 2024.

Internal MISP references

UUID bc24500a-500c-5e08-90ec-6fbb39b0b74c which can be used as unique global reference for DNS-CISA in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-05T00:00:00Z
date_published 2016-09-29T00:00:00Z
source MITRE
title DNS Zone Transfer AXFR Requests May Leak Domain Information

dnx.exe - LOLBAS Project

LOLBAS. (2018, May 25). dnx.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 50652a27-c47b-41d4-a2eb-2ebf74e5bd09 which can be used as unique global reference for dnx.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title dnx.exe

GTFOBins Docker

GTFOBins. (n.d.). docker. Retrieved February 15, 2024.

Internal MISP references

UUID c4fa5825-85f9-5ab1-a59d-a86b20ef0570 which can be used as unique global reference for GTFOBins Docker in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-15T00:00:00Z
source MITRE
title docker

Docker Daemon CLI

Docker. (n.d.). DockerD CLI. Retrieved March 29, 2021.

Internal MISP references

UUID ea86eae4-6ad4-4d79-9dd3-dd965a7feb5c which can be used as unique global reference for Docker Daemon CLI in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-29T00:00:00Z
source MITRE
title DockerD CLI

Docker API

Docker. (n.d.). Docker Engine API v1.41 Reference. Retrieved March 31, 2021.

Internal MISP references

UUID b8ec1e37-7286-40e8-9577-ff9c54801086 which can be used as unique global reference for Docker API in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-31T00:00:00Z
source MITRE
title Docker Engine API v1.41 Reference

Docker Build Image

Docker. ( null). Docker Engine API v1.41 Reference - Build an Image. Retrieved March 30, 2021.

Internal MISP references

UUID ee708b64-57f3-4b47-af05-1e26b698c21f which can be used as unique global reference for Docker Build Image in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-30T00:00:00Z
source MITRE
title Docker Engine API v1.41 Reference - Build an Image

Docker Containers API

Docker. (n.d.). Docker Engine API v1.41 Reference - Container. Retrieved March 29, 2021.

Internal MISP references

UUID 2351cb32-23d6-4557-9c52-e6e228402bab which can be used as unique global reference for Docker Containers API in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-29T00:00:00Z
source MITRE
title Docker Engine API v1.41 Reference - Container

Docker Exec

Docker. (n.d.). Docker Exec. Retrieved March 29, 2021.

Internal MISP references

UUID 5f1ace27-6584-4585-98de-52cb71d419c1 which can be used as unique global reference for Docker Exec in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-29T00:00:00Z
source MITRE
title Docker Exec

Docker Images

Docker. (n.d.). Docker Images. Retrieved April 6, 2021.

Internal MISP references

UUID 9b4d1e80-61e9-4557-a562-5eda66d0bbf7 which can be used as unique global reference for Docker Images in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-06T00:00:00Z
source MITRE
title Docker Images

Docker Overview

Docker. (n.d.). Docker Overview. Retrieved March 30, 2021.

Internal MISP references

UUID 52954bb1-16b0-4717-a72c-8a6dec97610b which can be used as unique global reference for Docker Overview in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-30T00:00:00Z
source MITRE
title Docker Overview

Docker Entrypoint

Docker. (n.d.). Docker run reference. Retrieved March 29, 2021.

Internal MISP references

UUID c80ad3fd-d7fc-4a7a-8565-da3feaa4a915 which can be used as unique global reference for Docker Entrypoint in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-29T00:00:00Z
source MITRE
title Docker run reference

TechNet Server Operator Scheduled Task

Microsoft. (2012, November 15). Domain controller: Allow server operators to schedule tasks. Retrieved December 18, 2017.

Internal MISP references

UUID a9497afa-42c8-499e-a6b6-4231b1c22f6e which can be used as unique global reference for TechNet Server Operator Scheduled Task in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-18T00:00:00Z
date_published 2012-11-15T00:00:00Z
source MITRE
title Domain controller: Allow server operators to schedule tasks

Cisco Umbrella DGA

Scarfo, A. (2016, October 10). Domain Generation Algorithms – Why so effective?. Retrieved February 18, 2019.

Internal MISP references

UUID 5dbe2bcb-40b9-4ff8-a37a-0893a7a6cb58 which can be used as unique global reference for Cisco Umbrella DGA in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-18T00:00:00Z
date_published 2016-10-10T00:00:00Z
source MITRE
title Domain Generation Algorithms – Why so effective?

Microsoft GetAllTrustRelationships

Microsoft. (n.d.). Domain.GetAllTrustRelationships Method. Retrieved February 14, 2019.

Internal MISP references

UUID 571086ce-42d3-4416-9521-315f694647a6 which can be used as unique global reference for Microsoft GetAllTrustRelationships in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-14T00:00:00Z
source MITRE
title Domain.GetAllTrustRelationships Method

ICANNDomainNameHijacking

ICANN Security and Stability Advisory Committee. (2005, July 12). Domain Name Hijacking: Incidents, Threats, Risks and Remediation. Retrieved March 6, 2017.

Internal MISP references

UUID 96c5ec6c-d53d-49c3-bca1-0b6abe0080e6 which can be used as unique global reference for ICANNDomainNameHijacking in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-06T00:00:00Z
date_published 2005-07-12T00:00:00Z
source MITRE
title Domain Name Hijacking: Incidents, Threats, Risks and Remediation

Palo Alto Unit 42 Domain Shadowing 2022

Janos Szurdi, Rebekah Houser and Daiping Liu. (2022, September 21). Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime. Retrieved March 7, 2023.

Internal MISP references

UUID ec460017-fd25-5975-b697-c8c11fee960d which can be used as unique global reference for Palo Alto Unit 42 Domain Shadowing 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-07T00:00:00Z
date_published 2022-09-21T00:00:00Z
source MITRE
title Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime

ASERT Donot March 2018

Schwarz, D., Sopko J. (2018, March 08). Donot Team Leverages New Modular Malware Framework in South Asia. Retrieved June 11, 2018.

Internal MISP references

UUID a1b987cc-7789-411c-9673-3cf6357b207c which can be used as unique global reference for ASERT Donot March 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-06-11T00:00:00Z
date_published 2018-03-08T00:00:00Z
source MITRE
title Donot Team Leverages New Modular Malware Framework in South Asia

mandiant-masking

Simonian, Nick. (2023, May 22). Don't @ Me: URL Obfuscation Through Schema Abuse. Retrieved January 17, 2024.

Internal MISP references

UUID d5ed4c98-6d37-5000-bba0-9aada295a50c which can be used as unique global reference for mandiant-masking in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-17T00:00:00Z
date_published 2023-05-22T00:00:00Z
source MITRE
title Don't @ Me: URL Obfuscation Through Schema Abuse

Mandiant URL Obfuscation 2023

Nick Simonian. (2023, May 22). Don't @ Me: URL Obfuscation Through Schema Abuse. Retrieved August 4, 2023.

Internal MISP references

UUID b63f5934-2ace-5326-89be-7a850469a563 which can be used as unique global reference for Mandiant URL Obfuscation 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-04T00:00:00Z
date_published 2023-05-22T00:00:00Z
source MITRE
title Don't @ Me: URL Obfuscation Through Schema Abuse

Schema-abuse

Nick Simonian. (2023, May 22). Don't @ Me: URL Obfuscation Through Schema Abuse. Retrieved February 13, 2024.

Internal MISP references

UUID 75b860d9-a48d-57de-ba1e-b0db970abb1b which can be used as unique global reference for Schema-abuse in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-13T00:00:00Z
date_published 2023-05-22T00:00:00Z
source MITRE
title Don't @ Me: URL Obfuscation Through Schema Abuse

Donut Github

TheWover. (2019, May 9). donut. Retrieved March 25, 2022.

Internal MISP references

UUID 5f28c41f-6903-4779-93d4-3de99e031b70 which can be used as unique global reference for Donut Github in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-25T00:00:00Z
date_published 2019-05-09T00:00:00Z
source MITRE
title donut

Introducing Donut

The Wover. (2019, May 9). Donut - Injecting .NET Assemblies as Shellcode. Retrieved October 4, 2021.

Internal MISP references

UUID 8fd099c6-e002-44d0-8b7f-65f290a42c07 which can be used as unique global reference for Introducing Donut in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-04T00:00:00Z
date_published 2019-05-09T00:00:00Z
source MITRE
title Donut - Injecting .NET Assemblies as Shellcode

Dotnet.exe - LOLBAS Project

LOLBAS. (2019, November 12). Dotnet.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 8abe21ad-88d1-4a5c-b79e-8216b4b06862 which can be used as unique global reference for Dotnet.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2019-11-12T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Dotnet.exe

cyberproof-double-bounce

Itkin, Liora. (2022, September 1). Double-bounced attacks with email spoofing . Retrieved February 24, 2023.

Internal MISP references

UUID 4406d688-c392-5244-b438-6995f38dfc61 which can be used as unique global reference for cyberproof-double-bounce in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-24T00:00:00Z
date_published 2022-09-01T00:00:00Z
source MITRE
title Double-bounced attacks with email spoofing

FireEye APT41 Aug 2019

Fraser, N., et al. (2019, August 7). Double DragonAPT41, a dual espionage and cyber crime operation APT41. Retrieved September 23, 2019.

Internal MISP references

UUID 20f8e252-0a95-4ebd-857c-d05b0cde0904 which can be used as unique global reference for FireEye APT41 Aug 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-23T00:00:00Z
date_published 2019-08-07T00:00:00Z
source MITRE, Tidal Cyber
title Double DragonAPT41, a dual espionage and cyber crime operation APT41

FireEye APT41 2019

FireEye. (2019). Double DragonAPT41, a dual espionage andcyber crime operationAPT41. Retrieved September 23, 2019.

Internal MISP references

UUID daa31f35-15a6-413b-9319-80d6921d1598 which can be used as unique global reference for FireEye APT41 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-23T00:00:00Z
date_published 2019-01-01T00:00:00Z
source MITRE
title Double DragonAPT41, a dual espionage andcyber crime operationAPT41

Malwarebytes IssacWiper CaddyWiper March 2022

Threat Intelligence Team. (2022, March 18). Double header: IsaacWiper and CaddyWiper . Retrieved April 11, 2022.

Internal MISP references

UUID 931aed95-a629-4f94-8762-aad580f5d3e2 which can be used as unique global reference for Malwarebytes IssacWiper CaddyWiper March 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-11T00:00:00Z
date_published 2022-03-18T00:00:00Z
source MITRE
title Double header: IsaacWiper and CaddyWiper

Crowdstrike-leaks

Crowdstrike. (2020, September 24). Double Trouble: Ransomware with Data Leak Extortion, Part 1. Retrieved December 6, 2023.

Internal MISP references

UUID a91c3252-94b8-52a8-bb0d-cadac6afa161 which can be used as unique global reference for Crowdstrike-leaks in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-06T00:00:00Z
date_published 2020-09-24T00:00:00Z
source MITRE
title Double Trouble: Ransomware with Data Leak Extortion, Part 1

tlseminar_downgrade_att

Team Cinnamon. (2017, February 3). Downgrade Attacks. Retrieved December 9, 2021.

Internal MISP references

UUID 8b5d46bf-fb4e-4ecd-b8a9-9c084c1864a3 which can be used as unique global reference for tlseminar_downgrade_att in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-12-09T00:00:00Z
date_published 2017-02-03T00:00:00Z
source MITRE
title Downgrade Attacks

LogRhythm Do You Trust Oct 2014

Foss, G. (2014, October 3). Do You Trust Your Computer?. Retrieved December 17, 2018.

Internal MISP references

UUID 88a84f9a-e077-4fdd-9936-30fc7b290476 which can be used as unique global reference for LogRhythm Do You Trust Oct 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-12-17T00:00:00Z
date_published 2014-10-03T00:00:00Z
source MITRE
title Do You Trust Your Computer?

VNC Vulnerabilities

Sergiu Gatlan. (2019, November 22). Dozens of VNC Vulnerabilities Found in Linux, Windows Solutions. Retrieved September 20, 2021.

Internal MISP references

UUID 3ec5440a-cb3b-4aa9-8e0e-0f92525ef51c which can be used as unique global reference for VNC Vulnerabilities in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-20T00:00:00Z
date_published 2019-11-22T00:00:00Z
source MITRE
title Dozens of VNC Vulnerabilities Found in Linux, Windows Solutions

Accenture Dragonfish Jan 2018

Accenture Security. (2018, January 27). DRAGONFISH DELIVERS NEW FORM OF ELISE MALWARE TARGETING ASEAN DEFENCE MINISTERS’ MEETING AND ASSOCIATES. Retrieved November 14, 2018.

Internal MISP references

UUID f692c6fa-7b3a-4d1d-9002-b1a59f7116f4 which can be used as unique global reference for Accenture Dragonfish Jan 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-14T00:00:00Z
date_published 2018-01-27T00:00:00Z
source MITRE
title DRAGONFISH DELIVERS NEW FORM OF ELISE MALWARE TARGETING ASEAN DEFENCE MINISTERS’ MEETING AND ASSOCIATES

Symantec Dragonfly

Symantec Security Response. (2014, June 30). Dragonfly: Cyberespionage Attacks Against Energy Suppliers. Retrieved April 8, 2016.

Internal MISP references

UUID 9514c5cd-2ed6-4dbf-aa9e-1c425e969226 which can be used as unique global reference for Symantec Dragonfly in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-08T00:00:00Z
date_published 2014-06-30T00:00:00Z
source MITRE, Tidal Cyber
title Dragonfly: Cyberespionage Attacks Against Energy Suppliers

Symantec Dragonfly 2.0 October 2017

Symantec. (2017, October 7). Dragonfly: Western energy sector targeted by sophisticated attack group. Retrieved April 19, 2022.

Internal MISP references

UUID a0439d4a-a3ea-4be5-9a01-f223ca259681 which can be used as unique global reference for Symantec Dragonfly 2.0 October 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-19T00:00:00Z
date_published 2017-10-07T00:00:00Z
source MITRE
title Dragonfly: Western energy sector targeted by sophisticated attack group

Symantec Dragonfly Sept 2017

Symantec Security Response. (2014, July 7). Dragonfly: Western energy sector targeted by sophisticated attack group. Retrieved September 9, 2017.

Internal MISP references

UUID 11bbeafc-ed5d-4d2b-9795-a0a9544fb64e which can be used as unique global reference for Symantec Dragonfly Sept 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-09-09T00:00:00Z
date_published 2014-07-07T00:00:00Z
source MITRE
title Dragonfly: Western energy sector targeted by sophisticated attack group

Kaspersky Dridex May 2017

Slepogin, N. (2017, May 25). Dridex: A History of Evolution. Retrieved May 31, 2019.

Internal MISP references

UUID 52c48bc3-2b53-4214-85c3-7e5dd036c969 which can be used as unique global reference for Kaspersky Dridex May 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-05-31T00:00:00Z
date_published 2017-05-25T00:00:00Z
source MITRE
title Dridex: A History of Evolution

Dell Dridex Oct 2015

Dell SecureWorks Counter Threat Unit Threat Intelligence. (2015, October 13). Dridex (Bugat v5) Botnet Takeover Operation. Retrieved May 31, 2019.

Internal MISP references

UUID f81ce947-d875-4631-9709-b54c8b5d25bc which can be used as unique global reference for Dell Dridex Oct 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-05-31T00:00:00Z
date_published 2015-10-13T00:00:00Z
source MITRE
title Dridex (Bugat v5) Botnet Takeover Operation

Red Canary Dridex Threat Report 2021

Red Canary. (2021, February 9). Dridex - Red Canary Threat Detection Report. Retrieved August 3, 2023.

Internal MISP references

UUID 3be25132-6655-5fa9-92cb-772d02f49d2b which can be used as unique global reference for Red Canary Dridex Threat Report 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-03T00:00:00Z
date_published 2021-02-09T00:00:00Z
source MITRE
title Dridex - Red Canary Threat Detection Report

volexity_0day_sophos_FW

Adair, S., Lancaster, T., Volexity Threat Research. (2022, June 15). DriftingCloud: Zero-Day Sophos Firewall Exploitation and an Insidious Breach. Retrieved July 1, 2022.

Internal MISP references

UUID 85bee18e-216d-4ea6-b34e-b071e3f63382 which can be used as unique global reference for volexity_0day_sophos_FW in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-01T00:00:00Z
date_published 2022-06-15T00:00:00Z
source MITRE
title DriftingCloud: Zero-Day Sophos Firewall Exploitation and an Insidious Breach

Google Drive Log Events

Google. (n.d.). Drive log events. Retrieved March 4, 2024.

Internal MISP references

UUID f546898e-3639-58f4-85a2-6268dfaab207 which can be used as unique global reference for Google Drive Log Events in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-04T00:00:00Z
source MITRE
title Drive log events

Microsoft Driverquery

Microsoft. (n.d.). driverquery. Retrieved March 28, 2023.

Internal MISP references

UUID 7302dc00-a75a-5787-a04c-88ef4922ac09 which can be used as unique global reference for Microsoft Driverquery in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-28T00:00:00Z
source MITRE
title driverquery

Dropbox Malware Sync

David Talbot. (2013, August 21). Dropbox and Similar Services Can Sync Malware. Retrieved May 31, 2023.

Internal MISP references

UUID 06ca63fa-8c6c-501c-96d3-5e7e45ca1e04 which can be used as unique global reference for Dropbox Malware Sync in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-31T00:00:00Z
date_published 2013-08-21T00:00:00Z
source MITRE
title Dropbox and Similar Services Can Sync Malware

Cyberreason Anchor December 2019

Dahan, A. et al. (2019, December 11). DROPPING ANCHOR: FROM A TRICKBOT INFECTION TO THE DISCOVERY OF THE ANCHOR MALWARE. Retrieved September 10, 2020.

Internal MISP references

UUID a8dc5598-9963-4a1d-a473-bee8d2c72c57 which can be used as unique global reference for Cyberreason Anchor December 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-10T00:00:00Z
date_published 2019-12-11T00:00:00Z
source MITRE
title DROPPING ANCHOR: FROM A TRICKBOT INFECTION TO THE DISCOVERY OF THE ANCHOR MALWARE

Samba DRSUAPI

SambaWiki. (n.d.). DRSUAPI. Retrieved December 4, 2017.

Internal MISP references

UUID 79e8f598-9962-4124-b884-eb10f86885af which can be used as unique global reference for Samba DRSUAPI in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-04T00:00:00Z
source MITRE
title DRSUAPI

dsdbutil.exe - LOLBAS Project

LOLBAS. (2023, May 31). dsdbutil.exe. Retrieved December 4, 2023.

Internal MISP references

UUID fc982faf-a37d-4d0b-949c-f7a27adc3030 which can be used as unique global reference for dsdbutil.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2023-05-31T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title dsdbutil.exe

TechNet Dsquery

Microsoft. (n.d.). Dsquery. Retrieved April 18, 2016.

Internal MISP references

UUID bbbb4a45-2963-4f04-901a-fb2752800e12 which can be used as unique global reference for TechNet Dsquery in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-18T00:00:00Z
source MITRE
title Dsquery

CyberBit Dtrack

Hod Gavriel. (2019, November 21). Dtrack: In-depth analysis of APT on a nuclear power plant. Retrieved January 20, 2021.

Internal MISP references

UUID 1ac944f4-868c-4312-8b5d-1580fd6542a0 which can be used as unique global reference for CyberBit Dtrack in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-20T00:00:00Z
date_published 2019-11-21T00:00:00Z
source MITRE
title Dtrack: In-depth analysis of APT on a nuclear power plant

Kaspersky Dtrack

Kaspersky Global Research and Analysis Team. (2019, September 23). DTrack: previously unknown spy-tool by Lazarus hits financial institutions and research centers. Retrieved January 20, 2021.

Internal MISP references

UUID 0122ee35-938d-493f-a3bb-bc75fc808f62 which can be used as unique global reference for Kaspersky Dtrack in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-20T00:00:00Z
date_published 2019-09-23T00:00:00Z
source MITRE
title DTrack: previously unknown spy-tool by Lazarus hits financial institutions and research centers

Crowdstrike Qakbot October 2020

CS. (2020, October 7). Duck Hunting with Falcon Complete: A Fowl Banking Trojan Evolves, Part 2. Retrieved September 27, 2021.

Internal MISP references

UUID 636a9b94-8260-45cc-bd74-a764cd8f50b0 which can be used as unique global reference for Crowdstrike Qakbot October 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-27T00:00:00Z
date_published 2020-10-07T00:00:00Z
source MITRE
title Duck Hunting with Falcon Complete: A Fowl Banking Trojan Evolves, Part 2

Dump64.exe - LOLBAS Project

LOLBAS. (2021, November 16). Dump64.exe. Retrieved December 4, 2023.

Internal MISP references

UUID b0186447-a6d5-40d7-a11d-ab2e9fb93087 which can be used as unique global reference for Dump64.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-11-16T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Dump64.exe

dump_pwd_dcsync

Metcalf, S. (2015, November 22). Dump Clear-Text Passwords for All Admins in the Domain Using Mimikatz DCSync. Retrieved November 15, 2021.

Internal MISP references

UUID bd1d7e75-feee-47fd-abfb-7e3dfc648a72 which can be used as unique global reference for dump_pwd_dcsync in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-11-15T00:00:00Z
date_published 2015-11-22T00:00:00Z
source MITRE
title Dump Clear-Text Passwords for All Admins in the Domain Using Mimikatz DCSync

ired mscache

Mantvydas Baranauskas. (2019, November 16). Dumping and Cracking mscash - Cached Domain Credentials. Retrieved February 21, 2020.

Internal MISP references

UUID 5b643e7d-1ace-4517-88c2-96115cac1209 which can be used as unique global reference for ired mscache in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-21T00:00:00Z
date_published 2019-11-16T00:00:00Z
source MITRE
title Dumping and Cracking mscash - Cached Domain Credentials

ired Dumping LSA Secrets

Mantvydas Baranauskas. (2019, November 16). Dumping LSA Secrets. Retrieved February 21, 2020.

Internal MISP references

UUID cf883397-11e9-4f94-977a-bbe46e3107f5 which can be used as unique global reference for ired Dumping LSA Secrets in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-21T00:00:00Z
date_published 2019-11-16T00:00:00Z
source MITRE
title Dumping LSA Secrets

DumpMinitool.exe - LOLBAS Project

LOLBAS. (2022, January 20). DumpMinitool.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 4634e025-c005-46fe-b97c-5d7dda455ba0 which can be used as unique global reference for DumpMinitool.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2022-01-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title DumpMinitool.exe

DuplicateToken function

Microsoft. (2021, October 12). DuplicateToken function (securitybaseapi.h). Retrieved January 8, 2024.

Internal MISP references

UUID fbf31bc2-7883-56fa-975f-d083288464dc which can be used as unique global reference for DuplicateToken function in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-08T00:00:00Z
date_published 2021-10-12T00:00:00Z
source MITRE
title DuplicateToken function (securitybaseapi.h)

Wikipedia Duqu

Wikipedia. (2017, December 29). Duqu. Retrieved April 10, 2018.

Internal MISP references

UUID 5cf0101e-c036-4c1c-b322-48f04e2aef0b which can be used as unique global reference for Wikipedia Duqu in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-10T00:00:00Z
date_published 2017-12-29T00:00:00Z
source MITRE
title Duqu

Dxcap.exe - LOLBAS Project

LOLBAS. (2018, May 25). Dxcap.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 7611eb7a-46b7-4c76-9728-67c1fbf20e17 which can be used as unique global reference for Dxcap.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Dxcap.exe

TheEvilBit DYLD_INSERT_LIBRARIES

Fitzl, C. (2019, July 9). DYLD_INSERT_LIBRARIES DYLIB injection in macOS / OSX. Retrieved March 26, 2020.

Internal MISP references

UUID bd27026c-81eb-480e-b092-f861472ac775 which can be used as unique global reference for TheEvilBit DYLD_INSERT_LIBRARIES in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-26T00:00:00Z
date_published 2019-07-09T00:00:00Z
source MITRE
title DYLD_INSERT_LIBRARIES DYLIB injection in macOS / OSX

Wardle Dylib Hijacking OSX 2015

Patrick Wardle. (2015, March 1). Dylib Hijacking on OS X. Retrieved March 29, 2021.

Internal MISP references

UUID c78d8c94-4fe3-4aa9-b879-f0b0e9d2714b which can be used as unique global reference for Wardle Dylib Hijacking OSX 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-29T00:00:00Z
date_published 2015-03-01T00:00:00Z
source MITRE
title Dylib Hijacking on OS X

Dragos DYMALLOY

Dragos. (n.d.). DYMALLOY. Retrieved August 20, 2020.

Internal MISP references

UUID d2785c6e-e0d1-4e90-a2d5-2c302176d5d3 which can be used as unique global reference for Dragos DYMALLOY in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-20T00:00:00Z
source MITRE
title DYMALLOY

MWRInfoSecurity Dynamic Hooking 2015

Hillman, M. (2015, August 8). Dynamic Hooking Techniques: User Mode. Retrieved December 20, 2017.

Internal MISP references

UUID 3cb6d0b1-4d6b-4f2d-bd7d-e4b2dcde081d which can be used as unique global reference for MWRInfoSecurity Dynamic Hooking 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-20T00:00:00Z
date_published 2015-08-08T00:00:00Z
source MITRE
title Dynamic Hooking Techniques: User Mode

rfc2131

Droms, R. (1997, March). Dynamic Host Configuration Protocol. Retrieved March 9, 2022.

Internal MISP references

UUID b16bd2d5-162b-44cb-a812-7becd6684021 which can be used as unique global reference for rfc2131 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-09T00:00:00Z
date_published 1997-03-01T00:00:00Z
source MITRE
title Dynamic Host Configuration Protocol

rfc3315

J. Bound, et al. (2003, July). Dynamic Host Configuration Protocol for IPv6 (DHCPv6). Retrieved June 27, 2022.

Internal MISP references

UUID 9349f864-79e9-4481-ad77-44099621795a which can be used as unique global reference for rfc3315 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-27T00:00:00Z
date_published 2003-07-01T00:00:00Z
source MITRE
title Dynamic Host Configuration Protocol for IPv6 (DHCPv6)

Microsoft DLL Redirection

Microsoft. (n.d.). Dynamic-Link Library Redirection. Retrieved December 5, 2014.

Internal MISP references

UUID ac60bb28-cb14-4ff9-bc05-df48273a28a9 which can be used as unique global reference for Microsoft DLL Redirection in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-12-05T00:00:00Z
source MITRE
title Dynamic-Link Library Redirection

Microsoft. (2018, May 31). Dynamic-Link Library Redirection. Retrieved March 13, 2020.

Internal MISP references

UUID 72458590-ee1b-4447-adb8-ca4f486d1db5 which can be used as unique global reference for Microsoft Dynamic-Link Library Redirection in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-13T00:00:00Z
date_published 2018-05-31T00:00:00Z
source MITRE
title Dynamic-Link Library Redirection

Microsoft. (n.d.). Dynamic-Link Library Search Order. Retrieved November 30, 2014.

Internal MISP references

UUID c157444d-bf2b-4806-b069-519122b7a459 which can be used as unique global reference for Microsoft DLL Search in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-30T00:00:00Z
source MITRE
title Dynamic-Link Library Search Order

Microsoft. (2018, May 31). Dynamic-Link Library Search Order. Retrieved November 30, 2014.

Internal MISP references

UUID 7b1f945b-2547-4bc6-98bf-30248bdf3587 which can be used as unique global reference for Microsoft Dynamic Link Library Search Order in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-30T00:00:00Z
date_published 2018-05-31T00:00:00Z
source MITRE
title Dynamic-Link Library Search Order

MSDN DLL Security

Microsoft. (n.d.). Dynamic-Link Library Security. Retrieved July 25, 2016.

Internal MISP references

UUID 5d1d1916-cef4-49d1-b8e2-a6d18fb297f6 which can be used as unique global reference for MSDN DLL Security in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-07-25T00:00:00Z
source MITRE
title Dynamic-Link Library Security

Microsoft DLL Security

Microsoft. (n.d.). Dynamic-Link Library Security. Retrieved November 27, 2017.

Internal MISP references

UUID 584490c7-b155-4f62-b68d-a5a2a1799e60 which can be used as unique global reference for Microsoft DLL Security in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-27T00:00:00Z
source MITRE
title Dynamic-Link Library Security

Microsoft. (n.d.). Dynamic-Link Library Security. Retrieved July 25, 2016.

Internal MISP references

UUID e087442a-0a53-4cc8-9fd6-772cbd0295d5 which can be used as unique global reference for Microsoft Dynamic-Link Library Security in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-07-25T00:00:00Z
source MITRE
title Dynamic-Link Library Security

Symantec Dyre June 2015

Symantec Security Response. (2015, June 23). Dyre: Emerging threat on financial fraud landscape. Retrieved August 23, 2018.

Internal MISP references

UUID a9780bb0-302f-44c2-8252-b53d94da24e6 which can be used as unique global reference for Symantec Dyre June 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-23T00:00:00Z
date_published 2015-06-23T00:00:00Z
source MITRE
title Dyre: Emerging threat on financial fraud landscape

EA Hacked via Slack - June 2021

Anthony Spadafora. (2021, June 11). EA hack reportedly used stolen cookies and Slack to target gaming giant. Retrieved May 31, 2022.

Internal MISP references

UUID 3362e1df-cfb9-4281-a0a1-9a3710d76945 which can be used as unique global reference for EA Hacked via Slack - June 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-31T00:00:00Z
date_published 2021-06-11T00:00:00Z
source MITRE
title EA hack reportedly used stolen cookies and Slack to target gaming giant

CrowdStrike StellarParticle January 2022

CrowdStrike. (2022, January 27). Early Bird Catches the Wormhole: Observations from the StellarParticle Campaign. Retrieved February 7, 2022.

Internal MISP references

UUID 149c1446-d6a1-4a63-9420-def9272d6cb9 which can be used as unique global reference for CrowdStrike StellarParticle January 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-07T00:00:00Z
date_published 2022-01-27T00:00:00Z
source MITRE
title Early Bird Catches the Wormhole: Observations from the StellarParticle Campaign

Trend Micro September 9 2024

Lenart Bermejo; Sunny Lu; Ted Lee Read time. (2024, September 9). Earth Preta Evolves its Attacks with New Malware and Strategies. Retrieved September 10, 2024.

Internal MISP references

UUID 0fdc9ee2-5be2-43e0-afb9-c9a94fde3867 which can be used as unique global reference for Trend Micro September 9 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-10T00:00:00Z
date_published 2024-09-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Earth Preta Evolves its Attacks with New Malware and Strategies

Trend Micro Muddy Water March 2021

Peretz, A. and Theck, E. (2021, March 5). Earth Vetala – MuddyWater Continues to Target Organizations in the Middle East. Retrieved March 18, 2021.

Internal MISP references

UUID 16b4b834-2f44-4bac-b810-f92080c41f09 which can be used as unique global reference for Trend Micro Muddy Water March 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-18T00:00:00Z
date_published 2021-03-05T00:00:00Z
source MITRE
title Earth Vetala – MuddyWater Continues to Target Organizations in the Middle East

Earthworm English Project Page

rootkiter. (2019, March 9). Earthworm. Retrieved July 7, 2023.

Internal MISP references

UUID 88170ef5-03ac-42f2-9b03-2ce204b5d45c which can be used as unique global reference for Earthworm English Project Page in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-07T00:00:00Z
date_published 2019-03-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Earthworm

ESET Ebury May 2024

Marc-Etienne M.Léveillé. (2024, May 1). Ebury is alive but unseen. Retrieved May 21, 2024.

Internal MISP references

UUID 7df9b7ed-ecac-5432-9fc2-8961fc315415 which can be used as unique global reference for ESET Ebury May 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-21T00:00:00Z
date_published 2024-05-01T00:00:00Z
source MITRE
title Ebury is alive but unseen

U.S. SEC. (n.d.). EDGAR - Search and Access. Retrieved August 27, 2021.

Internal MISP references

UUID 97958143-80c5-41f6-9fa6-4748e90e9f12 which can be used as unique global reference for SEC EDGAR Search in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-27T00:00:00Z
source MITRE
title EDGAR - Search and Access

Intrinsec Egregor Nov 2020

Bichet, J. (2020, November 12). Egregor – Prolock: Fraternal Twins ?. Retrieved January 6, 2021.

Internal MISP references

UUID e55604da-b419-411a-85cf-073f2d78e0c1 which can be used as unique global reference for Intrinsec Egregor Nov 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-06T00:00:00Z
date_published 2020-11-12T00:00:00Z
source MITRE
title Egregor – Prolock: Fraternal Twins ?

Cybereason Egregor Nov 2020

Rochberger, L. (2020, November 26). Cybereason vs. Egregor Ransomware. Retrieved December 30, 2020.

Internal MISP references

UUID c36b38d4-cfa2-4f1e-a410-6d629a24be62 which can be used as unique global reference for Cybereason Egregor Nov 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-30T00:00:00Z
source MITRE
title Egregor Ransomware

Cyble Egregor Oct 2020

Cybleinc. (2020, October 31). Egregor Ransomware – A Deep Dive Into Its Activities and Techniques. Retrieved December 29, 2020.

Internal MISP references

UUID 545a131d-88fc-4b34-923c-0b759b45fc7f which can be used as unique global reference for Cyble Egregor Oct 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-29T00:00:00Z
date_published 2020-10-31T00:00:00Z
source MITRE
title Egregor Ransomware – A Deep Dive Into Its Activities and Techniques

NHS Digital Egregor Nov 2020

NHS Digital. (2020, November 26). Egregor Ransomware The RaaS successor to Maze. Retrieved December 29, 2020.

Internal MISP references

UUID 92f74037-2a20-4667-820d-2ccc0e4dbd3d which can be used as unique global reference for NHS Digital Egregor Nov 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-29T00:00:00Z
date_published 2020-11-26T00:00:00Z
source MITRE
title Egregor Ransomware The RaaS successor to Maze

Security Boulevard Egregor Oct 2020

Meskauskas, T.. (2020, October 29). Egregor: Sekhmet’s Cousin. Retrieved January 6, 2021.

Internal MISP references

UUID cd37a000-9e15-45a3-a7c9-bb508c10e55d which can be used as unique global reference for Security Boulevard Egregor Oct 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-06T00:00:00Z
date_published 2020-10-29T00:00:00Z
source MITRE
title Egregor: Sekhmet’s Cousin

Cybersecurity and Infrastructure Security Agency. (2020, June 30). EINSTEIN Data Trends – 30-day Lookback. Retrieved October 25, 2023.

Internal MISP references

UUID b97e9a02-4cc5-4845-8058-0be4c566cd7c which can be used as unique global reference for U.S. CISA Trends June 30 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-25T00:00:00Z
date_published 2020-06-30T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title EINSTEIN Data Trends – 30-day Lookback

Dragos EKANS

Dragos. (2020, February 3). EKANS Ransomware and ICS Operations. Retrieved February 9, 2021.

Internal MISP references

UUID c8a018c5-caa3-4af1-b210-b65bbf94c8b2 which can be used as unique global reference for Dragos EKANS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-09T00:00:00Z
date_published 2020-02-03T00:00:00Z
source MITRE
title EKANS Ransomware and ICS Operations

Dark Reading July 9 2024

Nathan Eddy; Contributing Writer. (2024, July 9). Eldorado Ransomware Cruises Onto the Scene to Target VMware ESXi. Retrieved July 15, 2024.

Internal MISP references

UUID cec05996-84a1-4c07-86eb-d72f8c6d9362 which can be used as unique global reference for Dark Reading July 9 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-15T00:00:00Z
date_published 2024-07-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Eldorado Ransomware Cruises Onto the Scene to Target VMware ESXi

Group-IB July 3 2024

Nikolay Kichatov Cyber Intelligence Analyst; Group-IB. (2024, July 3). Eldorado Ransomware The New Golden Empire of Cybercrime . Retrieved July 15, 2024.

Internal MISP references

UUID 50148a85-314c-4b29-bdfc-913ab647dadf which can be used as unique global reference for Group-IB July 3 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-15T00:00:00Z
date_published 2024-07-03T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Eldorado Ransomware The New Golden Empire of Cybercrime

EldoS RawDisk ITpro

Edwards, M. (2007, March 14). EldoS Provides Raw Disk Access for Vista and XP. Retrieved March 26, 2019.

Internal MISP references

UUID a6cf3d1d-2310-42bb-9324-495b4e94d329 which can be used as unique global reference for EldoS RawDisk ITpro in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-26T00:00:00Z
date_published 2007-03-14T00:00:00Z
source MITRE
title EldoS Provides Raw Disk Access for Vista and XP

Microsoft Targeting Elections September 2020

Burt, T. (2020, September 10). New cyberattacks targeting U.S. elections. Retrieved March 24, 2021.

Internal MISP references

UUID 1d7070fd-01be-4776-bb21-13368a6173b1 which can be used as unique global reference for Microsoft Targeting Elections September 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-24T00:00:00Z
source MITRE, Tidal Cyber
title elections

Secureworks IRON RITUAL USAID Phish May 2021

Secureworks CTU. (2021, May 28). USAID-Themed Phishing Campaign Leverages U.S. Elections Lure. Retrieved February 24, 2022.

Internal MISP references

UUID 0d42c329-5847-4970-9580-2318a566df4e which can be used as unique global reference for Secureworks IRON RITUAL USAID Phish May 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-24T00:00:00Z
source MITRE
title Elections Lure

Electron Security

ElectronJS.org. (n.d.). Retrieved March 7, 2024.

Internal MISP references

UUID e44c8abf-77c1-5e19-93e6-99397d7eaa41 which can be used as unique global reference for Electron Security in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-07T00:00:00Z
source MITRE
title Electron Security

Dragos-Sandworm-Ukraine-2022

Dragos, Inc.. (2023, December 11). ELECTRUM Targeted Ukrainian Electric Entity Using Custom Tools and CaddyWiper Malware, October 2022. Retrieved March 28, 2024.

Internal MISP references

UUID a17aa1b1-cda4-5aeb-b401-f4fd47d29f93 which can be used as unique global reference for Dragos-Sandworm-Ukraine-2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-28T00:00:00Z
date_published 2023-12-11T00:00:00Z
source MITRE
title ELECTRUM Targeted Ukrainian Electric Entity Using Custom Tools and CaddyWiper Malware, October 2022

Dragos ELECTRUM

Dragos. (2017, January 1). ELECTRUM Threat Profile. Retrieved June 10, 2020.

Internal MISP references

UUID 494f7056-7a39-4fa0-958d-fb1172d01852 which can be used as unique global reference for Dragos ELECTRUM in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-10T00:00:00Z
date_published 2017-01-01T00:00:00Z
source MITRE
title ELECTRUM Threat Profile

Symantec Elfin Mar 2019

Security Response attack Investigation Team. (2019, March 27). Elfin: Relentless Espionage Group Targets Multiple Organizations in Saudi Arabia and U.S.. Retrieved April 10, 2019.

Internal MISP references

UUID 55671ede-f309-4924-a1b4-3d597517b27e which can be used as unique global reference for Symantec Elfin Mar 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-10T00:00:00Z
date_published 2019-03-27T00:00:00Z
source MITRE
title Elfin: Relentless Espionage Group Targets Multiple Organizations in Saudi Arabia and U.S.

Backtrace VDSO

backtrace. (2016, April 22). ELF SHARED LIBRARY INJECTION FORENSICS. Retrieved June 15, 2020.

Internal MISP references

UUID 1c8fa804-6579-4e68-a0b3-d16e0bee5654 which can be used as unique global reference for Backtrace VDSO in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-15T00:00:00Z
date_published 2016-04-22T00:00:00Z
source MITRE
title ELF SHARED LIBRARY INJECTION FORENSICS

Securelist Machete Aug 2014

Kaspersky Global Research and Analysis Team. (2014, August 20). El Machete. Retrieved September 13, 2019.

Internal MISP references

UUID fc7be240-bd15-4ec4-bc01-f8891d7210d9 which can be used as unique global reference for Securelist Machete Aug 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-13T00:00:00Z
date_published 2014-08-20T00:00:00Z
source MITRE, Tidal Cyber
title El Machete

Cylance Machete Mar 2017

The Cylance Threat Research Team. (2017, March 22). El Machete's Malware Attacks Cut Through LATAM. Retrieved September 13, 2019.

Internal MISP references

UUID 92a9a311-1e0b-4819-9856-2dfc8dbfc08d which can be used as unique global reference for Cylance Machete Mar 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-13T00:00:00Z
date_published 2017-03-22T00:00:00Z
source MITRE, Tidal Cyber
title El Machete's Malware Attacks Cut Through LATAM

Sophos News September 24 2020

Sophos News. (2020, September 24). Email-delivered MoDi RAT attack pastes PowerShell commands. Retrieved May 7, 2023.

Internal MISP references

UUID 8cfa3dc4-a6b4-4204-b1e5-5b325955936d which can be used as unique global reference for Sophos News September 24 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2020-09-24T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Email-delivered MoDi RAT attack pastes PowerShell commands

Power Automate Email Exfiltration Controls

Microsoft. (2022, February 15). Email exfiltration controls for connectors. Retrieved May 27, 2022.

Internal MISP references

UUID 79eeaadf-5c1e-4608-84a5-6c903966a7f3 which can be used as unique global reference for Power Automate Email Exfiltration Controls in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-27T00:00:00Z
date_published 2022-02-15T00:00:00Z
source MITRE
title Email exfiltration controls for connectors

HackersArise Email

Hackers Arise. (n.d.). Email Scraping and Maltego. Retrieved October 20, 2020.

Internal MISP references

UUID b6aefd99-fd97-4ca0-b717-f9dc147c9413 which can be used as unique global reference for HackersArise Email in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
source MITRE
title Email Scraping and Maltego

Elastic - Koadiac Detection with EQL

Stepanic, D.. (2020, January 13). Embracing offensive tooling: Building detections against Koadic using EQL. Retrieved November 30, 2020.

Internal MISP references

UUID 689b71f4-f8e5-455f-91c2-c599c8650f11 which can be used as unique global reference for Elastic - Koadiac Detection with EQL in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-30T00:00:00Z
date_published 2020-01-13T00:00:00Z
source MITRE
title Embracing offensive tooling: Building detections against Koadic using EQL

Nccgroup Emissary Panda May 2018

Pantazopoulos, N., Henry T. (2018, May 18). Emissary Panda – A potential new malicious tool. Retrieved June 25, 2018.

Internal MISP references

UUID e279c308-fabc-47d3-bdeb-296266c80988 which can be used as unique global reference for Nccgroup Emissary Panda May 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-06-25T00:00:00Z
date_published 2018-05-18T00:00:00Z
source MITRE
title Emissary Panda – A potential new malicious tool

Unit42 Emissary Panda May 2019

Falcone, R. and Lancaster, T. (2019, May 28). Emissary Panda Attacks Middle East Government Sharepoint Servers. Retrieved July 9, 2019.

Internal MISP references

UUID 3a3ec86c-88da-40ab-8e5f-a7d5102c026b which can be used as unique global reference for Unit42 Emissary Panda May 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-07-09T00:00:00Z
date_published 2019-05-28T00:00:00Z
source MITRE
title Emissary Panda Attacks Middle East Government Sharepoint Servers

Emissary Trojan Feb 2016

Falcone, R. and Miller-Osborn, J. (2016, February 3). Emissary Trojan Changelog: Did Operation Lotus Blossom Cause It to Evolve?. Retrieved February 15, 2016.

Internal MISP references

UUID 580ce22f-b76b-4a92-9fab-26ce8f449ab6 which can be used as unique global reference for Emissary Trojan Feb 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-02-15T00:00:00Z
date_published 2016-02-03T00:00:00Z
source MITRE
title Emissary Trojan Changelog: Did Operation Lotus Blossom Cause It to Evolve?

orangecyberdefense.com August 14 2024

orangecyberdefense.com. (2024, August 14). Emmenhtal a little-known loader distributing commodity infostealers worldwide. Retrieved August 25, 2024.

Internal MISP references

UUID 138a6cd4-36f9-41fd-a724-2b600dc6bf85 which can be used as unique global reference for orangecyberdefense.com August 14 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-25T00:00:00Z
date_published 2024-08-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Emmenhtal a little-known loader distributing commodity infostealers worldwide

Sophos Emotet Apr 2019

Brandt, A.. (2019, May 5). Emotet 101, stage 4: command and control. Retrieved April 16, 2019.

Internal MISP references

UUID 0bd01e6c-6fb5-4bae-9fe9-395de061c1da which can be used as unique global reference for Sophos Emotet Apr 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-16T00:00:00Z
date_published 2019-05-05T00:00:00Z
source MITRE
title Emotet 101, stage 4: command and control

Deep Instinct March 10 2023

Deep Instinct. (2023, March 10). Emotet Again! The First Malspam Wave of 2023 | Deep Instinct. Retrieved May 7, 2023.

Internal MISP references

UUID 8016eca2-f702-4081-83ba-06262c29e6c2 which can be used as unique global reference for Deep Instinct March 10 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2023-03-10T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Emotet Again! The First Malspam Wave of 2023

CIS Emotet Apr 2017

CIS. (2017, April 28). Emotet Changes TTPs and Arrives in United States. Retrieved January 17, 2019.

Internal MISP references

UUID 8dc7653f-84ef-4f0a-91f6-9b10ff50b756 which can be used as unique global reference for CIS Emotet Apr 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-01-17T00:00:00Z
date_published 2017-04-28T00:00:00Z
source MITRE
title Emotet Changes TTPs and Arrives in United States

Binary Defense Emotes Wi-Fi Spreader

Binary Defense. (n.d.). Emotet Evolves With new Wi-Fi Spreader. Retrieved September 8, 2023.

Internal MISP references

UUID 05e624ee-c53d-5cd1-8fd2-6b2d38344bfd which can be used as unique global reference for Binary Defense Emotes Wi-Fi Spreader in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-08T00:00:00Z
source MITRE
title Emotet Evolves With new Wi-Fi Spreader

ESET Emotet Nov 2018

ESET . (2018, November 9). Emotet launches major new spam campaign. Retrieved March 25, 2019.

Internal MISP references

UUID e954c9aa-4995-452c-927e-11d0a6e2f442 which can be used as unique global reference for ESET Emotet Nov 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-25T00:00:00Z
date_published 2018-11-09T00:00:00Z
source MITRE
title Emotet launches major new spam campaign

emotet_hc3_nov2023

Office of Information Security, Health Sector Cybersecurity Coordination Center. (2023, November 16). Emotet Malware: The Enduring and Persistent Threat to the Health Sector. Retrieved June 19, 2024.

Internal MISP references

UUID 36b41ab3-2a3d-5f5f-86ad-bc4cf810b4ba which can be used as unique global reference for emotet_hc3_nov2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-19T00:00:00Z
date_published 2023-11-16T00:00:00Z
source MITRE
title Emotet Malware: The Enduring and Persistent Threat to the Health Sector

Trend Micro Emotet 2020

Cybercrime & Digital Threat Team. (2020, February 13). Emotet Now Spreads via Wi-Fi. Retrieved February 16, 2022.

Internal MISP references

UUID 150327e6-db4b-4588-8cf2-ee131569150b which can be used as unique global reference for Trend Micro Emotet 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-16T00:00:00Z
date_published 2020-02-13T00:00:00Z
source MITRE
title Emotet Now Spreads via Wi-Fi

Talos Emotet Jan 2019

Brumaghin, E.. (2019, January 15). Emotet re-emerges after the holidays. Retrieved March 25, 2019.

Internal MISP references

UUID 83180391-89b6-4431-87f4-2703b47cb81b which can be used as unique global reference for Talos Emotet Jan 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-25T00:00:00Z
date_published 2019-01-15T00:00:00Z
source MITRE
title Emotet re-emerges after the holidays

Cybersécurité - INTRINSEC January 09 2023

Equipe cti. (2023, January 9). Emotet returns and deploys loaders. Retrieved May 7, 2023.

Internal MISP references

UUID 6d39aba3-ae77-4a95-8242-7dacae8c89d8 which can be used as unique global reference for Cybersécurité - INTRINSEC January 09 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2023-01-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Emotet returns and deploys loaders

emotet_trendmicro_mar2023

Kenefick, I. (2023, March 13). Emotet Returns, Now Adopts Binary Padding for Evasion. Retrieved June 19, 2024.

Internal MISP references

UUID 6f9050d9-e960-50dd-86a9-aee5fd100d9c which can be used as unique global reference for emotet_trendmicro_mar2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-19T00:00:00Z
date_published 2023-03-13T00:00:00Z
source MITRE
title Emotet Returns, Now Adopts Binary Padding for Evasion

Emotet shutdown

The DFIR Report. (2022, November 8). Emotet Strikes Again – LNK File Leads to Domain Wide Ransomware. Retrieved March 6, 2023.

Internal MISP references

UUID 02e6c7bf-f81c-53a3-b771-fd77d4cdb5a0 which can be used as unique global reference for Emotet shutdown in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-06T00:00:00Z
date_published 2022-11-08T00:00:00Z
source MITRE
title Emotet Strikes Again – LNK File Leads to Domain Wide Ransomware

Carbon Black Emotet Apr 2019

Lee, S.. (2019, April 24). Emotet Using WMI to Launch PowerShell Encoded Code. Retrieved May 24, 2019.

Internal MISP references

UUID db8fe753-d674-4668-9ee5-c1269085a7a1 which can be used as unique global reference for Carbon Black Emotet Apr 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-05-24T00:00:00Z
date_published 2019-04-24T00:00:00Z
source MITRE
title Emotet Using WMI to Launch PowerShell Encoded Code

DanielManea Emotet May 2017

Manea, D.. (2019, May 25). Emotet v4 Analysis. Retrieved April 16, 2019.

Internal MISP references

UUID 578e44f2-9ff5-4bed-8dee-a992711df8ce which can be used as unique global reference for DanielManea Emotet May 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-16T00:00:00Z
date_published 2019-05-25T00:00:00Z
source MITRE
title Emotet v4 Analysis

Empire Keychain Decrypt

Empire. (2018, March 8). Empire keychaindump_decrypt Module. Retrieved April 14, 2022.

Internal MISP references

UUID 41075230-73a2-4195-b716-379f9e5ae93b which can be used as unique global reference for Empire Keychain Decrypt in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-14T00:00:00Z
date_published 2018-03-08T00:00:00Z
source MITRE
title Empire keychaindump_decrypt Module

Github EmpireProject CreateHijacker Dylib

Wardle, P., Ross, C. (2018, April 8). EmpireProject Create Dylib Hijacker. Retrieved April 1, 2021.

Internal MISP references

UUID 2908418d-54cf-4245-92c6-63f616b04e91 which can be used as unique global reference for Github EmpireProject CreateHijacker Dylib in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-01T00:00:00Z
date_published 2018-04-08T00:00:00Z
source MITRE
title EmpireProject Create Dylib Hijacker

Github EmpireProject HijackScanner

Wardle, P., Ross, C. (2017, September 21). Empire Project Dylib Hijack Vulnerability Scanner. Retrieved April 1, 2021.

Internal MISP references

UUID c83e8833-9648-4178-b5be-6fa0af8f737f which can be used as unique global reference for Github EmpireProject HijackScanner in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-01T00:00:00Z
date_published 2017-09-21T00:00:00Z
source MITRE
title Empire Project Dylib Hijack Vulnerability Scanner

Microsoft ASR Nov 2017

Brower, N. & D'Souza-Wiltshire, I. (2017, November 9). Enable Attack surface reduction. Retrieved February 3, 2018.

Internal MISP references

UUID 1cb445f6-a366-4ae6-a698-53da6c61b4c9 which can be used as unique global reference for Microsoft ASR Nov 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-03T00:00:00Z
date_published 2017-11-09T00:00:00Z
source MITRE
title Enable Attack surface reduction

Microsoft TESTSIGNING Feb 2021

Microsoft. (2021, February 15). Enable Loading of Test Signed Drivers. Retrieved April 22, 2021.

Internal MISP references

UUID c04153f9-d4c7-4349-9bef-3f883eec0028 which can be used as unique global reference for Microsoft TESTSIGNING Feb 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-22T00:00:00Z
date_published 2021-02-15T00:00:00Z
source MITRE
title Enable Loading of Test Signed Drivers

Microsoft Disable DCOM

Microsoft. (n.d.). Enable or Disable DCOM. Retrieved November 22, 2017.

Internal MISP references

UUID 1aeac4da-f5fd-4fa3-9cc0-b1a50427c121 which can be used as unique global reference for Microsoft Disable DCOM in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-22T00:00:00Z
source MITRE
title Enable or Disable DCOM

Microsoft Disable Macros

Microsoft. (n.d.). Enable or disable macros in Office files. Retrieved September 13, 2018.

Internal MISP references

UUID cfe592a1-c06d-4555-a30f-c5d533dfd73e which can be used as unique global reference for Microsoft Disable Macros in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-09-13T00:00:00Z
source MITRE
title Enable or disable macros in Office files

Microsoft Remote

Microsoft. (n.d.). Enable the Remote Registry Service. Retrieved May 1, 2015.

Internal MISP references

UUID 331d59e3-ce7f-483c-b77d-001c8a9ae1df which can be used as unique global reference for Microsoft Remote in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-05-01T00:00:00Z
source MITRE
title Enable the Remote Registry Service

PCMag DoubleExtension

PCMag. (n.d.). Encyclopedia: double extension. Retrieved August 4, 2021.

Internal MISP references

UUID a729519d-8c9f-477c-b992-434076a9d294 which can be used as unique global reference for PCMag DoubleExtension in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-04T00:00:00Z
source MITRE
title Encyclopedia: double extension

Microsoft Entra ID App Passwords

Microsoft. (2023, October 23). Enforce Microsoft Entra multifactor authentication with legacy applications using app passwords. Retrieved May 28, 2024.

Internal MISP references

UUID 7787289d-f636-5a26-b182-cd1015879007 which can be used as unique global reference for Microsoft Entra ID App Passwords in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-28T00:00:00Z
date_published 2023-10-23T00:00:00Z
source MITRE
title Enforce Microsoft Entra multifactor authentication with legacy applications using app passwords

FireEye Periscope March 2018

FireEye. (2018, March 16). Suspected Chinese Cyber Espionage Group (TEMP.Periscope) Targeting U.S. Engineering and Maritime Industries. Retrieved April 11, 2018.

Internal MISP references

UUID 8edb5d2b-b5c4-4d9d-8049-43dd6ca9ab7f which can be used as unique global reference for FireEye Periscope March 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-11T00:00:00Z
source MITRE
title Engineering and Maritime Industries

NCCIC AR-17-20045 February 2017

NCCIC. (2017, February 10). Enhanced Analysis of GRIZZLY STEPPE Activity. Retrieved April 12, 2021.

Internal MISP references

UUID b930e838-649b-42ab-86dc-0443667276de which can be used as unique global reference for NCCIC AR-17-20045 February 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-12T00:00:00Z
date_published 2017-02-10T00:00:00Z
source MITRE
title Enhanced Analysis of GRIZZLY STEPPE Activity

ESET Sednit Part 1

ESET. (2016, October). En Route with Sednit - Part 1: Approaching the Target. Retrieved November 8, 2016.

Internal MISP references

UUID a2016103-ead7-46b3-bae5-aa97c45a12b7 which can be used as unique global reference for ESET Sednit Part 1 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-11-08T00:00:00Z
date_published 2016-10-01T00:00:00Z
source MITRE
title En Route with Sednit - Part 1: Approaching the Target

ESET Sednit Part 2

ESET. (2016, October). En Route with Sednit - Part 2: Observing the Comings and Goings. Retrieved November 21, 2016.

Internal MISP references

UUID aefb9eda-df5a-437f-af2a-ec1b6c04628b which can be used as unique global reference for ESET Sednit Part 2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-11-21T00:00:00Z
date_published 2016-10-01T00:00:00Z
source MITRE
title En Route with Sednit - Part 2: Observing the Comings and Goings

ESET Sednit Part 3

ESET. (2016, October). En Route with Sednit - Part 3: A Mysterious Downloader. Retrieved November 21, 2016.

Internal MISP references

UUID 7c2be444-a947-49bc-b5f6-8f6bec870c6a which can be used as unique global reference for ESET Sednit Part 3 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-11-21T00:00:00Z
date_published 2016-10-01T00:00:00Z
source MITRE
title En Route with Sednit - Part 3: A Mysterious Downloader

Google Ensuring Your Information is Safe

Google. (2011, June 1). Ensuring your information is safe online. Retrieved April 1, 2022.

Internal MISP references

UUID ad3eda19-08eb-4d59-a2c9-3b5ed8302205 which can be used as unique global reference for Google Ensuring Your Information is Safe in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-01T00:00:00Z
date_published 2011-06-01T00:00:00Z
source MITRE
title Ensuring your information is safe online

Fortinet Blog November 13 2018

Fortinet Blog. (2018, November 13). Enter The DarkGate - New Cryptocurrency Mining and Ransomware Campaign. Retrieved October 20, 2023.

Internal MISP references

UUID 1b9b5c48-d504-4c73-aedc-37e935c47f17 which can be used as unique global reference for Fortinet Blog November 13 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-20T00:00:00Z
date_published 2018-11-13T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Enter The DarkGate - New Cryptocurrency Mining and Ransomware Campaign

Ensilo Darkgate 2018

Adi Zeligson & Rotem Kerner. (2018, November 13). Enter The DarkGate - New Cryptocurrency Mining and Ransomware Campaign. Retrieved February 9, 2024.

Internal MISP references

UUID 31796564-4154-54c0-958a-7d6802dfefad which can be used as unique global reference for Ensilo Darkgate 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-09T00:00:00Z
date_published 2018-11-13T00:00:00Z
source MITRE
title Enter The DarkGate - New Cryptocurrency Mining and Ransomware Campaign

Splunk DarkGate

Splunk Threat Research Team. (2024, January 17). Enter The Gates: An Analysis of the DarkGate AutoIt Loader. Retrieved March 29, 2024.

Internal MISP references

UUID adc6384c-e0d7-547f-a1e3-2c57ff0525ae which can be used as unique global reference for Splunk DarkGate in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-29T00:00:00Z
date_published 2024-01-17T00:00:00Z
source MITRE
title Enter The Gates: An Analysis of the DarkGate AutoIt Loader

Splunk DarkGate January 17 2024

Splunk Threat Research Team. (2024, January 17). Enter The Gates: An Analysis of the DarkGate AutoIt Loader. Retrieved January 24, 2024.

Internal MISP references

UUID a45a920c-3bda-4442-8650-4ad78f950283 which can be used as unique global reference for Splunk DarkGate January 17 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-24T00:00:00Z
date_published 2024-01-17T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Enter The Gates: An Analysis of the DarkGate AutoIt Loader

Microsoft EnumDeviceDrivers

Microsoft. (2021, October 12). EnumDeviceDrivers function (psapi.h). Retrieved March 28, 2023.

Internal MISP references

UUID 647ffc70-8eab-5f2f-abf4-9bbf42554043 which can be used as unique global reference for Microsoft EnumDeviceDrivers in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-28T00:00:00Z
date_published 2021-10-12T00:00:00Z
source MITRE
title EnumDeviceDrivers function (psapi.h)

EK Clueless Agents

Riordan, J., Schneier, B. (1998, June 18). Environmental Key Generation towards Clueless Agents. Retrieved January 18, 2019.

Internal MISP references

UUID ef7409d2-af39-4ad8-8469-76f0165687bd which can be used as unique global reference for EK Clueless Agents in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-01-18T00:00:00Z
date_published 1998-06-18T00:00:00Z
source MITRE
title Environmental Key Generation towards Clueless Agents

Deloitte Environment Awareness

Torello, A. & Guibernau, F. (n.d.). Environment Awareness. Retrieved September 13, 2024.

Internal MISP references

UUID af842a1f-8f39-4b4f-b4d2-0bbb810e6c31 which can be used as unique global reference for Deloitte Environment Awareness in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-13T00:00:00Z
source MITRE
title Environment Awareness

Microsoft Environment Property

Microsoft. (2011, October 24). Environment Property. Retrieved July 27, 2016.

Internal MISP references

UUID 64598969-864d-4bc7-805e-c289cccb7bc6 which can be used as unique global reference for Microsoft Environment Property in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-07-27T00:00:00Z
date_published 2011-10-24T00:00:00Z
source MITRE
title Environment Property

MSDN Environment Property

Microsoft. (n.d.). Environment Property. Retrieved July 27, 2016.

Internal MISP references

UUID 79ea888c-2dd7-40cb-9149-e2469a35ea3a which can be used as unique global reference for MSDN Environment Property in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-07-27T00:00:00Z
source MITRE
title Environment Property

Kaspersky Equation QA

Kaspersky Lab's Global Research and Analysis Team. (2015, February). Equation Group: Questions and Answers. Retrieved December 21, 2015.

Internal MISP references

UUID 34674802-fbd9-4cdb-8611-c58665c430e5 which can be used as unique global reference for Kaspersky Equation QA in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-12-21T00:00:00Z
date_published 2015-02-01T00:00:00Z
source MITRE, Tidal Cyber
title Equation Group: Questions and Answers

erase_cmd_cisco

Cisco. (2022, August 16). erase - Cisco IOS Configuration Fundamentals Command Reference . Retrieved July 13, 2022.

Internal MISP references

UUID 4c90eba9-118e-5d50-ad58-27bcb0e1e228 which can be used as unique global reference for erase_cmd_cisco in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-13T00:00:00Z
date_published 2022-08-16T00:00:00Z
source MITRE
title erase - Cisco IOS Configuration Fundamentals Command Reference

Container Escape

0xn3va. (n.d.). Escaping. Retrieved May 27, 2022.

Internal MISP references

UUID 8248917a-9afd-4ec6-a086-1a97a68deff1 which can be used as unique global reference for Container Escape in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-27T00:00:00Z
source MITRE
title Escaping

Microsoft Esentutl

Microsoft. (2016, August 30). Esentutl. Retrieved September 3, 2019.

Internal MISP references

UUID 08fb9e84-495f-4710-bd1e-417eb8191a10 which can be used as unique global reference for Microsoft Esentutl in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-03T00:00:00Z
date_published 2016-08-30T00:00:00Z
source MITRE
title Esentutl

LOLBAS Esentutl

LOLBAS. (n.d.). Esentutl.exe. Retrieved September 3, 2019.

Internal MISP references

UUID 691b4907-3544-4ad0-989c-b5c845e0330f which can be used as unique global reference for LOLBAS Esentutl in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-03T00:00:00Z
source MITRE
title Esentutl.exe

ESET APT Activity Report Q4 2023-Q1 2024

ESET Research. (2024, May 14). ESET APT Activity Report Q4 2023-Q1 2024. Retrieved September 1, 2024.

Internal MISP references

UUID 896cc899-b667-4f9d-ba90-8650fb978535 which can be used as unique global reference for ESET APT Activity Report Q4 2023-Q1 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-01T00:00:00Z
date_published 2024-05-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title ESET APT Activity Report Q4 2023-Q1 2024

ESET Twitter Ida Pro Nov 2021

Cherepanov, Anton. (2019, November 10). ESETresearch discovered a trojanized IDA Pro installer. Retrieved September 12, 2024.

Internal MISP references

UUID 6d079207-a7c0-4023-b504-1010dd538221 which can be used as unique global reference for ESET Twitter Ida Pro Nov 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2019-11-10T00:00:00Z
source MITRE
title ESETresearch discovered a trojanized IDA Pro installer

ESET PowerPool Code October 2020

ESET Research. (2020, October 1). ESET Research Tweet Linking Slothfulmedia and PowerPool. Retrieved September 12, 2024.

Internal MISP references

UUID d583b409-35bd-45ea-8f2a-c0d566a6865b which can be used as unique global reference for ESET PowerPool Code October 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2020-10-01T00:00:00Z
source MITRE
title ESET Research Tweet Linking Slothfulmedia and PowerPool

ESET FinFisher Jan 2018

Kafka, F. (2018, January). ESET's Guide to Deobfuscating and Devirtualizing FinFisher. Retrieved August 12, 2019.

Internal MISP references

UUID be169308-19e8-4ee9-8ff6-e08eb9291ef8 which can be used as unique global reference for ESET FinFisher Jan 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-08-12T00:00:00Z
date_published 2018-01-01T00:00:00Z
source MITRE
title ESET's Guide to Deobfuscating and Devirtualizing FinFisher

ESET Trickbot Oct 2020

Boutin, J. (2020, October 12). ESET takes part in global operation to disrupt Trickbot. Retrieved March 15, 2021.

Internal MISP references

UUID c3320c11-4631-4e02-8025-5c1e5b54e521 which can be used as unique global reference for ESET Trickbot Oct 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-15T00:00:00Z
date_published 2020-10-12T00:00:00Z
source MITRE
title ESET takes part in global operation to disrupt Trickbot

WeLiveSecurity April 19 2022

Jean-Ian Boutin, Tomáš Procházka. (2022, April 19). ESET takes part in global operation to disrupt Zloader botnets | WeLiveSecurity. Retrieved May 10, 2023.

Internal MISP references

UUID f86845b9-03c4-446b-845f-b31b79b247ee which can be used as unique global reference for WeLiveSecurity April 19 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-10T00:00:00Z
date_published 2022-04-19T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title ESET takes part in global operation to disrupt Zloader botnets

Riskiq Remcos Jan 2018

Klijnsma, Y. (2018, January 23). Espionage Campaign Leverages Spear Phishing, RATs Against Turkish Defense Contractors. Retrieved November 6, 2018.

Internal MISP references

UUID a641a41c-dcd8-47e5-9b29-109dd2eb7f1e which can be used as unique global reference for Riskiq Remcos Jan 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-06T00:00:00Z
date_published 2018-01-23T00:00:00Z
source MITRE
title Espionage Campaign Leverages Spear Phishing, RATs Against Turkish Defense Contractors

EventLog_Core_Technologies

Core Technologies. (2021, May 24). Essential Windows Services: EventLog / Windows Event Log. Retrieved September 14, 2021.

Internal MISP references

UUID 2a1f452f-57b6-4764-b474-befa7787642d which can be used as unique global reference for EventLog_Core_Technologies in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-14T00:00:00Z
date_published 2021-05-24T00:00:00Z
source MITRE
title Essential Windows Services: EventLog / Windows Event Log

ISACA Malware Tricks

Kolbitsch, C. (2017, November 1). Evasive Malware Tricks: How Malware Evades Detection by Sandboxes. Retrieved March 30, 2021.

Internal MISP references

UUID a071bf02-066b-46e6-a554-f43d0c170807 which can be used as unique global reference for ISACA Malware Tricks in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-30T00:00:00Z
date_published 2017-11-01T00:00:00Z
source MITRE
title Evasive Malware Tricks: How Malware Evades Detection by Sandboxes

ThreatStream Evasion Analysis

Shelmire, A.. (2015, July 6). Evasive Maneuvers. Retrieved January 22, 2016.

Internal MISP references

UUID de6bc044-6275-4cab-80a1-feefebd3c1f0 which can be used as unique global reference for ThreatStream Evasion Analysis in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-22T00:00:00Z
date_published 2015-07-06T00:00:00Z
source MITRE
title Evasive Maneuvers

Anomali Evasive Maneuvers July 2015

Shelmire, A. (2015, July 06). Evasive Maneuvers by the Wekby group with custom ROP-packing and DNS covert channels. Retrieved November 15, 2018.

Internal MISP references

UUID 471ae30c-2753-468e-8e4d-6e7a3be599c9 which can be used as unique global reference for Anomali Evasive Maneuvers July 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-15T00:00:00Z
date_published 2015-07-06T00:00:00Z
source MITRE
title Evasive Maneuvers by the Wekby group with custom ROP-packing and DNS covert channels

ESET EvasivePanda 2023

Facundo Muñoz. (2023, April 26). Evasive Panda APT group delivers malware via updates for popular Chinese software. Retrieved July 25, 2024.

Internal MISP references

UUID 08026c7e-cc35-5d51-9536-a02febd1a891 which can be used as unique global reference for ESET EvasivePanda 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-25T00:00:00Z
date_published 2023-04-26T00:00:00Z
source MITRE
title Evasive Panda APT group delivers malware via updates for popular Chinese software

ESET EvasivePanda 2024

Ahn Ho, Facundo Muñoz, & Marc-Etienne M.Léveillé. (2024, March 7). Evasive Panda leverages Monlam Festival to target Tibetans. Retrieved July 25, 2024.

Internal MISP references

UUID 07e6b866-7119-50ad-8a6e-80c4e0d594bf which can be used as unique global reference for ESET EvasivePanda 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-25T00:00:00Z
date_published 2024-03-07T00:00:00Z
source MITRE
title Evasive Panda leverages Monlam Festival to target Tibetans

Unit42 OilRig Playbook 2023

Unit42. (2016, May 1). Evasive Serpens Unit 42 Playbook Viewer. Retrieved February 6, 2023.

Internal MISP references

UUID e38902bb-9bab-5beb-817b-668a67a76541 which can be used as unique global reference for Unit42 OilRig Playbook 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-06T00:00:00Z
date_published 2016-05-01T00:00:00Z
source MITRE
title Evasive Serpens Unit 42 Playbook Viewer

Microsoft EventLog.Clear

Microsoft. (n.d.). EventLog.Clear Method (). Retrieved July 2, 2018.

Internal MISP references

UUID b2711ad3-981c-4c77-bb64-643b547bfda6 which can be used as unique global reference for Microsoft EventLog.Clear in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-02T00:00:00Z
source MITRE
title EventLog.Clear Method ()

evt_log_tampering

svch0st. (2020, September 30). Event Log Tampering Part 1: Disrupting the EventLog Service. Retrieved September 14, 2021.

Internal MISP references

UUID 7757bbc6-8058-4584-a5aa-14b647d932a6 which can be used as unique global reference for evt_log_tampering in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-14T00:00:00Z
date_published 2020-09-30T00:00:00Z
source MITRE
title Event Log Tampering Part 1: Disrupting the EventLog Service

Microsoft ETW May 2018

Microsoft. (2018, May 30). Event Tracing. Retrieved September 6, 2018.

Internal MISP references

UUID 876f8690-1874-41c0-bd38-d3bd41c96acc which can be used as unique global reference for Microsoft ETW May 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-09-06T00:00:00Z
date_published 2018-05-30T00:00:00Z
source MITRE
title Event Tracing

Eventvwr.exe - LOLBAS Project

LOLBAS. (2018, November 1). Eventvwr.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 0c09812a-a936-4282-b574-35a00f631857 which can be used as unique global reference for Eventvwr.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-11-01T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Eventvwr.exe

Secure Ideas SMB Relay

Kuehn, E. (2018, April 11). Ever Run a Relay? Why SMB Relays Should Be On Your Mind. Retrieved February 7, 2019.

Internal MISP references

UUID ac4b2e91-f338-44c3-8950-435102136991 which can be used as unique global reference for Secure Ideas SMB Relay in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-07T00:00:00Z
date_published 2018-04-11T00:00:00Z
source MITRE
title Ever Run a Relay? Why SMB Relays Should Be On Your Mind

CSV Excel Macro Injection

Ishaq Mohammed . (2021, January 10). Everything about CSV Injection and CSV Excel Macro Injection. Retrieved February 7, 2022.

Internal MISP references

UUID 22c871ff-2701-4809-9f5b-fb29da7481e8 which can be used as unique global reference for CSV Excel Macro Injection in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-07T00:00:00Z
date_published 2021-01-10T00:00:00Z
source MITRE
title Everything about CSV Injection and CSV Excel Macro Injection

Avertium callback phishing

Avertium. (n.d.). EVERYTHING YOU NEED TO KNOW ABOUT CALLBACK PHISHING. Retrieved February 2, 2023.

Internal MISP references

UUID abeb1146-e5e5-5ecc-9b70-b348fba097f6 which can be used as unique global reference for Avertium callback phishing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-02T00:00:00Z
source MITRE
title EVERYTHING YOU NEED TO KNOW ABOUT CALLBACK PHISHING

Outpost24 April 5 2023

Alberto Marín. (2023, April 5). Everything you need to know about the LummaC2 stealer Leveraging IDA Python and Unicorn to deobfuscate Windows API hashing. Retrieved October 10, 2024.

Internal MISP references

UUID 60bd2e39-744c-44e7-b417-0ef0a768f7b6 which can be used as unique global reference for Outpost24 April 5 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-10T00:00:00Z
date_published 2023-04-05T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Everything you need to know about the LummaC2 stealer Leveraging IDA Python and Unicorn to deobfuscate Windows API hashing

Intezer Aurora Sept 2017

Rosenberg, J. (2017, September 20). Evidence Aurora Operation Still Active: Supply Chain Attack Through CCleaner. Retrieved February 13, 2018.

Internal MISP references

UUID b2999bd7-50d5-4d49-8893-8c0903d49104 which can be used as unique global reference for Intezer Aurora Sept 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-13T00:00:00Z
date_published 2017-09-20T00:00:00Z
source MITRE
title Evidence Aurora Operation Still Active: Supply Chain Attack Through CCleaner

Cyphort EvilBunny Dec 2014

Marschalek, M.. (2014, December 16). EvilBunny: Malware Instrumented By Lua. Retrieved June 28, 2019.

Internal MISP references

UUID a0218d0f-3378-4508-9d3c-a7cd3e00a156 which can be used as unique global reference for Cyphort EvilBunny Dec 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-28T00:00:00Z
date_published 2014-12-16T00:00:00Z
source MITRE
title EvilBunny: Malware Instrumented By Lua

Cyphort EvilBunny

Marschalek, Marion. (2014, December 16). EvilBunny: Malware Instrumented By Lua. Retrieved August 5, 2024.

Internal MISP references

UUID 21536444-7287-55f7-8e11-c97dcb85398d which can be used as unique global reference for Cyphort EvilBunny in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-05T00:00:00Z
date_published 2014-12-16T00:00:00Z
source MITRE
title EvilBunny: Malware Instrumented By Lua

Evil Clippy May 2019

Hegt, S. (2019, May 5). Evil Clippy: MS Office maldoc assistant. Retrieved September 17, 2020.

Internal MISP references

UUID aafa27e8-5df7-4fc6-9fe5-9a438f2b507a which can be used as unique global reference for Evil Clippy May 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-17T00:00:00Z
date_published 2019-05-05T00:00:00Z
source MITRE
title Evil Clippy: MS Office maldoc assistant

Cyble August 19 2022

Cybleinc. (2022, August 19). EvilCoder Project Selling Multiple Dangerous Tools Online. Retrieved May 10, 2023.

Internal MISP references

UUID 7b5617f8-5d0d-4185-97c7-82acf023f3c3 which can be used as unique global reference for Cyble August 19 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-10T00:00:00Z
date_published 2022-08-19T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title EvilCoder Project Selling Multiple Dangerous Tools Online

Evilginx 2 July 2018

Gretzky, K.. (2018, July 26). Evilginx 2 - Next Generation of Phishing 2FA Tokens. Retrieved October 14, 2019.

Internal MISP references

UUID 9099b5aa-25eb-4cb7-9e3a-da4c3244f15a which can be used as unique global reference for Evilginx 2 July 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-14T00:00:00Z
date_published 2018-07-26T00:00:00Z
source MITRE
title Evilginx 2 - Next Generation of Phishing 2FA Tokens

Evilginx Sources & Methods December 2023

Matthew Conway. (2023, December 14). Evilginx Phishing Proxy. Retrieved January 3, 2023.

Internal MISP references

UUID 13bdabb2-5956-492a-baf9-b0c3a0629806 which can be used as unique global reference for Evilginx Sources & Methods December 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-01-03T00:00:00Z
date_published 2023-12-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Evilginx Phishing Proxy

SentinelOne EvilQuest Ransomware Spyware 2020

Phil Stokes. (2020, July 8). “EvilQuest” Rolls Ransomware, Spyware & Data Theft Into One. Retrieved April 1, 2021.

Internal MISP references

UUID 4dc26c77-d0ce-4836-a4cc-0490b6d7f115 which can be used as unique global reference for SentinelOne EvilQuest Ransomware Spyware 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-01T00:00:00Z
date_published 2020-07-08T00:00:00Z
source MITRE
title “EvilQuest” Rolls Ransomware, Spyware & Data Theft Into One

Kaspersky evil twin

AO Kaspersky Lab. (n.d.). Evil twin attacks and how to prevent them. Retrieved September 17, 2024.

Internal MISP references

UUID 230f15c3-79dd-5272-88b5-e9d5de9556f1 which can be used as unique global reference for Kaspersky evil twin in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-17T00:00:00Z
source MITRE
title Evil twin attacks and how to prevent them

Cisco Synful Knock Evolution

Graham Holmes. (2015, October 8). Evolution of attacks on Cisco IOS devices. Retrieved October 19, 2020.

Internal MISP references

UUID 29301297-8343-4f75-8096-7fe229812f75 which can be used as unique global reference for Cisco Synful Knock Evolution in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
date_published 2015-10-08T00:00:00Z
source MITRE
title Evolution of attacks on Cisco IOS devices

SCILabs URSA/Mispadu Evolution 2023

SCILabs. (2023, May 23). Evolution of banking trojan URSA/Mispadu. Retrieved March 13, 2024.

Internal MISP references

UUID a7a0db8d-bc1c-5e89-8c42-a3a6cc2cf28d which can be used as unique global reference for SCILabs URSA/Mispadu Evolution 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-13T00:00:00Z
date_published 2023-05-23T00:00:00Z
source MITRE
title Evolution of banking trojan URSA/Mispadu

Securelist JSWorm

Fedor Sinitsyn. (2021, May 25). Evolution of JSWorm Ransomware. Retrieved August 18, 2021.

Internal MISP references

UUID c29ca9f2-1e48-4913-b10b-15e558868ed8 which can be used as unique global reference for Securelist JSWorm in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-18T00:00:00Z
date_published 2021-05-25T00:00:00Z
source MITRE
title Evolution of JSWorm Ransomware

S2 Grupo TrickBot June 2017

Salinas, M., Holguin, J. (2017, June). Evolution of Trickbot. Retrieved July 31, 2018.

Internal MISP references

UUID 28faff77-3e68-4f5c-974d-dc7c9d06ce5e which can be used as unique global reference for S2 Grupo TrickBot June 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-31T00:00:00Z
date_published 2017-06-01T00:00:00Z
source MITRE
title Evolution of Trickbot

Unit 42 Valak July 2020

Duncan, B. (2020, July 24). Evolution of Valak, from Its Beginnings to Mass Distribution. Retrieved August 31, 2020.

Internal MISP references

UUID 9a96da13-5795-49bc-ab82-dfd4f964d9d0 which can be used as unique global reference for Unit 42 Valak July 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-31T00:00:00Z
date_published 2020-07-24T00:00:00Z
source MITRE
title Evolution of Valak, from Its Beginnings to Mass Distribution

Microsoft - Device Registration

Microsoft 365 Defender Threat Intelligence Team. (2022, January 26). Evolved phishing: Device registration trick adds to phishers’ toolbox for victims without MFA. Retrieved March 4, 2022.

Internal MISP references

UUID 3f42fc18-2adc-46ef-ae0a-c2d530518435 which can be used as unique global reference for Microsoft - Device Registration in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-04T00:00:00Z
date_published 2022-01-26T00:00:00Z
source MITRE
title Evolved phishing: Device registration trick adds to phishers’ toolbox for victims without MFA

Amnesty OAuth Phishing Attacks, August 2019

Amnesty International. (2019, August 16). Evolving Phishing Attacks Targeting Journalists and Human Rights Defenders from the Middle-East and North Africa. Retrieved October 8, 2019.

Internal MISP references

UUID 0b0f9cf6-f0af-4f86-9699-a63ff36c49e2 which can be used as unique global reference for Amnesty OAuth Phishing Attacks, August 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-08T00:00:00Z
date_published 2019-08-16T00:00:00Z
source MITRE
title Evolving Phishing Attacks Targeting Journalists and Human Rights Defenders from the Middle-East and North Africa

RSAC 2015 Abu Dhabi Stefano Maccaglia

Maccaglia, S. (2015, November 4). Evolving Threats: dissection of a CyberEspionage attack. Retrieved April 4, 2018.

Internal MISP references

UUID a6cb597e-e25b-4f49-bbb0-d270b1ac53f2 which can be used as unique global reference for RSAC 2015 Abu Dhabi Stefano Maccaglia in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-04T00:00:00Z
date_published 2015-11-04T00:00:00Z
source MITRE
title Evolving Threats: dissection of a CyberEspionage attack

MSTIC. (2021, November 16). Evolving trends in Iranian threat actor activity – MSTIC presentation at CyberWarCon 2021. Retrieved January 12, 2023.

Internal MISP references

UUID 78d39ee7-1cd5-5cb8-844a-1c3649e367a1 which can be used as unique global reference for Microsoft Iranian Threat Actor Trends November 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-01-12T00:00:00Z
date_published 2021-11-16T00:00:00Z
source MITRE
title Evolving trends in Iranian threat actor activity – MSTIC presentation at CyberWarCon 2021

Palo Alto Unit 42 VBA Infostealer 2014

Vicky Ray and Rob Downs. (2014, October 29). Examining a VBA-Initiated Infostealer Campaign. Retrieved March 13, 2023.

Internal MISP references

UUID c3eccab6-b12b-513a-9a04-396f7b3dcf63 which can be used as unique global reference for Palo Alto Unit 42 VBA Infostealer 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-13T00:00:00Z
date_published 2014-10-29T00:00:00Z
source MITRE
title Examining a VBA-Initiated Infostealer Campaign

Trend Micro Black Basta May 2022

Gonzalez, I., Chavez I., et al. (2022, May 9). Examining the Black Basta Ransomware’s Infection Routine. Retrieved March 7, 2023.

Internal MISP references

UUID b0351b0a-112f-543f-8909-f4b4a9f23e2e which can be used as unique global reference for Trend Micro Black Basta May 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-07T00:00:00Z
date_published 2022-05-09T00:00:00Z
source MITRE
title Examining the Black Basta Ransomware’s Infection Routine

Mandiant Glyer APT 2010

Glyer, C. (2010). Examples of Recent APT Persistence Mechanism. Retrieved December 18, 2020.

Internal MISP references

UUID bb336a6f-d76e-4535-ba81-0c7932ae91e3 which can be used as unique global reference for Mandiant Glyer APT 2010 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-18T00:00:00Z
date_published 2010-01-01T00:00:00Z
source MITRE
title Examples of Recent APT Persistence Mechanism

Excel.exe - LOLBAS Project

LOLBAS. (2019, July 19). Excel.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 9a2458f7-63ca-4eca-8c61-b6098ec0798f which can be used as unique global reference for Excel.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2019-07-19T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Excel.exe

Microsoft Tim McMichael Exchange Mail Forwarding 2

McMichael, T.. (2015, June 8). Exchange and Office 365 Mail Forwarding. Retrieved October 8, 2019.

Internal MISP references

UUID b5bf8e12-0133-46ea-85e3-b48c9901b518 which can be used as unique global reference for Microsoft Tim McMichael Exchange Mail Forwarding 2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-08T00:00:00Z
date_published 2015-06-08T00:00:00Z
source MITRE
title Exchange and Office 365 Mail Forwarding

DFIR Phosphorus November 2021

DFIR Report. (2021, November 15). Exchange Exploit Leads to Domain Wide Ransomware. Retrieved January 5, 2023.

Internal MISP references

UUID 0156d408-a36d-5876-96fd-f0b0cf296ea2 which can be used as unique global reference for DFIR Phosphorus November 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-01-05T00:00:00Z
date_published 2021-11-15T00:00:00Z
source MITRE
title Exchange Exploit Leads to Domain Wide Ransomware

Mandiant UNC2596 Cuba Ransomware February 2022

Tyler McLellan, Joshua Shilko, Shambavi Sadayappan. (2022, February 23). (Ex)Change of Pace: UNC2596 Observed Leveraging Vulnerabilities to Deploy Cuba Ransomware. Retrieved May 19, 2023.

Internal MISP references

UUID c03c0f35-3b86-4733-8a2c-71524f0e3d17 which can be used as unique global reference for Mandiant UNC2596 Cuba Ransomware February 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-19T00:00:00Z
date_published 2022-02-23T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title (Ex)Change of Pace: UNC2596 Observed Leveraging Vulnerabilities to Deploy Cuba Ransomware

ExchangePowerShell Module

Microsoft. (2017, September 25). ExchangePowerShell. Retrieved June 10, 2022.

Internal MISP references

UUID 8af67c2a-15e2-48c9-9ec2-b62ffca0f677 which can be used as unique global reference for ExchangePowerShell Module in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-10T00:00:00Z
date_published 2017-09-25T00:00:00Z
source MITRE
title ExchangePowerShell

ESET Exchange Mar 2021

Faou, M., Tartare, M., Dupuy, T. (2021, March 10). Exchange servers under siege from at least 10 APT groups. Retrieved May 21, 2021.

Internal MISP references

UUID c83f1810-22bb-4def-ab2f-3f3d67703f47 which can be used as unique global reference for ESET Exchange Mar 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-05-21T00:00:00Z
date_published 2021-03-10T00:00:00Z
source MITRE, Tidal Cyber
title Exchange servers under siege from at least 10 APT groups

Executable Installers are Vulnerable

Stefan Kanthak. (2015, December 8). Executable installers are vulnerable^WEVIL (case 7): 7z*.exe allows remote code execution with escalation of privilege. Retrieved December 4, 2014.

Internal MISP references

UUID 5c2791d4-556d-426a-b305-44e23b50f013 which can be used as unique global reference for Executable Installers are Vulnerable in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-12-04T00:00:00Z
date_published 2015-12-08T00:00:00Z
source MITRE
title Executable installers are vulnerable^WEVIL (case 7): 7z*.exe allows remote code execution with escalation of privilege

Seclists Kanthak 7zip Installer

Kanthak, S. (2015, December 8). Executable installers are vulnerable^WEVIL (case 7): 7z*.exe allows remote code execution with escalation of privilege. Retrieved March 10, 2017.

Internal MISP references

UUID f2ebfc35-1bd9-4bc5-8a54-e2dea4e1caf5 which can be used as unique global reference for Seclists Kanthak 7zip Installer in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-10T00:00:00Z
date_published 2015-12-08T00:00:00Z
source MITRE
title Executable installers are vulnerable^WEVIL (case 7): 7z*.exe allows remote code execution with escalation of privilege

Redxorblue Remote Template Injection

Hawkins, J. (2018, July 18). Executing Macros From a DOCX With Remote Template Injection. Retrieved October 12, 2018.

Internal MISP references

UUID bce1cd78-b55e-40cf-8a90-64240db867ac which can be used as unique global reference for Redxorblue Remote Template Injection in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-10-12T00:00:00Z
date_published 2018-07-18T00:00:00Z
source MITRE
title Executing Macros From a DOCX With Remote Template Injection

Microsoft PSfromCsharp APR 2014

Babinec, K. (2014, April 28). Executing PowerShell scripts from C#. Retrieved April 22, 2019.

Internal MISP references

UUID 83e346d5-1894-4c46-98eb-88a61ce7f003 which can be used as unique global reference for Microsoft PSfromCsharp APR 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-22T00:00:00Z
date_published 2014-04-28T00:00:00Z
source MITRE
title Executing PowerShell scripts from C#

PAM Creds

Fernández, J. M. (2018, June 27). Exfiltrating credentials via PAM backdoors & DNS requests. Retrieved June 26, 2020.

Internal MISP references

UUID aa9d5bdd-2102-4322-8736-56db8e083fc0 which can be used as unique global reference for PAM Creds in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-26T00:00:00Z
date_published 2018-06-27T00:00:00Z
source MITRE
title Exfiltrating credentials via PAM backdoors & DNS requests

Microsoft Expand Utility

Microsoft. (2017, October 15). Expand. Retrieved February 19, 2019.

Internal MISP references

UUID bf73a375-87b7-4603-8734-9f3d8d11967e which can be used as unique global reference for Microsoft Expand Utility in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-19T00:00:00Z
date_published 2017-10-15T00:00:00Z
source MITRE
title Expand

LOLBAS Expand

LOLBAS. (n.d.). Expand.exe. Retrieved February 19, 2019.

Internal MISP references

UUID 689b058e-a4ec-45bf-b0f8-8885eb8d8b63 which can be used as unique global reference for LOLBAS Expand in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-02-19T00:00:00Z
source MITRE
title Expand.exe

polymorphic-medium

Shellseekercyber. (2024, January 7). Explainer: Packed Malware. Retrieved September 27, 2024.

Internal MISP references

UUID f7ffa0ee-80d4-5ed8-a432-23a33cbf2752 which can be used as unique global reference for polymorphic-medium in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-27T00:00:00Z
date_published 2024-01-07T00:00:00Z
source MITRE
title Explainer: Packed Malware

Proofpoint WinterVivern 2023

Michael Raggi & The Proofpoint Threat Research Team. (2023, March 30). Exploitation is a Dish Best Served Cold: Winter Vivern Uses Known Zimbra Vulnerability to Target Webmail Portals of NATO-Aligned Governments in Europe. Retrieved July 29, 2024.

Internal MISP references

UUID 45f638af-ad10-566e-9e4d-49385a79022f which can be used as unique global reference for Proofpoint WinterVivern 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-29T00:00:00Z
date_published 2023-03-30T00:00:00Z
source MITRE
title Exploitation is a Dish Best Served Cold: Winter Vivern Uses Known Zimbra Vulnerability to Target Webmail Portals of NATO-Aligned Governments in Europe

Mandiant CVE-2023-3519 Exploitation

James Nugent, Foti Castelan, Doug Bienstock, Justin Moore, Josh Murchie. (2023, July 21). Exploitation of Citrix Zero-Day by Possible Espionage Actors (CVE-2023-3519). Retrieved July 24, 2023.

Internal MISP references

UUID 4404ed65-3020-453d-8c51-2885018ba03b which can be used as unique global reference for Mandiant CVE-2023-3519 Exploitation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-24T00:00:00Z
date_published 2023-07-21T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Exploitation of Citrix Zero-Day by Possible Espionage Actors (CVE-2023-3519)

Exploit Database

Offensive Security. (n.d.). Exploit Database. Retrieved October 15, 2020.

Internal MISP references

UUID 38f7b3ea-9959-4dfb-8216-a745d071e7e2 which can be used as unique global reference for Exploit Database in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-15T00:00:00Z
source MITRE
title Exploit Database

Rhino Labs Cloud Image Backdoor Technique Sept 2019

Rhino Labs. (2019, August). Exploiting AWS ECR and ECS with the Cloud Container Attack Tool (CCAT). Retrieved September 12, 2019.

Internal MISP references

UUID 8fb46ed8-0c21-4b57-b2a6-89cb28f0abaf which can be used as unique global reference for Rhino Labs Cloud Image Backdoor Technique Sept 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-12T00:00:00Z
date_published 2019-08-01T00:00:00Z
source MITRE
title Exploiting AWS ECR and ECS with the Cloud Container Attack Tool (CCAT)

Azure AD PTA Vulnerabilities

Dr. Nestori Syynimaa. (2022, September 20). Exploiting Azure AD PTA vulnerabilities: Creating backdoor and harvesting credentials. Retrieved September 28, 2022.

Internal MISP references

UUID a0ddb60b-5445-46b3-94c5-b47e76de553d which can be used as unique global reference for Azure AD PTA Vulnerabilities in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-28T00:00:00Z
date_published 2022-09-20T00:00:00Z
source MITRE
title Exploiting Azure AD PTA vulnerabilities: Creating backdoor and harvesting credentials

Exploiting Smartphone USB

Zhaohui Wang & Angelos Stavrou. (n.d.). Exploiting Smart-Phone USB Connectivity For Fun And Profit. Retrieved May 25, 2022.

Internal MISP references

UUID 573796bd-4553-4ae1-884a-9af71b5de873 which can be used as unique global reference for Exploiting Smartphone USB in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-25T00:00:00Z
source MITRE
title Exploiting Smart-Phone USB Connectivity For Fun And Profit

versprite xpc vpn

VerSprite. (2018, January 24). Exploiting VyprVPN for MacOS. Retrieved April 20, 2022.

Internal MISP references

UUID 5e65d8cc-142b-4724-8a07-8e21558e0f64 which can be used as unique global reference for versprite xpc vpn in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-20T00:00:00Z
date_published 2018-01-24T00:00:00Z
source MITRE
title Exploiting VyprVPN for MacOS

Explorer.exe - LOLBAS Project

LOLBAS. (2020, June 24). Explorer.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 9ba3d54c-02d1-45bd-bfe8-939e84d9d44b which can be used as unique global reference for Explorer.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2020-06-24T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Explorer.exe

Palo Alto Unit 42 Google Workspace Domain Wide Delegation 2023

Zohar Zigdon. (2023, November 30). Exploring a Critical Risk in Google Workspace's Domain-Wide Delegation Feature. Retrieved January 16, 2024.

Internal MISP references

UUID cd76910f-1c15-50fb-a942-f19b6cc1ca69 which can be used as unique global reference for Palo Alto Unit 42 Google Workspace Domain Wide Delegation 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-16T00:00:00Z
date_published 2023-11-30T00:00:00Z
source MITRE
title Exploring a Critical Risk in Google Workspace's Domain-Wide Delegation Feature

Trend Micro Emotet Jan 2019

Trend Micro. (2019, January 16). Exploring Emotet's Activities . Retrieved March 25, 2019.

Internal MISP references

UUID a81f1dad-5841-4142-80c1-483b240fd67d which can be used as unique global reference for Trend Micro Emotet Jan 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-25T00:00:00Z
date_published 2019-01-16T00:00:00Z
source MITRE
title Exploring Emotet's Activities

SecurityTrails Google Hacking

Borges, E. (2019, March 5). Exploring Google Hacking Techniques. Retrieved September 12, 2024.

Internal MISP references

UUID 3e7fdeaf-24a7-4cb5-8ed3-6057c9035303 which can be used as unique global reference for SecurityTrails Google Hacking in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2019-03-05T00:00:00Z
source MITRE
title Exploring Google Hacking Techniques

Medium SSL Cert

Jain, M. (2019, September 16). Export & Download — SSL Certificate from Server (Site URL). Retrieved October 20, 2020.

Internal MISP references

UUID 6502425f-3435-4162-8c96-9e10a789d362 which can be used as unique global reference for Medium SSL Cert in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
date_published 2019-09-16T00:00:00Z
source MITRE
title Export & Download — SSL Certificate from Server (Site URL)

TrendMicro Exposed Redis 2020

David Fiser and Jaromir Horejsi. (2020, April 21). Exposed Redis Instances Abused for Remote Code Execution, Cryptocurrency Mining. Retrieved September 25, 2024.

Internal MISP references

UUID 58e61406-a8ca-52a8-be48-ef6066619a8a which can be used as unique global reference for TrendMicro Exposed Redis 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-25T00:00:00Z
date_published 2020-04-21T00:00:00Z
source MITRE
title Exposed Redis Instances Abused for Remote Code Execution, Cryptocurrency Mining

Magnet Forensics

Magnet Forensics. (2020, August 24). Expose Evidence of Timestomping with the NTFS Timestamp Mismatch Artifact. Retrieved June 20, 2024.

Internal MISP references

UUID 3971c8ac-4fdd-5e19-ac8a-b8d7abbaebe3 which can be used as unique global reference for Magnet Forensics in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-20T00:00:00Z
date_published 2020-08-24T00:00:00Z
source MITRE
title Expose Evidence of Timestomping with the NTFS Timestamp Mismatch Artifact

Google EXOTIC LILY March 2022

Stolyarov, V. (2022, March 17). Exposing initial access broker with ties to Conti. Retrieved August 18, 2022.

Internal MISP references

UUID 19d2cb48-bdb2-41fe-ba24-0769d7bd4d94 which can be used as unique global reference for Google EXOTIC LILY March 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-18T00:00:00Z
date_published 2022-03-17T00:00:00Z
source MITRE
title Exposing initial access broker with ties to Conti

Microsoft POLONIUM June 2022

Microsoft. (2022, June 2). Exposing POLONIUM activity and infrastructure targeting Israeli organizations. Retrieved July 1, 2022.

Internal MISP references

UUID 689ff1ab-9fed-4aa2-8e5e-78dac31e6fbd which can be used as unique global reference for Microsoft POLONIUM June 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-01T00:00:00Z
date_published 2022-06-02T00:00:00Z
source MITRE
title Exposing POLONIUM activity and infrastructure targeting Israeli organizations

External to DA, the OS X Way

Alex Rymdeko-Harvey, Steve Borosh. (2016, May 14). External to DA, the OS X Way. Retrieved September 12, 2024.

Internal MISP references

UUID b714e6a9-5c12-4a3b-89f9-d379c0284f06 which can be used as unique global reference for External to DA, the OS X Way in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2016-05-14T00:00:00Z
source MITRE
title External to DA, the OS X Way

Extexport.exe - LOLBAS Project

LOLBAS. (2018, May 25). Extexport.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 2aa09a10-a492-4753-bbd8-aacd31e4fee3 which can be used as unique global reference for Extexport.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Extexport.exe

Extrac32.exe - LOLBAS Project

LOLBAS. (2018, May 25). Extrac32.exe. Retrieved December 4, 2023.

Internal MISP references

UUID ae632afc-336c-488e-81f6-91ffe1829595 which can be used as unique global reference for Extrac32.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Extrac32.exe

Journey into IR ZeroAccess NTFS EA

Harrell, C. (2012, December 11). Extracting ZeroAccess from NTFS Extended Attributes. Retrieved June 3, 2016.

Internal MISP references

UUID e9dff187-fe7d-469d-81cb-30ad520dbd3d which can be used as unique global reference for Journey into IR ZeroAccess NTFS EA in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-03T00:00:00Z
date_published 2012-12-11T00:00:00Z
source MITRE
title Extracting ZeroAccess from NTFS Extended Attributes

Bizeul 2014

Bizeul, D., Fontarensky, I., Mouchoux, R., Perigaud, F., Pernet, C. (2014, July 11). Eye of the Tiger. Retrieved September 29, 2015.

Internal MISP references

UUID a4617ef4-e6d2-47e7-8f81-68e7380279bf which can be used as unique global reference for Bizeul 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-09-29T00:00:00Z
date_published 2014-07-11T00:00:00Z
source MITRE, Tidal Cyber
title Eye of the Tiger

Facad1ng

Spyboy. (2023). Facad1ng. Retrieved February 13, 2024.

Internal MISP references

UUID bd80f3d7-e653-5f8f-ba8a-00b8780ae935 which can be used as unique global reference for Facad1ng in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-13T00:00:00Z
date_published 2023-01-01T00:00:00Z
source MITRE
title Facad1ng

ThreatPost Social Media Phishing

O'Donnell, L. (2020, October 20). Facebook: A Top Launching Pad For Phishing Attacks. Retrieved October 20, 2020.

Internal MISP references

UUID 186c1213-d0c5-4eb6-aa0f-0fd61b07a1f7 which can be used as unique global reference for ThreatPost Social Media Phishing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
date_published 2020-10-20T00:00:00Z
source MITRE
title Facebook: A Top Launching Pad For Phishing Attacks

SentinelLabs reversing run-only applescripts 2021

Phil Stokes. (2021, January 11). FADE DEAD | Adventures in Reversing Malicious Run-Only AppleScripts. Retrieved September 29, 2022.

Internal MISP references

UUID 34dc9010-e800-420c-ace4-4f426c915d2f which can be used as unique global reference for SentinelLabs reversing run-only applescripts 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-29T00:00:00Z
date_published 2021-01-11T00:00:00Z
source MITRE
title FADE DEAD

Sentinel Labs

Phil Stokes. (2021, January 11). FADE DEAD | Adventures in Reversing Malicious Run-Only AppleScripts. Retrieved September 30, 2022.

Internal MISP references

UUID 785f7692-2be8-4f5d-921e-51efdfe0c0b9 which can be used as unique global reference for Sentinel Labs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-30T00:00:00Z
date_published 2021-01-11T00:00:00Z
source MITRE
title FADE DEAD

BleepingComputer Fake Chrome Errors June 17 2024

Bill Toulas. (2024, June 17). Fake Google Chrome errors trick you into running malicious PowerShell scripts. Retrieved June 20, 2024.

Internal MISP references

UUID 6efa70e3-d8eb-4260-b0ab-62335681e6fd which can be used as unique global reference for BleepingComputer Fake Chrome Errors June 17 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-20T00:00:00Z
date_published 2024-06-17T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Fake Google Chrome errors trick you into running malicious PowerShell scripts

ESET OceanLotus Mar 2019

Dumont, R. (2019, March 20). Fake or Fake: Keeping up with OceanLotus decoys. Retrieved April 1, 2019.

Internal MISP references

UUID b2745f5c-a181-48e1-b1cf-37a1ffe1fdf0 which can be used as unique global reference for ESET OceanLotus Mar 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-01T00:00:00Z
date_published 2019-03-20T00:00:00Z
source MITRE
title Fake or Fake: Keeping up with OceanLotus decoys

ZScaler BitB 2020

ZScaler. (2020, February 11). Fake Sites Stealing Steam Credentials. Retrieved March 8, 2023.

Internal MISP references

UUID c2f01a3b-a164-59b7-be5d-5eec4eb69ee5 which can be used as unique global reference for ZScaler BitB 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-08T00:00:00Z
date_published 2020-02-11T00:00:00Z
source MITRE
title Fake Sites Stealing Steam Credentials

FalconFeedsio Tweet October 9 2023

FalconFeedsio. (2023, October 9). FalconFeedsio Tweet October 9 2023. Retrieved October 10, 2023.

Internal MISP references

UUID e9810a28-f060-468b-b4ea-ffed9403ae8b which can be used as unique global reference for FalconFeedsio Tweet October 9 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-10T00:00:00Z
date_published 2023-10-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title FalconFeedsio Tweet October 9 2023

FalconFeedsio Tweet September 28 2023

FalconFeedsio. (2023, September 28). FalconFeedsio Tweet September 28 2023. Retrieved October 10, 2023.

Internal MISP references

UUID 78128031-bcbb-42c2-8bed-4613a10a02ca which can be used as unique global reference for FalconFeedsio Tweet September 28 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-10T00:00:00Z
date_published 2023-09-28T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title FalconFeedsio Tweet September 28 2023

falconoverwatch_blackcat_attack

Falcon OverWatch Team. (2022, March 23). Falcon OverWatch Threat Hunting Contributes to Seamless Protection Against Novel BlackCat Attack. Retrieved May 5, 2022.

Internal MISP references

UUID 9d0ff77c-09e9-4d58-86f4-e2398f298ca9 which can be used as unique global reference for falconoverwatch_blackcat_attack in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-05T00:00:00Z
date_published 2022-03-23T00:00:00Z
source MITRE
title Falcon OverWatch Threat Hunting Contributes to Seamless Protection Against Novel BlackCat Attack

CitizenLab Tropic Trooper Aug 2018

Alexander, G., et al. (2018, August 8). Familiar Feeling: A Malware Campaign Targeting the Tibetan Diaspora Resurfaces. Retrieved June 17, 2019.

Internal MISP references

UUID 5c662775-9703-4d01-844b-40a0e5c24fb9 which can be used as unique global reference for CitizenLab Tropic Trooper Aug 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-17T00:00:00Z
date_published 2018-08-08T00:00:00Z
source MITRE
title Familiar Feeling: A Malware Campaign Targeting the Tibetan Diaspora Resurfaces

ESET FamousSparrow September 23 2021

Tahseen Bin Taj, Matthieu Faou. (2021, September 23). FamousSparrow: A suspicious hotel guest. Retrieved October 24, 2024.

Internal MISP references

UUID f91d6d8e-22a4-4851-9444-7a066e6b7aa5 which can be used as unique global reference for ESET FamousSparrow September 23 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-24T00:00:00Z
date_published 2021-09-23T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title FamousSparrow: A suspicious hotel guest

CISA AA20-239A BeagleBoyz August 2020

DHS/CISA. (2020, August 26). FASTCash 2.0: North Korea's BeagleBoyz Robbing Banks. Retrieved September 29, 2021.

Internal MISP references

UUID a8a2e3f2-3967-4e82-a36a-2436c654fb3f which can be used as unique global reference for CISA AA20-239A BeagleBoyz August 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-29T00:00:00Z
date_published 2020-08-26T00:00:00Z
source MITRE, Tidal Cyber
title FASTCash 2.0: North Korea's BeagleBoyz Robbing Banks

Fast Flux - Welivesecurity

Albors, Josep. (2017, January 12). Fast Flux networks: What are they and how do they work?. Retrieved March 11, 2020.

Internal MISP references

UUID e232d739-663e-4878-b13b-9248cd81e657 which can be used as unique global reference for Fast Flux - Welivesecurity in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-11T00:00:00Z
date_published 2017-01-12T00:00:00Z
source MITRE
title Fast Flux networks: What are they and how do they work?

MehtaFastFluxPt1

Mehta, L. (2014, December 17). Fast Flux Networks Working and Detection, Part 1. Retrieved March 6, 2017.

Internal MISP references

UUID 5f169cae-6b59-4879-9a8f-93fdcea5cc58 which can be used as unique global reference for MehtaFastFluxPt1 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-06T00:00:00Z
date_published 2014-12-17T00:00:00Z
source MITRE
title Fast Flux Networks Working and Detection, Part 1

MehtaFastFluxPt2

Mehta, L. (2014, December 23). Fast Flux Networks Working and Detection, Part 2. Retrieved March 6, 2017.

Internal MISP references

UUID f8a98e55-c91e-4b5e-b6f3-0065ef07375d which can be used as unique global reference for MehtaFastFluxPt2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-06T00:00:00Z
date_published 2014-12-23T00:00:00Z
source MITRE
title Fast Flux Networks Working and Detection, Part 2

FBI-BEC

FBI. (2022). FBI 2022 Congressional Report on BEC and Real Estate Wire Fraud. Retrieved August 18, 2023.

Internal MISP references

UUID 3388bfec-7822-56dc-a384-95aa79f42fe8 which can be used as unique global reference for FBI-BEC in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-18T00:00:00Z
date_published 2022-01-01T00:00:00Z
source MITRE
title FBI 2022 Congressional Report on BEC and Real Estate Wire Fraud

FBI Flash FIN7 USB

The Record. (2022, January 7). FBI: FIN7 hackers target US companies with BadUSB devices to install ransomware. Retrieved January 14, 2022.

Internal MISP references

UUID 42dc957c-007b-4f90-88c6-1afd6d1032e8 which can be used as unique global reference for FBI Flash FIN7 USB in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-14T00:00:00Z
date_published 2022-01-07T00:00:00Z
source MITRE
title FBI: FIN7 hackers target US companies with BadUSB devices to install ransomware

FBI Lazarus Stake.com Theft Attribution September 2023

FBI National Press Office. (2023, September 6). FBI Identifies Lazarus Group Cyber Actors as Responsible for Theft of $41 Million from Stake.com. Retrieved September 13, 2023.

Internal MISP references

UUID d753c01c-c0f6-4382-ae79-5605a28c94d5 which can be used as unique global reference for FBI Lazarus Stake.com Theft Attribution September 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-13T00:00:00Z
date_published 2023-09-06T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title FBI Identifies Lazarus Group Cyber Actors as Responsible for Theft of $41 Million from Stake.com

VPNFilter Router

Tung, Liam. (2018, May 29). FBI to all router users: Reboot now to neuter Russia's VPNFilter malware. Retrieved March 7, 2024.

Internal MISP references

UUID 191bc704-3314-56c5-8f2d-dbbbb8afea2f which can be used as unique global reference for VPNFilter Router in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-07T00:00:00Z
date_published 2018-05-29T00:00:00Z
source MITRE
title FBI to all router users: Reboot now to neuter Russia's VPNFilter malware

Hakobyan 2009

Hakobyan, A. (2009, January 8). FDump - Dumping File Sectors Directly from Disk using Logical Offsets. Retrieved November 12, 2014.

Internal MISP references

UUID d92f6dc0-e902-4a4a-9083-8d1667a7003e which can be used as unique global reference for Hakobyan 2009 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-12T00:00:00Z
date_published 2009-01-08T00:00:00Z
source MITRE
title FDump - Dumping File Sectors Directly from Disk using Logical Offsets

Google Federating GC

Google. (n.d.). Federating Google Cloud with Active Directory. Retrieved March 13, 2020.

Internal MISP references

UUID 4e17ca9b-5c98-409b-9496-7c37fe9ee837 which can be used as unique global reference for Google Federating GC in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-13T00:00:00Z
source MITRE
title Federating Google Cloud with Active Directory

Kaspersky Ferocious Kitten Jun 2021

GReAT. (2021, June 16). Ferocious Kitten: 6 Years of Covert Surveillance in Iran. Retrieved September 22, 2021.

Internal MISP references

UUID b8f8020d-3f5c-4b5e-8761-6ecdd63fcd50 which can be used as unique global reference for Kaspersky Ferocious Kitten Jun 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-22T00:00:00Z
date_published 2021-06-16T00:00:00Z
source MITRE, Tidal Cyber
title Ferocious Kitten: 6 Years of Covert Surveillance in Iran

Fidelis njRAT June 2013

Fidelis Cybersecurity. (2013, June 28). Fidelis Threat Advisory #1009: "njRAT" Uncovered. Retrieved June 4, 2019.

Internal MISP references

UUID 6c985470-a923-48fd-82c9-9128b6d59bcb which can be used as unique global reference for Fidelis njRAT June 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-04T00:00:00Z
date_published 2013-06-28T00:00:00Z
source MITRE
title Fidelis Threat Advisory #1009: "njRAT" Uncovered

Fidelis INOCNATION

Fidelis Cybersecurity. (2015, December 16). Fidelis Threat Advisory #1020: Dissecting the Malware Involved in the INOCNATION Campaign. Retrieved March 24, 2016.

Internal MISP references

UUID 9d9c0c71-d5a2-41e4-aa90-d1046e0742c7 which can be used as unique global reference for Fidelis INOCNATION in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-03-24T00:00:00Z
date_published 2015-12-16T00:00:00Z
source MITRE
title Fidelis Threat Advisory #1020: Dissecting the Malware Involved in the INOCNATION Campaign

Securelist fileless attacks Feb 2017

Kaspersky Lab's Global Research and Analysis Team. (2017, February 8). Fileless attacks against enterprise networks. Retrieved February 8, 2017.

Internal MISP references

UUID b58d9c32-89c5-449a-88e7-1c7dd3f8380e which can be used as unique global reference for Securelist fileless attacks Feb 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-02-08T00:00:00Z
date_published 2017-02-08T00:00:00Z
source MITRE
title Fileless attacks against enterprise networks

Airbus Security Kovter Analysis

Dove, A. (2016, March 23). Fileless Malware – A Behavioural Analysis Of Kovter Persistence. Retrieved December 5, 2017.

Internal MISP references

UUID a8420828-9e00-45a1-90d7-a37f898204f9 which can be used as unique global reference for Airbus Security Kovter Analysis in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-05T00:00:00Z
date_published 2016-03-23T00:00:00Z
source MITRE
title Fileless Malware – A Behavioural Analysis Of Kovter Persistence

Sysdig Fileless Malware 23022

Nicholas Lang. (2022, May 3). Fileless malware mitigation. Retrieved September 24, 2024.

Internal MISP references

UUID d728b343-3256-55ff-9491-f66b98c16226 which can be used as unique global reference for Sysdig Fileless Malware 23022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-24T00:00:00Z
date_published 2022-05-03T00:00:00Z
source MITRE
title Fileless malware mitigation

Microsoft Fileless

Microsoft. (2023, February 6). Fileless threats. Retrieved March 23, 2023.

Internal MISP references

UUID 263fc1ab-f928-583f-986d-1e1bae9b3c85 which can be used as unique global reference for Microsoft Fileless in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-23T00:00:00Z
date_published 2023-02-06T00:00:00Z
source MITRE
title Fileless threats

enigma0x3 Fileless UAC Bypass

Nelson, M. (2016, August 15). "Fileless" UAC Bypass using eventvwr.exe and Registry Hijacking. Retrieved December 27, 2016.

Internal MISP references

UUID 74b16ca4-9494-4f10-97c5-103a8521818f which can be used as unique global reference for enigma0x3 Fileless UAC Bypass in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-12-27T00:00:00Z
date_published 2016-08-15T00:00:00Z
source MITRE
title "Fileless" UAC Bypass using eventvwr.exe and Registry Hijacking

enigma0x3 sdclt bypass

Nelson, M. (2017, March 17). "Fileless" UAC Bypass Using sdclt.exe. Retrieved May 25, 2017.

Internal MISP references

UUID 5e5597e2-ea05-41e0-8752-ca95a89a5aa3 which can be used as unique global reference for enigma0x3 sdclt bypass in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-05-25T00:00:00Z
date_published 2017-03-17T00:00:00Z
source MITRE
title "Fileless" UAC Bypass Using sdclt.exe

Microsoft File Mgmt

Microsoft. (2018, May 31). File Management (Local File Systems). Retrieved September 28, 2021.

Internal MISP references

UUID e6d84416-5808-4e7d-891b-ba67dada8726 which can be used as unique global reference for Microsoft File Mgmt in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-28T00:00:00Z
date_published 2018-05-31T00:00:00Z
source MITRE
title File Management (Local File Systems)

Microsoft File Streams

Microsoft. (n.d.). File Streams. Retrieved September 12, 2024.

Internal MISP references

UUID ef3f58da-e735-4b1d-914c-fafabb7439bf which can be used as unique global reference for Microsoft File Streams in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
source MITRE
title File Streams

file_upload_attacks_pt2

YesWeRHackers. (2021, June 16). File Upload Attacks (Part 2). Retrieved August 23, 2022.

Internal MISP references

UUID 4f7c7d6c-ad56-594f-bcb8-79523f436f2c which can be used as unique global reference for file_upload_attacks_pt2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-23T00:00:00Z
date_published 2021-06-16T00:00:00Z
source MITRE
title File Upload Attacks (Part 2)

Microsoft GPO Security Filtering

Microsoft. (2018, May 30). Filtering the Scope of a GPO. Retrieved March 13, 2019.

Internal MISP references

UUID 327caed7-a53f-4245-8774-a9f170932012 which can be used as unique global reference for Microsoft GPO Security Filtering in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-13T00:00:00Z
date_published 2018-05-30T00:00:00Z
source MITRE
title Filtering the Scope of a GPO

FireEye FIN10 June 2017

FireEye iSIGHT Intelligence. (2017, June 16). FIN10: Anatomy of a Cyber Extortion Operation. Retrieved June 25, 2017.

Internal MISP references

UUID 9d5c3956-7169-48d5-b4d0-f7a56a742adf which can be used as unique global reference for FireEye FIN10 June 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-06-25T00:00:00Z
date_published 2017-06-16T00:00:00Z
source MITRE, Tidal Cyber
title FIN10: Anatomy of a Cyber Extortion Operation

Mandiant FIN12 Group Profile October 07 2021

Joshua Shilko, Zach Riddle, Jennifer Brooks, Genevieve Stark, Adam Brunner, Kimberly Goody, Jeremy Kennelly. (2021, October 7). FIN12 Group Profile. Retrieved September 22, 2023.

Internal MISP references

UUID 7af84b3d-bbd6-449f-b29b-2f14591c9f05 which can be used as unique global reference for Mandiant FIN12 Group Profile October 07 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-22T00:00:00Z
date_published 2021-10-07T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title FIN12 Group Profile

Mandiant FIN12 Oct 2021

Shilko, J., et al. (2021, October 7). FIN12: The Prolific Ransomware Intrusion Threat Actor That Has Aggressively Pursued Healthcare Targets. Retrieved June 15, 2023.

Internal MISP references

UUID 4514d7cc-b999-5711-a398-d90e5d3570f2 which can be used as unique global reference for Mandiant FIN12 Oct 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-15T00:00:00Z
date_published 2021-10-07T00:00:00Z
source MITRE
title FIN12: The Prolific Ransomware Intrusion Threat Actor That Has Aggressively Pursued Healthcare Targets

CERTFR-2023-CTI-007

CERT-FR. (2023, September 18). FIN12: Un Groupe Cybercriminel aux Multiples Rançongiciel. Retrieved September 21, 2023.

Internal MISP references

UUID 0f4a03c5-79b3-418e-a77d-305d5a32caca which can be used as unique global reference for CERTFR-2023-CTI-007 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-21T00:00:00Z
date_published 2023-09-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title FIN12: Un Groupe Cybercriminel aux Multiples Rançongiciel

Mandiant FIN13 Aug 2022

Ta, V., et al. (2022, August 8). FIN13: A Cybercriminal Threat Actor Focused on Mexico. Retrieved February 9, 2023.

Internal MISP references

UUID ebd9d479-1954-5a4a-b7f0-d5372489733c which can be used as unique global reference for Mandiant FIN13 Aug 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-02-09T00:00:00Z
date_published 2022-08-08T00:00:00Z
source MITRE
title FIN13: A Cybercriminal Threat Actor Focused on Mexico

FireEye FIN4 Stealing Insider NOV 2014

Dennesen, K. et al.. (2014, November 30). FIN4: Stealing Insider Information for an Advantage in Stock Trading?. Retrieved December 17, 2018.

Internal MISP references

UUID b27f1040-46e5-411a-b238-0b40f6160680 which can be used as unique global reference for FireEye FIN4 Stealing Insider NOV 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-12-17T00:00:00Z
date_published 2014-11-30T00:00:00Z
source MITRE
title FIN4: Stealing Insider Information for an Advantage in Stock Trading?

Visa FIN6 Feb 2019

Visa Public. (2019, February). FIN6 Cybercrime Group Expands Threat to eCommerce Merchants. Retrieved September 16, 2019.

Internal MISP references

UUID 9e9e8811-1d8e-4400-8688-e634f859c4e0 which can be used as unique global reference for Visa FIN6 Feb 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-16T00:00:00Z
date_published 2019-02-01T00:00:00Z
source MITRE
title FIN6 Cybercrime Group Expands Threat to eCommerce Merchants

SentinelOne FrameworkPOS September 2019

Kremez, V. (2019, September 19). FIN6 “FrameworkPOS”: Point-of-Sale Malware Analysis & Internals. Retrieved September 8, 2020.

Internal MISP references

UUID 054d7827-3d0c-40a7-b2a0-1428ad7729ea which can be used as unique global reference for SentinelOne FrameworkPOS September 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-08T00:00:00Z
date_published 2019-09-19T00:00:00Z
source MITRE
title FIN6 “FrameworkPOS”: Point-of-Sale Malware Analysis & Internals

SecureList Griffon May 2019

Namestnikov, Y. and Aime, F. (2019, May 8). FIN7.5: the infamous cybercrime rig “FIN7” continues its activities. Retrieved October 11, 2019.

Internal MISP references

UUID 42e196e4-42a7-427d-a69b-d78fa6375f8c which can be used as unique global reference for SecureList Griffon May 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-11T00:00:00Z
date_published 2019-05-08T00:00:00Z
source MITRE
title FIN7.5: the infamous cybercrime rig “FIN7” continues its activities

Threatpost Lizar May 2021

Seals, T. (2021, May 14). FIN7 Backdoor Masquerades as Ethical Hacking Tool. Retrieved February 2, 2022.

Internal MISP references

UUID 1b89f62f-586d-4dee-b6dd-e5a5cd090a0e which can be used as unique global reference for Threatpost Lizar May 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-02T00:00:00Z
date_published 2021-05-14T00:00:00Z
source MITRE
title FIN7 Backdoor Masquerades as Ethical Hacking Tool

FireEye FIN7 April 2017

Carr, N., et al. (2017, April 24). FIN7 Evolution and the Phishing LNK. Retrieved April 24, 2017.

Internal MISP references

UUID 6ee27fdb-1753-4fdf-af72-3295b072ff10 which can be used as unique global reference for FireEye FIN7 April 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-04-24T00:00:00Z
date_published 2017-04-24T00:00:00Z
source MITRE
title FIN7 Evolution and the Phishing LNK

Mandiant FIN7 Apr 2022

Abdo, B., et al. (2022, April 4). FIN7 Power Hour: Adversary Archaeology and the Evolution of FIN7. Retrieved April 5, 2022.

Internal MISP references

UUID be9919c0-ca52-593b-aea0-c5e9a262b570 which can be used as unique global reference for Mandiant FIN7 Apr 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-05T00:00:00Z
date_published 2022-04-04T00:00:00Z
source MITRE
title FIN7 Power Hour: Adversary Archaeology and the Evolution of FIN7

Mandiant FIN7 April 4 2022

Bryce Abdo, Zander Work, Ioana Teaca, Brendan McKeague. (2022, April 4). FIN7 Power Hour: Adversary Archaeology and the Evolution of FIN7. Retrieved May 25, 2023.

Internal MISP references

UUID fbc3ea90-d3d4-440e-964d-6cd2e991df0c which can be used as unique global reference for Mandiant FIN7 April 4 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-25T00:00:00Z
date_published 2022-04-04T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title FIN7 Power Hour: Adversary Archaeology and the Evolution of FIN7

Gemini FIN7 Oct 2021

Gemini Advisory. (2021, October 21). FIN7 Recruits Talent For Push Into Ransomware. Retrieved February 2, 2022.

Internal MISP references

UUID bbaef178-8577-4398-8e28-604faf0950b4 which can be used as unique global reference for Gemini FIN7 Oct 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-02T00:00:00Z
date_published 2021-10-21T00:00:00Z
source MITRE
title FIN7 Recruits Talent For Push Into Ransomware

Flashpoint FIN 7 March 2019

Platt, J. and Reeves, J.. (2019, March). FIN7 Revisited: Inside Astra Panel and SQLRat Malware. Retrieved June 18, 2019.

Internal MISP references

UUID b09453a3-c0df-4e96-b399-e7b34e068e9d which can be used as unique global reference for Flashpoint FIN 7 March 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-18T00:00:00Z
date_published 2019-03-01T00:00:00Z
source MITRE
title FIN7 Revisited: Inside Astra Panel and SQLRat Malware

FireEye FIN7 March 2017

Miller, S., et al. (2017, March 7). FIN7 Spear Phishing Campaign Targets Personnel Involved in SEC Filings. Retrieved March 8, 2017.

Internal MISP references

UUID 7987bb91-ec41-42f8-bd2d-dabc26509a08 which can be used as unique global reference for FireEye FIN7 March 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-08T00:00:00Z
date_published 2017-03-07T00:00:00Z
source MITRE, Tidal Cyber
title FIN7 Spear Phishing Campaign Targets Personnel Involved in SEC Filings

Morphisec FIN7 June 2017

Gorelik, M.. (2017, June 9). FIN7 Takes Another Bite at the Restaurant Industry. Retrieved July 13, 2017.

Internal MISP references

UUID 3831173c-7c67-4f16-b652-ad992a7ce411 which can be used as unique global reference for Morphisec FIN7 June 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-13T00:00:00Z
date_published 2017-06-09T00:00:00Z
source MITRE
title FIN7 Takes Another Bite at the Restaurant Industry

Esentire 5 8 2024

Esentire Threat Response Unit. (2024, May 8). FIN7 Uses Trusted Brands and Sponsored Google Ads to Distribute MSIX…. Retrieved May 14, 2024.

Internal MISP references

UUID 67c3a7ed-e2e2-4566-aca7-61e766f177bf which can be used as unique global reference for Esentire 5 8 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-14T00:00:00Z
date_published 2024-05-08T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title FIN7 Uses Trusted Brands and Sponsored Google Ads to Distribute MSIX…

CyberScoop FIN7 Oct 2017

Waterman, S. (2017, October 16). Fin7 weaponization of DDE is just their latest slick move, say researchers. Retrieved November 21, 2017.

Internal MISP references

UUID e38adff1-7f53-4b0c-9d58-a4640b09b10d which can be used as unique global reference for CyberScoop FIN7 Oct 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-21T00:00:00Z
date_published 2017-10-16T00:00:00Z
source MITRE
title Fin7 weaponization of DDE is just their latest slick move, say researchers

Bitdefender FIN8 BADHATCH Report

Bitdefender. (2021, March 10). FIN8 Returns with Improved BADHATCH Toolkit. Retrieved October 30, 2023.

Internal MISP references

UUID 501b6391-e09e-47dc-9cfc-c8ed4c034aca which can be used as unique global reference for Bitdefender FIN8 BADHATCH Report in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-30T00:00:00Z
date_published 2021-03-10T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title FIN8 Returns with Improved BADHATCH Toolkit

BitDefender BADHATCH Mar 2021

Vrabie, V., et al. (2021, March 10). FIN8 Returns with Improved BADHATCH Toolkit. Retrieved September 8, 2021.

Internal MISP references

UUID 958cfc9a-901c-549d-96c2-956272b240e3 which can be used as unique global reference for BitDefender BADHATCH Mar 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-08T00:00:00Z
date_published 2021-03-10T00:00:00Z
source MITRE
title FIN8 Returns with Improved BADHATCH Toolkit

Bitdefender Sardonic Aug 2021

Budaca, E., et al. (2021, August 25). FIN8 Threat Actor Goes Agile with New Sardonic Backdoor. Retrieved August 9, 2023.

Internal MISP references

UUID 8e9d05c9-6783-5738-ac85-a444810a8074 which can be used as unique global reference for Bitdefender Sardonic Aug 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-09T00:00:00Z
date_published 2021-08-25T00:00:00Z
source MITRE
title FIN8 Threat Actor Goes Agile with New Sardonic Backdoor

Symantec FIN8 Jul 2023

Symantec Threat Hunter Team. (2023, July 18). FIN8 Uses Revamped Sardonic Backdoor to Deliver Noberus Ransomware. Retrieved August 9, 2023.

Internal MISP references

UUID 9b08b7f0-1a33-5d76-817f-448fac0d165a which can be used as unique global reference for Symantec FIN8 Jul 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-09T00:00:00Z
date_published 2023-07-18T00:00:00Z
source MITRE
title FIN8 Uses Revamped Sardonic Backdoor to Deliver Noberus Ransomware

DiginotarCompromise

Fisher, D. (2012, October 31). Final Report on DigiNotar Hack Shows Total Compromise of CA Servers. Retrieved March 6, 2017.

Internal MISP references

UUID 3c9b7b9a-d30a-4865-a96c-6e68d9e20452 which can be used as unique global reference for DiginotarCompromise in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-06T00:00:00Z
date_published 2012-10-31T00:00:00Z
source MITRE
title Final Report on DigiNotar Hack Shows Total Compromise of CA Servers

FireEye Financial Actors Moving into OT

Brubaker, N. Zafra, D. K. Lunden, K. Proska, K. Hildebrandt, C.. (2020, July 15). Financially Motivated Actors Are Expanding Access Into OT: Analysis of Kill Lists That Include OT Processes Used With Seven Malware Families. Retrieved February 15, 2021.

Internal MISP references

UUID 4bd514b8-1f79-4946-b001-110ce5cf29a9 which can be used as unique global reference for FireEye Financial Actors Moving into OT in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-15T00:00:00Z
date_published 2020-07-15T00:00:00Z
source MITRE
title Financially Motivated Actors Are Expanding Access Into OT: Analysis of Kill Lists That Include OT Processes Used With Seven Malware Families

MITRECND FindAPIHash

Jason (jxb5151). (2021, January 28). findapihash.py. Retrieved August 22, 2022.

Internal MISP references

UUID 2260f0a1-2a6c-4373-9e3a-624fd89446e3 which can be used as unique global reference for MITRECND FindAPIHash in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-22T00:00:00Z
date_published 2021-01-28T00:00:00Z
source MITRE
title findapihash.py

Expel IO Evil in AWS

A. Randazzo, B. Manahan and S. Lipton. (2020, April 28). Finding Evil in AWS. Retrieved June 25, 2020.

Internal MISP references

UUID 4c2424d6-670b-4db0-a752-868b4c954e29 which can be used as unique global reference for Expel IO Evil in AWS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-25T00:00:00Z
date_published 2020-04-28T00:00:00Z
source MITRE
title Finding Evil in AWS

Evil WMI

Chad Tilbury. (2023, May 22). Finding Evil WMI Event Consumers with Disk Forensics. Retrieved February 9, 2024.

Internal MISP references

UUID ee46fd07-3df3-50f6-b922-263f031ee23f which can be used as unique global reference for Evil WMI in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-09T00:00:00Z
date_published 2023-05-22T00:00:00Z
source MITRE
title Finding Evil WMI Event Consumers with Disk Forensics

SANS Decrypting SSL

Butler, M. (2013, November). Finding Hidden Threats by Decrypting SSL. Retrieved April 5, 2016.

Internal MISP references

UUID d251a79b-8516-41a7-b394-47a761d0ab3b which can be used as unique global reference for SANS Decrypting SSL in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-05T00:00:00Z
date_published 2013-11-01T00:00:00Z
source MITRE
title Finding Hidden Threats by Decrypting SSL

ADSecurity Finding Passwords in SYSVOL

Sean Metcalf. (2015, December 28). Finding Passwords in SYSVOL & Exploiting Group Policy Preferences. Retrieved February 17, 2020.

Internal MISP references

UUID 538def90-5de4-4b8c-b535-0e2570ba1841 which can be used as unique global reference for ADSecurity Finding Passwords in SYSVOL in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-17T00:00:00Z
date_published 2015-12-28T00:00:00Z
source MITRE
title Finding Passwords in SYSVOL & Exploiting Group Policy Preferences

Findstr.exe - LOLBAS Project

LOLBAS. (2018, May 25). Findstr.exe. Retrieved December 4, 2023.

Internal MISP references

UUID fc4b7b28-ac74-4a8f-a39d-ce55df5fca08 which can be used as unique global reference for Findstr.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Findstr.exe

FinFisher Citation

FinFisher. (n.d.). Retrieved September 12, 2024.

Internal MISP references

UUID 6ef0b8d8-ba98-49ce-807d-5a85d111b027 which can be used as unique global reference for FinFisher Citation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
source MITRE
title FinFisher Citation

FinFisher exposed

Microsoft Defender Security Research Team. (2018, March 1). FinFisher exposed: A researcher’s tale of defeating traps, tricks, and complex virtual machines. Retrieved January 27, 2022.

Internal MISP references

UUID b2f4541e-f981-4b25-abf4-1bec92b16faa which can be used as unique global reference for FinFisher exposed in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-27T00:00:00Z
date_published 2018-03-01T00:00:00Z
source MITRE
title FinFisher exposed: A researcher’s tale of defeating traps, tricks, and complex virtual machines

Microsoft FinFisher March 2018

Allievi, A.,Flori, E. (2018, March 01). FinFisher exposed: A researcher’s tale of defeating traps, tricks, and complex virtual machines. Retrieved July 9, 2018.

Internal MISP references

UUID 88c97a9a-ef14-4695-bde0-9de2b5f5343b which can be used as unique global reference for Microsoft FinFisher March 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-09T00:00:00Z
date_published 2018-03-01T00:00:00Z
source MITRE
title FinFisher exposed: A researcher’s tale of defeating traps, tricks, and complex virtual machines

Finger.exe - LOLBAS Project

LOLBAS. (2021, August 30). Finger.exe. Retrieved December 4, 2023.

Internal MISP references

UUID e32d01eb-d904-43dc-a7e2-bdcf42f3ebb2 which can be used as unique global reference for Finger.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-08-30T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Finger.exe

FireEye Cyber Threats to Media Industries

FireEye. (n.d.). Retrieved April 19, 2019.

Internal MISP references

UUID 7b9bd753-01b7-4923-9964-19c59123ace2 which can be used as unique global reference for FireEye Cyber Threats to Media Industries in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-19T00:00:00Z
source MITRE
title FireEye Cyber Threats to Media Industries

FireEye DLL Side-Loading

Amanda Steward. (2014). FireEye DLL Side-Loading: A Thorn in the Side of the Anti-Virus Industry. Retrieved March 13, 2020.

Internal MISP references

UUID 9d58bcbb-5b96-4e12-8ff2-e0b084c3eb8c which can be used as unique global reference for FireEye DLL Side-Loading in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-13T00:00:00Z
date_published 2014-01-01T00:00:00Z
source MITRE
title FireEye DLL Side-Loading: A Thorn in the Side of the Anti-Virus Industry

FireEye Shamoon Nov 2016

FireEye. (2016, November 30). FireEye Responds to Wave of Destructive Cyber Attacks in Gulf Region. Retrieved January 11, 2017.

Internal MISP references

UUID 44b2eb6b-4902-4ca0-80e5-7333d620e075 which can be used as unique global reference for FireEye Shamoon Nov 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-01-11T00:00:00Z
date_published 2016-11-30T00:00:00Z
source MITRE
title FireEye Responds to Wave of Destructive Cyber Attacks in Gulf Region

FireEye Ryuk and Trickbot January 2019

Goody, K., et al (2019, January 11). A Nasty Trick: From Credential Theft Malware to Business Disruption. Retrieved May 12, 2020.

Internal MISP references

UUID b29dc755-f1f0-4206-9ecf-29257a1909ee which can be used as unique global reference for FireEye Ryuk and Trickbot January 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-12T00:00:00Z
source MITRE
title FireEye Ryuk and Trickbot January 2019

DarkReading FireEye SolarWinds

Kelly Jackson Higgins. (2021, January 7). FireEye's Mandia: 'Severity-Zero Alert' Led to Discovery of SolarWinds Attack. Retrieved April 18, 2022.

Internal MISP references

UUID a662c764-8954-493f-88e5-e022e093a785 which can be used as unique global reference for DarkReading FireEye SolarWinds in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-18T00:00:00Z
date_published 2021-01-07T00:00:00Z
source MITRE
title FireEye's Mandia: 'Severity-Zero Alert' Led to Discovery of SolarWinds Attack

FireEye FinSpy Sept 2017

Jiang, G., et al. (2017, September 12). FireEye Uncovers CVE-2017-8759: Zero-Day Used in the Wild to Distribute FINSPY. Retrieved February 15, 2018.

Internal MISP references

UUID 142cf7a3-2ca2-4cf3-b95a-9f4b3bc1cdce which can be used as unique global reference for FireEye FinSpy Sept 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-15T00:00:00Z
date_published 2017-09-12T00:00:00Z
source MITRE
title FireEye Uncovers CVE-2017-8759: Zero-Day Used in the Wild to Distribute FINSPY

RiskIQ Cobalt Jan 2018

Klijnsma, Y.. (2018, January 16). First Activities of Cobalt Group in 2018: Spear Phishing Russian Banks. Retrieved October 10, 2018.

Internal MISP references

UUID 7d48b679-d44d-466e-b12b-16f0f9858d15 which can be used as unique global reference for RiskIQ Cobalt Jan 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-10-10T00:00:00Z
date_published 2018-01-16T00:00:00Z
source MITRE
title First Activities of Cobalt Group in 2018: Spear Phishing Russian Banks

Chrome Extension Crypto Miner

Brinkmann, M. (2017, September 19). First Chrome extension with JavaScript Crypto Miner detected. Retrieved November 16, 2017.

Internal MISP references

UUID ae28f530-40da-451e-89b8-b472340c3e0a which can be used as unique global reference for Chrome Extension Crypto Miner in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-16T00:00:00Z
date_published 2017-09-19T00:00:00Z
source MITRE
title First Chrome extension with JavaScript Crypto Miner detected

Aquasec Kubernetes Attack 2023

Michael Katchinskiy, Assaf Morag. (2023, April 21). First-Ever Attack Leveraging Kubernetes RBAC to Backdoor Clusters. Retrieved July 14, 2023.

Internal MISP references

UUID 6d6e2fc8-9806-5480-bfaa-a43a962a4980 which can be used as unique global reference for Aquasec Kubernetes Attack 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-14T00:00:00Z
date_published 2023-04-21T00:00:00Z
source MITRE
title First-Ever Attack Leveraging Kubernetes RBAC to Backdoor Clusters

ESET-Twitoor

ESET. (2016, August 24). First Twitter-controlled Android botnet discovered. Retrieved December 22, 2016.

Internal MISP references

UUID 845896a6-b21d-489d-b75c-1e35b3ec78e0 which can be used as unique global reference for ESET-Twitoor in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-12-22T00:00:00Z
date_published 2016-08-24T00:00:00Z
source MITRE
title First Twitter-controlled Android botnet discovered

Baldwin, M., Flores, J., Kess, B.. (2018, June 17). Five steps to securing your identity infrastructure. Retrieved October 4, 2019.

Internal MISP references

UUID 3a0c4458-c8ec-44f9-95cc-0eb136a927cb which can be used as unique global reference for Microsoft Azure AD Admin Consent in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-04T00:00:00Z
date_published 2018-06-17T00:00:00Z
source MITRE
title Five steps to securing your identity infrastructure

NTT Security Flagpro new December 2021

Hada, H. (2021, December 28). Flagpro The new malware used by BlackTech. Retrieved March 25, 2022.

Internal MISP references

UUID c0f523fa-7f3b-4c85-b48f-19ae770e9f3b which can be used as unique global reference for NTT Security Flagpro new December 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-25T00:00:00Z
date_published 2021-12-28T00:00:00Z
source MITRE
title Flagpro The new malware used by BlackTech

Kaspersky Flame Functionality

Gostev, A. (2012, May 30). Flame: Bunny, Frog, Munch and BeetleJuice…. Retrieved March 1, 2017.

Internal MISP references

UUID c7d030ad-0ecf-458f-85d4-93778d759dc1 which can be used as unique global reference for Kaspersky Flame Functionality in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-01T00:00:00Z
date_published 2012-05-30T00:00:00Z
source MITRE
title Flame: Bunny, Frog, Munch and BeetleJuice…

Crysys Skywiper

sKyWIper Analysis Team. (2012, May 31). sKyWIper (a.k.a. Flame a.k.a. Flamer): A complex malware for targeted attacks. Retrieved September 6, 2018.

Internal MISP references

UUID ea35f530-b0fd-4e27-a7a9-6ba41566154c which can be used as unique global reference for Crysys Skywiper in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-09-06T00:00:00Z
source MITRE
title Flamer): A complex malware for targeted attacks

Symantec Beetlejuice

Symantec Security Response. (2012, May 31). Flamer: A Recipe for Bluetoothache. Retrieved February 25, 2017.

Internal MISP references

UUID 691ada65-fe64-4917-b379-1db2573eea32 which can be used as unique global reference for Symantec Beetlejuice in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-02-25T00:00:00Z
date_published 2012-05-31T00:00:00Z
source MITRE
title Flamer: A Recipe for Bluetoothache

Microsoft Flax Typhoon August 24 2023

Microsoft Threat Intelligence. (2023, August 24). Flax Typhoon using legitimate software to quietly access Taiwanese organizations. Retrieved August 28, 2023.

Internal MISP references

UUID ec962b72-7b7f-4f7e-b6d6-7c5380b07201 which can be used as unique global reference for Microsoft Flax Typhoon August 24 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-28T00:00:00Z
date_published 2023-08-24T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Flax Typhoon using legitimate software to quietly access Taiwanese organizations

fltMC.exe - LOLBAS Project

LOLBAS. (2021, September 18). fltMC.exe. Retrieved December 4, 2023.

Internal MISP references

UUID cf9b4bd3-92f0-405b-85e7-95e65d548b79 which can be used as unique global reference for fltMC.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-09-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title fltMC.exe

IranThreats Kittens Dec 2017

Iran Threats . (2017, December 5). Flying Kitten to Rocket Kitten, A Case of Ambiguity and Shared Code. Retrieved May 28, 2020.

Internal MISP references

UUID 8338ad75-89f2-47d8-b85b-7cbf331bd7cd which can be used as unique global reference for IranThreats Kittens Dec 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-28T00:00:00Z
date_published 2017-12-05T00:00:00Z
source MITRE
title Flying Kitten to Rocket Kitten, A Case of Ambiguity and Shared Code

MSTIC FoggyWeb September 2021

Ramin Nafisi. (2021, September 27). FoggyWeb: Targeted NOBELIUM malware leads to persistent backdoor. Retrieved October 4, 2021.

Internal MISP references

UUID 1ef61100-c5e7-4725-8456-e508c5f6d68a which can be used as unique global reference for MSTIC FoggyWeb September 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-04T00:00:00Z
date_published 2021-09-27T00:00:00Z
source MITRE
title FoggyWeb: Targeted NOBELIUM malware leads to persistent backdoor

Following the CloudTrail: Generating strong AWS security signals with Sumo Logic

Dan Whalen. (2019, September 10). Following the CloudTrail: Generating strong AWS security signals with Sumo Logic. Retrieved October 16, 2020.

Internal MISP references

UUID 96560211-59b3-4eae-b8a3-2f988f6fdca3 which can be used as unique global reference for Following the CloudTrail: Generating strong AWS security signals with Sumo Logic in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-16T00:00:00Z
date_published 2019-09-10T00:00:00Z
source MITRE
title Following the CloudTrail: Generating strong AWS security signals with Sumo Logic

Group IB RTM August 2019

Skulkin, O. (2019, August 5). Following the RTM Forensic examination of a computer infected with a banking trojan. Retrieved May 11, 2020.

Internal MISP references

UUID 739da2f2-2aea-4f65-bc4d-ec6723f90520 which can be used as unique global reference for Group IB RTM August 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-11T00:00:00Z
date_published 2019-08-05T00:00:00Z
source MITRE
title Following the RTM Forensic examination of a computer infected with a banking trojan

TrendMicro BlackTech June 2017

Bermejo, L., et al. (2017, June 22). Following the Trail of BlackTech’s Cyber Espionage Campaigns. Retrieved May 5, 2020.

Internal MISP references

UUID abb9cb19-d30e-4048-b106-eb29a6dad7fc which can be used as unique global reference for TrendMicro BlackTech June 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-05T00:00:00Z
date_published 2017-06-22T00:00:00Z
source MITRE, Tidal Cyber
title Following the Trail of BlackTech’s Cyber Espionage Campaigns

FireEye FIN6 April 2016

FireEye Threat Intelligence. (2016, April). Follow the Money: Dissecting the Operations of the Cyber Crime Group FIN6. Retrieved June 1, 2016.

Internal MISP references

UUID 8c0997e1-b285-42dd-9492-75065eac8f8b which can be used as unique global reference for FireEye FIN6 April 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-01T00:00:00Z
date_published 2016-04-01T00:00:00Z
source MITRE, Tidal Cyber
title Follow the Money: Dissecting the Operations of the Cyber Crime Group FIN6

ESET FontOnLake Analysis 2021

Vladislav Hrčka. (2021, January 1). FontOnLake. Retrieved September 27, 2023.

Internal MISP references

UUID dbcced87-91ee-514f-98c8-29a85d967384 which can be used as unique global reference for ESET FontOnLake Analysis 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-27T00:00:00Z
date_published 2021-01-01T00:00:00Z
source MITRE
title FontOnLake

amnesty_nso_pegasus

Amnesty International Security Lab. (2021, July 18). Forensic Methodology Report: How to catch NSO Group’s Pegasus. Retrieved February 22, 2022.

Internal MISP references

UUID 9e40d93a-fe91-504a-a6f2-e6546067ba53 which can be used as unique global reference for amnesty_nso_pegasus in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-22T00:00:00Z
date_published 2021-07-18T00:00:00Z
source MITRE
title Forensic Methodology Report: How to catch NSO Group’s Pegasus

Microsoft Forfiles Aug 2016

Microsoft. (2016, August 31). Forfiles. Retrieved January 22, 2018.

Internal MISP references

UUID fd7eaa47-3512-4dbd-b881-bc679d06cd1b which can be used as unique global reference for Microsoft Forfiles Aug 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-22T00:00:00Z
date_published 2016-08-31T00:00:00Z
source MITRE
title Forfiles

Forfiles.exe - LOLBAS Project

LOLBAS. (2018, May 25). Forfiles.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 9e2c3833-b667-431c-a9e5-1b412583cc5a which can be used as unique global reference for Forfiles.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Forfiles.exe

Mandiant Log4Shell March 28 2022

Geoff Ackerman, Tufail Ahmed, James Maclachlan, Dallin Warne, John Wolfram, Brandon Wilbur. (2022, March 28). Forged in Fire: A Survey of MobileIron Log4Shell Exploitation. Retrieved November 1, 2023.

Internal MISP references

UUID 62d4d685-09c4-47b6-865c-4a6096e551cd which can be used as unique global reference for Mandiant Log4Shell March 28 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-11-01T00:00:00Z
date_published 2022-03-28T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Forged in Fire: A Survey of MobileIron Log4Shell Exploitation

Proofpoint March 24 2023

Proofpoint. (2023, March 24). Fork in the Ice: The New Era of IcedID | Proofpoint US. Retrieved May 10, 2023.

Internal MISP references

UUID 71d5e4ce-3785-48f9-9566-fe5151ad6dc2 which can be used as unique global reference for Proofpoint March 24 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-10T00:00:00Z
date_published 2023-03-24T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Fork in the Ice: The New Era of IcedID

Symantec Seaduke 2015

Symantec Security Response. (2015, July 13). “Forkmeiamfamous”: Seaduke, latest weapon in the Duke armory. Retrieved July 22, 2015.

Internal MISP references

UUID 5ec05c01-8767-44c1-9855-e1b0e5ee0002 which can be used as unique global reference for Symantec Seaduke 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-07-22T00:00:00Z
date_published 2015-07-13T00:00:00Z
source MITRE
title “Forkmeiamfamous”: Seaduke, latest weapon in the Duke armory

Register Uber

McCarthy, K. (2015, February 28). FORK ME! Uber hauls GitHub into court to find who hacked database of 50,000 drivers. Retrieved October 19, 2020.

Internal MISP references

UUID 89b85928-a962-4230-875c-63742b3c9d37 which can be used as unique global reference for Register Uber in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
date_published 2015-02-28T00:00:00Z
source MITRE
title FORK ME! Uber hauls GitHub into court to find who hacked database of 50,000 drivers

format_cmd_cisco

Cisco. (2022, August 16). format - Cisco IOS Configuration Fundamentals Command Reference. Retrieved July 13, 2022.

Internal MISP references

UUID 9442e08d-0858-5aa5-b642-a6b1e46018bc which can be used as unique global reference for format_cmd_cisco in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-13T00:00:00Z
date_published 2022-08-16T00:00:00Z
source MITRE
title format - Cisco IOS Configuration Fundamentals Command Reference

Quick Heal Blog February 17 2023

Quick Heal Blog. (2023, February 17). FormBook Malware Returns: New Variant Uses Steganography and In-Memory Loading of multiple stages to steal data. Retrieved May 7, 2023.

Internal MISP references

UUID 02233ce3-abb2-4aed-95b8-56b65c68a665 which can be used as unique global reference for Quick Heal Blog February 17 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2023-02-17T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title FormBook Malware Returns: New Variant Uses Steganography and In-Memory Loading of multiple stages to steal data

Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation

ALEXANDER MARVI, BRAD SLAYBAUGH, DAN EBREO, TUFAIL AHMED, MUHAMMAD UMAIR, TINA JOHNSON. (2023, March 16). Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation. Retrieved May 15, 2023.

Internal MISP references

UUID a43dd8ce-23d6-5768-8522-6973dc45e1ac which can be used as unique global reference for Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-15T00:00:00Z
date_published 2023-03-16T00:00:00Z
source MITRE
title Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation

Mandiant Fortinet Zero Day

Marvi, A. et al.. (2023, March 16). Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation. Retrieved March 22, 2023.

Internal MISP references

UUID 7bdc5bbb-ebbd-5eb8-bd10-9087c883aea7 which can be used as unique global reference for Mandiant Fortinet Zero Day in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-22T00:00:00Z
date_published 2023-03-16T00:00:00Z
source MITRE
title Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation

macOS Foundation

Apple. (n.d.). Foundation. Retrieved July 1, 2020.

Internal MISP references

UUID ea194268-0a8f-4494-be09-ef5f679f68fe which can be used as unique global reference for macOS Foundation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-07-01T00:00:00Z
source MITRE
title Foundation

SentinelOne Lazarus macOS July 2020

Stokes, P. (2020, July 27). Four Distinct Families of Lazarus Malware Target Apple’s macOS Platform. Retrieved August 7, 2020.

Internal MISP references

UUID 489c52a2-34cc-47ff-b42b-9d48f83b9e90 which can be used as unique global reference for SentinelOne Lazarus macOS July 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-07T00:00:00Z
date_published 2020-07-27T00:00:00Z
source MITRE
title Four Distinct Families of Lazarus Malware Target Apple’s macOS Platform

DOJ Russia Targeting Critical Infrastructure March 2022

Department of Justice. (2022, March 24). Four Russian Government Employees Charged in Two Historical Hacking Campaigns Targeting Critical Infrastructure Worldwide. Retrieved April 5, 2022.

Internal MISP references

UUID 768a0ec6-b767-4044-acad-82834508640f which can be used as unique global reference for DOJ Russia Targeting Critical Infrastructure March 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-05T00:00:00Z
date_published 2022-03-24T00:00:00Z
source MITRE
title Four Russian Government Employees Charged in Two Historical Hacking Campaigns Targeting Critical Infrastructure Worldwide

ClearkSky Fox Kitten February 2020

ClearSky. (2020, February 16). Fox Kitten – Widespread Iranian Espionage-Offensive Campaign. Retrieved December 21, 2020.

Internal MISP references

UUID a5ad6321-897a-4adc-9cdd-034a2538e3d6 which can be used as unique global reference for ClearkSky Fox Kitten February 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-21T00:00:00Z
date_published 2020-02-16T00:00:00Z
source MITRE, Tidal Cyber
title Fox Kitten – Widespread Iranian Espionage-Offensive Campaign

FSISAC FraudNetDoS September 2012

FS-ISAC. (2012, September 17). Fraud Alert – Cyber Criminals Targeting Financial Institution Employee Credentials to Conduct Wire Transfer Fraud. Retrieved September 23, 2024.

Internal MISP references

UUID 9c8772eb-6d1d-4742-a2db-a5e1006effaa which can be used as unique global reference for FSISAC FraudNetDoS September 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-23T00:00:00Z
date_published 2012-09-17T00:00:00Z
source MITRE
title Fraud Alert – Cyber Criminals Targeting Financial Institution Employee Credentials to Conduct Wire Transfer Fraud

MalwareBytes Ngrok February 2020

Segura, J. (2020, February 26). Fraudsters cloak credit card skimmer with fake content delivery network, ngrok server. Retrieved September 15, 2020.

Internal MISP references

UUID 531206c7-11ec-46bf-a35c-0464244a58c9 which can be used as unique global reference for MalwareBytes Ngrok February 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-15T00:00:00Z
date_published 2020-02-26T00:00:00Z
source MITRE
title Fraudsters cloak credit card skimmer with fake content delivery network, ngrok server

Akami Frog4Shell 2024

Ori David. (2024, February 1). Frog4Shell — FritzFrog Botnet Adds One-Days to Its Arsenal. Retrieved September 24, 2024.

Internal MISP references

UUID c67a2ccb-7abf-5409-a216-503e661a6b1c which can be used as unique global reference for Akami Frog4Shell 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-24T00:00:00Z
date_published 2024-02-01T00:00:00Z
source MITRE
title Frog4Shell — FritzFrog Botnet Adds One-Days to Its Arsenal

ESET ComRAT May 2020

Faou, M. (2020, May). From Agent.btz to ComRAT v4: A ten-year journey. Retrieved June 15, 2020.

Internal MISP references

UUID cd9043b8-4d14-449b-a6b2-2e9b99103bb0 which can be used as unique global reference for ESET ComRAT May 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-15T00:00:00Z
date_published 2020-05-01T00:00:00Z
source MITRE
title From Agent.btz to ComRAT v4: A ten-year journey

Azure AD to AD

Sean Metcalf. (2020, May 27). From Azure AD to Active Directory (via Azure) – An Unanticipated Attack Path. Retrieved September 28, 2022.

Internal MISP references

UUID 087d07a9-0d33-4253-b7c1-d55be13c0467 which can be used as unique global reference for Azure AD to AD in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-28T00:00:00Z
date_published 2020-05-27T00:00:00Z
source MITRE
title From Azure AD to Active Directory (via Azure) – An Unanticipated Attack Path

blackmatter_blackcat

Pereira, T. Huey, C. (2022, March 17). From BlackMatter to BlackCat: Analyzing two attacks from one affiliate. Retrieved May 5, 2022.

Internal MISP references

UUID 605b58ea-9544-49b8-b3c8-0a97b2b155dc which can be used as unique global reference for blackmatter_blackcat in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-05T00:00:00Z
date_published 2022-03-17T00:00:00Z
source MITRE
title From BlackMatter to BlackCat: Analyzing two attacks from one affiliate

Proofpoint June 17 2024

Tommy Madjar, Dusty Miller, Selena Larson, The Proofpoint Threat Research Team. (2024, June 17). From Clipboard to Compromise A PowerShell Self-Pwn . Retrieved June 20, 2024.

Internal MISP references

UUID a65d7492-04a4-46d4-85ed-134786c6828b which can be used as unique global reference for Proofpoint June 17 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-20T00:00:00Z
date_published 2024-06-17T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title From Clipboard to Compromise A PowerShell Self-Pwn

proofpoint-selfpwn

Tommy Madjar, Dusty Miller, Selena Larson. (2024, June 17). From Clipboard to Compromise: A PowerShell Self-Pwn. Retrieved August 2, 2024.

Internal MISP references

UUID 8f00ffc0-7094-5fd9-8ed4-9c129fd93c05 which can be used as unique global reference for proofpoint-selfpwn in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-02T00:00:00Z
date_published 2024-06-17T00:00:00Z
source MITRE
title From Clipboard to Compromise: A PowerShell Self-Pwn

Unit42 Malware Roundup December 29 2023

Samantha Stallings, Brad Duncan. (2023, December 29). From DarkGate to AsyncRAT: Malware Detected and Shared As Unit 42 Timely Threat Intelligence. Retrieved January 11, 2024.

Internal MISP references

UUID a18e19b5-9046-4c2c-bd94-2cd5061064bf which can be used as unique global reference for Unit42 Malware Roundup December 29 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-11T00:00:00Z
date_published 2023-12-29T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title From DarkGate to AsyncRAT: Malware Detected and Shared As Unit 42 Timely Threat Intelligence

Reaqta Mavinject

Reaqta. (2017, December 16). From False Positive to True Positive: the story of Mavinject.exe, the Microsoft Injector. Retrieved September 22, 2021.

Internal MISP references

UUID 5c0e0c84-2992-4098-8913-66a20ca61bf4 which can be used as unique global reference for Reaqta Mavinject in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-22T00:00:00Z
date_published 2017-12-16T00:00:00Z
source MITRE
title From False Positive to True Positive: the story of Mavinject.exe, the Microsoft Injector

IBM MegaCortex

Del Fierro, C. Kessem, L.. (2020, January 8). From Mega to Giga: Cross-Version Comparison of Top MegaCortex Modifications. Retrieved February 15, 2021.

Internal MISP references

UUID 3d70d9b7-88e4-411e-a59a-bc862da965a7 which can be used as unique global reference for IBM MegaCortex in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-15T00:00:00Z
date_published 2020-01-08T00:00:00Z
source MITRE
title From Mega to Giga: Cross-Version Comparison of Top MegaCortex Modifications

BiZone Lizar May 2021

BI.ZONE Cyber Threats Research Team. (2021, May 13). From pentest to APT attack: cybercriminal group FIN7 disguises its malware as an ethical hacker’s toolkit. Retrieved February 2, 2022.

Internal MISP references

UUID 315f47e1-69e5-4dcb-94b2-59583e91dd26 which can be used as unique global reference for BiZone Lizar May 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-02T00:00:00Z
date_published 2021-05-13T00:00:00Z
source MITRE
title From pentest to APT attack: cybercriminal group FIN7 disguises its malware as an ethical hacker’s toolkit

Kaspersky StoneDrill 2017

Kaspersky Lab. (2017, March 7). From Shamoon to StoneDrill: Wipers attacking Saudi organizations and beyond. Retrieved March 14, 2019.

Internal MISP references

UUID e2637cb3-c449-4609-af7b-ac78a900cc8b which can be used as unique global reference for Kaspersky StoneDrill 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-14T00:00:00Z
date_published 2017-03-07T00:00:00Z
source MITRE
title From Shamoon to StoneDrill: Wipers attacking Saudi organizations and beyond

Proofpoint TA427 April 2024

Lesnewich, G. et al. (2024, April 16). From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering. Retrieved May 3, 2024.

Internal MISP references

UUID 620f5ff7-26c0-55c4-9b1b-c56ad2e1316b which can be used as unique global reference for Proofpoint TA427 April 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-03T00:00:00Z
date_published 2024-04-16T00:00:00Z
source MITRE
title From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering

SentinelOne Agrius 2021

Amitai Ben & Shushan Ehrlich. (2021, May). From Wiper to Ransomware: The Evolution of Agrius. Retrieved May 21, 2024.

Internal MISP references

UUID b5b433a1-5d12-5644-894b-c42d995c9ba5 which can be used as unique global reference for SentinelOne Agrius 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-21T00:00:00Z
date_published 2021-05-01T00:00:00Z
source MITRE
title From Wiper to Ransomware: The Evolution of Agrius

FsiAnyCpu.exe - LOLBAS Project

LOLBAS. (2021, September 26). FsiAnyCpu.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 87031d31-b6d7-4860-b11b-5a0dc8774d92 which can be used as unique global reference for FsiAnyCpu.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-09-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title FsiAnyCpu.exe

Fsi.exe - LOLBAS Project

LOLBAS. (2021, September 26). Fsi.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 4e14e87f-2ad9-4959-8cb2-8585b67931c0 which can be used as unique global reference for Fsi.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-09-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Fsi.exe

fsutil_behavior

Microsoft. (2021, September 27). fsutil behavior. Retrieved January 14, 2022.

Internal MISP references

UUID 07712696-b1fd-4704-b157-9e420840fb2c which can be used as unique global reference for fsutil_behavior in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-14T00:00:00Z
date_published 2021-09-27T00:00:00Z
source MITRE
title fsutil behavior

Fsutil.exe - LOLBAS Project

LOLBAS. (2021, August 16). Fsutil.exe. Retrieved December 4, 2023.

Internal MISP references

UUID e2305dac-4245-4fac-8813-69cb210e9cd3 which can be used as unique global reference for Fsutil.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2021-08-16T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Fsutil.exe

Microsoft FTP

Microsoft. (2021, July 21). ftp. Retrieved February 25, 2022.

Internal MISP references

UUID 970f8d16-f5b7-44e2-b81f-738b931c60d9 which can be used as unique global reference for Microsoft FTP in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-25T00:00:00Z
date_published 2021-07-21T00:00:00Z
source MITRE
title ftp

Linux FTP

N/A. (n.d.). ftp(1) - Linux man page. Retrieved February 25, 2022.

Internal MISP references

UUID 021ea6bc-abff-48de-a6bb-315dbbfa6147 which can be used as unique global reference for Linux FTP in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-25T00:00:00Z
source MITRE
title ftp(1) - Linux man page

Ftp.exe - LOLBAS Project

LOLBAS. (2018, December 10). Ftp.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 3b51993d-6062-4138-bfc6-a2c0fc5d039a which can be used as unique global reference for Ftp.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-12-10T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Ftp.exe

Microsoft WMI Filters

Microsoft. (2008, September 11). Fun with WMI Filters in Group Policy. Retrieved March 13, 2019.

Internal MISP references

UUID 2894c3bf-6f8d-4338-8206-4dc873e3bb8d which can be used as unique global reference for Microsoft WMI Filters in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-13T00:00:00Z
date_published 2008-09-11T00:00:00Z
source MITRE
title Fun with WMI Filters in Group Policy

Cybersecurity Advisory SVR TTP May 2021

NCSC, CISA, FBI, NSA. (2021, May 7). Further TTPs associated with SVR cyber actors. Retrieved July 29, 2021.

Internal MISP references

UUID e18c1b56-f29d-4ea9-a425-a6af8ac6a347 which can be used as unique global reference for Cybersecurity Advisory SVR TTP May 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-07-29T00:00:00Z
date_published 2021-05-07T00:00:00Z
source MITRE
title Further TTPs associated with SVR cyber actors

RiskIQ Cobalt Nov 2017

Klijnsma, Y.. (2017, November 28). Gaffe Reveals Full List of Targets in Spear Phishing Attack Using Cobalt Strike Against Financial Institutions. Retrieved October 10, 2018.

Internal MISP references

UUID ebf961c5-bd68-42f3-8fd3-000946c7ae9c which can be used as unique global reference for RiskIQ Cobalt Nov 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-10-10T00:00:00Z
date_published 2017-11-28T00:00:00Z
source MITRE
title Gaffe Reveals Full List of Targets in Spear Phishing Attack Using Cobalt Strike Against Financial Institutions

Unit 42 PingPull Jun 2022

Unit 42. (2022, June 13). GALLIUM Expands Targeting Across Telecommunications, Government and Finance Sectors With New PingPull Tool. Retrieved August 7, 2022.

Internal MISP references

UUID ac6491ab-6ef1-4091-8a15-50e2cbafe157 which can be used as unique global reference for Unit 42 PingPull Jun 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-07T00:00:00Z
date_published 2022-06-13T00:00:00Z
source MITRE
title GALLIUM Expands Targeting Across Telecommunications, Government and Finance Sectors With New PingPull Tool

Microsoft GALLIUM December 2019

MSTIC. (2019, December 12). GALLIUM: Targeting global telecom. Retrieved January 13, 2021.

Internal MISP references

UUID 5bc76b47-ff68-4031-a347-f2dc0daba203 which can be used as unique global reference for Microsoft GALLIUM December 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-13T00:00:00Z
date_published 2019-12-12T00:00:00Z
source MITRE, Tidal Cyber
title GALLIUM: Targeting global telecom

Symantec Gallmaker Oct 2018

Symantec Security Response. (2018, October 10). Gallmaker: New Attack Group Eschews Malware to Live off the Land. Retrieved November 27, 2018.

Internal MISP references

UUID f47b3e2b-acdd-4487-88b9-de5cbe45cf33 which can be used as unique global reference for Symantec Gallmaker Oct 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-27T00:00:00Z
date_published 2018-10-10T00:00:00Z
source MITRE, Tidal Cyber
title Gallmaker: New Attack Group Eschews Malware to Live off the Land

TrendMicro Gamaredon April 2020

Kakara, H., Maruyama, E. (2020, April 17). Gamaredon APT Group Use Covid-19 Lure in Campaigns. Retrieved May 19, 2020.

Internal MISP references

UUID 3800cfc2-0260-4b36-b629-7a336b9f9f10 which can be used as unique global reference for TrendMicro Gamaredon April 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-19T00:00:00Z
date_published 2020-04-17T00:00:00Z
source MITRE
title Gamaredon APT Group Use Covid-19 Lure in Campaigns

ESET Gamaredon June 2020

Boutin, J. (2020, June 11). Gamaredon group grows its game. Retrieved June 16, 2020.

Internal MISP references

UUID 6532664d-2311-4b38-8960-f43762471729 which can be used as unique global reference for ESET Gamaredon June 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-16T00:00:00Z
date_published 2020-06-11T00:00:00Z
source MITRE
title Gamaredon group grows its game

CERT-EE Gamaredon January 2021

CERT-EE. (2021, January 27). Gamaredon Infection: From Dropper to Entry. Retrieved February 17, 2022.

Internal MISP references

UUID fec320ed-29c1-40db-ad2e-701fda428922 which can be used as unique global reference for CERT-EE Gamaredon January 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-17T00:00:00Z
date_published 2021-01-27T00:00:00Z
source MITRE
title Gamaredon Infection: From Dropper to Entry

Kaspersky Winnti June 2015

Tarakanov, D. (2015, June 22). Games are over: Winnti is now targeting pharmaceutical companies. Retrieved January 14, 2016.

Internal MISP references

UUID 86504950-0f4f-42bc-b003-24f60ae97c99 which can be used as unique global reference for Kaspersky Winnti June 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-14T00:00:00Z
date_published 2015-06-22T00:00:00Z
source MITRE
title Games are over: Winnti is now targeting pharmaceutical companies

WeLiveSecurity Gapz and Redyms Mar 2013

Matrosov, A. (2013, March 19). Gapz and Redyms droppers based on Power Loader code. Retrieved December 16, 2017.

Internal MISP references

UUID b8d328b7-2eb3-4851-8d44-2e1bad7710c2 which can be used as unique global reference for WeLiveSecurity Gapz and Redyms Mar 2013 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-16T00:00:00Z
date_published 2013-03-19T00:00:00Z
source MITRE
title Gapz and Redyms droppers based on Power Loader code

theevilbit gatekeeper bypass 2021

Csaba Fitzl. (2021, June 29). GateKeeper - Not a Bypass (Again). Retrieved September 22, 2021.

Internal MISP references

UUID d00f373d-2133-47c3-9b0a-104ecc9a6869 which can be used as unique global reference for theevilbit gatekeeper bypass 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-22T00:00:00Z
date_published 2021-06-29T00:00:00Z
source MITRE
title GateKeeper - Not a Bypass (Again)

Kaspersky Gauss Whitepaper

Kaspersky Lab. (2012, August). Gauss: Abnormal Distribution. Retrieved January 17, 2019.

Internal MISP references

UUID 4bf39390-f3ca-4132-841e-b35abefe7dee which can be used as unique global reference for Kaspersky Gauss Whitepaper in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-01-17T00:00:00Z
date_published 2012-08-01T00:00:00Z
source MITRE
title Gauss: Abnormal Distribution

Kaspersky MoleRATs April 2019

GReAT. (2019, April 10). Gaza Cybergang Group1, operation SneakyPastes. Retrieved May 13, 2020.

Internal MISP references

UUID 38216a34-5ffd-4e79-80b1-7270743b728e which can be used as unique global reference for Kaspersky MoleRATs April 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-13T00:00:00Z
date_published 2019-04-10T00:00:00Z
source MITRE
title Gaza Cybergang Group1, operation SneakyPastes

ESET Gazer Aug 2017

ESET. (2017, August). Gazing at Gazer: Turla’s new second stage backdoor. Retrieved September 14, 2017.

Internal MISP references

UUID 9d1c40af-d4bc-4d4a-b667-a17378942685 which can be used as unique global reference for ESET Gazer Aug 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-09-14T00:00:00Z
date_published 2017-08-01T00:00:00Z
source MITRE
title Gazing at Gazer: Turla’s new second stage backdoor

file_sig_table

Kessler, G. (2022, December 9). GCK'S FILE SIGNATURES TABLE. Retrieved August 23, 2022.

Internal MISP references

UUID 4bc3a8af-d0c1-514d-9edd-dcebb3344db8 which can be used as unique global reference for file_sig_table in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-23T00:00:00Z
date_published 2022-12-09T00:00:00Z
source MITRE
title GCK'S FILE SIGNATURES TABLE

Google Cloud Add Metadata

Google Cloud. (2022, March 31). gcloud compute instances add-metadata. Retrieved April 1, 2022.

Internal MISP references

UUID eba4b850-8784-4da2-b87d-54b5bd0f58d6 which can be used as unique global reference for Google Cloud Add Metadata in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-01T00:00:00Z
date_published 2022-03-31T00:00:00Z
source MITRE
title gcloud compute instances add-metadata

Google Compute Instances

Google. (n.d.). gcloud compute instances list. Retrieved May 26, 2020.

Internal MISP references

UUID ae09e791-a00c-487b-b0e5-7768df0679a3 which can be used as unique global reference for Google Compute Instances in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-26T00:00:00Z
source MITRE
title gcloud compute instances list

GCP SSH Key Add

Google. (n.d.). gcloud compute os-login ssh-keys add. Retrieved October 1, 2020.

Internal MISP references

UUID 372b6cfd-abdc-41b7-be78-4b1dc0426044 which can be used as unique global reference for GCP SSH Key Add in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-01T00:00:00Z
source MITRE
title gcloud compute os-login ssh-keys add

Google Cloud - IAM Servie Accounts List API

Google. (2020, June 23). gcloud iam service-accounts list. Retrieved August 4, 2020.

Internal MISP references

UUID 3ffad706-1dac-41dd-b197-06f22fec3b30 which can be used as unique global reference for Google Cloud - IAM Servie Accounts List API in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-04T00:00:00Z
date_published 2020-06-23T00:00:00Z
source MITRE
title gcloud iam service-accounts list

ESET Gelsemium June 2021

Dupuy, T. and Faou, M. (2021, June). Gelsemium. Retrieved November 30, 2021.

Internal MISP references

UUID ea28cf8c-8c92-48cb-b499-ffb7ff0e3cf5 which can be used as unique global reference for ESET Gelsemium June 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-11-30T00:00:00Z
date_published 2021-06-01T00:00:00Z
source MITRE
title Gelsemium

TechNet Scheduled Task Events

Microsoft. (n.d.). General Task Registration. Retrieved December 12, 2017.

Internal MISP references

UUID 344703ac-f67c-465b-8c56-c9617675a00b which can be used as unique global reference for TechNet Scheduled Task Events in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-12T00:00:00Z
source MITRE
title General Task Registration

Ebowla: Genetic Malware

Morrow, T., Pitts, J. (2016, October 28). Genetic Malware: Designing Payloads for Specific Targets. Retrieved January 18, 2019.

Internal MISP references

UUID 8c65dbc1-33ad-470c-b172-7497c6fd2480 which can be used as unique global reference for Ebowla: Genetic Malware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-01-18T00:00:00Z
date_published 2016-10-28T00:00:00Z
source MITRE
title Genetic Malware: Designing Payloads for Specific Targets

Proofpoint NETWIRE December 2020

Proofpoint. (2020, December 2). Geofenced NetWire Campaigns. Retrieved January 7, 2021.

Internal MISP references

UUID 5a974fc5-31bb-44b5-9834-ef98175402ec which can be used as unique global reference for Proofpoint NETWIRE December 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-07T00:00:00Z
date_published 2020-12-02T00:00:00Z
source MITRE
title Geofenced NetWire Campaigns

Hartrell cd00r 2002

Hartrell, Greg. (2002, August). Get a handle on cd00r: The invisible backdoor. Retrieved October 13, 2018.

Internal MISP references

UUID 739e6517-10f5-484d-8000-8818d63e7341 which can be used as unique global reference for Hartrell cd00r 2002 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-10-13T00:00:00Z
date_published 2002-08-01T00:00:00Z
source MITRE
title Get a handle on cd00r: The invisible backdoor

Kubectl Exec Get Shell

The Kubernetes Authors. (n.d.). Get a Shell to a Running Container. Retrieved March 29, 2021.

Internal MISP references

UUID ffb9c0ca-533f-4911-8c0c-a2653410a76d which can be used as unique global reference for Kubectl Exec Get Shell in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-29T00:00:00Z
source MITRE
title Get a Shell to a Running Container

Microsoft getglobaladdresslist

Microsoft. (n.d.). Get-GlobalAddressList. Retrieved October 6, 2019.

Internal MISP references

UUID a4948a80-d11c-44ed-ae63-e3f5660463f9 which can be used as unique global reference for Microsoft getglobaladdresslist in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-06T00:00:00Z
source MITRE
title Get-GlobalAddressList

Jay GetHooks Sept 2011

Satiro, J. (2011, September 14). GetHooks. Retrieved December 12, 2017.

Internal MISP references

UUID 228ac239-3a97-446f-8e1c-d5c0f580710c which can be used as unique global reference for Jay GetHooks Sept 2011 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-12T00:00:00Z
date_published 2011-09-14T00:00:00Z
source MITRE
title GetHooks

Microsoft Get-InboxRule

Microsoft. (n.d.). Get-InboxRule. Retrieved June 10, 2021.

Internal MISP references

UUID c6a1b00c-22d4-407a-a515-fbce5c197606 which can be used as unique global reference for Microsoft Get-InboxRule in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-10T00:00:00Z
source MITRE
title Get-InboxRule

Microsoft Msolrole

Microsoft. (n.d.). Get-MsolRole. Retrieved October 6, 2019.

Internal MISP references

UUID e36f4e3a-61c9-4fdc-98de-d51a2b3b4865 which can be used as unique global reference for Microsoft Msolrole in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-06T00:00:00Z
source MITRE
title Get-MsolRole

Microsoft msolrolemember

Microsoft. (n.d.). Get-MsolRoleMember. Retrieved October 6, 2019.

Internal MISP references

UUID ca28494c-d834-4afc-9237-ab78dcfc427b which can be used as unique global reference for Microsoft msolrolemember in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-06T00:00:00Z
source MITRE
title Get-MsolRoleMember

JumpCloud Conditional Access Policies

JumpCloud. (n.d.). Get Started: Conditional Access Policies. Retrieved January 2, 2024.

Internal MISP references

UUID 585b4ed7-1f1b-5e7f-bf2b-3732e07309af which can be used as unique global reference for JumpCloud Conditional Access Policies in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-02T00:00:00Z
source MITRE
title Get Started: Conditional Access Policies

rowland linux at 2019

Craig Rowland. (2019, July 25). Getting an Attacker IP Address from a Malicious Linux At Job. Retrieved October 15, 2021.

Internal MISP references

UUID 85056eba-c587-4619-b5e4-dff9680be7b3 which can be used as unique global reference for rowland linux at 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-15T00:00:00Z
date_published 2019-07-25T00:00:00Z
source MITRE
title Getting an Attacker IP Address from a Malicious Linux At Job

Elastic GuLoader December 5 2023

Daniel Stepanic. (2023, December 5). Getting gooey with GULOADER: deobfuscating the downloader. Retrieved February 27, 2024.

Internal MISP references

UUID 291fb8ac-a3d6-48a0-9c78-09e358634012 which can be used as unique global reference for Elastic GuLoader December 5 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-27T00:00:00Z
date_published 2023-12-05T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Getting gooey with GULOADER: deobfuscating the downloader

BlackHatRobinSage

Ryan, T. (2010). “Getting In Bed with Robin Sage.”. Retrieved March 6, 2017.

Internal MISP references

UUID 82068e93-a3f8-4d05-9358-6fe76a0055bb which can be used as unique global reference for BlackHatRobinSage in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-06T00:00:00Z
date_published 2010-01-01T00:00:00Z
source MITRE
title “Getting In Bed with Robin Sage.”

AADInternals Root Access to Azure VMs

Dr. Nestori Syynimaa. (2020, June 4). Getting root access to Azure VMs as a Azure AD Global Administrator. Retrieved March 13, 2023.

Internal MISP references

UUID 7080ae79-bec4-5886-9a43-6039d0cfd32f which can be used as unique global reference for AADInternals Root Access to Azure VMs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-13T00:00:00Z
date_published 2020-06-04T00:00:00Z
source MITRE
title Getting root access to Azure VMs as a Azure AD Global Administrator

Wardle Dylib Hijack Vulnerable Apps

Patrick Wardle. (2019, July 2). Getting Root with Benign AppStore Apps. Retrieved March 31, 2021.

Internal MISP references

UUID 128b4e3f-bb58-45e0-b8d9-bff9fc3ec3df which can be used as unique global reference for Wardle Dylib Hijack Vulnerable Apps in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-31T00:00:00Z
date_published 2019-07-02T00:00:00Z
source MITRE
title Getting Root with Benign AppStore Apps

Lua main page

Lua. (2024, June 25). Getting started. Retrieved August 5, 2024.

Internal MISP references

UUID 6d9298d3-ad9f-5b19-949c-84bef49f5f6c which can be used as unique global reference for Lua main page in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-05T00:00:00Z
date_published 2024-06-25T00:00:00Z
source MITRE
title Getting started

2 - appv

Microsoft. (2022, November 3). Getting started with App-V for Windows client. Retrieved February 6, 2024.

Internal MISP references

UUID 8305a718-e79f-5bf7-8af3-b117cf106c81 which can be used as unique global reference for 2 - appv in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-06T00:00:00Z
date_published 2022-11-03T00:00:00Z
source MITRE
title Getting started with App-V for Windows client

MSDN VBA in Office

Austin, J. (2017, June 6). Getting Started with VBA in Office. Retrieved July 3, 2017.

Internal MISP references

UUID 9c44416d-1f3d-4d99-b497-4615ed6f5546 which can be used as unique global reference for MSDN VBA in Office in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-07-03T00:00:00Z
date_published 2017-06-06T00:00:00Z
source MITRE
title Getting Started with VBA in Office

Windows Getting Started Drivers

Viviano, A. (2021, August 17). Getting started with Windows drivers: User mode and kernel mode. Retrieved September 24, 2021.

Internal MISP references

UUID 1b93e7ba-6afa-45ff-a9e2-3586cdae822c which can be used as unique global reference for Windows Getting Started Drivers in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-24T00:00:00Z
date_published 2021-08-17T00:00:00Z
source MITRE
title Getting started with Windows drivers: User mode and kernel mode

Bloxham

Bloxham, B. (n.d.). Getting Windows to Play with Itself [PowerPoint slides]. Retrieved November 12, 2014.

Internal MISP references

UUID b212d16f-5347-49ab-8339-432b4fd1ef50 which can be used as unique global reference for Bloxham in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-12T00:00:00Z
source MITRE
title Getting Windows to Play with Itself [PowerPoint slides]

Microsoft GetWindowLong function

Microsoft. (n.d.). GetWindowLong function. Retrieved December 16, 2017.

Internal MISP references

UUID 4366217a-2325-4056-ab68-f5f4d2a0703c which can be used as unique global reference for Microsoft GetWindowLong function in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-16T00:00:00Z
source MITRE
title GetWindowLong function

Microsoft GFlags Mar 2017

Microsoft. (2017, May 23). GFlags Overview. Retrieved December 18, 2017.

Internal MISP references

UUID 9c11c382-b420-4cf9-9db2-eaa7b60aee2d which can be used as unique global reference for Microsoft GFlags Mar 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-18T00:00:00Z
date_published 2017-05-23T00:00:00Z
source MITRE
title GFlags Overview

GfxDownloadWrapper.exe - LOLBAS Project

LOLBAS. (2019, December 27). GfxDownloadWrapper.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 5d97b7d7-428e-4408-a4d3-00f52cf4bf15 which can be used as unique global reference for GfxDownloadWrapper.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2019-12-27T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GfxDownloadWrapper.exe

Kaspersky September 30 2021

Mark Lechtik. (2021, September 30). GhostEmperor From ProxyLogon to kernel mode. Retrieved October 24, 2024.

Internal MISP references

UUID 8851f554-05c6-4fb0-807e-2ef0bc28e131 which can be used as unique global reference for Kaspersky September 30 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-24T00:00:00Z
date_published 2021-09-30T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GhostEmperor From ProxyLogon to kernel mode

GhostToken GCP flaw

Sergiu Gatlan. (2023, April 21). GhostToken GCP flaw let attackers backdoor Google accounts. Retrieved September 18, 2023.

Internal MISP references

UUID 3f87bd65-4194-5be6-93a1-acde6eaef547 which can be used as unique global reference for GhostToken GCP flaw in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-18T00:00:00Z
date_published 2023-04-21T00:00:00Z
source MITRE
title GhostToken GCP flaw let attackers backdoor Google accounts

GitHub ADRecon

adrecon. (n.d.). GitHub ADRecon. Retrieved March 5, 2024.

Internal MISP references

UUID 8ef4bcee-673d-4bab-8e18-947f45c6fc77 which can be used as unique global reference for GitHub ADRecon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-05T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub ADRecon

GitHub BeichenDream BadPotato

BeichenDream. (n.d.). GitHub BeichenDream BadPotato. Retrieved August 28, 2023.

Internal MISP references

UUID e7f1d932-4bcd-4a78-b975-f4ebbce8c05e which can be used as unique global reference for GitHub BeichenDream BadPotato in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-28T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub BeichenDream BadPotato

GitHub Chisel

jpillora. (n.d.). GitHub Chisel. Retrieved October 20, 2023.

Internal MISP references

UUID 4a60fb46-06b7-44ea-a9f6-8d6fa81e9363 which can be used as unique global reference for GitHub Chisel in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub Chisel

GitHub cybershujin Threat-Actors-use-of-Artifical-Intelligence

cybershujin. (n.d.). GitHub cybershujin Threat-Actors-use-of-Artifical-Intelligence. Retrieved September 9, 2024.

Internal MISP references

UUID b595af7e-ff84-49fa-8e07-cd2abe9e1d65 which can be used as unique global reference for GitHub cybershujin Threat-Actors-use-of-Artifical-Intelligence in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub cybershujin Threat-Actors-use-of-Artifical-Intelligence

Github evilginx2

Gretzky, Kuba. (2019, April 10). Retrieved October 8, 2019.

Internal MISP references

UUID 322e5d90-5095-47ea-b0e2-e7e5fb45fcca which can be used as unique global reference for Github evilginx2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-08T00:00:00Z
source MITRE
title Github evilginx2

GitHub evilginx2 - Duplicate

kgretzky. (n.d.). GitHub evilginx2. Retrieved December 14, 2023.

Internal MISP references

UUID eea178f4-80bd-49d1-84b1-f80671e9a3e4 which can be used as unique global reference for GitHub evilginx2 - Duplicate in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub evilginx2

GitHub Flangvik SharpExfiltrate

Flangvik. (n.d.). GitHub Flangvik SharpExfiltrate. Retrieved June 18, 2024.

Internal MISP references

UUID 7f0c0c86-c042-4a69-982a-c8c70ec1199c which can be used as unique global reference for GitHub Flangvik SharpExfiltrate in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub Flangvik SharpExfiltrate

GitHub Malleable C2

Mudge, R. (2014, July 14). Github Malleable-C2-Profiles safebrowsing.profile. Retrieved June 18, 2017.

Internal MISP references

UUID 0a609b90-dbaf-47bc-a642-1d180ca56498 which can be used as unique global reference for GitHub Malleable C2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-06-18T00:00:00Z
date_published 2014-07-14T00:00:00Z
source MITRE
title Github Malleable-C2-Profiles safebrowsing.profile

GitHub masscan

robertdavidgraham. (n.d.). GitHub masscan. Retrieved March 13, 2024.

Internal MISP references

UUID 7ae0b5c6-c9e5-4922-9e98-6483c81a8b42 which can be used as unique global reference for GitHub masscan in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-13T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub masscan

GitHub meganz MEGAcmd

meganz. (n.d.). GitHub meganz MEGAcmd. Retrieved June 18, 2024.

Internal MISP references

UUID 6e4d67f5-cca1-4298-b21c-d7511aa264ae which can be used as unique global reference for GitHub meganz MEGAcmd in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub meganz MEGAcmd

GitHub meganz MEGAsync

GitHub. (n.d.). GitHub - meganz/MEGAsync: Easy automated syncing between your computers and your MEGA Cloud Drive. Retrieved June 22, 2023.

Internal MISP references

UUID 6e59c47d-597c-4687-942f-9f1cf1db75d5 which can be used as unique global reference for GitHub meganz MEGAsync in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-22T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub - meganz/MEGAsync: Easy automated syncing between your computers and your MEGA Cloud Drive

GitHub - NYAN-x-CAT/AsyncRAT-C-Sharp: Open-Source Remote Administration Tool For Windows C

GitHub. (n.d.). GitHub - NYAN-x-CAT/AsyncRAT-C-Sharp: Open-Source Remote Administration Tool For Windows C#. Retrieved May 7, 2023.

Internal MISP references

UUID 6747f2cf-61bd-4d26-9bc1-10ce7a8e3e39 which can be used as unique global reference for GitHub - NYAN-x-CAT/AsyncRAT-C-Sharp: Open-Source Remote Administration Tool For Windows C# in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub - NYAN-x-CAT/AsyncRAT-C-Sharp: Open-Source Remote Administration Tool For Windows C#

GitHub ohpe Juicy Potato

ohpe. (n.d.). GitHub ohpe Juicy Potato. Retrieved August 28, 2023.

Internal MISP references

UUID 16d0dd05-763a-4503-aa88-c8867d8f202d which can be used as unique global reference for GitHub ohpe Juicy Potato in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-28T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub ohpe Juicy Potato

GitHub outflanknl Dumpert

outflanknl. (n.d.). GitHub outflanknl Dumpert. Retrieved September 5, 2024.

Internal MISP references

UUID ab375812-def9-4491-a69f-62755fb26910 which can be used as unique global reference for GitHub outflanknl Dumpert in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-05T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub outflanknl Dumpert

code_persistence_zsh

Leo Pitt. (2020, November 11). Github - PersistentJXA/BashProfilePersist.js. Retrieved January 11, 2021.

Internal MISP references

UUID b76d3ed0-e484-4ed1-aa6b-892a6f34e478 which can be used as unique global reference for code_persistence_zsh in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-11T00:00:00Z
date_published 2020-11-11T00:00:00Z
source MITRE
title Github - PersistentJXA/BashProfilePersist.js

Github PowerShell Empire

Schroeder, W., Warner, J., Nelson, M. (n.d.). Github PowerShellEmpire. Retrieved April 28, 2016.

Internal MISP references

UUID 017ec673-454c-492a-a65b-10d3a20dfdab which can be used as unique global reference for Github PowerShell Empire in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-28T00:00:00Z
source MITRE
title Github PowerShellEmpire

GitHub Pupy

Nicolas Verdier. (n.d.). Retrieved January 29, 2018.

Internal MISP references

UUID 69d5cb59-6545-4405-8ca6-733db99d3ee9 which can be used as unique global reference for GitHub Pupy in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-29T00:00:00Z
source MITRE
title GitHub Pupy

GitHub purple-team-attack-automation - Available Modules

praetorian-inc. (n.d.). GitHub purple-team-attack-automation - Available Modules. Retrieved September 8, 2023.

Internal MISP references

UUID 9bca14cc-1302-49b3-b905-cdf48dedc32b which can be used as unique global reference for GitHub purple-team-attack-automation - Available Modules in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-08T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub purple-team-attack-automation - Available Modules

GitHub random_c2_profile

threatexpress. (n.d.). GitHub random_c2_profile. Retrieved September 21, 2023.

Internal MISP references

UUID dcb30328-6aa4-461b-8333-451d6af4b384 which can be used as unique global reference for GitHub random_c2_profile in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-21T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub random_c2_profile

GitHub ransomware_map

cert-orangecyberdefense. (n.d.). GitHub ransomware_map. Retrieved March 13, 2024.

Internal MISP references

UUID d995f4b2-3262-4c37-855a-61aef7d7b8a8 which can be used as unique global reference for GitHub ransomware_map in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-13T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub ransomware_map

GitHub rsockstun

llkat. (n.d.). GitHub rsockstun. Retrieved December 14, 2023.

Internal MISP references

UUID 1644457f-75d6-4064-a11b-9217249fa5e6 which can be used as unique global reference for GitHub rsockstun in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub rsockstun

GitHub secretsdump

fortra. (n.d.). GitHub secretsdump. Retrieved November 16, 2023.

Internal MISP references

UUID c29a90a7-016f-49b7-a970-334290964f19 which can be used as unique global reference for GitHub secretsdump in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-11-16T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub secretsdump

GitHub securesocketfunneling ssf

securesocketfunneling. (n.d.). GitHub securesocketfunneling ssf. Retrieved July 10, 2024.

Internal MISP references

UUID 077ab224-9406-4be7-8467-2a6da8dc786d which can be used as unique global reference for GitHub securesocketfunneling ssf in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-10T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub securesocketfunneling ssf

GitHub SharpChromium

djhohnstein. (n.d.). GitHub SharpChromium. Retrieved December 14, 2023.

Internal MISP references

UUID ca1956a5-72f2-43ad-a17f-a52ca97bd84e which can be used as unique global reference for GitHub SharpChromium in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub SharpChromium

GitHub SharpHound

BloodHoundAD. (n.d.). GitHub SharpHound. Retrieved March 7, 2024.

Internal MISP references

UUID e1c405b4-b591-4469-848c-7a7dd69151c0 which can be used as unique global reference for GitHub SharpHound in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-07T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub SharpHound

GitHub SharpRoast

GhostPack. (n.d.). GitHub SharpRoast. Retrieved September 22, 2023.

Internal MISP references

UUID 43a2e05d-4662-4a5c-9c99-3165f0d71169 which can be used as unique global reference for GitHub SharpRoast in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-22T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub SharpRoast

GitHub SILENTTRINITY March 2022

Salvati, M (2019, August 6). SILENTTRINITY. Retrieved March 23, 2022.

Internal MISP references

UUID cff66280-c592-4e3c-a56c-32a9620cf95c which can be used as unique global reference for GitHub SILENTTRINITY March 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-23T00:00:00Z
source MITRE
title GitHub SILENTTRINITY March 2022

GitHub SoftEtherVPN SoftEtherVPN_Stable

SoftEtherVPN. (n.d.). GitHub SoftEtherVPN SoftEtherVPN_Stable. Retrieved August 28, 2023.

Internal MISP references

UUID f9d28db2-499f-407c-94d2-652b9ed5f928 which can be used as unique global reference for GitHub SoftEtherVPN SoftEtherVPN_Stable in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-28T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub SoftEtherVPN SoftEtherVPN_Stable

GitHub Terminator

ZeroMemoryEx. (n.d.). GitHub Terminator. Retrieved March 13, 2024.

Internal MISP references

UUID c2556bcf-9cc9-4f46-8a0f-8f8d801dfdbf which can be used as unique global reference for GitHub Terminator in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-13T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub Terminator

GitHub wavestone-cdt EDRSandBlast

wavestone-cdt. (n.d.). GitHub wavestone-cdt EDRSandBlast. Retrieved September 5, 2024.

Internal MISP references

UUID 228dd3e1-1952-447c-a500-31663a2efe45 which can be used as unique global reference for GitHub wavestone-cdt EDRSandBlast in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-05T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub wavestone-cdt EDRSandBlast

GitHub xmrig-proxy

xmrig. (n.d.). GitHub xmrig-proxy. Retrieved October 25, 2023.

Internal MISP references

UUID bd2a5de0-f55f-4eeb-a11f-8ec1e9f2ae2b which can be used as unique global reference for GitHub xmrig-proxy in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GitHub xmrig-proxy

GitHub Gitrob

Michael Henriksen. (2018, June 9). Gitrob: Putting the Open Source in OSINT. Retrieved October 19, 2020.

Internal MISP references

UUID 1dee0842-15cc-4835-b8a8-938e0c94807b which can be used as unique global reference for GitHub Gitrob in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
date_published 2018-06-09T00:00:00Z
source MITRE
title Gitrob: Putting the Open Source in OSINT

FireEye DNS Hijack 2019

Hirani, M., Jones, S., Read, B. (2019, January 10). Global DNS Hijacking Campaign: DNS Record Manipulation at Scale. Retrieved October 9, 2020.

Internal MISP references

UUID 2c696e90-11eb-4196-9946-b5c4c11ccddc which can be used as unique global reference for FireEye DNS Hijack 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-09T00:00:00Z
date_published 2019-01-10T00:00:00Z
source MITRE
title Global DNS Hijacking Campaign: DNS Record Manipulation at Scale

McAfee Night Dragon

McAfee® Foundstone® Professional Services and McAfee Labs™. (2011, February 10). Global Energy Cyberattacks: “Night Dragon”. Retrieved February 19, 2018.

Internal MISP references

UUID 242d2933-ca2b-4511-803a-454727a3acc5 which can be used as unique global reference for McAfee Night Dragon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-19T00:00:00Z
date_published 2011-02-10T00:00:00Z
source MITRE
title Global Energy Cyberattacks: “Night Dragon”

GMER Rootkits

GMER. (n.d.). GMER. Retrieved December 12, 2017.

Internal MISP references

UUID f43e9881-4919-4ccc-b2ed-929d7838b2b4 which can be used as unique global reference for GMER Rootkits in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-12T00:00:00Z
source MITRE
title GMER

Gnome Remote Desktop grd-settings

Pascal Nowack. (n.d.). Retrieved September 21, 2021.

Internal MISP references

UUID 8f494ff3-b02b-470b-a57d-d2275989f541 which can be used as unique global reference for Gnome Remote Desktop grd-settings in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-21T00:00:00Z
source MITRE
title Gnome Remote Desktop grd-settings

Gnome Remote Desktop gschema

Pascal Nowack. (n.d.). Retrieved September 21, 2021.

Internal MISP references

UUID c7c749d5-b1b0-4a0f-8d14-eef47cfa1279 which can be used as unique global reference for Gnome Remote Desktop gschema in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-21T00:00:00Z
source MITRE
title Gnome Remote Desktop gschema

MITRE Trustworthy Firmware Measurement

Upham, K. (2014, March). Going Deep into the BIOS with MITRE Firmware Security Research. Retrieved January 5, 2016.

Internal MISP references

UUID 25f52172-293e-4b23-9239-201a0ddbcdf1 which can be used as unique global reference for MITRE Trustworthy Firmware Measurement in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-05T00:00:00Z
date_published 2014-03-01T00:00:00Z
source MITRE
title Going Deep into the BIOS with MITRE Firmware Security Research

Secureworks Gold Blackburn Mar 2022

Secureworks Counter Threat Unit. (2022, March 1). Gold Blackburn Threat Profile. Retrieved June 15, 2023.

Internal MISP references

UUID b6b27fa9-488c-5b6d-8e12-fe8371846cd3 which can be used as unique global reference for Secureworks Gold Blackburn Mar 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-15T00:00:00Z
date_published 2022-03-01T00:00:00Z
source MITRE
title Gold Blackburn Threat Profile

Secureworks GOLD CABIN

Secureworks. (n.d.). GOLD CABIN Threat Profile. Retrieved March 17, 2021.

Internal MISP references

UUID 778babec-e7d3-4341-9e33-aab361f2b98a which can be used as unique global reference for Secureworks GOLD CABIN in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-17T00:00:00Z
source MITRE, Tidal Cyber
title GOLD CABIN Threat Profile

McAfee Gold Dragon

Sherstobitoff, R., Saavedra-Morales, J. (2018, February 02). Gold Dragon Widens Olympics Malware Attacks, Gains Permanent Presence on Victims’ Systems. Retrieved June 6, 2018.

Internal MISP references

UUID 4bdfa92b-cbbd-43e6-aa3e-422561ff8d7a which can be used as unique global reference for McAfee Gold Dragon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-06-06T00:00:00Z
date_published 2018-02-02T00:00:00Z
source MITRE
title Gold Dragon Widens Olympics Malware Attacks, Gains Permanent Presence on Victims’ Systems

Cyberark Golden SAML

Reiner, S. (2017, November 21). Golden SAML: Newly Discovered Attack Technique Forges Authentication to Cloud Apps. Retrieved December 17, 2020.

Internal MISP references

UUID 58083370-8126-47d3-827c-1910ed3f4b2a which can be used as unique global reference for Cyberark Golden SAML in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-17T00:00:00Z
date_published 2017-11-21T00:00:00Z
source MITRE
title Golden SAML: Newly Discovered Attack Technique Forges Authentication to Cloud Apps

Trustwave GoldenSpy2 June 2020

Trustwave SpiderLabs. (2020, June 26). GoldenSpy: Chapter Two – The Uninstaller. Retrieved July 23, 2020.

Internal MISP references

UUID 5031e82e-66e8-4ae0-be47-53daa87ddf94 which can be used as unique global reference for Trustwave GoldenSpy2 June 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-07-23T00:00:00Z
date_published 2020-06-26T00:00:00Z
source MITRE
title GoldenSpy: Chapter Two – The Uninstaller

Secureworks GOLD IONIC April 2024

Counter Threat Unit Research Team. (2024, April 15). GOLD IONIC DEPLOYS INC RANSOMWARE. Retrieved June 5, 2024.

Internal MISP references

UUID e723e7b3-496f-5ab4-abaf-83859e7e912d which can be used as unique global reference for Secureworks GOLD IONIC April 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-05T00:00:00Z
date_published 2024-04-15T00:00:00Z
source MITRE
title GOLD IONIC DEPLOYS INC RANSOMWARE

Secureworks GOLD KINGSWOOD Threat Profile

Secureworks. (n.d.). GOLD KINGSWOOD. Retrieved October 18, 2021.

Internal MISP references

UUID 36035bbb-1609-4461-be27-ef4a920b814c which can be used as unique global reference for Secureworks GOLD KINGSWOOD Threat Profile in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-18T00:00:00Z
source MITRE
title GOLD KINGSWOOD

MSTIC NOBELIUM Mar 2021

Nafisi, R., Lelli, A. (2021, March 4). GoldMax, GoldFinder, and Sibot: Analyzing NOBELIUM’s layered persistence. Retrieved March 8, 2021.

Internal MISP references

UUID 8688a0a9-d644-4b96-81bb-031f1f898652 which can be used as unique global reference for MSTIC NOBELIUM Mar 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-08T00:00:00Z
date_published 2021-03-04T00:00:00Z
source MITRE
title GoldMax, GoldFinder, and Sibot: Analyzing NOBELIUM’s layered persistence

Secureworks GOLD NIAGARA Threat Profile

CTU. (n.d.). GOLD NIAGARA. Retrieved September 21, 2021.

Internal MISP references

UUID b11276cb-f6dd-4e91-90cd-9c287fb3e6b1 which can be used as unique global reference for Secureworks GOLD NIAGARA Threat Profile in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-21T00:00:00Z
source MITRE
title GOLD NIAGARA

Secureworks Gold Prelude Profile

Secureworks. (n.d.). GOLD PRELUDE . Retrieved March 22, 2024.

Internal MISP references

UUID b16ae37d-5244-5c1e-92a9-e494b5a9ef49 which can be used as unique global reference for Secureworks Gold Prelude Profile in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-22T00:00:00Z
source MITRE
title GOLD PRELUDE

Secureworks GOLD SAHARA

Secureworks. (n.d.). GOLD SAHARA. Retrieved February 20, 2024.

Internal MISP references

UUID 3abb7995-4a62-56a6-9492-942965edf0a0 which can be used as unique global reference for Secureworks GOLD SAHARA in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-20T00:00:00Z
source MITRE
title GOLD SAHARA

Secureworks GOLD SOUTHFIELD

Secureworks. (n.d.). GOLD SOUTHFIELD. Retrieved October 6, 2020.

Internal MISP references

UUID 01d1ffaa-16b3-41c4-bb5a-afe2b41f1142 which can be used as unique global reference for Secureworks GOLD SOUTHFIELD in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-06T00:00:00Z
source MITRE
title GOLD SOUTHFIELD

Google Chrome Remote Desktop

Google. (n.d.). Retrieved March 14, 2024.

Internal MISP references

UUID 70c87a07-38eb-53d2-8b63-013eb3ce62c8 which can be used as unique global reference for Google Chrome Remote Desktop in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-14T00:00:00Z
source MITRE
title Google Chrome Remote Desktop

Google Cloud Identity API Documentation

Google. (n.d.). Retrieved March 16, 2021.

Internal MISP references

UUID 67f2719e-74fd-4bc1-9eeb-07d3095a5191 which can be used as unique global reference for Google Cloud Identity API Documentation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-16T00:00:00Z
source MITRE
title Google Cloud Identity API Documentation

GCPBucketBrute

Spencer Gietzen. (2019, February 26). Google Cloud Platform (GCP) Bucket Enumeration and Privilege Escalation. Retrieved March 4, 2022.

Internal MISP references

UUID d956e1f6-37ca-4352-b275-84c174888b88 which can be used as unique global reference for GCPBucketBrute in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-04T00:00:00Z
date_published 2019-02-26T00:00:00Z
source MITRE
title Google Cloud Platform (GCP) Bucket Enumeration and Privilege Escalation

ExploitDB GoogleHacking

Offensive Security. (n.d.). Google Hacking Database. Retrieved October 23, 2020.

Internal MISP references

UUID 29714b88-a1ff-4684-a3b0-35c3a2c78947 which can be used as unique global reference for ExploitDB GoogleHacking in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-23T00:00:00Z
source MITRE
title Google Hacking Database

Freejacked

Clark, Michael. (2023, August 14). Google’s Vertex AI Platform Gets Freejacked. Retrieved February 28, 2024.

Internal MISP references

UUID c7007fa4-bc07-59aa-820e-ffeea1486ed6 which can be used as unique global reference for Freejacked in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-28T00:00:00Z
date_published 2023-08-14T00:00:00Z
source MITRE
title Google’s Vertex AI Platform Gets Freejacked

Google Workspace Global Access List

Google. (n.d.). Retrieved March 16, 2021.

Internal MISP references

UUID 5104f0ea-1fb6-4260-a9b6-95922b3a8e5b which can be used as unique global reference for Google Workspace Global Access List in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-16T00:00:00Z
source MITRE
title Google Workspace Global Access List

OWN-CERT Google App Script 2024

L'Hutereau Arnaud. (n.d.). Google Workspace Malicious App Script analysis. Retrieved October 2, 2024.

Internal MISP references

UUID 1f837b2d-6b45-57ed-8d34-a78ce88cb998 which can be used as unique global reference for OWN-CERT Google App Script 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-02T00:00:00Z
source MITRE
title Google Workspace Malicious App Script analysis

Trend Micro January 09 2023

Trend Micro. (2023, January 9). Gootkit Loader Actively Targets Australian Healthcare Industry. Retrieved May 7, 2023.

Internal MISP references

UUID 903861d2-cd45-4bda-bc70-2a44c6d49aa6 which can be used as unique global reference for Trend Micro January 09 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2023-01-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Gootkit Loader Actively Targets Australian Healthcare Industry

Sophos Gootloader

Szappanos, G. & Brandt, A. (2021, March 1). “Gootloader” expands its payload delivery options. Retrieved September 30, 2022.

Internal MISP references

UUID 63357292-0f08-4405-a45a-34b606ab7110 which can be used as unique global reference for Sophos Gootloader in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-30T00:00:00Z
date_published 2021-03-01T00:00:00Z
source MITRE
title “Gootloader” expands its payload delivery options

SentinelOne Gootloader June 2021

Pirozzi, A. (2021, June 16). Gootloader: ‘Initial Access as a Service’ Platform Expands Its Search for High Value Targets. Retrieved May 28, 2024.

Internal MISP references

UUID 8512c5fd-2ddc-5de4-bb7d-8012402efbb5 which can be used as unique global reference for SentinelOne Gootloader June 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-28T00:00:00Z
date_published 2021-06-16T00:00:00Z
source MITRE
title Gootloader: ‘Initial Access as a Service’ Platform Expands Its Search for High Value Targets

SentinelLabs Gootloader June 2021

Antonio Pirozzi. (2021, June 16). Gootloader: ‘Initial Access as a Service’ Platform Expands Its Search for High Value Targets. Retrieved May 7, 2023.

Internal MISP references

UUID 1ab5b9c2-4e91-420f-9a27-661588d0bd71 which can be used as unique global reference for SentinelLabs Gootloader June 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2021-06-16T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Gootloader: ‘Initial Access as a Service’ Platform Expands Its Search for High Value Targets

Cybereason Gootloader February 2023

Loïc Castel, Jakes Jansen, Nitin Grover. (2023, February 14). GootLoader - SEO Poisoning and Large Payloads Leading to Compromise. Retrieved May 18, 2023.

Internal MISP references

UUID 098bf58f-3868-4892-bb4d-c78ce8817a02 which can be used as unique global reference for Cybereason Gootloader February 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-18T00:00:00Z
date_published 2023-02-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GootLoader - SEO Poisoning and Large Payloads Leading to Compromise

GoTo Resolve

GoTo. (n.d.). GoTo Resolve. Retrieved October 11, 2024.

Internal MISP references

UUID f1a13cad-b77e-4c38-925c-038a4fcec8d3 which can be used as unique global reference for GoTo Resolve in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-11T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GoTo Resolve

SentinelOne 1 16 2023

Jim Walter. (2023, January 16). Gotta Catch 'Em All . Retrieved January 1, 2024.

Internal MISP references

UUID 1482155f-e70d-434c-ade0-23543a4124fe which can be used as unique global reference for SentinelOne 1 16 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-01T00:00:00Z
date_published 2023-01-16T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Gotta Catch 'Em All

Unit 42 CARROTBAT January 2020

McCabe, A. (2020, January 23). The Fractured Statue Campaign: U.S. Government Agency Targeted in Spear-Phishing Attacks. Retrieved June 2, 2020.

Internal MISP references

UUID b65442ca-18ca-42e0-8be0-7c2b66c26d02 which can be used as unique global reference for Unit 42 CARROTBAT January 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-02T00:00:00Z
source MITRE
title Government Agency Targeted in Spear-Phishing Attacks

Secureworks BRONZE SILHOUETTE May 2023

Counter Threat Unit Research Team. (2023, May 24). Chinese Cyberespionage Group BRONZE SILHOUETTE Targets U.S. Government and Defense Organizations. Retrieved July 27, 2023.

Internal MISP references

UUID 77624549-e170-5894-9219-a15b4aa31726 which can be used as unique global reference for Secureworks BRONZE SILHOUETTE May 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-27T00:00:00Z
source MITRE
title Government and Defense Organizations

Google_WinRAR_vuln_2023

Morgan, K. (2023, October 18). Government-backed actors exploiting WinRAR vulnerability. Retrieved July 19, 2024.

Internal MISP references

UUID 009ac8a4-7e2b-543e-82aa-ce3cc9f0c35e which can be used as unique global reference for Google_WinRAR_vuln_2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-19T00:00:00Z
date_published 2023-10-18T00:00:00Z
source MITRE
title Government-backed actors exploiting WinRAR vulnerability

Google TAG CVE-2023-38831 October 18 2023

Kate Morgan. (2023, October 18). Government-backed actors exploiting WinRAR vulnerability. Retrieved July 10, 2024.

Internal MISP references

UUID 6e8fb629-4bb8-4557-9d42-385060be598f which can be used as unique global reference for Google TAG CVE-2023-38831 October 18 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-10T00:00:00Z
date_published 2023-10-18T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Government-backed actors exploiting WinRAR vulnerability

DOJ KVBotnet 2024

US Department of Justice. (2024, January 31). U.S. Government Disrupts Botnet People’s Republic of China Used to Conceal Hacking of Critical Infrastructure. Retrieved June 10, 2024.

Internal MISP references

UUID 55cf0ced-0de3-5af8-b3e6-3c33bb445593 which can be used as unique global reference for DOJ KVBotnet 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-10T00:00:00Z
source MITRE
title Government Disrupts Botnet People’s Republic of China Used to Conceal Hacking of Critical Infrastructure

FireEye HAWKBALL Jun 2019

Patil, S. and Williams, M.. (2019, June 5). Government Sector in Central Asia Targeted With New HAWKBALL Backdoor Delivered via Microsoft Office Vulnerabilities. Retrieved June 20, 2019.

Internal MISP references

UUID c88150b1-8c0a-4fc5-b5b7-11e242af1c43 which can be used as unique global reference for FireEye HAWKBALL Jun 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-20T00:00:00Z
date_published 2019-06-05T00:00:00Z
source MITRE
title Government Sector in Central Asia Targeted With New HAWKBALL Backdoor Delivered via Microsoft Office Vulnerabilities

CISA AA20-296A Berserk Bear December 2020

CISA. (2020, December 1). Russian State-Sponsored Advanced Persistent Threat Actor Compromises U.S. Government Targets. Retrieved December 9, 2021.

Internal MISP references

UUID c7bc4b25-2043-4f43-8320-590f82d0e09a which can be used as unique global reference for CISA AA20-296A Berserk Bear December 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-12-09T00:00:00Z
source MITRE, Tidal Cyber
title Government Targets

Obscuresecurity Get-GPPPassword

Campbell, C. (2012, May 24). GPP Password Retrieval with PowerShell. Retrieved April 11, 2018.

Internal MISP references

UUID 54351cf9-8d2a-47fb-92d5-fe64b628ab06 which can be used as unique global reference for Obscuresecurity Get-GPPPassword in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-11T00:00:00Z
date_published 2012-05-24T00:00:00Z
source MITRE
title GPP Password Retrieval with PowerShell

Microsoft gpresult

Microsoft. (2017, October 16). gpresult. Retrieved August 6, 2021.

Internal MISP references

UUID 88af38e8-e437-4153-80af-a1be8c6a8629 which can be used as unique global reference for Microsoft gpresult in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-06T00:00:00Z
date_published 2017-10-16T00:00:00Z
source MITRE
title gpresult

Gpscript.exe - LOLBAS Project

LOLBAS. (2018, May 25). Gpscript.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 619f57d9-d93b-4e9b-aae0-6ce89d91deb6 which can be used as unique global reference for Gpscript.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Gpscript.exe

ESET Grandoreiro April 2020

ESET. (2020, April 28). Grandoreiro: How engorged can an EXE get?. Retrieved November 13, 2020.

Internal MISP references

UUID d6270492-986b-4fb6-bdbc-2e364947847c which can be used as unique global reference for ESET Grandoreiro April 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-13T00:00:00Z
date_published 2020-04-28T00:00:00Z
source MITRE
title Grandoreiro: How engorged can an EXE get?

IBM Grandoreiro April 2020

Abramov, D. (2020, April 13). Grandoreiro Malware Now Targeting Banks in Spain. Retrieved November 12, 2020.

Internal MISP references

UUID a2d4bca5-d57d-4a77-95c6-409f90115e2f which can be used as unique global reference for IBM Grandoreiro April 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-12T00:00:00Z
date_published 2020-04-13T00:00:00Z
source MITRE
title Grandoreiro Malware Now Targeting Banks in Spain

Guardian Grand Theft Auto Leak 2022

Keza MacDonald, Keith Stuart and Alex Hern. (2022, September 19). Grand Theft Auto 6 leak: who hacked Rockstar and what was stolen?. Retrieved August 30, 2024.

Internal MISP references

UUID ec648a9b-025a-52a0-a98a-7ba04388d52e which can be used as unique global reference for Guardian Grand Theft Auto Leak 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-08-30T00:00:00Z
date_published 2022-09-19T00:00:00Z
source MITRE
title Grand Theft Auto 6 leak: who hacked Rockstar and what was stolen?

AWS PassRole

AWS. (n.d.). Granting a user permissions to pass a role to an AWS service. Retrieved July 10, 2023.

Internal MISP references

UUID 01e0c198-dd59-5dd1-b632-73cb316eafe0 which can be used as unique global reference for AWS PassRole in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-10T00:00:00Z
source MITRE
title Granting a user permissions to pass a role to an AWS service

Microsoft Azure Storage Shared Access Signature

Microsoft. (2023, June 7). Grant limited access to Azure Storage resources using shared access signatures (SAS). Retrieved March 4, 2024.

Internal MISP references

UUID 9031357f-04ac-5c07-a59d-97b9e32edf79 which can be used as unique global reference for Microsoft Azure Storage Shared Access Signature in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-04T00:00:00Z
date_published 2023-06-07T00:00:00Z
source MITRE
title Grant limited access to Azure Storage resources using shared access signatures (SAS)

CopyFromScreen .NET

Microsoft. (n.d.). Graphics.CopyFromScreen Method. Retrieved March 24, 2020.

Internal MISP references

UUID b9733af4-ffb4-416e-884e-d51649aecbce which can be used as unique global reference for CopyFromScreen .NET in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-24T00:00:00Z
source MITRE
title Graphics.CopyFromScreen Method

Talos GravityRAT

Mercer, W., Rascagneres, P. (2018, April 26). GravityRAT - The Two-Year Evolution Of An APT Targeting India. Retrieved May 16, 2018.

Internal MISP references

UUID 2d7a1d72-cc9a-4b0b-a89a-e24ca836879b which can be used as unique global reference for Talos GravityRAT in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-05-16T00:00:00Z
date_published 2018-04-26T00:00:00Z
source MITRE
title GravityRAT - The Two-Year Evolution Of An APT Targeting India

FireEye PowerShell Logging

Dunwoody, M. (2016, February 11). Greater Visibility Through PowerShell Logging. Retrieved September 28, 2021.

Internal MISP references

UUID 02ee8297-60e8-42bf-8791-2461ebc29207 which can be used as unique global reference for FireEye PowerShell Logging in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-28T00:00:00Z
date_published 2016-02-11T00:00:00Z
source MITRE
title Greater Visibility Through PowerShell Logging

FireEye PowerShell Logging 2016

Dunwoody, M. (2016, February 11). GREATER VISIBILITY THROUGH POWERSHELL LOGGING. Retrieved February 16, 2016.

Internal MISP references

UUID eb1e9dc7-b935-42ae-bbde-d2fdda5953db which can be used as unique global reference for FireEye PowerShell Logging 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-02-16T00:00:00Z
date_published 2016-02-11T00:00:00Z
source MITRE
title GREATER VISIBILITY THROUGH POWERSHELL LOGGING

Glitch-Cat Green Lambert ATTCK Oct 2021

Sandvik, Runa. (2021, October 18). Green Lambert and ATT&CK. Retrieved March 21, 2022.

Internal MISP references

UUID f22d033c-4474-4bd7-b194-c7a4d9819a2b which can be used as unique global reference for Glitch-Cat Green Lambert ATTCK Oct 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-21T00:00:00Z
date_published 2021-10-18T00:00:00Z
source MITRE
title Green Lambert and ATT&CK

GreenMwizi - Kenyan scamming campaign using Twitter bots

blog.bushidotoken.net. (n.d.). GreenMwizi - Kenyan scamming campaign using Twitter bots. Retrieved May 7, 2023.

Internal MISP references

UUID 3b09696a-1345-4283-a59b-e9a13124ef59 which can be used as unique global reference for GreenMwizi - Kenyan scamming campaign using Twitter bots in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title GreenMwizi - Kenyan scamming campaign using Twitter bots

ESET GreyEnergy Oct 2018

Cherepanov, A. (2018, October). GREYENERGY A successor to BlackEnergy. Retrieved November 15, 2018.

Internal MISP references

UUID f3e70f41-6c22-465c-b872-a7ec5e6a3e67 which can be used as unique global reference for ESET GreyEnergy Oct 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-11-15T00:00:00Z
date_published 2018-10-01T00:00:00Z
source MITRE
title GREYENERGY A successor to BlackEnergy

GRIZZLY STEPPE JAR

Department of Homeland Security and Federal Bureau of Investigation. (2016, December 29). GRIZZLY STEPPE – Russian Malicious Cyber Activity. Retrieved January 11, 2017.

Internal MISP references

UUID 4b26d274-497f-49bc-a2a5-b93856a49893 which can be used as unique global reference for GRIZZLY STEPPE JAR in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-01-11T00:00:00Z
date_published 2016-12-29T00:00:00Z
source MITRE
title GRIZZLY STEPPE – Russian Malicious Cyber Activity

Citizen Lab Group5

Scott-Railton, J., et al. (2016, August 2). Group5: Syria and the Iranian Connection. Retrieved September 26, 2016.

Internal MISP references

UUID ffbec5e8-947a-4363-b7e1-812dfd79935a which can be used as unique global reference for Citizen Lab Group5 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-09-26T00:00:00Z
date_published 2016-08-02T00:00:00Z
source MITRE, Tidal Cyber
title Group5: Syria and the Iranian Connection

Group-IB Threat Intelligence Tweet October 9 2023

GroupIB_TI. (2023, October 9). Group-IB Threat Intelligence Tweet October 9 2023. Retrieved October 10, 2023.

Internal MISP references

UUID 2df546ed-6577-44b2-9b26-0a17c3622df7 which can be used as unique global reference for Group-IB Threat Intelligence Tweet October 9 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-10T00:00:00Z
date_published 2023-10-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Group-IB Threat Intelligence Tweet October 9 2023

TechNet Group Policy Basics

srachui. (2012, February 13). Group Policy Basics – Part 1: Understanding the Structure of a Group Policy Object. Retrieved March 5, 2019.

Internal MISP references

UUID 9b9c8c6c-c272-424e-a594-a34b7bf62477 which can be used as unique global reference for TechNet Group Policy Basics in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-05T00:00:00Z
date_published 2012-02-13T00:00:00Z
source MITRE
title Group Policy Basics – Part 1: Understanding the Structure of a Group Policy Object

Microsoft GPP 2016

Microsoft. (2016, August 31). Group Policy Preferences. Retrieved March 9, 2020.

Internal MISP references

UUID fa3beaf1-81e7-411b-849a-24cffaf7c552 which can be used as unique global reference for Microsoft GPP 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-09T00:00:00Z
date_published 2016-08-31T00:00:00Z
source MITRE
title Group Policy Preferences

groups man page

MacKenzie, D. and Youngman, J. (n.d.). groups(1) - Linux man page. Retrieved January 11, 2024.

Internal MISP references

UUID 3d3c9756-4700-5db3-b8bc-8d2958df6a42 which can be used as unique global reference for groups man page in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-11T00:00:00Z
source MITRE
title groups(1) - Linux man page

Venafi SSH Key Abuse

Blachman, Y. (2020, April 22). Growing Abuse of SSH Keys: Commodity Malware Campaigns Now Equipped with SSH Capabilities. Retrieved June 24, 2020.

Internal MISP references

UUID cba14230-13bc-47ad-8f3f-d798217657bd which can be used as unique global reference for Venafi SSH Key Abuse in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-24T00:00:00Z
date_published 2020-04-22T00:00:00Z
source MITRE
title Growing Abuse of SSH Keys: Commodity Malware Campaigns Now Equipped with SSH Capabilities

Wikibooks Grsecurity

Wikibooks. (2018, August 19). Grsecurity/The RBAC System. Retrieved June 4, 2020.

Internal MISP references

UUID 8a7abfa0-97e8-4cac-9d76-c886e9666a16 which can be used as unique global reference for Wikibooks Grsecurity in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-04T00:00:00Z
date_published 2018-08-19T00:00:00Z
source MITRE
title Grsecurity/The RBAC System

TrueSec Gsecdump

TrueSec. (n.d.). gsecdump v2.0b5. Retrieved September 29, 2015.

Internal MISP references

UUID ba1d07ed-2e18-4f5f-9d44-082530946f14 which can be used as unique global reference for TrueSec Gsecdump in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-09-29T00:00:00Z
source MITRE
title gsecdump v2.0b5

GTFOBins Suid

Emilio Pinna, Andrea Cardaci. (n.d.). GTFOBins. Retrieved January 28, 2022.

Internal MISP references

UUID 0b7d8e81-da8e-4f6a-a1b7-4ed81e441b4d which can be used as unique global reference for GTFOBins Suid in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-01-28T00:00:00Z
source MITRE
title GTFOBins

GTFObins at

Emilio Pinna, Andrea Cardaci. (n.d.). gtfobins at. Retrieved September 28, 2021.

Internal MISP references

UUID 3fad6618-5a85-4f7a-be2b-0600269d7768 which can be used as unique global reference for GTFObins at in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-28T00:00:00Z
source MITRE
title gtfobins at

AWS GuardDuty EC2 finding types

AWS. (n.d.). GuardDuty EC2 finding types. Retrieved September 25, 2024.

Internal MISP references

UUID 249f1a90-d6ed-503c-998c-a9d1650509d2 which can be used as unique global reference for AWS GuardDuty EC2 finding types in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-25T00:00:00Z
source MITRE
title GuardDuty EC2 finding types

AWS GuardDuty IAM finding types

AWS. (n.d.). GuardDuty IAM finding types. Retrieved September 24, 2024.

Internal MISP references

UUID 215a79b4-c25b-5b09-912a-6b68914bb1ba which can be used as unique global reference for AWS GuardDuty IAM finding types in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-24T00:00:00Z
source MITRE
title GuardDuty IAM finding types

AWS GuardDuty RDS Protection

AWS. (n.d.). GuardDuty RDS Protection. Retrieved September 24, 2024.

Internal MISP references

UUID 4c6101f0-25d9-5ed1-98a2-a0c468e3ff1a which can be used as unique global reference for AWS GuardDuty RDS Protection in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-24T00:00:00Z
source MITRE
title GuardDuty RDS Protection

Fortinet Moses Staff February 15 2022

Rotem Sde-Or. (2022, February 15). Guard Your Drive from DriveGuard: Moses Staff Campaigns Against Israeli Organizations Span Several Months. Retrieved October 23, 2023.

Internal MISP references

UUID 4a435edb-18ae-4c31-beff-2b8f2e6cad34 which can be used as unique global reference for Fortinet Moses Staff February 15 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-10-23T00:00:00Z
date_published 2022-02-15T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Guard Your Drive from DriveGuard: Moses Staff Campaigns Against Israeli Organizations Span Several Months

Microsoft Log4j Vulnerability Exploitation December 2021

Microsoft Threat Intelligence. (2021, December 11). Guidance for preventing, detecting, and hunting for exploitation of the Log4j 2 vulnerability. Retrieved December 7, 2023.

Internal MISP references

UUID 456ed22f-0de1-5ee4-bb8a-29e3baedc7b1 which can be used as unique global reference for Microsoft Log4j Vulnerability Exploitation December 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-07T00:00:00Z
date_published 2021-12-11T00:00:00Z
source MITRE
title Guidance for preventing, detecting, and hunting for exploitation of the Log4j 2 vulnerability

Unit 42 NETWIRE April 2020

Duncan, B. (2020, April 3). GuLoader: Malspam Campaign Installing NetWire RAT. Retrieved January 7, 2021.

Internal MISP references

UUID b42f119d-144a-470a-b9fe-ccbf80a78fbb which can be used as unique global reference for Unit 42 NETWIRE April 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-07T00:00:00Z
date_published 2020-04-03T00:00:00Z
source MITRE
title GuLoader: Malspam Campaign Installing NetWire RAT

Cloud Hack Tricks GWS Apps Script

HackTricks Cloud. (n.d.). GWS - App Scripts. Retrieved July 1, 2024.

Internal MISP references

UUID 32569f13-e383-576c-813c-52490450464d which can be used as unique global reference for Cloud Hack Tricks GWS Apps Script in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-01T00:00:00Z
source MITRE
title GWS - App Scripts

H0lyGh0st - North Korean Threat Group Strikes Back With New Ransomware

www.picussecurity.com. (n.d.). H0lyGh0st - North Korean Threat Group Strikes Back With New Ransomware. Retrieved May 19, 2023.

Internal MISP references

UUID 3f66ef62-ac0d-4ece-9a4b-917ae70f1617 which can be used as unique global reference for H0lyGh0st - North Korean Threat Group Strikes Back With New Ransomware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-19T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title H0lyGh0st - North Korean Threat Group Strikes Back With New Ransomware

Cisco H1N1 Part 1

Reynolds, J.. (2016, September 13). H1N1: Technical analysis reveals new capabilities. Retrieved September 26, 2016.

Internal MISP references

UUID 03a2faca-1a47-4f68-9f26-3fa98145f2ab which can be used as unique global reference for Cisco H1N1 Part 1 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-09-26T00:00:00Z
date_published 2016-09-13T00:00:00Z
source MITRE
title H1N1: Technical analysis reveals new capabilities

Cisco H1N1 Part 2

Reynolds, J.. (2016, September 14). H1N1: Technical analysis reveals new capabilities – part 2. Retrieved September 26, 2016.

Internal MISP references

UUID b53e55dc-078d-4535-a99f-c979ad8ca6e6 which can be used as unique global reference for Cisco H1N1 Part 2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-09-26T00:00:00Z
date_published 2016-09-14T00:00:00Z
source MITRE
title H1N1: Technical analysis reveals new capabilities – part 2

Wired Magecart S3 Buckets, 2019

Barrett, B.. (2019, July 11). Hack Brief: A Card-Skimming Hacker Group Hit 17K Domains—and Counting. Retrieved October 4, 2019.

Internal MISP references

UUID 47fb06ed-b4ce-454c-9bbe-21b28309f351 which can be used as unique global reference for Wired Magecart S3 Buckets, 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-04T00:00:00Z
date_published 2019-07-11T00:00:00Z
source MITRE
title Hack Brief: A Card-Skimming Hacker Group Hit 17K Domains—and Counting

Wired Uber Breach

Andy Greenberg. (2017, January 21). Hack Brief: Uber Paid Off Hackers to Hide a 57-Million User Data Breach. Retrieved May 14, 2021.

Internal MISP references

UUID 3bdf88b3-8f41-4945-9292-e299bab4f98e which can be used as unique global reference for Wired Uber Breach in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-05-14T00:00:00Z
date_published 2017-01-21T00:00:00Z
source MITRE
title Hack Brief: Uber Paid Off Hackers to Hide a 57-Million User Data Breach

Trendmicro NPM Compromise

Trendmicro. (2018, November 29). Hacker Infects Node.js Package to Steal from Bitcoin Wallets. Retrieved April 10, 2019.

Internal MISP references

UUID 69eac1b0-1c50-4534-99e0-2d0fd738ab8f which can be used as unique global reference for Trendmicro NPM Compromise in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-04-10T00:00:00Z
date_published 2018-11-29T00:00:00Z
source MITRE
title Hacker Infects Node.js Package to Steal from Bitcoin Wallets

Data Destruction - Threat Post

Mimoso, M.. (2014, June 18). Hacker Puts Hosting Service Code Spaces Out of Business. Retrieved December 15, 2020.

Internal MISP references

UUID 97d16d3a-98a0-4a7d-9f74-8877c8088ddf which can be used as unique global reference for Data Destruction - Threat Post in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-15T00:00:00Z
date_published 2014-06-18T00:00:00Z
source MITRE
title Hacker Puts Hosting Service Code Spaces Out of Business

GWS Apps Script Abuse 2021

Sergiu Gatlan. (2021, February 18). Hackers abuse Google Apps Script to steal credit cards, bypass CSP. Retrieved July 1, 2024.

Internal MISP references

UUID 590687ce-0d66-584d-a6bf-8e7288f00d1e which can be used as unique global reference for GWS Apps Script Abuse 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-01T00:00:00Z
date_published 2021-02-18T00:00:00Z
source MITRE
title Hackers abuse Google Apps Script to steal credit cards, bypass CSP

Bleeping Computer - Scriptrunner.exe

Bill Toulas. (2023, January 4). Hackers abuse Windows error reporting tool to deploy malware. Retrieved July 8, 2024.

Internal MISP references

UUID f7ab464d-255b-5d92-a878-c16c905c057b which can be used as unique global reference for Bleeping Computer - Scriptrunner.exe in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-08T00:00:00Z
date_published 2023-01-04T00:00:00Z
source MITRE
title Hackers abuse Windows error reporting tool to deploy malware

Bloomberg Scattered Spider May 8 2024

Katrina Manson. (2024, May 8). Hackers Behind MGM Attack Targeting Financial Sector in New Campaign. Retrieved May 22, 2024.

Internal MISP references

UUID 2bf7e84a-805d-48aa-b911-8cd8a9dbf1cf which can be used as unique global reference for Bloomberg Scattered Spider May 8 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-22T00:00:00Z
date_published 2024-05-08T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Hackers Behind MGM Attack Targeting Financial Sector in New Campaign

Salesforce zero-day in facebook phishing attack

Bill Toulas. (2023, August 2). Hackers exploited Salesforce zero-day in Facebook phishing attack. Retrieved September 18, 2023.

Internal MISP references

UUID cbd360bb-f4b6-5326-8861-b05f3a2a8737 which can be used as unique global reference for Salesforce zero-day in facebook phishing attack in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-18T00:00:00Z
date_published 2023-08-02T00:00:00Z
source MITRE
title Hackers exploited Salesforce zero-day in Facebook phishing attack

Fortune Dragonfly 2.0 Sept 2017

Hackett, R. (2017, September 6). Hackers Have Penetrated Energy Grid, Symantec Warns. Retrieved June 6, 2018.

Internal MISP references

UUID b56c5b41-b8e0-4fef-a6d8-183bb283dc7c which can be used as unique global reference for Fortune Dragonfly 2.0 Sept 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-06-06T00:00:00Z
date_published 2017-09-06T00:00:00Z
source MITRE
title Hackers Have Penetrated Energy Grid, Symantec Warns

Wired Cyber Army of Russia April 17 2024

Andy Greenberg. (2024, April 17). Hackers Linked to Russia’s Military Claim Credit for Sabotaging US Water Utilities. Retrieved April 30, 2024.

Internal MISP references

UUID 53583baf-4e09-4d19-9348-6110206b88be which can be used as unique global reference for Wired Cyber Army of Russia April 17 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-04-30T00:00:00Z
date_published 2024-04-17T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Hackers Linked to Russia’s Military Claim Credit for Sabotaging US Water Utilities

Huntress API Hash

Brennan, M. (2022, February 16). Hackers No Hashing: Randomizing API Hashes to Evade Cobalt Strike Shellcode Detection. Retrieved August 22, 2022.

Internal MISP references

UUID e9f91661-29e3-408e-bfdd-c7df22f3f400 which can be used as unique global reference for Huntress API Hash in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-22T00:00:00Z
date_published 2022-02-16T00:00:00Z
source MITRE
title Hackers No Hashing: Randomizing API Hashes to Evade Cobalt Strike Shellcode Detection

BleepingComputer Agent Tesla steal wifi passwords

Sergiu Gatlan. (2020, April 16). Hackers steal WiFi passwords using upgraded Agent Tesla malware. Retrieved September 8, 2023.

Internal MISP references

UUID 93b5ecd2-35a3-5bd8-9d6e-87bace012546 which can be used as unique global reference for BleepingComputer Agent Tesla steal wifi passwords in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-08T00:00:00Z
date_published 2020-04-16T00:00:00Z
source MITRE
title Hackers steal WiFi passwords using upgraded Agent Tesla malware

SWAT-hospital

Giles, Bruce. (2024, January 4). Hackers threaten to send SWAT teams to Fred Hutch patients' homes. Retrieved January 5, 2024.

Internal MISP references

UUID ce8bc906-875a-53bd-8b9c-b2191e369e4e which can be used as unique global reference for SWAT-hospital in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-05T00:00:00Z
date_published 2024-01-04T00:00:00Z
source MITRE
title Hackers threaten to send SWAT teams to Fred Hutch patients' homes

PCMag FakeLogin

Kan, M. (2019, October 24). Hackers Try to Phish United Nations Staffers With Fake Login Pages. Retrieved October 20, 2020.

Internal MISP references

UUID f652524c-7950-4a8a-9860-0e658a9581d8 which can be used as unique global reference for PCMag FakeLogin in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
date_published 2019-10-24T00:00:00Z
source MITRE
title Hackers Try to Phish United Nations Staffers With Fake Login Pages

BleepingComputer Velvet Ant June 17 2024

Bill Toulas. (2024, June 17). Hackers use F5 BIG-IP malware to stealthily steal data for years. Retrieved June 20, 2024.

Internal MISP references

UUID 70235e47-f8bb-4d16-9933-9f4923f08f5d which can be used as unique global reference for BleepingComputer Velvet Ant June 17 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-20T00:00:00Z
date_published 2024-06-17T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Hackers use F5 BIG-IP malware to stealthily steal data for years

Krebs-Bazaar

Brian Krebs. (2016, October 31). Hackforums Shutters Booter Service Bazaar. Retrieved May 15, 2017.

Internal MISP references

UUID b46efda2-18e0-451e-b945-28421c2d5274 which can be used as unique global reference for Krebs-Bazaar in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-05-15T00:00:00Z
date_published 2016-10-31T00:00:00Z
source MITRE
title Hackforums Shutters Booter Service Bazaar

BleepingComputer Molerats Dec 2020

Ilascu, I. (2020, December 14). Hacking group’s new malware abuses Google and Facebook services. Retrieved December 28, 2020.

Internal MISP references

UUID 307108c8-9c72-4f31-925b-0b9bd4b31e7b which can be used as unique global reference for BleepingComputer Molerats Dec 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-28T00:00:00Z
date_published 2020-12-14T00:00:00Z
source MITRE
title Hacking group’s new malware abuses Google and Facebook services

Microsoft Hacking Team Breach

Microsoft Secure Team. (2016, June 1). Hacking Team Breach: A Cyber Jurassic Park. Retrieved March 5, 2019.

Internal MISP references

UUID 8daac742-6467-40db-9fe5-87efd2a96f09 which can be used as unique global reference for Microsoft Hacking Team Breach in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-05T00:00:00Z
date_published 2016-06-01T00:00:00Z
source MITRE
title Hacking Team Breach: A Cyber Jurassic Park

Intel HackingTeam UEFI Rootkit

Intel Security. (2005, July 16). HackingTeam's UEFI Rootkit Details. Retrieved March 20, 2017.

Internal MISP references

UUID 1c476cb2-8ce0-4559-8037-646d0ea09398 which can be used as unique global reference for Intel HackingTeam UEFI Rootkit in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-20T00:00:00Z
date_published 2005-07-16T00:00:00Z
source MITRE
title HackingTeam's UEFI Rootkit Details

TrendMicro Hacking Team UEFI

Lin, P. (2015, July 13). Hacking Team Uses UEFI BIOS Rootkit to Keep RCS 9 Agent in Target Systems. Retrieved December 11, 2015.

Internal MISP references

UUID 24796535-d516-45e9-bcc7-8f03a3f3cd73 which can be used as unique global reference for TrendMicro Hacking Team UEFI in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-12-11T00:00:00Z
date_published 2015-07-13T00:00:00Z
source MITRE
title Hacking Team Uses UEFI BIOS Rootkit to Keep RCS 9 Agent in Target Systems

TempertonDarkHotel

Temperton, J. (2015, August 10). Hacking Team zero-day used in new Darkhotel attacks. Retrieved March 9, 2017.

Internal MISP references

UUID 4de7960b-bd62-452b-9e64-b52a0d580858 which can be used as unique global reference for TempertonDarkHotel in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-09T00:00:00Z
date_published 2015-08-10T00:00:00Z
source MITRE
title Hacking Team zero-day used in new Darkhotel attacks

FireEye Hacking FIN4 Video Dec 2014

Vengerik, B. & Dennesen, K.. (2014, December 5). Hacking the Street? FIN4 Likely Playing the Market. Retrieved January 15, 2019.

Internal MISP references

UUID 6dcfe3fb-c310-49cf-a657-f2cec65c5499 which can be used as unique global reference for FireEye Hacking FIN4 Video Dec 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-01-15T00:00:00Z
date_published 2014-12-05T00:00:00Z
source MITRE
title Hacking the Street? FIN4 Likely Playing the Market

FireEye Hacking FIN4 Dec 2014

Vengerik, B. et al.. (2014, December 5). Hacking the Street? FIN4 Likely Playing the Market. Retrieved December 17, 2018.

Internal MISP references

UUID c3ac1c2a-21cc-42a9-a214-88f302371766 which can be used as unique global reference for FireEye Hacking FIN4 Dec 2014 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-12-17T00:00:00Z
date_published 2014-12-05T00:00:00Z
source MITRE
title Hacking the Street? FIN4 Likely Playing the Market

Malwarebytes OSINT Leaky Buckets - Hioureas

Vasilios Hioureas. (2019, September 13). Hacking with AWS: incorporating leaky buckets into your OSINT workflow. Retrieved February 14, 2022.

Internal MISP references

UUID 67ebcf71-828e-4202-b842-f071140883f8 which can be used as unique global reference for Malwarebytes OSINT Leaky Buckets - Hioureas in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-14T00:00:00Z
date_published 2019-09-13T00:00:00Z
source MITRE
title Hacking with AWS: incorporating leaky buckets into your OSINT workflow

Microsoft Gsecdump

Vincent Tiu. (2017, September 15). HackTool:Win32/Gsecdump. Retrieved January 10, 2024.

Internal MISP references

UUID e9c12a7f-ce8a-5f20-8283-509e16532d9b which can be used as unique global reference for Microsoft Gsecdump in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-10T00:00:00Z
date_published 2017-09-15T00:00:00Z
source MITRE
title HackTool:Win32/Gsecdump

Microsoft HAFNIUM March 2020

MSTIC. (2021, March 2). HAFNIUM targeting Exchange Servers with 0-day exploits. Retrieved March 3, 2021.

Internal MISP references

UUID 6a986c46-79a3-49c6-94d2-d9b1f5db08f3 which can be used as unique global reference for Microsoft HAFNIUM March 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-03T00:00:00Z
date_published 2021-03-02T00:00:00Z
source MITRE, Tidal Cyber
title HAFNIUM targeting Exchange Servers with 0-day exploits

haking9 libpcap network sniffing

Luis Martin Garcia. (2008, February 1). Hakin9 Issue 2/2008 Vol 3 No.2 VoIP Abuse: Storming SIP Security. Retrieved October 18, 2022.

Internal MISP references

UUID 2803d0b8-78ee-4b19-aad3-daf84cd292b5 which can be used as unique global reference for haking9 libpcap network sniffing in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-10-18T00:00:00Z
date_published 2008-02-01T00:00:00Z
source MITRE
title Hakin9 Issue 2/2008 Vol 3 No.2 VoIP Abuse: Storming SIP Security

FireEye APT29

FireEye Labs. (2015, July). HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group. Retrieved September 17, 2015.

Internal MISP references

UUID 78ead31e-7450-46e8-89cf-461ae1981994 which can be used as unique global reference for FireEye APT29 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2015-09-17T00:00:00Z
date_published 2015-07-01T00:00:00Z
source MITRE
title HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group

FireEye Hancitor

Anubhav, A., Jallepalli, D. (2016, September 23). Hancitor (AKA Chanitor) observed using multiple attack approaches. Retrieved August 13, 2020.

Internal MISP references

UUID 65a07c8c-5b29-445f-8f01-6e577df4ea62 which can be used as unique global reference for FireEye Hancitor in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-13T00:00:00Z
date_published 2016-09-23T00:00:00Z
source MITRE
title Hancitor (AKA Chanitor) observed using multiple attack approaches

NCC Group Fivehands June 2021

Matthews, M. and Backhouse, W. (2021, June 15). Handy guide to a new Fivehands ransomware variant. Retrieved June 24, 2021.

Internal MISP references

UUID 33955c35-e8cd-4486-b1ab-6f992319c81c which can be used as unique global reference for NCC Group Fivehands June 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-24T00:00:00Z
date_published 2021-06-15T00:00:00Z
source MITRE
title Handy guide to a new Fivehands ransomware variant

Apple Developer Doco Hardened Runtime

Apple Inc.. (2021, January 1). Hardened Runtime: Manage security protections and resource access for your macOS apps.. Retrieved March 24, 2021.

Internal MISP references

UUID b41de1e5-63ab-4556-a61f-3baca1873283 which can be used as unique global reference for Apple Developer Doco Hardened Runtime in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-24T00:00:00Z
date_published 2021-01-01T00:00:00Z
source MITRE
title Hardened Runtime: Manage security protections and resource access for your macOS apps.

FireEye APT34 July 2019

Bromiley, M., et al.. (2019, July 18). Hard Pass: Declining APT34’s Invite to Join Their Professional Network. Retrieved August 26, 2019.

Internal MISP references

UUID 09a00ded-1afc-4555-894e-a151162796eb which can be used as unique global reference for FireEye APT34 July 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-08-26T00:00:00Z
date_published 2019-07-18T00:00:00Z
source MITRE
title Hard Pass: Declining APT34’s Invite to Join Their Professional Network

GitHub Hashjacking

Dunning, J. (2016, August 1). Hashjacking. Retrieved December 21, 2017.

Internal MISP references

UUID d31f6612-c552-45e1-bf6b-889fe619ab5f which can be used as unique global reference for GitHub Hashjacking in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-21T00:00:00Z
date_published 2016-08-01T00:00:00Z
source MITRE
title Hashjacking

FireEye HawkEye Malware July 2017

Swapnil Patil, Yogesh Londhe. (2017, July 25). HawkEye Credential Theft Malware Distributed in Recent Phishing Campaign. Retrieved June 18, 2019.

Internal MISP references

UUID 7ad228a8-5450-45ec-86fc-ea038f7c6ef7 which can be used as unique global reference for FireEye HawkEye Malware July 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-18T00:00:00Z
date_published 2017-07-25T00:00:00Z
source MITRE
title HawkEye Credential Theft Malware Distributed in Recent Phishing Campaign

Specter Ops - Cloud Credential Storage

Maddalena, C.. (2018, September 12). Head in the Clouds. Retrieved October 4, 2019.

Internal MISP references

UUID 95d6d1ce-ceba-48ee-88c4-0fb30058bd80 which can be used as unique global reference for Specter Ops - Cloud Credential Storage in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-04T00:00:00Z
date_published 2018-09-12T00:00:00Z
source MITRE
title Head in the Clouds

Securelist Dtrack

Konstantin Zykov. (2019, September 23). Hello! My name is Dtrack. Retrieved January 20, 2021.

Internal MISP references

UUID 49bd8841-a4b5-4ced-adfa-0ad0c8625ccd which can be used as unique global reference for Securelist Dtrack in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-20T00:00:00Z
date_published 2019-09-23T00:00:00Z
source MITRE
title Hello! My name is Dtrack

Securelist Dtrack2

KONSTANTIN ZYKOV. (2019, September 23). Hello! My name is Dtrack. Retrieved September 30, 2022.

Internal MISP references

UUID a011b68a-30e0-4204-9bf3-fa73f2a238b4 which can be used as unique global reference for Securelist Dtrack2 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-09-30T00:00:00Z
date_published 2019-09-23T00:00:00Z
source MITRE
title Hello! My name is Dtrack

Baggett 2012

Baggett, M. (2012, November 8). Help eliminate unquoted path vulnerabilities. Retrieved December 4, 2014.

Internal MISP references

UUID 9b234329-5e05-4035-af38-dd8ab20fd68e which can be used as unique global reference for Baggett 2012 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-12-04T00:00:00Z
date_published 2012-11-08T00:00:00Z
source MITRE
title Help eliminate unquoted path vulnerabilities

Help eliminate unquoted path

Mark Baggett. (2012, November 8). Help eliminate unquoted path vulnerabilities. Retrieved November 8, 2012.

Internal MISP references

UUID 23ad5a8c-cbe1-4f40-8757-f1784a4003a1 which can be used as unique global reference for Help eliminate unquoted path in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2012-11-08T00:00:00Z
date_published 2012-11-08T00:00:00Z
source MITRE
title Help eliminate unquoted path vulnerabilities

Default VBS macros Blocking

Kellie Eickmeyer. (2022, February 7). Helping users stay safe: Blocking internet macros by default in Office. Retrieved February 7, 2022.

Internal MISP references

UUID d86883dd-3766-4971-91c7-b205ed13cc37 which can be used as unique global reference for Default VBS macros Blocking in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-02-07T00:00:00Z
date_published 2022-02-07T00:00:00Z
source MITRE
title Helping users stay safe: Blocking internet macros by default in Office

Twitter CMSTP Usage Jan 2018

Carr, N. (2018, January 31). Here is some early bad cmstp.exe... Retrieved September 12, 2024.

Internal MISP references

UUID 836621f3-83e1-4c55-8e3b-740fc9ba1e46 which can be used as unique global reference for Twitter CMSTP Usage Jan 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-12T00:00:00Z
date_published 2018-01-31T00:00:00Z
source MITRE
title Here is some early bad cmstp.exe..

ESET Hermetic Wiper February 2022

ESET. (2022, February 24). HermeticWiper: New data wiping malware hits Ukraine. Retrieved March 25, 2022.

Internal MISP references

UUID 07ef66e8-195b-4afe-a518-ce9e77220038 which can be used as unique global reference for ESET Hermetic Wiper February 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-25T00:00:00Z
date_published 2022-02-24T00:00:00Z
source MITRE
title HermeticWiper: New data wiping malware hits Ukraine

SentinelOne Hermetic Wiper February 2022

Guerrero-Saade, J. (2022, February 23). HermeticWiper | New Destructive Malware Used In Cyber Attacks on Ukraine. Retrieved March 25, 2022.

Internal MISP references

UUID 96825555-1936-4ee3-bb25-423dc16a9116 which can be used as unique global reference for SentinelOne Hermetic Wiper February 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-25T00:00:00Z
date_published 2022-02-23T00:00:00Z
source MITRE
title HermeticWiper

Dragos Hexane

Dragos. (n.d.). Hexane. Retrieved October 27, 2019.

Internal MISP references

UUID 11838e67-5032-4352-ad1f-81ba0398a14f which can be used as unique global reference for Dragos Hexane in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-27T00:00:00Z
source MITRE
title Hexane

Sourceforge Heyoka 2022

Sourceforge. (n.d.). Heyoka POC Exfiltration Tool. Retrieved October 11, 2022.

Internal MISP references

UUID f6677391-cb7a-4abc-abb7-3a8cd47fbc90 which can be used as unique global reference for Sourceforge Heyoka 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-10-11T00:00:00Z
source MITRE
title Heyoka POC Exfiltration Tool

Hh.exe - LOLBAS Project

LOLBAS. (2018, May 25). Hh.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 4e09bfcf-f5be-46c5-9ebf-8742ac8d1edc which can be used as unique global reference for Hh.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Hh.exe

CrowdStrike BloodHound April 2018

Red Team Labs. (2018, April 24). Hidden Administrative Accounts: BloodHound to the Rescue. Retrieved October 28, 2020.

Internal MISP references

UUID fa99f290-e42c-4311-9f6d-c519c9ab89fe which can be used as unique global reference for CrowdStrike BloodHound April 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-28T00:00:00Z
date_published 2018-04-24T00:00:00Z
source MITRE
title Hidden Administrative Accounts: BloodHound to the Rescue

McAfee Bankshot

Sherstobitoff, R. (2018, March 08). Hidden Cobra Targets Turkish Financial Sector With New Bankshot Implant. Retrieved May 18, 2018.

Internal MISP references

UUID c748dc6c-8c19-4a5c-840f-3d47955a6c78 which can be used as unique global reference for McAfee Bankshot in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-05-18T00:00:00Z
date_published 2018-03-08T00:00:00Z
source MITRE
title Hidden Cobra Targets Turkish Financial Sector With New Bankshot Implant

Pfammatter - Hidden Inbox Rules

Damian Pfammatter. (2018, September 17). Hidden Inbox Rules in Microsoft Exchange. Retrieved October 12, 2021.

Internal MISP references

UUID 8a00b664-5a75-4365-9069-a32e0ed20a80 which can be used as unique global reference for Pfammatter - Hidden Inbox Rules in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-12T00:00:00Z
date_published 2018-09-17T00:00:00Z
source MITRE
title Hidden Inbox Rules in Microsoft Exchange

Hidden VNC

Hutchins, Marcus. (2015, September 13). Hidden VNC for Beginners. Retrieved November 28, 2023.

Internal MISP references

UUID 1d50ce73-ad6a-5286-8ef9-0b2bfed321dc which can be used as unique global reference for Hidden VNC in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-11-28T00:00:00Z
date_published 2015-09-13T00:00:00Z
source MITRE
title Hidden VNC for Beginners

Intezer HiddenWasp Map 2019

Sanmillan, I. (2019, May 29). HiddenWasp Malware Stings Targeted Linux Systems. Retrieved June 24, 2019.

Internal MISP references

UUID dfef8451-031b-42a6-8b78-d25950cc9d23 which can be used as unique global reference for Intezer HiddenWasp Map 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-24T00:00:00Z
date_published 2019-05-29T00:00:00Z
source MITRE
title HiddenWasp Malware Stings Targeted Linux Systems

Apple Support Hide a User Account

Apple. (2020, November 30). Hide a user account in macOS. Retrieved December 10, 2021.

Internal MISP references

UUID e901df3b-76a6-41a5-9083-b28065e75aa2 which can be used as unique global reference for Apple Support Hide a User Account in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-12-10T00:00:00Z
date_published 2020-11-30T00:00:00Z
source MITRE
title Hide a user account in macOS

Malwarebytes Wow6432Node 2016

Arntz, P. (2016, March 30). Hiding in Plain Sight. Retrieved August 3, 2020.

Internal MISP references

UUID d4eba34c-d76b-45b4-bcaf-0f13459daaad which can be used as unique global reference for Malwarebytes Wow6432Node 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-03T00:00:00Z
date_published 2016-03-30T00:00:00Z
source MITRE
title Hiding in Plain Sight

FireEye APT17

FireEye Labs/FireEye Threat Intelligence. (2015, May 14). Hiding in Plain Sight: FireEye and Microsoft Expose Obfuscation Tactic. Retrieved January 22, 2016.

Internal MISP references

UUID a303f97a-72dd-4833-bac7-a421addc3242 which can be used as unique global reference for FireEye APT17 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-01-22T00:00:00Z
date_published 2015-05-14T00:00:00Z
source MITRE, Tidal Cyber
title Hiding in Plain Sight: FireEye and Microsoft Expose Obfuscation Tactic

ATTACK IQ

Federico Quattrin, Nick Desler, Tin Tam, & Matthew Rutkoske. (2023, March 16). Hiding in Plain Sight: Monitoring and Testing for Living-Off-the-Land Binaries. Retrieved July 15, 2024.

Internal MISP references

UUID 38ed8950-413b-56b5-98c3-ae6420850dc4 which can be used as unique global reference for ATTACK IQ in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-15T00:00:00Z
date_published 2023-03-16T00:00:00Z
source MITRE
title Hiding in Plain Sight: Monitoring and Testing for Living-Off-the-Land Binaries

Crowdstrike Hiding in Plain Sight 2018

Crowdstrike. (2018, July 18). Hiding in Plain Sight: Using the Office 365 Activities API to Investigate Business Email Compromises. Retrieved January 19, 2020.

Internal MISP references

UUID 8612fb31-5806-47ca-ba43-265a590b61fb which can be used as unique global reference for Crowdstrike Hiding in Plain Sight 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-01-19T00:00:00Z
date_published 2018-07-18T00:00:00Z
source MITRE
title Hiding in Plain Sight: Using the Office 365 Activities API to Investigate Business Email Compromises

Hiding Malicious Code with Module Stomping

Aliz Hammond. (2019, August 15). Hiding Malicious Code with "Module Stomping": Part 1. Retrieved July 14, 2022.

Internal MISP references

UUID 88983d22-980d-4442-858a-3b70ec485b94 which can be used as unique global reference for Hiding Malicious Code with Module Stomping in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-14T00:00:00Z
date_published 2019-08-15T00:00:00Z
source MITRE
title Hiding Malicious Code with "Module Stomping": Part 1

SpectorOps Hiding Reg Jul 2017

Reitz, B. (2017, July 14). Hiding Registry keys with PSReflect. Retrieved August 9, 2018.

Internal MISP references

UUID 877a5ae4-ec5f-4f53-b69d-ba74ff9e1619 which can be used as unique global reference for SpectorOps Hiding Reg Jul 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-09T00:00:00Z
date_published 2017-07-14T00:00:00Z
source MITRE
title Hiding Registry keys with PSReflect

FireEye SUNBURST Backdoor December 2020

FireEye. (2020, December 13). Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor. Retrieved January 4, 2021.

Internal MISP references

UUID d006ed03-a8af-4887-9356-3481d81d43e4 which can be used as unique global reference for FireEye SUNBURST Backdoor December 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-04T00:00:00Z
date_published 2020-12-13T00:00:00Z
source MITRE, Tidal Cyber
title Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor

Redirectors_Domain_Fronting

Mudge, R. (2017, February 6). High-reputation Redirectors and Domain Fronting. Retrieved July 11, 2022.

Internal MISP references

UUID 42c81d97-b6ee-458e-bff3-e8c4de882cd6 which can be used as unique global reference for Redirectors_Domain_Fronting in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-07-11T00:00:00Z
date_published 2017-02-06T00:00:00Z
source MITRE
title High-reputation Redirectors and Domain Fronting

Synack Secure Kernel Extension Broken

Wardle, P. (2017, September 8). High Sierra’s ‘Secure Kernel Extension Loading’ is Broken. Retrieved April 6, 2018.

Internal MISP references

UUID 647f6be8-fe95-4045-8778-f7d7ff00c96c which can be used as unique global reference for Synack Secure Kernel Extension Broken in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-06T00:00:00Z
date_published 2017-09-08T00:00:00Z
source MITRE
title High Sierra’s ‘Secure Kernel Extension Loading’ is Broken

modePUSH Azure Storage Explorer September 14 2024

Britton Manahan. (2024, September 14). Highway Blobbery: Data Theft using Azure Storage Explorer. Retrieved September 19, 2024.

Internal MISP references

UUID a4c50b03-f0d7-4d29-a9de-e550be61390c which can be used as unique global reference for modePUSH Azure Storage Explorer September 14 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-19T00:00:00Z
date_published 2024-09-14T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Highway Blobbery: Data Theft using Azure Storage Explorer

Unit 42 Hildegard Malware

Chen, J. et al. (2021, February 3). Hildegard: New TeamTNT Cryptojacking Malware Targeting Kubernetes. Retrieved April 5, 2021.

Internal MISP references

UUID 0941cf0e-75d8-4c96-bc42-c99d809e75f9 which can be used as unique global reference for Unit 42 Hildegard Malware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-05T00:00:00Z
date_published 2021-02-03T00:00:00Z
source MITRE
title Hildegard: New TeamTNT Cryptojacking Malware Targeting Kubernetes

Drakonia HInvoke

drakonia. (2022, August 10). HInvoke and avoiding PInvoke. Retrieved August 22, 2022.

Internal MISP references

UUID 11d936fd-aba0-4eed-8007-aca71c340c59 which can be used as unique global reference for Drakonia HInvoke in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-22T00:00:00Z
date_published 2022-08-10T00:00:00Z
source MITRE
title HInvoke and avoiding PInvoke

Hive Ransomware Analysis | Kroll

Stephen Green, Elio Biasiotto. (2023, February 2). Hive Ransomware Analysis | Kroll. Retrieved May 7, 2023.

Internal MISP references

UUID f5e43446-04ea-4dcd-be3a-22f8b10b8aa1 which can be used as unique global reference for Hive Ransomware Analysis | Kroll in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-07T00:00:00Z
date_published 2023-02-02T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Hive Ransomware Analysis

Bitdefender Hunters International November 9 2023

Martin Zugec. (2023, November 9). Hive Ransomware's Offspring: Hunters International Takes the Stage. Retrieved October 4, 2024.

Internal MISP references

UUID ae0a88d6-bd46-4b22-bfb1-25003bfe83d7 which can be used as unique global reference for Bitdefender Hunters International November 9 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-04T00:00:00Z
date_published 2023-11-09T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Hive Ransomware's Offspring: Hunters International Takes the Stage

microsoft_services_registry_tree

Microsoft. (2021, August 5). HKLM\SYSTEM\CurrentControlSet\Services Registry Tree. Retrieved August 25, 2021.

Internal MISP references

UUID 171cfdf1-d91c-4df3-831e-89b6237e3c8b which can be used as unique global reference for microsoft_services_registry_tree in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-25T00:00:00Z
date_published 2021-08-05T00:00:00Z
source MITRE
title HKLM\SYSTEM\CurrentControlSet\Services Registry Tree

Microsoft CurrentControlSet Services

Microsoft. (2017, April 20). HKLM\SYSTEM\CurrentControlSet\Services Registry Tree. Retrieved March 16, 2020.

Internal MISP references

UUID cb9b5391-773f-4b56-8c41-d4f548c7b835 which can be used as unique global reference for Microsoft CurrentControlSet Services in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-16T00:00:00Z
date_published 2017-04-20T00:00:00Z
source MITRE
title HKLM\SYSTEM\CurrentControlSet\Services Registry Tree

Accenture Hogfish April 2018

Accenture Security. (2018, April 23). Hogfish Redleaves Campaign. Retrieved July 2, 2018.

Internal MISP references

UUID c8e9fee1-9981-499f-a62f-ffe59f4bb1e7 which can be used as unique global reference for Accenture Hogfish April 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-07-02T00:00:00Z
date_published 2018-04-23T00:00:00Z
source MITRE
title Hogfish Redleaves Campaign

Proofpoint Router Malvertising

Kafeine. (2016, December 13). Home Routers Under Attack via Malvertising on Windows, Android Devices. Retrieved January 16, 2019.

Internal MISP references

UUID b964139f-7c02-451d-8d22-a87975e60aa2 which can be used as unique global reference for Proofpoint Router Malvertising in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-01-16T00:00:00Z
date_published 2016-12-13T00:00:00Z
source MITRE
title Home Routers Under Attack via Malvertising on Windows, Android Devices

Trustwave Honeypot SkidMap 2023

Radoslaw Zdonczyk. (2023, July 30). Honeypot Recon: New Variant of SkidMap Targeting Redis. Retrieved September 29, 2023.

Internal MISP references

UUID 300505ae-bb7a-503d-84c5-9ff021eb6f3a which can be used as unique global reference for Trustwave Honeypot SkidMap 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-29T00:00:00Z
date_published 2023-07-30T00:00:00Z
source MITRE
title Honeypot Recon: New Variant of SkidMap Targeting Redis

Microsoft Hook Overview

Microsoft. (n.d.). Hooks Overview. Retrieved December 12, 2017.

Internal MISP references

UUID 54997a52-f78b-4af4-8916-787bcb215ce1 which can be used as unique global reference for Microsoft Hook Overview in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-12T00:00:00Z
source MITRE
title Hooks Overview

SpectorOps Host-Based Jul 2017

Atkinson, J. (2017, July 18). Host-based Threat Modeling & Indicator Design. Retrieved March 21, 2018.

Internal MISP references

UUID 5fbf3a1d-eac2-44b8-a0a9-70feca168647 which can be used as unique global reference for SpectorOps Host-Based Jul 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-03-21T00:00:00Z
date_published 2017-07-18T00:00:00Z
source MITRE
title Host-based Threat Modeling & Indicator Design

Crowdstrike AWS User Federation Persistence

Vaishnav Murthy and Joel Eng. (2023, January 30). How Adversaries Can Persist with AWS User Federation. Retrieved March 10, 2023.

Internal MISP references

UUID 8c4f806c-b6f2-5bde-8525-05da6692e59c which can be used as unique global reference for Crowdstrike AWS User Federation Persistence in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-10T00:00:00Z
date_published 2023-01-30T00:00:00Z
source MITRE
title How Adversaries Can Persist with AWS User Federation

Andy Greenberg June 2017

Andy Greenberg. (2017, June 28). How an Entire Nation Became Russia's Test Lab for Cyberwar. Retrieved September 27, 2023.

Internal MISP references

UUID 6a013c48-3b58-5b87-9af5-0b7d01f27c48 which can be used as unique global reference for Andy Greenberg June 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-27T00:00:00Z
date_published 2017-06-28T00:00:00Z
source MITRE
title How an Entire Nation Became Russia's Test Lab for Cyberwar

Perez Sitemap XML 2023

Adi Perez. (2023, February 22). How Attackers Can Misuse Sitemaps to Enumerate Users and Discover Sensitive Information. Retrieved July 18, 2024.

Internal MISP references

UUID b52dcca4-19cb-5b95-9c5e-8b5c81fd986f which can be used as unique global reference for Perez Sitemap XML 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-18T00:00:00Z
date_published 2023-02-22T00:00:00Z
source MITRE
title How Attackers Can Misuse Sitemaps to Enumerate Users and Discover Sensitive Information

Symantec Digital Certificates

Shinotsuka, H. (2013, February 22). How Attackers Steal Private Keys from Digital Certificates. Retrieved March 31, 2016.

Internal MISP references

UUID 4b4f0171-827d-45c3-8c89-66ea801e77e8 which can be used as unique global reference for Symantec Digital Certificates in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-03-31T00:00:00Z
date_published 2013-02-22T00:00:00Z
source MITRE
title How Attackers Steal Private Keys from Digital Certificates

ADSecurity Silver Tickets

Sean Metcalf. (2015, November 17). How Attackers Use Kerberos Silver Tickets to Exploit Systems. Retrieved February 27, 2020.

Internal MISP references

UUID 5185560e-b8f0-4c40-8c90-cb12348a0f7f which can be used as unique global reference for ADSecurity Silver Tickets in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-27T00:00:00Z
date_published 2015-11-17T00:00:00Z
source MITRE
title How Attackers Use Kerberos Silver Tickets to Exploit Systems

Amazon S3 Security, 2019

Amazon. (2019, May 17). How can I secure the files in my Amazon S3 bucket?. Retrieved October 4, 2019.

Internal MISP references

UUID 4c434ca5-2544-45e0-82d9-71343d8aa960 which can be used as unique global reference for Amazon S3 Security, 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-10-04T00:00:00Z
date_published 2019-05-17T00:00:00Z
source MITRE
title How can I secure the files in my Amazon S3 bucket?

Microsoft Connection Manager Oct 2009

Microsoft. (2009, October 8). How Connection Manager Works. Retrieved April 11, 2018.

Internal MISP references

UUID 0b0880a8-82cc-4e23-afd9-95d099c753a4 which can be used as unique global reference for Microsoft Connection Manager Oct 2009 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-11T00:00:00Z
date_published 2009-10-08T00:00:00Z
source MITRE
title How Connection Manager Works

Kaspersky-masking

Dedenok, Roman. (2023, December 12). How cybercriminals disguise URLs. Retrieved January 17, 2024.

Internal MISP references

UUID 811eb587-effd-50ad-abb4-83221cc5d567 which can be used as unique global reference for Kaspersky-masking in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-17T00:00:00Z
date_published 2023-12-12T00:00:00Z
source MITRE
title How cybercriminals disguise URLs

dns_changer_trojans

Abendan, O. (2012, June 14). How DNS Changer Trojans Direct Users to Threats. Retrieved October 28, 2021.

Internal MISP references

UUID 082a0fde-d9f9-45f2-915d-f14c77b62254 which can be used as unique global reference for dns_changer_trojans in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-28T00:00:00Z
date_published 2012-06-14T00:00:00Z
source MITRE
title How DNS Changer Trojans Direct Users to Threats

Entrust Enable CAPI2 Aug 2017

Entrust Datacard. (2017, August 16). How do I enable CAPI 2.0 logging in Windows Vista, Windows 7 and Windows 2008 Server?. Retrieved January 31, 2018.

Internal MISP references

UUID ad6dfcab-792a-4b4d-8ada-aa418e2ea1aa which can be used as unique global reference for Entrust Enable CAPI2 Aug 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-31T00:00:00Z
date_published 2017-08-16T00:00:00Z
source MITRE
title How do I enable CAPI 2.0 logging in Windows Vista, Windows 7 and Windows 2008 Server?

Apple Culprit Access

rjben. (2012, May 30). How do you find the culprit when unauthorized access to a computer is a problem?. Retrieved August 3, 2022.

Internal MISP references

UUID 9254d3f5-7fc1-4710-b885-b0ddb3a3dca9 which can be used as unique global reference for Apple Culprit Access in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-08-03T00:00:00Z
date_published 2012-05-30T00:00:00Z
source MITRE
title How do you find the culprit when unauthorized access to a computer is a problem?

SFX - Encrypted/Encoded File

Jai Minton. (2023, March 31). How Falcon OverWatch Investigates Malicious Self-Extracting Archives, Decoy Files and Their Hidden Payloads. Retrieved March 29, 2024.

Internal MISP references

UUID 55171e0e-6b6d-568c-941a-85adcafceb43 which can be used as unique global reference for SFX - Encrypted/Encoded File in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-29T00:00:00Z
date_published 2023-03-31T00:00:00Z
source MITRE
title How Falcon OverWatch Investigates Malicious Self-Extracting Archives, Decoy Files and Their Hidden Payloads

DOJ FIN7 Aug 2018

Department of Justice. (2018, August 01). HOW FIN7 ATTACKED AND STOLE DATA. Retrieved August 24, 2018.

Internal MISP references

UUID 6a588eff-2b79-41c3-9834-613a628a0355 which can be used as unique global reference for DOJ FIN7 Aug 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-08-24T00:00:00Z
date_published 2018-08-01T00:00:00Z
source MITRE
title HOW FIN7 ATTACKED AND STOLE DATA

Charles McLellan March 2016

Charles McLellan. (2016, March 4). How hackers attacked Ukraine's power grid: Implications for Industrial IoT security. Retrieved September 27, 2023.

Internal MISP references

UUID a9156c24-42ad-5f15-a18e-2382f84d702e which can be used as unique global reference for Charles McLellan March 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-27T00:00:00Z
date_published 2016-03-04T00:00:00Z
source MITRE
title How hackers attacked Ukraine's power grid: Implications for Industrial IoT security

Cyware Social Media

Cyware Hacker News. (2019, October 2). How Hackers Exploit Social Media To Break Into Your Company. Retrieved October 20, 2020.

Internal MISP references

UUID e6136a63-81fe-4363-8d98-f7d1e85a0f2b which can be used as unique global reference for Cyware Social Media in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-20T00:00:00Z
date_published 2019-10-02T00:00:00Z
source MITRE
title How Hackers Exploit Social Media To Break Into Your Company

SpyCloud Stealers Chrome Bypass October 2 2024

James. (2024, October 2). How Infostealers Are Bypassing New Chrome Security Feature to Steal User Session Cookies. Retrieved October 13, 2024.

Internal MISP references

UUID 9e680ab4-5d8d-46a1-a1e8-2ca2914bb93f which can be used as unique global reference for SpyCloud Stealers Chrome Bypass October 2 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-10-13T00:00:00Z
date_published 2024-10-02T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title How Infostealers Are Bypassing New Chrome Security Feature to Steal User Session Cookies

ICS Mutexes 2015

Lenny Zeltser. (2015, March 9). How Malware Generates Mutex Names to Evade Detection. Retrieved September 19, 2024.

Internal MISP references

UUID 31352deb-6c9d-5f1d-be73-60ccd0ccae93 which can be used as unique global reference for ICS Mutexes 2015 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-19T00:00:00Z
date_published 2015-03-09T00:00:00Z
source MITRE
title How Malware Generates Mutex Names to Evade Detection

malware_hides_service

Lawrence Abrams. (2004, September 10). How Malware hides and is installed as a Service. Retrieved August 30, 2021.

Internal MISP references

UUID c5982f65-1782-452a-9667-a8732d31e89a which can be used as unique global reference for malware_hides_service in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-30T00:00:00Z
date_published 2004-09-10T00:00:00Z
source MITRE
title How Malware hides and is installed as a Service

S1 macOs Persistence

Stokes, P. (2019, July 17). How Malware Persists on macOS. Retrieved March 27, 2020.

Internal MISP references

UUID ce952a0d-9c0d-4a51-9564-7cc5d9e43e2c which can be used as unique global reference for S1 macOs Persistence in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-27T00:00:00Z
date_published 2019-07-17T00:00:00Z
source MITRE
title How Malware Persists on macOS

sentinelone macos persist Jun 2019

Stokes, Phil. (2019, June 17). HOW MALWARE PERSISTS ON MACOS. Retrieved September 10, 2019.

Internal MISP references

UUID 81a49043-cac5-40e0-a626-fd242d21c56d which can be used as unique global reference for sentinelone macos persist Jun 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-10T00:00:00Z
date_published 2019-06-17T00:00:00Z
source MITRE
title HOW MALWARE PERSISTS ON MACOS

Kaspersky Autofill

Golubev, S. (n.d.). How malware steals autofill data from browsers. Retrieved March 28, 2023.

Internal MISP references

UUID 561ff84d-17ce-511c-af0c-059310f3c129 which can be used as unique global reference for Kaspersky Autofill in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-28T00:00:00Z
source MITRE
title How malware steals autofill data from browsers

Microsoft Threat Actor Naming

diannegali, schmurky, Dansimp, chrisda, Stacyrch140. (2023, April 20). How Microsoft names threat actors. Retrieved June 22, 2023.

Internal MISP references

UUID de9cda86-0b23-4bc8-b524-e74fecf99448 which can be used as unique global reference for Microsoft Threat Actor Naming in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-22T00:00:00Z
date_published 2023-04-20T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title How Microsoft names threat actors

Microsoft Threat Actor Naming July 2023

Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.

Internal MISP references

UUID 78a8137d-694e-533d-aed3-6bd48fc0cd4a which can be used as unique global reference for Microsoft Threat Actor Naming July 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-11-17T00:00:00Z
date_published 2023-07-12T00:00:00Z
source MITRE
title How Microsoft names threat actors

TheEclecticLightCompany apple notarization

How Notarization Works. (2020, August 28). How notarization works. Retrieved September 13, 2021.

Internal MISP references

UUID 80c840ab-782a-4f15-bc7b-2d2ab4e51702 which can be used as unique global reference for TheEclecticLightCompany apple notarization in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-13T00:00:00Z
date_published 2020-08-28T00:00:00Z
source MITRE
title How notarization works

SentinelOne AppleScript

Phil Stokes. (2020, March 16). How Offensive Actors Use AppleScript For Attacking macOS. Retrieved July 17, 2020.

Internal MISP references

UUID bb6aafcb-ed30-404a-a9d9-b90503a0ec7c which can be used as unique global reference for SentinelOne AppleScript in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-07-17T00:00:00Z
date_published 2020-03-16T00:00:00Z
source MITRE
title How Offensive Actors Use AppleScript For Attacking macOS

SecureWorld - How Secure Is Your Slack Channel - Dec 2021

Drew Todd. (2021, December 28). How Secure Is Your Slack Channel?. Retrieved May 31, 2022.

Internal MISP references

UUID 78199414-7b5e-45d8-8bda-d6f5a7c3988b which can be used as unique global reference for SecureWorld - How Secure Is Your Slack Channel - Dec 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-05-31T00:00:00Z
date_published 2021-12-28T00:00:00Z
source MITRE
title How Secure Is Your Slack Channel?

Windows OS Hub RDP

Windows OS Hub. (2021, November 10). How to Allow Multiple RDP Sessions in Windows 10 and 11?. Retrieved March 28, 2022.

Internal MISP references

UUID 335480f8-8f40-4da7-b083-6a4b158496c1 which can be used as unique global reference for Windows OS Hub RDP in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-28T00:00:00Z
date_published 2021-11-10T00:00:00Z
source MITRE
title How to Allow Multiple RDP Sessions in Windows 10 and 11?

Xpn Argue Like Cobalt 2019

Chester, A. (2019, January 28). How to Argue like Cobalt Strike. Retrieved November 19, 2021.

Internal MISP references

UUID 724464f6-1a86-46e3-9a81-192b136c73ba which can be used as unique global reference for Xpn Argue Like Cobalt 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-11-19T00:00:00Z
date_published 2019-01-28T00:00:00Z
source MITRE
title How to Argue like Cobalt Strike

Seqrite DoubleExtension

Seqrite. (n.d.). How to avoid dual attack and vulnerable files with double extension?. Retrieved July 27, 2021.

Internal MISP references

UUID 77af0be9-174a-4330-8122-d0bd0c754973 which can be used as unique global reference for Seqrite DoubleExtension in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-07-27T00:00:00Z
source MITRE
title How to avoid dual attack and vulnerable files with double extension?

BOA Telephone Scams

Bank of America. (n.d.). How to avoid telephone scams. Retrieved September 8, 2023.

Internal MISP references

UUID ee1abe19-f38b-5127-8377-f13f57f2abcb which can be used as unique global reference for BOA Telephone Scams in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-08T00:00:00Z
source MITRE
title How to avoid telephone scams

Okta Block Anonymizing Services

Moussa Diallo and Brett Winterford. (2024, April 26). How to Block Anonymizing Services using Okta. Retrieved May 28, 2024.

Internal MISP references

UUID 5790f25c-d1a5-5fb9-b213-0d84a6570c4c which can be used as unique global reference for Okta Block Anonymizing Services in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-05-28T00:00:00Z
date_published 2024-04-26T00:00:00Z
source MITRE
title How to Block Anonymizing Services using Okta

bypass_webproxy_filtering

Fehrman, B. (2017, April 13). How to Bypass Web-Proxy Filtering. Retrieved September 20, 2019.

Internal MISP references

UUID fab84597-99a0-4560-8c8c-11fd8c01d5fa which can be used as unique global reference for bypass_webproxy_filtering in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-09-20T00:00:00Z
date_published 2017-04-13T00:00:00Z
source MITRE
title How to Bypass Web-Proxy Filtering

Systemd Remote Control

Aaron Kili. (2018, January 16). How to Control Systemd Services on Remote Linux Server. Retrieved July 26, 2021.

Internal MISP references

UUID 0461b58e-400e-4e3e-b7c4-eed7a9b0fdd6 which can be used as unique global reference for Systemd Remote Control in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-07-26T00:00:00Z
date_published 2018-01-16T00:00:00Z
source MITRE
title How to Control Systemd Services on Remote Linux Server

Microsoft Admin Shares

Microsoft. (n.d.). How to create and delete hidden or administrative shares on client computers. Retrieved November 20, 2014.

Internal MISP references

UUID 68d23cb0-b812-4d77-a3aa-34e24a923a50 which can be used as unique global reference for Microsoft Admin Shares in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2014-11-20T00:00:00Z
source MITRE
title How to create and delete hidden or administrative shares on client computers

Delpy Mimikatz Crendential Manager

Delpy, B. (2017, December 12). howto ~ credential manager saved credentials. Retrieved November 23, 2020.

Internal MISP references

UUID 24c6027b-e0d2-4c0c-83af-4536a631ea85 which can be used as unique global reference for Delpy Mimikatz Crendential Manager in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-23T00:00:00Z
date_published 2017-12-12T00:00:00Z
source MITRE
title howto ~ credential manager saved credentials

Stealthbits Overpass-the-Hash

Warren, J. (2019, February 26). How to Detect Overpass-the-Hash Attacks. Retrieved February 4, 2021.

Internal MISP references

UUID e0bf051c-21ab-4454-a6b0-31ae29b6e162 which can be used as unique global reference for Stealthbits Overpass-the-Hash in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-04T00:00:00Z
date_published 2019-02-26T00:00:00Z
source MITRE
title How to Detect Overpass-the-Hash Attacks

Stealthbits Detect PtT 2019

Jeff Warren. (2019, February 19). How to Detect Pass-the-Ticket Attacks. Retrieved February 27, 2020.

Internal MISP references

UUID 5bdb759e-949d-4470-a4e4-925b6579da54 which can be used as unique global reference for Stealthbits Detect PtT 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-02-27T00:00:00Z
date_published 2019-02-19T00:00:00Z
source MITRE
title How to Detect Pass-the-Ticket Attacks

WindowsIR Anti-Forensic Techniques

Carvey, H. (2013, July 23). HowTo: Determine/Detect the use of Anti-Forensics Techniques. Retrieved June 3, 2016.

Internal MISP references

UUID 646211a7-77be-4e5a-bd02-eeb70d67113d which can be used as unique global reference for WindowsIR Anti-Forensic Techniques in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-03T00:00:00Z
date_published 2013-07-23T00:00:00Z
source MITRE
title HowTo: Determine/Detect the use of Anti-Forensics Techniques

Microsoft Disable Autorun

Microsoft. (n.d.). How to disable the Autorun functionality in Windows. Retrieved April 20, 2016.

Internal MISP references

UUID 64bcc943-29be-4dd8-92c8-8a5dd94cbda4 which can be used as unique global reference for Microsoft Disable Autorun in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-20T00:00:00Z
source MITRE
title How to disable the Autorun functionality in Windows

Superuser Linux Password Policies

Matutiae, M. (2014, August 6). How to display password policy information for a user (Ubuntu)?. Retrieved April 5, 2018.

Internal MISP references

UUID c0bbc881-594a-408c-86a2-211ce6279231 which can be used as unique global reference for Superuser Linux Password Policies in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-05T00:00:00Z
date_published 2014-08-06T00:00:00Z
source MITRE
title How to display password policy information for a user (Ubuntu)?

Confluence Linux Command Line

Confluence Support. (2021, September 8). How to enable command line audit logging in linux. Retrieved September 23, 2021.

Internal MISP references

UUID 9ac72e5a-0b00-4936-9a78-bf2694d956c9 which can be used as unique global reference for Confluence Linux Command Line in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-09-23T00:00:00Z
date_published 2021-09-08T00:00:00Z
source MITRE
title How to enable command line audit logging in linux

Atlassian Confluence Logging

Atlassian. (2018, January 9). How to Enable User Access Logging. Retrieved April 4, 2018.

Internal MISP references

UUID cd3ca4ce-c512-4612-94cc-3cf4d4dbba56 which can be used as unique global reference for Atlassian Confluence Logging in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-04T00:00:00Z
date_published 2018-01-09T00:00:00Z
source MITRE
title How to Enable User Access Logging

Remote Shell Execution in Python

Abdou Rockikz. (2020, July). How to Execute Shell Commands in a Remote Machine in Python. Retrieved July 26, 2021.

Internal MISP references

UUID 4ea54256-42f9-4b35-8f9e-e595ab9be9ce which can be used as unique global reference for Remote Shell Execution in Python in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-07-26T00:00:00Z
date_published 2020-07-01T00:00:00Z
source MITRE
title How to Execute Shell Commands in a Remote Machine in Python

Find Wi-Fi Password on Mac

Ruslana Lishchuk. (2021, March 26). How to Find a Saved Wi-Fi Password on a Mac. Retrieved September 8, 2023.

Internal MISP references

UUID 695f3d20-7a46-5a4a-aef0-0a05a5e35304 which can be used as unique global reference for Find Wi-Fi Password on Mac in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-08T00:00:00Z
date_published 2021-03-26T00:00:00Z
source MITRE
title How to Find a Saved Wi-Fi Password on a Mac

Stack Overflow

Stack Overflow. (n.d.). How to find the location of the Scheduled Tasks folder. Retrieved June 19, 2024.

Internal MISP references

UUID cf995fb6-33ac-51ea-a9ce-c18d9cfd56f1 which can be used as unique global reference for Stack Overflow in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-19T00:00:00Z
source MITRE
title How to find the location of the Scheduled Tasks folder

Microsoft Web Root OCT 2016

Microsoft. (2016, October 20). How to: Find the Web Application Root. Retrieved July 27, 2018.

Internal MISP references

UUID bce1230a-5303-4e58-97c9-3e65ecd714d3 which can be used as unique global reference for Microsoft Web Root OCT 2016 in MISP communities and other software using the MISP galaxy

Associated metadata
Metadata key Value
date_accessed 2018-07-27T00:00:00Z
date_published 2016-10-20T00:00:00Z
source MITRE
title How to: Find the Web Application Root

Microsoft Replication ACL

Microsoft. (n.d.). How to grant the "Replicating Directory Changes" permission for the Microsoft Metadirectory Services ADMA service account. Retrieved December 4, 2017.

Internal MISP references

UUID 1b17e5ec-6f09-4668-949a-59be2d1f1b65 which can be used as unique global reference for Microsoft Replication ACL in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-04T00:00:00Z
source MITRE
title How to grant the "Replicating Directory Changes" permission for the Microsoft Metadirectory Services ADMA service account

Hide GDM User Accounts

Ji Mingkui. (2021, June 17). How to Hide All The User Accounts in Ubuntu 20.04, 21.04 Login Screen. Retrieved March 15, 2022.

Internal MISP references

UUID 88c3c460-3792-4881-ae7d-031c8901610d which can be used as unique global reference for Hide GDM User Accounts in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-15T00:00:00Z
date_published 2021-06-17T00:00:00Z
source MITRE
title How to Hide All The User Accounts in Ubuntu 20.04, 21.04 Login Screen

Elastic COM Hijacking

Ewing, P. Strom, B. (2016, September 15). How to Hunt: Detecting Persistence & Evasion with the COM. Retrieved September 15, 2016.

Internal MISP references

UUID bb325d97-5f69-4645-82d8-fdd6badecd9d which can be used as unique global reference for Elastic COM Hijacking in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-09-15T00:00:00Z
date_published 2016-09-15T00:00:00Z
source MITRE
title How to Hunt: Detecting Persistence & Evasion with the COM

Elastic Masquerade Ball

Ewing, P. (2016, October 31). How to Hunt: The Masquerade Ball. Retrieved October 31, 2016.

Internal MISP references

UUID 29c17b60-f947-4482-afa6-c80ca5819d10 which can be used as unique global reference for Elastic Masquerade Ball in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-10-31T00:00:00Z
date_published 2016-10-31T00:00:00Z
source MITRE
title How to Hunt: The Masquerade Ball

Linux Loadable Kernel Module Insert and Remove LKMs

Henderson, B. (2006, September 24). How To Insert And Remove LKMs. Retrieved April 9, 2018.

Internal MISP references

UUID 044d0df8-61e4-4a29-8a24-0bd1227d4317 which can be used as unique global reference for Linux Loadable Kernel Module Insert and Remove LKMs in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-09T00:00:00Z
date_published 2006-09-24T00:00:00Z
source MITRE
title How To Insert And Remove LKMs

DigiCert Install SSL Cert

DigiCert. (n.d.). How to Install an SSL Certificate. Retrieved April 19, 2021.

Internal MISP references

UUID a1d7d368-6092-4421-99de-44e458deee21 which can be used as unique global reference for DigiCert Install SSL Cert in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-19T00:00:00Z
source MITRE
title How to Install an SSL Certificate

HowToGeek ShowExtension

Chris Hoffman. (2017, March 8). How to Make Windows Show File Extensions. Retrieved August 4, 2021.

Internal MISP references

UUID 51584201-40a4-4e39-ad23-14453e1eea46 which can be used as unique global reference for HowToGeek ShowExtension in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-08-04T00:00:00Z
date_published 2017-03-08T00:00:00Z
source MITRE
title How to Make Windows Show File Extensions

AWS Monitor API Calls to EC2 Security Groups

Jeff Levine. (2017, January 3). How to Monitor AWS Account Configuration Changes and API Calls to Amazon EC2 Security Groups. Retrieved September 24, 2024.

Internal MISP references

UUID c61d45fa-d6ec-5c8f-83ca-474ac43376f6 which can be used as unique global reference for AWS Monitor API Calls to EC2 Security Groups in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-24T00:00:00Z
date_published 2017-01-03T00:00:00Z
source MITRE
title How to Monitor AWS Account Configuration Changes and API Calls to Amazon EC2 Security Groups

Microsoft RDP Removal

Microsoft. (2021, September 24). How to remove entries from the Remote Desktop Connection Computer box. Retrieved June 15, 2022.

Internal MISP references

UUID 367d3f80-9b13-44fa-938a-744a95518571 which can be used as unique global reference for Microsoft RDP Removal in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-15T00:00:00Z
date_published 2021-09-24T00:00:00Z
source MITRE
title How to remove entries from the Remote Desktop Connection Computer box

Startup Items Eclectic

hoakley. (2021, September 16). How to run an app or tool at startup. Retrieved October 5, 2021.

Internal MISP references

UUID 397be6f9-a109-4185-85f7-8d994fb31eaa which can be used as unique global reference for Startup Items Eclectic in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-05T00:00:00Z
date_published 2021-09-16T00:00:00Z
source MITRE
title How to run an app or tool at startup

Podman Systemd

Valentin Rothberg. (2022, March 16). How to run pods as systemd services with Podman. Retrieved February 15, 2024.

Internal MISP references

UUID 1657c650-7739-5ba3-8c95-b35cb74ee79f which can be used as unique global reference for Podman Systemd in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-15T00:00:00Z
date_published 2022-03-16T00:00:00Z
source MITRE
title How to run pods as systemd services with Podman

CrowdStrike Endpoint Security Testing Oct 2021

Radu Vlad, Liviu Arsene. (2021, October 15). How to Test Endpoint Security Efficacy and What to Expect. Retrieved March 7, 2024.

Internal MISP references

UUID 4cecfe1f-c1d2-4a71-ac17-0effd5f045df which can be used as unique global reference for CrowdStrike Endpoint Security Testing Oct 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-07T00:00:00Z
date_published 2021-10-15T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title How to Test Endpoint Security Efficacy and What to Expect

Microsoft Disable VBA Jan 2020

Microsoft. (2020, January 23). How to turn off Visual Basic for Applications when you deploy Office. Retrieved September 17, 2020.

Internal MISP references

UUID 104db93c-c5cd-431c-ac79-d76cb1694d7c which can be used as unique global reference for Microsoft Disable VBA Jan 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-17T00:00:00Z
date_published 2020-01-23T00:00:00Z
source MITRE
title How to turn off Visual Basic for Applications when you deploy Office

Microsoft Regsvr32

Microsoft. (2015, August 14). How to use the Regsvr32 tool and troubleshoot Regsvr32 error messages. Retrieved June 22, 2016.

Internal MISP references

UUID 723ec577-5ea8-4ced-b6c3-b7aaabe1d7e8 which can be used as unique global reference for Microsoft Regsvr32 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-22T00:00:00Z
date_published 2015-08-14T00:00:00Z
source MITRE
title How to use the Regsvr32 tool and troubleshoot Regsvr32 error messages

Microsoft SAM

Microsoft. (2006, October 30). How to use the SysKey utility to secure the Windows Security Accounts Manager database. Retrieved August 3, 2016.

Internal MISP references

UUID bde9acb0-c1c3-44e1-b3b1-cfc0898baead which can be used as unique global reference for Microsoft SAM in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-08-03T00:00:00Z
date_published 2006-10-30T00:00:00Z
source MITRE
title How to use the SysKey utility to secure the Windows Security Accounts Manager database

AWS Traffic Mirroring

Amazon Web Services. (n.d.). How Traffic Mirroring works. Retrieved March 17, 2022.

Internal MISP references

UUID 6b77a2f3-39b8-4574-8dee-cde7ba9debff which can be used as unique global reference for AWS Traffic Mirroring in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-03-17T00:00:00Z
source MITRE
title How Traffic Mirroring works

Symantec Hydraq Persistence Jan 2010

Fitzgerald, P. (2010, January 26). How Trojan.Hydraq Stays On Your Computer. Retrieved February 22, 2018.

Internal MISP references

UUID b3ef4b78-2ed6-4cf4-afcc-4e4cb09d806a which can be used as unique global reference for Symantec Hydraq Persistence Jan 2010 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-02-22T00:00:00Z
date_published 2010-01-26T00:00:00Z
source MITRE
title How Trojan.Hydraq Stays On Your Computer

Microsoft UAC Nov 2018

Montemayor, D. et al.. (2018, November 15). How User Account Control works. Retrieved June 3, 2019.

Internal MISP references

UUID abda4184-18f9-4799-9c1f-3ba484473e35 which can be used as unique global reference for Microsoft UAC Nov 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-03T00:00:00Z
date_published 2018-11-15T00:00:00Z
source MITRE
title How User Account Control works

TechNet How UAC Works

Lich, B. (2016, May 31). How User Account Control Works. Retrieved June 3, 2016.

Internal MISP references

UUID bbf8d1a3-115e-4bc8-be43-47ce3b295d45 which can be used as unique global reference for TechNet How UAC Works in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-03T00:00:00Z
date_published 2016-05-31T00:00:00Z
source MITRE
title How User Account Control Works

PWC WellMess July 2020

PWC. (2020, July 16). How WellMess malware has been used to target COVID-19 vaccines. Retrieved September 24, 2020.

Internal MISP references

UUID 22794e37-3c55-444a-b659-e5a1a6bc2da0 which can be used as unique global reference for PWC WellMess July 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-09-24T00:00:00Z
date_published 2020-07-16T00:00:00Z
source MITRE
title How WellMess malware has been used to target COVID-19 vaccines

Google Election Threats October 2020

Huntley, S. (2020, October 16). How We're Tackling Evolving Online Threats. Retrieved March 24, 2021.

Internal MISP references

UUID 8538a963-3e67-47fe-9afd-216b93a2be00 which can be used as unique global reference for Google Election Threats October 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-03-24T00:00:00Z
date_published 2020-10-16T00:00:00Z
source MITRE
title How We're Tackling Evolving Online Threats

Microsoft Credential Guard April 2017

Lich, B., Tobin, J. (2017, April 5). How Windows Defender Credential Guard works. Retrieved November 27, 2017.

Internal MISP references

UUID aa52db88-5d03-42ae-b371-6210d7079a84 which can be used as unique global reference for Microsoft Credential Guard April 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-27T00:00:00Z
date_published 2017-04-05T00:00:00Z
source MITRE
title How Windows Defender Credential Guard works

NPPSPY Video

Grzegorz Tworek. (2021, December 14). How winlogon.exe shares the cleartext password with custom DLLs. Retrieved March 30, 2023.

Internal MISP references

UUID 6533d5df-7388-5c59-8c63-0923de34b61d which can be used as unique global reference for NPPSPY Video in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-30T00:00:00Z
date_published 2021-12-14T00:00:00Z
source MITRE
title How winlogon.exe shares the cleartext password with custom DLLs

BleepingComputer HPE January 24 2024

Lawrence Abrams. (2024, January 24). HPE: Russian hackers breached its security team’s email accounts. Retrieved February 5, 2024.

Internal MISP references

UUID fc77948f-332a-4e59-8c93-f430cbbbf68f which can be used as unique global reference for BleepingComputer HPE January 24 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-02-05T00:00:00Z
date_published 2024-01-24T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title HPE: Russian hackers breached its security team’s email accounts

Cylance Sodinokibi July 2019

Cylance. (2019, July 3). hreat Spotlight: Sodinokibi Ransomware. Retrieved August 4, 2020.

Internal MISP references

UUID 3ad8def7-3a8a-49bb-8f47-dea2e570c99e which can be used as unique global reference for Cylance Sodinokibi July 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-08-04T00:00:00Z
date_published 2019-07-03T00:00:00Z
source MITRE
title hreat Spotlight: Sodinokibi Ransomware

Wikipedia HTML Application

Wikipedia. (2017, October 14). HTML Application. Retrieved October 27, 2017.

Internal MISP references

UUID f1f76055-91f8-4977-9392-bed347e4f181 which can be used as unique global reference for Wikipedia HTML Application in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-10-27T00:00:00Z
date_published 2017-10-14T00:00:00Z
source MITRE
title HTML Application

MSDN HTML Applications

Microsoft. (n.d.). HTML Applications. Retrieved October 27, 2017.

Internal MISP references

UUID 2de103a8-8d72-40f9-b366-b908364dd090 which can be used as unique global reference for MSDN HTML Applications in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-10-27T00:00:00Z
source MITRE
title HTML Applications

Microsoft HTML Help ActiveX

Microsoft. (n.d.). HTML Help ActiveX Control Overview. Retrieved October 3, 2018.

Internal MISP references

UUID ae5728bd-571a-451f-9ba3-3198067135b4 which can be used as unique global reference for Microsoft HTML Help ActiveX in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-10-03T00:00:00Z
source MITRE
title HTML Help ActiveX Control Overview

Outlflank HTML Smuggling 2018

Hegt, S. (2018, August 14). HTML smuggling explained. Retrieved May 20, 2021.

Internal MISP references

UUID 9a99f431-4d15-47f8-a31b-4f98671cd95d which can be used as unique global reference for Outlflank HTML Smuggling 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-05-20T00:00:00Z
date_published 2018-08-14T00:00:00Z
source MITRE
title HTML smuggling explained

CrowdStrike Linux Rootkit

Kurtz, G. (2012, November 19). HTTP iframe Injecting Linux Rootkit. Retrieved December 21, 2017.

Internal MISP references

UUID eb3590bf-ff12-4ccd-bf9d-cf8eacd82135 which can be used as unique global reference for CrowdStrike Linux Rootkit in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-21T00:00:00Z
date_published 2012-11-19T00:00:00Z
source MITRE
title HTTP iframe Injecting Linux Rootkit

Wikipedia HPKP

Wikipedia. (2017, February 28). HTTP Public Key Pinning. Retrieved March 31, 2017.

Internal MISP references

UUID 2da110e7-d3a8-433f-87c3-eb744adf811b which can be used as unique global reference for Wikipedia HPKP in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-03-31T00:00:00Z
date_published 2017-02-28T00:00:00Z
source MITRE
title HTTP Public Key Pinning

Cobalt Strike Arguments 2019

Mudge, R. (2019, January 2). https://blog.cobaltstrike.com/2019/01/02/cobalt-strike-3-13-why-do-we-argue/. Retrieved November 19, 2021.

Internal MISP references

UUID e845f741-eabe-469b-97c1-f51a2aeb18b0 which can be used as unique global reference for Cobalt Strike Arguments 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-11-19T00:00:00Z
date_published 2019-01-02T00:00:00Z
source MITRE
title https://blog.cobaltstrike.com/2019/01/02/cobalt-strike-3-13-why-do-we-argue/

Talos Discord Webhook Abuse

Nick Biasini, Edmund Brumaghin, Chris Neal, and Paul Eubanks. (2021, April 7). https://blog.talosintelligence.com/collab-app-abuse/. Retrieved July 20, 2023.

Internal MISP references

UUID affa93d8-5c8b-557d-80b4-1366df13d77a which can be used as unique global reference for Talos Discord Webhook Abuse in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-20T00:00:00Z
date_published 2021-04-07T00:00:00Z
source MITRE
title https://blog.talosintelligence.com/collab-app-abuse/

Red Canary Emotet Feb 2019

Donohue, B.. (2019, February 13). https://redcanary.com/blog/stopping-emotet-before-it-moves-laterally/. Retrieved March 25, 2019.

Internal MISP references

UUID 132915dc-d906-4c23-b1e3-885af817b840 which can be used as unique global reference for Red Canary Emotet Feb 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-03-25T00:00:00Z
date_published 2019-02-13T00:00:00Z
source MITRE
title https://redcanary.com/blog/stopping-emotet-before-it-moves-laterally/

TechNet Removable Media Control

Microsoft. (2007, August 31). https://technet.microsoft.com/en-us/library/cc771759(v=ws.10).aspx. Retrieved April 20, 2016.

Internal MISP references

UUID db86cd0a-1188-4079-afed-1f986166a2e7 which can be used as unique global reference for TechNet Removable Media Control in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-20T00:00:00Z
date_published 2007-08-31T00:00:00Z
source MITRE
title https://technet.microsoft.com/en-us/library/cc771759(v=ws.10).aspx

Chromium HSTS

Chromium. (n.d.). HTTP Strict Transport Security. Retrieved May 24, 2023.

Internal MISP references

UUID 1ad03be3-d863-5a55-a371-42b6d3b7ed31 which can be used as unique global reference for Chromium HSTS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-24T00:00:00Z
source MITRE
title HTTP Strict Transport Security

CISA AA20-301A Kimsuky

CISA, FBI, CNMF. (2020, October 27). https://us-cert.cisa.gov/ncas/alerts/aa20-301a. Retrieved November 4, 2020.

Internal MISP references

UUID 685aa213-7902-46fb-b90a-64be5c851f73 which can be used as unique global reference for CISA AA20-301A Kimsuky in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-11-04T00:00:00Z
date_published 2020-10-27T00:00:00Z
source MITRE
title https://us-cert.cisa.gov/ncas/alerts/aa20-301a

FireEye Targeted Attacks Middle East Banks

Singh, S., Yin, H. (2016, May 22). https://www.fireeye.com/blog/threat-research/2016/05/targeted_attacksaga.html. Retrieved April 5, 2018.

Internal MISP references

UUID fedb3a9d-4f9e-495c-ac92-d5457688608d which can be used as unique global reference for FireEye Targeted Attacks Middle East Banks in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-05T00:00:00Z
date_published 2016-05-22T00:00:00Z
source MITRE
title https://www.fireeye.com/blog/threat-research/2016/05/targeted_attacksaga.html

Forbes Dyre May 2017

Brewster, T. (2017, May 4). https://www.forbes.com/sites/thomasbrewster/2017/05/04/dyre-hackers-stealing-millions-from-american-coporates/#601c77842a0a. Retrieved June 15, 2020.

Internal MISP references

UUID 8fb3ef2f-3652-4563-8921-2c601d1b9bc9 which can be used as unique global reference for Forbes Dyre May 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-15T00:00:00Z
date_published 2017-05-04T00:00:00Z
source MITRE
title https://www.forbes.com/sites/thomasbrewster/2017/05/04/dyre-hackers-stealing-millions-from-american-coporates/#601c77842a0a

Microsoft Subscription Hijacking 2022

Dor Edry. (2022, August 24). Hunt for compromised Azure subscriptions using Microsoft Defender for Cloud Apps. Retrieved September 5, 2023.

Internal MISP references

UUID e5944e4c-76c6-55d1-97ec-8367b7f98c28 which can be used as unique global reference for Microsoft Subscription Hijacking 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-05T00:00:00Z
date_published 2022-08-24T00:00:00Z
source MITRE
title Hunt for compromised Azure subscriptions using Microsoft Defender for Cloud Apps

Harries JustForFun 2022

Jamie Harries. (2022, May 25). Hunting a Global Telecommunications Threat: DecisiveArchitect and Its Custom Implant JustForFun. Retrieved September 23, 2024.

Internal MISP references

UUID e7b7aee0-486e-5936-9b01-446dce22f917 which can be used as unique global reference for Harries JustForFun 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-09-23T00:00:00Z
date_published 2022-05-25T00:00:00Z
source MITRE
title Hunting a Global Telecommunications Threat: DecisiveArchitect and Its Custom Implant JustForFun

crowdstrike bpf socket filters

Jamie Harries. (2022, May 25). Hunting a Global Telecommunications Threat: DecisiveArchitect and Its Custom Implant JustForFun. Retrieved October 18, 2022.

Internal MISP references

UUID f68a59a1-cb07-4f58-b755-25c91938b611 which can be used as unique global reference for crowdstrike bpf socket filters in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-10-18T00:00:00Z
date_published 2022-05-25T00:00:00Z
source MITRE
title Hunting a Global Telecommunications Threat: DecisiveArchitect and Its Custom Implant JustForFun

Koczwara Beacon Hunting Sep 2021

Koczwara, M. (2021, September 7). Hunting Cobalt Strike C2 with Shodan. Retrieved October 12, 2021.

Internal MISP references

UUID e3984769-f6d7-43dd-8179-7df9d441512e which can be used as unique global reference for Koczwara Beacon Hunting Sep 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-12T00:00:00Z
date_published 2021-09-07T00:00:00Z
source MITRE
title Hunting Cobalt Strike C2 with Shodan

Fireeye Hunting COM June 2019

Hamilton, C. (2019, June 4). Hunting COM Objects. Retrieved June 10, 2019.

Internal MISP references

UUID 84311e46-cea1-486a-a737-c4a4946ab837 which can be used as unique global reference for Fireeye Hunting COM June 2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-06-10T00:00:00Z
date_published 2019-06-04T00:00:00Z
source MITRE
title Hunting COM Objects

Berba hunting linux systemd

Pepe Berba. (2022, January 30). Hunting for Persistence in Linux (Part 3): Systemd, Timers, and Cron. Retrieved March 20, 2023.

Internal MISP references

UUID 7dfd6a67-3935-506a-8661-1caa7eb508e2 which can be used as unique global reference for Berba hunting linux systemd in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-20T00:00:00Z
date_published 2022-01-30T00:00:00Z
source MITRE
title Hunting for Persistence in Linux (Part 3): Systemd, Timers, and Cron

Elastic HuntingNMemory June 2017

Desimone, J. (2017, June 13). Hunting in Memory. Retrieved December 7, 2017.

Internal MISP references

UUID 8cd58716-4ff1-4ba2-b980-32c52cf7dee8 which can be used as unique global reference for Elastic HuntingNMemory June 2017 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-07T00:00:00Z
date_published 2017-06-13T00:00:00Z
source MITRE
title Hunting in Memory

LogPoint Hunting LockBit

LogPoint. (n.d.). Hunting LockBit Variations using Logpoint. Retrieved May 19, 2023.

Internal MISP references

UUID 22aa7792-6296-4f16-826f-d0f1c55ddb2a which can be used as unique global reference for LogPoint Hunting LockBit in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-05-19T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Hunting LockBit Variations using Logpoint

Joint Cybersecurity Advisory AA23-129A Snake Malware May 2023

FBI et al. (2023, May 9). Hunting Russian Intelligence “Snake” Malware. Retrieved June 8, 2023.

Internal MISP references

UUID 1931b80a-effb-59ec-acae-c0f17efb8cad which can be used as unique global reference for Joint Cybersecurity Advisory AA23-129A Snake Malware May 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-06-08T00:00:00Z
date_published 2023-05-09T00:00:00Z
source MITRE
title Hunting Russian Intelligence “Snake” Malware

Falcon Sandbox smp: 28553b3a9d

Hybrid Analysis. (2018, July 11). HybridAnalsysis of sample 28553b3a9d2ad4361d33d29ac4bf771d008e0073cec01b5561c6348a608f8dd7. Retrieved September 8, 2023.

Internal MISP references

UUID f27ab4cb-1666-501a-aa96-537d2b2d1f08 which can be used as unique global reference for Falcon Sandbox smp: 28553b3a9d in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-09-08T00:00:00Z
date_published 2018-07-11T00:00:00Z
source MITRE
title HybridAnalsysis of sample 28553b3a9d2ad4361d33d29ac4bf771d008e0073cec01b5561c6348a608f8dd7

Wikipedia Hypervisor

Wikipedia. (2016, May 23). Hypervisor. Retrieved June 11, 2016.

Internal MISP references

UUID 1a6ae877-ef30-4d40-abd0-fde308f1a1f0 which can be used as unique global reference for Wikipedia Hypervisor in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-11T00:00:00Z
date_published 2016-05-23T00:00:00Z
source MITRE
title Hypervisor

FireEye ADFS

Bierstock, D., Baker, A. (2019, March 21). I am AD FS and So Can You. Retrieved December 17, 2020.

Internal MISP references

UUID 6891eaf4-6857-4106-860c-1708d2a3bd33 which can be used as unique global reference for FireEye ADFS in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-17T00:00:00Z
date_published 2019-03-21T00:00:00Z
source MITRE
title I am AD FS and So Can You

AWS IAM Conditions

AWS. (n.d.). IAM JSON policy elements: Condition. Retrieved January 2, 2024.

Internal MISP references

UUID 0fabd95b-a8cc-5a03-9a48-ffac8e5c5e28 which can be used as unique global reference for AWS IAM Conditions in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-02T00:00:00Z
source MITRE
title IAM JSON policy elements: Condition

AWS EKS IAM Roles for Service Accounts

Amazon Web Services. (n.d.). IAM roles for service accounts. Retrieved July 14, 2023.

Internal MISP references

UUID b2452f0e-93b0-55b7-add8-8338d171f0bf which can be used as unique global reference for AWS EKS IAM Roles for Service Accounts in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-14T00:00:00Z
source MITRE
title IAM roles for service accounts

Kaspersky IAmTheKing October 2020

Ivan Kwiatkowski, Pierre Delcher, Felix Aime. (2020, October 15). IAmTheKing and the SlothfulMedia malware family. Retrieved October 15, 2020.

Internal MISP references

UUID fe4050f3-1a73-4e98-9bf1-e8fb73a23b7a which can be used as unique global reference for Kaspersky IAmTheKing October 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-15T00:00:00Z
date_published 2020-10-15T00:00:00Z
source MITRE
title IAmTheKing and the SlothfulMedia malware family

Amazon IAM Groups

Amazon. (n.d.). IAM user groups. Retrieved October 13, 2021.

Internal MISP references

UUID 16f6b02a-912b-42c6-8d32-4e4f11fa70ec which can be used as unique global reference for Amazon IAM Groups in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-13T00:00:00Z
source MITRE
title IAM user groups

IAPP

IAPP. (n.d.). Retrieved March 5, 2024.

Internal MISP references

UUID a7dac249-f34a-557c-94ea-b16723f7a4f7 which can be used as unique global reference for IAPP in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-05T00:00:00Z
source MITRE
title IAPP

CrowdStrike IceApple May 2022

CrowdStrike. (2022, May). ICEAPPLE: A NOVEL INTERNET INFORMATION SERVICES (IIS) POST-EXPLOITATION FRAMEWORK. Retrieved June 27, 2022.

Internal MISP references

UUID 325988b8-1c7d-4296-83d6-bfcbe533b75e which can be used as unique global reference for CrowdStrike IceApple May 2022 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-06-27T00:00:00Z
date_published 2022-05-01T00:00:00Z
source MITRE
title ICEAPPLE: A NOVEL INTERNET INFORMATION SERVICES (IIS) POST-EXPLOITATION FRAMEWORK

Trendmicro_IcedID

Kenefick , I. (2022, December 23). IcedID Botnet Distributors Abuse Google PPC to Distribute Malware. Retrieved July 24, 2024.

Internal MISP references

UUID d7584086-0a3c-5047-af06-760a295442eb which can be used as unique global reference for Trendmicro_IcedID in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-07-24T00:00:00Z
date_published 2022-12-23T00:00:00Z
source MITRE
title IcedID Botnet Distributors Abuse Google PPC to Distribute Malware

ICIT China's Espionage Jul 2016

Scott, J. and Spaniel, D. (2016, July 28). ICIT Brief - China’s Espionage Dynasty: Economic Death by a Thousand Cuts. Retrieved June 7, 2018.

Internal MISP references

UUID 1a824860-6978-454d-963a-a56414a4312b which can be used as unique global reference for ICIT China's Espionage Jul 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-06-07T00:00:00Z
date_published 2016-07-28T00:00:00Z
source MITRE
title ICIT Brief - China’s Espionage Dynasty: Economic Death by a Thousand Cuts

CISA ICS Advisory ICSA-10-272-01

CISA. (2010, September 10). ICS Advisory (ICSA-10-272-01). Retrieved December 7, 2020.

Internal MISP references

UUID 25b3c18c-e017-4773-91dd-b489220d4fcb which can be used as unique global reference for CISA ICS Advisory ICSA-10-272-01 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-07T00:00:00Z
date_published 2010-09-10T00:00:00Z
source MITRE
title ICS Advisory (ICSA-10-272-01)

US-CERT Ukraine Feb 2016

US-CERT. (2016, February 25). ICS Alert (IR-ALERT-H-16-056-01) Cyber-Attack Against Ukrainian Critical Infrastructure. Retrieved June 10, 2020.

Internal MISP references

UUID 403ea040-8c08-423f-99cb-d7e7852c16e4 which can be used as unique global reference for US-CERT Ukraine Feb 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-10T00:00:00Z
date_published 2016-02-25T00:00:00Z
source MITRE
title ICS Alert (IR-ALERT-H-16-056-01) Cyber-Attack Against Ukrainian Critical Infrastructure

Dragos Threat Report 2020

Dragos. (n.d.). ICS Cybersecurity Year in Review 2020. Retrieved February 25, 2021.

Internal MISP references

UUID 8bb3147c-3178-4449-9978-f1248b1bcb0a which can be used as unique global reference for Dragos Threat Report 2020 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-02-25T00:00:00Z
source MITRE
title ICS Cybersecurity Year in Review 2020

id man page

MacKenzie, D. and Robbins, A. (n.d.). id(1) - Linux man page. Retrieved January 11, 2024.

Internal MISP references

UUID 158f088c-4d51-567d-bc58-be0b9a087c9a which can be used as unique global reference for id man page in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-11T00:00:00Z
source MITRE
title id(1) - Linux man page

Cisco Advisory SNMP v3 Authentication Vulnerabilities

Cisco. (2008, June 10). Identifying and Mitigating Exploitation of the SNMP Version 3 Authentication Vulnerabilities. Retrieved October 19, 2020.

Internal MISP references

UUID ed7897e5-21f0-49fa-9b26-c397eaebc88a which can be used as unique global reference for Cisco Advisory SNMP v3 Authentication Vulnerabilities in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-10-19T00:00:00Z
date_published 2008-06-10T00:00:00Z
source MITRE
title Identifying and Mitigating Exploitation of the SNMP Version 3 Authentication Vulnerabilities

Resource and Data Forks

Flylib. (n.d.). Identifying Resource and Data Forks. Retrieved October 12, 2021.

Internal MISP references

UUID b8eaf053-40e0-414e-a89e-409dbf218554 which can be used as unique global reference for Resource and Data Forks in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-10-12T00:00:00Z
source MITRE
title Identifying Resource and Data Forks

AWS Identity Federation

Amazon. (n.d.). Identity Federation in AWS. Retrieved March 13, 2020.

Internal MISP references

UUID b55ac071-483b-4802-895f-ea4eaac1de92 which can be used as unique global reference for AWS Identity Federation in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-03-13T00:00:00Z
source MITRE
title Identity Federation in AWS

Microsoft GetNCCChanges

Microsoft. (n.d.). IDL_DRSGetNCChanges (Opnum 3). Retrieved December 4, 2017.

Internal MISP references

UUID 410570e4-b578-4838-a25d-f03d92fcf3cb which can be used as unique global reference for Microsoft GetNCCChanges in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-04T00:00:00Z
source MITRE
title IDL_DRSGetNCChanges (Opnum 3)

Ie4uinit.exe - LOLBAS Project

LOLBAS. (2018, May 25). Ie4uinit.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 01f9a368-5933-47a1-85a9-e5883a5ca266 which can be used as unique global reference for Ie4uinit.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Ie4uinit.exe

Ieadvpack.dll - LOLBAS Project

LOLBAS. (2018, May 25). Ieadvpack.dll. Retrieved December 4, 2023.

Internal MISP references

UUID 79943a49-23d6-499b-a022-7c2f8bd68aee which can be used as unique global reference for Ieadvpack.dll - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Ieadvpack.dll

iediagcmd.exe - LOLBAS Project

LOLBAS. (2022, March 29). iediagcmd.exe. Retrieved December 4, 2023.

Internal MISP references

UUID de238a18-2275-497e-adcf-453a016a24c4 which can be used as unique global reference for iediagcmd.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2022-03-29T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title iediagcmd.exe

Wikipedia 802.1x

Wikipedia. (2018, March 30). IEEE 802.1X. Retrieved April 11, 2018.

Internal MISP references

UUID 5d382527-ffbd-486e-adbe-d60508567281 which can be used as unique global reference for Wikipedia 802.1x in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-11T00:00:00Z
date_published 2018-03-30T00:00:00Z
source MITRE
title IEEE 802.1X

Ieexec.exe - LOLBAS Project

LOLBAS. (2018, May 25). Ieexec.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 91f31525-585d-4b71-83d7-9b7c2feacd34 which can be used as unique global reference for Ieexec.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Ieexec.exe

Ieframe.dll - LOLBAS Project

LOLBAS. (2018, May 25). Ieframe.dll. Retrieved December 4, 2023.

Internal MISP references

UUID aab9c80d-1f1e-47ba-954d-65e7400054df which can be used as unique global reference for Ieframe.dll - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2018-05-25T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Ieframe.dll

Wikipedia Ifconfig

Wikipedia. (2016, January 26). ifconfig. Retrieved April 17, 2016.

Internal MISP references

UUID 7bb238d4-4571-4cd0-aab2-76797570724a which can be used as unique global reference for Wikipedia Ifconfig in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-04-17T00:00:00Z
date_published 2016-01-26T00:00:00Z
source MITRE
title ifconfig

EFF Manul Aug 2016

Galperin, E., Et al.. (2016, August). I Got a Letter From the Government the Other Day.... Retrieved April 25, 2018.

Internal MISP references

UUID 311a3863-3897-4ddf-a251-d0467a56675f which can be used as unique global reference for EFF Manul Aug 2016 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-04-25T00:00:00Z
date_published 2016-08-01T00:00:00Z
source MITRE
title I Got a Letter From the Government the Other Day...

IIS Backdoor 2011

Julien. (2011, February 2). IIS Backdoor. Retrieved June 3, 2021.

Internal MISP references

UUID fd450382-cca0-40c4-8144-cc90a3b0011b which can be used as unique global reference for IIS Backdoor 2011 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-03T00:00:00Z
date_published 2011-02-02T00:00:00Z
source MITRE
title IIS Backdoor

Microsoft IIS Modules Overview 2007

Microsoft. (2007, November 24). IIS Modules Overview. Retrieved June 17, 2021.

Internal MISP references

UUID c8db6bfd-3a08-43b3-b33b-91a32e9bd694 which can be used as unique global reference for Microsoft IIS Modules Overview 2007 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-06-17T00:00:00Z
date_published 2007-11-24T00:00:00Z
source MITRE
title IIS Modules Overview

Proofpoint TA456 Defense Contractor July 2021

Miller, J. et. al. (2021, July 28). I Knew You Were Trouble: TA456 Targets Defense Contractor with Alluring Social Media Persona. Retrieved March 11, 2024.

Internal MISP references

UUID 0cc015d9-96d0-534e-a34a-221267250f90 which can be used as unique global reference for Proofpoint TA456 Defense Contractor July 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-03-11T00:00:00Z
date_published 2021-07-28T00:00:00Z
source MITRE
title I Knew You Were Trouble: TA456 Targets Defense Contractor with Alluring Social Media Persona

Ilasm.exe - LOLBAS Project

LOLBAS. (2020, March 17). Ilasm.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 347a1f01-02ce-488e-9100-862971c1833f which can be used as unique global reference for Ilasm.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2020-03-17T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Ilasm.exe

anomali-rocke-tactics

Anomali Threat Research. (2019, October 15). Illicit Cryptomining Threat Actor Rocke Changes Tactics, Now More Difficult to Detect. Retrieved December 17, 2020.

Internal MISP references

UUID 2308c5ca-04a4-43c5-b92b-ffa6a60ae3a9 which can be used as unique global reference for anomali-rocke-tactics in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-17T00:00:00Z
date_published 2019-10-15T00:00:00Z
source MITRE
title Illicit Cryptomining Threat Actor Rocke Changes Tactics, Now More Difficult to Detect

Microsoft Dev Blog IFEO Mar 2010

Shanbhag, M. (2010, March 24). Image File Execution Options (IFEO). Retrieved December 18, 2017.

Internal MISP references

UUID 4c62c2cb-bee2-4fc0-aa81-65d66e71a5c2 which can be used as unique global reference for Microsoft Dev Blog IFEO Mar 2010 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-18T00:00:00Z
date_published 2010-03-24T00:00:00Z
source MITRE
title Image File Execution Options (IFEO)

IMEWDBLD.exe - LOLBAS Project

LOLBAS. (2020, March 5). IMEWDBLD.exe. Retrieved December 4, 2023.

Internal MISP references

UUID 9d1d6bc1-61cf-4465-b3cb-b6af36769027 which can be used as unique global reference for IMEWDBLD.exe - LOLBAS Project in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-12-04T00:00:00Z
date_published 2020-03-05T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title IMEWDBLD.exe

Imminent Unit42 Dec2019

Unit 42. (2019, December 2). Imminent Monitor – a RAT Down Under. Retrieved May 5, 2020.

Internal MISP references

UUID 28f858c6-4c00-4c0c-bb27-9e000ba22690 which can be used as unique global reference for Imminent Unit42 Dec2019 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-05T00:00:00Z
date_published 2019-12-02T00:00:00Z
source MITRE
title Imminent Monitor – a RAT Down Under

Core Security Impacket

Core Security. (n.d.). Impacket. Retrieved November 2, 2017.

Internal MISP references

UUID 9b88d7d6-5cf3-40d5-b624-ddf01508cb95 which can be used as unique global reference for Core Security Impacket in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-11-02T00:00:00Z
source MITRE
title Impacket

Impacket Tools

SecureAuth. (n.d.). Retrieved January 15, 2019.

Internal MISP references

UUID cdaf72ce-e8f7-42ae-b815-14a7fd47e292 which can be used as unique global reference for Impacket Tools in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-01-15T00:00:00Z
source MITRE
title Impacket Tools

EK Impeding Malware Analysis

Song, C., et al. (2012, August 7). Impeding Automated Malware Analysis with Environment-sensitive Malware. Retrieved January 18, 2019.

Internal MISP references

UUID c3e6c8da-1399-419c-96f5-7dade6fccd29 which can be used as unique global reference for EK Impeding Malware Analysis in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2019-01-18T00:00:00Z
date_published 2012-08-07T00:00:00Z
source MITRE
title Impeding Automated Malware Analysis with Environment-sensitive Malware

Microsoft Impersonation and EWS in Exchange

Microsoft. (2022, September 13). Impersonation and EWS in Exchange. Retrieved July 10, 2023.

Internal MISP references

UUID d7755dbd-0b38-5776-b63a-d792a4d027a4 which can be used as unique global reference for Microsoft Impersonation and EWS in Exchange in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-10T00:00:00Z
date_published 2022-09-13T00:00:00Z
source MITRE
title Impersonation and EWS in Exchange

Microsoft Implementing CPL

M. (n.d.). Implementing Control Panel Items. Retrieved January 18, 2018.

Internal MISP references

UUID 63c5c654-e885-4427-a644-068f4057f35f which can be used as unique global reference for Microsoft Implementing CPL in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2018-01-18T00:00:00Z
source MITRE
title Implementing Control Panel Items

TechNet Least Privilege

Microsoft. (2016, April 16). Implementing Least-Privilege Administrative Models. Retrieved June 3, 2016.

Internal MISP references

UUID 21e595be-d028-4013-b3d0-811c08581709 which can be used as unique global reference for TechNet Least Privilege in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2016-06-03T00:00:00Z
date_published 2016-04-16T00:00:00Z
source MITRE
title Implementing Least-Privilege Administrative Models

Dragos IT ICS Ransomware

Slowik, J.. (2019, April 10). Implications of IT Ransomware for ICS Environments. Retrieved January 28, 2021.

Internal MISP references

UUID 60187301-8d70-4023-8e6d-59cbb1468f0d which can be used as unique global reference for Dragos IT ICS Ransomware in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-01-28T00:00:00Z
date_published 2019-04-10T00:00:00Z
source MITRE
title Implications of IT Ransomware for ICS Environments

Microsoft SolarWinds Steps

Lambert, J. (2020, December 13). Important steps for customers to protect themselves from recent nation-state cyberattacks. Retrieved December 17, 2020.

Internal MISP references

UUID 33e84eb1-4835-404b-8c1a-40695c04cdb4 which can be used as unique global reference for Microsoft SolarWinds Steps in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-12-17T00:00:00Z
date_published 2020-12-13T00:00:00Z
source MITRE
title Important steps for customers to protect themselves from recent nation-state cyberattacks

White House Imposing Costs RU Gov April 2021

White House. (2021, April 15). Imposing Costs for Harmful Foreign Activities by the Russian Government. Retrieved April 16, 2021.

Internal MISP references

UUID c2bf9e2f-cd0a-411d-84bc-61454a369c6b which can be used as unique global reference for White House Imposing Costs RU Gov April 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2021-04-16T00:00:00Z
date_published 2021-04-15T00:00:00Z
source MITRE
title Imposing Costs for Harmful Foreign Activities by the Russian Government

Malicious Driver Reporting Center

Azure Edge and Platform Security Team & Microsoft 365 Defender Research Team. (2021, December 8). Improve kernel security with the new Microsoft Vulnerable and Malicious Driver Reporting Center. Retrieved April 6, 2022.

Internal MISP references

UUID fde77ea9-2b4d-40d7-99c5-433bfdbcb994 which can be used as unique global reference for Malicious Driver Reporting Center in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-06T00:00:00Z
date_published 2021-12-08T00:00:00Z
source MITRE
title Improve kernel security with the new Microsoft Vulnerable and Malicious Driver Reporting Center

Unit 42 Inception November 2018

Lancaster, T. (2018, November 5). Inception Attackers Target Europe with Year-old Office Vulnerability. Retrieved May 8, 2020.

Internal MISP references

UUID 5cb98fce-f386-4878-b69c-5c6440ad689c which can be used as unique global reference for Unit 42 Inception November 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-08T00:00:00Z
date_published 2018-11-05T00:00:00Z
source MITRE, Tidal Cyber
title Inception Attackers Target Europe with Year-old Office Vulnerability

Symantec Inception Framework March 2018

Symantec. (2018, March 14). Inception Framework: Alive and Well, and Hiding Behind Proxies. Retrieved May 8, 2020.

Internal MISP references

UUID 166f5c44-7d8c-45d5-8d9f-3b8bd21a2af3 which can be used as unique global reference for Symantec Inception Framework March 2018 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-05-08T00:00:00Z
date_published 2018-03-14T00:00:00Z
source MITRE, Tidal Cyber
title Inception Framework: Alive and Well, and Hiding Behind Proxies

Expel AWS Attacker

Brian Bahtiarian, David Blanton, Britton Manahan and Kyle Pellett. (2022, April 5). Incident report: From CLI to console, chasing an attacker in AWS. Retrieved April 7, 2022.

Internal MISP references

UUID 089f6f4e-370c-49cb-a35c-c80be0fd39de which can be used as unique global reference for Expel AWS Attacker in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2022-04-07T00:00:00Z
date_published 2022-04-05T00:00:00Z
source MITRE
title Incident report: From CLI to console, chasing an attacker in AWS

Dark Reading Microsoft 365 Attacks 2021

Kelly Sheridan. (2021, August 5). Incident Responders Explore Microsoft 365 Attacks in the Wild. Retrieved March 17, 2023.

Internal MISP references

UUID f26d3aa4-6966-53c4-b9d1-848420377eae which can be used as unique global reference for Dark Reading Microsoft 365 Attacks 2021 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-03-17T00:00:00Z
date_published 2021-08-05T00:00:00Z
source MITRE
title Incident Responders Explore Microsoft 365 Attacks in the Wild

Nicole Hoffman. (2023, July 26). Incident Response trends Q2 2023: Data theft extortion rises, while healthcare is still most-targeted vertical. Retrieved August 4, 2023.

Internal MISP references

UUID f5367abc-e776-41a0-b8e5-6dc60079c081 which can be used as unique global reference for Cisco Talos Q2 Trends July 26 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-08-04T00:00:00Z
date_published 2023-07-26T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Incident Response trends Q2 2023: Data theft extortion rises, while healthcare is still most-targeted vertical

SentinelOne September 21 2023

SentinelOne. (2023, September 21). Inc. Ransom. Retrieved January 1, 2024.

Internal MISP references

UUID 7e793738-c132-47bf-90aa-1f0659564d16 which can be used as unique global reference for SentinelOne September 21 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-01-01T00:00:00Z
date_published 2023-09-21T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Inc. Ransom

Bleeping Computer INC Ransomware March 2024

Toulas, B. (2024, March 27). INC Ransom threatens to leak 3TB of NHS Scotland stolen data. Retrieved June 5, 2024.

Internal MISP references

UUID fbfd6be8-acc7-5ed4-b2b7-9248c2c27682 which can be used as unique global reference for Bleeping Computer INC Ransomware March 2024 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2024-06-05T00:00:00Z
date_published 2024-03-27T00:00:00Z
source MITRE
title INC Ransom threatens to leak 3TB of NHS Scotland stolen data

U.S. CISA Increased Truebot Activity July 6 2023

Cybersecurity and Infrastructure Security Agency. (2023, July 6). Increased Truebot Activity Infects U.S. and Canada Based Networks. Retrieved July 6, 2023.

Internal MISP references

UUID 6f9b8f72-c55f-4268-903e-1f8a82efa5bb which can be used as unique global reference for U.S. CISA Increased Truebot Activity July 6 2023 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2023-07-06T00:00:00Z
date_published 2023-07-06T00:00:00Z
owner TidalCyberIan
source Tidal Cyber
title Increased Truebot Activity Infects U.S. and Canada Based Networks

Increasing Linux kernel integrity

Boelen, M. (2015, October 7). Increase kernel integrity with disabled Linux kernel modules loading. Retrieved June 4, 2020.

Internal MISP references

UUID 23b12551-0bec-4f7d-8468-f372a8ba521b which can be used as unique global reference for Increasing Linux kernel integrity in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2020-06-04T00:00:00Z
date_published 2015-10-07T00:00:00Z
source MITRE
title Increase kernel integrity with disabled Linux kernel modules loading

TechNet Scheduling Priority

Microsoft. (2013, May 8). Increase scheduling priority. Retrieved December 18, 2017.

Internal MISP references

UUID b785ceda-fea9-4e96-87d8-38cfd1f8b5bd which can be used as unique global reference for TechNet Scheduling Priority in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
date_accessed 2017-12-18T00:00:00Z
date_published 2013-05-08T00:00:00Z
source MITRE