Tidal References
Tidal References Cluster
Authors
Authors and/or Contributors |
---|
Tidal Cyber |
D3Secutrity CTI Feeds
Banerd, W. (2019, April 30). 10 of the Best Open Source Threat Intelligence Feeds. Retrieved October 20, 2020.
Internal MISP references
UUID 088f2cbd-cce1-477f-9ffb-319477d74b69
which can be used as unique global reference for D3Secutrity CTI Feeds
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-20T00:00:00Z |
date_published | 2019-04-30T00:00:00Z |
source | MITRE |
title | 10 of the Best Open Source Threat Intelligence Feeds |
Linux Logs
Marcel. (2018, April 19). 12 Critical Linux Log Files You Must be Monitoring. Retrieved March 29, 2020.
Internal MISP references
UUID aa25e385-802c-4f04-81bb-bb7d1a7599ec
which can be used as unique global reference for Linux Logs
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-03-29T00:00:00Z |
date_published | 2018-04-19T00:00:00Z |
source | MITRE |
title | 12 Critical Linux Log Files You Must be Monitoring |
Netspi PowerShell Execution Policy Bypass
Sutherland, S. (2014, September 9). 15 Ways to Bypass the PowerShell Execution Policy. Retrieved July 23, 2015.
Internal MISP references
UUID 0ee90db4-f21c-4c68-bd35-aa6c5edd3b4e
which can be used as unique global reference for Netspi PowerShell Execution Policy Bypass
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2015-07-23T00:00:00Z |
date_published | 2014-09-09T00:00:00Z |
source | MITRE |
title | 15 Ways to Bypass the PowerShell Execution Policy |
Mandiant-leaks
DANIEL KAPELLMANN ZAFRA, COREY HIDELBRANDT, NATHAN BRUBAKER, KEITH LUNDEN. (2022, January 31). 1 in 7 OT Ransomware Extortion Attacks Leak Critical Operational Technology Information. Retrieved August 18, 2023.
Internal MISP references
UUID aecc3ffb-c524-5ad9-b621-7228f53e27c3
which can be used as unique global reference for Mandiant-leaks
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-08-18T00:00:00Z |
date_published | 2022-01-31T00:00:00Z |
source | MITRE |
title | 1 in 7 OT Ransomware Extortion Attacks Leak Critical Operational Technology Information |
Tilbury Windows Credentials
Chad Tilbury. (2017, August 8). 1Windows Credentials: Attack, Mitigation, Defense. Retrieved February 21, 2020.
Internal MISP references
UUID 2ddae0c9-910c-4c1a-b524-de3a58dbba13
which can be used as unique global reference for Tilbury Windows Credentials
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-02-21T00:00:00Z |
date_published | 2017-08-08T00:00:00Z |
source | MITRE |
title | 1Windows Credentials: Attack, Mitigation, Defense |
CWE top 25
Christey, S., Brown, M., Kirby, D., Martin, B., Paller, A.. (2011, September 13). 2011 CWE/SANS Top 25 Most Dangerous Software Errors. Retrieved April 10, 2019.
Internal MISP references
UUID d8ee8b1f-c18d-48f3-9758-6860cd31c3e3
which can be used as unique global reference for CWE top 25
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-04-10T00:00:00Z |
date_published | 2011-09-13T00:00:00Z |
source | MITRE |
title | 2011 CWE/SANS Top 25 Most Dangerous Software Errors |
CrowdStrike 2015 Global Threat Report
CrowdStrike Intelligence. (2016). 2015 Global Threat Report. Retrieved April 11, 2018.
Internal MISP references
UUID 50d467da-286b-45f3-8d5a-e9d8632f7bf1
which can be used as unique global reference for CrowdStrike 2015 Global Threat Report
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-04-11T00:00:00Z |
date_published | 2016-01-01T00:00:00Z |
source | MITRE |
title | 2015 Global Threat Report |
Prolific OSX Malware History
Bit9 + Carbon Black Threat Research Team. (2015). 2015: The Most Prolific Year in History for OS X Malware. Retrieved July 8, 2017.
Internal MISP references
UUID 74b0f1a9-5822-4dcf-9a92-9a6df0b4db1e
which can be used as unique global reference for Prolific OSX Malware History
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-07-08T00:00:00Z |
date_published | 2015-01-01T00:00:00Z |
source | MITRE |
title | 2015: The Most Prolific Year in History for OS X Malware |
CERN Windigo June 2019
CERN. (2019, June 4). 2019/06/04 Advisory: Windigo attacks. Retrieved February 10, 2021.
Internal MISP references
UUID e9f1289f-a32e-441c-8787-cb32a26216d1
which can be used as unique global reference for CERN Windigo June 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-02-10T00:00:00Z |
date_published | 2019-06-04T00:00:00Z |
source | MITRE |
title | 2019/06/04 Advisory: Windigo attacks |
CrowdStrike GTR 2019
CrowdStrike. (2019, January). 2019 Global Threat Report. Retrieved June 10, 2020.
Internal MISP references
UUID d6aa917e-baee-4379-8e69-a04b9aa5192a
which can be used as unique global reference for CrowdStrike GTR 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-06-10T00:00:00Z |
date_published | 2019-01-01T00:00:00Z |
source | MITRE |
title | 2019 Global Threat Report |
Crowdstrike GTR2020 Mar 2020
Crowdstrike. (2020, March 2). 2020 Global Threat Report. Retrieved December 11, 2020.
Internal MISP references
UUID a2325ace-e5a1-458d-80c1-5037bd7fa727
which can be used as unique global reference for Crowdstrike GTR2020 Mar 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-12-11T00:00:00Z |
date_published | 2020-03-02T00:00:00Z |
source | MITRE |
title | 2020 Global Threat Report |
RecordedFuture 2021 Ad Infra
Insikt Group. (2022, January 18). 2021 Adversary Infrastructure Report. Retrieved March 25, 2022.
Internal MISP references
UUID d509e6f2-c317-4483-a51e-ad15a78a12c0
which can be used as unique global reference for RecordedFuture 2021 Ad Infra
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-03-25T00:00:00Z |
date_published | 2022-01-18T00:00:00Z |
source | MITRE |
title | 2021 Adversary Infrastructure Report |
Red Canary 2021 Threat Detection Report March 2021
Red Canary. (2021, March 31). 2021 Threat Detection Report. Retrieved August 31, 2021.
Internal MISP references
UUID 83b906fc-ac2a-4f49-b87e-31f046e95fb7
which can be used as unique global reference for Red Canary 2021 Threat Detection Report March 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-08-31T00:00:00Z |
date_published | 2021-03-31T00:00:00Z |
source | MITRE |
title | 2021 Threat Detection Report |
ACSC BlackCat Apr 2022
Australian Cyber Security Centre. (2022, April 14). 2022-004: ACSC Ransomware Profile - ALPHV (aka BlackCat). Retrieved December 20, 2022.
Internal MISP references
UUID 3b85eaeb-6bf5-529b-80a4-439ceb6c5d6d
which can be used as unique global reference for ACSC BlackCat Apr 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-12-20T00:00:00Z |
date_published | 2022-04-14T00:00:00Z |
source | MITRE |
title | 2022-004: ACSC Ransomware Profile - ALPHV (aka BlackCat) |
Crowdstrike HuntReport 2022
CrowdStrike. (2023). 2022 Falcon OverWatch Threat Hunting Report. Retrieved May 20, 2024.
Internal MISP references
UUID cae1043a-2473-5b7e-b9ed-27d4f9c5b9b0
which can be used as unique global reference for Crowdstrike HuntReport 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-05-20T00:00:00Z |
date_published | 2023-01-01T00:00:00Z |
source | MITRE |
title | 2022 Falcon OverWatch Threat Hunting Report |
Internet crime report 2022
IC3. (2022). 2022 Internet Crime Report. Retrieved August 18, 2023.
Internal MISP references
UUID ef30c4eb-3da3-5c7b-a304-188acd2f7ebc
which can be used as unique global reference for Internet crime report 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-08-18T00:00:00Z |
date_published | 2022-01-01T00:00:00Z |
source | MITRE |
title | 2022 Internet Crime Report |
RC PowerShell
Red Canary. (n.d.). 2022 Threat Detection Report: PowerShell. Retrieved March 17, 2023.
Internal MISP references
UUID 0f154aa6-8c9d-5bfc-a3c4-5f3e1420f55f
which can be used as unique global reference for RC PowerShell
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-17T00:00:00Z |
source | MITRE |
title | 2022 Threat Detection Report: PowerShell |
ASD Royal Ransomware January 24 2023
Australian Signals Directorate. (2023, January 24). 2023-01: ASD's ACSC Ransomware Profile - Royal. Retrieved June 28, 2024.
Internal MISP references
UUID 514b704c-8668-4b61-8411-5b682e3b8471
which can be used as unique global reference for ASD Royal Ransomware January 24 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-06-28T00:00:00Z |
date_published | 2023-01-24T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | 2023-01: ASD's ACSC Ransomware Profile - Royal |
Palo Alto Latrodectus Activity June 2024
Unit 42. (2024, June 25). 2024-06-25-IOCs-from-Latrodectus-activity. Retrieved September 13, 2024.
Internal MISP references
UUID 00f32246-e19b-5b20-b5c1-27b75c6667ca
which can be used as unique global reference for Palo Alto Latrodectus Activity June 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-13T00:00:00Z |
date_published | 2024-06-25T00:00:00Z |
source | MITRE |
title | 2024-06-25-IOCs-from-Latrodectus-activity |
20 macOS Common Tools and Techniques
Phil Stokes. (2021, February 16). 20 Common Tools & Techniques Used by macOS Threat Actors & Malware. Retrieved August 23, 2021.
Internal MISP references
UUID 3ee99ff4-daf4-4776-9d94-f7cf193c2b0c
which can be used as unique global reference for 20 macOS Common Tools and Techniques
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-08-23T00:00:00Z |
date_published | 2021-02-16T00:00:00Z |
source | MITRE |
title | 20 Common Tools & Techniques Used by macOS Threat Actors & Malware |
Microsoft GPP Key
Microsoft. (n.d.). 2.2.1.1.4 Password Encryption. Retrieved April 11, 2018.
Internal MISP references
UUID 24d8847b-d5de-4513-a55f-62c805dfa1dc
which can be used as unique global reference for Microsoft GPP Key
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-04-11T00:00:00Z |
source | MITRE |
title | 2.2.1.1.4 Password Encryption |
Microsoft _VBA_PROJECT Stream
Microsoft. (2020, February 19). 2.3.4.1 _VBA_PROJECT Stream: Version Dependent Project Information. Retrieved September 18, 2020.
Internal MISP references
UUID 70c75ee4-4ba4-4124-8001-0fadb49a5ac6
which can be used as unique global reference for Microsoft _VBA_PROJECT Stream
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-09-18T00:00:00Z |
date_published | 2020-02-19T00:00:00Z |
source | MITRE |
title | 2.3.4.1 _VBA_PROJECT Stream: Version Dependent Project Information |
Microsoft Learn
Microsoft. (2021, April 6). 2.5 ExtraData. Retrieved September 30, 2022.
Internal MISP references
UUID 73ba4e07-cfbd-4b23-b52a-1ebbd7cc0fe4
which can be used as unique global reference for Microsoft Learn
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-09-30T00:00:00Z |
date_published | 2021-04-06T00:00:00Z |
source | MITRE |
title | 2.5 ExtraData |
Hybrid Analysis Icacls2 May 2018
Hybrid Analysis. (2018, May 30). 2a8efbfadd798f6111340f7c1c956bee.dll. Retrieved August 19, 2018.
Internal MISP references
UUID 5d33fcb4-0f01-4b88-b1ee-dad6dcc867f4
which can be used as unique global reference for Hybrid Analysis Icacls2 May 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-08-19T00:00:00Z |
date_published | 2018-05-30T00:00:00Z |
source | MITRE |
title | 2a8efbfadd798f6111340f7c1c956bee.dll |
Bleeping Computer 2easy 2021
Bill Toulas. (2021, December 21). 2easy now a significant dark web marketplace for stolen data. Retrieved October 7, 2024.
Internal MISP references
UUID 23ebd169-3ac6-5074-a238-a8e7d96f48ab
which can be used as unique global reference for Bleeping Computer 2easy 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-10-07T00:00:00Z |
date_published | 2021-12-21T00:00:00Z |
source | MITRE |
title | 2easy now a significant dark web marketplace for stolen data |
Microsoft Wow6432Node 2018
Microsoft. (2018, May 31). 32-bit and 64-bit Application Data in the Registry. Retrieved August 3, 2020.
Internal MISP references
UUID cbc14af8-f0d9-46c9-ae2c-d93d706ac84e
which can be used as unique global reference for Microsoft Wow6432Node 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-08-03T00:00:00Z |
date_published | 2018-05-31T00:00:00Z |
source | MITRE |
title | 32-bit and 64-bit Application Data in the Registry |
DOJ-DPRK Heist
Department of Justice. (2021). 3 North Korean Military Hackers Indicted in Wide-Ranging Scheme to Commit Cyber-attacks and Financial Crimes Across the Globe. Retrieved August 18, 2023.
Internal MISP references
UUID c50d2a5b-1d44-5f18-aaff-4be9f6d3f3ac
which can be used as unique global reference for DOJ-DPRK Heist
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-08-18T00:00:00Z |
date_published | 2021-01-01T00:00:00Z |
source | MITRE |
title | 3 North Korean Military Hackers Indicted in Wide-Ranging Scheme to Commit Cyber-attacks and Financial Crimes Across the Globe |
ITWorld Hard Disk Health Dec 2014
Pinola, M. (2014, December 14). 3 tools to check your hard drive's health and make sure it's not already dying on you. Retrieved October 2, 2018.
Internal MISP references
UUID e48fab76-7e38-420e-b69b-709f37bde847
which can be used as unique global reference for ITWorld Hard Disk Health Dec 2014
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-10-02T00:00:00Z |
date_published | 2014-12-14T00:00:00Z |
source | MITRE |
title | 3 tools to check your hard drive's health and make sure it's not already dying on you |
Microsoft 4657 APR 2017
Miroshnikov, A. & Hall, J. (2017, April 18). 4657(S): A registry value was modified. Retrieved August 9, 2018.
Internal MISP references
UUID ee681893-edd6-46c7-bb11-38fc24eef899
which can be used as unique global reference for Microsoft 4657 APR 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-08-09T00:00:00Z |
date_published | 2017-04-18T00:00:00Z |
source | MITRE |
title | 4657(S): A registry value was modified |
Microsoft 4697 APR 2017
Miroshnikov, A. & Hall, J. (2017, April 18). 4697(S): A service was installed in the system. Retrieved August 7, 2018.
Internal MISP references
UUID 17473dc7-39cd-4c90-85cb-05d4c1364fff
which can be used as unique global reference for Microsoft 4697 APR 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-08-07T00:00:00Z |
date_published | 2017-04-18T00:00:00Z |
source | MITRE |
title | 4697(S): A service was installed in the system |
Microsoft User Creation Event
Lich, B., Miroshnikov, A. (2017, April 5). 4720(S): A user account was created. Retrieved June 30, 2017.
Internal MISP references
UUID 01e2068b-83bc-4479-8fc9-dfaafdbf272b
which can be used as unique global reference for Microsoft User Creation Event
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-06-30T00:00:00Z |
date_published | 2017-04-05T00:00:00Z |
source | MITRE |
title | 4720(S): A user account was created |
Microsoft User Modified Event
Lich, B., Miroshnikov, A. (2017, April 5). 4738(S): A user account was changed. Retrieved June 30, 2017.
Internal MISP references
UUID fb4164f9-1e03-43f1-8143-179c9f08dff2
which can be used as unique global reference for Microsoft User Modified Event
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-06-30T00:00:00Z |
date_published | 2017-04-05T00:00:00Z |
source | MITRE |
title | 4738(S): A user account was changed |
Microsoft 4768 TGT 2017
Microsoft. (2017, April 19). 4768(S, F): A Kerberos authentication ticket (TGT) was requested. Retrieved August 24, 2020.
Internal MISP references
UUID 19237af4-e535-4059-a8a9-63280cdf4722
which can be used as unique global reference for Microsoft 4768 TGT 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-08-24T00:00:00Z |
date_published | 2017-04-19T00:00:00Z |
source | MITRE |
title | 4768(S, F): A Kerberos authentication ticket (TGT) was requested |
HIPAA Journal S3 Breach, 2017
HIPAA Journal. (2017, October 11). 47GB of Medical Records and Test Results Found in Unsecured Amazon S3 Bucket. Retrieved October 4, 2019.
Internal MISP references
UUID b0fbf593-4aeb-4167-814b-ed3d4479ded0
which can be used as unique global reference for HIPAA Journal S3 Breach, 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-10-04T00:00:00Z |
date_published | 2017-10-11T00:00:00Z |
source | MITRE |
title | 47GB of Medical Records and Test Results Found in Unsecured Amazon S3 Bucket |
Slack Security Risks
Michael Osakwe. (2020, November 18). 4 SaaS and Slack Security Risks to Consider. Retrieved March 17, 2023.
Internal MISP references
UUID 4332430a-0dec-5942-88ce-21f6d02cc9a9
which can be used as unique global reference for Slack Security Risks
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-17T00:00:00Z |
date_published | 2020-11-18T00:00:00Z |
source | MITRE |
title | 4 SaaS and Slack Security Risks to Consider |
PurpleSec Data Loss Prevention
Michael Swanagan. (2020, October 24). 7 Data Loss Prevention Best Practices & Strategies. Retrieved August 30, 2021.
Internal MISP references
UUID b7d786db-c50e-4d1f-947e-205e8eefa2da
which can be used as unique global reference for PurpleSec Data Loss Prevention
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-08-30T00:00:00Z |
date_published | 2020-10-24T00:00:00Z |
source | MITRE |
title | 7 Data Loss Prevention Best Practices & Strategies |
7zip Homepage
I. Pavlov. (2019). 7-Zip. Retrieved February 20, 2020.
Internal MISP references
UUID fc1396d2-1ffd-4fd9-ba60-3f6e0a9dfffb
which can be used as unique global reference for 7zip Homepage
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-02-20T00:00:00Z |
date_published | 2019-01-01T00:00:00Z |
source | MITRE |
title | 7-Zip |
VMWare 8Base June 28 2023
Deborah Snyder, Fae Carlisle, Dana Behling, Bria Beathley. (2023, June 28). 8Base Ransomware: A Heavy Hitting Player. Retrieved August 4, 2023.
Internal MISP references
UUID 573e9520-6181-4535-9ed3-2338688a8e9f
which can be used as unique global reference for VMWare 8Base June 28 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-08-04T00:00:00Z |
date_published | 2023-06-28T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | 8Base Ransomware: A Heavy Hitting Player |
Acronis 8Base July 17 2023
Acronis Security Team. (2023, July 17). 8Base ransomware stays unseen for a year. Retrieved August 4, 2023.
Internal MISP references
UUID c9822477-1578-4068-9882-41e4d6eaee3f
which can be used as unique global reference for Acronis 8Base July 17 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-08-04T00:00:00Z |
date_published | 2023-07-17T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | 8Base ransomware stays unseen for a year |
MicroFocus 9002 Aug 2016
Petrovsky, O. (2016, August 30). “9002 RAT” -- a second building on the left. Retrieved February 20, 2018.
Internal MISP references
UUID a4d6bdd1-e70c-491b-a569-72708095c809
which can be used as unique global reference for MicroFocus 9002 Aug 2016
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-02-20T00:00:00Z |
date_published | 2016-08-30T00:00:00Z |
source | MITRE |
title | “9002 RAT” -- a second building on the left |
CISA AA21-200A APT40 July 2021
CISA. (2021, July 19). (AA21-200A) Joint Cybersecurity Advisory – Tactics, Techniques, and Procedures of Indicted APT40 Actors Associated with China’s MSS Hainan State Security Department. Retrieved August 12, 2021.
Internal MISP references
UUID 3a2dbd8b-54e3-406a-b77c-b6fae5541b6d
which can be used as unique global reference for CISA AA21-200A APT40 July 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-08-12T00:00:00Z |
date_published | 2021-07-19T00:00:00Z |
source | MITRE, Tidal Cyber |
title | (AA21-200A) Joint Cybersecurity Advisory – Tactics, Techniques, and Procedures of Indicted APT40 Actors Associated with China’s MSS Hainan State Security Department |
CISA Iran Albanian Attacks September 2022
CISA. (2022, September 23). AA22-264A Iranian State Actors Conduct Cyber Operations Against the Government of Albania. Retrieved August 6, 2024.
Internal MISP references
UUID c5d37bde-52bc-525a-b25a-e097f77a924a
which can be used as unique global reference for CISA Iran Albanian Attacks September 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-08-06T00:00:00Z |
date_published | 2022-09-23T00:00:00Z |
source | MITRE |
title | AA22-264A Iranian State Actors Conduct Cyber Operations Against the Government of Albania |
AADInternals
Dr. Nestori Syynimaa. (2018, October 25). AADInternals. Retrieved February 1, 2022.
Internal MISP references
UUID d6faadde-690d-44d1-b1aa-0991a5374604
which can be used as unique global reference for AADInternals
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-02-01T00:00:00Z |
date_published | 2018-10-25T00:00:00Z |
source | MITRE |
title | AADInternals |
AADInternals Documentation
Dr. Nestori Syynimaa. (2018, October 25). AADInternals. Retrieved February 18, 2022.
Internal MISP references
UUID 320231a1-4dbe-4eaa-b14d-48de738ba697
which can be used as unique global reference for AADInternals Documentation
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-02-18T00:00:00Z |
date_published | 2018-10-25T00:00:00Z |
source | MITRE |
title | AADInternals Documentation |
AADInternals Github
Dr. Nestori Syynimaa. (2021, December 13). AADInternals. Retrieved February 1, 2022.
Internal MISP references
UUID 643d3947-c0ec-47c4-bb58-5e546084433c
which can be used as unique global reference for AADInternals Github
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-02-01T00:00:00Z |
date_published | 2021-12-13T00:00:00Z |
source | MITRE |
title | AADInternals Github |
Gigamon BADHATCH Jul 2019
Savelesky, K., et al. (2019, July 23). ABADBABE 8BADFOOD: Discovering BADHATCH and a Detailed Look at FIN8's Tooling. Retrieved September 8, 2021.
Internal MISP references
UUID 69a45479-e982-58ee-9e2d-caaf825f0ad4
which can be used as unique global reference for Gigamon BADHATCH Jul 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-08T00:00:00Z |
date_published | 2019-07-23T00:00:00Z |
source | MITRE |
title | ABADBABE 8BADFOOD: Discovering BADHATCH and a Detailed Look at FIN8's Tooling |
bad_luck_blackcat
Kaspersky Global Research & Analysis Team (GReAT). (2022). A Bad Luck BlackCat. Retrieved May 5, 2022.
Internal MISP references
UUID 0d1e9635-b7b6-454b-9482-b1fc7d33bfff
which can be used as unique global reference for bad_luck_blackcat
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-05-05T00:00:00Z |
date_published | 2022-01-01T00:00:00Z |
source | MITRE |
title | A Bad Luck BlackCat |
Cybereason Bazar July 2020
Cybereason Nocturnus. (2020, July 16). A BAZAR OF TRICKS: FOLLOWING TEAM9’S DEVELOPMENT CYCLES. Retrieved November 18, 2020.
Internal MISP references
UUID 8819875a-5139-4dae-94c8-e7cc9f847580
which can be used as unique global reference for Cybereason Bazar July 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-11-18T00:00:00Z |
date_published | 2020-07-16T00:00:00Z |
source | MITRE |
title | A BAZAR OF TRICKS: FOLLOWING TEAM9’S DEVELOPMENT CYCLES |
Red Canary Hospital Thwarted Ryuk October 2020
Brian Donohue, Katie Nickels, Paul Michaud, Adina Bodkins, Taylor Chapman, Tony Lambert, Jeff Felling, Kyle Rainey, Mike Haag, Matt Graeber, Aaron Didier.. (2020, October 29). A Bazar start: How one hospital thwarted a Ryuk ransomware outbreak. Retrieved October 30, 2020.
Internal MISP references
UUID ae5d4c47-54c9-4f7b-9357-88036c524217
which can be used as unique global reference for Red Canary Hospital Thwarted Ryuk October 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-30T00:00:00Z |
date_published | 2020-10-29T00:00:00Z |
source | MITRE |
title | A Bazar start: How one hospital thwarted a Ryuk ransomware outbreak |
CyberCX Anonymous Sudan June 19 2023
CyberCX Intelligence. (2023, June 19). A bear in wolf’s clothing: Insights into the infrastructure used by Anonymous Sudan to attack Australian organisations. Retrieved October 10, 2023.
Internal MISP references
UUID 68ded9b7-3042-44e0-8bf7-cdba2174a3d8
which can be used as unique global reference for CyberCX Anonymous Sudan June 19 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-10-10T00:00:00Z |
date_published | 2023-06-19T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | A bear in wolf’s clothing: Insights into the infrastructure used by Anonymous Sudan to attack Australian organisations |
Netskope Cloud Phishing
Ashwin Vamshi. (2020, August 12). A Big Catch: Cloud Phishing from Google App Engine and Azure App Service. Retrieved August 18, 2022.
Internal MISP references
UUID 25d46bc1-4c05-48d3-95f0-aa3ee1100bf9
which can be used as unique global reference for Netskope Cloud Phishing
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-08-18T00:00:00Z |
date_published | 2020-08-12T00:00:00Z |
source | MITRE |
title | A Big Catch: Cloud Phishing from Google App Engine and Azure App Service |
Elastic Abnormal Process ID or Lock File Created
Elastic. (n.d.). Abnormal Process ID or Lock File Created. Retrieved September 19, 2024.
Internal MISP references
UUID 99091ea0-35b3-590d-bd6c-0cc20b6be8f9
which can be used as unique global reference for Elastic Abnormal Process ID or Lock File Created
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-19T00:00:00Z |
source | MITRE |
title | Abnormal Process ID or Lock File Created |
Microsoft O365 Admin Roles
Ako-Adjei, K., Dickhaus, M., Baumgartner, P., Faigel, D., et. al.. (2019, October 8). About admin roles. Retrieved October 18, 2019.
Internal MISP references
UUID 8014a0cc-f793-4d9a-a2cc-ef9e9c5a826a
which can be used as unique global reference for Microsoft O365 Admin Roles
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-10-18T00:00:00Z |
date_published | 2019-10-08T00:00:00Z |
source | MITRE |
title | About admin roles |
Microsoft Atom Table
Microsoft. (n.d.). About Atom Tables. Retrieved December 8, 2017.
Internal MISP references
UUID a22636c8-8e39-4583-93ef-f0b7f0a218d8
which can be used as unique global reference for Microsoft Atom Table
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-08T00:00:00Z |
source | MITRE |
title | About Atom Tables |
Microsoft About BITS
Microsoft. (2019, July 12). About BITS. Retrieved March 16, 2020.
Internal MISP references
UUID 8d6d47d1-a6ea-4673-8ade-ba61bfeef084
which can be used as unique global reference for Microsoft About BITS
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-03-16T00:00:00Z |
date_published | 2019-07-12T00:00:00Z |
source | MITRE |
title | About BITS |
Microsoft About Event Tracing 2018
Microsoft. (2018, May 30). About Event Tracing. Retrieved June 7, 2019.
Internal MISP references
UUID 689d944f-ad66-4908-91fb-bb1ecdafe8d9
which can be used as unique global reference for Microsoft About Event Tracing 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-06-07T00:00:00Z |
date_published | 2018-05-30T00:00:00Z |
source | MITRE |
title | About Event Tracing |
Microsoft PowerShell Command History
Microsoft. (2020, May 13). About History. Retrieved September 4, 2020.
Internal MISP references
UUID 6c873fb4-db43-4bad-b5e4-a7d45cbe796f
which can be used as unique global reference for Microsoft PowerShell Command History
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-09-04T00:00:00Z |
date_published | 2020-05-13T00:00:00Z |
source | MITRE |
title | About History |
Microsoft List View Controls
Microsoft. (2021, May 25). About List-View Controls. Retrieved January 4, 2022.
Internal MISP references
UUID 7d6c6ba6-cda6-4f27-bfc8-af5b759305ed
which can be used as unique global reference for Microsoft List View Controls
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-01-04T00:00:00Z |
date_published | 2021-05-25T00:00:00Z |
source | MITRE |
title | About List-View Controls |
Microsoft PowerShell Logging
Microsoft. (2020, March 30). about_Logging_Windows. Retrieved September 28, 2021.
Internal MISP references
UUID 81c94686-741d-45d7-90f3-0c7979374e87
which can be used as unique global reference for Microsoft PowerShell Logging
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-28T00:00:00Z |
date_published | 2020-03-30T00:00:00Z |
source | MITRE |
title | about_Logging_Windows |
Apple About Mac Scripting 2016
Apple. (2016, June 13). About Mac Scripting. Retrieved April 14, 2021.
Internal MISP references
UUID d2f32ac1-9b5b-408d-a7ab-d92dd9efe0ed
which can be used as unique global reference for Apple About Mac Scripting 2016
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-04-14T00:00:00Z |
date_published | 2016-06-13T00:00:00Z |
source | MITRE |
title | About Mac Scripting |
PowerShell About 2019
Wheeler, S. et al.. (2019, May 1). About PowerShell.exe. Retrieved October 11, 2019.
Internal MISP references
UUID 2c504602-4f5d-47fc-9780-e1e5041a0b3a
which can be used as unique global reference for PowerShell About 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-10-11T00:00:00Z |
date_published | 2019-05-01T00:00:00Z |
source | MITRE |
title | About PowerShell.exe |
Microsoft PowerShellB64
Microsoft. (2023, February 8). about_PowerShell_exe: EncodedCommand. Retrieved March 17, 2023.
Internal MISP references
UUID 7e50721c-c6d5-5449-8326-529da4cf5465
which can be used as unique global reference for Microsoft PowerShellB64
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-17T00:00:00Z |
date_published | 2023-02-08T00:00:00Z |
source | MITRE |
title | about_PowerShell_exe: EncodedCommand |
Microsoft Profiles
Microsoft. (2021, September 27). about_Profiles. Retrieved February 4, 2022.
Internal MISP references
UUID b25ab0bf-c28b-4747-b075-30bcdfbc0e35
which can be used as unique global reference for Microsoft Profiles
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-02-04T00:00:00Z |
date_published | 2021-09-27T00:00:00Z |
source | MITRE |
title | about_Profiles |
Microsoft About Profiles
Microsoft. (2017, November 29). About Profiles. Retrieved June 14, 2019.
Internal MISP references
UUID 1da63665-7a96-4bc3-9606-a3575b913819
which can be used as unique global reference for Microsoft About Profiles
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-06-14T00:00:00Z |
date_published | 2017-11-29T00:00:00Z |
source | MITRE |
title | About Profiles |
Microsoft Remote Desktop Services
Microsoft. (2019, August 23). About Remote Desktop Services. Retrieved March 28, 2022.
Internal MISP references
UUID a981e013-f839-46e9-9c8a-128c4897f77a
which can be used as unique global reference for Microsoft Remote Desktop Services
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-03-28T00:00:00Z |
date_published | 2019-08-23T00:00:00Z |
source | MITRE |
title | About Remote Desktop Services |
systemsetup mac time
Apple Support. (n.d.). About systemsetup in Remote Desktop. Retrieved March 27, 2024.
Internal MISP references
UUID a85bd111-a2ca-5e66-b90e-f52ff780fc5c
which can be used as unique global reference for systemsetup mac time
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-27T00:00:00Z |
source | MITRE |
title | About systemsetup in Remote Desktop |
MSDN Clipboard
Microsoft. (n.d.). About the Clipboard. Retrieved March 29, 2016.
Internal MISP references
UUID 2c1b2d58-a5dc-4aee-8bdb-129a81c10408
which can be used as unique global reference for MSDN Clipboard
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-03-29T00:00:00Z |
source | MITRE |
title | About the Clipboard |
Microsoft HTML Help Executable Program
Microsoft. (n.d.). About the HTML Help Executable Program. Retrieved October 3, 2018.
Internal MISP references
UUID 1af226cc-bb93-43c8-972e-367482c5d487
which can be used as unique global reference for Microsoft HTML Help Executable Program
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-10-03T00:00:00Z |
source | MITRE |
title | About the HTML Help Executable Program |
About UEFI
UEFI Forum. (n.d.). About UEFI Forum. Retrieved January 5, 2016.
Internal MISP references
UUID 2e6fe82c-d90f-42b6-8247-397ab8823c7c
which can be used as unique global reference for About UEFI
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-01-05T00:00:00Z |
source | MITRE |
title | About UEFI Forum |
Microsoft Window Classes
Microsoft. (n.d.). About Window Classes. Retrieved December 16, 2017.
Internal MISP references
UUID cc620fcd-1f4a-4670-84b5-3f12c9b85053
which can be used as unique global reference for Microsoft Window Classes
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-16T00:00:00Z |
source | MITRE |
title | About Window Classes |
Picus Sodinokibi January 2020
Ozarslan, S. (2020, January 15). A Brief History of Sodinokibi. Retrieved August 5, 2020.
Internal MISP references
UUID 2e9c2206-a04e-4278-9492-830cc9347ff9
which can be used as unique global reference for Picus Sodinokibi January 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-08-05T00:00:00Z |
date_published | 2020-01-15T00:00:00Z |
source | MITRE |
title | A Brief History of Sodinokibi |
Application Bundle Manipulation Brandon Dalton
Brandon Dalton. (2022, August 9). A bundle of nerves: Tweaking macOS security controls to thwart application bundle manipulation. Retrieved September 27, 2022.
Internal MISP references
UUID 2a8fd573-6ab0-403b-b813-88d9d3edab36
which can be used as unique global reference for Application Bundle Manipulation Brandon Dalton
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-09-27T00:00:00Z |
date_published | 2022-08-09T00:00:00Z |
source | MITRE |
title | A bundle of nerves: Tweaking macOS security controls to thwart application bundle manipulation |
NCC Group Chimera January 2021
Jansen, W . (2021, January 12). Abusing cloud services to fly under the radar. Retrieved September 12, 2024.
Internal MISP references
UUID 70c217c3-83a2-40f2-8f47-b68d8bd4cdf0
which can be used as unique global reference for NCC Group Chimera January 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-12T00:00:00Z |
date_published | 2021-01-12T00:00:00Z |
source | MITRE |
title | Abusing cloud services to fly under the radar |
Electron 2
Trend Micro. (2023, June 6). Abusing Electronbased applications in targeted attacks. Retrieved March 7, 2024.
Internal MISP references
UUID 0be977fd-7b7e-5ddb-aa0c-def81b97b2a5
which can be used as unique global reference for Electron 2
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-07T00:00:00Z |
date_published | 2023-06-06T00:00:00Z |
source | MITRE |
title | Abusing Electronbased applications in targeted attacks |
Harmj0y Abusing GPO Permissions
Schroeder, W. (2016, March 17). Abusing GPO Permissions. Retrieved September 23, 2024.
Internal MISP references
UUID 18cc9426-9b51-46fa-9106-99688385ebe4
which can be used as unique global reference for Harmj0y Abusing GPO Permissions
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-23T00:00:00Z |
date_published | 2016-03-17T00:00:00Z |
source | MITRE |
title | Abusing GPO Permissions |
on security kerberos linux
Boal, Calum. (2020, January 28). Abusing Kerberos From Linux - An Overview of Available Tools. Retrieved September 17, 2024.
Internal MISP references
UUID 7d0870a0-db94-5213-a1b7-fc3c6557dcc0
which can be used as unique global reference for on security kerberos linux
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-17T00:00:00Z |
date_published | 2020-01-28T00:00:00Z |
source | MITRE |
title | Abusing Kerberos From Linux - An Overview of Available Tools |
Retwin Directory Share Pivot
Routin, D. (2017, November 13). Abusing network shares for efficient lateral movements and privesc (DirSharePivot). Retrieved April 12, 2018.
Internal MISP references
UUID 027c5274-6b61-447a-9058-edb844f112dd
which can be used as unique global reference for Retwin Directory Share Pivot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-04-12T00:00:00Z |
date_published | 2017-11-13T00:00:00Z |
source | MITRE |
title | Abusing network shares for efficient lateral movements and privesc (DirSharePivot) |
BOHOPS Abusing the COM Registry
BOHOPS. (2018, August 18). Abusing the COM Registry Structure (Part 2): Hijacking & Loading Techniques. Retrieved August 10, 2020.
Internal MISP references
UUID 3b5c0e62-7ac9-42e1-b2dd-8f2e0739b9d7
which can be used as unique global reference for BOHOPS Abusing the COM Registry
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-08-10T00:00:00Z |
date_published | 2018-08-18T00:00:00Z |
source | MITRE |
title | Abusing the COM Registry Structure (Part 2): Hijacking & Loading Techniques |
abusing_com_reg
bohops. (2018, August 18). ABUSING THE COM REGISTRY STRUCTURE (PART 2): HIJACKING & LOADING TECHNIQUES. Retrieved September 20, 2021.
Internal MISP references
UUID 7f0f223f-09b1-4f8f-b6f1-1044e2ac7066
which can be used as unique global reference for abusing_com_reg
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-20T00:00:00Z |
date_published | 2018-08-18T00:00:00Z |
source | MITRE |
title | ABUSING THE COM REGISTRY STRUCTURE (PART 2): HIJACKING & LOADING TECHNIQUES |
Rhino Security Labs AWS VPC Traffic Mirroring
Spencer Gietzen. (2019, September 17). Abusing VPC Traffic Mirroring in AWS. Retrieved March 17, 2022.
Internal MISP references
UUID 09cac813-862c-47c8-a47f-154c5436afbb
which can be used as unique global reference for Rhino Security Labs AWS VPC Traffic Mirroring
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-03-17T00:00:00Z |
date_published | 2019-09-17T00:00:00Z |
source | MITRE |
title | Abusing VPC Traffic Mirroring in AWS |
Narrator Accessibility Abuse
Comi, G. (2019, October 19). Abusing Windows 10 Narrator's 'Feedback-Hub' URI for Fileless Persistence. Retrieved April 28, 2020.
Internal MISP references
UUID fc889ba3-79a5-445a-81ea-dfe81c1cc542
which can be used as unique global reference for Narrator Accessibility Abuse
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-04-28T00:00:00Z |
date_published | 2019-10-19T00:00:00Z |
source | MITRE |
title | Abusing Windows 10 Narrator's 'Feedback-Hub' URI for Fileless Persistence |
Intezer ACBackdoor
Sanmillan, I. (2019, November 18). ACBackdoor: Analysis of a New Multiplatform Backdoor. Retrieved October 4, 2021.
Internal MISP references
UUID e6cb833f-cf18-498b-a233-848853423412
which can be used as unique global reference for Intezer ACBackdoor
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-04T00:00:00Z |
date_published | 2019-11-18T00:00:00Z |
source | MITRE |
title | ACBackdoor: Analysis of a New Multiplatform Backdoor |
AccCheckConsole.exe - LOLBAS Project
LOLBAS. (2022, January 2). AccCheckConsole.exe. Retrieved December 4, 2023.
Internal MISP references
UUID de5523bd-e735-4751-84e9-a1be1d2980ec
which can be used as unique global reference for AccCheckConsole.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2022-01-02T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | AccCheckConsole.exe |
CyberScoop APT28 Nov 2018
Shoorbajee, Z. (2018, November 29). Accenture: Russian hackers using Brexit talks to disguise phishing lures. Retrieved July 16, 2019.
Internal MISP references
UUID ef8f0990-b2da-4538-8b02-7401dc5a4120
which can be used as unique global reference for CyberScoop APT28 Nov 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-07-16T00:00:00Z |
date_published | 2018-11-29T00:00:00Z |
source | MITRE |
title | Accenture: Russian hackers using Brexit talks to disguise phishing lures |
Microsoft Azure Kubernetes Service Service Accounts
Microsoft Azure. (2023, April 28). Access and identity options for Azure Kubernetes Service (AKS). Retrieved July 14, 2023.
Internal MISP references
UUID bf374b41-b2a3-5c07-bf84-9ea0e1a9e6c5
which can be used as unique global reference for Microsoft Azure Kubernetes Service Service Accounts
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-07-14T00:00:00Z |
date_published | 2023-04-28T00:00:00Z |
source | MITRE |
title | Access and identity options for Azure Kubernetes Service (AKS) |
CrowdStrike Access Brokers
CrowdStrike Intelligence Team. (2022, February 23). Access Brokers: Who Are the Targets, and What Are They Worth?. Retrieved March 10, 2023.
Internal MISP references
UUID 0f772693-e09d-5c82-85c2-77f5fee39ef0
which can be used as unique global reference for CrowdStrike Access Brokers
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-10T00:00:00Z |
date_published | 2022-02-23T00:00:00Z |
source | MITRE |
title | Access Brokers: Who Are the Targets, and What Are They Worth? |
Microsoft Access Control Lists May 2018
M. Satran, M. Jacobs. (2018, May 30). Access Control Lists. Retrieved February 4, 2020.
Internal MISP references
UUID 2aeda95a-7741-4a74-a5a4-29a9e7a89451
which can be used as unique global reference for Microsoft Access Control Lists May 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-02-04T00:00:00Z |
date_published | 2018-05-30T00:00:00Z |
source | MITRE |
title | Access Control Lists |
Auth0 Access Tokens
Auth0. (n.d.). Access Tokens. Retrieved September 29, 2021.
Internal MISP references
UUID 43e8e178-a0da-44d8-be1b-853307e0d4ae
which can be used as unique global reference for Auth0 Access Tokens
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-29T00:00:00Z |
source | MITRE |
title | Access Tokens |
BSidesSLC 2020 - LNK Elastic
French, D., Filar, B.. (2020, March 21). A Chain Is No Stronger Than Its Weakest LNK. Retrieved November 30, 2020.
Internal MISP references
UUID 4c2ede51-33f6-4d09-9186-43b023b079c0
which can be used as unique global reference for BSidesSLC 2020 - LNK Elastic
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-11-30T00:00:00Z |
date_published | 2020-03-21T00:00:00Z |
source | MITRE |
title | A Chain Is No Stronger Than Its Weakest LNK |
Mythic SpecterOps
Thomas, C. (2020, August 13). A Change of Mythic Proportions. Retrieved March 25, 2022.
Internal MISP references
UUID 98d4453e-2e80-422a-ac8c-47f650f46e3c
which can be used as unique global reference for Mythic SpecterOps
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-03-25T00:00:00Z |
date_published | 2020-08-13T00:00:00Z |
source | MITRE |
title | A Change of Mythic Proportions |
FireEye Chinese Espionage October 2019
Nalani Fraser, Kelli Vanderlee. (2019, October 10). Achievement Unlocked - Chinese Cyber Espionage Evolves to Support Higher Level Missions. Retrieved October 17, 2021.
Internal MISP references
UUID d37c069c-7fb8-44e1-8377-da97e8bbcf67
which can be used as unique global reference for FireEye Chinese Espionage October 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-17T00:00:00Z |
date_published | 2019-10-10T00:00:00Z |
source | MITRE, Tidal Cyber |
title | Achievement Unlocked - Chinese Cyber Espionage Evolves to Support Higher Level Missions |
Unit42 AcidBox June 2020
Reichel, D. and Idrizovic, E. (2020, June 17). AcidBox: Rare Malware Repurposing Turla Group Exploit Targeted Russian Organizations. Retrieved March 16, 2021.
Internal MISP references
UUID f3f2eca0-fda3-451e-bf13-aacb14668e48
which can be used as unique global reference for Unit42 AcidBox June 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-03-16T00:00:00Z |
date_published | 2020-06-17T00:00:00Z |
source | MITRE |
title | AcidBox: Rare Malware Repurposing Turla Group Exploit Targeted Russian Organizations |
AcidRain JAGS 2022
Juan Andres Guerrero-Saade and Max van Amerongen, SentinelOne. (2022, March 31). AcidRain | A Modem Wiper Rains Down on Europe. Retrieved March 25, 2024.
Internal MISP references
UUID bd4a7b2e-a387-5e1b-9d9e-52464a8e25c9
which can be used as unique global reference for AcidRain JAGS 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-25T00:00:00Z |
date_published | 2022-03-31T00:00:00Z |
source | MITRE |
title | AcidRain |
acroread package compromised Arch Linux Mail 8JUL2018
Eli Schwartz. (2018, June 8). acroread package compromised. Retrieved April 23, 2019.
Internal MISP references
UUID 99245022-2130-404d-bf7a-095d84a515cd
which can be used as unique global reference for acroread package compromised Arch Linux Mail 8JUL2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-04-23T00:00:00Z |
date_published | 2018-06-08T00:00:00Z |
source | MITRE |
title | acroread package compromised |
Microsoft Actinium February 2022
Microsoft Threat Intelligence Center. (2022, February 4). ACTINIUM targets Ukrainian organizations. Retrieved February 18, 2022.
Internal MISP references
UUID 5ab658db-7f71-4213-8146-e22da54160b3
which can be used as unique global reference for Microsoft Actinium February 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-02-18T00:00:00Z |
date_published | 2022-02-04T00:00:00Z |
source | MITRE |
title | ACTINIUM targets Ukrainian organizations |
Wikipedia Active Directory
Wikipedia. (2018, March 10). Active Directory. Retrieved April 11, 2018.
Internal MISP references
UUID 924e1186-57e5-43db-94ab-29afa3fdaa7b
which can be used as unique global reference for Wikipedia Active Directory
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-04-11T00:00:00Z |
date_published | 2018-03-10T00:00:00Z |
source | MITRE |
title | Active Directory |
Microsoft AD Accounts
Microsoft. (2019, August 23). Active Directory Accounts. Retrieved March 13, 2020.
Internal MISP references
UUID df734659-2441-487a-991d-59064c61b771
which can be used as unique global reference for Microsoft AD Accounts
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-03-13T00:00:00Z |
date_published | 2019-08-23T00:00:00Z |
source | MITRE |
title | Active Directory Accounts |
Microsoft AD Admin Tier Model
Microsoft. (2019, February 14). Active Directory administrative tier model. Retrieved February 21, 2020.
Internal MISP references
UUID 3afba81a-3b1d-41ec-938e-24f055698d52
which can be used as unique global reference for Microsoft AD Admin Tier Model
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-02-21T00:00:00Z |
date_published | 2019-02-14T00:00:00Z |
source | MITRE |
title | Active Directory administrative tier model |
Microsoft AD CS Overview
Microsoft. (2016, August 31). Active Directory Certificate Services Overview. Retrieved August 2, 2022.
Internal MISP references
UUID f1b2526a-1bf6-4954-a9b3-a5e008761ceb
which can be used as unique global reference for Microsoft AD CS Overview
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-08-02T00:00:00Z |
date_published | 2016-08-31T00:00:00Z |
source | MITRE |
title | Active Directory Certificate Services Overview |
Microsoft Get-ADUser
Microsoft. (n.d.). Active Directory Cmdlets - Get-ADUser. Retrieved November 30, 2017.
Internal MISP references
UUID b68ac85e-a007-4a72-9185-2877e9184fad
which can be used as unique global reference for Microsoft Get-ADUser
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-11-30T00:00:00Z |
source | MITRE |
title | Active Directory Cmdlets - Get-ADUser |
Active Directory Enumeration with LDIFDE
Microsoft. (2023, June 26). Active Directory Enumeration with LDIFDE. Retrieved July 11, 2023.
Internal MISP references
UUID 51e6623a-4448-4244-8c81-4eab102e5926
which can be used as unique global reference for Active Directory Enumeration with LDIFDE
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-07-11T00:00:00Z |
date_published | 2023-06-26T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Active Directory Enumeration with LDIFDE |
Microsoft SID-History Attribute
Microsoft. (n.d.). Active Directory Schema - SID-History attribute. Retrieved November 30, 2017.
Internal MISP references
UUID 32150673-5593-4a2c-9872-aaa96a21aa5c
which can be used as unique global reference for Microsoft SID-History Attribute
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-11-30T00:00:00Z |
source | MITRE |
title | Active Directory Schema - SID-History attribute |
Volexity Ivanti Zero-Day Exploitation January 2024
Meltzer, M. et al. (2024, January 10). Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN. Retrieved February 27, 2024.
Internal MISP references
UUID 93eda380-ea21-59e0-97e8-5bec1f9a0e71
which can be used as unique global reference for Volexity Ivanti Zero-Day Exploitation January 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-02-27T00:00:00Z |
date_published | 2024-01-10T00:00:00Z |
source | MITRE |
title | Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN |
ActiveMalwareEnergy
Dan Goodin. (2014, June 30). Active malware operation let attackers sabotage US energy industry. Retrieved March 9, 2017.
Internal MISP references
UUID f2ef73c6-5d4c-423e-a3f5-194cba121eb1
which can be used as unique global reference for ActiveMalwareEnergy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-03-09T00:00:00Z |
date_published | 2014-06-30T00:00:00Z |
source | MITRE |
title | Active malware operation let attackers sabotage US energy industry |
Klein Active Setup 2010
Klein, H. (2010, April 22). Active Setup Explained. Retrieved December 18, 2020.
Internal MISP references
UUID cbdd6290-1dda-48af-a101-fb3db6581276
which can be used as unique global reference for Klein Active Setup 2010
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-12-18T00:00:00Z |
date_published | 2010-04-22T00:00:00Z |
source | MITRE |
title | Active Setup Explained |
Dark Vortex Brute Ratel C4
Dark Vortex. (n.d.). A Customized Command and Control Center for Red Team and Adversary Simulation. Retrieved February 7, 2023.
Internal MISP references
UUID 47992cb5-df11-56c2-b266-6f58d75f8315
which can be used as unique global reference for Dark Vortex Brute Ratel C4
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-02-07T00:00:00Z |
source | MITRE |
title | A Customized Command and Control Center for Red Team and Adversary Simulation |
ad_blocker_with_miner
Kuzmenko, A.. (2021, March 10). Ad blocker with miner included. Retrieved October 28, 2021.
Internal MISP references
UUID 8e30f71e-80b8-4662-bc95-bf3cf7cfcf40
which can be used as unique global reference for ad_blocker_with_miner
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-28T00:00:00Z |
date_published | 2021-03-10T00:00:00Z |
source | MITRE |
title | Ad blocker with miner included |
Microsoft Support O365 Add Another Admin, October 2019
Microsoft. (n.d.). Add Another Admin. Retrieved October 18, 2019.
Internal MISP references
UUID c31cfc48-289e-42aa-8046-b41261fdeb96
which can be used as unique global reference for Microsoft Support O365 Add Another Admin, October 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-10-18T00:00:00Z |
source | MITRE |
title | Add Another Admin |
Amazon AWS IMDS V2
MacCarthaigh, C. (2019, November 19). Add defense in depth against open firewalls, reverse proxies, and SSRF vulnerabilities with enhancements to the EC2 Instance Metadata Service. Retrieved October 14, 2020.
Internal MISP references
UUID f252eb18-86e9-4ed0-b9da-2c81f12a6e13
which can be used as unique global reference for Amazon AWS IMDS V2
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-14T00:00:00Z |
date_published | 2019-11-19T00:00:00Z |
source | MITRE |
title | Add defense in depth against open firewalls, reverse proxies, and SSRF vulnerabilities with enhancements to the EC2 Instance Metadata Service |
Adding Login Items
Apple. (2016, September 13). Adding Login Items. Retrieved July 11, 2017.
Internal MISP references
UUID 5ab3e243-37a6-46f1-b28f-6846ecdef0ae
which can be used as unique global reference for Adding Login Items
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-07-11T00:00:00Z |
date_published | 2016-09-13T00:00:00Z |
source | MITRE |
title | Adding Login Items |
MRWLabs Office Persistence Add-ins
Knowles, W. (2017, April 21). Add-In Opportunities for Office Persistence. Retrieved July 3, 2017.
Internal MISP references
UUID a5b6ab63-0e6f-4789-a017-ceab1719ed85
which can be used as unique global reference for MRWLabs Office Persistence Add-ins
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-07-03T00:00:00Z |
date_published | 2017-04-21T00:00:00Z |
source | MITRE |
title | Add-In Opportunities for Office Persistence |
AddinUtil.exe - LOLBAS Project
LOLBAS. (2023, October 5). AddinUtil.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 91af546d-0a56-4c17-b292-6257943a8aba
which can be used as unique global reference for AddinUtil.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2023-10-05T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | AddinUtil.exe |
Microsoft - Add-MailboxPermission
Microsoft. (n.d.). Add-Mailbox Permission. Retrieved September 13, 2019.
Internal MISP references
UUID b8d40efb-c78d-47dd-9d83-e5a31af73691
which can be used as unique global reference for Microsoft - Add-MailboxPermission
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-09-13T00:00:00Z |
source | MITRE |
title | Add-Mailbox Permission |
AddMonitor
Microsoft. (n.d.). AddMonitor function. Retrieved November 12, 2014.
Internal MISP references
UUID 8c1a719e-6ca1-4b41-966d-ddb87c849fe0
which can be used as unique global reference for AddMonitor
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2014-11-12T00:00:00Z |
source | MITRE |
title | AddMonitor function |
Microsoft Azure AD Users
Microsoft. (2019, November 11). Add or delete users using Azure Active Directory. Retrieved January 30, 2020.
Internal MISP references
UUID b69468a2-693e-4bd0-8dc1-ccfd7d5630c0
which can be used as unique global reference for Microsoft Azure AD Users
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-01-30T00:00:00Z |
date_published | 2019-11-11T00:00:00Z |
source | MITRE |
title | Add or delete users using Azure Active Directory |
Microsoft Office Add-ins
Microsoft. (n.d.). Add or remove add-ins. Retrieved July 3, 2017.
Internal MISP references
UUID 99b20e30-76a8-4108-84ae-daf92058b44b
which can be used as unique global reference for Microsoft Office Add-ins
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-07-03T00:00:00Z |
source | MITRE |
title | Add or remove add-ins |
Microsoft AddPrintProcessor May 2018
Microsoft. (2018, May 31). AddPrintProcessor function. Retrieved October 5, 2020.
Internal MISP references
UUID 12c7160b-c93c-44cd-b108-68d4823aec8c
which can be used as unique global reference for Microsoft AddPrintProcessor May 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-05T00:00:00Z |
date_published | 2018-05-31T00:00:00Z |
source | MITRE |
title | AddPrintProcessor function |
RFC1918
IETF Network Working Group. (1996, February). Address Allocation for Private Internets. Retrieved October 20, 2020.
Internal MISP references
UUID f2cdf62e-cb9b-4a48-99a2-d46e7d9e7a9e
which can be used as unique global reference for RFC1918
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-20T00:00:00Z |
date_published | 1996-02-01T00:00:00Z |
source | MITRE |
title | Address Allocation for Private Internets |
Microsoft Exchange Address Lists
Microsoft. (2020, February 7). Address lists in Exchange Server. Retrieved March 26, 2020.
Internal MISP references
UUID 138ec24a-4361-4ce0-b78e-508c11db397c
which can be used as unique global reference for Microsoft Exchange Address Lists
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-03-26T00:00:00Z |
date_published | 2020-02-07T00:00:00Z |
source | MITRE |
title | Address lists in Exchange Server |
Microsoft AD DS Getting Started
Foulds, I. et al. (2018, August 7). AD DS Getting Started. Retrieved September 23, 2021.
Internal MISP references
UUID 82d01c77-571b-4f33-a286-878f325462ae
which can be used as unique global reference for Microsoft AD DS Getting Started
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-23T00:00:00Z |
date_published | 2018-08-07T00:00:00Z |
source | MITRE |
title | AD DS Getting Started |
Akamai DGA Mitigation
Liu, H. and Yuzifovich, Y. (2018, January 9). A Death Match of Domain Generation Algorithms. Retrieved February 18, 2019.
Internal MISP references
UUID 5b14cdf6-261a-4d7e-acb4-74e7fafa9467
which can be used as unique global reference for Akamai DGA Mitigation
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-02-18T00:00:00Z |
date_published | 2018-01-09T00:00:00Z |
source | MITRE |
title | A Death Match of Domain Generation Algorithms |
Keychain Decryption Passware
Yana Gourenko. (n.d.). A Deep Dive into Apple Keychain Decryption. Retrieved April 13, 2022.
Internal MISP references
UUID 6a426ab4-5b0b-46d4-9dfe-e2587f69e111
which can be used as unique global reference for Keychain Decryption Passware
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-04-13T00:00:00Z |
source | MITRE |
title | A Deep Dive into Apple Keychain Decryption |
Trend Micro Deep Dive Into Defacement
Marco Balduzzi, Ryan Flores, Lion Gu, Federico Maggi, Vincenzo Ciancaglini, Roel Reyes, Akira Urano. (n.d.). A Deep Dive into Defacement: How Geopolitical Events Trigger Web Attacks. Retrieved April 19, 2019.
Internal MISP references
UUID 4886418b-3a2e-4f12-b91e-3bb2a8134112
which can be used as unique global reference for Trend Micro Deep Dive Into Defacement
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-04-19T00:00:00Z |
source | MITRE |
title | A Deep Dive into Defacement: How Geopolitical Events Trigger Web Attacks |
Talos Lokibot Jan 2021
Muhammad, I., Unterbrink, H.. (2021, January 6). A Deep Dive into Lokibot Infection Chain. Retrieved August 31, 2021.
Internal MISP references
UUID 3baba4e6-0cf5-45eb-8abb-6c389743af89
which can be used as unique global reference for Talos Lokibot Jan 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-08-31T00:00:00Z |
date_published | 2021-01-06T00:00:00Z |
source | MITRE |
title | A Deep Dive into Lokibot Infection Chain |
Malwarebytes Saint Bot April 2021
Hasherezade. (2021, April 6). A deep dive into Saint Bot, a new downloader. Retrieved June 9, 2022.
Internal MISP references
UUID 3a1faa47-7bd3-453f-9b7a-bb17efb8bb3c
which can be used as unique global reference for Malwarebytes Saint Bot April 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-06-09T00:00:00Z |
date_published | 2021-04-06T00:00:00Z |
source | MITRE |
title | A deep dive into Saint Bot, a new downloader |
SecurityScorecard CredoMap September 2022
Vlad Pasca. (2022, September 27). A Deep Dive Into the APT28’s stealer called CredoMap. Retrieved December 5, 2023.
Internal MISP references
UUID 3e683efc-4712-4397-8d55-4354ff7ad9f0
which can be used as unique global reference for SecurityScorecard CredoMap September 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-05T00:00:00Z |
date_published | 2022-09-27T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | A Deep Dive Into the APT28’s stealer called CredoMap |
Krebs DNS Hijack 2019
Brian Krebs. (2019, February 18). A Deep Dive on the Recent Widespread DNS Hijacking Attacks. Retrieved February 14, 2022.
Internal MISP references
UUID 9bdc618d-ff55-4ac8-8967-6039c6c24cb1
which can be used as unique global reference for Krebs DNS Hijack 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-02-14T00:00:00Z |
date_published | 2019-02-18T00:00:00Z |
source | MITRE |
title | A Deep Dive on the Recent Widespread DNS Hijacking Attacks |
Reaqta MuddyWater November 2017
Reaqta. (2017, November 22). A dive into MuddyWater APT targeting Middle-East. Retrieved May 18, 2020.
Internal MISP references
UUID ecd28ccf-edb6-478d-a8f1-da630df42127
which can be used as unique global reference for Reaqta MuddyWater November 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-05-18T00:00:00Z |
date_published | 2017-11-22T00:00:00Z |
source | MITRE |
title | A dive into MuddyWater APT targeting Middle-East |
ESET Turla PowerShell May 2019
Faou, M. and Dumont R.. (2019, May 29). A dive into Turla PowerShell usage. Retrieved June 14, 2019.
Internal MISP references
UUID 68c0f34b-691a-4847-8d49-f18b7f4e5188
which can be used as unique global reference for ESET Turla PowerShell May 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-06-14T00:00:00Z |
date_published | 2019-05-29T00:00:00Z |
source | MITRE |
title | A dive into Turla PowerShell usage |
Kubernetes Admission Controllers
Kubernetes. (n.d.). Admission Controllers Reference. Retrieved March 8, 2023.
Internal MISP references
UUID ea035e41-159b-5f12-96fc-0638eace9fd2
which can be used as unique global reference for Kubernetes Admission Controllers
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-08T00:00:00Z |
source | MITRE |
title | Admission Controllers Reference |
Krebs Adobe
Brian Krebs. (2013, October 3). Adobe To Announce Source Code, Customer Data Breach. Retrieved May 17, 2021.
Internal MISP references
UUID bc2b0b89-e00d-4beb-bf27-fe81d8c826a4
which can be used as unique global reference for Krebs Adobe
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-05-17T00:00:00Z |
date_published | 2013-10-03T00:00:00Z |
source | MITRE |
title | Adobe To Announce Source Code, Customer Data Breach |
Github AD-Pentest-Script
Twi1ight. (2015, July 11). AD-Pentest-Script - wmiexec.vbs. Retrieved June 29, 2017.
Internal MISP references
UUID 45a5f6c2-b52e-4518-a10e-19797e6fdcc3
which can be used as unique global reference for Github AD-Pentest-Script
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-06-29T00:00:00Z |
date_published | 2015-07-11T00:00:00Z |
source | MITRE |
title | AD-Pentest-Script - wmiexec.vbs |
adplus.exe - LOLBAS Project
LOLBAS. (2021, September 1). adplus.exe. Retrieved December 4, 2023.
Internal MISP references
UUID d407ca0a-7ace-4dc5-947d-69a1e5a1d459
which can be used as unique global reference for adplus.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2021-09-01T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | adplus.exe |
Microsoft ADV170021 Dec 2017
Microsoft. (2017, December 12). ADV170021 - Microsoft Office Defense in Depth Update. Retrieved February 3, 2018.
Internal MISP references
UUID ce960e76-848f-440d-9843-54773f7b11cf
which can be used as unique global reference for Microsoft ADV170021 Dec 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-02-03T00:00:00Z |
date_published | 2017-12-12T00:00:00Z |
source | MITRE |
title | ADV170021 - Microsoft Office Defense in Depth Update |
CISA AA20-352A 2021
CISA. (2021, April 15). Advanced Persistent Threat Compromise of Government Agencies, Critical Infrastructure, and Private Sector Organizations. Retrieved August 30, 2024.
Internal MISP references
UUID 1e68b9ef-0aee-5d69-be72-3bc4d5cfa6b9
which can be used as unique global reference for CISA AA20-352A 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-08-30T00:00:00Z |
date_published | 2021-04-15T00:00:00Z |
source | MITRE |
title | Advanced Persistent Threat Compromise of Government Agencies, Critical Infrastructure, and Private Sector Organizations |
FireEye APT Groups
FireEye. (n.d.). Advanced Persistent Threat Groups. Retrieved August 3, 2018.
Internal MISP references
UUID 5b6b909d-870a-4d14-85ec-6aa14e598740
which can be used as unique global reference for FireEye APT Groups
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-08-03T00:00:00Z |
source | MITRE, Tidal Cyber |
title | Advanced Persistent Threat Groups |
Mandiant Advanced Persistent Threats
Mandiant. (n.d.). Advanced Persistent Threats (APTs). Retrieved February 14, 2024.
Internal MISP references
UUID 2d16615b-09fc-5925-8f59-6d20f334d236
which can be used as unique global reference for Mandiant Advanced Persistent Threats
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-02-14T00:00:00Z |
source | MITRE |
title | Advanced Persistent Threats (APTs) |
Mandiant APT Groups List
Mandiant. (n.d.). Advanced Persistent Threats (APTs). Retrieved September 14, 2023.
Internal MISP references
UUID c984fcfc-1bfd-4b1e-9034-a6ff3e6ebf97
which can be used as unique global reference for Mandiant APT Groups List
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-14T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Advanced Persistent Threats (APTs) |
Advanced_sec_audit_policy_settings
Simpson, D. et al. (2017, April 19). Advanced security audit policy settings. Retrieved September 14, 2021.
Internal MISP references
UUID 9aef57b1-1a2e-4833-815e-887616cc0570
which can be used as unique global reference for Advanced_sec_audit_policy_settings
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-14T00:00:00Z |
date_published | 2017-04-19T00:00:00Z |
source | MITRE |
title | Advanced security audit policy settings |
Adversaries Hijack DLLs
CrowdStrike, Falcon OverWatch Team. (2022, December 30). Retrieved October 19, 2023.
Internal MISP references
UUID 01836e53-4316-51a7-852c-01e585212276
which can be used as unique global reference for Adversaries Hijack DLLs
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-10-19T00:00:00Z |
source | MITRE |
title | Adversaries Hijack DLLs |
CrowdStrike Richochet Chollima September 2021
CrowdStrike. (2021, September 30). Adversary Profile - Ricochet Chollima. Retrieved September 30, 2021.
Internal MISP references
UUID 69a23467-c55c-43a3-951d-c208e6ead6f7
which can be used as unique global reference for CrowdStrike Richochet Chollima September 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-30T00:00:00Z |
date_published | 2021-09-30T00:00:00Z |
source | MITRE |
title | Adversary Profile - Ricochet Chollima |
Elastic - Hunting for Persistence Part 1
French, D., Murphy, B. (2020, March 24). Adversary tradecraft 101: Hunting for persistence using Elastic Security (Part 1). Retrieved December 21, 2020.
Internal MISP references
UUID bd9406d3-c3e3-4737-97a1-a4bc997c88cd
which can be used as unique global reference for Elastic - Hunting for Persistence Part 1
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-12-21T00:00:00Z |
date_published | 2020-03-24T00:00:00Z |
source | MITRE |
title | Adversary tradecraft 101: Hunting for persistence using Elastic Security (Part 1) |
NCSC APT29 July 2020
National Cyber Security Centre. (2020, July 16). Advisory: APT29 targets COVID-19 vaccine development. Retrieved September 29, 2020.
Internal MISP references
UUID 28da86a6-4ca1-4bb4-a401-d4aa469c0034
which can be used as unique global reference for NCSC APT29 July 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-09-29T00:00:00Z |
date_published | 2020-07-16T00:00:00Z |
source | MITRE |
title | Advisory: APT29 targets COVID-19 vaccine development |
Advpack.dll - LOLBAS Project
LOLBAS. (2018, May 25). Advpack.dll. Retrieved December 4, 2023.
Internal MISP references
UUID 837ccb3c-316d-4d96-8a33-b5df40870aba
which can be used as unique global reference for Advpack.dll - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2018-05-25T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Advpack.dll |
Kaspersky Adwind Feb 2016
Kamluk, V. & Gostev, A. (2016, February). Adwind - A Cross-Platform RAT. Retrieved April 23, 2019.
Internal MISP references
UUID 69fd8de4-81bc-4165-b77d-c5fc72cfa699
which can be used as unique global reference for Kaspersky Adwind Feb 2016
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-04-23T00:00:00Z |
date_published | 2016-02-01T00:00:00Z |
source | MITRE |
title | Adwind - A Cross-Platform RAT |
Bitdefender Trickbot VNC module Whitepaper 2021
Radu Tudorica. (2021, July 12). A Fresh Look at Trickbot’s Ever-Improving VNC Module. Retrieved September 28, 2021.
Internal MISP references
UUID ee2709d7-2b33-48ac-8e90-a2770d469d80
which can be used as unique global reference for Bitdefender Trickbot VNC module Whitepaper 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-28T00:00:00Z |
date_published | 2021-07-12T00:00:00Z |
source | MITRE |
title | A Fresh Look at Trickbot’s Ever-Improving VNC Module |
Mac Backdoors are back
Dan Goodin. (2016, July 6). After hiatus, in-the-wild Mac backdoors are suddenly back. Retrieved July 8, 2017.
Internal MISP references
UUID c37f00dc-ee53-4be1-9046-0a28bdc5649a
which can be used as unique global reference for Mac Backdoors are back
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-07-08T00:00:00Z |
date_published | 2016-07-06T00:00:00Z |
source | MITRE |
title | After hiatus, in-the-wild Mac backdoors are suddenly back |
SentinelOne January 30 2023
SentinelOne. (2023, January 30). Agenda (Qilin). Retrieved June 7, 2024.
Internal MISP references
UUID 290e84bc-7dae-46ec-81de-78c94b98e45b
which can be used as unique global reference for SentinelOne January 30 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-06-07T00:00:00Z |
date_published | 2023-01-30T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Agenda (Qilin) |
Trend Micro March 26 2024
Arianne Dela Cruz; Raymart Yambot; Raighen Sanchez; Darrel Tristan Virtusio Read time. (2024, March 26). Agenda Ransomware Propagates to vCenters and ESXi via Custom PowerShell Script. Retrieved April 5, 2024.
Internal MISP references
UUID d5634b8e-420a-4721-a3d2-19d9f36697f4
which can be used as unique global reference for Trend Micro March 26 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-04-05T00:00:00Z |
date_published | 2024-03-26T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Agenda Ransomware Propagates to vCenters and ESXi via Custom PowerShell Script |
Kaspersky MSSQL Aug 2019
Plakhov, A., Sitchikhin, D. (2019, August 22). Agent 1433: remote attack on Microsoft SQL Server. Retrieved September 4, 2019.
Internal MISP references
UUID 569a6be3-7a10-4aa4-be26-a62ed562a4ce
which can be used as unique global reference for Kaspersky MSSQL Aug 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-09-04T00:00:00Z |
date_published | 2019-08-22T00:00:00Z |
source | MITRE |
title | Agent 1433: remote attack on Microsoft SQL Server |
Securelist Agent.btz
Gostev, A.. (2014, March 12). Agent.btz: a Source of Inspiration?. Retrieved April 8, 2016.
Internal MISP references
UUID 3b876c56-1d18-49e3-9a96-5cee4af7ab72
which can be used as unique global reference for Securelist Agent.btz
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-04-08T00:00:00Z |
date_published | 2014-03-12T00:00:00Z |
source | MITRE |
title | Agent.btz: a Source of Inspiration? |
ThreatExpert Agent.btz
Shevchenko, S.. (2008, November 30). Agent.btz - A Threat That Hit Pentagon. Retrieved April 8, 2016.
Internal MISP references
UUID b710c404-b02e-444c-9388-9a5e751971d2
which can be used as unique global reference for ThreatExpert Agent.btz
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-04-08T00:00:00Z |
date_published | 2008-11-30T00:00:00Z |
source | MITRE |
title | Agent.btz - A Threat That Hit Pentagon |
AgentExecutor.exe - LOLBAS Project
LOLBAS. (2020, July 23). AgentExecutor.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 633d7f25-df9d-4619-9aa9-92d1d9d225d7
which can be used as unique global reference for AgentExecutor.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2020-07-23T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | AgentExecutor.exe |
SentinelLabs Agent Tesla Aug 2020
Walter, J. (2020, August 10). Agent Tesla | Old RAT Uses New Tricks to Stay on Top. Retrieved December 11, 2020.
Internal MISP references
UUID 5f712e3f-5a9d-4af3-b846-a61dc1d59b3a
which can be used as unique global reference for SentinelLabs Agent Tesla Aug 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-12-11T00:00:00Z |
date_published | 2020-08-10T00:00:00Z |
source | MITRE |
title | Agent Tesla |
LogPoint Agent Tesla March 23 2023
Anish Bogati. (2023, March 23). AgentTesla's Capabilities: A Review and Detection Strategies. Retrieved May 7, 2023.
Internal MISP references
UUID 28bfb97b-4b58-408a-bef9-9081f6ddedb8
which can be used as unique global reference for LogPoint Agent Tesla March 23 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-07T00:00:00Z |
date_published | 2023-03-23T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | AgentTesla's Capabilities: A Review and Detection Strategies |
Sekoia.io Blog September 9 2024
Sekoia TDR; Felix Aimé; Pierre-Antoine D; Charles M. (2024, September 9). A glimpse into the Quad7 operators' next moves and associated botnets. Retrieved September 11, 2024.
Internal MISP references
UUID eb4a1888-3b04-449b-9738-d96ae26adfee
which can be used as unique global reference for Sekoia.io Blog September 9 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-11T00:00:00Z |
date_published | 2024-09-09T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | A glimpse into the Quad7 operators' next moves and associated botnets |
ATT Sidewinder January 2021
Hegel, T. (2021, January 13). A Global Perspective of the SideWinder APT. Retrieved January 27, 2021.
Internal MISP references
UUID d6644f88-d727-4f62-897a-bfa18f86380d
which can be used as unique global reference for ATT Sidewinder January 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-01-27T00:00:00Z |
date_published | 2021-01-13T00:00:00Z |
source | MITRE, Tidal Cyber |
title | A Global Perspective of the SideWinder APT |
Unit42 Agrius 2023
Or Chechik, Tom Fakterman, Daniel Frank & Assaf Dahan. (2023, November 6). Agonizing Serpens (Aka Agrius) Targeting the Israeli Higher Education and Tech Sectors. Retrieved May 22, 2024.
Internal MISP references
UUID 70fb43bd-f8e1-56a5-a0e9-884e85f16b10
which can be used as unique global reference for Unit42 Agrius 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-05-22T00:00:00Z |
date_published | 2023-11-06T00:00:00Z |
source | MITRE |
title | Agonizing Serpens (Aka Agrius) Targeting the Israeli Higher Education and Tech Sectors |
CheckPoint Agrius 2023
Marc Salinas Fernandez & Jiri Vinopal. (2023, May 23). AGRIUS DEPLOYS MONEYBIRD IN TARGETED ATTACKS AGAINST ISRAELI ORGANIZATIONS. Retrieved May 21, 2024.
Internal MISP references
UUID b3034b5d-1fe5-5677-a2e8-9329141875d4
which can be used as unique global reference for CheckPoint Agrius 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-05-21T00:00:00Z |
date_published | 2023-05-23T00:00:00Z |
source | MITRE |
title | AGRIUS DEPLOYS MONEYBIRD IN TARGETED ATTACKS AGAINST ISRAELI ORGANIZATIONS |
Harmj0y Domain Trusts
Schroeder, W. (2017, October 30). A Guide to Attacking Domain Trusts. Retrieved February 14, 2019.
Internal MISP references
UUID 23a9ef6c-9f71-47bb-929f-9a92f24553eb
which can be used as unique global reference for Harmj0y Domain Trusts
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-02-14T00:00:00Z |
date_published | 2017-10-30T00:00:00Z |
source | MITRE |
title | A Guide to Attacking Domain Trusts |
airwalk backdoor unix systems
airwalk. (2023, January 1). A guide to backdooring Unix systems. Retrieved May 31, 2023.
Internal MISP references
UUID 3f3bca4a-68fa-5d4a-b86f-36f82345ff36
which can be used as unique global reference for airwalk backdoor unix systems
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-31T00:00:00Z |
date_published | 2023-01-01T00:00:00Z |
source | MITRE |
title | A guide to backdooring Unix systems |
Wired Lockergoga 2019
Greenberg, A. (2019, March 25). A Guide to LockerGoga, the Ransomware Crippling Industrial Firms. Retrieved July 17, 2019.
Internal MISP references
UUID de12f263-f76d-4b63-beb8-b210f7a8310d
which can be used as unique global reference for Wired Lockergoga 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-07-17T00:00:00Z |
date_published | 2019-03-25T00:00:00Z |
source | MITRE |
title | A Guide to LockerGoga, the Ransomware Crippling Industrial Firms |
ZDNET Selling Data
Cimpanu, C. (2020, May 9). A hacker group is selling more than 73 million user records on the dark web. Retrieved October 20, 2020.
Internal MISP references
UUID 61d00ae2-5494-4c6c-8860-6826e701ade8
which can be used as unique global reference for ZDNET Selling Data
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-20T00:00:00Z |
date_published | 2020-05-09T00:00:00Z |
source | MITRE |
title | A hacker group is selling more than 73 million user records on the dark web |
ESET Zebrocy May 2019
ESET Research. (2019, May 22). A journey to Zebrocy land. Retrieved June 20, 2019.
Internal MISP references
UUID f8b837fb-e46c-4153-8e86-dc4b909b393a
which can be used as unique global reference for ESET Zebrocy May 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-06-20T00:00:00Z |
date_published | 2019-05-22T00:00:00Z |
source | MITRE |
title | A journey to Zebrocy land |
Kersten Akira 2023
Max Kersten & Alexandre Mundo. (2023, November 29). Akira Ransomware. Retrieved April 4, 2024.
Internal MISP references
UUID df191993-a2cb-5d26-960c-11d1c6d3d73b
which can be used as unique global reference for Kersten Akira 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-04-04T00:00:00Z |
date_published | 2023-11-29T00:00:00Z |
source | MITRE |
title | Akira Ransomware |
Akira Ransomware Analysis August 2023
SEQBOSS. (2023, August 10). AKIRA RANSOMWARE ANALYSIS. Retrieved April 3, 2024.
Internal MISP references
UUID b34d6a98-158e-4fe7-8fcd-79554c07631a
which can be used as unique global reference for Akira Ransomware Analysis August 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-04-03T00:00:00Z |
date_published | 2023-08-10T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | AKIRA RANSOMWARE ANALYSIS |
Sophos Akira May 9 2023
Paul Jaramillo. (2023, May 9). Akira Ransomware is “bringin’ 1988 back”. Retrieved February 27, 2024.
Internal MISP references
UUID 1343b052-b158-4dad-9ed4-9dbb7bb778dd
which can be used as unique global reference for Sophos Akira May 9 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-02-27T00:00:00Z |
date_published | 2023-05-09T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Akira Ransomware is “bringin’ 1988 back” |
BlackBerry Akira July 11 2024
BlackBerry Research and Intelligence Team. (2024, July 11). Akira Ransomware Targets the LATAM Airline Industry. Retrieved September 16, 2024.
Internal MISP references
UUID 59a1bd0f-a907-4918-90e1-d163bf84f927
which can be used as unique global reference for BlackBerry Akira July 11 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-16T00:00:00Z |
date_published | 2024-07-11T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Akira Ransomware Targets the LATAM Airline Industry |
Microsoft AKS Azure AD 2023
Microsoft. (2023, February 27). AKS-managed Azure Active Directory integration. Retrieved March 8, 2023.
Internal MISP references
UUID 809db259-3557-5597-9d1a-7c00cc10b89c
which can be used as unique global reference for Microsoft AKS Azure AD 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-08T00:00:00Z |
date_published | 2023-02-27T00:00:00Z |
source | MITRE |
title | AKS-managed Azure Active Directory integration |
Okta DPoP 2023
Venkat Viswanathan. (2023, June 13). A leap forward in token security: Okta adds support for DPoP. Retrieved January 2, 2024.
Internal MISP references
UUID d792ede9-6ff6-5fae-a045-fd8b57abd3d3
which can be used as unique global reference for Okta DPoP 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-01-02T00:00:00Z |
date_published | 2023-06-13T00:00:00Z |
source | MITRE |
title | A leap forward in token security: Okta adds support for DPoP |
US-CERT SamSam 2018
US-CERT. (2018, December 3). Alert (AA18-337A): SamSam Ransomware. Retrieved March 15, 2019.
Internal MISP references
UUID b9d14fea-2330-4eed-892c-b4e05a35d273
which can be used as unique global reference for US-CERT SamSam 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-03-15T00:00:00Z |
date_published | 2018-12-03T00:00:00Z |
source | MITRE |
title | Alert (AA18-337A): SamSam Ransomware |
CISA MSS Sep 2020
CISA. (2020, September 14). Alert (AA20-258A): Chinese Ministry of State Security-Affiliated Cyber Threat Actor Activity. Retrieved October 1, 2020.
Internal MISP references
UUID ffe613e3-b528-42bf-81d5-4d8de38b3457
which can be used as unique global reference for CISA MSS Sep 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-01T00:00:00Z |
date_published | 2020-09-14T00:00:00Z |
source | MITRE |
title | Alert (AA20-258A): Chinese Ministry of State Security-Affiliated Cyber Threat Actor Activity |
CISA Lokibot September 2020
DHS/CISA. (2020, September 22). Alert (AA20-266A) LokiBot Malware . Retrieved September 15, 2021.
Internal MISP references
UUID df979f7b-6de8-4029-ae47-700f29157db0
which can be used as unique global reference for CISA Lokibot September 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-15T00:00:00Z |
date_published | 2020-09-22T00:00:00Z |
source | MITRE |
title | Alert (AA20-266A) LokiBot Malware |
CISA_AA21_200B
CISA. (2021, August 20). Alert (AA21-200B) Chinese State-Sponsored Cyber Operations: Observed TTPs. Retrieved June 21, 2022.
Internal MISP references
UUID 633c6045-8990-58ae-85f0-00139aa9a091
which can be used as unique global reference for CISA_AA21_200B
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-06-21T00:00:00Z |
date_published | 2021-08-20T00:00:00Z |
source | MITRE |
title | Alert (AA21-200B) Chinese State-Sponsored Cyber Operations: Observed TTPs |
cisa_malware_orgs_ukraine
CISA. (2022, April 28). Alert (AA22-057A) Update: Destructive Malware Targeting Organizations in Ukraine. Retrieved July 29, 2022.
Internal MISP references
UUID ebe89b36-f87f-4e09-8030-a1328c0b8683
which can be used as unique global reference for cisa_malware_orgs_ukraine
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-07-29T00:00:00Z |
date_published | 2022-04-28T00:00:00Z |
source | MITRE |
title | Alert (AA22-057A) Update: Destructive Malware Targeting Organizations in Ukraine |
US-CERT Ransomware 2016
US-CERT. (2016, March 31). Alert (TA16-091A): Ransomware and Recent Variants. Retrieved March 15, 2019.
Internal MISP references
UUID 866484fa-836d-4c5b-bbad-3594ef60599c
which can be used as unique global reference for US-CERT Ransomware 2016
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-03-15T00:00:00Z |
date_published | 2016-03-31T00:00:00Z |
source | MITRE |
title | Alert (TA16-091A): Ransomware and Recent Variants |
US-CERT WannaCry 2017
US-CERT. (2017, May 12). Alert (TA17-132A): Indicators Associated With WannaCry Ransomware. Retrieved March 25, 2019.
Internal MISP references
UUID 349b8e9d-7172-4d01-b150-f0371d038b7e
which can be used as unique global reference for US-CERT WannaCry 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-03-25T00:00:00Z |
date_published | 2017-05-12T00:00:00Z |
source | MITRE |
title | Alert (TA17-132A): Indicators Associated With WannaCry Ransomware |
US-CERT HIDDEN COBRA June 2017
US-CERT. (2017, June 13). Alert (TA17-164A) HIDDEN COBRA – North Korea’s DDoS Botnet Infrastructure. Retrieved July 13, 2017.
Internal MISP references
UUID 8e57cea3-ee37-4507-bb56-7445050ec8ca
which can be used as unique global reference for US-CERT HIDDEN COBRA June 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-07-13T00:00:00Z |
date_published | 2017-06-13T00:00:00Z |
source | MITRE |
title | Alert (TA17-164A) HIDDEN COBRA – North Korea’s DDoS Botnet Infrastructure |
US-CERT NotPetya 2017
US-CERT. (2017, July 1). Alert (TA17-181A): Petya Ransomware. Retrieved March 15, 2019.
Internal MISP references
UUID 6a009850-834b-4178-9028-2745921b6743
which can be used as unique global reference for US-CERT NotPetya 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-03-15T00:00:00Z |
date_published | 2017-07-01T00:00:00Z |
source | MITRE |
title | Alert (TA17-181A): Petya Ransomware |
US-CERT APT Energy Oct 2017
US-CERT. (2017, October 20). Alert (TA17-293A): Advanced Persistent Threat Activity Targeting Energy and Other Critical Infrastructure Sectors. Retrieved November 2, 2017.
Internal MISP references
UUID e34ddf0a-a112-4557-ac09-1ff540241a89
which can be used as unique global reference for US-CERT APT Energy Oct 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-11-02T00:00:00Z |
date_published | 2017-10-20T00:00:00Z |
source | MITRE |
title | Alert (TA17-293A): Advanced Persistent Threat Activity Targeting Energy and Other Critical Infrastructure Sectors |
US-CERT FALLCHILL Nov 2017
US-CERT. (2017, November 22). Alert (TA17-318A): HIDDEN COBRA – North Korean Remote Administration Tool: FALLCHILL. Retrieved December 7, 2017.
Internal MISP references
UUID 045e03f9-af83-4442-b69e-b80f68e570ac
which can be used as unique global reference for US-CERT FALLCHILL Nov 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-07T00:00:00Z |
date_published | 2017-11-22T00:00:00Z |
source | MITRE |
title | Alert (TA17-318A): HIDDEN COBRA – North Korean Remote Administration Tool: FALLCHILL |
US-CERT Volgmer Nov 2017
US-CERT. (2017, November 22). Alert (TA17-318B): HIDDEN COBRA – North Korean Trojan: Volgmer. Retrieved December 7, 2017.
Internal MISP references
UUID c48c7ac0-8d55-4b62-9606-a9ce420459b6
which can be used as unique global reference for US-CERT Volgmer Nov 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-07T00:00:00Z |
date_published | 2017-11-22T00:00:00Z |
source | MITRE |
title | Alert (TA17-318B): HIDDEN COBRA – North Korean Trojan: Volgmer |
US-CERT TA18-074A
US-CERT. (2018, March 16). Alert (TA18-074A): Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors. Retrieved June 6, 2018.
Internal MISP references
UUID 94e87a92-bf80-43e2-a3ab-cd7d4895f2fc
which can be used as unique global reference for US-CERT TA18-074A
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-06-06T00:00:00Z |
date_published | 2018-03-16T00:00:00Z |
source | MITRE |
title | Alert (TA18-074A): Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors |
US-CERT-TA18-106A
US-CERT. (2018, April 20). Alert (TA18-106A) Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. Retrieved October 19, 2020.
Internal MISP references
UUID 1fe55557-94af-4697-a675-884701f70f2a
which can be used as unique global reference for US-CERT-TA18-106A
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-19T00:00:00Z |
date_published | 2018-04-20T00:00:00Z |
source | MITRE |
title | Alert (TA18-106A) Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices |
US-CERT Emotet Jul 2018
US-CERT. (2018, July 20). Alert (TA18-201A) Emotet Malware. Retrieved March 25, 2019.
Internal MISP references
UUID 0043043a-4741-41c2-a6f2-f88d5caa8b7a
which can be used as unique global reference for US-CERT Emotet Jul 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-03-25T00:00:00Z |
date_published | 2018-07-20T00:00:00Z |
source | MITRE |
title | Alert (TA18-201A) Emotet Malware |
Sysdig LLMJacking 2024
LLMjacking: Stolen Cloud Credentials Used in New AI Attack. (2024, May 6). Alessandro Brucato. Retrieved September 25, 2024.
Internal MISP references
UUID 20d3128e-0900-5373-97f0-fcf26fc86271
which can be used as unique global reference for Sysdig LLMJacking 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-25T00:00:00Z |
date_published | 2024-05-06T00:00:00Z |
source | MITRE |
title | Alessandro Brucato |
Alexa-dns
Scanning Alexa's Top 1M for AXFR. (2015, March 29). Retrieved June 5, 2024.
Internal MISP references
UUID 154a5d86-4478-5cf5-ac39-19ac7581a440
which can be used as unique global reference for Alexa-dns
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-06-05T00:00:00Z |
source | MITRE |
title | Alexa-dns |
AlKhaser Debug
Noteworthy. (2019, January 6). Al-Khaser. Retrieved April 1, 2022.
Internal MISP references
UUID d9773aaf-e3ec-4ce3-b5c8-1ca3c4751622
which can be used as unique global reference for AlKhaser Debug
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-04-01T00:00:00Z |
date_published | 2019-01-06T00:00:00Z |
source | MITRE |
title | Al-Khaser |
Microsoft RDP Logons
Microsoft. (2017, April 9). Allow log on through Remote Desktop Services. Retrieved August 5, 2024.
Internal MISP references
UUID 2b460644-dc33-5cf4-a80a-8509d9f7e152
which can be used as unique global reference for Microsoft RDP Logons
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-08-05T00:00:00Z |
date_published | 2017-04-09T00:00:00Z |
source | MITRE |
title | Allow log on through Remote Desktop Services |
NetSPI ClickOnce
Ryan Gandrud. (2015, March 23). All You Need Is One – A ClickOnce Love Story. Retrieved September 9, 2024.
Internal MISP references
UUID be17ae41-52d0-51bd-b48f-5c1d3c5c8dc1
which can be used as unique global reference for NetSPI ClickOnce
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-09T00:00:00Z |
date_published | 2015-03-23T00:00:00Z |
source | MITRE |
title | All You Need Is One – A ClickOnce Love Story |
Fysbis Palo Alto Analysis
Bryan Lee and Rob Downs. (2016, February 12). A Look Into Fysbis: Sofacy’s Linux Backdoor. Retrieved September 10, 2017.
Internal MISP references
UUID 3e527ad6-6b56-473d-8178-e1c3c14f2311
which can be used as unique global reference for Fysbis Palo Alto Analysis
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-09-10T00:00:00Z |
date_published | 2016-02-12T00:00:00Z |
source | MITRE |
title | A Look Into Fysbis: Sofacy’s Linux Backdoor |
Medium KONNI Jan 2020
Karmi, D. (2020, January 4). A Look Into Konni 2019 Campaign. Retrieved April 28, 2020.
Internal MISP references
UUID e117a6ac-eaa2-4494-b4ae-2d9ae52c3251
which can be used as unique global reference for Medium KONNI Jan 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-04-28T00:00:00Z |
date_published | 2020-01-04T00:00:00Z |
source | MITRE |
title | A Look Into Konni 2019 Campaign |
Unit 42 Palo Alto Ransomware in Public Clouds 2022
Jay Chen. (2022, May 16). A Look Into Public Clouds From the Ransomware Actor's Perspective. Retrieved March 21, 2023.
Internal MISP references
UUID cc6c2b69-ca51-513e-9666-a03be2ea5fcd
which can be used as unique global reference for Unit 42 Palo Alto Ransomware in Public Clouds 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-21T00:00:00Z |
date_published | 2022-05-16T00:00:00Z |
source | MITRE |
title | A Look Into Public Clouds From the Ransomware Actor's Perspective |
Cyber Centre ALPHV/BlackCat July 25 2023
Canadian Centre for Cyber Security. (2023, July 25). ALPHV/BlackCat Ransomware Targeting of Canadian Industries. Retrieved September 13, 2023.
Internal MISP references
UUID 610c8f22-1a96-42d2-934d-8467d136eed2
which can be used as unique global reference for Cyber Centre ALPHV/BlackCat July 25 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-13T00:00:00Z |
date_published | 2023-07-25T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | ALPHV/BlackCat Ransomware Targeting of Canadian Industries |
Mandiant ALPHV Affiliate April 3 2023
Jason Deyalsingh, Nick Smith, Eduardo Mattos, Tyler Mclellan. (2023, April 3). ALPHV Ransomware Affiliate Targets Vulnerable Backup Installations to Gain Initial Access. Retrieved March 5, 2024.
Internal MISP references
UUID b8375832-f6a9-4617-a2ac-d23aacbf2bfe
which can be used as unique global reference for Mandiant ALPHV Affiliate April 3 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-05T00:00:00Z |
date_published | 2023-04-03T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | ALPHV Ransomware Affiliate Targets Vulnerable Backup Installations to Gain Initial Access |
Microsoft ADS Mar 2014
Marlin, J. (2013, March 24). Alternate Data Streams in NTFS. Retrieved March 21, 2018.
Internal MISP references
UUID eae434ff-97c0-4a82-9f80-215e515befae
which can be used as unique global reference for Microsoft ADS Mar 2014
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-03-21T00:00:00Z |
date_published | 2013-03-24T00:00:00Z |
source | MITRE |
title | Alternate Data Streams in NTFS |
XPNSec PPID Nov 2017
Chester, A. (2017, November 20). Alternative methods of becoming SYSTEM. Retrieved June 4, 2019.
Internal MISP references
UUID 0dbf093e-4b54-4972-b048-2a6411037da4
which can be used as unique global reference for XPNSec PPID Nov 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-06-04T00:00:00Z |
date_published | 2017-11-20T00:00:00Z |
source | MITRE |
title | Alternative methods of becoming SYSTEM |
Microsoft AlwaysInstallElevated 2018
Microsoft. (2018, May 31). AlwaysInstallElevated. Retrieved December 14, 2020.
Internal MISP references
UUID 19026f4c-ad65-435e-8c0e-a8ccc9895348
which can be used as unique global reference for Microsoft AlwaysInstallElevated 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-12-14T00:00:00Z |
date_published | 2018-05-31T00:00:00Z |
source | MITRE |
title | AlwaysInstallElevated |
ASEC BLOG July 21 2022
Sanseo. (2022, July 21). Amadey Bot Being Distributed Through SmokeLoader - ASEC BLOG. Retrieved May 15, 2023.
Internal MISP references
UUID e320cc74-005a-46db-8a04-6ec487df327f
which can be used as unique global reference for ASEC BLOG July 21 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-15T00:00:00Z |
date_published | 2022-07-21T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Amadey Bot Being Distributed Through SmokeLoader - ASEC BLOG |
Amazon Snapshots
Amazon. (n.d.). Amazon EBS snapshots. Retrieved October 13, 2021.
Internal MISP references
UUID 3961a653-b53c-4ba4-9ea6-709e1d1bdb55
which can be used as unique global reference for Amazon Snapshots
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-13T00:00:00Z |
source | MITRE |
title | Amazon EBS snapshots |
Amazon AMI
Amazon. (n.d.). Amazon Machine Images (AMI). Retrieved October 13, 2021.
Internal MISP references
UUID bc9ecf45-2a20-47df-a634-064237e5f126
which can be used as unique global reference for Amazon AMI
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-13T00:00:00Z |
source | MITRE |
title | Amazon Machine Images (AMI) |
Amazon S3
Amazon. (n.d.). Amazon S3. Retrieved October 13, 2021.
Internal MISP references
UUID 7fecbd5d-626f-496a-a72f-5f166c78c204
which can be used as unique global reference for Amazon S3
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-13T00:00:00Z |
source | MITRE |
title | Amazon S3 |
Trend Micro S3 Exposed PII, 2017
Trend Micro. (2017, November 6). A Misconfigured Amazon S3 Exposed Almost 50 Thousand PII in Australia. Retrieved October 4, 2019.
Internal MISP references
UUID 1ba37b48-1219-4f87-af36-9bdd8d6265ca
which can be used as unique global reference for Trend Micro S3 Exposed PII, 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-10-04T00:00:00Z |
date_published | 2017-11-06T00:00:00Z |
source | MITRE |
title | A Misconfigured Amazon S3 Exposed Almost 50 Thousand PII in Australia |
Recorded Future Beacon Certificates
Insikt Group. (2019, June 18). A Multi-Method Approach to Identifying Rogue Cobalt Strike Servers. Retrieved September 16, 2024.
Internal MISP references
UUID 792ca8a7-c9b2-4e7f-8562-e1ccb60a402a
which can be used as unique global reference for Recorded Future Beacon Certificates
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-16T00:00:00Z |
date_published | 2019-06-18T00:00:00Z |
source | MITRE |
title | A Multi-Method Approach to Identifying Rogue Cobalt Strike Servers |
Botnet Scan
Dainotti, A. et al. (2012). Analysis of a “/0” Stealth Scan from a Botnet. Retrieved October 20, 2020.
Internal MISP references
UUID ca09941c-fcc8-460b-8b02-d1608a7d3813
which can be used as unique global reference for Botnet Scan
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-20T00:00:00Z |
date_published | 2012-01-01T00:00:00Z |
source | MITRE |
title | Analysis of a “/0” Stealth Scan from a Botnet |
Trend Micro Ngrok September 2020
Borja, A. Camba, A. et al (2020, September 14). Analysis of a Convoluted Attack Chain Involving Ngrok. Retrieved September 15, 2020.
Internal MISP references
UUID e7b57e64-3532-4b98-9fa5-b832e6fcd53a
which can be used as unique global reference for Trend Micro Ngrok September 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-09-15T00:00:00Z |
source | MITRE |
title | Analysis of a Convoluted Attack Chain Involving Ngrok |
CIRCL PlugX March 2013
Computer Incident Response Center Luxembourg. (2013, March 29). Analysis of a PlugX variant. Retrieved November 5, 2018.
Internal MISP references
UUID 8ab89236-6994-43a3-906c-383e294f65d1
which can be used as unique global reference for CIRCL PlugX March 2013
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-11-05T00:00:00Z |
date_published | 2013-03-29T00:00:00Z |
source | MITRE |
title | Analysis of a PlugX variant |
Apple Unified Log Analysis Remote Login and Screen Sharing
Sarah Edwards. (2020, April 30). Analysis of Apple Unified Logs: Quarantine Edition [Entry 6] – Working From Home? Remote Logins. Retrieved August 19, 2021.
Internal MISP references
UUID a2169171-8e4a-4faa-811c-98b6204a5a57
which can be used as unique global reference for Apple Unified Log Analysis Remote Login and Screen Sharing
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-08-19T00:00:00Z |
date_published | 2020-04-30T00:00:00Z |
source | MITRE |
title | Analysis of Apple Unified Logs: Quarantine Edition [Entry 6] – Working From Home? Remote Logins |
Medium S2W WhisperGate January 2022
S2W. (2022, January 18). Analysis of Destructive Malware (WhisperGate) targeting Ukraine. Retrieved March 14, 2022.
Internal MISP references
UUID 06cf7197-244a-431b-a288-4c2bbd431ad5
which can be used as unique global reference for Medium S2W WhisperGate January 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-03-14T00:00:00Z |
date_published | 2022-01-18T00:00:00Z |
source | MITRE |
title | Analysis of Destructive Malware (WhisperGate) targeting Ukraine |
Analysis of FG-IR-22-369
Guillaume Lovet and Alex Kong. (2023, March 9). Analysis of FG-IR-22-369. Retrieved May 15, 2023.
Internal MISP references
UUID f12b141e-6bb2-5563-9665-5756fec2d5e7
which can be used as unique global reference for Analysis of FG-IR-22-369
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-15T00:00:00Z |
date_published | 2023-03-09T00:00:00Z |
source | MITRE |
title | Analysis of FG-IR-22-369 |
Graeber 2014
Graeber, M. (2014, October). Analysis of Malicious Security Support Provider DLLs. Retrieved March 1, 2017.
Internal MISP references
UUID f2f9a6bf-b4d9-461e-b961-0610ea72faf0
which can be used as unique global reference for Graeber 2014
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-03-01T00:00:00Z |
date_published | 2014-10-01T00:00:00Z |
source | MITRE |
title | Analysis of Malicious Security Support Provider DLLs |
Fortinet Agent Tesla April 2018
Zhang, X. (2018, April 05). Analysis of New Agent Tesla Spyware Variant. Retrieved November 5, 2018.
Internal MISP references
UUID 86a65be7-0f70-4755-b526-a26b92eabaa2
which can be used as unique global reference for Fortinet Agent Tesla April 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-11-05T00:00:00Z |
date_published | 2018-04-05T00:00:00Z |
source | MITRE |
title | Analysis of New Agent Tesla Spyware Variant |
Antiy CERT Ramsay April 2020
Antiy CERT. (2020, April 20). Analysis of Ramsay components of Darkhotel's infiltration and isolation network. Retrieved March 24, 2021.
Internal MISP references
UUID 280636da-fa21-472c-947c-651a628ea2cd
which can be used as unique global reference for Antiy CERT Ramsay April 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-03-24T00:00:00Z |
date_published | 2020-04-20T00:00:00Z |
source | MITRE |
title | Analysis of Ramsay components of Darkhotel's infiltration and isolation network |
Storm-0558 techniques for unauthorized email access
Microsoft Threat Intelligence. (2023, July 14). Analysis of Storm-0558 techniques for unauthorized email access. Retrieved September 18, 2023.
Internal MISP references
UUID 74fd79a9-09f7-5149-a457-687a1e2989de
which can be used as unique global reference for Storm-0558 techniques for unauthorized email access
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-18T00:00:00Z |
date_published | 2023-07-14T00:00:00Z |
source | MITRE |
title | Analysis of Storm-0558 techniques for unauthorized email access |
ESET Telebots July 2017
Cherepanov, A.. (2017, July 4). Analysis of TeleBots’ cunning backdoor . Retrieved June 11, 2020.
Internal MISP references
UUID 5d62c323-6626-4aad-8bf2-0d988e436f3d
which can be used as unique global reference for ESET Telebots July 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-06-11T00:00:00Z |
date_published | 2017-07-04T00:00:00Z |
source | MITRE |
title | Analysis of TeleBots’ cunning backdoor |
EST Kimsuky SmokeScreen April 2019
ESTSecurity. (2019, April 17). Analysis of the APT Campaign ‘Smoke Screen’ targeting to Korea and US 출처: https://blog.alyac.co.kr/2243 [이스트시큐리티 알약 블로그]. Retrieved September 29, 2021.
Internal MISP references
UUID 15213a3c-1e9f-47fa-9864-8ef2707c7fb6
which can be used as unique global reference for EST Kimsuky SmokeScreen April 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-29T00:00:00Z |
date_published | 2019-04-17T00:00:00Z |
source | MITRE |
title | Analysis of the APT Campaign ‘Smoke Screen’ targeting to Korea and US 출처: https://blog.alyac.co.kr/2243 [이스트시큐리티 알약 블로그] |
Ukraine15 - EISAC - 201603
Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems. (2016, March 18). Analysis of the Cyber Attack on the Ukranian Power Grid: Defense Use Case. Retrieved March 27, 2018.
Internal MISP references
UUID 8adc6d36-3aa0-5d7b-8bb3-23f4426be8a6
which can be used as unique global reference for Ukraine15 - EISAC - 201603
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-03-27T00:00:00Z |
date_published | 2016-03-18T00:00:00Z |
source | MITRE |
title | Analysis of the Cyber Attack on the Ukranian Power Grid: Defense Use Case |
Check Point Havij Analysis
Ganani, M. (2015, May 14). Analysis of the Havij SQL Injection tool. Retrieved March 19, 2018.
Internal MISP references
UUID 2e00a539-acbe-4462-a30f-43da4e8b9c4f
which can be used as unique global reference for Check Point Havij Analysis
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-03-19T00:00:00Z |
date_published | 2015-05-14T00:00:00Z |
source | MITRE |
title | Analysis of the Havij SQL Injection tool |
ESET Emotet Dec 2018
Perez, D.. (2018, December 28). Analysis of the latest Emotet propagation campaign. Retrieved April 16, 2019.
Internal MISP references
UUID 3fab9e25-e83e-4c90-ae32-dcd0c30757f8
which can be used as unique global reference for ESET Emotet Dec 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-04-16T00:00:00Z |
date_published | 2018-12-28T00:00:00Z |
source | MITRE |
title | Analysis of the latest Emotet propagation campaign |
Rewterz Sidewinder COVID-19 June 2020
Rewterz. (2020, June 22). Analysis on Sidewinder APT Group – COVID-19. Retrieved January 29, 2021.
Internal MISP references
UUID cdd779f1-30c2-40be-a500-332920f0e21c
which can be used as unique global reference for Rewterz Sidewinder COVID-19 June 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-01-29T00:00:00Z |
date_published | 2020-06-22T00:00:00Z |
source | MITRE |
title | Analysis on Sidewinder APT Group – COVID-19 |
CISA AR18-352A Quasar RAT December 2018
CISA. (2018, December 18). Analysis Report (AR18-352A) Quasar Open-Source Remote Administration Tool. Retrieved August 1, 2022.
Internal MISP references
UUID a109e42d-604f-4885-ada3-5d6895addc96
which can be used as unique global reference for CISA AR18-352A Quasar RAT December 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-08-01T00:00:00Z |
date_published | 2018-12-18T00:00:00Z |
source | MITRE |
title | Analysis Report (AR18-352A) Quasar Open-Source Remote Administration Tool |
CISA AR21-126A FIVEHANDS May 2021
CISA. (2021, May 6). Analysis Report (AR21-126A) FiveHands Ransomware. Retrieved June 7, 2021.
Internal MISP references
UUID f98604dd-2881-4024-8e43-6f5f48c6c9fa
which can be used as unique global reference for CISA AR21-126A FIVEHANDS May 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-06-07T00:00:00Z |
date_published | 2021-05-06T00:00:00Z |
source | MITRE |
title | Analysis Report (AR21-126A) FiveHands Ransomware |
JoeSecurity Egregor 2020
Joe Security. (n.d.). Analysis Report fasm.dll. Retrieved January 6, 2021.
Internal MISP references
UUID d403e610-fa83-4c17-842f-223063864009
which can be used as unique global reference for JoeSecurity Egregor 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-01-06T00:00:00Z |
source | MITRE |
title | Analysis Report fasm.dll |
GDATA Zeus Panda June 2017
Ebach, L. (2017, June 22). Analysis Results of Zeus.Variant.Panda. Retrieved November 5, 2018.
Internal MISP references
UUID 2d9a6957-5645-4863-968b-4a3c8736564b
which can be used as unique global reference for GDATA Zeus Panda June 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-11-05T00:00:00Z |
date_published | 2017-06-22T00:00:00Z |
source | MITRE |
title | Analysis Results of Zeus.Variant.Panda |
jstnk9.github.io June 01 2022
jstnk9.github.io. (2022, June 1). Analyzing AsyncRAT distributed in Colombia | Welcome to Jstnk webpage. Retrieved May 7, 2023.
Internal MISP references
UUID 4e7f573d-f8cc-4538-9f8d-b945f037e46f
which can be used as unique global reference for jstnk9.github.io June 01 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-07T00:00:00Z |
date_published | 2022-06-01T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Analyzing AsyncRAT distributed in Colombia |
Analyzing CS Dec 2020
Maynier, E. (2020, December 20). Analyzing Cobalt Strike for Fun and Profit. Retrieved October 12, 2021.
Internal MISP references
UUID f2cb06bc-66d5-4c60-a2a4-74e5a0c23bee
which can be used as unique global reference for Analyzing CS Dec 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-12T00:00:00Z |
date_published | 2020-12-20T00:00:00Z |
source | MITRE |
title | Analyzing Cobalt Strike for Fun and Profit |
Objective_See 1 4 2024
Objective_See. (2024, January 4). Analyzing DPRK's SpectralBlur. Retrieved March 8, 2024.
Internal MISP references
UUID c96535be-4859-4ae3-9ba0-d482f1195863
which can be used as unique global reference for Objective_See 1 4 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-08T00:00:00Z |
date_published | 2024-01-04T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Analyzing DPRK's SpectralBlur |
Microsoft Security Blog 4 22 2024
Microsoft Threat Intelligence. (2024, April 22). Analyzing Forest Blizzard's custom post-compromise tool for exploiting CVE-2022-38028 to obtain credentials . Retrieved April 22, 2024.
Internal MISP references
UUID 050ff793-d81d-499f-a136-905e76bce321
which can be used as unique global reference for Microsoft Security Blog 4 22 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-04-22T00:00:00Z |
date_published | 2024-04-22T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Analyzing Forest Blizzard's custom post-compromise tool for exploiting CVE-2022-38028 to obtain credentials |
Uperesia Malicious Office Documents
Felix. (2016, September). Analyzing Malicious Office Documents. Retrieved April 11, 2018.
Internal MISP references
UUID f6ffb916-ac14-44d1-8566-26bafa06e77b
which can be used as unique global reference for Uperesia Malicious Office Documents
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-04-11T00:00:00Z |
date_published | 2016-09-01T00:00:00Z |
source | MITRE |
title | Analyzing Malicious Office Documents |
Unit42 OilRig Nov 2018
Falcone, R., Wilhoit, K.. (2018, November 16). Analyzing OilRig’s Ops Tempo from Testing to Weaponization to Delivery. Retrieved April 23, 2019.
Internal MISP references
UUID 9bc09d8a-d890-473b-a8cf-ea319fcc3462
which can be used as unique global reference for Unit42 OilRig Nov 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-04-23T00:00:00Z |
date_published | 2018-11-16T00:00:00Z |
source | MITRE |
title | Analyzing OilRig’s Ops Tempo from Testing to Weaponization to Delivery |
McAfee GhostSecret
Sherstobitoff, R., Malhotra, A. (2018, April 24). Analyzing Operation GhostSecret: Attack Seeks to Steal Data Worldwide. Retrieved May 16, 2018.
Internal MISP references
UUID d1cd4f5b-253c-4833-8905-49fb58e7c016
which can be used as unique global reference for McAfee GhostSecret
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-05-16T00:00:00Z |
date_published | 2018-04-24T00:00:00Z |
source | MITRE |
title | Analyzing Operation GhostSecret: Attack Seeks to Steal Data Worldwide |
McAfee-GhostSecret-fixurl
Ryan Sherstobitoff. (2018, April 24). Analyzing Operation GhostSecret: Attack Seeks to Steal Data Worldwide. Retrieved August 15, 2024.
Internal MISP references
UUID 8c88bc0d-102a-59ff-99e7-0d8a789c08a0
which can be used as unique global reference for McAfee-GhostSecret-fixurl
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-08-15T00:00:00Z |
date_published | 2018-04-24T00:00:00Z |
source | MITRE |
title | Analyzing Operation GhostSecret: Attack Seeks to Steal Data Worldwide |
Microsoft Analyzing Solorigate Dec 2020
MSTIC. (2020, December 18). Analyzing Solorigate, the compromised DLL file that started a sophisticated cyberattack, and how Microsoft Defender helps protect customers . Retrieved January 5, 2021.
Internal MISP references
UUID 8ad72d46-ba2c-426f-bb0d-eb47723c8e11
which can be used as unique global reference for Microsoft Analyzing Solorigate Dec 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-01-05T00:00:00Z |
date_published | 2020-12-18T00:00:00Z |
source | MITRE |
title | Analyzing Solorigate, the compromised DLL file that started a sophisticated cyberattack, and how Microsoft Defender helps protect customers |
Lastline PlugX Analysis
Vasilenko, R. (2013, December 17). An Analysis of PlugX Malware. Retrieved November 24, 2015.
Internal MISP references
UUID 9f7fa262-cede-4f47-94ca-1534c65c86e2
which can be used as unique global reference for Lastline PlugX Analysis
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2015-11-24T00:00:00Z |
date_published | 2013-12-17T00:00:00Z |
source | MITRE |
title | An Analysis of PlugX Malware |
TrendMicro Sandworm October 2014
Wu, W. (2014, October 14). An Analysis of Windows Zero-day Vulnerability ‘CVE-2014-4114’ aka “Sandworm”. Retrieved June 18, 2020.
Internal MISP references
UUID 84f289ce-c7b9-4f67-b6cc-bd058e5e6bcb
which can be used as unique global reference for TrendMicro Sandworm October 2014
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-06-18T00:00:00Z |
date_published | 2014-10-14T00:00:00Z |
source | MITRE |
title | An Analysis of Windows Zero-day Vulnerability ‘CVE-2014-4114’ aka “Sandworm” |
Dragos Crashoverride 2018
Joe Slowik. (2018, October 12). Anatomy of an Attack: Detecting and Defeating CRASHOVERRIDE. Retrieved December 18, 2020.
Internal MISP references
UUID d14442d5-2557-4a92-9a29-b15a20752f56
which can be used as unique global reference for Dragos Crashoverride 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-12-18T00:00:00Z |
date_published | 2018-10-12T00:00:00Z |
source | MITRE |
title | Anatomy of an Attack: Detecting and Defeating CRASHOVERRIDE |
Anatomy of an hVNC Attack
Keshet, Lior. Kessem, Limor. (2017, January 25). Anatomy of an hVNC Attack. Retrieved November 28, 2023.
Internal MISP references
UUID 293c5d41-cd23-5da5-9d2b-754b626bc22a
which can be used as unique global reference for Anatomy of an hVNC Attack
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-11-28T00:00:00Z |
date_published | 2017-01-25T00:00:00Z |
source | MITRE |
title | Anatomy of an hVNC Attack |
Syscall 2014
Drysdale, D. (2014, July 16). Anatomy of a system call, part 2. Retrieved June 16, 2020.
Internal MISP references
UUID 4e8fe849-ab1a-4c51-b5eb-16fcd10e8bd0
which can be used as unique global reference for Syscall 2014
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-06-16T00:00:00Z |
date_published | 2014-07-16T00:00:00Z |
source | MITRE |
title | Anatomy of a system call, part 2 |
SCADAfence_ransomware
Shaked, O. (2020, January 20). Anatomy of a Targeted Ransomware Attack. Retrieved June 18, 2022.
Internal MISP references
UUID 24c80db5-37a7-46ee-b232-f3c3ffb10f0a
which can be used as unique global reference for SCADAfence_ransomware
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-06-18T00:00:00Z |
date_published | 2020-01-20T00:00:00Z |
source | MITRE |
title | Anatomy of a Targeted Ransomware Attack |
ESET IIS Malware 2021
Hromcová, Z., Cherepanov, A. (2021). Anatomy of Native IIS Malware. Retrieved September 9, 2021.
Internal MISP references
UUID d9c6e55b-39b7-4097-8ab2-8b87421ce2f4
which can be used as unique global reference for ESET IIS Malware 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-09T00:00:00Z |
date_published | 2021-01-01T00:00:00Z |
source | MITRE |
title | Anatomy of Native IIS Malware |
Medium Anchor DNS July 2020
Grange, W. (2020, July 13). Anchor_dns malware goes cross platform. Retrieved September 10, 2020.
Internal MISP references
UUID de246d53-385f-44be-bf0f-25a76442b835
which can be used as unique global reference for Medium Anchor DNS July 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-09-10T00:00:00Z |
date_published | 2020-07-13T00:00:00Z |
source | MITRE |
title | Anchor_dns malware goes cross platform |
NSA Joint Advisory SVR SolarWinds April 2021
NSA, FBI, DHS. (2021, April 15). Russian SVR Targets U.S. and Allied Networks. Retrieved April 16, 2021.
Internal MISP references
UUID 43d9c469-1d54-454b-ba67-74e7f1de9c10
which can be used as unique global reference for NSA Joint Advisory SVR SolarWinds April 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-04-16T00:00:00Z |
source | MITRE |
title | and Allied Networks |
Kaspersky Andariel Ransomware June 2021
Park, S. (2021, June 15). Andariel evolves to target South Korea with ransomware. Retrieved September 29, 2021.
Internal MISP references
UUID f4efbcb5-494c-40e0-8734-5df1b92ec39c
which can be used as unique global reference for Kaspersky Andariel Ransomware June 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-29T00:00:00Z |
date_published | 2021-06-15T00:00:00Z |
source | MITRE |
title | Andariel evolves to target South Korea with ransomware |
CISA GRU29155 2024
US Cybersecurity & Infrastructure Security Agency et al. (2024, September 5). Russian Military Cyber Actors Target U.S. and Global Critical Infrastructure. Retrieved September 6, 2024.
Internal MISP references
UUID c4dba764-d864-59bf-a80d-f1263bc904e4
which can be used as unique global reference for CISA GRU29155 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-06T00:00:00Z |
source | MITRE |
title | and Global Critical Infrastructure |
Sophos X-Ops C-23
Pankaj Kohli. (2021, November 23). Android APT spyware, targeting Middle East victims, enhances evasiveness. Retrieved October 30, 2023.
Internal MISP references
UUID 305c201b-ccc6-4e28-a1cb-97ca697bb214
which can be used as unique global reference for Sophos X-Ops C-23
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-10-30T00:00:00Z |
date_published | 2021-11-23T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Android APT spyware, targeting Middle East victims, enhances evasiveness |
RFC826 ARP
Plummer, D. (1982, November). An Ethernet Address Resolution Protocol. Retrieved October 15, 2020.
Internal MISP references
UUID 8eef2b68-f932-4cba-8646-bff9a7848532
which can be used as unique global reference for RFC826 ARP
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-15T00:00:00Z |
date_published | 1982-11-01T00:00:00Z |
source | MITRE |
title | An Ethernet Address Resolution Protocol |
HP SVCReady Jun 2022
Schlapfer, Patrick. (2022, June 6). A New Loader Gets Ready. Retrieved December 13, 2022.
Internal MISP references
UUID 48d5ec83-f1b9-595c-bb9a-d6d5cc513a41
which can be used as unique global reference for HP SVCReady Jun 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-12-13T00:00:00Z |
date_published | 2022-06-06T00:00:00Z |
source | MITRE |
title | A New Loader Gets Ready |
SecureList Fileless
Legezo, D. (2022, May 4). A new secret stash for “fileless” malware. Retrieved March 23, 2023.
Internal MISP references
UUID 03eb080d-0b83-5cbb-9317-c50b35996c9b
which can be used as unique global reference for SecureList Fileless
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-23T00:00:00Z |
date_published | 2022-05-04T00:00:00Z |
source | MITRE |
title | A new secret stash for “fileless” malware |
ESET Ebury Feb 2014
M.Léveillé, M.. (2014, February 21). An In-depth Analysis of Linux/Ebury. Retrieved April 19, 2019.
Internal MISP references
UUID eb6d4f77-ac63-4cb8-8487-20f9e709334b
which can be used as unique global reference for ESET Ebury Feb 2014
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-04-19T00:00:00Z |
date_published | 2014-02-21T00:00:00Z |
source | MITRE |
title | An In-depth Analysis of Linux/Ebury |
Welivesecurity Ebury SSH
M.Léveillé, M. (2014, February 21). An In-depth Analysis of Linux/Ebury. Retrieved January 8, 2018.
Internal MISP references
UUID 39384c7a-3032-4b45-a5eb-8ebe7de22aa2
which can be used as unique global reference for Welivesecurity Ebury SSH
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-01-08T00:00:00Z |
date_published | 2014-02-21T00:00:00Z |
source | MITRE |
title | An In-depth Analysis of Linux/Ebury |
Avertium Black Basta June 2022
Avertium. (2022, June 1). AN IN-DEPTH LOOK AT BLACK BASTA RANSOMWARE. Retrieved March 7, 2023.
Internal MISP references
UUID 31c2ef62-2852-5418-9d52-2479a3a619d0
which can be used as unique global reference for Avertium Black Basta June 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-07T00:00:00Z |
date_published | 2022-06-01T00:00:00Z |
source | MITRE |
title | AN IN-DEPTH LOOK AT BLACK BASTA RANSOMWARE |
Myers 2007
Myers, M., and Youndt, S. (2007). An Introduction to Hardware-Assisted Virtual Machine (HVM) Rootkits. Retrieved November 13, 2014.
Internal MISP references
UUID 689dfe75-9c06-4438-86fa-5fbbb09f0fe7
which can be used as unique global reference for Myers 2007
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2014-11-13T00:00:00Z |
date_published | 2007-01-01T00:00:00Z |
source | MITRE |
title | An Introduction to Hardware-Assisted Virtual Machine (HVM) Rootkits |
Linux Services Run Levels
The Linux Foundation. (2006, January 11). An introduction to services, runlevels, and rc.d scripts. Retrieved September 28, 2021.
Internal MISP references
UUID 091aa85d-7d30-4800-9b2d-97f96d257798
which can be used as unique global reference for Linux Services Run Levels
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-28T00:00:00Z |
date_published | 2006-01-11T00:00:00Z |
source | MITRE |
title | An introduction to services, runlevels, and rc.d scripts |
Anomali Pirate Panda April 2020
Moore, S. et al. (2020, April 30). Anomali Suspects that China-Backed APT Pirate Panda May Be Seeking Access to Vietnam Government Data Center. Retrieved May 19, 2020.
Internal MISP references
UUID f1d28b91-a529-439d-9548-c597baa245d4
which can be used as unique global reference for Anomali Pirate Panda April 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-05-19T00:00:00Z |
date_published | 2020-04-30T00:00:00Z |
source | MITRE |
title | Anomali Suspects that China-Backed APT Pirate Panda May Be Seeking Access to Vietnam Government Data Center |
AnonGhost Team Profile
ADL. (2015, July 6). AnonGhost Team. Retrieved October 10, 2023.
Internal MISP references
UUID f868f5fa-df66-435f-8b32-d58e4785e46c
which can be used as unique global reference for AnonGhost Team Profile
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-10-10T00:00:00Z |
date_published | 2015-07-06T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | AnonGhost Team |
AnonHBGary
Bright, P. (2011, February 15). Anonymous speaks: the inside story of the HBGary hack. Retrieved March 9, 2017.
Internal MISP references
UUID 19ab02ea-883f-441c-bebf-4be64855374a
which can be used as unique global reference for AnonHBGary
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-03-09T00:00:00Z |
date_published | 2011-02-15T00:00:00Z |
source | MITRE |
title | Anonymous speaks: the inside story of the HBGary hack |
Fortinet Metamorfo Feb 2020
Zhang, X. (2020, February 4). Another Metamorfo Variant Targeting Customers of Financial Institutions in More Countries. Retrieved July 30, 2020.
Internal MISP references
UUID e89e3825-85df-45cf-b309-e449afed0288
which can be used as unique global reference for Fortinet Metamorfo Feb 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-07-30T00:00:00Z |
date_published | 2020-02-04T00:00:00Z |
source | MITRE |
title | Another Metamorfo Variant Targeting Customers of Financial Institutions in More Countries |
MuddyWater TrendMicro June 2018
Villanueva, M., Co, M. (2018, June 14). Another Potential MuddyWater Campaign uses Powershell-based PRB-Backdoor. Retrieved July 3, 2018.
Internal MISP references
UUID b2c415e4-edbe-47fe-9820-b968114f81f0
which can be used as unique global reference for MuddyWater TrendMicro June 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-07-03T00:00:00Z |
date_published | 2018-06-14T00:00:00Z |
source | MITRE |
title | Another Potential MuddyWater Campaign uses Powershell-based PRB-Backdoor |
AlienVault Sykipot 2011
Blasco, J. (2011, December 12). Another Sykipot sample likely targeting US federal agencies. Retrieved March 28, 2016.
Internal MISP references
UUID 800363c1-60df-47e7-8ded-c0f4b6e758f4
which can be used as unique global reference for AlienVault Sykipot 2011
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-03-28T00:00:00Z |
date_published | 2011-12-12T00:00:00Z |
source | MITRE |
title | Another Sykipot sample likely targeting US federal agencies |
RiskIQ Newegg September 2018
Klijnsma, Y. (2018, September 19). Another Victim of the Magecart Assault Emerges: Newegg. Retrieved September 9, 2020.
Internal MISP references
UUID 095a705f-810b-4c4f-90ce-016117a5b4b6
which can be used as unique global reference for RiskIQ Newegg September 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-09-09T00:00:00Z |
date_published | 2018-09-19T00:00:00Z |
source | MITRE |
title | Another Victim of the Magecart Assault Emerges: Newegg |
Dell WMI Persistence
Dell SecureWorks Counter Threat Unit™ (CTU) Research Team. (2016, March 28). A Novel WMI Persistence Implementation. Retrieved March 30, 2016.
Internal MISP references
UUID a88dd548-ac8f-4297-9e23-de2643294846
which can be used as unique global reference for Dell WMI Persistence
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-03-30T00:00:00Z |
date_published | 2016-03-28T00:00:00Z |
source | MITRE |
title | A Novel WMI Persistence Implementation |
iDefense Rootkit Overview
Chuvakin, A. (2003, February). An Overview of Rootkits. Retrieved April 6, 2018.
Internal MISP references
UUID c1aef861-9e31-42e6-a2eb-5151b056762b
which can be used as unique global reference for iDefense Rootkit Overview
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-04-06T00:00:00Z |
date_published | 2003-02-01T00:00:00Z |
source | MITRE |
title | An Overview of Rootkits |
Trend Micro Rhysida August 09 2023
Trend Micro Research. (2023, August 9). An Overview of the New Rhysida Ransomware Targeting the Healthcare Sector. Retrieved August 11, 2023.
Internal MISP references
UUID 71704a3a-cf48-4764-af4e-8d2096bf5012
which can be used as unique global reference for Trend Micro Rhysida August 09 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-08-11T00:00:00Z |
date_published | 2023-08-09T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | An Overview of the New Rhysida Ransomware Targeting the Healthcare Sector |
Mandiant Ukraine Cyber Threats January 2022
Hultquist, J. (2022, January 20). Anticipating Cyber Threats as the Ukraine Crisis Escalates. Retrieved January 24, 2022.
Internal MISP references
UUID 6f53117f-2e94-4981-be61-c3da4b783ce2
which can be used as unique global reference for Mandiant Ukraine Cyber Threats January 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-01-24T00:00:00Z |
date_published | 2022-01-20T00:00:00Z |
source | MITRE |
title | Anticipating Cyber Threats as the Ukraine Crisis Escalates |
Microsoft AMSI
Microsoft. (2019, April 19). Antimalware Scan Interface (AMSI). Retrieved September 28, 2021.
Internal MISP references
UUID 32a4b7b5-8560-4600-aba9-15a6342b4dc3
which can be used as unique global reference for Microsoft AMSI
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-28T00:00:00Z |
date_published | 2019-04-19T00:00:00Z |
source | MITRE |
title | Antimalware Scan Interface (AMSI) |
Microsoft Anti Spoofing
Microsoft. (2020, October 13). Anti-spoofing protection in EOP. Retrieved October 19, 2020.
Internal MISP references
UUID b3ac28ac-3f98-40fd-b1da-2461a9e3ffca
which can be used as unique global reference for Microsoft Anti Spoofing
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-19T00:00:00Z |
date_published | 2020-10-13T00:00:00Z |
source | MITRE |
title | Anti-spoofing protection in EOP |
Fox-It Anunak Feb 2015
Prins, R. (2015, February 16). Anunak (aka Carbanak) Update. Retrieved January 20, 2017.
Internal MISP references
UUID d74a8d0b-887a-40b9-bd43-366764157990
which can be used as unique global reference for Fox-It Anunak Feb 2015
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-01-20T00:00:00Z |
date_published | 2015-02-16T00:00:00Z |
source | MITRE |
title | Anunak (aka Carbanak) Update |
Group-IB Anunak
Group-IB and Fox-IT. (2014, December). Anunak: APT against financial institutions. Retrieved April 20, 2016.
Internal MISP references
UUID fd254ecc-a076-4b9f-97f2-acb73c6a1695
which can be used as unique global reference for Group-IB Anunak
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-04-20T00:00:00Z |
date_published | 2014-12-01T00:00:00Z |
source | MITRE |
title | Anunak: APT against financial institutions |
Google TAG Ukraine Threat Landscape March 2022
Huntley, S. (2022, March 7). An update on the threat landscape. Retrieved March 16, 2022.
Internal MISP references
UUID a6070f95-fbee-472e-a737-a8adbedbb4f8
which can be used as unique global reference for Google TAG Ukraine Threat Landscape March 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-03-16T00:00:00Z |
date_published | 2022-03-07T00:00:00Z |
source | MITRE |
title | An update on the threat landscape |
Zairon Hooking Dec 2006
Felici, M. (2006, December 6). Any application-defined hook procedure on my machine?. Retrieved December 12, 2017.
Internal MISP references
UUID e816127a-04e4-4145-a784-50b1215612f2
which can be used as unique global reference for Zairon Hooking Dec 2006
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-12T00:00:00Z |
date_published | 2006-12-06T00:00:00Z |
source | MITRE |
title | Any application-defined hook procedure on my machine? |
SentinelOne Aoqin Dragon June 2022
Chen, Joey. (2022, June 9). Aoqin Dragon | Newly-Discovered Chinese-linked APT Has Been Quietly Spying On Organizations For 10 Years. Retrieved July 14, 2022.
Internal MISP references
UUID b4e792e0-b1fa-4639-98b1-233aaec53594
which can be used as unique global reference for SentinelOne Aoqin Dragon June 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-07-14T00:00:00Z |
date_published | 2022-06-09T00:00:00Z |
source | MITRE |
title | Aoqin Dragon |
Apache Server 2018
Apache. (n.d.). Apache HTTP Server Version 2.4 Documentation - Web Site Content. Retrieved July 27, 2018.
Internal MISP references
UUID 46f62435-bfb3-44b6-8c79-54af584cc35f
which can be used as unique global reference for Apache Server 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-07-27T00:00:00Z |
source | MITRE |
title | Apache HTTP Server Version 2.4 Documentation - Web Site Content |
Secureworks BRONZEUNION Feb 2019
Counter Threat Unit Research Team. (2019, February 27). A Peek into BRONZE UNION’s Toolbox. Retrieved September 24, 2019.
Internal MISP references
UUID 691df278-fd7d-4b73-a22c-227bc7641dec
which can be used as unique global reference for Secureworks BRONZEUNION Feb 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-09-24T00:00:00Z |
date_published | 2019-02-27T00:00:00Z |
source | MITRE |
title | A Peek into BRONZE UNION’s Toolbox |
AppArmor official
AppArmor. (2017, October 19). AppArmor Security Project Wiki. Retrieved December 20, 2017.
Internal MISP references
UUID 12df02e3-bbdd-4682-9662-1810402ad918
which can be used as unique global reference for AppArmor official
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-20T00:00:00Z |
date_published | 2017-10-19T00:00:00Z |
source | MITRE |
title | AppArmor Security Project Wiki |
PenTestLabs AppDomainManagerInject
Administrator. (2020, May 26). APPDOMAINMANAGER INJECTION AND DETECTION. Retrieved March 28, 2024.
Internal MISP references
UUID f681fd40-5bfc-50c6-a654-f9a128af5ff1
which can be used as unique global reference for PenTestLabs AppDomainManagerInject
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-28T00:00:00Z |
date_published | 2020-05-26T00:00:00Z |
source | MITRE |
title | APPDOMAINMANAGER INJECTION AND DETECTION |
Rapid7 AppDomain Manager Injection
Spagnola, N. (2023, May 5). AppDomain Manager Injection: New Techniques For Red Teams. Retrieved March 29, 2024.
Internal MISP references
UUID 881f8d23-908f-58cf-904d-5ef7b959eb39
which can be used as unique global reference for Rapid7 AppDomain Manager Injection
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-29T00:00:00Z |
date_published | 2023-05-05T00:00:00Z |
source | MITRE |
title | AppDomain Manager Injection: New Techniques For Red Teams |
Mandiant APT1 Appendix
Mandiant. (n.d.). Appendix C (Digital) - The Malware Arsenal. Retrieved July 18, 2016.
Internal MISP references
UUID 1f31c09c-6a93-4142-8333-154138c1d70a
which can be used as unique global reference for Mandiant APT1 Appendix
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-07-18T00:00:00Z |
source | MITRE |
title | Appendix C (Digital) - The Malware Arsenal |
AppInit Secure Boot
Microsoft. (n.d.). AppInit DLLs and Secure Boot. Retrieved July 15, 2015.
Internal MISP references
UUID 2b951be3-5105-4665-972f-7809c057fd3f
which can be used as unique global reference for AppInit Secure Boot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2015-07-15T00:00:00Z |
source | MITRE |
title | AppInit DLLs and Secure Boot |
AppInstaller.exe - LOLBAS Project
LOLBAS. (2020, December 2). AppInstaller.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 9a777e7c-e76c-465c-8b45-67503e715f7e
which can be used as unique global reference for AppInstaller.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2020-12-02T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | AppInstaller.exe |
objectivesee osx.shlayer apple approved 2020
Patrick Wardle. (2020, August 30). Apple Approved Malware malicious code ...now notarized!? #2020. Retrieved September 13, 2021.
Internal MISP references
UUID a2127d3d-c320-4637-a85c-16e20c2654f6
which can be used as unique global reference for objectivesee osx.shlayer apple approved 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-13T00:00:00Z |
date_published | 2020-08-30T00:00:00Z |
source | MITRE |
title | Apple Approved Malware malicious code ...now notarized!? #2020 |
AppleDocs AuthorizationExecuteWithPrivileges
Apple. (n.d.). Apple Developer Documentation - AuthorizationExecuteWithPrivileges. Retrieved August 8, 2019.
Internal MISP references
UUID 7b8875e8-5b93-4d49-a12b-2683bab2ba6e
which can be used as unique global reference for AppleDocs AuthorizationExecuteWithPrivileges
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-08-08T00:00:00Z |
source | MITRE |
title | Apple Developer Documentation - AuthorizationExecuteWithPrivileges |
AppleDocs Scheduling Timed Jobs
Apple. (n.d.). Retrieved July 17, 2017.
Internal MISP references
UUID 66dd8a7d-521f-4610-b478-52d748185ad3
which can be used as unique global reference for AppleDocs Scheduling Timed Jobs
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-07-17T00:00:00Z |
source | MITRE |
title | AppleDocs Scheduling Timed Jobs |
CISA AppleJeus Feb 2021
Cybersecurity and Infrastructure Security Agency. (2021, February 21). AppleJeus: Analysis of North Korea’s Cryptocurrency Malware. Retrieved March 1, 2021.
Internal MISP references
UUID 6873e14d-eba4-4e3c-9ccf-cec1d760f0be
which can be used as unique global reference for CISA AppleJeus Feb 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-03-01T00:00:00Z |
date_published | 2021-02-21T00:00:00Z |
source | MITRE |
title | AppleJeus: Analysis of North Korea’s Cryptocurrency Malware |
Apple Remote Desktop Admin Guide 3.3
Apple. (n.d.). Apple Remote Desktop Administrator Guide Version 3.3. Retrieved October 5, 2021.
Internal MISP references
UUID c57c2bba-a398-4e68-b2a7-fddcf0740b61
which can be used as unique global reference for Apple Remote Desktop Admin Guide 3.3
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-05T00:00:00Z |
source | MITRE |
title | Apple Remote Desktop Administrator Guide Version 3.3 |
applescript signing
Steven Sande. (2013, December 23). AppleScript and Automator gain new features in OS X Mavericks. Retrieved September 21, 2018.
Internal MISP references
UUID dd76c7ab-c3df-4f34-aaf0-684b56499065
which can be used as unique global reference for applescript signing
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-09-21T00:00:00Z |
date_published | 2013-12-23T00:00:00Z |
source | MITRE |
title | AppleScript and Automator gain new features in OS X Mavericks |
Microsoft Entra ID Service Principals
Microsoft. (2023, December 15). Application and service principal objects in Microsoft Entra ID. Retrieved February 28, 2024.
Internal MISP references
UUID 2a20c574-3e69-5da6-887e-68e34cee7562
which can be used as unique global reference for Microsoft Entra ID Service Principals
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-02-28T00:00:00Z |
date_published | 2023-12-15T00:00:00Z |
source | MITRE |
title | Application and service principal objects in Microsoft Entra ID |
Microsoft App Domains
Microsoft. (2021, September 15). Application domains. Retrieved March 28, 2024.
Internal MISP references
UUID 268e7ade-c0a8-5859-8b16-6fa8aa3b0cb7
which can be used as unique global reference for Microsoft App Domains
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-28T00:00:00Z |
date_published | 2021-09-15T00:00:00Z |
source | MITRE |
title | Application domains |
Corio 2008
Corio, C., & Sayana, D. P. (2008, June). Application Lockdown with Software Restriction Policies. Retrieved November 18, 2014.
Internal MISP references
UUID cae409ca-1c77-45df-88cd-c0998ac724ec
which can be used as unique global reference for Corio 2008
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2014-11-18T00:00:00Z |
date_published | 2008-06-01T00:00:00Z |
source | MITRE |
title | Application Lockdown with Software Restriction Policies |
Microsoft Application Lockdown
Corio, C., & Sayana, D. P.. (2008, June). Application Lockdown with Software Restriction Policies. Retrieved November 18, 2014.
Internal MISP references
UUID 5dab4466-0871-486a-84ad-0e648b2e937d
which can be used as unique global reference for Microsoft Application Lockdown
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2014-11-18T00:00:00Z |
date_published | 2008-06-01T00:00:00Z |
source | MITRE |
title | Application Lockdown with Software Restriction Policies |
SANS Application Whitelisting
Beechey, J.. (2014, November 18). Application Whitelisting: Panacea or Propaganda?. Retrieved November 18, 2014.
Internal MISP references
UUID a333f45f-1760-443a-9208-f3682ea32f67
which can be used as unique global reference for SANS Application Whitelisting
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2014-11-18T00:00:00Z |
date_published | 2014-11-18T00:00:00Z |
source | MITRE |
title | Application Whitelisting: Panacea or Propaganda? |
Beechey 2010
Beechey, J. (2010, December). Application Whitelisting: Panacea or Propaganda?. Retrieved November 18, 2014.
Internal MISP references
UUID 4994e065-c6e4-4b41-8ae3-d72023135429
which can be used as unique global reference for Beechey 2010
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2014-11-18T00:00:00Z |
date_published | 2010-12-01T00:00:00Z |
source | MITRE |
title | Application Whitelisting: Panacea or Propaganda? |
NSA MS AppLocker
NSA Information Assurance Directorate. (2014, August). Application Whitelisting Using Microsoft AppLocker. Retrieved March 31, 2016.
Internal MISP references
UUID 0db5c3ea-5392-4fd3-9f1d-9fa69aba4259
which can be used as unique global reference for NSA MS AppLocker
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-03-31T00:00:00Z |
date_published | 2014-08-01T00:00:00Z |
source | MITRE |
title | Application Whitelisting Using Microsoft AppLocker |
Penetration Testing Lab MSXSL July 2017
netbiosX. (2017, July 6). AppLocker Bypass – MSXSL. Retrieved July 3, 2018.
Internal MISP references
UUID 2f1adf20-a4b8-48c1-861f-0a44271765d7
which can be used as unique global reference for Penetration Testing Lab MSXSL July 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-07-03T00:00:00Z |
date_published | 2017-07-06T00:00:00Z |
source | MITRE |
title | AppLocker Bypass – MSXSL |
Burke/CISA ClickOnce Paper
William J. Burke IV. (n.d.). Appref-ms Abuse for Code Execution & C2. Retrieved September 9, 2024.
Internal MISP references
UUID 1bb14130-f819-5666-ab57-8f96fd4e7b05
which can be used as unique global reference for Burke/CISA ClickOnce Paper
in MISP communities and other software using the MISP galaxy
External references
- https://i.blackhat.com/USA-19/Wednesday/us-19-Burke-ClickOnce-And-Youre-In-When-Appref-Ms-Abuse-Is-Operating-As-Intended-wp.pdf?_gl=11jv89bf_gcl_auNjAyMzkzMjc3LjE3MjQ4MDk4OTQ._gaMTk5OTA3ODkwMC4xNzI0ODA5ODk0_ga_K4JK67TFYV*MTcyNDgwOTg5NC4xLjEuMTcyNDgwOTk1Ny4wLjAuMA..&_ga=2.256219723.1512103758.1724809895-1999078900.1724809894 - webarchive
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-09T00:00:00Z |
source | MITRE |
title | Appref-ms Abuse for Code Execution & C2 |
Microsoft Requests for Azure AD Roles in Privileged Identity Management
Microsoft. (2023, January 30). Approve or deny requests for Azure AD roles in Privileged Identity Management. Retrieved February 21, 2023.
Internal MISP references
UUID 1495effe-16a6-5b4e-9b50-1d1f7db48fa7
which can be used as unique global reference for Microsoft Requests for Azure AD Roles in Privileged Identity Management
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-02-21T00:00:00Z |
date_published | 2023-01-30T00:00:00Z |
source | MITRE |
title | Approve or deny requests for Azure AD roles in Privileged Identity Management |
Apple App Security Overview
Apple Inc. (2021, February 18). App security overview. Retrieved October 12, 2021.
Internal MISP references
UUID 3b1e9a5d-7940-43b5-bc11-3112c0762740
which can be used as unique global reference for Apple App Security Overview
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-12T00:00:00Z |
date_published | 2021-02-18T00:00:00Z |
source | MITRE |
title | App security overview |
Tripwire AppUNBlocker
Smith, T. (2016, October 27). AppUNBlocker: Bypassing AppLocker. Retrieved December 19, 2017.
Internal MISP references
UUID 2afb9a5f-c023-49df-90d1-e0ffb6d192f3
which can be used as unique global reference for Tripwire AppUNBlocker
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-19T00:00:00Z |
date_published | 2016-10-27T00:00:00Z |
source | MITRE |
title | AppUNBlocker: Bypassing AppLocker |
Appvlp.exe - LOLBAS Project
LOLBAS. (2018, May 25). Appvlp.exe. Retrieved December 4, 2023.
Internal MISP references
UUID b0afe3e8-9f1d-4295-8811-8dfbe993c337
which can be used as unique global reference for Appvlp.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2018-05-25T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Appvlp.exe |
BlackHat Atkinson Winchester Token Manipulation
Atkinson, J., Winchester, R. (2017, December 7). A Process is No One: Hunting for Token Manipulation. Retrieved December 21, 2017.
Internal MISP references
UUID 2eaee06d-529d-4fe0-9ca3-c62419f47a90
which can be used as unique global reference for BlackHat Atkinson Winchester Token Manipulation
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-21T00:00:00Z |
date_published | 2017-12-07T00:00:00Z |
source | MITRE |
title | A Process is No One: Hunting for Token Manipulation |
FireEye APT10 April 2017
FireEye iSIGHT Intelligence. (2017, April 6). APT10 (MenuPass Group): New Tools, Global Campaign Latest Manifestation of Longstanding Threat. Retrieved June 29, 2017.
Internal MISP references
UUID 2d494df8-83e3-45d2-b798-4c3bcf55f675
which can be used as unique global reference for FireEye APT10 April 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-06-29T00:00:00Z |
date_published | 2017-04-06T00:00:00Z |
source | MITRE |
title | APT10 (MenuPass Group): New Tools, Global Campaign Latest Manifestation of Longstanding Threat |
Securelist APT10 March 2021
GREAT. (2021, March 30). APT10: sophisticated multi-layered loader Ecipekac discovered in A41APT campaign. Retrieved June 17, 2021.
Internal MISP references
UUID 90450a1e-59c3-491f-b842-2cf81023fc9e
which can be used as unique global reference for Securelist APT10 March 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-06-17T00:00:00Z |
date_published | 2021-03-30T00:00:00Z |
source | MITRE |
title | APT10: sophisticated multi-layered loader Ecipekac discovered in A41APT campaign |
FireEye APT10 Sept 2018
Matsuda, A., Muhammad I. (2018, September 13). APT10 Targeting Japanese Corporations Using Updated TTPs. Retrieved September 17, 2018.
Internal MISP references
UUID 5f122a27-2137-4016-a482-d04106187594
which can be used as unique global reference for FireEye APT10 Sept 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-09-17T00:00:00Z |
date_published | 2018-09-13T00:00:00Z |
source | MITRE |
title | APT10 Targeting Japanese Corporations Using Updated TTPs |
NCC Group APT15 Alive and Strong
Smallridge, R. (2018, March 10). APT15 is alive and strong: An analysis of RoyalCli and RoyalDNS. Retrieved April 4, 2018.
Internal MISP references
UUID 02a50445-de06-40ab-9ea4-da5c37e066cd
which can be used as unique global reference for NCC Group APT15 Alive and Strong
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-04-04T00:00:00Z |
date_published | 2018-03-10T00:00:00Z |
source | MITRE |
title | APT15 is alive and strong: An analysis of RoyalCli and RoyalDNS |
Mandiant APT1
Mandiant. (n.d.). APT1 Exposing One of China’s Cyber Espionage Units. Retrieved July 18, 2016.
Internal MISP references
UUID 865eba93-cf6a-4e41-bc09-de9b0b3c2669
which can be used as unique global reference for Mandiant APT1
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-07-18T00:00:00Z |
source | MITRE, Tidal Cyber |
title | APT1 Exposing One of China’s Cyber Espionage Units |
Profero APT27 December 2020
Global Threat Center, Intelligence Team. (2020, December). APT27 Turns to Ransomware. Retrieved November 12, 2021.
Internal MISP references
UUID 0290ea31-f817-471e-85ae-c3855c63f5c3
which can be used as unique global reference for Profero APT27 December 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-11-12T00:00:00Z |
date_published | 2020-12-01T00:00:00Z |
source | MITRE |
title | APT27 Turns to Ransomware |
FireEye APT28 January 2017
FireEye iSIGHT Intelligence. (2017, January 11). APT28: At the Center of the Storm. Retrieved January 11, 2017.
Internal MISP references
UUID 61d80b8f-5bdb-41e6-b59a-d2d996392873
which can be used as unique global reference for FireEye APT28 January 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-01-11T00:00:00Z |
date_published | 2017-01-11T00:00:00Z |
source | MITRE, Tidal Cyber |
title | APT28: At the Center of the Storm |
FireEye APT28
FireEye. (2015). APT28: A WINDOW INTO RUSSIA’S CYBER ESPIONAGE OPERATIONS?. Retrieved August 19, 2015.
Internal MISP references
UUID c423b2b2-25a3-4a8d-b89a-83ab07c0cd20
which can be used as unique global reference for FireEye APT28
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2015-08-19T00:00:00Z |
date_published | 2015-01-01T00:00:00Z |
source | MITRE, Tidal Cyber |
title | APT28: A WINDOW INTO RUSSIA’S CYBER ESPIONAGE OPERATIONS? |
U.S. CISA APT28 Cisco Routers April 18 2023
Cybersecurity and Infrastructure Security Agency. (2023, April 18). APT28 Exploits Known Vulnerability to Carry Out Reconnaissance and Deploy Malware on Cisco Routers. Retrieved August 23, 2023.
Internal MISP references
UUID c532a6fc-b27f-4240-a071-3eaa866bce89
which can be used as unique global reference for U.S. CISA APT28 Cisco Routers April 18 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-08-23T00:00:00Z |
date_published | 2023-04-18T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | APT28 Exploits Known Vulnerability to Carry Out Reconnaissance and Deploy Malware on Cisco Routers |
Symantec APT28 Oct 2018
Symantec Security Response. (2018, October 04). APT28: New Espionage Operations Target Military and Government Organizations. Retrieved November 14, 2018.
Internal MISP references
UUID 777bc94a-6c21-4f8c-9efa-a1cf52ececc0
which can be used as unique global reference for Symantec APT28 Oct 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-11-14T00:00:00Z |
date_published | 2018-10-04T00:00:00Z |
source | MITRE |
title | APT28: New Espionage Operations Target Military and Government Organizations |
FireEye APT28 Hospitality Aug 2017
Smith, L. and Read, B.. (2017, August 11). APT28 Targets Hospitality Sector, Presents Threat to Travelers. Retrieved August 17, 2017.
Internal MISP references
UUID 7887dc90-3f05-411a-81ea-b86aa392104b
which can be used as unique global reference for FireEye APT28 Hospitality Aug 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-08-17T00:00:00Z |
date_published | 2017-08-11T00:00:00Z |
source | MITRE |
title | APT28 Targets Hospitality Sector, Presents Threat to Travelers |
Bitdefender APT28 Dec 2015
Bitdefender. (2015, December). APT28 Under the Scope. Retrieved February 23, 2017.
Internal MISP references
UUID 3dd67aae-7feb-4b07-a985-ccadc1b16f1d
which can be used as unique global reference for Bitdefender APT28 Dec 2015
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-02-23T00:00:00Z |
date_published | 2015-12-01T00:00:00Z |
source | MITRE |
title | APT28 Under the Scope |
FireEye APT29 Domain Fronting With TOR March 2017
Matthew Dunwoody. (2017, March 27). APT29 Domain Fronting With TOR. Retrieved November 20, 2017.
Internal MISP references
UUID 1d919991-bc87-41bf-9e58-edf1b3806bb8
which can be used as unique global reference for FireEye APT29 Domain Fronting With TOR March 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-11-20T00:00:00Z |
date_published | 2017-03-27T00:00:00Z |
source | MITRE |
title | APT29 Domain Fronting With TOR |
FireEye APT29 Domain Fronting
Dunwoody, M. (2017, March 27). APT29 Domain Fronting With TOR. Retrieved March 27, 2017.
Internal MISP references
UUID 3e013b07-deaf-4387-acd7-2d0565d196a9
which can be used as unique global reference for FireEye APT29 Domain Fronting
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-03-27T00:00:00Z |
date_published | 2017-03-27T00:00:00Z |
source | MITRE |
title | APT29 Domain Fronting With TOR |
FireEye APT30
FireEye Labs. (2015, April). APT30 AND THE MECHANICS OF A LONG-RUNNING CYBER ESPIONAGE OPERATION. Retrieved May 1, 2015.
Internal MISP references
UUID c48d2084-61cf-4e86-8072-01e5d2de8416
which can be used as unique global reference for FireEye APT30
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2015-05-01T00:00:00Z |
date_published | 2015-04-01T00:00:00Z |
source | MITRE, Tidal Cyber |
title | APT30 AND THE MECHANICS OF A LONG-RUNNING CYBER ESPIONAGE OPERATION |
Zscaler APT31 Covid-19 October 2020
Singh, S. and Antil, S. (2020, October 27). APT-31 Leverages COVID-19 Vaccine Theme and Abuses Legitimate Online Services. Retrieved March 24, 2021.
Internal MISP references
UUID 1647c9a6-e475-4a9a-a202-0133dbeef9a0
which can be used as unique global reference for Zscaler APT31 Covid-19 October 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-03-24T00:00:00Z |
date_published | 2020-10-27T00:00:00Z |
source | MITRE |
title | APT-31 Leverages COVID-19 Vaccine Theme and Abuses Legitimate Online Services |
sentinelone apt32 macOS backdoor 2020
Phil Stokes. (2020, December 2). APT32 Multi-stage macOS Trojan Innovates on Crimeware Scripting Technique. Retrieved September 13, 2021.
Internal MISP references
UUID d31dcbe6-06ec-475e-b121-fd25a93c3ef7
which can be used as unique global reference for sentinelone apt32 macOS backdoor 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-13T00:00:00Z |
date_published | 2020-12-02T00:00:00Z |
source | MITRE |
title | APT32 Multi-stage macOS Trojan Innovates on Crimeware Scripting Technique |
FireEye APT33 Webinar Sept 2017
Davis, S. and Carr, N. (2017, September 21). APT33: New Insights into Iranian Cyber Espionage Group. Retrieved February 15, 2018.
Internal MISP references
UUID 9b378592-5737-403d-8a07-27077f5b2d61
which can be used as unique global reference for FireEye APT33 Webinar Sept 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-02-15T00:00:00Z |
date_published | 2017-09-21T00:00:00Z |
source | MITRE |
title | APT33: New Insights into Iranian Cyber Espionage Group |
FireEye APT34 Webinar Dec 2017
Davis, S. and Caban, D. (2017, December 19). APT34 - New Targeted Attack in the Middle East. Retrieved December 20, 2017.
Internal MISP references
UUID 4eef7032-de14-44a2-a403-82aefdc85c50
which can be used as unique global reference for FireEye APT34 Webinar Dec 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-20T00:00:00Z |
date_published | 2017-12-19T00:00:00Z |
source | MITRE |
title | APT34 - New Targeted Attack in the Middle East |
DFIR Report APT35 ProxyShell March 2022
DFIR Report. (2022, March 21). APT35 Automates Initial Access Using ProxyShell. Retrieved May 25, 2022.
Internal MISP references
UUID 1837e917-d80b-4632-a1ca-c70d4b712ac7
which can be used as unique global reference for DFIR Report APT35 ProxyShell March 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-05-25T00:00:00Z |
date_published | 2022-03-21T00:00:00Z |
source | MITRE |
title | APT35 Automates Initial Access Using ProxyShell |
Check Point APT35 CharmPower January 2022
Check Point. (2022, January 11). APT35 exploits Log4j vulnerability to distribute new modular PowerShell toolkit. Retrieved January 24, 2022.
Internal MISP references
UUID 81dce660-93ea-42a4-902f-0c6021d30f59
which can be used as unique global reference for Check Point APT35 CharmPower January 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-01-24T00:00:00Z |
date_published | 2022-01-11T00:00:00Z |
source | MITRE |
title | APT35 exploits Log4j vulnerability to distribute new modular PowerShell toolkit |
FireEye APT37 Feb 2018
FireEye. (2018, February 20). APT37 (Reaper): The Overlooked North Korean Actor. Retrieved March 1, 2018.
Internal MISP references
UUID 4d575c1a-4ff9-49ce-97cd-f9d0637c2271
which can be used as unique global reference for FireEye APT37 Feb 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-03-01T00:00:00Z |
date_published | 2018-02-20T00:00:00Z |
source | MITRE, Tidal Cyber |
title | APT37 (Reaper): The Overlooked North Korean Actor |
FireEye APT38 Oct 2018
FireEye. (2018, October 03). APT38: Un-usual Suspects. Retrieved November 6, 2018.
Internal MISP references
UUID 7c916329-af56-4723-820c-ef932a6e3409
which can be used as unique global reference for FireEye APT38 Oct 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-11-06T00:00:00Z |
date_published | 2018-10-03T00:00:00Z |
source | MITRE, Tidal Cyber |
title | APT38: Un-usual Suspects |
FireEye APT39 Jan 2019
Hawley et al. (2019, January 29). APT39: An Iranian Cyber Espionage Group Focused on Personal Information. Retrieved February 19, 2019.
Internal MISP references
UUID ba366cfc-cc04-41a5-903b-a7bb73136bc3
which can be used as unique global reference for FireEye APT39 Jan 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-02-19T00:00:00Z |
date_published | 2019-01-29T00:00:00Z |
source | MITRE |
title | APT39: An Iranian Cyber Espionage Group Focused on Personal Information |
APT3 Adversary Emulation Plan
Korban, C, et al. (2017, September). APT3 Adversary Emulation Plan. Retrieved January 16, 2018.
Internal MISP references
UUID 64c01921-c33f-402e-b30d-a2ba26583a24
which can be used as unique global reference for APT3 Adversary Emulation Plan
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-01-16T00:00:00Z |
date_published | 2017-09-01T00:00:00Z |
source | MITRE |
title | APT3 Adversary Emulation Plan |
evolution of pirpi
Yates, M. (2017, June 18). APT3 Uncovered: The code evolution of Pirpi. Retrieved September 28, 2017.
Internal MISP references
UUID 9c8bd493-bf08-431b-9d53-29eb14a6eef5
which can be used as unique global reference for evolution of pirpi
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-09-28T00:00:00Z |
date_published | 2017-06-18T00:00:00Z |
source | MITRE |
title | APT3 Uncovered: The code evolution of Pirpi |
FireEye APT40 March 2019
Plan, F., et al. (2019, March 4). APT40: Examining a China-Nexus Espionage Actor. Retrieved March 18, 2019.
Internal MISP references
UUID 8a44368f-3348-4817-aca7-81bfaca5ae6d
which can be used as unique global reference for FireEye APT40 March 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-03-18T00:00:00Z |
date_published | 2019-03-04T00:00:00Z |
source | MITRE |
title | APT40: Examining a China-Nexus Espionage Actor |
apt41_mandiant
Mandiant. (n.d.). APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION. Retrieved June 11, 2024.
Internal MISP references
UUID 599f4411-6829-5a2d-865c-ac59e80afe83
which can be used as unique global reference for apt41_mandiant
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-06-11T00:00:00Z |
source | MITRE |
title | APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION |
Mandiant APT41 July 18 2024
Mike Stokkel, Pierre Gerlings, Renato Fontana, Luis Rocha, Jared Wilson, Stephen Eckels, Jonathan Lepore. (2024, July 18). APT41 Has Arisen From the DUST. Retrieved August 2, 2024.
Internal MISP references
UUID 34ee3a7c-27c0-492f-a3c6-a5a3e86915f0
which can be used as unique global reference for Mandiant APT41 July 18 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-08-02T00:00:00Z |
date_published | 2024-07-18T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | APT41 Has Arisen From the DUST |
Google Cloud APT41 2024
Mike Stokkel et al. (2024, July 18). APT41 Has Arisen From the DUST. Retrieved September 16, 2024.
Internal MISP references
UUID 33bb9f8a-db9d-5dda-b4ae-2ba7fee0a0ae
which can be used as unique global reference for Google Cloud APT41 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-16T00:00:00Z |
date_published | 2024-07-18T00:00:00Z |
source | MITRE |
title | APT41 Has Arisen From the DUST |
apt41_dcsocytec_dec2022
DCSO CyTec Blog. (2022, December 24). APT41 — The spy who failed to encrypt me. Retrieved June 13, 2024.
Internal MISP references
UUID fad90e96-93fd-59bd-970e-f0b37cac331d
which can be used as unique global reference for apt41_dcsocytec_dec2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-06-13T00:00:00Z |
date_published | 2022-12-24T00:00:00Z |
source | MITRE |
title | APT41 — The spy who failed to encrypt me |
Rostovcev APT41 2021
Nikita Rostovcev. (2022, August 18). APT41 World Tour 2021 on a tight schedule. Retrieved February 22, 2024.
Internal MISP references
UUID b6e7fb29-7935-5454-8fb2-37585c46324a
which can be used as unique global reference for Rostovcev APT41 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-02-22T00:00:00Z |
date_published | 2022-08-18T00:00:00Z |
source | MITRE |
title | APT41 World Tour 2021 on a tight schedule |
Mandiant APT42
Mandiant. (n.d.). APT42: Crooked Charms, Cons and Compromise. Retrieved September 16, 2022.
Internal MISP references
UUID 10b3e476-a0c5-41fd-8cb8-5bfb245b118f
which can be used as unique global reference for Mandiant APT42
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-09-16T00:00:00Z |
source | MITRE |
title | APT42: Crooked Charms, Cons and Compromise |
Mandiant Crooked Charms August 12 2022
Mandiant. (2022, August 12). APT42: Crooked Charms, Cons and Compromises. Retrieved August 30, 2024.
Internal MISP references
UUID 53bab956-be5b-4d8d-b553-9926bc5d9fee
which can be used as unique global reference for Mandiant Crooked Charms August 12 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-08-30T00:00:00Z |
date_published | 2022-08-12T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | APT42: Crooked Charms, Cons and Compromises |
Mandiant APT43 March 2024
Mandiant. (2024, March 14). APT43: North Korean Group Uses Cybercrime to Fund Espionage Operations. Retrieved May 3, 2024.
Internal MISP references
UUID 8ac3fd0a-4a93-5262-9ac2-f676c5d11fda
which can be used as unique global reference for Mandiant APT43 March 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-05-03T00:00:00Z |
date_published | 2024-03-14T00:00:00Z |
source | MITRE |
title | APT43: North Korean Group Uses Cybercrime to Fund Espionage Operations |
mandiant_apt44_unearthing_sandworm
Roncone, G. et al. (n.d.). APT44: Unearthing Sandworm. Retrieved July 11, 2024.
Internal MISP references
UUID cc03d668-e4d9-5dc1-b365-203db84938f2
which can be used as unique global reference for mandiant_apt44_unearthing_sandworm
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-07-11T00:00:00Z |
source | MITRE |
title | APT44: Unearthing Sandworm |
Mandiant APT45 July 25 2024
Taylor Long, Jeff Johnson, Alice Revelli, Fred Plan, Michael Barnhart. (2024, July 25). APT45: North Korea’s Digital Military Machine. Retrieved July 26, 2024.
Internal MISP references
UUID a9673491-7493-4b85-b5fc-595e91bc7fdc
which can be used as unique global reference for Mandiant APT45 July 25 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-07-26T00:00:00Z |
date_published | 2024-07-25T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | APT45: North Korea’s Digital Military Machine |
NSA APT5 Citrix Threat Hunting December 2022
National Security Agency. (2022, December). APT5: Citrix ADC Threat Hunting Guidance. Retrieved February 5, 2024.
Internal MISP references
UUID 916e2137-46e6-53c2-a917-5b5b5c4bae3a
which can be used as unique global reference for NSA APT5 Citrix Threat Hunting December 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-02-05T00:00:00Z |
date_published | 2022-12-01T00:00:00Z |
source | MITRE |
title | APT5: Citrix ADC Threat Hunting Guidance |
welivesecurity_apt-c-23
Stefanko, L. (2020, September 30). APT‑C‑23 group evolves its Android spyware. Retrieved March 4, 2024.
Internal MISP references
UUID 7196226e-7d0d-5e14-a4e3-9b6322537039
which can be used as unique global reference for welivesecurity_apt-c-23
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-04T00:00:00Z |
date_published | 2020-09-30T00:00:00Z |
source | MITRE |
title | APT‑C‑23 group evolves its Android spyware |
QiAnXin APT-C-36 Feb2019
QiAnXin Threat Intelligence Center. (2019, February 18). APT-C-36: Continuous Attacks Targeting Colombian Government Institutions and Corporations. Retrieved May 5, 2020.
Internal MISP references
UUID cae075ea-42cb-4695-ac66-9187241393d1
which can be used as unique global reference for QiAnXin APT-C-36 Feb2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-05-05T00:00:00Z |
date_published | 2019-02-18T00:00:00Z |
source | MITRE, Tidal Cyber |
title | APT-C-36: Continuous Attacks Targeting Colombian Government Institutions and Corporations |
360 Machete Sep 2020
kate. (2020, September 25). APT-C-43 steals Venezuelan military secrets to provide intelligence support for the reactionaries — HpReact campaign. Retrieved November 20, 2020.
Internal MISP references
UUID 682c843d-1bb8-4f30-9d2e-35e8d41b1976
which can be used as unique global reference for 360 Machete Sep 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-11-20T00:00:00Z |
date_published | 2020-09-25T00:00:00Z |
source | MITRE, Tidal Cyber |
title | APT-C-43 steals Venezuelan military secrets to provide intelligence support for the reactionaries — HpReact campaign |
Cycraft Chimera April 2020
Cycraft. (2020, April 15). APT Group Chimera - APT Operation Skeleton key Targets Taiwan Semiconductor Vendors. Retrieved August 24, 2020..
Internal MISP references
UUID a5a14a4e-2214-44ab-9067-75429409d744
which can be used as unique global reference for Cycraft Chimera April 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-08-24T00:00:00Z |
date_published | 2020-04-15T00:00:00Z |
source | MITRE |
title | APT Group Chimera - APT Operation Skeleton key Targets Taiwan Semiconductor Vendors |
CISA IT Service Providers
CISA. (n.d.). APTs Targeting IT Service Provider Customers. Retrieved November 16, 2020.
Internal MISP references
UUID b8bee7f9-155e-4765-9492-01182e4435b7
which can be used as unique global reference for CISA IT Service Providers
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-11-16T00:00:00Z |
source | MITRE |
title | APTs Targeting IT Service Provider Customers |
Securelist GCMAN
Kaspersky Lab's Global Research & Analysis Team. (2016, February 8). APT-style bank robberies increase with Metel, GCMAN and Carbanak 2.0 attacks. Retrieved April 20, 2016.
Internal MISP references
UUID 1f07f234-50f0-4c1e-942a-a01d3f733161
which can be used as unique global reference for Securelist GCMAN
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-04-20T00:00:00Z |
date_published | 2016-02-08T00:00:00Z |
source | MITRE, Tidal Cyber |
title | APT-style bank robberies increase with Metel, GCMAN and Carbanak 2.0 attacks |
Proofpoint TA459 April 2017
Axel F. (2017, April 27). APT Targets Financial Analysts with CVE-2017-0199. Retrieved February 15, 2018.
Internal MISP references
UUID dabad6df-1e31-4c16-9217-e079f2493b02
which can be used as unique global reference for Proofpoint TA459 April 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-02-15T00:00:00Z |
date_published | 2017-04-27T00:00:00Z |
source | MITRE, Tidal Cyber |
title | APT Targets Financial Analysts with CVE-2017-0199 |
Kaspersky ToddyCat June 2022
Dedola, G. (2022, June 21). APT ToddyCat. Retrieved January 3, 2024.
Internal MISP references
UUID 285c038b-e5fc-57ef-9a98-d9e24c52e2cf
which can be used as unique global reference for Kaspersky ToddyCat June 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-01-03T00:00:00Z |
date_published | 2022-06-21T00:00:00Z |
source | MITRE |
title | APT ToddyCat |
Securelist APT Trends April 2018
Global Research and Analysis Team . (2018, April 12). APT Trends report Q1 2018. Retrieved January 27, 2021.
Internal MISP references
UUID 587f5195-e696-4a3c-8c85-90b9c002cd11
which can be used as unique global reference for Securelist APT Trends April 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-01-27T00:00:00Z |
date_published | 2018-04-12T00:00:00Z |
source | MITRE |
title | APT Trends report Q1 2018 |
Kaspersky APT Trends Q1 2020
Global Research and Analysis Team. (2020, April 30). APT trends report Q1 2020. Retrieved September 19, 2022.
Internal MISP references
UUID 23c91719-5ebe-4d03-8018-df1809fffd2f
which can be used as unique global reference for Kaspersky APT Trends Q1 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-09-19T00:00:00Z |
date_published | 2020-04-30T00:00:00Z |
source | MITRE |
title | APT trends report Q1 2020 |
Kaspersky APT Trends Q1 April 2021
GReAT . (2021, April 27). APT trends report Q1 2021. Retrieved June 6, 2022.
Internal MISP references
UUID 3fd0ba3b-7919-46d3-a444-50508603956f
which can be used as unique global reference for Kaspersky APT Trends Q1 April 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-06-06T00:00:00Z |
date_published | 2021-04-27T00:00:00Z |
source | MITRE |
title | APT trends report Q1 2021 |
Securelist APT Trends Q2 2017
Kaspersky Lab's Global Research & Analysis Team. (2017, August 8). APT Trends report Q2 2017. Retrieved February 15, 2018.
Internal MISP references
UUID fe28042c-d289-463f-9ece-1a75a70b966e
which can be used as unique global reference for Securelist APT Trends Q2 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-02-15T00:00:00Z |
date_published | 2017-08-08T00:00:00Z |
source | MITRE |
title | APT Trends report Q2 2017 |
Wired ArcaneDoor April 24 2024
Andy Greenberg. (2024, April 24). ‘ArcaneDoor’ Cyberspies Hacked Cisco Firewalls to Access Government Networks. Retrieved May 6, 2024.
Internal MISP references
UUID 05a8afd3-0173-41ca-b23b-196ea0f3b1c1
which can be used as unique global reference for Wired ArcaneDoor April 24 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-05-06T00:00:00Z |
date_published | 2024-04-24T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | ‘ArcaneDoor’ Cyberspies Hacked Cisco Firewalls to Access Government Networks |
Cisco Talos ArcaneDoor April 24 2024
Cisco Talos. (2024, April 24). ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices. Retrieved May 6, 2024.
Internal MISP references
UUID 531c3f6f-2d2b-4774-b069-e2b7a13602c1
which can be used as unique global reference for Cisco Talos ArcaneDoor April 24 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-05-06T00:00:00Z |
date_published | 2024-04-24T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices |
Wald0 Guide to GPOs
Robbins, A. (2018, April 2). A Red Teamer’s Guide to GPOs and OUs. Retrieved March 5, 2019.
Internal MISP references
UUID 48bb84ac-56c8-4840-9a11-2cc76213e24e
which can be used as unique global reference for Wald0 Guide to GPOs
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-03-05T00:00:00Z |
date_published | 2018-04-02T00:00:00Z |
source | MITRE |
title | A Red Teamer’s Guide to GPOs and OUs |
Lau 2011
Lau, H. (2011, August 8). Are MBR Infections Back in Fashion? (Infographic). Retrieved November 13, 2014.
Internal MISP references
UUID fa809aab-5051-4f9c-8e27-b5989608b03c
which can be used as unique global reference for Lau 2011
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2014-11-13T00:00:00Z |
date_published | 2011-08-08T00:00:00Z |
source | MITRE |
title | Are MBR Infections Back in Fashion? (Infographic) |
Krebs-Booter
Brian Krebs. (2016, October 27). Are the Days of “Booter” Services Numbered?. Retrieved May 15, 2017.
Internal MISP references
UUID d29a88ae-273b-439e-8808-dc9931f1ff72
which can be used as unique global reference for Krebs-Booter
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-05-15T00:00:00Z |
date_published | 2016-10-27T00:00:00Z |
source | MITRE |
title | Are the Days of “Booter” Services Numbered? |
RSA Forfiles Aug 2017
Partington, E. (2017, August 14). Are you looking out for forfiles.exe (if you are watching for cmd.exe). Retrieved January 22, 2018.
Internal MISP references
UUID 923d6d3e-6117-43a5-92c6-ea0c131355c2
which can be used as unique global reference for RSA Forfiles Aug 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-01-22T00:00:00Z |
date_published | 2017-08-14T00:00:00Z |
source | MITRE |
title | Are you looking out for forfiles.exe (if you are watching for cmd.exe) |
FireEye Respond Webinar July 2017
Scavella, T. and Rifki, A. (2017, July 20). Are you Ready to Respond? (Webinar). Retrieved October 4, 2017.
Internal MISP references
UUID e7091d66-7faa-49d6-b16f-be1f79db4471
which can be used as unique global reference for FireEye Respond Webinar July 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-10-04T00:00:00Z |
date_published | 2017-07-20T00:00:00Z |
source | MITRE |
title | Are you Ready to Respond? (Webinar) |
Browser-updates
Dusty Miller. (2023, October 17). Are You Sure Your Browser is Up to Date? The Current Landscape of Fake Browser Updates . Retrieved February 13, 2024.
Internal MISP references
UUID 89e913a8-1d52-53fe-b692-fb72e21d794f
which can be used as unique global reference for Browser-updates
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-02-13T00:00:00Z |
date_published | 2023-10-17T00:00:00Z |
source | MITRE |
title | Are You Sure Your Browser is Up to Date? The Current Landscape of Fake Browser Updates |
Sekoia.io AridViper
Threat & Detection Research Team. (2023, October 26). AridViper, an intrusion set allegedly associated with Hamas. Retrieved October 30, 2023.
Internal MISP references
UUID 963a97b9-71b2-46e7-8315-1d7ef76d832c
which can be used as unique global reference for Sekoia.io AridViper
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-10-30T00:00:00Z |
date_published | 2023-10-26T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | AridViper, an intrusion set allegedly associated with Hamas |
TechNet Arp
Microsoft. (n.d.). Arp. Retrieved April 17, 2016.
Internal MISP references
UUID 7714222e-8046-4884-b460-493d9ef46305
which can be used as unique global reference for TechNet Arp
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-04-17T00:00:00Z |
source | MITRE |
title | Arp |
Cisco ARP Poisoning Mitigation 2016
King, J., Lauerman, K. (2016, January 22). ARP Poisoning (Man-in-the-Middle) Attack and Mitigation Technique. Retrieved October 15, 2020.
Internal MISP references
UUID 715cd044-f5ef-4cad-8741-308d104f05a5
which can be used as unique global reference for Cisco ARP Poisoning Mitigation 2016
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-15T00:00:00Z |
date_published | 2016-01-22T00:00:00Z |
source | MITRE |
title | ARP Poisoning (Man-in-the-Middle) Attack and Mitigation Technique |
ASEC Emotet 2017
ASEC. (2017). ASEC REPORT VOL.88. Retrieved April 16, 2019.
Internal MISP references
UUID a02e3bbf-5864-4ccf-8b6f-5f8452395670
which can be used as unique global reference for ASEC Emotet 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-04-16T00:00:00Z |
date_published | 2017-01-01T00:00:00Z |
source | MITRE |
title | ASEC REPORT VOL.88 |
ASERT Seven Pointed Dagger Aug 2015
ASERT. (2015, August). ASERT Threat Intelligence Report – Uncovering the Seven Pointed Dagger. Retrieved March 19, 2018.
Internal MISP references
UUID a8f323c7-82bc-46e6-bd6c-0b631abc644a
which can be used as unique global reference for ASERT Seven Pointed Dagger Aug 2015
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-03-19T00:00:00Z |
date_published | 2015-08-01T00:00:00Z |
source | MITRE |
title | ASERT Threat Intelligence Report – Uncovering the Seven Pointed Dagger |
Securelist Sofacy Feb 2018
Kaspersky Lab's Global Research & Analysis Team. (2018, February 20). A Slice of 2017 Sofacy Activity. Retrieved November 27, 2018.
Internal MISP references
UUID 3a043bba-2451-4765-946b-c1f3bf4aea36
which can be used as unique global reference for Securelist Sofacy Feb 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-11-27T00:00:00Z |
date_published | 2018-02-20T00:00:00Z |
source | MITRE |
title | A Slice of 2017 Sofacy Activity |
THE FINANCIAL TIMES LTD 2019.
THE FINANCIAL TIMES. (2019, September 2). A sobering day. Retrieved October 8, 2019.
Internal MISP references
UUID 5a01f0b7-86f7-44a1-bf35-46a631402ceb
which can be used as unique global reference for THE FINANCIAL TIMES LTD 2019.
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-10-08T00:00:00Z |
date_published | 2019-09-02T00:00:00Z |
source | MITRE |
title | A sobering day |
Aspnet_Compiler.exe - LOLBAS Project
LOLBAS. (2021, September 26). Aspnet_Compiler.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 15864c56-115e-4163-b816-03bdb9bfd5c5
which can be used as unique global reference for Aspnet_Compiler.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2021-09-26T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Aspnet_Compiler.exe |
Mandiant UNC2452 APT29 April 2022
Mandiant. (2020, April 27). Assembling the Russian Nesting Doll: UNC2452 Merged into APT29. Retrieved March 26, 2023.
Internal MISP references
UUID 5276508c-6792-56be-b757-e4b495ef6c37
which can be used as unique global reference for Mandiant UNC2452 APT29 April 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-26T00:00:00Z |
date_published | 2020-04-27T00:00:00Z |
source | MITRE |
title | Assembling the Russian Nesting Doll: UNC2452 Merged into APT29 |
Microsoft AssemblyLoad
Microsoft. (n.d.). Assembly.Load Method. Retrieved February 9, 2024.
Internal MISP references
UUID 3d980d7a-7074-5812-9bb1-ca8e27e028bd
which can be used as unique global reference for Microsoft AssemblyLoad
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-02-09T00:00:00Z |
source | MITRE |
title | Assembly.Load Method |
Kubernetes Assigning Pods to Nodes
Kubernetes. (n.d.). Assigning Pods to Nodes. Retrieved February 15, 2024.
Internal MISP references
UUID fe6ba97b-ff61-541b-9a67-a835290dc4ab
which can be used as unique global reference for Kubernetes Assigning Pods to Nodes
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-02-15T00:00:00Z |
source | MITRE |
title | Assigning Pods to Nodes |
Microsoft Assoc Oct 2017
Plett, C. et al.. (2017, October 15). assoc. Retrieved August 7, 2018.
Internal MISP references
UUID 63fb65d7-6423-42de-b868-37fbc2bc133d
which can be used as unique global reference for Microsoft Assoc Oct 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-08-07T00:00:00Z |
date_published | 2017-10-15T00:00:00Z |
source | MITRE |
title | assoc |
Rhino Security Labs Enumerating AWS Roles
Spencer Gietzen. (2018, August 8). Assume the Worst: Enumerating AWS Roles through ‘AssumeRole’. Retrieved April 1, 2022.
Internal MISP references
UUID f403fc54-bdac-415a-9cc0-78803dd84214
which can be used as unique global reference for Rhino Security Labs Enumerating AWS Roles
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-04-01T00:00:00Z |
date_published | 2018-08-08T00:00:00Z |
source | MITRE |
title | Assume the Worst: Enumerating AWS Roles through ‘AssumeRole’ |
Cybereason Astaroth Feb 2019
Salem, E. (2019, February 13). ASTAROTH MALWARE USES LEGITIMATE OS AND ANTIVIRUS PROCESSES TO STEAL PASSWORDS AND PERSONAL DATA. Retrieved April 17, 2019.
Internal MISP references
UUID eb4dc1f8-c6e7-4d6c-9258-b03a0ae64d2e
which can be used as unique global reference for Cybereason Astaroth Feb 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-04-17T00:00:00Z |
date_published | 2019-02-13T00:00:00Z |
source | MITRE |
title | ASTAROTH MALWARE USES LEGITIMATE OS AND ANTIVIRUS PROCESSES TO STEAL PASSWORDS AND PERSONAL DATA |
spamhaus-malvertising
Miller, Sarah. (2023, February 2). A surge of malvertising across Google Ads is distributing dangerous malware. Retrieved February 21, 2023.
Internal MISP references
UUID 15a4d429-28c3-52be-aeb8-d94ad2743866
which can be used as unique global reference for spamhaus-malvertising
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-02-21T00:00:00Z |
date_published | 2023-02-02T00:00:00Z |
source | MITRE |
title | A surge of malvertising across Google Ads is distributing dangerous malware |
Lua Proofpoint Sunseed
Raggi, Michael. Cass, Zydeca. The Proofpoint Threat Research Team.. (2022, March 1). Asylum Ambuscade: State Actor Uses Lua-based Sunseed Malware to Target European Governments and Refugee Movement. Retrieved August 5, 2024.
Internal MISP references
UUID 313e8333-0512-50d4-a7f6-4294dc935003
which can be used as unique global reference for Lua Proofpoint Sunseed
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-08-05T00:00:00Z |
date_published | 2022-03-01T00:00:00Z |
source | MITRE |
title | Asylum Ambuscade: State Actor Uses Lua-based Sunseed Malware to Target European Governments and Refugee Movement |
Microsoft APC
Microsoft. (n.d.). Asynchronous Procedure Calls. Retrieved December 8, 2017.
Internal MISP references
UUID 37f1ef6c-fc0e-4e47-85ab-20d53caba77e
which can be used as unique global reference for Microsoft APC
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-08T00:00:00Z |
source | MITRE |
title | Asynchronous Procedure Calls |
Medium February 08 2023
Hack sydney. (2023, February 8). AsyncRAT: Analysing the Three Stages of Execution. Retrieved May 7, 2023.
Internal MISP references
UUID 86a69887-8d23-460f-9a51-96a10bfb3c29
which can be used as unique global reference for Medium February 08 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-07T00:00:00Z |
date_published | 2023-02-08T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | AsyncRAT: Analysing the Three Stages of Execution |
AsyncRAT Crusade: Detections and Defense | Splunk
Splunk-Blogs. (n.d.). AsyncRAT Crusade: Detections and Defense. Retrieved May 7, 2023.
Internal MISP references
UUID 2869d93c-d3fe-475e-adc9-ab6eb7e26c0f
which can be used as unique global reference for AsyncRAT Crusade: Detections and Defense | Splunk
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-07T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | AsyncRAT Crusade: Detections and Defense |
TechNet At
Microsoft. (n.d.). At. Retrieved April 28, 2016.
Internal MISP references
UUID 31b40c09-d68f-4889-b585-c077bd9cef28
which can be used as unique global reference for TechNet At
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-04-28T00:00:00Z |
source | MITRE |
title | At |
Die.net Linux at Man Page
Thomas Koenig. (n.d.). at(1) - Linux man page. Retrieved December 19, 2017.
Internal MISP references
UUID 4bc1389d-9586-4dfc-a67c-58c6d3f6796a
which can be used as unique global reference for Die.net Linux at Man Page
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-19T00:00:00Z |
source | MITRE |
title | at(1) - Linux man page |
Linux at
IEEE/The Open Group. (2017). at(1p) — Linux manual page. Retrieved February 25, 2022.
Internal MISP references
UUID 3e3a84bc-ab6d-460d-8abc-cafae6eaaedd
which can be used as unique global reference for Linux at
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-02-25T00:00:00Z |
date_published | 2017-01-01T00:00:00Z |
source | MITRE |
title | at(1p) — Linux manual page |
PWC Pirpi Scanbox
Lancaster, T. (2015, July 25). A tale of Pirpi, Scanbox & CVE-2015-3113. Retrieved March 30, 2016.
Internal MISP references
UUID 4904261a-a3a9-4c3e-b6a7-079890026ee2
which can be used as unique global reference for PWC Pirpi Scanbox
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-03-30T00:00:00Z |
date_published | 2015-07-25T00:00:00Z |
source | MITRE |
title | A tale of Pirpi, Scanbox & CVE-2015-3113 |
Atbroker.exe - LOLBAS Project
LOLBAS. (2018, May 25). Atbroker.exe. Retrieved December 4, 2023.
Internal MISP references
UUID b0c21b56-6591-49c3-8e67-328ddb7b436d
which can be used as unique global reference for Atbroker.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2018-05-25T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Atbroker.exe |
ESET Attor Oct 2019
Hromcova, Z. (2019, October). AT COMMANDS, TOR-BASED COMMUNICATIONS: MEET ATTOR, A FANTASY CREATURE AND ALSO A SPY PLATFORM. Retrieved May 6, 2020.
Internal MISP references
UUID fdd57c56-d989-4a6f-8cc5-5b3713605dec
which can be used as unique global reference for ESET Attor Oct 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-05-06T00:00:00Z |
date_published | 2019-10-01T00:00:00Z |
source | MITRE |
title | AT COMMANDS, TOR-BASED COMMUNICATIONS: MEET ATTOR, A FANTASY CREATURE AND ALSO A SPY PLATFORM |
LogRhythm WannaCry
Noerenberg, E., Costis, A., and Quist, N. (2017, May 16). A Technical Analysis of WannaCry Ransomware. Retrieved March 25, 2019.
Internal MISP references
UUID 305d0742-154a-44af-8686-c6d8bd7f8636
which can be used as unique global reference for LogRhythm WannaCry
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-03-25T00:00:00Z |
date_published | 2017-05-16T00:00:00Z |
source | MITRE |
title | A Technical Analysis of WannaCry Ransomware |
Malwarebytes Dyreza November 2015
hasherezade. (2015, November 4). A Technical Look At Dyreza. Retrieved June 15, 2020.
Internal MISP references
UUID 0a5719f2-8a88-44e2-81c5-2d16a39f1f8d
which can be used as unique global reference for Malwarebytes Dyreza November 2015
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-06-15T00:00:00Z |
date_published | 2015-11-04T00:00:00Z |
source | MITRE |
title | A Technical Look At Dyreza |
At.exe - LOLBAS Project
LOLBAS. (2019, September 20). At.exe. Retrieved December 4, 2023.
Internal MISP references
UUID a31e1f5c-9b8d-4af4-875b-5c03d2400c12
which can be used as unique global reference for At.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2019-09-20T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | At.exe |
ENSIL AtomBombing Oct 2016
Liberman, T. (2016, October 27). ATOMBOMBING: BRAND NEW CODE INJECTION FOR WINDOWS. Retrieved December 8, 2017.
Internal MISP references
UUID 9282dbab-391c-4ffd-ada9-1687413b686b
which can be used as unique global reference for ENSIL AtomBombing Oct 2016
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-08T00:00:00Z |
date_published | 2016-10-27T00:00:00Z |
source | MITRE |
title | ATOMBOMBING: BRAND NEW CODE INJECTION FOR WINDOWS |
SentinelOne 5 3 2023
Phil Stokes. (2023, May 3). Atomic Stealer . Retrieved January 1, 2024.
Internal MISP references
UUID c4721cab-2895-48ed-bfde-748aa3c80209
which can be used as unique global reference for SentinelOne 5 3 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-01-01T00:00:00Z |
date_published | 2023-05-03T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Atomic Stealer |
Malwarebytes 1 10 2024
Jerome Segura. (2024, January 10). Atomic Stealer rings in the new year with updated version . Retrieved January 11, 2024.
Internal MISP references
UUID 660de1b0-574d-48df-865a-257b8ed4b928
which can be used as unique global reference for Malwarebytes 1 10 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-01-11T00:00:00Z |
date_published | 2024-01-10T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Atomic Stealer rings in the new year with updated version |
FireEye TRITON 2018
Miller, S. Reese, E. (2018, June 7). A Totally Tubular Treatise on TRITON and TriStation. Retrieved January 6, 2021.
Internal MISP references
UUID bfa5886a-a7f4-40d1-98d0-c3358abcf265
which can be used as unique global reference for FireEye TRITON 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-01-06T00:00:00Z |
date_published | 2018-06-07T00:00:00Z |
source | MITRE |
title | A Totally Tubular Treatise on TRITON and TriStation |
The DFIR Report Truebot June 12 2023
The DFIR Report. (2023, June 12). A Truly Graceful Wipe Out. Retrieved June 15, 2023.
Internal MISP references
UUID a6311a66-bb36-4cad-a98f-2b0b89aafa3d
which can be used as unique global reference for The DFIR Report Truebot June 12 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-06-15T00:00:00Z |
date_published | 2023-06-12T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | A Truly Graceful Wipe Out |
DFIR Report Trickbot June 2023
The DFIR Report. (2023, June 12). A Truly Graceful Wipe Out. Retrieved May 31, 2024.
Internal MISP references
UUID b65988a7-3469-54d2-804c-e8ce1f698b5c
which can be used as unique global reference for DFIR Report Trickbot June 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-05-31T00:00:00Z |
date_published | 2023-06-12T00:00:00Z |
source | MITRE |
title | A Truly Graceful Wipe Out |
att_def_ps_logging
Hao, M. (2019, February 27). Attack and Defense Around PowerShell Event Logging. Retrieved November 24, 2021.
Internal MISP references
UUID 52212570-b1a6-4249-99d4-3bcf66c27140
which can be used as unique global reference for att_def_ps_logging
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-11-24T00:00:00Z |
date_published | 2019-02-27T00:00:00Z |
source | MITRE |
title | Attack and Defense Around PowerShell Event Logging |
Attack chain leads to XWORM and AGENTTESLA | Elastic
Elastic Blog. (2023, April 7). Attack chain leads to XWORM and AGENTTESLA. Retrieved May 10, 2023.
Internal MISP references
UUID 9b32397b-58be-4275-a701-fe0351ff2982
which can be used as unique global reference for Attack chain leads to XWORM and AGENTTESLA | Elastic
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-10T00:00:00Z |
date_published | 2023-04-07T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Attack chain leads to XWORM and AGENTTESLA |
Intezer TeamTNT September 2020
Fishbein, N. (2020, September 8). Attackers Abusing Legitimate Cloud Monitoring Tools to Conduct Cyber Attacks. Retrieved September 22, 2021.
Internal MISP references
UUID 1155a45e-86f4-497a-9a03-43b6dcb25202
which can be used as unique global reference for Intezer TeamTNT September 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-22T00:00:00Z |
date_published | 2020-09-08T00:00:00Z |
source | MITRE |
title | Attackers Abusing Legitimate Cloud Monitoring Tools to Conduct Cyber Attacks |
Metcalf 2015
Metcalf, S. (2015, January 19). Attackers Can Now Use Mimikatz to Implant Skeleton Key on Domain Controllers & BackDoor Your Active Directory Forest. Retrieved February 3, 2015.
Internal MISP references
UUID 1c899028-466c-49b0-8d64-1a954c812508
which can be used as unique global reference for Metcalf 2015
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2015-02-03T00:00:00Z |
date_published | 2015-01-19T00:00:00Z |
source | MITRE |
title | Attackers Can Now Use Mimikatz to Implant Skeleton Key on Domain Controllers & BackDoor Your Active Directory Forest |
Cisco Blog Legacy Device Attacks
Omar Santos. (2020, October 19). Attackers Continue to Target Legacy Devices. Retrieved October 20, 2020.
Internal MISP references
UUID f7ce5099-7e04-4c0b-8767-e0eec664b18e
which can be used as unique global reference for Cisco Blog Legacy Device Attacks
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-20T00:00:00Z |
date_published | 2020-10-19T00:00:00Z |
source | MITRE |
title | Attackers Continue to Target Legacy Devices |
FireEye TRITON 2017
Johnson, B, et. al. (2017, December 14). Attackers Deploy New ICS Attack Framework "TRITON" and Cause Operational Disruption to Critical Infrastructure. Retrieved January 6, 2021.
Internal MISP references
UUID 597a4d8b-ffb2-4551-86db-b319f5a5b707
which can be used as unique global reference for FireEye TRITON 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-01-06T00:00:00Z |
date_published | 2017-12-14T00:00:00Z |
source | MITRE |
title | Attackers Deploy New ICS Attack Framework "TRITON" and Cause Operational Disruption to Critical Infrastructure |
FireEye TRITON Dec 2017
Blake Johnson, Dan Caban, Marina Krotofil, Dan Scali, Nathan Brubaker, Christopher Glyer. (2017, December 14). Attackers Deploy New ICS Attack Framework “TRITON” and Cause Operational Disruption to Critical Infrastructure. Retrieved January 12, 2018.
Internal MISP references
UUID d4ca3351-eeb8-5342-8c85-806614e22c48
which can be used as unique global reference for FireEye TRITON Dec 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-01-12T00:00:00Z |
date_published | 2017-12-14T00:00:00Z |
source | MITRE |
title | Attackers Deploy New ICS Attack Framework “TRITON” and Cause Operational Disruption to Critical Infrastructure |
Forbes GitHub Creds
Sandvik, R. (2014, January 14). Attackers Scrape GitHub For Cloud Service Credentials, Hijack Account To Mine Virtual Currency. Retrieved October 19, 2020.
Internal MISP references
UUID 303f8801-bdd6-4a0c-a90a-37867898c99c
which can be used as unique global reference for Forbes GitHub Creds
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-19T00:00:00Z |
date_published | 2014-01-14T00:00:00Z |
source | MITRE |
title | Attackers Scrape GitHub For Cloud Service Credentials, Hijack Account To Mine Virtual Currency |
GitHub Cloud Service Credentials
Runa A. Sandvik. (2014, January 14). Attackers Scrape GitHub For Cloud Service Credentials, Hijack Account To Mine Virtual Currency. Retrieved August 9, 2022.
Internal MISP references
UUID d2186b8c-10c9-493b-8e25-7d69fce006e4
which can be used as unique global reference for GitHub Cloud Service Credentials
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-08-09T00:00:00Z |
date_published | 2014-01-14T00:00:00Z |
source | MITRE |
title | Attackers Scrape GitHub For Cloud Service Credentials, Hijack Account To Mine Virtual Currency |
Unit 42 Unsecured Docker Daemons
Chen, J.. (2020, January 29). Attacker's Tactics and Techniques in Unsecured Docker Daemons Revealed. Retrieved March 31, 2021.
Internal MISP references
UUID efcbbbdd-9af1-46c2-8538-3fd22f2b67d2
which can be used as unique global reference for Unit 42 Unsecured Docker Daemons
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-03-31T00:00:00Z |
date_published | 2020-01-29T00:00:00Z |
source | MITRE |
title | Attacker's Tactics and Techniques in Unsecured Docker Daemons Revealed |
Talos Roblox Scam 2023
Tiago Pereira. (2023, November 2). Attackers use JavaScript URLs, API forms and more to scam users in popular online game “Roblox”. Retrieved January 2, 2024.
Internal MISP references
UUID 9371ee4a-ac23-5acb-af3f-132ef3645392
which can be used as unique global reference for Talos Roblox Scam 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-01-02T00:00:00Z |
date_published | 2023-11-02T00:00:00Z |
source | MITRE |
title | Attackers use JavaScript URLs, API forms and more to scam users in popular online game “Roblox” |
Black Hills Attacking Exchange MailSniper, 2016
Bullock, B.. (2016, October 3). Attacking Exchange with MailSniper. Retrieved October 6, 2019.
Internal MISP references
UUID adedfddc-29b7-4245-aa67-cc590acb7434
which can be used as unique global reference for Black Hills Attacking Exchange MailSniper, 2016
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-10-06T00:00:00Z |
date_published | 2016-10-03T00:00:00Z |
source | MITRE |
title | Attacking Exchange with MailSniper |
SANS Attacking Kerberos Nov 2014
Medin, T. (2014, November). Attacking Kerberos - Kicking the Guard Dog of Hades. Retrieved March 22, 2018.
Internal MISP references
UUID f20d6bd0-d699-4ee4-8ef6-3c45ec12cd42
which can be used as unique global reference for SANS Attacking Kerberos Nov 2014
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-03-22T00:00:00Z |
date_published | 2014-11-01T00:00:00Z |
source | MITRE |
title | Attacking Kerberos - Kicking the Guard Dog of Hades |
NetSPI SQL Server CLR
Sutherland, S. (2017, July 13). Attacking SQL Server CLR Assemblies. Retrieved September 12, 2024.
Internal MISP references
UUID 6f3d8c89-9d5d-4754-98d5-44fe3a5dd0d5
which can be used as unique global reference for NetSPI SQL Server CLR
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-12T00:00:00Z |
date_published | 2017-07-13T00:00:00Z |
source | MITRE |
title | Attacking SQL Server CLR Assemblies |
Mandiant FIN5 GrrCON Oct 2016
Bromiley, M. and Lewis, P. (2016, October 7). Attacking the Hospitality and Gaming Industries: Tracking an Attacker Around the World in 7 Years. Retrieved October 6, 2017.
Internal MISP references
UUID 2bd39baf-4223-4344-ba93-98aa8453dc11
which can be used as unique global reference for Mandiant FIN5 GrrCON Oct 2016
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-10-06T00:00:00Z |
date_published | 2016-10-07T00:00:00Z |
source | MITRE |
title | Attacking the Hospitality and Gaming Industries: Tracking an Attacker Around the World in 7 Years |
Attacking VNC Servers PentestLab
Administrator, Penetration Testing Lab. (2012, October 30). Attacking VNC Servers. Retrieved October 6, 2021.
Internal MISP references
UUID f953ea41-f9ca-4f4e-a46f-ef1d2def1d07
which can be used as unique global reference for Attacking VNC Servers PentestLab
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-06T00:00:00Z |
date_published | 2012-10-30T00:00:00Z |
source | MITRE |
title | Attacking VNC Servers |
Talos Template Injection July 2017
Baird, S. et al.. (2017, July 7). Attack on Critical Infrastructure Leverages Template Injection. Retrieved July 21, 2018.
Internal MISP references
UUID 175ea537-2a94-42c7-a83b-bec8906ee6b9
which can be used as unique global reference for Talos Template Injection July 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-07-21T00:00:00Z |
date_published | 2017-07-07T00:00:00Z |
source | MITRE |
title | Attack on Critical Infrastructure Leverages Template Injection |
Lotus Blossom Dec 2015
Falcone, R. and Miller-Osborn, J.. (2015, December 18). Attack on French Diplomat Linked to Operation Lotus Blossom. Retrieved February 15, 2016.
Internal MISP references
UUID dcbe51a0-6d63-4401-b19e-46cd3c42204c
which can be used as unique global reference for Lotus Blossom Dec 2015
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-02-15T00:00:00Z |
date_published | 2015-12-18T00:00:00Z |
source | MITRE |
title | Attack on French Diplomat Linked to Operation Lotus Blossom |
Symantec Attacks Against Government Sector
Symantec. (2021, June 10). Attacks Against the Government Sector. Retrieved September 28, 2021.
Internal MISP references
UUID f5940cc2-1bbd-4e42-813a-f50867b01035
which can be used as unique global reference for Symantec Attacks Against Government Sector
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-28T00:00:00Z |
date_published | 2021-06-10T00:00:00Z |
source | MITRE |
title | Attacks Against the Government Sector |
Aqua Security Cloud Native Threat Report June 2021
Team Nautilus. (2021, June). Attacks in the Wild on the Container Supply Chain and Infrastructure. Retrieved August 26, 2021.
Internal MISP references
UUID be9652d5-7531-4143-9c44-aefd019b7a32
which can be used as unique global reference for Aqua Security Cloud Native Threat Report June 2021
in MISP communities and other software using the MISP galaxy
External references
- https://info.aquasec.com/hubfs/Threat%20reports/AquaSecurity_Cloud_Native_Threat_Report_2021.pdf?utm_campaign=WP%20-%20Jun2021%20Nautilus%202021%20Threat%20Research%20Report&utm_medium=email&_hsmi=132931006&_hsenc=p2ANqtz-_8oopT5Uhqab8B7kE0l3iFo1koirxtyfTehxF7N-EdGYrwk30gfiwp5SiNlW3G0TNKZxUcDkYOtwQ9S6nNVNyEO-Dgrw&utm_content=132931006&utm_source=hs_automation - webarchive
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-08-26T00:00:00Z |
date_published | 2021-06-01T00:00:00Z |
source | MITRE |
title | Attacks in the Wild on the Container Supply Chain and Infrastructure |
CERT-FR PYSA April 2020
CERT-FR. (2020, April 1). ATTACKS INVOLVING THE MESPINOZA/PYSA RANSOMWARE. Retrieved March 1, 2021.
Internal MISP references
UUID 4e502db6-2e09-4422-9dcc-1e10e701e122
which can be used as unique global reference for CERT-FR PYSA April 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-03-01T00:00:00Z |
date_published | 2020-04-01T00:00:00Z |
source | MITRE |
title | ATTACKS INVOLVING THE MESPINOZA/PYSA RANSOMWARE |
InsiderThreat NTFS EA Oct 2017
Sander, J. (2017, October 12). Attack Step 3: Persistence with NTFS Extended Attributes – File System Attacks. Retrieved March 21, 2018.
Internal MISP references
UUID 6d270128-0461-43ec-8925-204c7b5aacc9
which can be used as unique global reference for InsiderThreat NTFS EA Oct 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-03-21T00:00:00Z |
date_published | 2017-10-12T00:00:00Z |
source | MITRE |
title | Attack Step 3: Persistence with NTFS Extended Attributes – File System Attacks |
Microsoft ASR Obfuscation
Microsoft. (2023, February 22). Attack surface reduction (ASR) rules reference: Block execution of potentially obfuscated scripts. Retrieved March 17, 2023.
Internal MISP references
UUID dec646d4-8b32-5091-b097-abe887aeca96
which can be used as unique global reference for Microsoft ASR Obfuscation
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-17T00:00:00Z |
date_published | 2023-02-22T00:00:00Z |
source | MITRE |
title | Attack surface reduction (ASR) rules reference: Block execution of potentially obfuscated scripts |
Obfuscated scripts
Microsoft. (2024, March 4). Attack surface reduction rules reference. Retrieved March 29, 2024.
Internal MISP references
UUID 2b4dcb27-f32e-50f0-83e0-350659e49f0b
which can be used as unique global reference for Obfuscated scripts
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-29T00:00:00Z |
date_published | 2024-03-04T00:00:00Z |
source | MITRE |
title | Attack surface reduction rules reference |
Sophos News August 27 2024
Andreas Klopsch. (2024, August 27). Attack tool update impairs Windows computers. Retrieved August 30, 2024.
Internal MISP references
UUID af1dfc7b-fdc2-448f-a4bf-34f8ee7d55bc
which can be used as unique global reference for Sophos News August 27 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-08-30T00:00:00Z |
date_published | 2024-08-27T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Attack tool update impairs Windows computers |
TrendMicro Msiexec Feb 2018
Co, M. and Sison, G. (2018, February 8). Attack Using Windows Installer msiexec.exe leads to LokiBot. Retrieved April 18, 2019.
Internal MISP references
UUID 768c99f3-ee28-47dc-bc33-06d50ac72dea
which can be used as unique global reference for TrendMicro Msiexec Feb 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-04-18T00:00:00Z |
date_published | 2018-02-08T00:00:00Z |
source | MITRE |
title | Attack Using Windows Installer msiexec.exe leads to LokiBot |
GitHub ATTACK Empire
Stepanic, D. (2018, September 2). attck_empire: Generate ATT&CK Navigator layer file from PowerShell Empire agent logs. Retrieved March 11, 2019.
Internal MISP references
UUID b3d6bb33-2b23-4c0a-b8fa-e002a5c7edfc
which can be used as unique global reference for GitHub ATTACK Empire
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-03-11T00:00:00Z |
date_published | 2018-09-02T00:00:00Z |
source | MITRE |
title | attck_empire: Generate ATT&CK Navigator layer file from PowerShell Empire agent logs |
lambert systemd 2022
Tony Lambert. (2022, November 13). ATT&CK T1501: Understanding systemd service persistence. Retrieved March 20, 2023.
Internal MISP references
UUID 196f0c77-4c98-57e7-ad79-eb43bdd2c848
which can be used as unique global reference for lambert systemd 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-20T00:00:00Z |
date_published | 2022-11-13T00:00:00Z |
source | MITRE |
title | ATT&CK T1501: Understanding systemd service persistence |
TechNet Credential Theft
Microsoft. (2016, April 15). Attractive Accounts for Credential Theft. Retrieved June 3, 2016.
Internal MISP references
UUID 5c183c97-0ab2-4b75-8dbc-9db92a929ff4
which can be used as unique global reference for TechNet Credential Theft
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-06-03T00:00:00Z |
date_published | 2016-04-15T00:00:00Z |
source | MITRE |
title | Attractive Accounts for Credential Theft |
AcidRain State Department 2022
Antony J. Blinken, US Department of State. (2022, May 10). Attribution of Russia’s Malicious Cyber Activity Against Ukraine. Retrieved March 25, 2024.
Internal MISP references
UUID 9d514c52-9def-5b11-aa06-fdf3ee9923ed
which can be used as unique global reference for AcidRain State Department 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-25T00:00:00Z |
date_published | 2022-05-10T00:00:00Z |
source | MITRE |
title | Attribution of Russia’s Malicious Cyber Activity Against Ukraine |
Audit OSX
Gagliardi, R. (n.d.). Audit in a OS X System. Retrieved September 23, 2021.
Internal MISP references
UUID c5181c95-0a94-4ea0-9940-04a9663d0069
which can be used as unique global reference for Audit OSX
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-23T00:00:00Z |
source | MITRE |
title | Audit in a OS X System |
Microsoft Audit Logon Events
Microsoft. (2021, September 6). Audit logon events. Retrieved September 28, 2021.
Internal MISP references
UUID 050d6da7-a78c-489d-8bef-b06d802b55d7
which can be used as unique global reference for Microsoft Audit Logon Events
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-28T00:00:00Z |
date_published | 2021-09-06T00:00:00Z |
source | MITRE |
title | Audit logon events |
Cloud Audit Logs
Google. (n.d.). Audit Logs. Retrieved June 1, 2020.
Internal MISP references
UUID 500bdcea-5f49-4949-80fb-5eec1ce5e09e
which can be used as unique global reference for Cloud Audit Logs
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-06-01T00:00:00Z |
source | MITRE |
title | Audit Logs |
Microsoft Scheduled Task Events Win10
Microsoft. (2017, May 28). Audit Other Object Access Events. Retrieved June 27, 2019.
Internal MISP references
UUID 79e54b41-69ba-4738-86ef-88c4f540bce3
which can be used as unique global reference for Microsoft Scheduled Task Events Win10
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-06-27T00:00:00Z |
date_published | 2017-05-28T00:00:00Z |
source | MITRE |
title | Audit Other Object Access Events |
auditpol
Jason Gerend, et al. (2017, October 16). auditpol. Retrieved September 1, 2021.
Internal MISP references
UUID 20d18ecf-d7d3-4433-9a3c-c28be71de4b1
which can be used as unique global reference for auditpol
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-01T00:00:00Z |
date_published | 2017-10-16T00:00:00Z |
source | MITRE |
title | auditpol |
auditpol.exe_STRONTIC
STRONTIC. (n.d.). auditpol.exe. Retrieved September 9, 2021.
Internal MISP references
UUID c8a305b3-cd17-4415-a740-32787da703cd
which can be used as unique global reference for auditpol.exe_STRONTIC
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-09T00:00:00Z |
source | MITRE |
title | auditpol.exe |
Audit_Policy_Microsoft
Daniel Simpson. (2017, April 19). Audit Policy. Retrieved September 13, 2021.
Internal MISP references
UUID 9ff43f64-7fcb-4aa3-9599-9d00774d8da5
which can be used as unique global reference for Audit_Policy_Microsoft
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-13T00:00:00Z |
date_published | 2017-04-19T00:00:00Z |
source | MITRE |
title | Audit Policy |
TechNet Audit Policy
Microsoft. (2016, April 15). Audit Policy Recommendations. Retrieved June 3, 2016.
Internal MISP references
UUID 406cd8ff-e539-4853-85ed-775726155cf1
which can be used as unique global reference for TechNet Audit Policy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-06-03T00:00:00Z |
date_published | 2016-04-15T00:00:00Z |
source | MITRE |
title | Audit Policy Recommendations |
Microsoft Audit Registry July 2012
Microsoft. (2012, July 2). Audit Registry. Retrieved January 31, 2018.
Internal MISP references
UUID 4e95ad81-cbc4-4f66-ba95-fb781d7d9c3c
which can be used as unique global reference for Microsoft Audit Registry July 2012
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-01-31T00:00:00Z |
date_published | 2012-07-02T00:00:00Z |
source | MITRE |
title | Audit Registry |
audits linikatz
Wadhwa-Brown, Tim. (2022). audit.rules. Retrieved September 17, 2024.
Internal MISP references
UUID b9f940cf-74fb-5a33-992c-82bdb538adbb
which can be used as unique global reference for audits linikatz
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-17T00:00:00Z |
date_published | 2022-01-01T00:00:00Z |
source | MITRE |
title | audit.rules |
Security Affairs Elderwood Sept 2012
Paganini, P. (2012, September 9). Elderwood project, who is behind Op. Aurora and ongoing attacks?. Retrieved February 13, 2018.
Internal MISP references
UUID ebfc56c5-0490-4b91-b49f-548c00a59162
which can be used as unique global reference for Security Affairs Elderwood Sept 2012
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-02-13T00:00:00Z |
source | MITRE |
title | Aurora and ongoing attacks? |
Australia ‘Evil Twin’
Toulas, Bill. (2024, July 1). Australian charged for ‘Evil Twin’ WiFi attack on plane. Retrieved September 17, 2024.
Internal MISP references
UUID b50c354b-cdca-57e6-b8d6-a43ee334f091
which can be used as unique global reference for Australia ‘Evil Twin’
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-17T00:00:00Z |
date_published | 2024-07-01T00:00:00Z |
source | MITRE |
title | Australian charged for ‘Evil Twin’ WiFi attack on plane |
NIST Authentication
NIST. (n.d.). Authentication. Retrieved January 30, 2020.
Internal MISP references
UUID f3cfb9b9-62f4-4066-a2b9-7e6f25bd7a46
which can be used as unique global reference for NIST Authentication
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-01-30T00:00:00Z |
source | MITRE |
title | Authentication |
MSDN Authentication Packages
Microsoft. (n.d.). Authentication Packages. Retrieved March 1, 2017.
Internal MISP references
UUID e9bb8434-9b6d-4301-bfe2-5c83ceabb020
which can be used as unique global reference for MSDN Authentication Packages
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-03-01T00:00:00Z |
source | MITRE |
title | Authentication Packages |
Microsoft Authenticode
Microsoft. (n.d.). Authenticode. Retrieved January 31, 2018.
Internal MISP references
UUID 33efd1a3-ffe9-42b3-ae12-970ed11454bf
which can be used as unique global reference for Microsoft Authenticode
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-01-31T00:00:00Z |
source | MITRE |
title | Authenticode |
K8s Authorization Overview
Kubernetes. (n.d.). Authorization Overview. Retrieved June 24, 2021.
Internal MISP references
UUID 120f968a-c81f-4902-9b76-7544577b768d
which can be used as unique global reference for K8s Authorization Overview
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-06-24T00:00:00Z |
source | MITRE |
title | Authorization Overview |
SSH Authorized Keys
ssh.com. (n.d.). Authorized_keys File in SSH. Retrieved June 24, 2020.
Internal MISP references
UUID ff100b76-894e-4d7c-9b8d-5f0eedcf59cc
which can be used as unique global reference for SSH Authorized Keys
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-06-24T00:00:00Z |
source | MITRE |
title | Authorized_keys File in SSH |
Trend Micro njRAT 2018
Pascual, C. (2018, November 27). AutoIt-Compiled Worm Affecting Removable Media Delivers Fileless Version of BLADABINDI/njRAT Backdoor. Retrieved June 4, 2019.
Internal MISP references
UUID d8e7b428-84dd-4d96-b3f3-70e7ed7f8271
which can be used as unique global reference for Trend Micro njRAT 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-06-04T00:00:00Z |
date_published | 2018-11-27T00:00:00Z |
source | MITRE |
title | AutoIt-Compiled Worm Affecting Removable Media Delivers Fileless Version of BLADABINDI/njRAT Backdoor |
Re-Open windows on Mac
Apple. (2016, December 6). Automatically re-open windows, apps, and documents on your Mac. Retrieved July 11, 2017.
Internal MISP references
UUID ed907f1e-71d6-45db-8ef3-75bec59c238b
which can be used as unique global reference for Re-Open windows on Mac
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-07-11T00:00:00Z |
date_published | 2016-12-06T00:00:00Z |
source | MITRE |
title | Automatically re-open windows, apps, and documents on your Mac |
TechNet Autoruns
Russinovich, M. (2016, January 4). Autoruns for Windows v13.51. Retrieved June 6, 2016.
Internal MISP references
UUID 709f4509-9d69-4033-8aa6-a947496a1703
which can be used as unique global reference for TechNet Autoruns
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-06-06T00:00:00Z |
date_published | 2016-01-04T00:00:00Z |
source | MITRE |
title | Autoruns for Windows v13.51 |
Autoruns for Windows
Mark Russinovich. (2019, June 28). Autoruns for Windows v13.96. Retrieved March 13, 2020.
Internal MISP references
UUID aaf66ad0-c444-48b5-875f-a0f66b82031c
which can be used as unique global reference for Autoruns for Windows
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-03-13T00:00:00Z |
date_published | 2019-06-28T00:00:00Z |
source | MITRE |
title | Autoruns for Windows v13.96 |
Hornet Security Avaddon June 2020
Security Lab. (2020, June 5). Avaddon: From seeking affiliates to in-the-wild in 2 days. Retrieved August 19, 2021.
Internal MISP references
UUID 41377d56-2e7b-48a8-8561-681e04a65907
which can be used as unique global reference for Hornet Security Avaddon June 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-08-19T00:00:00Z |
date_published | 2020-06-05T00:00:00Z |
source | MITRE |
title | Avaddon: From seeking affiliates to in-the-wild in 2 days |
Arxiv Avaddon Feb 2021
Yuste, J. Pastrana, S. (2021, February 9). Avaddon ransomware: an in-depth analysis and decryption of infected systems. Retrieved August 19, 2021.
Internal MISP references
UUID dbee8e7e-f477-4bd5-8225-84e0e222617e
which can be used as unique global reference for Arxiv Avaddon Feb 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-08-19T00:00:00Z |
date_published | 2021-02-09T00:00:00Z |
source | MITRE |
title | Avaddon ransomware: an in-depth analysis and decryption of infected systems |
CISA Phishing
CISA. (2021, February 1). Avoiding Social Engineering and Phishing Attacks. Retrieved September 8, 2023.
Internal MISP references
UUID 0c98bf66-f43c-5b09-ae43-d10c682f51e7
which can be used as unique global reference for CISA Phishing
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-08T00:00:00Z |
date_published | 2021-02-01T00:00:00Z |
source | MITRE |
title | Avoiding Social Engineering and Phishing Attacks |
Malwarebytes AvosLocker Jul 2021
Hasherezade. (2021, July 23). AvosLocker enters the ransomware scene, asks for partners. Retrieved January 11, 2023.
Internal MISP references
UUID 88dffb14-a7a7-5b36-b269-8283dec0f1a3
which can be used as unique global reference for Malwarebytes AvosLocker Jul 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-01-11T00:00:00Z |
date_published | 2021-07-23T00:00:00Z |
source | MITRE |
title | AvosLocker enters the ransomware scene, asks for partners |
avoslocker_ransomware
Lakshmanan, R. (2022, May 2). AvosLocker Ransomware Variant Using New Trick to Disable Antivirus Protection. Retrieved May 17, 2022.
Internal MISP references
UUID ea2756ce-a183-4c80-af11-92374ad045b2
which can be used as unique global reference for avoslocker_ransomware
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-05-17T00:00:00Z |
date_published | 2022-05-02T00:00:00Z |
source | MITRE |
title | AvosLocker Ransomware Variant Using New Trick to Disable Antivirus Protection |
Cisco Talos Avos Jun 2022
Venere, G. Neal, C. (2022, June 21). Avos ransomware group expands with new attack arsenal. Retrieved January 11, 2023.
Internal MISP references
UUID 1170fdc2-6d8e-5b60-bf9e-ca915790e534
which can be used as unique global reference for Cisco Talos Avos Jun 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-01-11T00:00:00Z |
date_published | 2022-06-21T00:00:00Z |
source | MITRE |
title | Avos ransomware group expands with new attack arsenal |
Awesome Executable Packing
Alexandre D'Hondt. (n.d.). Awesome Executable Packing. Retrieved March 11, 2022.
Internal MISP references
UUID 565bf600-5657-479b-9678-803e991c88a5
which can be used as unique global reference for Awesome Executable Packing
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-03-11T00:00:00Z |
source | MITRE |
title | Awesome Executable Packing |
ESET Kobalos Jan 2021
M.Leveille, M., Sanmillan, I. (2021, January). A WILD KOBALOS APPEARS Tricksy Linux malware goes after HPCs. Retrieved August 24, 2021.
Internal MISP references
UUID 745e963e-33fd-40d4-a8c6-1a9f321017f4
which can be used as unique global reference for ESET Kobalos Jan 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-08-24T00:00:00Z |
date_published | 2021-01-01T00:00:00Z |
source | MITRE |
title | A WILD KOBALOS APPEARS Tricksy Linux malware goes after HPCs |
AWS Root User
Amazon. (n.d.). AWS Account Root User. Retrieved April 5, 2021.
Internal MISP references
UUID 5f315c21-f02f-4c9e-aac6-d648deff3ff9
which can be used as unique global reference for AWS Root User
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-04-05T00:00:00Z |
source | MITRE |
title | AWS Account Root User |
GitHub AWS-ADFS-Credential-Generator
Damian Hickey. (2017, January 28). AWS-ADFS-Credential-Generator. Retrieved September 27, 2024.
Internal MISP references
UUID 340a3a20-0ee1-4fd8-87ab-10ac0d2a50c8
which can be used as unique global reference for GitHub AWS-ADFS-Credential-Generator
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-27T00:00:00Z |
date_published | 2017-01-28T00:00:00Z |
source | MITRE |
title | AWS-ADFS-Credential-Generator |
AWS GetPasswordPolicy
Amazon Web Services. (n.d.). AWS API GetAccountPasswordPolicy. Retrieved June 8, 2021.
Internal MISP references
UUID dd44d565-b9d9-437e-a31a-a52c6a21e3b3
which can be used as unique global reference for AWS GetPasswordPolicy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-06-08T00:00:00Z |
source | MITRE |
title | AWS API GetAccountPasswordPolicy |
AWS Console Sign-in Events
Amazon. (n.d.). AWS Console Sign-in Events. Retrieved October 23, 2019.
Internal MISP references
UUID 72578d0b-f68a-40fa-9a5d-379a66792be8
which can be used as unique global reference for AWS Console Sign-in Events
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-10-23T00:00:00Z |
source | MITRE |
title | AWS Console Sign-in Events |
AWS Describe DB Instances
Amazon Web Services. (n.d.). Retrieved May 28, 2021.
Internal MISP references
UUID 85bda17d-7b7c-4d0e-a0d2-2adb5f0a6b82
which can be used as unique global reference for AWS Describe DB Instances
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-05-28T00:00:00Z |
source | MITRE |
title | AWS Describe DB Instances |
AWS Get Bucket ACL
Amazon Web Services. (n.d.). Retrieved May 28, 2021.
Internal MISP references
UUID 1eddbd32-8314-4f95-812a-550904eac2fa
which can be used as unique global reference for AWS Get Bucket ACL
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-05-28T00:00:00Z |
source | MITRE |
title | AWS Get Bucket ACL |
AWS Get Public Access Block
Amazon Web Services. (n.d.). Retrieved May 28, 2021.
Internal MISP references
UUID f2887980-569a-4bc2-949e-bd8ff266c43c
which can be used as unique global reference for AWS Get Public Access Block
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-05-28T00:00:00Z |
source | MITRE |
title | AWS Get Public Access Block |
AWS Head Bucket
Amazon Web Services. (n.d.). AWS HeadBucket. Retrieved February 14, 2022.
Internal MISP references
UUID 1388a78e-9f86-4927-a619-e0fcbac5b7a1
which can be used as unique global reference for AWS Head Bucket
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-02-14T00:00:00Z |
source | MITRE |
title | AWS HeadBucket |
Rhino Security Labs AWS Privilege Escalation
Spencer Gietzen. (n.d.). AWS IAM Privilege Escalation – Methods and Mitigation. Retrieved May 27, 2022.
Internal MISP references
UUID 693e5783-4aa1-40ce-8080-cec01c3e7b59
which can be used as unique global reference for Rhino Security Labs AWS Privilege Escalation
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-05-27T00:00:00Z |
source | MITRE |
title | AWS IAM Privilege Escalation – Methods and Mitigation |
AWS Lambda Redirector
Adam Chester. (2020, February 25). AWS Lambda Redirector. Retrieved July 8, 2022.
Internal MISP references
UUID 9ba87a5d-a140-4959-9905-c4a80e684d56
which can be used as unique global reference for AWS Lambda Redirector
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-07-08T00:00:00Z |
date_published | 2020-02-25T00:00:00Z |
source | MITRE |
title | AWS Lambda Redirector |
Sysdig AMBERSQUID September 18 2023
Alessandro Brucato. (2023, September 18). AWS’s Hidden Threat: AMBERSQUID Cloud-Native Cryptojacking Operation. Retrieved April 11, 2024.
Internal MISP references
UUID 7ffa880f-5854-4b8a-83f5-da42c1c39345
which can be used as unique global reference for Sysdig AMBERSQUID September 18 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-04-11T00:00:00Z |
date_published | 2023-09-18T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | AWS’s Hidden Threat: AMBERSQUID Cloud-Native Cryptojacking Operation |
Rhino Security Labs AWS S3 Ransomware
Spencer Gietzen. (n.d.). AWS Simple Storage Service S3 Ransomware Part 2: Prevention and Defense. Retrieved March 21, 2023.
Internal MISP references
UUID 785c6b11-c5f0-5cb4-931b-cf75fcc368a1
which can be used as unique global reference for Rhino Security Labs AWS S3 Ransomware
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-21T00:00:00Z |
source | MITRE |
title | AWS Simple Storage Service S3 Ransomware Part 2: Prevention and Defense |
AWS Systems Manager Run Command
AWS. (n.d.). AWS Systems Manager Run Command. Retrieved March 13, 2023.
Internal MISP references
UUID ef66f17b-6a5b-5eb8-83de-943e2bddd114
which can be used as unique global reference for AWS Systems Manager Run Command
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-13T00:00:00Z |
source | MITRE |
title | AWS Systems Manager Run Command |
Pylos Xenotime 2019
Slowik, J.. (2019, April 12). A XENOTIME to Remember: Veles in the Wild. Retrieved April 16, 2019.
Internal MISP references
UUID e2f246d8-c75e-4e0f-bba8-869d82be26da
which can be used as unique global reference for Pylos Xenotime 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-04-16T00:00:00Z |
date_published | 2019-04-12T00:00:00Z |
source | MITRE |
title | A XENOTIME to Remember: Veles in the Wild |
objective-see ay mami 2018
Patrick Wardle. (2018, January 11). Ay MaMi. Retrieved March 19, 2018.
Internal MISP references
UUID 1b1d656c-4fe6-47d1-9ce5-a70c33003507
which can be used as unique global reference for objective-see ay mami 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-03-19T00:00:00Z |
date_published | 2018-01-11T00:00:00Z |
source | MITRE |
title | Ay MaMi |
Microsoft AZ CLI
Microsoft. (n.d.). az ad user. Retrieved October 6, 2019.
Internal MISP references
UUID cfd94553-272b-466b-becb-3859942bcaa5
which can be used as unique global reference for Microsoft AZ CLI
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-10-06T00:00:00Z |
source | MITRE |
title | az ad user |
Intezer Russian APT Dec 2020
Kennedy, J. (2020, December 9). A Zebra in Gopher's Clothing: Russian APT Uses COVID-19 Lures to Deliver Zebrocy. Retrieved February 22, 2021.
Internal MISP references
UUID 88d8a3b7-d994-4fd2-9aa1-83b79bccda7e
which can be used as unique global reference for Intezer Russian APT Dec 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-02-22T00:00:00Z |
date_published | 2020-12-09T00:00:00Z |
source | MITRE |
title | A Zebra in Gopher's Clothing: Russian APT Uses COVID-19 Lures to Deliver Zebrocy |
az monitor diagnostic-settings
Microsoft. (n.d.). az monitor diagnostic-settings. Retrieved October 16, 2020.
Internal MISP references
UUID 6ddd92ee-1014-4b7a-953b-18ac396b100e
which can be used as unique global reference for az monitor diagnostic-settings
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-16T00:00:00Z |
source | MITRE |
title | az monitor diagnostic-settings |
Microsoft Azure AD Security Operations for Devices
Microsoft. (2020, September 16). Azure Active Directory security operations for devices. Retrieved February 21, 2023.
Internal MISP references
UUID eeba5eab-a9d8-55c0-b555-0414f65d2c2d
which can be used as unique global reference for Microsoft Azure AD Security Operations for Devices
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-02-21T00:00:00Z |
date_published | 2020-09-16T00:00:00Z |
source | MITRE |
title | Azure Active Directory security operations for devices |
Microsoft Azure Active Directory security operations guide
Microsoft . (2022, September 16). Azure Active Directory security operations guide. Retrieved February 21, 2023.
Internal MISP references
UUID b75a3f28-a028-50e6-b971-cc85e7d52e0c
which can be used as unique global reference for Microsoft Azure Active Directory security operations guide
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-02-21T00:00:00Z |
date_published | 2022-09-16T00:00:00Z |
source | MITRE |
title | Azure Active Directory security operations guide |
Azure AD Connect for Read Teamers
Adam Chester. (2019, February 18). Azure AD Connect for Red Teamers. Retrieved September 28, 2022.
Internal MISP references
UUID 0b9946ff-8c1c-4d93-8401-e1e4dd186305
which can be used as unique global reference for Azure AD Connect for Read Teamers
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-09-28T00:00:00Z |
date_published | 2019-02-18T00:00:00Z |
source | MITRE |
title | Azure AD Connect for Red Teamers |
Microsoft - Azure PowerShell
Microsoft. (2014, December 12). Azure/azure-powershell. Retrieved March 24, 2023.
Internal MISP references
UUID 3b17b649-9efa-525f-aa49-cf6c9ad559d7
which can be used as unique global reference for Microsoft - Azure PowerShell
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-24T00:00:00Z |
date_published | 2014-12-12T00:00:00Z |
source | MITRE |
title | Azure/azure-powershell |
Azure Blob Storage
Microsoft. (n.d.). Azure Blob Storage. Retrieved October 13, 2021.
Internal MISP references
UUID 7a392b85-872a-4a5a-984c-185a8e8f8a3f
which can be used as unique global reference for Azure Blob Storage
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-13T00:00:00Z |
source | MITRE |
title | Azure Blob Storage |
Microsoft Azure Instance Metadata 2021
Microsoft. (2021, February 21). Azure Instance Metadata Service (Windows). Retrieved April 2, 2021.
Internal MISP references
UUID 66e93b75-0067-4cdb-b695-8f8109ef26e0
which can be used as unique global reference for Microsoft Azure Instance Metadata 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-04-02T00:00:00Z |
date_published | 2021-02-21T00:00:00Z |
source | MITRE |
title | Azure Instance Metadata Service (Windows) |
Microsoft Azure Policy
Microsoft. (2023, August 30). Azure Policy built-in policy definitions. Retrieved September 5, 2023.
Internal MISP references
UUID 761d102e-768a-5536-a098-0b1819029d33
which can be used as unique global reference for Microsoft Azure Policy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-05T00:00:00Z |
date_published | 2023-08-30T00:00:00Z |
source | MITRE |
title | Azure Policy built-in policy definitions |
SpecterOps Azure Privilege Escalation
Andy Robbins. (2021, October 12). Azure Privilege Escalation via Service Principal Abuse. Retrieved April 1, 2022.
Internal MISP references
UUID 5dba5a6d-465e-4489-bc4d-299a891b62f6
which can be used as unique global reference for SpecterOps Azure Privilege Escalation
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-04-01T00:00:00Z |
date_published | 2021-10-12T00:00:00Z |
source | MITRE |
title | Azure Privilege Escalation via Service Principal Abuse |
Azure Products
Microsoft. (n.d.). Azure products. Retrieved October 13, 2021.
Internal MISP references
UUID 12a72e05-ada4-4f77-8d6e-03024f88cab6
which can be used as unique global reference for Azure Products
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-13T00:00:00Z |
source | MITRE |
title | Azure products |
Azure - Resource Manager API
Microsoft. (2019, May 20). Azure Resource Manager. Retrieved June 17, 2020.
Internal MISP references
UUID 223cc020-e88a-4236-9c34-64fe606a1729
which can be used as unique global reference for Azure - Resource Manager API
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-06-17T00:00:00Z |
date_published | 2019-05-20T00:00:00Z |
source | MITRE |
title | Azure Resource Manager |
Mandiant Azure Run Command 2021
Adrien Bataille, Anders Vejlby, Jared Scott Wilson, and Nader Zaveri. (2021, December 14). Azure Run Command for Dummies. Retrieved March 13, 2023.
Internal MISP references
UUID e15d38de-bc15-525b-bd03-27c0edca768d
which can be used as unique global reference for Mandiant Azure Run Command 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-13T00:00:00Z |
date_published | 2021-12-14T00:00:00Z |
source | MITRE |
title | Azure Run Command for Dummies |
Microsoft Azure security baseline for Azure Active Directory
Microsoft. (2022, November 14). Azure security baseline for Azure Active Directory. Retrieved February 21, 2023.
Internal MISP references
UUID 2bc66dc9-2ed2-52ad-8ae2-5497be3b0c53
which can be used as unique global reference for Microsoft Azure security baseline for Azure Active Directory
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-02-21T00:00:00Z |
date_published | 2022-11-14T00:00:00Z |
source | MITRE |
title | Azure security baseline for Azure Active Directory |
Microsoft - Azure Sentinel ADFSDomainTrustMods
Microsoft. (2020, December). Azure Sentinel Detections. Retrieved December 30, 2020.
Internal MISP references
UUID 34314090-33c2-4276-affa-3d0b527bbcef
which can be used as unique global reference for Microsoft - Azure Sentinel ADFSDomainTrustMods
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-12-30T00:00:00Z |
date_published | 2020-12-01T00:00:00Z |
source | MITRE |
title | Azure Sentinel Detections |
Azure Serial Console
Microsoft. (2022, October 17). Azure Serial Console. Retrieved June 2, 2023.
Internal MISP references
UUID fd75d136-e818-5233-b2c2-5d8ed033b9e6
which can be used as unique global reference for Azure Serial Console
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-06-02T00:00:00Z |
date_published | 2022-10-17T00:00:00Z |
source | MITRE |
title | Azure Serial Console |
Microsoft Azure Storage Security, 2019
Amlekar, M., Brooks, C., Claman, L., et. al.. (2019, March 20). Azure Storage security guide. Retrieved October 4, 2019.
Internal MISP references
UUID 95bda448-bb13-4fa6-b663-e48a9d1b866f
which can be used as unique global reference for Microsoft Azure Storage Security, 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-10-04T00:00:00Z |
date_published | 2019-03-20T00:00:00Z |
source | MITRE |
title | Azure Storage security guide |
Azure - Stormspotter
Microsoft. (2020). Azure Stormspotter GitHub. Retrieved June 17, 2020.
Internal MISP references
UUID 42383ed1-9705-4313-8068-28a22a23f50e
which can be used as unique global reference for Azure - Stormspotter
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-06-17T00:00:00Z |
date_published | 2020-01-01T00:00:00Z |
source | MITRE |
title | Azure Stormspotter GitHub |
Medium Babuk February 2021
Sebdraven. (2021, February 8). Babuk is distributed packed. Retrieved August 11, 2021.
Internal MISP references
UUID 58759b1c-8e2c-44fa-8e37-8bf7325c330d
which can be used as unique global reference for Medium Babuk February 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-08-11T00:00:00Z |
date_published | 2021-02-08T00:00:00Z |
source | MITRE |
title | Babuk is distributed packed |
Sogeti CERT ESEC Babuk March 2021
Sogeti. (2021, March). Babuk Ransomware. Retrieved August 11, 2021.
Internal MISP references
UUID e85e3bd9-6ddc-4d0f-a16c-b525a75baa7e
which can be used as unique global reference for Sogeti CERT ESEC Babuk March 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-08-11T00:00:00Z |
date_published | 2021-03-01T00:00:00Z |
source | MITRE |
title | Babuk Ransomware |
Unit42 BabyShark Apr 2019
Lim, M.. (2019, April 26). BabyShark Malware Part Two – Attacks Continue Using KimJongRAT and PCRat . Retrieved October 7, 2019.
Internal MISP references
UUID c020569d-9c85-45fa-9f0b-97be5bdbab08
which can be used as unique global reference for Unit42 BabyShark Apr 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-10-07T00:00:00Z |
date_published | 2019-04-26T00:00:00Z |
source | MITRE |
title | BabyShark Malware Part Two – Attacks Continue Using KimJongRAT and PCRat |
Symantec Briba May 2012
Ladley, F. (2012, May 15). Backdoor.Briba. Retrieved February 21, 2018.
Internal MISP references
UUID bcf0f82b-1b26-4c0c-905e-0dd8b88d0903
which can be used as unique global reference for Symantec Briba May 2012
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-02-21T00:00:00Z |
date_published | 2012-05-15T00:00:00Z |
source | MITRE |
title | Backdoor.Briba |
TrendMicro Squiblydoo Aug 2017
Bermejo, L., Giagone, R., Wu, R., and Yarochkin, F. (2017, August 7). Backdoor-carrying Emails Set Sights on Russian-speaking Businesses. Retrieved March 7, 2019.
Internal MISP references
UUID efeb475c-2a7c-4ab6-814d-3ee7866fa322
which can be used as unique global reference for TrendMicro Squiblydoo Aug 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-03-07T00:00:00Z |
date_published | 2017-08-07T00:00:00Z |
source | MITRE |
title | Backdoor-carrying Emails Set Sights on Russian-speaking Businesses |
Symantec Darkmoon Aug 2005
Hayashi, K. (2005, August 18). Backdoor.Darkmoon. Retrieved February 23, 2018.
Internal MISP references
UUID 7088234d-a6fc-49ad-b4fd-2fe8ca333c1d
which can be used as unique global reference for Symantec Darkmoon Aug 2005
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-02-23T00:00:00Z |
date_published | 2005-08-18T00:00:00Z |
source | MITRE |
title | Backdoor.Darkmoon |
ESET BackdoorDiplomacy Jun 2021
Adam Burgher. (2021, June 10). BackdoorDiplomacy: Upgrading from Quarian to Turian. Retrieved September 1, 2021
Internal MISP references
UUID 127d4b10-8d61-4bdf-b5b9-7d86bbc065b6
which can be used as unique global reference for ESET BackdoorDiplomacy Jun 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-01T00:00:00Z |
date_published | 2021-06-10T00:00:00Z |
source | MITRE, Tidal Cyber |
title | BackdoorDiplomacy: Upgrading from Quarian to Turian |
Backdooring an AWS account
Daniel Grzelak. (2016, July 9). Backdooring an AWS account. Retrieved May 27, 2022.
Internal MISP references
UUID 2c867527-1584-44f7-b5e5-8ca54ea79619
which can be used as unique global reference for Backdooring an AWS account
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-05-27T00:00:00Z |
date_published | 2016-07-09T00:00:00Z |
source | MITRE |
title | Backdooring an AWS account |
Symantec Linfo May 2012
Zhou, R. (2012, May 15). Backdoor.Linfo. Retrieved February 23, 2018.
Internal MISP references
UUID e6b88cd4-a58e-4139-b266-48d0f5957407
which can be used as unique global reference for Symantec Linfo May 2012
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-02-23T00:00:00Z |
date_published | 2012-05-15T00:00:00Z |
source | MITRE |
title | Backdoor.Linfo |
Symantec Backdoor.Mivast
Stama, D.. (2015, February 6). Backdoor.Mivast. Retrieved February 15, 2016.
Internal MISP references
UUID 800780e3-7d00-4cfc-8458-74fe17da2f71
which can be used as unique global reference for Symantec Backdoor.Mivast
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-02-15T00:00:00Z |
date_published | 2015-02-06T00:00:00Z |
source | MITRE |
title | Backdoor.Mivast |
Symantec Nerex May 2012
Ladley, F. (2012, May 15). Backdoor.Nerex. Retrieved February 23, 2018.
Internal MISP references
UUID 1613fd6b-4d62-464b-9cda-6f7d3f0192e1
which can be used as unique global reference for Symantec Nerex May 2012
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-02-23T00:00:00Z |
date_published | 2012-05-15T00:00:00Z |
source | MITRE |
title | Backdoor.Nerex |
Symantec Backdoor.Nidiran
Sponchioni, R.. (2016, March 11). Backdoor.Nidiran. Retrieved August 3, 2016.
Internal MISP references
UUID 01852772-c333-47a3-9e3f-e234a87f0b9b
which can be used as unique global reference for Symantec Backdoor.Nidiran
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-08-03T00:00:00Z |
date_published | 2016-03-11T00:00:00Z |
source | MITRE |
title | Backdoor.Nidiran |
Symantec Remsec IOCs
Symantec Security Response. (2016, August 8). Backdoor.Remsec indicators of compromise. Retrieved August 17, 2016.
Internal MISP references
UUID b00bf616-96e6-42c9-a56c-380047ad5acb
which can be used as unique global reference for Symantec Remsec IOCs
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-08-17T00:00:00Z |
date_published | 2016-08-08T00:00:00Z |
source | MITRE |
title | Backdoor.Remsec indicators of compromise |
Symantec Ristol May 2012
Ladley, F. (2012, May 15). Backdoor.Ritsol. Retrieved February 23, 2018.
Internal MISP references
UUID 1c8b1762-8abd-479b-b78c-43d8c7be7c27
which can be used as unique global reference for Symantec Ristol May 2012
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-02-23T00:00:00Z |
date_published | 2012-05-15T00:00:00Z |
source | MITRE |
title | Backdoor.Ritsol |
Symantec Vasport May 2012
Zhou, R. (2012, May 15). Backdoor.Vasport. Retrieved February 22, 2018.
Internal MISP references
UUID 2dc7d7fb-3d13-4647-b15b-5e501946d606
which can be used as unique global reference for Symantec Vasport May 2012
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-02-22T00:00:00Z |
date_published | 2012-05-15T00:00:00Z |
source | MITRE |
title | Backdoor.Vasport |
FSecure Hupigon
FSecure. (n.d.). Backdoor - W32/Hupigon.EMV - Threat Description. Retrieved December 18, 2017.
Internal MISP references
UUID 08ceb57f-065e-45e9-98e9-d58a92caa755
which can be used as unique global reference for FSecure Hupigon
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-18T00:00:00Z |
source | MITRE |
title | Backdoor - W32/Hupigon.EMV - Threat Description |
Symantec Wiarp May 2012
Zhou, R. (2012, May 15). Backdoor.Wiarp. Retrieved February 22, 2018.
Internal MISP references
UUID 78285833-4b0d-4077-86d2-f34b010a5862
which can be used as unique global reference for Symantec Wiarp May 2012
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-02-22T00:00:00Z |
date_published | 2012-05-15T00:00:00Z |
source | MITRE |
title | Backdoor.Wiarp |
Microsoft Lamin Sept 2017
Microsoft. (2009, May 17). Backdoor:Win32/Lamin.A. Retrieved September 6, 2018.
Internal MISP references
UUID 84b8b159-6e85-4329-8903-aca156f4ed84
which can be used as unique global reference for Microsoft Lamin Sept 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-09-06T00:00:00Z |
date_published | 2009-05-17T00:00:00Z |
source | MITRE |
title | Backdoor:Win32/Lamin.A |
Microsoft PoisonIvy 2017
McCormack, M. (2017, September 15). Backdoor:Win32/Poisonivy.E. Retrieved December 21, 2020.
Internal MISP references
UUID fc97a89c-c912-4b0c-b151-916695dbbca4
which can be used as unique global reference for Microsoft PoisonIvy 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-12-21T00:00:00Z |
date_published | 2017-09-15T00:00:00Z |
source | MITRE |
title | Backdoor:Win32/Poisonivy.E |
Microsoft Win Defender Truvasys Sep 2017
Microsoft. (2017, September 15). Backdoor:Win32/Truvasys.A!dha. Retrieved November 30, 2017.
Internal MISP references
UUID 3c8ba6ef-8edc-44bf-9abe-655ba0f45912
which can be used as unique global reference for Microsoft Win Defender Truvasys Sep 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-11-30T00:00:00Z |
date_published | 2017-09-15T00:00:00Z |
source | MITRE |
title | Backdoor:Win32/Truvasys.A!dha |
Microsoft Wingbird Nov 2017
Microsoft. (2017, November 9). Backdoor:Win32/Wingbird.A!dha. Retrieved November 27, 2017.
Internal MISP references
UUID 6c7e2b89-8f3a-443c-9b72-12934b9dc364
which can be used as unique global reference for Microsoft Wingbird Nov 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-11-27T00:00:00Z |
date_published | 2017-11-09T00:00:00Z |
source | MITRE |
title | Backdoor:Win32/Wingbird.A!dha |
Microsoft BITS
Microsoft. (n.d.). Background Intelligent Transfer Service. Retrieved January 12, 2018.
Internal MISP references
UUID 3d925a69-35f3-4337-8e1e-275de4c1783e
which can be used as unique global reference for Microsoft BITS
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-01-12T00:00:00Z |
source | MITRE |
title | Background Intelligent Transfer Service |
NCC Group Research Blog August 19 2022
NCC Group Research Blog. (2022, August 19). Back in Black: Unlocking a LockBit 3.0 Ransomware Attack. Retrieved May 7, 2023.
Internal MISP references
UUID 8c1fbe98-5fc1-4e67-9b96-b740ffc9b1ae
which can be used as unique global reference for NCC Group Research Blog August 19 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-07T00:00:00Z |
date_published | 2022-08-19T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Back in Black: Unlocking a LockBit 3.0 Ransomware Attack |
Tech Republic - Restore AWS Snapshots
Hardiman, N.. (2012, March 20). Backing up and restoring snapshots on Amazon EC2 machines. Retrieved October 8, 2019.
Internal MISP references
UUID bfe848a3-c855-4bca-a6ea-44804d48c7eb
which can be used as unique global reference for Tech Republic - Restore AWS Snapshots
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-10-08T00:00:00Z |
date_published | 2012-03-20T00:00:00Z |
source | MITRE |
title | Backing up and restoring snapshots on Amazon EC2 machines |
Secureworks COBALT DICKENS August 2018
Counter Threat Unit Research Team. (2018, August 24). Back to School: COBALT DICKENS Targets Universities. Retrieved February 3, 2021.
Internal MISP references
UUID addbb46b-b2b5-4844-b4be-f6294cf51caa
which can be used as unique global reference for Secureworks COBALT DICKENS August 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-02-03T00:00:00Z |
date_published | 2018-08-24T00:00:00Z |
source | MITRE |
title | Back to School: COBALT DICKENS Targets Universities |
Cybereason Kimsuky November 2020
Dahan, A. et al. (2020, November 2). Back to the Future: Inside the Kimsuky KGH Spyware Suite. Retrieved November 6, 2020.
Internal MISP references
UUID ecc2f5ad-b2a8-470b-b919-cb184d12d00f
which can be used as unique global reference for Cybereason Kimsuky November 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-11-06T00:00:00Z |
date_published | 2020-11-02T00:00:00Z |
source | MITRE, Tidal Cyber |
title | Back to the Future: Inside the Kimsuky KGH Spyware Suite |
Proofpoint TA453 March 2021
Miller, J. et al. (2021, March 30). BadBlood: TA453 Targets US and Israeli Medical Research Personnel in Credential Phishing Campaigns. Retrieved May 4, 2021.
Internal MISP references
UUID 5ba4217c-813b-4cc5-b694-3a4dcad776e4
which can be used as unique global reference for Proofpoint TA453 March 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-05-04T00:00:00Z |
date_published | 2021-03-30T00:00:00Z |
source | MITRE |
title | BadBlood: TA453 Targets US and Israeli Medical Research Personnel in Credential Phishing Campaigns |
Unit 42 BadPatch Oct 2017
Bar, T., Conant, S. (2017, October 20). BadPatch. Retrieved November 13, 2018.
Internal MISP references
UUID 9c294bf7-24ba-408a-90b8-5b9885838e1b
which can be used as unique global reference for Unit 42 BadPatch Oct 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-11-13T00:00:00Z |
date_published | 2017-10-20T00:00:00Z |
source | MITRE |
title | BadPatch |
ESET Bad Rabbit
M.Léveille, M-E.. (2017, October 24). Bad Rabbit: Not‑Petya is back with improved ransomware. Retrieved January 28, 2021.
Internal MISP references
UUID a9664f01-78f0-4461-a757-12f54ec99a56
which can be used as unique global reference for ESET Bad Rabbit
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-01-28T00:00:00Z |
date_published | 2017-10-24T00:00:00Z |
source | MITRE |
title | Bad Rabbit: Not‑Petya is back with improved ransomware |
Secure List Bad Rabbit
Mamedov, O. Sinitsyn, F. Ivanov, A.. (2017, October 24). Bad Rabbit ransomware. Retrieved January 28, 2021.
Internal MISP references
UUID f4cec03a-ea94-4874-9bea-16189e967ff9
which can be used as unique global reference for Secure List Bad Rabbit
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-01-28T00:00:00Z |
date_published | 2017-10-24T00:00:00Z |
source | MITRE |
title | Bad Rabbit ransomware |
BlackBerry Bahamut
The BlackBerry Research & Intelligence Team. (2020, October). BAHAMUT: Hack-for-Hire Masters of Phishing, Fake News, and Fake Apps. Retrieved February 8, 2021.
Internal MISP references
UUID 872c377b-724b-454c-8432-e38062a7c331
which can be used as unique global reference for BlackBerry Bahamut
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-02-08T00:00:00Z |
date_published | 2020-10-01T00:00:00Z |
source | MITRE |
title | BAHAMUT: Hack-for-Hire Masters of Phishing, Fake News, and Fake Apps |
BaltimoreSun RobbinHood May 2019
Duncan, I., Campbell, C. (2019, May 7). Baltimore city government computer network hit by ransomware attack. Retrieved July 29, 2019.
Internal MISP references
UUID f578de81-ea6b-49d0-9a0a-111e07249cd8
which can be used as unique global reference for BaltimoreSun RobbinHood May 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-07-29T00:00:00Z |
date_published | 2019-05-07T00:00:00Z |
source | MITRE |
title | Baltimore city government computer network hit by ransomware attack |
ESET Research Bandook July 7 2021
Fernando Tavella, Matías Porolli. (2021, July 7). Bandidos at large: A spying campaign in Latin America. Retrieved October 25, 2023.
Internal MISP references
UUID da6cac04-a318-4972-bd78-8272116b4ad7
which can be used as unique global reference for ESET Research Bandook July 7 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-10-25T00:00:00Z |
date_published | 2021-07-07T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Bandidos at large: A spying campaign in Latin America |
CheckPoint Bandook Nov 2020
Check Point. (2020, November 26). Bandook: Signed & Delivered. Retrieved May 31, 2021.
Internal MISP references
UUID 352652a9-86c9-42e1-8ee0-968180c6a51e
which can be used as unique global reference for CheckPoint Bandook Nov 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-05-31T00:00:00Z |
date_published | 2020-11-26T00:00:00Z |
source | MITRE |
title | Bandook: Signed & Delivered |
Banker Google Chrome Extension Steals Creds
Marinho, R. (n.d.). (Banker(GoogleChromeExtension)).targeting. Retrieved November 18, 2017.
Internal MISP references
UUID 93f37adc-d060-4b35-9a4d-62d2ad61cdf3
which can be used as unique global reference for Banker Google Chrome Extension Steals Creds
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-11-18T00:00:00Z |
source | MITRE |
title | (Banker(GoogleChromeExtension)).targeting |
Unit42 Banking Trojans Hooking 2022
Or Chechik. (2022, October 31). Banking Trojan Techniques: How Financially Motivated Malware Became Infrastructure. Retrieved September 27, 2023.
Internal MISP references
UUID 411c3df4-08e6-518a-953d-19988b663dc4
which can be used as unique global reference for Unit42 Banking Trojans Hooking 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-27T00:00:00Z |
date_published | 2022-10-31T00:00:00Z |
source | MITRE |
title | Banking Trojan Techniques: How Financially Motivated Malware Became Infrastructure |
Linux manual bash invocation
ArchWiki. (2021, January 19). Bash. Retrieved February 25, 2021.
Internal MISP references
UUID 06185cbd-6635-46c7-9783-67bd8742b66f
which can be used as unique global reference for Linux manual bash invocation
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-02-25T00:00:00Z |
date_published | 2021-01-19T00:00:00Z |
source | MITRE |
title | Bash |
DieNet Bash
die.net. (n.d.). bash(1) - Linux man page. Retrieved June 12, 2020.
Internal MISP references
UUID c5b362ce-6bae-46f7-b047-e3a0b2bf2580
which can be used as unique global reference for DieNet Bash
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-06-12T00:00:00Z |
source | MITRE |
title | bash(1) - Linux man page |
Bash.exe - LOLBAS Project
LOLBAS. (2018, May 25). Bash.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 7d3efbc7-6abf-4f3f-aec8-686100bb90ad
which can be used as unique global reference for Bash.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2018-05-25T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Bash.exe |
Bashfuscator Command Obfuscators
LeFevre, A. (n.d.). Bashfuscator Command Obfuscators. Retrieved March 17, 2023.
Internal MISP references
UUID c0256889-3ff0-59de-b0d1-39a947a4c89d
which can be used as unique global reference for Bashfuscator Command Obfuscators
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-17T00:00:00Z |
source | MITRE |
title | Bashfuscator Command Obfuscators |
Microsoft Basic TxF Concepts
Microsoft. (n.d.). Basic TxF Concepts. Retrieved December 20, 2017.
Internal MISP references
UUID 72798536-a7e3-43e2-84e3-b5b8b54f0bca
which can be used as unique global reference for Microsoft Basic TxF Concepts
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-20T00:00:00Z |
source | MITRE |
title | Basic TxF Concepts |
eSentire | BatLoader Continues to Abuse Google Search Ads to Deliver Vidar Stealer and Ursnif
eSentire. (2023, March 9). BatLoader Continues to Abuse Google Search Ads to Deliver Vidar Stealer and Ursnif. Retrieved May 10, 2023.
Internal MISP references
UUID 1bf10604-708f-4c4f-abe5-816768873496
which can be used as unique global reference for eSentire | BatLoader Continues to Abuse Google Search Ads to Deliver Vidar Stealer and Ursnif
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-10T00:00:00Z |
date_published | 2023-03-09T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | BatLoader Continues to Abuse Google Search Ads to Deliver Vidar Stealer and Ursnif |
BATLOADER: The Evasive Downloader Malware
Bethany Hardin, Lavine Oluoch, Tatiana Vollbrecht. (2022, November 14). BATLOADER: The Evasive Downloader Malware. Retrieved June 5, 2023.
Internal MISP references
UUID 53e12ade-99ed-51ee-b5c8-32180f144658
which can be used as unique global reference for BATLOADER: The Evasive Downloader Malware
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-06-05T00:00:00Z |
date_published | 2022-11-14T00:00:00Z |
source | MITRE |
title | BATLOADER: The Evasive Downloader Malware |
AdvIntel Bazar Call August 10 2022
AdvIntel. (2022, August 10). “BazarCall” Advisory: Essential Guide to Attack Vector that Revolutionized Data Breaches. Retrieved June 28, 2024.
Internal MISP references
UUID 5d3dff70-28c2-42a5-bf58-211fe6491fd2
which can be used as unique global reference for AdvIntel Bazar Call August 10 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-06-28T00:00:00Z |
date_published | 2022-08-10T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | “BazarCall” Advisory: Essential Guide to Attack Vector that Revolutionized Data Breaches |
Palo Alto Networks BBSRAT
Lee, B. Grunzweig, J. (2015, December 22). BBSRAT Attacks Targeting Russian Organizations Linked to Roaming Tiger. Retrieved August 19, 2016.
Internal MISP references
UUID 8c5d61ba-24c5-4f6c-a208-e0a5d23ebb49
which can be used as unique global reference for Palo Alto Networks BBSRAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-08-19T00:00:00Z |
date_published | 2015-12-22T00:00:00Z |
source | MITRE |
title | BBSRAT Attacks Targeting Russian Organizations Linked to Roaming Tiger |
Microsoft bcdedit 2021
Microsoft. (2021, May 27). bcdedit. Retrieved June 23, 2021.
Internal MISP references
UUID 40dedfcb-f666-4f2d-a518-5cd4ae2e273c
which can be used as unique global reference for Microsoft bcdedit 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-06-23T00:00:00Z |
date_published | 2021-05-27T00:00:00Z |
source | MITRE |
title | bcdedit |
Securelist BlackEnergy Nov 2014
Baumgartner, K. and Garnaeva, M.. (2014, November 3). BE2 custom plugins, router abuse, and target profiles. Retrieved March 24, 2016.
Internal MISP references
UUID c64696d0-ee42-41e5-92cb-13cf43fac0c9
which can be used as unique global reference for Securelist BlackEnergy Nov 2014
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-03-24T00:00:00Z |
date_published | 2014-11-03T00:00:00Z |
source | MITRE |
title | BE2 custom plugins, router abuse, and target profiles |
Securelist BlackEnergy Feb 2015
Baumgartner, K. and Garnaeva, M.. (2015, February 17). BE2 extraordinary plugins, Siemens targeting, dev fails. Retrieved March 24, 2016.
Internal MISP references
UUID ef043c07-6ae6-4cd2-82cf-7cbdb259f676
which can be used as unique global reference for Securelist BlackEnergy Feb 2015
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-03-24T00:00:00Z |
date_published | 2015-02-17T00:00:00Z |
source | MITRE |
title | BE2 extraordinary plugins, Siemens targeting, dev fails |
Crowdstrike DNC June 2016
Alperovitch, D.. (2016, June 15). Bears in the Midst: Intrusion into the Democratic National Committee. Retrieved August 3, 2016.
Internal MISP references
UUID 7f4edc06-ac67-4d71-b39c-5df9ce521bbb
which can be used as unique global reference for Crowdstrike DNC June 2016
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-08-03T00:00:00Z |
date_published | 2016-06-15T00:00:00Z |
source | MITRE, Tidal Cyber |
title | Bears in the Midst: Intrusion into the Democratic National Committee |
Deep Instinct Black Basta August 2022
Vilkomir-Preisman, S. (2022, August 18). Beating Black Basta Ransomware. Retrieved March 8, 2023.
Internal MISP references
UUID 72b64d7d-f8eb-54d3-83c8-a883906ceea1
which can be used as unique global reference for Deep Instinct Black Basta August 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-08T00:00:00Z |
date_published | 2022-08-18T00:00:00Z |
source | MITRE |
title | Beating Black Basta Ransomware |
Bienstock, D. - Defending O365 - 2019
Bienstock, D.. (2019). BECS and Beyond: Investigating and Defending O365. Retrieved September 13, 2019.
Internal MISP references
UUID 4866e6c3-c1b2-4131-bd8f-0ac228168a10
which can be used as unique global reference for Bienstock, D. - Defending O365 - 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-09-13T00:00:00Z |
date_published | 2019-01-01T00:00:00Z |
source | MITRE |
title | BECS and Beyond: Investigating and Defending O365 |
Kevin Mandia Statement to US Senate Committee on Intelligence
Kevin Mandia. (2017, March 30). Prepared Statement of Kevin Mandia, CEO of FireEye, Inc. before the United States Senate Select Committee on Intelligence. Retrieved April 19, 2019.
Internal MISP references
UUID c40a3f96-75f4-4b1c-98a5-cb38129c6dc4
which can be used as unique global reference for Kevin Mandia Statement to US Senate Committee on Intelligence
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-04-19T00:00:00Z |
source | MITRE |
title | before the United States Senate Select Committee on Intelligence |
Microsoft Dofoil 2018
Windows Defender Research. (2018, March 7). Behavior monitoring combined with machine learning spoils a massive Dofoil coin mining campaign. Retrieved March 20, 2018.
Internal MISP references
UUID 85069317-2c25-448b-9ff4-504e429dc1bf
which can be used as unique global reference for Microsoft Dofoil 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-03-20T00:00:00Z |
date_published | 2018-03-07T00:00:00Z |
source | MITRE |
title | Behavior monitoring combined with machine learning spoils a massive Dofoil coin mining campaign |
Obsidian SSPR Abuse 2023
Noah Corradin and Shuyang Wang. (2023, August 1). Behind The Breach: Self-Service Password Reset (SSPR) Abuse in Azure AD. Retrieved March 28, 2024.
Internal MISP references
UUID 7f28f770-ef06-5923-b759-b731ceabe08a
which can be used as unique global reference for Obsidian SSPR Abuse 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-28T00:00:00Z |
date_published | 2023-08-01T00:00:00Z |
source | MITRE |
title | Behind The Breach: Self-Service Password Reset (SSPR) Abuse in Azure AD |
FireEye CARBANAK June 2017
Bennett, J., Vengerik, B. (2017, June 12). Behind the CARBANAK Backdoor. Retrieved June 11, 2018.
Internal MISP references
UUID 39105492-6044-460c-9dc9-3d4473ee862e
which can be used as unique global reference for FireEye CARBANAK June 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-06-11T00:00:00Z |
date_published | 2017-06-12T00:00:00Z |
source | MITRE |
title | Behind the CARBANAK Backdoor |
Expel Behind the Scenes
S. Lipton, L. Easterly, A. Randazzo and J. Hencinski. (2020, July 28). Behind the scenes in the Expel SOC: Alert-to-fix in AWS. Retrieved October 1, 2020.
Internal MISP references
UUID d538026c-da30-48d2-bc30-fde3776db1a8
which can be used as unique global reference for Expel Behind the Scenes
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-01T00:00:00Z |
date_published | 2020-07-28T00:00:00Z |
source | MITRE |
title | Behind the scenes in the Expel SOC: Alert-to-fix in AWS |
Microsoft BEC Campaign
Carr, N., Sellmer, S. (2021, June 14). Behind the scenes of business email compromise: Using cross-domain threat data to disrupt a large BEC campaign. Retrieved June 15, 2021.
Internal MISP references
UUID 1de8c853-2b0c-439b-a31b-a2c4fa9f4206
which can be used as unique global reference for Microsoft BEC Campaign
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-06-15T00:00:00Z |
date_published | 2021-06-14T00:00:00Z |
source | MITRE |
title | Behind the scenes of business email compromise: Using cross-domain threat data to disrupt a large BEC campaign |
Unit42 BendyBear Feb 2021
Harbison, M. (2021, February 9). BendyBear: Novel Chinese Shellcode Linked With Cyber Espionage Group BlackTech. Retrieved February 16, 2021.
Internal MISP references
UUID f5cbc08f-6f2c-4c81-9d68-07f61e16f138
which can be used as unique global reference for Unit42 BendyBear Feb 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-02-16T00:00:00Z |
date_published | 2021-02-09T00:00:00Z |
source | MITRE |
title | BendyBear: Novel Chinese Shellcode Linked With Cyber Espionage Group BlackTech |
Google Cloud Storage Best Practices, 2019
Google. (2019, September 16). Best practices for Cloud Storage. Retrieved October 4, 2019.
Internal MISP references
UUID 752ad355-0f10-4c8d-bad8-42bf2fc75fa0
which can be used as unique global reference for Google Cloud Storage Best Practices, 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-10-04T00:00:00Z |
date_published | 2019-09-16T00:00:00Z |
source | MITRE |
title | Best practices for Cloud Storage |
AWS Management Account Best Practices
AWS. (n.d.). Best practices for the management account. Retrieved October 16, 2024.
Internal MISP references
UUID f20b5870-d82d-5c50-893a-73248c8f5900
which can be used as unique global reference for AWS Management Account Best Practices
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-10-16T00:00:00Z |
source | MITRE |
title | Best practices for the management account |
Shadowbunny VM Defense Evasion
Johann Rehberger. (2020, September 23). Beware of the Shadowbunny - Using virtual machines to persist and evade detections. Retrieved September 22, 2021.
Internal MISP references
UUID eef7cd8a-8cb6-4b24-ba49-9b17353d20b5
which can be used as unique global reference for Shadowbunny VM Defense Evasion
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-22T00:00:00Z |
date_published | 2020-09-23T00:00:00Z |
source | MITRE |
title | Beware of the Shadowbunny - Using virtual machines to persist and evade detections |
Akamai Corona Zero-Day August 28 2024
Kyle Lefton, Larry Cashdollar, Aline Eliovich. (2024, August 28). Beware the Unpatchable: Corona Mirai Botnet Spreads via Zero-Day. Retrieved September 5, 2024.
Internal MISP references
UUID 140284f8-075c-4225-99dd-519ba5cebabe
which can be used as unique global reference for Akamai Corona Zero-Day August 28 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-05T00:00:00Z |
date_published | 2024-08-28T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Beware the Unpatchable: Corona Mirai Botnet Spreads via Zero-Day |
T1105: Trellix_search-ms
Mathanraj Thangaraju, Sijo Jacob. (2023, July 26). Beyond File Search: A Novel Method for Exploiting the "search-ms" URI Protocol Handler. Retrieved March 15, 2024.
Internal MISP references
UUID 7079d170-9ead-5be4-bbc8-13c3f082b3dd
which can be used as unique global reference for T1105: Trellix_search-ms
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-15T00:00:00Z |
date_published | 2023-07-26T00:00:00Z |
source | MITRE |
title | Beyond File Search: A Novel Method for Exploiting the "search-ms" URI Protocol Handler |
Hexacorn Office Test
Hexacorn. (2014, April 16). Beyond good ol’ Run key, Part 10. Retrieved July 3, 2017.
Internal MISP references
UUID 60d90852-ea00-404d-b613-9ad1589aff31
which can be used as unique global reference for Hexacorn Office Test
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-07-03T00:00:00Z |
date_published | 2014-04-16T00:00:00Z |
source | MITRE |
title | Beyond good ol’ Run key, Part 10 |
Hexacorn Logon Scripts
Hexacorn. (2014, November 14). Beyond good ol’ Run key, Part 18. Retrieved November 15, 2019.
Internal MISP references
UUID bdcdfe9e-1f22-4472-9a86-faefcb5c5618
which can be used as unique global reference for Hexacorn Logon Scripts
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-11-15T00:00:00Z |
date_published | 2014-11-14T00:00:00Z |
source | MITRE |
title | Beyond good ol’ Run key, Part 18 |
Hexacorn DLL Hijacking
Hexacorn. (2013, December 8). Beyond good ol’ Run key, Part 5. Retrieved August 14, 2024.
Internal MISP references
UUID bbe0690e-f368-5715-8a41-aa95836a5e4c
which can be used as unique global reference for Hexacorn DLL Hijacking
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-08-14T00:00:00Z |
date_published | 2013-12-08T00:00:00Z |
source | MITRE |
title | Beyond good ol’ Run key, Part 5 |
Hexacorn Office Template Macros
Hexacorn. (2017, April 17). Beyond good ol’ Run key, Part 62. Retrieved July 3, 2017.
Internal MISP references
UUID 7d558a35-a5c0-4e4c-92bf-cb2435c41a95
which can be used as unique global reference for Hexacorn Office Template Macros
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-07-03T00:00:00Z |
date_published | 2017-04-17T00:00:00Z |
source | MITRE |
title | Beyond good ol’ Run key, Part 62 |
Bginfo.exe - LOLBAS Project
LOLBAS. (2018, May 25). Bginfo.exe. Retrieved December 4, 2023.
Internal MISP references
UUID ca1eaac2-7449-4a76-bec2-9dc5971fd808
which can be used as unique global reference for Bginfo.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2018-05-25T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Bginfo.exe |
Cyble August 18 2022
Cybleinc. (2022, August 18). BianLian: New Ransomware variant on the rise. Retrieved May 18, 2023.
Internal MISP references
UUID 2de00d16-9b9e-4e03-925f-4fcdae4d6e1a
which can be used as unique global reference for Cyble August 18 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-18T00:00:00Z |
date_published | 2022-08-18T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | BianLian: New Ransomware variant on the rise |
BianLian Ransomware Gang Gives It a Go! | [redacted]
Ben Armstrong, Lauren Pearce, Brad Pittack, Danny Quist. (2022, September 1). BianLian Ransomware Gang Gives It a Go!. Retrieved May 18, 2023.
Internal MISP references
UUID fc1aa979-7dbc-4fff-a8d1-b35a3b2bec3d
which can be used as unique global reference for BianLian Ransomware Gang Gives It a Go! | [redacted]
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-18T00:00:00Z |
date_published | 2022-09-01T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | BianLian Ransomware Gang Gives It a Go! |
Group IB APT 41 June 2021
Rostovcev, N. (2021, June 10). Big airline heist APT41 likely behind a third-party attack on Air India. Retrieved August 26, 2021.
Internal MISP references
UUID a2bf43a0-c7da-4cb9-8f9a-b34fac92b625
which can be used as unique global reference for Group IB APT 41 June 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-08-26T00:00:00Z |
date_published | 2021-06-10T00:00:00Z |
source | MITRE |
title | Big airline heist APT41 likely behind a third-party attack on Air India |
Crowdstrike Indrik November 2018
Frankoff, S., Hartley, B. (2018, November 14). Big Game Hunting: The Evolution of INDRIK SPIDER From Dridex Wire Fraud to BitPaymer Targeted Ransomware. Retrieved January 6, 2021.
Internal MISP references
UUID 0f85f611-90db-43ba-8b71-5d0d4ec8cdd5
which can be used as unique global reference for Crowdstrike Indrik November 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-01-06T00:00:00Z |
date_published | 2018-11-14T00:00:00Z |
source | MITRE, Tidal Cyber |
title | Big Game Hunting: The Evolution of INDRIK SPIDER From Dridex Wire Fraud to BitPaymer Targeted Ransomware |
CrowdStrike Ryuk January 2019
Hanel, A. (2019, January 10). Big Game Hunting with Ryuk: Another Lucrative Targeted Ransomware. Retrieved May 12, 2020.
Internal MISP references
UUID df471757-2ce0-48a7-922f-a84c57704914
which can be used as unique global reference for CrowdStrike Ryuk January 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-05-12T00:00:00Z |
date_published | 2019-01-10T00:00:00Z |
source | MITRE, Tidal Cyber |
title | Big Game Hunting with Ryuk: Another Lucrative Targeted Ransomware |
Elastic Binary Executed from Shared Memory Directory
Elastic. (n.d.). Binary Executed from Shared Memory Directory. Retrieved September 24, 2024.
Internal MISP references
UUID 025912f5-531c-5a14-b300-e42f00077264
which can be used as unique global reference for Elastic Binary Executed from Shared Memory Directory
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-24T00:00:00Z |
source | MITRE |
title | Binary Executed from Shared Memory Directory |
OWASP Binary Planting
OWASP. (2013, January 30). Binary planting. Retrieved June 7, 2016.
Internal MISP references
UUID 86fc5a62-385e-4c56-9812-138db0808fba
which can be used as unique global reference for OWASP Binary Planting
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-06-07T00:00:00Z |
date_published | 2013-01-30T00:00:00Z |
source | MITRE |
title | Binary planting |
Wikipedia Binary-to-text Encoding
Wikipedia. (2016, December 26). Binary-to-text encoding. Retrieved March 1, 2017.
Internal MISP references
UUID 9b3820e8-f094-4e87-9ed6-ab0207d509fb
which can be used as unique global reference for Wikipedia Binary-to-text Encoding
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-03-01T00:00:00Z |
date_published | 2016-12-26T00:00:00Z |
source | MITRE |
title | Binary-to-text encoding |
Sucuri BIND9 August 2015
Cid, D.. (2015, August 2). BIND9 – Denial of Service Exploit in the Wild. Retrieved April 26, 2019.
Internal MISP references
UUID 5e108782-2f32-4704-be01-055d9e767216
which can be used as unique global reference for Sucuri BIND9 August 2015
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-04-26T00:00:00Z |
date_published | 2015-08-02T00:00:00Z |
source | MITRE |
title | BIND9 – Denial of Service Exploit in the Wild |
Wikipedia BIOS
Wikipedia. (n.d.). BIOS. Retrieved January 5, 2016.
Internal MISP references
UUID 0c4a2cb3-d663-47ee-87af-c5e9e68fe15f
which can be used as unique global reference for Wikipedia BIOS
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-01-05T00:00:00Z |
source | MITRE |
title | BIOS |
Ge 2011
Ge, L. (2011, September 9). BIOS Threat is Showing up Again!. Retrieved November 14, 2014.
Internal MISP references
UUID dd6032fb-8913-4593-81b9-86d1239e01f4
which can be used as unique global reference for Ge 2011
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2014-11-14T00:00:00Z |
date_published | 2011-09-09T00:00:00Z |
source | MITRE |
title | BIOS Threat is Showing up Again! |
Broadcom BirdyClient Microsoft Graph API 2024
Broadcom. (2024, May 2). BirdyClient malware leverages Microsoft Graph API for C&C communication. Retrieved July 1, 2024.
Internal MISP references
UUID a55197e2-3ed7-5b6f-8ab5-06218c2226a4
which can be used as unique global reference for Broadcom BirdyClient Microsoft Graph API 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-07-01T00:00:00Z |
date_published | 2024-05-02T00:00:00Z |
source | MITRE |
title | BirdyClient malware leverages Microsoft Graph API for C&C communication |
Talos Bisonal Mar 2020
Mercer, W., et al. (2020, March 5). Bisonal: 10 years of play. Retrieved January 26, 2022.
Internal MISP references
UUID eaecccff-e0a0-4fa0-81e5-799b23c26b5a
which can be used as unique global reference for Talos Bisonal Mar 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-01-26T00:00:00Z |
date_published | 2020-03-05T00:00:00Z |
source | MITRE |
title | Bisonal: 10 years of play |
Talos Bisonal 10 Years March 2020
Warren Mercer, Paul Rascagneres, Vitor Ventura. (2020, March 6). Bisonal 10 Years of Play. Retrieved October 17, 2021.
Internal MISP references
UUID 6844e59b-d393-43df-9978-e3e3cc7b8db6
which can be used as unique global reference for Talos Bisonal 10 Years March 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-17T00:00:00Z |
date_published | 2020-03-06T00:00:00Z |
source | MITRE |
title | Bisonal 10 Years of Play |
Unit 42 Bisonal July 2018
Hayashi, K., Ray, V. (2018, July 31). Bisonal Malware Used in Attacks Against Russia and South Korea. Retrieved August 7, 2018.
Internal MISP references
UUID 30b2ec12-b785-43fb-ab72-b37387046d15
which can be used as unique global reference for Unit 42 Bisonal July 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-08-07T00:00:00Z |
date_published | 2018-07-31T00:00:00Z |
source | MITRE |
title | Bisonal Malware Used in Attacks Against Russia and South Korea |
Bitsadmin.exe - LOLBAS Project
LOLBAS. (2018, May 25). Bitsadmin.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 89bdc17b-553c-4245-acde-f6c56602e357
which can be used as unique global reference for Bitsadmin.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2018-05-25T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Bitsadmin.exe |
Microsoft BITSAdmin
Microsoft. (n.d.). BITSAdmin Tool. Retrieved January 12, 2018.
Internal MISP references
UUID 5b8c2a8c-f01e-491a-aaf9-504ee7a1caed
which can be used as unique global reference for Microsoft BITSAdmin
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-01-12T00:00:00Z |
source | MITRE |
title | BITSAdmin Tool |
Cisco Talos Bitter Bangladesh May 2022
Raghuprasad, C . (2022, May 11). Bitter APT adds Bangladesh to their targets. Retrieved June 1, 2022.
Internal MISP references
UUID 097583ed-03b0-41cd-bf85-66d473f46439
which can be used as unique global reference for Cisco Talos Bitter Bangladesh May 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-06-01T00:00:00Z |
date_published | 2022-05-11T00:00:00Z |
source | MITRE |
title | Bitter APT adds Bangladesh to their targets |
Forcepoint BITTER Pakistan Oct 2016
Dela Paz, R. (2016, October 21). BITTER: a targeted attack against Pakistan. Retrieved June 1, 2022.
Internal MISP references
UUID 9fc54fb0-b7d9-49dc-b6dd-ab4cb2cd34fa
which can be used as unique global reference for Forcepoint BITTER Pakistan Oct 2016
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-06-01T00:00:00Z |
date_published | 2016-10-21T00:00:00Z |
source | MITRE |
title | BITTER: a targeted attack against Pakistan |
Camba RARSTONE
Camba, A. (2013, February 27). BKDR_RARSTONE: New RAT to Watch Out For. Retrieved January 8, 2016.
Internal MISP references
UUID bca93846-457d-4644-ba43-f9293982916f
which can be used as unique global reference for Camba RARSTONE
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-01-08T00:00:00Z |
date_published | 2013-02-27T00:00:00Z |
source | MITRE |
title | BKDR_RARSTONE: New RAT to Watch Out For |
TrendMicro BKDR_URSNIF.SM
Sioting, S. (2013, June 15). BKDR_URSNIF.SM. Retrieved June 5, 2019.
Internal MISP references
UUID aa791512-039e-4230-ab49-f184ca0e38c5
which can be used as unique global reference for TrendMicro BKDR_URSNIF.SM
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-06-05T00:00:00Z |
date_published | 2013-06-15T00:00:00Z |
source | MITRE |
title | BKDR_URSNIF.SM |
Cyble September 28 2022
Cybleinc. (2023, September 28). Bl00dy – New Ransomware Strain Active in the Wild. Retrieved August 3, 2023.
Internal MISP references
UUID ae2daa9c-6741-4ab7-854d-bee1170b3d7a
which can be used as unique global reference for Cyble September 28 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-08-03T00:00:00Z |
date_published | 2023-09-28T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Bl00dy – New Ransomware Strain Active in the Wild |
Trend Micro Pikabot January 9 2024
Shinji Robert Arasawa, Joshua Aquino, Charles Steven Derion, Juhn Emmanuel Atanque, Francisrey Joshua Castillo, John Carlo Marquez, Henry Salcedo, John Rainier Navato, Arianne Dela Cruz, Raymart Yambot, Ian Kenefick. (2024, January 9). Black Basta-Affiliated Water Curupira’s Pikabot Spam Campaign. Retrieved January 11, 2024.
Internal MISP references
UUID dc7d882b-4e83-42da-8e2f-f557b675930a
which can be used as unique global reference for Trend Micro Pikabot January 9 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-01-11T00:00:00Z |
date_published | 2024-01-09T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Black Basta-Affiliated Water Curupira’s Pikabot Spam Campaign |
TrendMicro Pikabot 2024
Shinji Robert Arasawa, Joshua Aquino, Charles Steven Derion, Juhn Emmanuel Atanque, Francisrey Joshua Castillo, John Carlo Marquez, Henry Salcedo, John Rainier Navato, Arianne Dela Cruz, Raymart Yambot & Ian Kenefick. (2024, January 9). Black Basta-Affiliated Water Curupira’s Pikabot Spam Campaign. Retrieved July 17, 2024.
Internal MISP references
UUID a2a22246-d49e-5847-9d20-dac64f1df3ea
which can be used as unique global reference for TrendMicro Pikabot 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-07-17T00:00:00Z |
date_published | 2024-01-09T00:00:00Z |
source | MITRE |
title | Black Basta-Affiliated Water Curupira’s Pikabot Spam Campaign |
Check Point Black Basta October 2022
Check Point. (2022, October 20). BLACK BASTA AND THE UNNOTICED DELIVERY. Retrieved March 8, 2023.
Internal MISP references
UUID 7a00457b-ae72-5aea-904f-9ca7f4cb9fe9
which can be used as unique global reference for Check Point Black Basta October 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-08T00:00:00Z |
date_published | 2022-10-20T00:00:00Z |
source | MITRE |
title | BLACK BASTA AND THE UNNOTICED DELIVERY |
BlackBasta
Antonio Cocomazzi and Antonio Pirozzi. (2022, November 3). Black Basta Ransomware | Attacks Deploy Custom EDR Evasion Tools Tied to FIN7 Threat Actor. Retrieved March 14, 2023.
Internal MISP references
UUID c7e55e37-d051-5111-8d0a-738656f88650
which can be used as unique global reference for BlackBasta
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-14T00:00:00Z |
date_published | 2022-11-03T00:00:00Z |
source | MITRE |
title | Black Basta Ransomware |
Trend Micro Black Basta October 2022
Kenefick, I. et al. (2022, October 12). Black Basta Ransomware Gang Infiltrates Networks via QAKBOT, Brute Ratel, and Cobalt Strike. Retrieved February 6, 2023.
Internal MISP references
UUID 6e4a1565-4a30-5a6b-961c-226a6f1967ae
which can be used as unique global reference for Trend Micro Black Basta October 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-02-06T00:00:00Z |
date_published | 2022-10-12T00:00:00Z |
source | MITRE |
title | Black Basta Ransomware Gang Infiltrates Networks via QAKBOT, Brute Ratel, and Cobalt Strike |
Uptycs Black Basta ESXi June 2022
Sharma, S. and Hegde, N. (2022, June 7). Black basta Ransomware Goes Cross-Platform, Now Targets ESXi Systems. Retrieved March 8, 2023.
Internal MISP references
UUID a8145e38-c2a4-5021-824d-5a831299b9d9
which can be used as unique global reference for Uptycs Black Basta ESXi June 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-08T00:00:00Z |
date_published | 2022-06-07T00:00:00Z |
source | MITRE |
title | Black basta Ransomware Goes Cross-Platform, Now Targets ESXi Systems |
Elliptic Black Basta November 29 2023
Elliptic Research. (2023, November 29). Black Basta ransomware victims have paid over $100 million. Retrieved May 14, 2024.
Internal MISP references
UUID dc7579c0-911d-417d-bba5-bc36e078b640
which can be used as unique global reference for Elliptic Black Basta November 29 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-05-14T00:00:00Z |
date_published | 2023-11-29T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Black Basta ransomware victims have paid over $100 million |
BlackBerry Black Basta May 2022
Ballmer, D. (2022, May 6). Black Basta: Rebrand of Conti or Something New?. Retrieved March 7, 2023.
Internal MISP references
UUID 32a272fe-ac10-5478-88a0-b3dd366ec540
which can be used as unique global reference for BlackBerry Black Basta May 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-07T00:00:00Z |
date_published | 2022-05-06T00:00:00Z |
source | MITRE |
title | Black Basta: Rebrand of Conti or Something New? |
WMI 6
Microsoft. (2022, June 13). BlackCat. Retrieved February 13, 2024.
Internal MISP references
UUID df07a086-0d38-570b-b0c5-9f5061212db7
which can be used as unique global reference for WMI 6
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-02-13T00:00:00Z |
date_published | 2022-06-13T00:00:00Z |
source | MITRE |
title | BlackCat |
FBI BlackCat April 19 2022
FBI. (2022, April 19). BlackCat/ALPHV Ransomware Indicators of Compromise. Retrieved September 14, 2023.
Internal MISP references
UUID 2640b58c-8413-4691-80e1-33aec9b6c7f6
which can be used as unique global reference for FBI BlackCat April 19 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-14T00:00:00Z |
date_published | 2022-04-19T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | BlackCat/ALPHV Ransomware Indicators of Compromise |
X-Force BlackCat May 30 2023
IBM Security X-Force Team. (2023, May 30). BlackCat (ALPHV) ransomware levels up for stealth, speed and exfiltration. Retrieved September 14, 2023.
Internal MISP references
UUID b80c1f70-9d05-4f4b-bdc2-6157c6837202
which can be used as unique global reference for X-Force BlackCat May 30 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-14T00:00:00Z |
date_published | 2023-05-30T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | BlackCat (ALPHV) ransomware levels up for stealth, speed and exfiltration |
BlackBerry BlackCat Threat Overview
BlackBerry. (n.d.). BlackCat Malware (AKA ALPHV). Retrieved September 14, 2023.
Internal MISP references
UUID 59f98ae1-c62d-460f-8d2a-9ae287b59953
which can be used as unique global reference for BlackBerry BlackCat Threat Overview
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-14T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | BlackCat Malware (AKA ALPHV) |
Huntress BlackCat
Carvey, H. (2024, February 28). BlackCat Ransomware Affiliate TTPs. Retrieved March 27, 2024.
Internal MISP references
UUID faa60cf9-0fc5-5728-90be-d0e11b48a921
which can be used as unique global reference for Huntress BlackCat
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-27T00:00:00Z |
date_published | 2024-02-28T00:00:00Z |
source | MITRE |
title | BlackCat Ransomware Affiliate TTPs |
Sophos BlackCat Jul 2022
Brandt, Andrew. (2022, July 14). BlackCat ransomware attacks not merely a byproduct of bad luck. Retrieved December 20, 2022.
Internal MISP references
UUID 481a0106-d5b6-532c-8f5b-6c0c477185f4
which can be used as unique global reference for Sophos BlackCat Jul 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-12-20T00:00:00Z |
date_published | 2022-07-14T00:00:00Z |
source | MITRE |
title | BlackCat ransomware attacks not merely a byproduct of bad luck |
ESEST Black Energy Jan 2016
Cherepanov, A.. (2016, January 3). BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry. Retrieved May 18, 2016.
Internal MISP references
UUID 4d626eb9-3722-4aa4-b95e-1650cc2865c2
which can be used as unique global reference for ESEST Black Energy Jan 2016
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-05-18T00:00:00Z |
date_published | 2016-01-03T00:00:00Z |
source | MITRE |
title | BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry |
ESET BlackEnergy Jan 2016
Cherepanov, A.. (2016, January 3). BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry . Retrieved June 10, 2020.
Internal MISP references
UUID a0103079-c966-46b6-8871-c01f7f0eea4c
which can be used as unique global reference for ESET BlackEnergy Jan 2016
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-06-10T00:00:00Z |
date_published | 2016-01-03T00:00:00Z |
source | MITRE |
title | BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry |
F-Secure BlackEnergy 2014
F-Secure Labs. (2014). BlackEnergy & Quedagh: The convergence of crimeware and APT attacks. Retrieved March 24, 2016.
Internal MISP references
UUID 5f228fb5-d959-4c4a-bb8c-f9dc01d5af07
which can be used as unique global reference for F-Secure BlackEnergy 2014
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-03-24T00:00:00Z |
date_published | 2014-01-01T00:00:00Z |
source | MITRE |
title | BlackEnergy & Quedagh: The convergence of crimeware and APT attacks |
ESET BlackLotus March 01 2023
Martin Smolár. (2023, March 1). BlackLotus UEFI bootkit: Myth confirmed. Retrieved September 29, 2023.
Internal MISP references
UUID 1a4c134b-c701-400f-beee-e6b3cc835042
which can be used as unique global reference for ESET BlackLotus March 01 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-29T00:00:00Z |
date_published | 2023-03-01T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | BlackLotus UEFI bootkit: Myth confirmed |
Securelist BlackOasis Oct 2017
Kaspersky Lab's Global Research & Analysis Team. (2017, October 16). BlackOasis APT and new targeted attacks leveraging zero-day exploit. Retrieved February 15, 2018.
Internal MISP references
UUID 66121c37-6b66-4ab2-9f63-1adb80dcec62
which can be used as unique global reference for Securelist BlackOasis Oct 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-02-15T00:00:00Z |
date_published | 2017-10-16T00:00:00Z |
source | MITRE, Tidal Cyber |
title | BlackOasis APT and new targeted attacks leveraging zero-day exploit |
ReliaQuest May 28 2024
ReliaQuest Threat Research Team. (2024, May 28). BlackSuit Attack Analysis - ReliaQuest. Retrieved June 5, 2024.
Internal MISP references
UUID 2a67b1df-9a15-487e-a777-8a3fe46b0179
which can be used as unique global reference for ReliaQuest May 28 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-06-05T00:00:00Z |
date_published | 2024-05-28T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | BlackSuit Attack Analysis - ReliaQuest |
HC3 Analyst Note BlackSuit Ransomware November 2023
Health Sector Cybersecurity Coordination Center (HC3). (2023, November 6). BlackSuit Ransomware. Retrieved June 7, 2024.
Internal MISP references
UUID d956f0c6-d90e-49e8-a64c-a46bfc177cc6
which can be used as unique global reference for HC3 Analyst Note BlackSuit Ransomware November 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-06-07T00:00:00Z |
date_published | 2023-11-06T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | BlackSuit Ransomware |
Cyble May 12 2023
Cybleinc. (2023, May 12). BlackSuit Ransomware Strikes Windows and Linux Users. Retrieved January 1, 2024.
Internal MISP references
UUID 7e335494-86a7-49cd-a9f3-783d73c36d9d
which can be used as unique global reference for Cyble May 12 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-01-01T00:00:00Z |
date_published | 2023-05-12T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | BlackSuit Ransomware Strikes Windows and Linux Users |
Palo Alto Black-T October 2020
Quist, N. (2020, October 5). Black-T: New Cryptojacking Variant from TeamTNT. Retrieved September 22, 2021.
Internal MISP references
UUID d4351c8e-026d-4660-9344-166481ecf64a
which can be used as unique global reference for Palo Alto Black-T October 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-22T00:00:00Z |
date_published | 2020-10-05T00:00:00Z |
source | MITRE |
title | Black-T: New Cryptojacking Variant from TeamTNT |
BlackWater Malware Cloudflare Workers
Lawrence Abrams. (2020, March 14). BlackWater Malware Abuses Cloudflare Workers for C2 Communication. Retrieved July 8, 2022.
Internal MISP references
UUID 053895e8-da3f-4291-a728-2198fde774e7
which can be used as unique global reference for BlackWater Malware Cloudflare Workers
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-07-08T00:00:00Z |
date_published | 2020-03-14T00:00:00Z |
source | MITRE |
title | BlackWater Malware Abuses Cloudflare Workers for C2 Communication |
NHS UK BLINDINGCAN Aug 2020
NHS Digital . (2020, August 20). BLINDINGCAN Remote Access Trojan. Retrieved August 20, 2020.
Internal MISP references
UUID acca4c89-acce-4916-88b6-f4dac7d8ab19
which can be used as unique global reference for NHS UK BLINDINGCAN Aug 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-08-20T00:00:00Z |
date_published | 2020-08-20T00:00:00Z |
source | MITRE |
title | BLINDINGCAN Remote Access Trojan |
Azure Blob Snapshots
Microsoft Azure. (2021, December 29). Blob snapshots. Retrieved March 2, 2022.
Internal MISP references
UUID 152628ab-3244-4cc7-a68e-a220b652039b
which can be used as unique global reference for Azure Blob Snapshots
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-03-02T00:00:00Z |
date_published | 2021-12-29T00:00:00Z |
source | MITRE |
title | Blob snapshots |
objsee block blocking login items
Patrick Wardle. (2018, July 23). Block Blocking Login Items. Retrieved October 1, 2021.
Internal MISP references
UUID 76511800-8331-476b-ab4f-0daa587f5e22
which can be used as unique global reference for objsee block blocking login items
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-01T00:00:00Z |
date_published | 2018-07-23T00:00:00Z |
source | MITRE |
title | Block Blocking Login Items |
Technospot Chrome Extensions GP
Mohta, A. (n.d.). Block Chrome Extensions using Google Chrome Group Policy Settings. Retrieved January 10, 2018.
Internal MISP references
UUID 76faf20c-27d3-4e67-8ab7-8480f8f88ae5
which can be used as unique global reference for Technospot Chrome Extensions GP
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-01-10T00:00:00Z |
source | MITRE |
title | Block Chrome Extensions using Google Chrome Group Policy Settings |
Evi1cg Forfiles Nov 2017
Evi1cg. (2017, November 26). block cmd.exe ? try this :. Retrieved September 12, 2024.
Internal MISP references
UUID b292b85e-68eb-43c3-9b5b-222810e2f26a
which can be used as unique global reference for Evi1cg Forfiles Nov 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-12T00:00:00Z |
date_published | 2017-11-26T00:00:00Z |
source | MITRE |
title | block cmd.exe ? try this : |
Fifield Blocking Resistent Communication through domain fronting 2015
David Fifield, Chang Lan, Rod Hynes, Percy Wegmann, and Vern Paxson. (2015). Blocking-resistant communication through domain fronting. Retrieved November 20, 2017.
Internal MISP references
UUID 52671075-c425-40c7-a49a-b75e44a0c58a
which can be used as unique global reference for Fifield Blocking Resistent Communication through domain fronting 2015
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-11-20T00:00:00Z |
date_published | 2015-01-01T00:00:00Z |
source | MITRE |
title | Blocking-resistant communication through domain fronting |
GitHub Bloodhound
Robbins, A., Vazarkar, R., and Schroeder, W. (2016, April 17). Bloodhound: Six Degrees of Domain Admin. Retrieved March 5, 2019.
Internal MISP references
UUID e90b4941-5dff-4f38-b4dd-af3426fd621e
which can be used as unique global reference for GitHub Bloodhound
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-03-05T00:00:00Z |
date_published | 2016-04-17T00:00:00Z |
source | MITRE |
title | Bloodhound: Six Degrees of Domain Admin |
PwC Blue Callisto December 6 2022
PwC Threat Intelligence. (2022, December 6). Blue Callisto orbits around US Laboratories in 2022. Retrieved October 1, 2024.
Internal MISP references
UUID ab48a205-ca06-4328-96a4-876007024a7d
which can be used as unique global reference for PwC Blue Callisto December 6 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-10-01T00:00:00Z |
date_published | 2022-12-06T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Blue Callisto orbits around US Laboratories in 2022 |
Blue Cloud of Death
Kunz, Bryce. (2018, May 11). Blue Cloud of Death: Red Teaming Azure. Retrieved October 23, 2019.
Internal MISP references
UUID 0c764280-9d8c-4fa4-9088-170f02550d4c
which can be used as unique global reference for Blue Cloud of Death
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-10-23T00:00:00Z |
date_published | 2018-05-11T00:00:00Z |
source | MITRE |
title | Blue Cloud of Death: Red Teaming Azure |
Blue Cloud of Death Video
Kunz, Bruce. (2018, October 14). Blue Cloud of Death: Red Teaming Azure. Retrieved November 21, 2019.
Internal MISP references
UUID 39b0adf6-c71e-4501-b8bb-fab82718486b
which can be used as unique global reference for Blue Cloud of Death Video
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-11-21T00:00:00Z |
date_published | 2018-10-14T00:00:00Z |
source | MITRE |
title | Blue Cloud of Death: Red Teaming Azure |
1 - appv
SEONGSU PARK. (2022, December 27). BlueNoroff introduces new methods bypassing MoTW. Retrieved February 6, 2024.
Internal MISP references
UUID acdf0a7f-f341-5bec-bfe0-f879827f0185
which can be used as unique global reference for 1 - appv
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-02-06T00:00:00Z |
date_published | 2022-12-27T00:00:00Z |
source | MITRE |
title | BlueNoroff introduces new methods bypassing MoTW |
apple doco bonjour description
Apple Inc. (2013, April 23). Bonjour Overview. Retrieved October 11, 2021.
Internal MISP references
UUID b8538d67-ab91-41c2-9cc3-a7b00c6b372a
which can be used as unique global reference for apple doco bonjour description
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-11T00:00:00Z |
date_published | 2013-04-23T00:00:00Z |
source | MITRE |
title | Bonjour Overview |
Booby Trap Shortcut 2017
Weyne, F. (2017, April). Booby trap a shortcut with a backdoor. Retrieved October 3, 2023.
Internal MISP references
UUID 1a820fb8-3cff-584b-804f-9bad0592873b
which can be used as unique global reference for Booby Trap Shortcut 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-10-03T00:00:00Z |
date_published | 2017-04-01T00:00:00Z |
source | MITRE |
title | Booby trap a shortcut with a backdoor |
Microsoft Bootcfg
Gerend, J. et al. (2017, October 16). bootcfg. Retrieved August 30, 2021.
Internal MISP references
UUID 44ffaa60-4461-4463-a1b5-abc868368c0a
which can be used as unique global reference for Microsoft Bootcfg
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-08-30T00:00:00Z |
date_published | 2017-10-16T00:00:00Z |
source | MITRE |
title | bootcfg |
Imperva DDoS for Hire
Imperva. (n.d.). Booters, Stressers and DDoSers. Retrieved October 4, 2020.
Internal MISP references
UUID 86f87ec6-058e-45a7-9314-0579a2b4e8f2
which can be used as unique global reference for Imperva DDoS for Hire
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-04T00:00:00Z |
source | MITRE |
title | Booters, Stressers and DDoSers |
Wikipedia Booting
Wikipedia. (n.d.). Booting. Retrieved November 13, 2019.
Internal MISP references
UUID 6d9c72cb-6cda-445e-89ea-7e695063d49a
which can be used as unique global reference for Wikipedia Booting
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-11-13T00:00:00Z |
source | MITRE |
title | Booting |
FireEye BOOTRASH SANS
Glyer, C.. (2017, June 22). Boot What?. Retrieved May 4, 2020.
Internal MISP references
UUID 835c9e5d-b291-43d9-9b8a-2978aa8c8cd3
which can be used as unique global reference for FireEye BOOTRASH SANS
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-05-04T00:00:00Z |
date_published | 2017-06-22T00:00:00Z |
source | MITRE |
title | Boot What? |
Unit42 LockerGoga 2019
Harbison, M. (2019, March 26). Born This Way? Origins of LockerGoga. Retrieved April 16, 2019.
Internal MISP references
UUID 8f058923-f2f7-4c0e-b90a-c7a0d5e62186
which can be used as unique global reference for Unit42 LockerGoga 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-04-16T00:00:00Z |
date_published | 2019-03-26T00:00:00Z |
source | MITRE |
title | Born This Way? Origins of LockerGoga |
Threatexpress MetaTwin 2017
Vest, J. (2017, October 9). Borrowing Microsoft MetaData and Signatures to Hide Binary Payloads. Retrieved September 10, 2019.
Internal MISP references
UUID 156efefd-793f-4219-8904-ef160a45c9ec
which can be used as unique global reference for Threatexpress MetaTwin 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-09-10T00:00:00Z |
date_published | 2017-10-09T00:00:00Z |
source | MITRE |
title | Borrowing Microsoft MetaData and Signatures to Hide Binary Payloads |
Sandfly BPFDoor 2022
The Sandfly Security Team. (2022, May 11). BPFDoor - An Evasive Linux Backdoor Technical Analysis. Retrieved September 29, 2023.
Internal MISP references
UUID 01c8337f-614b-5f63-870f-5c880b390922
which can be used as unique global reference for Sandfly BPFDoor 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-29T00:00:00Z |
date_published | 2022-05-11T00:00:00Z |
source | MITRE |
title | BPFDoor - An Evasive Linux Backdoor Technical Analysis |
Deep Instinct BPFDoor 2023
Shaul Vilkomir-Preisman and Eliran Nissan. (2023, May 10). BPFDoor Malware Evolves – Stealthy Sniffing Backdoor Ups Its Game. Retrieved September 19, 2024.
Internal MISP references
UUID c246b4da-75fb-5b41-ba9c-c0eb1b261e37
which can be used as unique global reference for Deep Instinct BPFDoor 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-19T00:00:00Z |
date_published | 2023-05-10T00:00:00Z |
source | MITRE |
title | BPFDoor Malware Evolves – Stealthy Sniffing Backdoor Ups Its Game |
AADInternals - BPRT
Dr. Nestori Syynimaa. (2021, January 31). BPRT unleashed: Joining multiple devices to Azure AD and Intune. Retrieved March 4, 2022.
Internal MISP references
UUID 19af3fce-eb57-4e67-9678-1968e9ea9677
which can be used as unique global reference for AADInternals - BPRT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-03-04T00:00:00Z |
date_published | 2021-01-31T00:00:00Z |
source | MITRE |
title | BPRT unleashed: Joining multiple devices to Azure AD and Intune |
Brazking-Websockets
Shahar Tavor. (n.d.). BrazKing Android Malware Upgraded and Targeting Brazilian Banks. Retrieved March 24, 2023.
Internal MISP references
UUID fa813afd-b8f0-535b-9108-6d3d3989b6b9
which can be used as unique global reference for Brazking-Websockets
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-24T00:00:00Z |
source | MITRE |
title | BrazKing Android Malware Upgraded and Targeting Brazilian Banks |
Morphisec 3 26 2024
Arnold Osipov. (2024, March 26). Breaking Boundaries Mispadu's Infiltration Beyond LATAM. Retrieved April 4, 2024.
Internal MISP references
UUID 38d88851-1b71-4ed7-88e3-2ee5c3876c06
which can be used as unique global reference for Morphisec 3 26 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-04-04T00:00:00Z |
date_published | 2024-03-26T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Breaking Boundaries Mispadu's Infiltration Beyond LATAM |
MSTIC Nobelium Toolset May 2021
MSTIC. (2021, May 28). Breaking down NOBELIUM’s latest early-stage toolset. Retrieved August 4, 2021.
Internal MISP references
UUID 52464e69-ff9e-4101-9596-dd0c6404bf76
which can be used as unique global reference for MSTIC Nobelium Toolset May 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-08-04T00:00:00Z |
date_published | 2021-05-28T00:00:00Z |
source | MITRE |
title | Breaking down NOBELIUM’s latest early-stage toolset |
Lee 2013
Lee, T., Hanzlik, D., Ahl, I. (2013, August 7). Breaking Down the China Chopper Web Shell - Part I. Retrieved March 27, 2015.
Internal MISP references
UUID 6d1e2b0a-fed2-490b-be25-6580dfb7d6aa
which can be used as unique global reference for Lee 2013
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2015-03-27T00:00:00Z |
date_published | 2013-08-07T00:00:00Z |
source | MITRE |
title | Breaking Down the China Chopper Web Shell - Part I |
sentinelone-malvertising
Hegel, Tom. (2023, January 19). Breaking Down the SEO Poisoning Attack | How Attackers Are Hijacking Search Results. Retrieved February 21, 2023.
Internal MISP references
UUID 7989f0de-90b8-5e6d-bc20-1764610d1568
which can be used as unique global reference for sentinelone-malvertising
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-02-21T00:00:00Z |
date_published | 2023-01-19T00:00:00Z |
source | MITRE |
title | Breaking Down the SEO Poisoning Attack |
OS X Keychain
Juuso Salonen. (2012, September 5). Breaking into the OS X keychain. Retrieved July 15, 2017.
Internal MISP references
UUID bde3ff9c-fbf9-49c4-b414-70dc8356d57d
which can be used as unique global reference for OS X Keychain
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-07-15T00:00:00Z |
date_published | 2012-09-05T00:00:00Z |
source | MITRE |
title | Breaking into the OS X keychain |
Brown Exploiting Linkers
Tim Brown. (2011, June 29). Breaking the links: Exploiting the linker. Retrieved March 29, 2021.
Internal MISP references
UUID 24674e91-5cbf-4023-98ae-a9f0968ad99a
which can be used as unique global reference for Brown Exploiting Linkers
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-03-29T00:00:00Z |
date_published | 2011-06-29T00:00:00Z |
source | MITRE |
title | Breaking the links: Exploiting the linker |
FireEye Outlook Dec 2019
McWhirt, M., Carr, N., Bienstock, D. (2019, December 4). Breaking the Rules: A Tough Outlook for Home Page Attacks (CVE-2017-11774). Retrieved June 23, 2020.
Internal MISP references
UUID f23a773f-9c50-4193-877d-97f7c13f48f1
which can be used as unique global reference for FireEye Outlook Dec 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-06-23T00:00:00Z |
date_published | 2019-12-04T00:00:00Z |
source | MITRE |
title | Breaking the Rules: A Tough Outlook for Home Page Attacks (CVE-2017-11774) |
Cisco Talos Blog December 08 2022
Cisco Talos Blog. (2022, December 8). Breaking the silence - Recent Truebot activity. Retrieved May 8, 2023.
Internal MISP references
UUID bcf92374-48a3-480f-a679-9fd34b67bcdd
which can be used as unique global reference for Cisco Talos Blog December 08 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-08T00:00:00Z |
date_published | 2022-12-08T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Breaking the silence - Recent Truebot activity |
PaloAlto Preventing Opportunistic Attacks Apr 2016
Kiwi. (2016, April 6). Breakout Recap: Cybersecurity Best Practices Part 1 - Preventing Opportunistic Attacks. Retrieved October 3, 2018.
Internal MISP references
UUID 60fac434-2815-4568-b951-4bde55c2e3af
which can be used as unique global reference for PaloAlto Preventing Opportunistic Attacks Apr 2016
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-10-03T00:00:00Z |
date_published | 2016-04-06T00:00:00Z |
source | MITRE |
title | Breakout Recap: Cybersecurity Best Practices Part 1 - Preventing Opportunistic Attacks |
Mandiant BYOL
Kirk, N. (2018, June 18). Bring Your Own Land (BYOL) – A Novel Red Teaming Technique. Retrieved October 4, 2021.
Internal MISP references
UUID 445efe8b-659a-4023-afc7-aa7cd21ee5a1
which can be used as unique global reference for Mandiant BYOL
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-04T00:00:00Z |
date_published | 2018-06-18T00:00:00Z |
source | MITRE |
title | Bring Your Own Land (BYOL) – A Novel Red Teaming Technique |
Mandiant BYOL 2018
Kirk, N. (2018, June 18). Bring Your Own Land (BYOL) – A Novel Red Teaming Technique. Retrieved October 8, 2021.
Internal MISP references
UUID 104a1c1c-0899-4ff9-a5c4-73de702c467d
which can be used as unique global reference for Mandiant BYOL 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-08T00:00:00Z |
date_published | 2018-06-18T00:00:00Z |
source | MITRE |
title | Bring Your Own Land (BYOL) – A Novel Red Teaming Technique |
Comparitech Leak
Bischoff, P. (2020, October 15). Broadvoice database of more than 350 million customer records exposed online. Retrieved October 20, 2020.
Internal MISP references
UUID fa0eac56-45ea-4628-88cf-b843874b4a4d
which can be used as unique global reference for Comparitech Leak
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-20T00:00:00Z |
date_published | 2020-10-15T00:00:00Z |
source | MITRE |
title | Broadvoice database of more than 350 million customer records exposed online |
ThreatPost Broadvoice Leak
Seals, T. (2020, October 15). Broadvoice Leak Exposes 350M Records, Personal Voicemail Transcripts. Retrieved October 20, 2020.
Internal MISP references
UUID 91d20979-d4e7-4372-8a83-1e1512c8d3a9
which can be used as unique global reference for ThreatPost Broadvoice Leak
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-20T00:00:00Z |
date_published | 2020-10-15T00:00:00Z |
source | MITRE |
title | Broadvoice Leak Exposes 350M Records, Personal Voicemail Transcripts |
Secureworks BRONZE BUTLER Oct 2017
Counter Threat Unit Research Team. (2017, October 12). BRONZE BUTLER Targets Japanese Enterprises. Retrieved January 4, 2018.
Internal MISP references
UUID c62d8d1a-cd1b-4b39-95b6-68f3f063dacf
which can be used as unique global reference for Secureworks BRONZE BUTLER Oct 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-01-04T00:00:00Z |
date_published | 2017-10-12T00:00:00Z |
source | MITRE, Tidal Cyber |
title | BRONZE BUTLER Targets Japanese Enterprises |
Secureworks BRONZE FLEETWOOD Profile
Secureworks CTU. (n.d.). BRONZE FLEETWOOD. Retrieved February 5, 2024.
Internal MISP references
UUID 4fbb113c-94b4-56fd-b292-1ccf84e1c8f3
which can be used as unique global reference for Secureworks BRONZE FLEETWOOD Profile
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-02-05T00:00:00Z |
source | MITRE |
title | BRONZE FLEETWOOD |
Secureworks BRONZE HUNTLEY
Secureworks. (2021, January 1). BRONZE HUNTLEY Threat Profile. Retrieved May 5, 2021.
Internal MISP references
UUID 9558ebc5-4de3-4b1d-b32c-a170adbc3451
which can be used as unique global reference for Secureworks BRONZE HUNTLEY
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-05-05T00:00:00Z |
date_published | 2021-01-01T00:00:00Z |
source | MITRE |
title | BRONZE HUNTLEY Threat Profile |
Secureworks BRONZE PRESIDENT December 2019
Counter Threat Unit Research Team. (2019, December 29). BRONZE PRESIDENT Targets NGOs. Retrieved April 13, 2021.
Internal MISP references
UUID 019889e0-a2ce-476f-9a31-2fc394de2821
which can be used as unique global reference for Secureworks BRONZE PRESIDENT December 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-04-13T00:00:00Z |
date_published | 2019-12-29T00:00:00Z |
source | MITRE, Tidal Cyber |
title | BRONZE PRESIDENT Targets NGOs |
Dell SecureWorks BRONZE STARLIGHT Profile
SecureWorks. (n.d.). BRONZE STARLIGHT. Retrieved December 6, 2023.
Internal MISP references
UUID d2e8cd95-fcd5-58e4-859a-c4724ec94ab4
which can be used as unique global reference for Dell SecureWorks BRONZE STARLIGHT Profile
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-06T00:00:00Z |
source | MITRE |
title | BRONZE STARLIGHT |
SecureWorks BRONZE STARLIGHT Ransomware Operations June 2022
Counter Threat Unit Research Team . (2022, June 23). BRONZE STARLIGHT RANSOMWARE OPERATIONS USE HUI LOADER. Retrieved December 7, 2023.
Internal MISP references
UUID 0b275cf9-a885-58cc-b859-112090a711e3
which can be used as unique global reference for SecureWorks BRONZE STARLIGHT Ransomware Operations June 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-07T00:00:00Z |
date_published | 2022-06-23T00:00:00Z |
source | MITRE |
title | BRONZE STARLIGHT RANSOMWARE OPERATIONS USE HUI LOADER |
SecureWorks BRONZE UNION June 2017
Counter Threat Unit Research Team. (2017, June 27). BRONZE UNION Cyberespionage Persists Despite Disclosures. Retrieved July 13, 2017.
Internal MISP references
UUID 42adda47-f5d6-4d34-9b3d-3748a782f886
which can be used as unique global reference for SecureWorks BRONZE UNION June 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-07-13T00:00:00Z |
date_published | 2017-06-27T00:00:00Z |
source | MITRE, Tidal Cyber |
title | BRONZE UNION Cyberespionage Persists Despite Disclosures |
Wikipedia Browser Extension
Wikipedia. (2017, October 8). Browser Extension. Retrieved January 11, 2018.
Internal MISP references
UUID 52aef082-3f8e-41b4-af95-6631ce4c9e91
which can be used as unique global reference for Wikipedia Browser Extension
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-01-11T00:00:00Z |
date_published | 2017-10-08T00:00:00Z |
source | MITRE |
title | Browser Extension |
Mr. D0x BitB 2022
mr.d0x. (2022, March 15). Browser In The Browser (BITB) Attack. Retrieved March 8, 2023.
Internal MISP references
UUID 447f6b34-ac3a-58d9-af96-aa1d947a3e0e
which can be used as unique global reference for Mr. D0x BitB 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-08T00:00:00Z |
date_published | 2022-03-15T00:00:00Z |
source | MITRE |
title | Browser In The Browser (BITB) Attack |
Cobalt Strike Browser Pivot
Mudge, R. (n.d.). Browser Pivoting. Retrieved January 10, 2018.
Internal MISP references
UUID 0c1dd453-7281-4ee4-9c8f-bdc401cf48d7
which can be used as unique global reference for Cobalt Strike Browser Pivot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-01-10T00:00:00Z |
source | MITRE |
title | Browser Pivoting |
Symantec Buckeye
Symantec Security Response. (2016, September 6). Buckeye cyberespionage group shifts gaze from US to Hong Kong. Retrieved September 26, 2016.
Internal MISP references
UUID dbf3ce3e-bcf2-4e47-ad42-839e51967395
which can be used as unique global reference for Symantec Buckeye
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-09-26T00:00:00Z |
date_published | 2016-09-06T00:00:00Z |
source | MITRE, Tidal Cyber |
title | Buckeye cyberespionage group shifts gaze from US to Hong Kong |
ESET Buhtrap and Buran April 2019
ESET Research. (2019, April 30). Buhtrap backdoor and Buran ransomware distributed via major advertising platform. Retrieved May 11, 2020.
Internal MISP references
UUID e308a957-fb5c-44e8-a846-be6daef4b940
which can be used as unique global reference for ESET Buhtrap and Buran April 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-05-11T00:00:00Z |
date_published | 2019-04-30T00:00:00Z |
source | MITRE |
title | Buhtrap backdoor and Buran ransomware distributed via major advertising platform |
S1 Custom Shellcode Tool
Bunce, D. (2019, October 31). Building A Custom Tool For Shellcode Analysis. Retrieved October 4, 2021.
Internal MISP references
UUID f49bfd00-48d5-4d84-a7b7-cb23fcdf861b
which can be used as unique global reference for S1 Custom Shellcode Tool
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-04T00:00:00Z |
date_published | 2019-10-31T00:00:00Z |
source | MITRE |
title | Building A Custom Tool For Shellcode Analysis |
Data Driven Security DGA
Jacobs, J. (2014, October 2). Building a DGA Classifier: Part 2, Feature Engineering. Retrieved February 18, 2019.
Internal MISP references
UUID c92fb2ec-c144-42d4-bd42-179d3d737db0
which can be used as unique global reference for Data Driven Security DGA
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-02-18T00:00:00Z |
date_published | 2014-10-02T00:00:00Z |
source | MITRE |
title | Building a DGA Classifier: Part 2, Feature Engineering |
CTD PPID Spoofing Macro Mar 2019
Tafani-Dereeper, C. (2019, March 12). Building an Office macro to spoof parent processes and command line arguments. Retrieved June 3, 2019.
Internal MISP references
UUID b06b72ba-dbd6-4190-941a-0cdd3d659ab6
which can be used as unique global reference for CTD PPID Spoofing Macro Mar 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-06-03T00:00:00Z |
date_published | 2019-03-12T00:00:00Z |
source | MITRE |
title | Building an Office macro to spoof parent processes and command line arguments |
Trend Micro September 02 2022
Trend Micro. (2022, September 2). BumbleBee a New Modular Backdoor Evolved From BookWorm. Retrieved May 7, 2023.
Internal MISP references
UUID acb25abb-23c7-4b5d-849b-346388dde15c
which can be used as unique global reference for Trend Micro September 02 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-07T00:00:00Z |
date_published | 2022-09-02T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | BumbleBee a New Modular Backdoor Evolved From BookWorm |
Proofpoint 2 12 2024
Axel F; Selena Larson; The Proofpoint Threat Research Team. (2024, February 12). Bumblebee Buzzes Back in Black . Retrieved February 14, 2024.
Internal MISP references
UUID 643968ec-bc01-4317-ba91-b2bafeb421c9
which can be used as unique global reference for Proofpoint 2 12 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-02-14T00:00:00Z |
date_published | 2024-02-12T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Bumblebee Buzzes Back in Black |
Toxin Labs 3 4 2023
Toxin Labs. (2023, March 4). BumbleBee DocuSign Campaign. Retrieved February 19, 2024.
Internal MISP references
UUID 8404527a-9197-47ea-8bdf-c824b66ffede
which can be used as unique global reference for Toxin Labs 3 4 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-02-19T00:00:00Z |
date_published | 2023-03-04T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | BumbleBee DocuSign Campaign |
SEC Consult Bumblebee April 11 2023
Angelo Violetti. (2023, April 11). BumbleBee hunting with a Velociraptor. Retrieved May 6, 2023.
Internal MISP references
UUID c4cdaaeb-5776-4899-bdcf-8daf9d6ea615
which can be used as unique global reference for SEC Consult Bumblebee April 11 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-06T00:00:00Z |
date_published | 2023-04-11T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | BumbleBee hunting with a Velociraptor |
Cybereason Bumblebee August 2022
Cybereason. (2022, August 17). Bumblebee Loader – The High Road to Enterprise Domain Control. Retrieved August 29, 2022.
Internal MISP references
UUID 64bfb605-af69-4df0-ae56-32fa997516bc
which can be used as unique global reference for Cybereason Bumblebee August 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-08-29T00:00:00Z |
date_published | 2022-08-17T00:00:00Z |
source | MITRE |
title | Bumblebee Loader – The High Road to Enterprise Domain Control |
Secureworks Bumblebee April 20 2023
Counter Threat Unit Research Team. (2023, April 20). Bumblebee Malware Distributed Via Trojanized Installer Downloads. Retrieved May 6, 2023.
Internal MISP references
UUID ac31c45d-ba78-4158-b163-723ab22c4dc4
which can be used as unique global reference for Secureworks Bumblebee April 20 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-06T00:00:00Z |
date_published | 2023-04-20T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Bumblebee Malware Distributed Via Trojanized Installer Downloads |
Symantec Bumblebee June 2022
Kamble, V. (2022, June 28). Bumblebee: New Loader Rapidly Assuming Central Position in Cyber-crime Ecosystem. Retrieved August 24, 2022.
Internal MISP references
UUID 81bfabad-b5b3-4e45-ac1d-1e2e829fca33
which can be used as unique global reference for Symantec Bumblebee June 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-08-24T00:00:00Z |
date_published | 2022-06-28T00:00:00Z |
source | MITRE |
title | Bumblebee: New Loader Rapidly Assuming Central Position in Cyber-crime Ecosystem |
Cyble September 07 2022
Cybleinc. (2022, September 7). Bumblebee Returns with New Infection Technique. Retrieved May 7, 2023.
Internal MISP references
UUID 9d194526-2d01-4f92-9055-39e66d26081a
which can be used as unique global reference for Cyble September 07 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-07T00:00:00Z |
date_published | 2022-09-07T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Bumblebee Returns with New Infection Technique |
The DFIR Report Bumblebee September 26 2022
The DFIR Report. (2022, September 26). BumbleBee: Round Two. Retrieved May 7, 2023.
Internal MISP references
UUID 8b51d35c-7a2a-4f03-95b1-c0b319f73c05
which can be used as unique global reference for The DFIR Report Bumblebee September 26 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-07T00:00:00Z |
date_published | 2022-09-26T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | BumbleBee: Round Two |
The DFIR Report Bumblebee November 14 2022
The DFIR Report. (2022, November 14). BumbleBee Zeros in on Meterpreter. Retrieved May 7, 2023.
Internal MISP references
UUID 831e1b4e-6edd-498f-863c-606d2392b622
which can be used as unique global reference for The DFIR Report Bumblebee November 14 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-07T00:00:00Z |
date_published | 2022-11-14T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | BumbleBee Zeros in on Meterpreter |
objsee netwire backdoor 2019
Patrick Wardle. (2019, June 20). Burned by Fire(fox). Retrieved October 1, 2021.
Internal MISP references
UUID 866c5305-8629-4f09-8dfe-192c8573ffb0
which can be used as unique global reference for objsee netwire backdoor 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-01T00:00:00Z |
date_published | 2019-06-20T00:00:00Z |
source | MITRE |
title | Burned by Fire(fox) |
401 TRG Winnti Umbrella May 2018
Hegel, T. (2018, May 3). Burning Umbrella: An Intelligence Report on the Winnti Umbrella and Associated State-Sponsored Attackers. Retrieved July 8, 2018.
Internal MISP references
UUID e3f1f2e4-dc1c-4d9c-925d-47013f44a69f
which can be used as unique global reference for 401 TRG Winnti Umbrella May 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-07-08T00:00:00Z |
date_published | 2018-05-03T00:00:00Z |
source | MITRE |
title | Burning Umbrella: An Intelligence Report on the Winnti Umbrella and Associated State-Sponsored Attackers |
Bypassing Gatekeeper
Thomas Reed. (2016, March 31). Bypassing Apple's Gatekeeper. Retrieved July 5, 2017.
Internal MISP references
UUID 957a0916-614e-4c7b-a6dd-1baa4fc6f93e
which can be used as unique global reference for Bypassing Gatekeeper
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-07-05T00:00:00Z |
date_published | 2016-03-31T00:00:00Z |
source | MITRE |
title | Bypassing Apple's Gatekeeper |
engima0x3 DNX Bypass
Nelson, M. (2017, November 17). Bypassing Application Whitelisting By Using dnx.exe. Retrieved May 25, 2017.
Internal MISP references
UUID e0186f1d-100d-4e52-b6f7-0a7e1c1a35f0
which can be used as unique global reference for engima0x3 DNX Bypass
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-05-25T00:00:00Z |
date_published | 2017-11-17T00:00:00Z |
source | MITRE |
title | Bypassing Application Whitelisting By Using dnx.exe |
engima0x3 RCSI Bypass
Nelson, M. (2016, November 21). Bypassing Application Whitelisting By Using rcsi.exe. Retrieved May 26, 2017.
Internal MISP references
UUID 0b815bd9-6c7f-4bd8-9031-667fa6252f89
which can be used as unique global reference for engima0x3 RCSI Bypass
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-05-26T00:00:00Z |
date_published | 2016-11-21T00:00:00Z |
source | MITRE |
title | Bypassing Application Whitelisting By Using rcsi.exe |
Exploit Monday WinDbg
Graeber, M. (2016, August 15). Bypassing Application Whitelisting by using WinDbg/CDB as a Shellcode Runner. Retrieved May 26, 2017.
Internal MISP references
UUID abd5f871-e12e-4355-af72-d4be79cb0291
which can be used as unique global reference for Exploit Monday WinDbg
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-05-26T00:00:00Z |
date_published | 2016-08-15T00:00:00Z |
source | MITRE |
title | Bypassing Application Whitelisting by using WinDbg/CDB as a Shellcode Runner |
SubTee MSBuild
Smith, C. (2016, September 13). Bypassing Application Whitelisting using MSBuild.exe - Device Guard Example and Mitigations. Retrieved September 13, 2016.
Internal MISP references
UUID 82a762d0-c59f-456d-a7d3-1cab3fa02526
which can be used as unique global reference for SubTee MSBuild
in MISP communities and other software using the MISP galaxy
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-09-13T00:00:00Z |
date_published | 2016-09-13T00:00:00Z |
source | MITRE |
title | Bypassing Application Whitelisting using MSBuild.exe - Device Guard Example and Mitigations |
Bypassing CloudTrail in AWS Service Catalog
Nick Frichette. (2023, March 20). Bypassing CloudTrail in AWS Service Catalog, and Other Logging Research. Retrieved September 18, 2023.
Internal MISP references
UUID de50bd67-96bb-537c-b91d-e541a717b7a1
which can be used as unique global reference for Bypassing CloudTrail in AWS Service Catalog
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-18T00:00:00Z |
date_published | 2023-03-20T00:00:00Z |
source | MITRE |
title | Bypassing CloudTrail in AWS Service Catalog, and Other Logging Research |
AADInternals - Conditional Access Bypass
Dr. Nestori Syynimaa. (2020, September 6). Bypassing conditional access by faking device compliance. Retrieved March 4, 2022.
Internal MISP references
UUID 832841a1-92d1-4fcc-90f7-afbabad84aec
which can be used as unique global reference for AADInternals - Conditional Access Bypass
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-03-04T00:00:00Z |
date_published | 2020-09-06T00:00:00Z |
source | MITRE |
title | Bypassing conditional access by faking device compliance |
MsitPros CHM Aug 2017
Moe, O. (2017, August 13). Bypassing Device guard UMCI using CHM – CVE-2017-8625. Retrieved October 3, 2018.
Internal MISP references
UUID d4e4cc8a-3246-463f-ba06-d68459d907d4
which can be used as unique global reference for MsitPros CHM Aug 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-10-03T00:00:00Z |
date_published | 2017-08-13T00:00:00Z |
source | MITRE |
title | Bypassing Device guard UMCI using CHM – CVE-2017-8625 |
TCC macOS bypass
Phil Stokes. (2021, July 1). Bypassing macOS TCC User Privacy Protections By Accident and Design. Retrieved March 21, 2024.
Internal MISP references
UUID 4fc68e85-cd7a-5a15-84e3-8fbea0b28fd5
which can be used as unique global reference for TCC macOS bypass
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-21T00:00:00Z |
date_published | 2021-07-01T00:00:00Z |
source | MITRE |
title | Bypassing macOS TCC User Privacy Protections By Accident and Design |
enigma0x3 sdclt app paths
Nelson, M. (2017, March 14). Bypassing UAC using App Paths. Retrieved May 25, 2017.
Internal MISP references
UUID 2e69a4a7-dc7f-4b7d-99b2-190c60d7efd1
which can be used as unique global reference for enigma0x3 sdclt app paths
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-05-25T00:00:00Z |
date_published | 2017-03-14T00:00:00Z |
source | MITRE |
title | Bypassing UAC using App Paths |
MDSec System Calls
MDSec Research. (2020, December). Bypassing User-Mode Hooks and Direct Invocation of System Calls for Red Teams. Retrieved September 29, 2021.
Internal MISP references
UUID b461e226-1317-4ce4-a195-ba4c4957db99
which can be used as unique global reference for MDSec System Calls
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-29T00:00:00Z |
date_published | 2020-12-01T00:00:00Z |
source | MITRE |
title | Bypassing User-Mode Hooks and Direct Invocation of System Calls for Red Teams |
Hybrid Analysis Icacls1 June 2018
Hybrid Analysis. (2018, June 12). c9b65b764985dfd7a11d3faf599c56b8.exe. Retrieved August 19, 2018.
Internal MISP references
UUID 74df644a-06b8-4331-85a3-932358d65b62
which can be used as unique global reference for Hybrid Analysis Icacls1 June 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-08-19T00:00:00Z |
date_published | 2018-06-12T00:00:00Z |
source | MITRE |
title | c9b65b764985dfd7a11d3faf599c56b8.exe |
Microsoft Credential Manager store
Microsoft. (2016, August 31). Cached and Stored Credentials Technical Overview. Retrieved November 24, 2020.
Internal MISP references
UUID c949a29b-bb31-4bd7-a967-ddd48c7efb8e
which can be used as unique global reference for Microsoft Credential Manager store
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-11-24T00:00:00Z |
date_published | 2016-08-31T00:00:00Z |
source | MITRE |
title | Cached and Stored Credentials Technical Overview |
Microsoft - Cached Creds
Microsoft. (2016, August 21). Cached and Stored Credentials Technical Overview. Retrieved February 21, 2020.
Internal MISP references
UUID 590ea63f-f800-47e4-8d39-df11a184ba84
which can be used as unique global reference for Microsoft - Cached Creds
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-02-21T00:00:00Z |
date_published | 2016-08-21T00:00:00Z |
source | MITRE |
title | Cached and Stored Credentials Technical Overview |
Kaspersky CactusPete Aug 2020
Zykov, K. (2020, August 13). CactusPete APT group’s updated Bisonal backdoor. Retrieved May 5, 2021.
Internal MISP references
UUID 1c393964-e717-45ad-8eb6-5df5555d3c70
which can be used as unique global reference for Kaspersky CactusPete Aug 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-05-05T00:00:00Z |
date_published | 2020-08-13T00:00:00Z |
source | MITRE, Tidal Cyber |
title | CactusPete APT group’s updated Bisonal backdoor |
Kroll CACTUS Ransomware May 10 2023
Laurie Iacono, Stephen Green, Dave Truman. (2023, May 10). CACTUS Ransomware: Prickly New Variant Evades Detection. Retrieved August 10, 2023.
Internal MISP references
UUID f50de2f6-465f-4cae-a79c-cc135ebfee4f
which can be used as unique global reference for Kroll CACTUS Ransomware May 10 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-08-10T00:00:00Z |
date_published | 2023-05-10T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | CACTUS Ransomware: Prickly New Variant Evades Detection |
ESET CaddyWiper March 2022
ESET. (2022, March 15). CaddyWiper: New wiper malware discovered in Ukraine. Retrieved March 23, 2022.
Internal MISP references
UUID 9fa97444-311f-40c1-8728-c5f91634c750
which can be used as unique global reference for ESET CaddyWiper March 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-03-23T00:00:00Z |
date_published | 2022-03-15T00:00:00Z |
source | MITRE |
title | CaddyWiper: New wiper malware discovered in Ukraine |
Cadet Blizzard emerges as novel threat actor
Microsoft Threat Intelligence. (2023, June 14). Cadet Blizzard emerges as a novel and distinct Russian threat actor. Retrieved July 10, 2023.
Internal MISP references
UUID 7180c6a7-e6ea-54bf-bcd7-c5238bbc5f5b
which can be used as unique global reference for Cadet Blizzard emerges as novel threat actor
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-07-10T00:00:00Z |
date_published | 2023-06-14T00:00:00Z |
source | MITRE |
title | Cadet Blizzard emerges as a novel and distinct Russian threat actor |
Cado Denonia April 3 2022
jbowen. (2022, April 3). Cado Discovers Denonia: The First Malware Specifically Targeting Lambda. Retrieved April 11, 2024.
Internal MISP references
UUID b276c28d-1488-4a21-86d1-7acdfd77794b
which can be used as unique global reference for Cado Denonia April 3 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-04-11T00:00:00Z |
date_published | 2022-04-03T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Cado Discovers Denonia: The First Malware Specifically Targeting Lambda |
Cado Security Denonia
Matt Muir. (2022, April 6). Cado Discovers Denonia: The First Malware Specifically Targeting Lambda. Retrieved May 27, 2022.
Internal MISP references
UUID 584e7ace-ef33-423b-9801-4728a447cb34
which can be used as unique global reference for Cado Security Denonia
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-05-27T00:00:00Z |
date_published | 2022-04-06T00:00:00Z |
source | MITRE |
title | Cado Discovers Denonia: The First Malware Specifically Targeting Lambda |
Caesars Scattered Spider September 13 2023
William Turton. (2023, September 13). Caesars Entertainment Paid Millions to Hackers in Attack. Retrieved September 14, 2023.
Internal MISP references
UUID 6915c003-7c8b-451c-8fb1-3541f00c14fb
which can be used as unique global reference for Caesars Scattered Spider September 13 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-14T00:00:00Z |
date_published | 2023-09-13T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Caesars Entertainment Paid Millions to Hackers in Attack |
Sekoia Calisto December 5 2022
Felix Aimé, Maxime A., Sekoia TDR. (2022, December 5). Calisto show interests into entities involved in Ukraine war support. Retrieved October 1, 2024.
Internal MISP references
UUID 02fed1d1-b8a9-4bca-9e96-2cffe6f7ba89
which can be used as unique global reference for Sekoia Calisto December 5 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-10-01T00:00:00Z |
date_published | 2022-12-05T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Calisto show interests into entities involved in Ukraine war support |
Securelist Calisto July 2018
Kuzin, M., Zelensky S. (2018, July 20). Calisto Trojan for macOS. Retrieved September 7, 2018.
Internal MISP references
UUID a292d77b-9150-46ea-b217-f51e091fdb57
which can be used as unique global reference for Securelist Calisto July 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-09-07T00:00:00Z |
date_published | 2018-07-20T00:00:00Z |
source | MITRE |
title | Calisto Trojan for macOS |
CERTFR-2023-CTI-009
CERT-FR. (2023, October 26). Campagnes d'attaques du mode opératoire APT28 depuis 2021. Retrieved October 26, 2023.
Internal MISP references
UUID 5365ac4c-fbb8-4389-989e-a64cb7693371
which can be used as unique global reference for CERTFR-2023-CTI-009
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-10-26T00:00:00Z |
date_published | 2023-10-26T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Campagnes d'attaques du mode opératoire APT28 depuis 2021 |
FSI Andariel Campaign Rifle July 2017
FSI. (2017, July 27). Campaign Rifle - Andariel, the Maiden of Anguish. Retrieved September 12, 2024.
Internal MISP references
UUID bde61ee9-16f9-4bd9-a847-5cc9df21335c
which can be used as unique global reference for FSI Andariel Campaign Rifle July 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-12T00:00:00Z |
date_published | 2017-07-27T00:00:00Z |
source | MITRE |
title | Campaign Rifle - Andariel, the Maiden of Anguish |
Check Point Research January 5 2022
Check Point Research. (2022, January 5). Can You Trust a File's Digital Signature? New Zloader Campaign Exploits Microsoft's Signature Verification Putting Users at Risk. Retrieved May 11, 2023.
Internal MISP references
UUID d26dfc4d-e563-4262-b527-0fffb7228234
which can be used as unique global reference for Check Point Research January 5 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-11T00:00:00Z |
date_published | 2022-01-05T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Can You Trust a File's Digital Signature? New Zloader Campaign Exploits Microsoft's Signature Verification Putting Users at Risk |
Polak NPPSPY 2004
Sergey Polak. (2004, August). Capturing Windows Passwords using the Network Provider API. Retrieved May 17, 2024.
Internal MISP references
UUID ab5872b0-a755-5d85-8750-0b22f00ccb37
which can be used as unique global reference for Polak NPPSPY 2004
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-05-17T00:00:00Z |
date_published | 2004-08-01T00:00:00Z |
source | MITRE |
title | Capturing Windows Passwords using the Network Provider API |
KasperskyCarbanak
Kaspersky Lab's Global Research & Analysis Team. (2015, February). CARBANAK APT THE GREAT BANK ROBBERY. Retrieved March 27, 2017.
Internal MISP references
UUID 053a2bbb-5509-4aba-bbd7-ccc3d8074291
which can be used as unique global reference for KasperskyCarbanak
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-03-27T00:00:00Z |
date_published | 2015-02-01T00:00:00Z |
source | MITRE |
title | CARBANAK APT THE GREAT BANK ROBBERY |
Kaspersky Carbanak
Kaspersky Lab's Global Research and Analysis Team. (2015, February). CARBANAK APT THE GREAT BANK ROBBERY. Retrieved August 23, 2018.
Internal MISP references
UUID 2f7e77db-fe39-4004-9945-3c8943708494
which can be used as unique global reference for Kaspersky Carbanak
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-08-23T00:00:00Z |
date_published | 2015-02-01T00:00:00Z |
source | MITRE, Tidal Cyber |
title | CARBANAK APT THE GREAT BANK ROBBERY |
Forcepoint Carbanak Google C2
Griffin, N. (2017, January 17). CARBANAK GROUP USES GOOGLE FOR MALWARE COMMAND-AND-CONTROL. Retrieved February 15, 2017.
Internal MISP references
UUID 3da6084f-5e12-4472-afb9-82efd3e22cf6
which can be used as unique global reference for Forcepoint Carbanak Google C2
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-02-15T00:00:00Z |
date_published | 2017-01-17T00:00:00Z |
source | MITRE |
title | CARBANAK GROUP USES GOOGLE FOR MALWARE COMMAND-AND-CONTROL |
Trend Micro Carberp February 2014
Trend Micro. (2014, February 27). CARBERP. Retrieved July 29, 2020.
Internal MISP references
UUID 069e458f-d780-47f9-8ebe-21b195fe9b33
which can be used as unique global reference for Trend Micro Carberp February 2014
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-07-29T00:00:00Z |
date_published | 2014-02-27T00:00:00Z |
source | MITRE |
title | CARBERP |
Prevx Carberp March 2011
Giuliani, M., Allievi, A. (2011, February 28). Carberp - a modular information stealing trojan. Retrieved September 12, 2024.
Internal MISP references
UUID 8f95d81a-ea8c-44bf-950d-9eb868182d39
which can be used as unique global reference for Prevx Carberp March 2011
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-12T00:00:00Z |
date_published | 2011-02-28T00:00:00Z |
source | MITRE |
title | Carberp - a modular information stealing trojan |
Trusteer Carberp October 2010
Trusteer Fraud Prevention Center. (2010, October 7). Carberp Under the Hood of Carberp: Malware & Configuration Analysis. Retrieved July 15, 2020.
Internal MISP references
UUID f7af5be2-0cb4-4b41-9d08-2f652b6bac3c
which can be used as unique global reference for Trusteer Carberp October 2010
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-07-15T00:00:00Z |
date_published | 2010-10-07T00:00:00Z |
source | MITRE |
title | Carberp Under the Hood of Carberp: Malware & Configuration Analysis |
ESET Carbon Mar 2017
ESET. (2017, March 30). Carbon Paper: Peering into Turla’s second stage backdoor. Retrieved November 7, 2018.
Internal MISP references
UUID 5d2a3a81-e7b7-430d-b748-b773f89d3c77
which can be used as unique global reference for ESET Carbon Mar 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-11-07T00:00:00Z |
date_published | 2017-03-30T00:00:00Z |
source | MITRE |
title | Carbon Paper: Peering into Turla’s second stage backdoor |
CrowdStrike Carbon Spider August 2021
Loui, E. and Reynolds, J. (2021, August 30). CARBON SPIDER Embraces Big Game Hunting, Part 1. Retrieved September 20, 2021.
Internal MISP references
UUID 36f0ddb0-94af-494c-ad10-9d3f75d1d810
which can be used as unique global reference for CrowdStrike Carbon Spider August 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-20T00:00:00Z |
date_published | 2021-08-30T00:00:00Z |
source | MITRE |
title | CARBON SPIDER Embraces Big Game Hunting, Part 1 |
PaloAlto CardinalRat Apr 2017
Grunzweig, J.. (2017, April 20). Cardinal RAT Active for Over Two Years. Retrieved December 8, 2018.
Internal MISP references
UUID 8d978b94-75c9-46a1-812a-bafe3396eda9
which can be used as unique global reference for PaloAlto CardinalRat Apr 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-12-08T00:00:00Z |
date_published | 2017-04-20T00:00:00Z |
source | MITRE |
title | Cardinal RAT Active for Over Two Years |
Carl Hurd March 2019
Carl Hurd. (2019, March 26) VPNFilter Deep Dive. Retrieved March 28, 2019
Internal MISP references
UUID 8a4e28f9-b0ba-56ad-a957-b5913bf9a7d5
which can be used as unique global reference for Carl Hurd March 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-03-28T00:00:00Z |
source | MITRE |
title | Carl Hurd March 2019 |
ESET Casbaneiro Oct 2019
ESET Research. (2019, October 3). Casbaneiro: peculiarities of this banking Trojan that affects Brazil and Mexico. Retrieved September 23, 2021.
Internal MISP references
UUID a5cb3ee6-9a0b-4e90-bf32-be7177a858b1
which can be used as unique global reference for ESET Casbaneiro Oct 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-23T00:00:00Z |
date_published | 2019-10-03T00:00:00Z |
source | MITRE |
title | Casbaneiro: peculiarities of this banking Trojan that affects Brazil and Mexico |
Microsoft Catalog Files and Signatures April 2017
Hudek, T. (2017, April 20). Catalog Files and Digital Signatures. Retrieved January 31, 2018.
Internal MISP references
UUID 5b6ae460-a1cf-4afe-a0c8-d6ea24741ebe
which can be used as unique global reference for Microsoft Catalog Files and Signatures April 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-01-31T00:00:00Z |
date_published | 2017-04-20T00:00:00Z |
source | MITRE |
title | Catalog Files and Digital Signatures |
Catch All Chrome Extension
Marinho, R. (n.d.). "Catch-All" Google Chrome Malicious Extension Steals All Posted Data. Retrieved November 16, 2017.
Internal MISP references
UUID eddd2ea8-89c1-40f9-b6e3-37cbdebd210e
which can be used as unique global reference for Catch All Chrome Extension
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-11-16T00:00:00Z |
source | MITRE |
title | "Catch-All" Google Chrome Malicious Extension Steals All Posted Data |
Akamai JS
Katz, O. (2020, October 26). Catch Me if You Can—JavaScript Obfuscation. Retrieved March 17, 2023.
Internal MISP references
UUID 379a177b-0c31-5840-ad54-3fdfc9904a88
which can be used as unique global reference for Akamai JS
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-17T00:00:00Z |
date_published | 2020-10-26T00:00:00Z |
source | MITRE |
title | Catch Me if You Can—JavaScript Obfuscation |
Categorisation_not_boundary
MDSec Research. (2017, July). Categorisation is not a Security Boundary. Retrieved September 20, 2019.
Internal MISP references
UUID 3c320f38-e691-46f7-a20d-58b024ea2fa2
which can be used as unique global reference for Categorisation_not_boundary
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-09-20T00:00:00Z |
date_published | 2017-07-01T00:00:00Z |
source | MITRE |
title | Categorisation is not a Security Boundary |
CrowdStrike Flying Kitten
Dahl, M.. (2014, May 13). Cat Scratch Fever: CrowdStrike Tracks Newly Reported Iranian Actor as FLYING KITTEN. Retrieved May 27, 2020.
Internal MISP references
UUID ab669ded-e659-4313-b5ab-8c5362562f39
which can be used as unique global reference for CrowdStrike Flying Kitten
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-05-27T00:00:00Z |
date_published | 2014-05-13T00:00:00Z |
source | MITRE |
title | Cat Scratch Fever: CrowdStrike Tracks Newly Reported Iranian Actor as FLYING KITTEN |
Telephone Attack Delivery
Selena Larson, Sam Scholten, Timothy Kromphardt. (2021, November 4). Caught Beneath the Landline: A 411 on Telephone Oriented Attack Delivery. Retrieved January 5, 2022.
Internal MISP references
UUID 9670da7b-0600-4072-9ecc-65a918b89ac5
which can be used as unique global reference for Telephone Attack Delivery
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-01-05T00:00:00Z |
date_published | 2021-11-04T00:00:00Z |
source | MITRE |
title | Caught Beneath the Landline: A 411 on Telephone Oriented Attack Delivery |
Tetra Defense Sodinokibi March 2020
Tetra Defense. (2020, March). CAUSE AND EFFECT: SODINOKIBI RANSOMWARE ANALYSIS. Retrieved December 14, 2020.
Internal MISP references
UUID a6ef0302-7bf4-4c5c-a6fc-4bd1c3d67d50
which can be used as unique global reference for Tetra Defense Sodinokibi March 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-12-14T00:00:00Z |
date_published | 2020-03-01T00:00:00Z |
source | MITRE |
title | CAUSE AND EFFECT: SODINOKIBI RANSOMWARE ANALYSIS |
CarbonBlack RobbinHood May 2019
Lee, S. (2019, May 17). CB TAU Threat Intelligence Notification: RobbinHood Ransomware Stops 181 Windows Services Before Encryption. Retrieved July 29, 2019.
Internal MISP references
UUID cb9e49fa-253a-447a-9c88-c6e507bae0bb
which can be used as unique global reference for CarbonBlack RobbinHood May 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-07-29T00:00:00Z |
date_published | 2019-05-17T00:00:00Z |
source | MITRE |
title | CB TAU Threat Intelligence Notification: RobbinHood Ransomware Stops 181 Windows Services Before Encryption |
Talos CCleanup 2017
Brumaghin, E. et al. (2017, September 18). CCleanup: A Vast Number of Machines at Risk. Retrieved March 9, 2018.
Internal MISP references
UUID f2522cf4-dc65-4dc5-87e3-9e88212fcfe9
which can be used as unique global reference for Talos CCleanup 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-03-09T00:00:00Z |
date_published | 2017-09-18T00:00:00Z |
source | MITRE |
title | CCleanup: A Vast Number of Machines at Risk |
Cdb.exe - LOLBAS Project
LOLBAS. (2018, May 25). Cdb.exe. Retrieved December 4, 2023.
Internal MISP references
UUID e61b035f-6247-47e3-918c-2892815dfddf
which can be used as unique global reference for Cdb.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2018-05-25T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Cdb.exe |
Slowik Sandworm 2021
Joseph Slowik, DomainTools. (2021, March 3). Centreon to Exim and Back: On the Trail of Sandworm. Retrieved April 6, 2024.
Internal MISP references
UUID e1753588-bc53-5265-935e-cbbaf3e13a82
which can be used as unique global reference for Slowik Sandworm 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-04-06T00:00:00Z |
date_published | 2021-03-03T00:00:00Z |
source | MITRE |
title | Centreon to Exim and Back: On the Trail of Sandworm |
ESET PLEAD Malware July 2018
Cherepanov, A.. (2018, July 9). Certificates stolen from Taiwanese tech‑companies misused in Plead malware campaign. Retrieved May 6, 2020.
Internal MISP references
UUID 2c28640d-e4ee-47db-a8f1-b34def7d2e9a
which can be used as unique global reference for ESET PLEAD Malware July 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-05-06T00:00:00Z |
date_published | 2018-07-09T00:00:00Z |
source | MITRE |
title | Certificates stolen from Taiwanese tech‑companies misused in Plead malware campaign |
Medium Certified Pre Owned
Schroeder, W. (2021, June 17). Certified Pre-Owned. Retrieved August 2, 2022.
Internal MISP references
UUID 04e53c69-3f29-4bb4-83c9-ff3a2db1526b
which can be used as unique global reference for Medium Certified Pre Owned
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-08-02T00:00:00Z |
date_published | 2021-06-17T00:00:00Z |
source | MITRE |
title | Certified Pre-Owned |
SpecterOps Certified Pre Owned
Schroeder, W. & Christensen, L. (2021, June 22). Certified Pre-Owned - Abusing Active Directory Certificate Services. Retrieved August 2, 2022.
Internal MISP references
UUID 73b6a6a6-c2b8-4aed-9cbc-d3bdcbb97698
which can be used as unique global reference for SpecterOps Certified Pre Owned
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-08-02T00:00:00Z |
date_published | 2021-06-22T00:00:00Z |
source | MITRE |
title | Certified Pre-Owned - Abusing Active Directory Certificate Services |
GitHub Certify
HarmJ0y et al. (2021, June 9). Certify. Retrieved August 4, 2022.
Internal MISP references
UUID 27fce38b-07d6-43ed-a3da-174458c4acbe
which can be used as unique global reference for GitHub Certify
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-08-04T00:00:00Z |
date_published | 2021-06-09T00:00:00Z |
source | MITRE |
title | Certify |
CertOC.exe - LOLBAS Project
LOLBAS. (2021, October 7). CertOC.exe. Retrieved December 4, 2023.
Internal MISP references
UUID b906498e-2773-419b-8c6d-3e974925ac18
which can be used as unique global reference for CertOC.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2021-10-07T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | CertOC.exe |
CertReq.exe - LOLBAS Project
LOLBAS. (2020, July 7). CertReq.exe. Retrieved December 4, 2023.
Internal MISP references
UUID be446484-8ecc-486e-8940-658c147f6978
which can be used as unique global reference for CertReq.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2020-07-07T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | CertReq.exe |
GitHub CertStealer
TheWover. (2021, April 21). CertStealer. Retrieved August 2, 2022.
Internal MISP references
UUID da06ce8f-f950-4ae8-a62a-b59b236e91a3
which can be used as unique global reference for GitHub CertStealer
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-08-02T00:00:00Z |
date_published | 2021-04-21T00:00:00Z |
source | MITRE |
title | CertStealer |
TechNet Certutil
Microsoft. (2012, November 14). Certutil. Retrieved July 3, 2017.
Internal MISP references
UUID 8d095aeb-c72c-49c1-8482-dbf4ce9203ce
which can be used as unique global reference for TechNet Certutil
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-07-03T00:00:00Z |
date_published | 2012-11-14T00:00:00Z |
source | MITRE |
title | Certutil |
LOLBAS Certutil
LOLBAS. (n.d.). Certutil.exe. Retrieved July 31, 2019.
Internal MISP references
UUID 4c875710-9b5d-47b5-bc9e-69ef95797c8f
which can be used as unique global reference for LOLBAS Certutil
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-07-31T00:00:00Z |
source | MITRE |
title | Certutil.exe |
FireEye CFR Watering Hole 2012
Kindlund, D. (2012, December 30). CFR Watering Hole Attack Details. Retrieved December 18, 2020.
Internal MISP references
UUID 6108ab77-e4fd-43f2-9d49-8ce9c219ca9c
which can be used as unique global reference for FireEye CFR Watering Hole 2012
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-12-18T00:00:00Z |
date_published | 2012-12-30T00:00:00Z |
source | MITRE |
title | CFR Watering Hole Attack Details |
Twitter Cglyer Status Update APT3 eml
Glyer, C. (2018, April 14). @cglyer Status Update. Retrieved September 12, 2024.
Internal MISP references
UUID cfcb0839-0736-489f-9779-72e5c96cce3d
which can be used as unique global reference for Twitter Cglyer Status Update APT3 eml
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-12T00:00:00Z |
date_published | 2018-04-14T00:00:00Z |
source | MITRE |
title | @cglyer Status Update |
Cybereason Chaes Nov 2020
Salem, E. (2020, November 17). CHAES: Novel Malware Targeting Latin American E-Commerce. Retrieved June 30, 2021.
Internal MISP references
UUID aaefa162-82a8-4b6d-b7be-fd31fafd9246
which can be used as unique global reference for Cybereason Chaes Nov 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-06-30T00:00:00Z |
date_published | 2020-11-17T00:00:00Z |
source | MITRE |
title | CHAES: Novel Malware Targeting Latin American E-Commerce |
Symantec Chafer February 2018
Symantec. (2018, February 28). Chafer: Latest Attacks Reveal Heightened Ambitions. Retrieved May 22, 2020.
Internal MISP references
UUID 3daaa402-5477-4868-b8f1-a2f6e38f04ef
which can be used as unique global reference for Symantec Chafer February 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-05-22T00:00:00Z |
date_published | 2018-02-28T00:00:00Z |
source | MITRE |
title | Chafer: Latest Attacks Reveal Heightened Ambitions |
Securelist Remexi Jan 2019
Legezo, D. (2019, January 30). Chafer used Remexi malware to spy on Iran-based foreign diplomatic entities. Retrieved April 17, 2019.
Internal MISP references
UUID 07dfd8e7-4e51-4c6e-a4f6-aaeb74ff8845
which can be used as unique global reference for Securelist Remexi Jan 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-04-17T00:00:00Z |
date_published | 2019-01-30T00:00:00Z |
source | MITRE |
title | Chafer used Remexi malware to spy on Iran-based foreign diplomatic entities |
change_rdp_port_conti
The DFIR Report. (2022, March 1). "Change RDP port" #ContiLeaks. Retrieved September 12, 2024.
Internal MISP references
UUID c0deb077-6c26-52f1-9e7c-d1fb535a02a0
which can be used as unique global reference for change_rdp_port_conti
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-12T00:00:00Z |
date_published | 2022-03-01T00:00:00Z |
source | MITRE |
title | "Change RDP port" #ContiLeaks |
Microsoft Change Normal Template
Microsoft. (n.d.). Change the Normal template (Normal.dotm). Retrieved July 3, 2017.
Internal MISP references
UUID 76bf3ce1-b94c-4b3d-9707-aca8a1ae5555
which can be used as unique global reference for Microsoft Change Normal Template
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-07-03T00:00:00Z |
source | MITRE |
title | Change the Normal template (Normal.dotm) |
Microsoft Change Default Programs
Microsoft. (n.d.). Change which programs Windows 7 uses by default. Retrieved July 26, 2016.
Internal MISP references
UUID de515277-a280-40e5-ba34-3e8f16a5c703
which can be used as unique global reference for Microsoft Change Default Programs
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-07-26T00:00:00Z |
source | MITRE |
title | Change which programs Windows 7 uses by default |
Chaos Stolen Backdoor
Sebastian Feldmann. (2018, February 14). Chaos: a Stolen Backdoor Rising Again. Retrieved March 5, 2018.
Internal MISP references
UUID 8e6916c1-f102-4b54-b6a5-a58fed825c2e
which can be used as unique global reference for Chaos Stolen Backdoor
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-03-05T00:00:00Z |
date_published | 2018-02-14T00:00:00Z |
source | MITRE |
title | Chaos: a Stolen Backdoor Rising Again |
Wardle Persistence Chapter
Patrick Wardle. (n.d.). Chapter 0x2: Persistence. Retrieved April 13, 2022.
Internal MISP references
UUID 6272b9a2-d704-43f3-9e25-6c434bb5d1ef
which can be used as unique global reference for Wardle Persistence Chapter
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-04-13T00:00:00Z |
source | MITRE |
title | Chapter 0x2: Persistence |
cisco_deploy_rsa_keys
Cisco. (2023, February 17). Chapter: Deploying RSA Keys Within a PKI . Retrieved March 27, 2023.
Internal MISP references
UUID 132f387e-4ee3-51d3-a3b6-d61102ada152
which can be used as unique global reference for cisco_deploy_rsa_keys
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-27T00:00:00Z |
date_published | 2023-02-17T00:00:00Z |
source | MITRE |
title | Chapter: Deploying RSA Keys Within a PKI |
Wikipedia Character Encoding
Wikipedia. (2017, February 19). Character Encoding. Retrieved March 1, 2017.
Internal MISP references
UUID 3e7df20f-5d11-4102-851f-04e89c25d12f
which can be used as unique global reference for Wikipedia Character Encoding
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-03-01T00:00:00Z |
date_published | 2017-02-19T00:00:00Z |
source | MITRE |
title | Character Encoding |
ClearSky Charming Kitten Dec 2017
ClearSky Cyber Security. (2017, December). Charming Kitten. Retrieved December 27, 2017.
Internal MISP references
UUID 23ab1ad2-e9d4-416a-926f-6220a59044ab
which can be used as unique global reference for ClearSky Charming Kitten Dec 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-27T00:00:00Z |
date_published | 2017-12-01T00:00:00Z |
source | MITRE |
title | Charming Kitten |
Certfa Charming Kitten January 2021
Certfa Labs. (2021, January 8). Charming Kitten’s Christmas Gift. Retrieved May 3, 2021.
Internal MISP references
UUID c38a8af6-3f9b-40c3-8122-a2a51eb50664
which can be used as unique global reference for Certfa Charming Kitten January 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-05-03T00:00:00Z |
date_published | 2021-01-08T00:00:00Z |
source | MITRE |
title | Charming Kitten’s Christmas Gift |
Proofpoint TA2541 February 2022
Larson, S. and Wise, J. (2022, February 15). Charting TA2541's Flight. Retrieved September 12, 2023.
Internal MISP references
UUID db0b1425-8bd7-51b5-bae3-53c5ccccb8da
which can be used as unique global reference for Proofpoint TA2541 February 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-12T00:00:00Z |
date_published | 2022-02-15T00:00:00Z |
source | MITRE |
title | Charting TA2541's Flight |
JPCERT ChChes Feb 2017
Nakamura, Y.. (2017, February 17). ChChes - Malware that Communicates with C&C Servers Using Cookie Headers. Retrieved March 1, 2017.
Internal MISP references
UUID 657b43aa-ead2-41d3-911a-d714d9b28e19
which can be used as unique global reference for JPCERT ChChes Feb 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-03-01T00:00:00Z |
date_published | 2017-02-17T00:00:00Z |
source | MITRE |
title | ChChes - Malware that Communicates with C&C Servers Using Cookie Headers |
Check Point Iranian Proxies December 4 2023
Check Point Research. (2023, December 4). Check Point Research Report: Iranian Hacktivist Proxies Escalate Activities Beyond Israel. Retrieved August 8, 2024.
Internal MISP references
UUID 60432d84-8f46-4934-951f-df8e0f297ff0
which can be used as unique global reference for Check Point Iranian Proxies December 4 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-08-08T00:00:00Z |
date_published | 2023-12-04T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Check Point Research Report: Iranian Hacktivist Proxies Escalate Activities Beyond Israel |
EclecticLightChecksonEXECodeSigning
Howard Oakley. (2020, November 16). Checks on executable code in Catalina and Big Sur: a first draft. Retrieved September 21, 2022.
Internal MISP references
UUID 2885db46-4f8c-4c35-901c-7641c7701293
which can be used as unique global reference for EclecticLightChecksonEXECodeSigning
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-09-21T00:00:00Z |
date_published | 2020-11-16T00:00:00Z |
source | MITRE |
title | Checks on executable code in Catalina and Big Sur: a first draft |
Mandiant Pulse Secure Zero-Day April 2021
Perez, D. et al. (2021, April 20). Check Your Pulse: Suspected APT Actors Leverage Authentication Bypass Techniques and Pulse Secure Zero-Day. Retrieved February 5, 2024.
Internal MISP references
UUID 0760480c-97be-5fc9-a6aa-f1df91a314a3
which can be used as unique global reference for Mandiant Pulse Secure Zero-Day April 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-02-05T00:00:00Z |
date_published | 2021-04-20T00:00:00Z |
source | MITRE |
title | Check Your Pulse: Suspected APT Actors Leverage Authentication Bypass Techniques and Pulse Secure Zero-Day |
Anomali MUSTANG PANDA October 2019
Anomali Threat Research. (2019, October 7). China-Based APT Mustang Panda Targets Minority Groups, Public and Private Sector Organizations. Retrieved April 12, 2021.
Internal MISP references
UUID 70277fa4-60a8-475e-993a-c74241b76127
which can be used as unique global reference for Anomali MUSTANG PANDA October 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-04-12T00:00:00Z |
date_published | 2019-10-07T00:00:00Z |
source | MITRE, Tidal Cyber |
title | China-Based APT Mustang Panda Targets Minority Groups, Public and Private Sector Organizations |
FireEye admin@338
FireEye Threat Intelligence. (2015, December 1). China-based Cyber Threat Group Uses Dropbox for Malware Communications and Targets Hong Kong Media Outlets. Retrieved December 4, 2015.
Internal MISP references
UUID f3470275-9652-440e-914d-ad4fc5165413
which can be used as unique global reference for FireEye admin@338
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2015-12-04T00:00:00Z |
date_published | 2015-12-01T00:00:00Z |
source | MITRE, Tidal Cyber |
title | China-based Cyber Threat Group Uses Dropbox for Malware Communications and Targets Hong Kong Media Outlets |
IronNet BlackTech Oct 2021
Demboski, M., et al. (2021, October 26). China cyber attacks: the current threat landscape. Retrieved March 25, 2022.
Internal MISP references
UUID 98b2d114-4246-409d-934a-238682fd5ae6
which can be used as unique global reference for IronNet BlackTech Oct 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-03-25T00:00:00Z |
date_published | 2021-10-26T00:00:00Z |
source | MITRE |
title | China cyber attacks: the current threat landscape |
Recorded Future RedEcho Feb 2021
Insikt Group. (2021, February 28). China-Linked Group RedEcho Targets the Indian Power Sector Amid Heightened Border Tensions. Retrieved March 22, 2021.
Internal MISP references
UUID 6da7eb8a-aab4-41ea-a0b7-5313d88cbe91
which can be used as unique global reference for Recorded Future RedEcho Feb 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-03-22T00:00:00Z |
date_published | 2021-02-28T00:00:00Z |
source | MITRE |
title | China-Linked Group RedEcho Targets the Indian Power Sector Amid Heightened Border Tensions |
WSJ Salt Typhoon September 26 2024
Sarah Krouse, Robert McMillan, Dustin Volz. (2024, September 26). China-Linked Hackers Breach U.S. Internet Providers in New ‘Salt Typhoon’ Cyberattack. Retrieved October 24, 2024.
Internal MISP references
UUID 15b4c5c3-edf2-4f6b-b398-62767cfabf5a
which can be used as unique global reference for WSJ Salt Typhoon September 26 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-10-24T00:00:00Z |
date_published | 2024-09-26T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | China-Linked Hackers Breach U.S. Internet Providers in New ‘Salt Typhoon’ Cyberattack |
Sygnia Velvet Ant June 17 2024
Sygnia Team. (2024, June 17). China-Nexus Threat Group ‘Velvet Ant’ Abuses F5 Load Balancers for Persistence. Retrieved June 20, 2024.
Internal MISP references
UUID 5c313af4-61a8-449d-a6c7-f7ead6c72e19
which can be used as unique global reference for Sygnia Velvet Ant June 17 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-06-20T00:00:00Z |
date_published | 2024-06-17T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | China-Nexus Threat Group ‘Velvet Ant’ Abuses F5 Load Balancers for Persistence |
Sygnia Velvet Ant July 1 2024
Sygnia. (2024, July 1). China-Nexus Threat Group ‘Velvet Ant’ Exploits Cisco Zero-Day (CVE-2024-20399) to Compromise Nexus Switch Devices. Retrieved July 3, 2024.
Internal MISP references
UUID a0cfeeb6-4617-4dea-80d2-290eaf2bcf5b
which can be used as unique global reference for Sygnia Velvet Ant July 1 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-07-03T00:00:00Z |
date_published | 2024-07-01T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | China-Nexus Threat Group ‘Velvet Ant’ Exploits Cisco Zero-Day (CVE-2024-20399) to Compromise Nexus Switch Devices |
EFF China GitHub Attack
Budington, B. (2015, April 2). China Uses Unencrypted Websites to Hijack Browsers in GitHub Attack. Retrieved September 1, 2023.
Internal MISP references
UUID b8405628-6366-5cc9-a9af-b97d5c9176dd
which can be used as unique global reference for EFF China GitHub Attack
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-01T00:00:00Z |
date_published | 2015-04-02T00:00:00Z |
source | MITRE |
title | China Uses Unencrypted Websites to Hijack Browsers in GitHub Attack |
PaloAlto 3102 Sept 2015
Falcone, R. & Miller-Osborn, J. (2015, September 23). Chinese Actors Use ‘3102’ Malware in Attacks on US Government and EU Media. Retrieved March 19, 2018.
Internal MISP references
UUID db340043-43a7-4b16-a570-92a0d879b2bf
which can be used as unique global reference for PaloAlto 3102 Sept 2015
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-03-19T00:00:00Z |
date_published | 2015-09-23T00:00:00Z |
source | MITRE |
title | Chinese Actors Use ‘3102’ Malware in Attacks on US Government and EU Media |
ZScaler Hacking Team
Desai, D.. (2015, August 14). Chinese cyber espionage APT group leveraging recently leaked Hacking Team exploits to target a Financial Services Firm. Retrieved January 26, 2016.
Internal MISP references
UUID 83e6ab22-1f01-4c9b-90e5-0279af487805
which can be used as unique global reference for ZScaler Hacking Team
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-01-26T00:00:00Z |
date_published | 2015-08-14T00:00:00Z |
source | MITRE |
title | Chinese cyber espionage APT group leveraging recently leaked Hacking Team exploits to target a Financial Services Firm |
Hacker News LuckyMouse June 2018
Khandelwal, S. (2018, June 14). Chinese Hackers Carried Out Country-Level Watering Hole Attack. Retrieved August 18, 2018.
Internal MISP references
UUID de78446a-cb46-4422-820b-9ddf07557b1a
which can be used as unique global reference for Hacker News LuckyMouse June 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-08-18T00:00:00Z |
date_published | 2018-06-14T00:00:00Z |
source | MITRE |
title | Chinese Hackers Carried Out Country-Level Watering Hole Attack |
The Hacker News Velvet Ant Cisco July 2 2024
Newsroom. (2024, July 2). Chinese Hackers Exploiting Cisco Switches Zero-Day to Deliver Malware. Retrieved July 3, 2024.
Internal MISP references
UUID e3949201-c949-4126-9e02-34bfad4713c0
which can be used as unique global reference for The Hacker News Velvet Ant Cisco July 2 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-07-03T00:00:00Z |
date_published | 2024-07-02T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Chinese Hackers Exploiting Cisco Switches Zero-Day to Deliver Malware |
BleepingComputer Mustang Panda September 9 2024
Bill Toulas. (2024, September 9). Chinese hackers use new data theft malware in govt attacks. Retrieved September 13, 2024.
Internal MISP references
UUID 40774c9c-daca-4ea0-a504-ca73b11e4f29
which can be used as unique global reference for BleepingComputer Mustang Panda September 9 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-13T00:00:00Z |
date_published | 2024-09-09T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Chinese hackers use new data theft malware in govt attacks |
The Record APT31 Router Hacks
Catalin Cimpanu. (2021, July 20). Chinese hacking group APT31 uses mesh of home routers to disguise attacks. Retrieved April 25, 2024.
Internal MISP references
UUID 41fc3724-85a0-4ad0-9494-47f89f3b079b
which can be used as unique global reference for The Record APT31 Router Hacks
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-04-25T00:00:00Z |
date_published | 2021-07-20T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Chinese hacking group APT31 uses mesh of home routers to disguise attacks |
ORB APT31
Cimpanu, Catalin. (2021, July 20). Chinese hacking group APT31 uses mesh of home routers to disguise attacks. Retrieved July 8, 2024.
Internal MISP references
UUID 67b5e2ef-21cc-52f6-95c9-88a8cdcbe74e
which can be used as unique global reference for ORB APT31
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-07-08T00:00:00Z |
date_published | 2021-07-20T00:00:00Z |
source | MITRE |
title | Chinese hacking group APT31 uses mesh of home routers to disguise attacks |
Dark Reading Codoso Feb 2015
Chickowski, E. (2015, February 10). Chinese Hacking Group Codoso Team Uses Forbes.com As Watering Hole. Retrieved September 13, 2018.
Internal MISP references
UUID c24035b1-2021-44ae-b01e-651e44526737
which can be used as unique global reference for Dark Reading Codoso Feb 2015
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-09-13T00:00:00Z |
date_published | 2015-02-10T00:00:00Z |
source | MITRE |
title | Chinese Hacking Group Codoso Team Uses Forbes.com As Watering Hole |
Recorded Future TAG-22 July 2021
INSIKT GROUP. (2021, July 8). Chinese State-Sponsored Activity Group TAG-22 Targets Nepal, the Philippines, and Taiwan Using Winnti and Other Tooling. Retrieved September 16, 2024.
Internal MISP references
UUID 258433e7-f829-4365-adbb-c5690159070f
which can be used as unique global reference for Recorded Future TAG-22 July 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-16T00:00:00Z |
date_published | 2021-07-08T00:00:00Z |
source | MITRE |
title | Chinese State-Sponsored Activity Group TAG-22 Targets Nepal, the Philippines, and Taiwan Using Winnti and Other Tooling |
Recorded Future Chinese Activity in Southeast Asia December 2021
Insikt Group. (2021, December 8). Chinese State-Sponsored Cyber Espionage Activity Supports Expansion of Regional Power and Influence in Southeast Asia. Retrieved September 19, 2022.
Internal MISP references
UUID 0809db3b-81a8-475d-920a-cb913b30f42e
which can be used as unique global reference for Recorded Future Chinese Activity in Southeast Asia December 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-09-19T00:00:00Z |
date_published | 2021-12-08T00:00:00Z |
source | MITRE |
title | Chinese State-Sponsored Cyber Espionage Activity Supports Expansion of Regional Power and Influence in Southeast Asia |
Recorded Future REDDELTA July 2020
Insikt Group. (2020, July 28). CHINESE STATE-SPONSORED GROUP ‘REDDELTA’ TARGETS THE VATICAN AND CATHOLIC ORGANIZATIONS. Retrieved April 13, 2021.
Internal MISP references
UUID e2bc037e-d483-4670-8281-70e51b16effe
which can be used as unique global reference for Recorded Future REDDELTA July 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-04-13T00:00:00Z |
date_published | 2020-07-28T00:00:00Z |
source | MITRE |
title | CHINESE STATE-SPONSORED GROUP ‘REDDELTA’ TARGETS THE VATICAN AND CATHOLIC ORGANIZATIONS |
Github CHIPSEC
Intel. (2017, March 18). CHIPSEC Platform Security Assessment Framework. Retrieved March 20, 2017.
Internal MISP references
UUID 47501334-56cb-453b-a9e3-33990d88018b
which can be used as unique global reference for Github CHIPSEC
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-03-20T00:00:00Z |
date_published | 2017-03-18T00:00:00Z |
source | MITRE |
title | CHIPSEC Platform Security Assessment Framework |
McAfee CHIPSEC Blog
Beek, C., Samani, R. (2017, March 8). CHIPSEC Support Against Vault 7 Disclosure Scanning. Retrieved March 13, 2017.
Internal MISP references
UUID b65ed687-c279-4f64-9dd2-839164cd269c
which can be used as unique global reference for McAfee CHIPSEC Blog
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-03-13T00:00:00Z |
date_published | 2017-03-08T00:00:00Z |
source | MITRE |
title | CHIPSEC Support Against Vault 7 Disclosure Scanning |
Chkrootkit Main
Murilo, N., Steding-Jessen, K. (2017, August 23). Chkrootkit. Retrieved April 9, 2018.
Internal MISP references
UUID 828fb4b9-17a6-4a87-ac2a-631643adb18d
which can be used as unique global reference for Chkrootkit Main
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-04-09T00:00:00Z |
date_published | 2017-08-23T00:00:00Z |
source | MITRE |
title | Chkrootkit |
Azure AD Hybrid Identity
Microsoft. (2022, August 26). Choose the right authentication method for your Azure Active Directory hybrid identity solution. Retrieved September 28, 2022.
Internal MISP references
UUID b019406c-6e39-41a2-a8b4-97f8d6482147
which can be used as unique global reference for Azure AD Hybrid Identity
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-09-28T00:00:00Z |
date_published | 2022-08-26T00:00:00Z |
source | MITRE |
title | Choose the right authentication method for your Azure Active Directory hybrid identity solution |
Red Canary May 25 2022
Aedan Russell. (2022, May 25). ChromeLoader a pushy malvertiser. Retrieved September 26, 2024.
Internal MISP references
UUID bffc87ac-e51b-47e3-8a9f-547e762e95c2
which can be used as unique global reference for Red Canary May 25 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-26T00:00:00Z |
date_published | 2022-05-25T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | ChromeLoader a pushy malvertiser |
Chrome Remote Desktop
Huntress. (n.d.). Retrieved March 14, 2024.
Internal MISP references
UUID c1b2d0e9-2396-5080-aea3-58a99c027d20
which can be used as unique global reference for Chrome Remote Desktop
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-14T00:00:00Z |
source | MITRE |
title | Chrome Remote Desktop |
Truesec AB August 30 2024
Simon Hertzberg. (2024, August 30). Cicada 3301 - Ransomware-as-a-Service - Technical Analysis. Retrieved September 4, 2024.
Internal MISP references
UUID de2de0a9-17d2-41c2-838b-7850762b80ae
which can be used as unique global reference for Truesec AB August 30 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-04T00:00:00Z |
date_published | 2024-08-30T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Cicada 3301 - Ransomware-as-a-Service - Technical Analysis |
BleepingComputer Void Banshee September 16 2024
Sergiu Gatlan. (2024, September 20). CISA warns of Windows flaw used in infostealer malware attacks. Retrieved September 19, 2024.
Internal MISP references
UUID 2c9a2355-02c5-4718-ad6e-b2fac9ad4096
which can be used as unique global reference for BleepingComputer Void Banshee September 16 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-19T00:00:00Z |
date_published | 2024-09-20T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | CISA warns of Windows flaw used in infostealer malware attacks |
show_ssh_users_cmd_cisco
Cisco. (2023, March 7). Cisco IOS Security Command Reference: Commands S to Z . Retrieved July 13, 2022.
Internal MISP references
UUID 11d34884-4559-57ad-8910-54e517c6493e
which can be used as unique global reference for show_ssh_users_cmd_cisco
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-07-13T00:00:00Z |
date_published | 2023-03-07T00:00:00Z |
source | MITRE |
title | Cisco IOS Security Command Reference: Commands S to Z |
Cisco IOS Shellcode
George Nosenko. (2015). CISCO IOS SHELLCODE: ALL-IN-ONE. Retrieved October 21, 2020.
Internal MISP references
UUID 55a45f9b-7be4-4f1b-8b19-a0addf9da8d8
which can be used as unique global reference for Cisco IOS Shellcode
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-21T00:00:00Z |
date_published | 2015-01-01T00:00:00Z |
source | MITRE |
title | CISCO IOS SHELLCODE: ALL-IN-ONE |
Cisco IOS Software Integrity Assurance - AAA
Cisco. (n.d.). Cisco IOS Software Integrity Assurance - AAA. Retrieved October 19, 2020.
Internal MISP references
UUID 2d1b5021-91ad-43c9-8527-4978fa779168
which can be used as unique global reference for Cisco IOS Software Integrity Assurance - AAA
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-19T00:00:00Z |
source | MITRE |
title | Cisco IOS Software Integrity Assurance - AAA |
Cisco IOS Software Integrity Assurance - Boot Information
Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Boot Information. Retrieved October 21, 2020.
Internal MISP references
UUID 5349863a-00c1-42bf-beac-4e7d053d6311
which can be used as unique global reference for Cisco IOS Software Integrity Assurance - Boot Information
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-21T00:00:00Z |
source | MITRE |
title | Cisco IOS Software Integrity Assurance - Boot Information |
Cisco IOS Software Integrity Assurance - Change Control
Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Change Control. Retrieved October 21, 2020.
Internal MISP references
UUID 8fb532f2-c730-4b86-b8d2-2314ce559289
which can be used as unique global reference for Cisco IOS Software Integrity Assurance - Change Control
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-21T00:00:00Z |
source | MITRE |
title | Cisco IOS Software Integrity Assurance - Change Control |
Cisco IOS Software Integrity Assurance - Image File Verification
Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Cisco IOS Image File Verification. Retrieved October 19, 2020.
Internal MISP references
UUID f1d736cb-63c1-43e8-a83b-ed86b7c27606
which can be used as unique global reference for Cisco IOS Software Integrity Assurance - Image File Verification
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-19T00:00:00Z |
source | MITRE |
title | Cisco IOS Software Integrity Assurance - Cisco IOS Image File Verification |
Cisco IOS Software Integrity Assurance - Run-Time Memory Verification
Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Cisco IOS Run-Time Memory Integrity Verification. Retrieved October 19, 2020.
Internal MISP references
UUID 284608ea-3769-470e-950b-cbd67796b20f
which can be used as unique global reference for Cisco IOS Software Integrity Assurance - Run-Time Memory Verification
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-19T00:00:00Z |
source | MITRE |
title | Cisco IOS Software Integrity Assurance - Cisco IOS Run-Time Memory Integrity Verification |
Cisco IOS Software Integrity Assurance - Command History
Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Command History. Retrieved October 21, 2020.
Internal MISP references
UUID dbca06dd-1184-4d52-9ee8-b059e368033c
which can be used as unique global reference for Cisco IOS Software Integrity Assurance - Command History
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-21T00:00:00Z |
source | MITRE |
title | Cisco IOS Software Integrity Assurance - Command History |
Cisco IOS Software Integrity Assurance - Credentials Management
Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Credentials Management. Retrieved October 19, 2020.
Internal MISP references
UUID 9a7428e3-bd77-4c3e-ac90-c4e30d504ba6
which can be used as unique global reference for Cisco IOS Software Integrity Assurance - Credentials Management
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-19T00:00:00Z |
source | MITRE |
title | Cisco IOS Software Integrity Assurance - Credentials Management |
Cisco IOS Software Integrity Assurance - Deploy Signed IOS
Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Deploy Signed IOS. Retrieved October 21, 2020.
Internal MISP references
UUID 71ea5591-6e46-4c58-a4e8-c629eba1b6c5
which can be used as unique global reference for Cisco IOS Software Integrity Assurance - Deploy Signed IOS
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-21T00:00:00Z |
source | MITRE |
title | Cisco IOS Software Integrity Assurance - Deploy Signed IOS |
Cisco IOS Software Integrity Assurance - Image File Integrity
Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Image File Integrity. Retrieved October 21, 2020.
Internal MISP references
UUID 90909bd4-15e8-48ee-8067-69f04736c583
which can be used as unique global reference for Cisco IOS Software Integrity Assurance - Image File Integrity
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-21T00:00:00Z |
source | MITRE |
title | Cisco IOS Software Integrity Assurance - Image File Integrity |
Cisco IOS Software Integrity Assurance - Secure Boot
Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Secure Boot. Retrieved October 19, 2020.
Internal MISP references
UUID 4f6f686e-bcda-480a-88a1-ad7b00084c13
which can be used as unique global reference for Cisco IOS Software Integrity Assurance - Secure Boot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-19T00:00:00Z |
source | MITRE |
title | Cisco IOS Software Integrity Assurance - Secure Boot |
Cisco IOS Software Integrity Assurance - TACACS
Cisco. (n.d.). Cisco IOS Software Integrity Assurance - TACACS. Retrieved October 19, 2020.
Internal MISP references
UUID 54506dc2-6496-4edb-a5bf-fe64bf235ac0
which can be used as unique global reference for Cisco IOS Software Integrity Assurance - TACACS
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-19T00:00:00Z |
source | MITRE |
title | Cisco IOS Software Integrity Assurance - TACACS |
Cisco Traffic Mirroring
Cisco. (n.d.). Cisco IOS XR Interface and Hardware Component Configuration Guide for the Cisco CRS Router, Release 5.1.x. Retrieved October 19, 2020.
Internal MISP references
UUID 1a5c86ad-d3b1-408b-a6b4-14ca0e572020
which can be used as unique global reference for Cisco Traffic Mirroring
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-19T00:00:00Z |
source | MITRE |
title | Cisco IOS XR Interface and Hardware Component Configuration Guide for the Cisco CRS Router, Release 5.1.x |
Talos - Cisco Attack 2022
Nick Biasini. (2022, August 10). Cisco Talos shares insights related to recent cyber attack on Cisco. Retrieved March 9, 2023.
Internal MISP references
UUID 143182ad-6a16-5a0d-a5c4-7dae721a9e26
which can be used as unique global reference for Talos - Cisco Attack 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-09T00:00:00Z |
date_published | 2022-08-10T00:00:00Z |
source | MITRE |
title | Cisco Talos shares insights related to recent cyber attack on Cisco |
Citrix Bulletin CVE-2023-3519
Citrix. (2023, July 18). Citrix ADC and Citrix Gateway Security Bulletin for CVE-2023-3519, CVE-2023-3466, CVE-2023-3467. Retrieved July 24, 2023.
Internal MISP references
UUID 245ef1b7-778d-4df2-99a9-b51c95c57580
which can be used as unique global reference for Citrix Bulletin CVE-2023-3519
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-07-24T00:00:00Z |
date_published | 2023-07-18T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Citrix ADC and Citrix Gateway Security Bulletin for CVE-2023-3519, CVE-2023-3466, CVE-2023-3467 |
Malwarebytes Citrix Bleed November 24 2023
Pieter Arntz. (2023, November 24). Citrix Bleed widely exploited, warn government agencies. Retrieved November 30, 2023.
Internal MISP references
UUID fdc86cea-0015-48d1-934f-b22244de6306
which can be used as unique global reference for Malwarebytes Citrix Bleed November 24 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-11-30T00:00:00Z |
date_published | 2023-11-24T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Citrix Bleed widely exploited, warn government agencies |
Cyble April 28 2023
Cybleinc. (2023, April 28). Citrix Users at Risk: AresLoader Spreading Through Disguised GitLab Repo. Retrieved May 7, 2023.
Internal MISP references
UUID 2d6bea2c-cc19-4ff7-873f-151f1ff354cb
which can be used as unique global reference for Cyble April 28 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-07T00:00:00Z |
date_published | 2023-04-28T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Citrix Users at Risk: AresLoader Spreading Through Disguised GitLab Repo |
Cyble April 03 2023
Cybleinc. (2023, April 3). Cl0p Ransomware: Active Threat Plaguing Businesses Worldwide. Retrieved May 25, 2023.
Internal MISP references
UUID 8c7815c4-ed8d-47c3-84af-b7cdabd49652
which can be used as unique global reference for Cyble April 03 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-25T00:00:00Z |
date_published | 2023-04-03T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Cl0p Ransomware: Active Threat Plaguing Businesses Worldwide |
Talent-Jump Clambling February 2020
Chen, T. and Chen, Z. (2020, February 17). CLAMBLING - A New Backdoor Base On Dropbox. Retrieved November 12, 2021.
Internal MISP references
UUID 51144a8a-0cd4-4d5d-826b-21c2dc8422be
which can be used as unique global reference for Talent-Jump Clambling February 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-11-12T00:00:00Z |
date_published | 2020-02-17T00:00:00Z |
source | MITRE |
title | CLAMBLING - A New Backdoor Base On Dropbox |
FireEye Clandestine Fox Part 2
Scott, M.. (2014, June 10). Clandestine Fox, Part Deux. Retrieved January 14, 2016.
Internal MISP references
UUID 82500741-984d-4039-8f53-b303845c2849
which can be used as unique global reference for FireEye Clandestine Fox Part 2
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-01-14T00:00:00Z |
date_published | 2014-06-10T00:00:00Z |
source | MITRE |
title | Clandestine Fox, Part Deux |
Microsoft Clear-EventLog
Microsoft. (n.d.). Clear-EventLog. Retrieved July 2, 2018.
Internal MISP references
UUID 35944ff0-2bbd-4055-8e8a-cfff27241a8a
which can be used as unique global reference for Microsoft Clear-EventLog
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-07-02T00:00:00Z |
source | MITRE |
title | Clear-EventLog |
Clearing quarantine attribute
Rich Trouton. (2012, November 20). Clearing the quarantine extended attribute from downloaded applications. Retrieved July 5, 2017.
Internal MISP references
UUID 4115ab53-751c-4016-9151-a55eab7d6ddf
which can be used as unique global reference for Clearing quarantine attribute
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-07-05T00:00:00Z |
date_published | 2012-11-20T00:00:00Z |
source | MITRE |
title | Clearing the quarantine extended attribute from downloaded applications |
Huntress NPPSPY 2022
Dray Agha. (2022, August 16). Cleartext Shenanigans: Gifting User Passwords to Adversaries With NPPSPY. Retrieved May 17, 2024.
Internal MISP references
UUID 833c22ac-4f65-521a-9eda-8d22e255577e
which can be used as unique global reference for Huntress NPPSPY 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-05-17T00:00:00Z |
date_published | 2022-08-16T00:00:00Z |
source | MITRE |
title | Cleartext Shenanigans: Gifting User Passwords to Adversaries With NPPSPY |
NPPSPY - Huntress
Dray Agha. (2022, August 16). Cleartext Shenanigans: Gifting User Passwords to Adversaries With NPPSPY. Retrieved March 30, 2023.
Internal MISP references
UUID df1f7379-38c3-5ca9-8333-d684022c000c
which can be used as unique global reference for NPPSPY - Huntress
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-30T00:00:00Z |
date_published | 2022-08-16T00:00:00Z |
source | MITRE |
title | Cleartext Shenanigans: Gifting User Passwords to Adversaries With NPPSPY |
Microsoft Learn ClickOnce and Authenticode
Microsoft. (2023, March 9). ClickOnce and Authenticode. Retrieved September 9, 2024.
Internal MISP references
UUID 5e5c02cf-02fe-591a-b597-778999ab31c4
which can be used as unique global reference for Microsoft Learn ClickOnce and Authenticode
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-09T00:00:00Z |
date_published | 2023-03-09T00:00:00Z |
source | MITRE |
title | ClickOnce and Authenticode |
Burke/CISA ClickOnce BlackHat
William Joseph Burke III. (2019, August 7). CLICKONCE AND YOU’RE IN: When .appref-ms abuse is operating as intended. Retrieved September 9, 2024.
Internal MISP references
UUID 5a1b4ee9-1c22-5f12-9fd9-723cc0055f4b
which can be used as unique global reference for Burke/CISA ClickOnce BlackHat
in MISP communities and other software using the MISP galaxy
External references
- https://i.blackhat.com/USA-19/Wednesday/us-19-Burke-ClickOnce-And-Youre-In-When-Appref-Ms-Abuse-Is-Operating-As-Intended.pdf?_gl=116njas6_gcl_auNjAyMzkzMjc3LjE3MjQ4MDk4OTQ._gaMTk5OTA3ODkwMC4xNzI0ODA5ODk0_ga_K4JK67TFYV*MTcyNDgwOTg5NC4xLjEuMTcyNDgwOTk1Ny4wLjAuMA..&_ga=2.253743689.1512103758.1724809895-1999078900.1724809894 - webarchive
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-09T00:00:00Z |
date_published | 2019-08-07T00:00:00Z |
source | MITRE |
title | CLICKONCE AND YOU’RE IN: When .appref-ms abuse is operating as intended |
Microsoft Learn ClickOnce
Microsoft. (2023, September 14). ClickOnce security and deployment. Retrieved September 9, 2024.
Internal MISP references
UUID 2e91b430-81e7-54e1-8e8c-763f71146e0c
which can be used as unique global reference for Microsoft Learn ClickOnce
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-09T00:00:00Z |
date_published | 2023-09-14T00:00:00Z |
source | MITRE |
title | ClickOnce security and deployment |
CL_Invocation.ps1 - LOLBAS Project
LOLBAS. (2018, May 25). CL_Invocation.ps1. Retrieved December 4, 2023.
Internal MISP references
UUID a53e093a-973c-491d-91e3-bc7804d87b8b
which can be used as unique global reference for CL_Invocation.ps1 - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2018-05-25T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | CL_Invocation.ps1 |
clip_win_server
Microsoft, JasonGerend, et al. (2023, February 3). clip. Retrieved June 21, 2022.
Internal MISP references
UUID 8a961fa1-def0-5efe-8599-62e884d4ea22
which can be used as unique global reference for clip_win_server
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-06-21T00:00:00Z |
date_published | 2023-02-03T00:00:00Z |
source | MITRE |
title | clip |
Red Canary Silver Sparrow Feb2021
Tony Lambert. (2021, February 18). Clipping Silver Sparrow’s wings: Outing macOS malware before it takes flight. Retrieved April 20, 2021.
Internal MISP references
UUID f08a856d-6c3e-49e2-b7ba-399831c637e5
which can be used as unique global reference for Red Canary Silver Sparrow Feb2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-04-20T00:00:00Z |
date_published | 2021-02-18T00:00:00Z |
source | MITRE |
title | Clipping Silver Sparrow’s wings: Outing macOS malware before it takes flight |
CL_LoadAssembly.ps1 - LOLBAS Project
LOLBAS. (2021, September 26). CL_LoadAssembly.ps1. Retrieved December 4, 2023.
Internal MISP references
UUID 31a14027-1181-49b9-87bf-78a65a551312
which can be used as unique global reference for CL_LoadAssembly.ps1 - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2021-09-26T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | CL_LoadAssembly.ps1 |
CL_Mutexverifiers.ps1 - LOLBAS Project
LOLBAS. (2018, May 25). CL_Mutexverifiers.ps1. Retrieved December 4, 2023.
Internal MISP references
UUID 75b89502-21ed-4920-95cc-212eaf17f281
which can be used as unique global reference for CL_Mutexverifiers.ps1 - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2018-05-25T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | CL_Mutexverifiers.ps1 |
Google Cloud Mandiant UNC3886 2024
Punsaen Boonyakarn, Shawn Chew, Logeswaran Nadarajan, Mathew Potaczek, Jakub Jozwiak, and Alex Marvi. (2024, June 18). Cloaked and Covert: Uncovering UNC3886 Espionage Operations. Retrieved September 24, 2024.
Internal MISP references
UUID 77b32efe-b936-5541-b0fb-aa442a7d11b7
which can be used as unique global reference for Google Cloud Mandiant UNC3886 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-24T00:00:00Z |
date_published | 2024-06-18T00:00:00Z |
source | MITRE |
title | Cloaked and Covert: Uncovering UNC3886 Espionage Operations |
Cybereason Clop Dec 2020
Cybereason Nocturnus. (2020, December 23). Cybereason vs. Clop Ransomware. Retrieved May 11, 2021.
Internal MISP references
UUID f54d682d-100e-41bb-96be-6a79ea422066
which can be used as unique global reference for Cybereason Clop Dec 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-05-11T00:00:00Z |
source | MITRE |
title | Clop Ransomware |
Mcafee Clop Aug 2019
Mundo, A. (2019, August 1). Clop Ransomware. Retrieved May 10, 2021.
Internal MISP references
UUID 458141bd-7dd2-41fd-82e8-7ea2e4a477ab
which can be used as unique global reference for Mcafee Clop Aug 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-05-10T00:00:00Z |
date_published | 2019-08-01T00:00:00Z |
source | MITRE |
title | Clop Ransomware |
Bleeping Computer Clop February 2023
Sergiu Gatlan. (2023, February 10). Clop ransomware claims it breached 130 orgs using GoAnywhere zero-day. Retrieved May 8, 2023.
Internal MISP references
UUID ccfa7e78-1ee9-4d46-9f03-137eb12cf474
which can be used as unique global reference for Bleeping Computer Clop February 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-08T00:00:00Z |
date_published | 2023-02-10T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Clop ransomware claims it breached 130 orgs using GoAnywhere zero-day |
Kaspersky Cloud Atlas December 2014
GReAT. (2014, December 10). Cloud Atlas: RedOctober APT is back in style. Retrieved May 8, 2020.
Internal MISP references
UUID 41a9b3e3-0953-4bde-9e1d-c2f51de1120e
which can be used as unique global reference for Kaspersky Cloud Atlas December 2014
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-05-08T00:00:00Z |
date_published | 2014-12-10T00:00:00Z |
source | MITRE |
title | Cloud Atlas: RedOctober APT is back in style |
Kandji 4 8 2024
Adam Kohler; Christopher Lopez. (2024, April 8). CloudChat Infostealer How It Works, What It Does. Retrieved April 19, 2024.
Internal MISP references
UUID f2e74613-f578-4408-bc76-144ec671808b
which can be used as unique global reference for Kandji 4 8 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-04-19T00:00:00Z |
date_published | 2024-04-08T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | CloudChat Infostealer How It Works, What It Does |
Rhino Labs Cloud Backdoor September 2019
Rhino Labs. (2019, September). Cloud Container Attack Tool (CCAT). Retrieved September 12, 2019.
Internal MISP references
UUID ac31b781-dbe4-49c2-b7af-dfb23d435ce8
which can be used as unique global reference for Rhino Labs Cloud Backdoor September 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-09-12T00:00:00Z |
date_published | 2019-09-01T00:00:00Z |
source | MITRE |
title | Cloud Container Attack Tool (CCAT) |
Google Cloud Storage
Google. (n.d.). Cloud Storage. Retrieved October 13, 2021.
Internal MISP references
UUID 5fe51b4e-9b82-4e97-bb65-73708349538a
which can be used as unique global reference for Google Cloud Storage
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-13T00:00:00Z |
source | MITRE |
title | Cloud Storage |
Office 265 Azure Domain Availability
Microsoft. (2017, January 23). (Cloud) Tip of the Day: Advanced way to check domain availability for Office 365 and Azure. Retrieved May 27, 2022.
Internal MISP references
UUID dddf33ea-d074-4bc4-98d2-39b7e843e37d
which can be used as unique global reference for Office 265 Azure Domain Availability
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-05-27T00:00:00Z |
date_published | 2017-01-23T00:00:00Z |
source | MITRE |
title | (Cloud) Tip of the Day: Advanced way to check domain availability for Office 365 and Azure |
Datadog S3 Lifecycle CloudTrail Logs
Stratus Red Team. (n.d.). CloudTrail Logs Impairment Through S3 Lifecycle Rule. Retrieved September 25, 2024.
Internal MISP references
UUID 08efef52-40f6-5c76-a1b6-76ac1b7f423b
which can be used as unique global reference for Datadog S3 Lifecycle CloudTrail Logs
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-25T00:00:00Z |
source | MITRE |
title | CloudTrail Logs Impairment Through S3 Lifecycle Rule |
Mandiant Cloudy Logs 2023
Pany, D. & Hanley, C. (2023, May 3). Cloudy with a Chance of Bad Logs: Cloud Platform Log Configurations to Consider in Investigations. Retrieved October 16, 2023.
Internal MISP references
UUID a9835fe9-8227-5310-a728-1d09f19342b3
which can be used as unique global reference for Mandiant Cloudy Logs 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-10-16T00:00:00Z |
date_published | 2023-05-03T00:00:00Z |
source | MITRE |
title | Cloudy with a Chance of Bad Logs: Cloud Platform Log Configurations to Consider in Investigations |
win_clsid_key
Microsoft. (2018, May 31). CLSID Key. Retrieved September 24, 2021.
Internal MISP references
UUID 239bb629-2733-4da3-87c2-47a7ab55433f
which can be used as unique global reference for win_clsid_key
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-24T00:00:00Z |
date_published | 2018-05-31T00:00:00Z |
source | MITRE |
title | CLSID Key |
Kube Cluster Admin
kubernetes. (2021, January 16). Cluster Administration. Retrieved October 13, 2021.
Internal MISP references
UUID 6c5f2465-1db3-46cc-8d2a-9763c21aa8cc
which can be used as unique global reference for Kube Cluster Admin
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-13T00:00:00Z |
date_published | 2021-01-16T00:00:00Z |
source | MITRE |
title | Cluster Administration |
Kube Cluster Info
kubernetes. (n.d.). cluster-info. Retrieved October 13, 2021.
Internal MISP references
UUID 0f8b5d79-2393-45a2-b6d4-df394e513e39
which can be used as unique global reference for Kube Cluster Info
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-13T00:00:00Z |
source | MITRE |
title | cluster-info |
TechNet Cmd
Microsoft. (n.d.). Cmd. Retrieved April 18, 2016.
Internal MISP references
UUID dbfc01fe-c300-4c27-ab9a-a20508c1e04b
which can be used as unique global reference for TechNet Cmd
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-04-18T00:00:00Z |
source | MITRE |
title | Cmd |
Cmd.exe - LOLBAS Project
LOLBAS. (2019, June 26). Cmd.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 887aa9af-3f0e-42bb-8c40-39149f34b922
which can be used as unique global reference for Cmd.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2019-06-26T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Cmd.exe |
Cmdkey.exe - LOLBAS Project
LOLBAS. (2018, May 25). Cmdkey.exe. Retrieved December 4, 2023.
Internal MISP references
UUID c9ca075a-8327-463d-96ec-adddf6f1a7bb
which can be used as unique global reference for Cmdkey.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2018-05-25T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Cmdkey.exe |
cmdl32.exe - LOLBAS Project
LOLBAS. (2021, August 26). cmdl32.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 2628e452-caa1-4058-a405-7c4657fa3245
which can be used as unique global reference for cmdl32.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2021-08-26T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | cmdl32.exe |
Cmstp.exe - LOLBAS Project
LOLBAS. (2018, May 25). Cmstp.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 86c21dcd-464a-4870-8aae-25fcaccc889d
which can be used as unique global reference for Cmstp.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2018-05-25T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Cmstp.exe |
Twitter CMSTP Jan 2018
Tyrer, N. (2018, January 30). CMSTP.exe - remote .sct execution applocker bypass. Retrieved September 12, 2024.
Internal MISP references
UUID 3847149c-1463-4d94-be19-0a8cf1db0b58
which can be used as unique global reference for Twitter CMSTP Jan 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-12T00:00:00Z |
date_published | 2018-01-30T00:00:00Z |
source | MITRE |
title | CMSTP.exe - remote .sct execution applocker bypass |
Secureworks COBALT DICKENS September 2019
Counter Threat Unit Research Team. (2019, September 11). COBALT DICKENS Goes Back to School…Again. Retrieved February 3, 2021.
Internal MISP references
UUID 45815e4d-d678-4823-8315-583893e263e6
which can be used as unique global reference for Secureworks COBALT DICKENS September 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-02-03T00:00:00Z |
date_published | 2019-09-11T00:00:00Z |
source | MITRE |
title | COBALT DICKENS Goes Back to School…Again |
Morphisec Cobalt Gang Oct 2018
Gorelik, M. (2018, October 08). Cobalt Group 2.0. Retrieved November 5, 2018.
Internal MISP references
UUID 0a0bdd4b-a680-4a38-967d-3ad92f04d619
which can be used as unique global reference for Morphisec Cobalt Gang Oct 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-11-05T00:00:00Z |
date_published | 2018-10-08T00:00:00Z |
source | MITRE |
title | Cobalt Group 2.0 |
Secureworks COBALT GYPSY Threat Profile
Secureworks. (n.d.). COBALT GYPSY Threat Profile. Retrieved April 14, 2021.
Internal MISP references
UUID f1c21834-7536-430b-8539-e68373718b4d
which can be used as unique global reference for Secureworks COBALT GYPSY Threat Profile
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-04-14T00:00:00Z |
source | MITRE |
title | COBALT GYPSY Threat Profile |
Secureworks COBALT ILLUSION Threat Profile
Secureworks. (n.d.). COBALT ILLUSION Threat Profile. Retrieved April 14, 2021.
Internal MISP references
UUID 8d9a5b77-2516-4ad5-9710-4c8165df2882
which can be used as unique global reference for Secureworks COBALT ILLUSION Threat Profile
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-04-14T00:00:00Z |
source | MITRE |
title | COBALT ILLUSION Threat Profile |
PTSecurity Cobalt Dec 2016
Positive Technologies. (2016, December 16). Cobalt Snatch. Retrieved October 9, 2018.
Internal MISP references
UUID 2de4d38f-c99d-4149-89e6-0349a4902aa2
which can be used as unique global reference for PTSecurity Cobalt Dec 2016
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-10-09T00:00:00Z |
date_published | 2016-12-16T00:00:00Z |
source | MITRE |
title | Cobalt Snatch |
CobaltStrike Daddy May 2017
Mudge, R. (2017, May 23). Cobalt Strike 3.8 – Who’s Your Daddy?. Retrieved June 4, 2019.
Internal MISP references
UUID 056ef3cd-885d-41d6-9547-a2a575b03662
which can be used as unique global reference for CobaltStrike Daddy May 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-06-04T00:00:00Z |
date_published | 2017-05-23T00:00:00Z |
source | MITRE |
title | Cobalt Strike 3.8 – Who’s Your Daddy? |
Cobalt Strike Manual 4.3 November 2020
Strategic Cyber LLC. (2020, November 5). Cobalt Strike: Advanced Threat Tactics for Penetration Testers. Retrieved April 13, 2021.
Internal MISP references
UUID eb7abdb2-b270-46ae-a950-5a93d09b3565
which can be used as unique global reference for Cobalt Strike Manual 4.3 November 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-04-13T00:00:00Z |
date_published | 2020-11-05T00:00:00Z |
source | MITRE |
title | Cobalt Strike: Advanced Threat Tactics for Penetration Testers |
Malleable-C2-U42
Chris Navarrete Durgesh Sangvikar Andrew Guan Yu Fu Yanhui Jia Siddhart Shibiraj. (2022, March 16). Cobalt Strike Analysis and Tutorial: How Malleable C2 Profiles Make Cobalt Strike Difficult to Detect. Retrieved September 24, 2024.
Internal MISP references
UUID 49cf201e-d3da-5ba9-98df-edc50514a612
which can be used as unique global reference for Malleable-C2-U42
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-24T00:00:00Z |
date_published | 2022-03-16T00:00:00Z |
source | MITRE |
title | Cobalt Strike Analysis and Tutorial: How Malleable C2 Profiles Make Cobalt Strike Difficult to Detect |
cobaltstrike manual
Strategic Cyber LLC. (2017, March 14). Cobalt Strike Manual. Retrieved May 24, 2017.
Internal MISP references
UUID 43277d05-0aa4-4cee-ac41-6f03a49851a9
which can be used as unique global reference for cobaltstrike manual
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-05-24T00:00:00Z |
date_published | 2017-03-14T00:00:00Z |
source | MITRE |
title | Cobalt Strike Manual |
TrendMicro Cobalt Group Nov 2017
Giagone, R., Bermejo, L., and Yarochkin, F. (2017, November 20). Cobalt Strikes Again: Spam Runs Use Macros and CVE-2017-8759 Exploit Against Russian Banks. Retrieved March 7, 2019.
Internal MISP references
UUID 81847e06-fea0-4d90-8a9e-5bc99a2bf3f0
which can be used as unique global reference for TrendMicro Cobalt Group Nov 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-03-07T00:00:00Z |
date_published | 2017-11-20T00:00:00Z |
source | MITRE |
title | Cobalt Strikes Again: Spam Runs Use Macros and CVE-2017-8759 Exploit Against Russian Banks |
PTSecurity Cobalt Group Aug 2017
Positive Technologies. (2017, August 16). Cobalt Strikes Back: An Evolving Multinational Threat to Finance. Retrieved September 5, 2018.
Internal MISP references
UUID f4ce1b4d-4f01-4083-8bc6-931cbac9ac38
which can be used as unique global reference for PTSecurity Cobalt Group Aug 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-09-05T00:00:00Z |
date_published | 2017-08-16T00:00:00Z |
source | MITRE, Tidal Cyber |
title | Cobalt Strikes Back: An Evolving Multinational Threat to Finance |
Zscaler Cobian Aug 2017
Yadav, A., et al. (2017, August 31). Cobian RAT – A backdoored RAT. Retrieved November 13, 2018.
Internal MISP references
UUID 46541bb9-15cb-4a7c-a624-48a1c7e838e3
which can be used as unique global reference for Zscaler Cobian Aug 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-11-13T00:00:00Z |
date_published | 2017-08-31T00:00:00Z |
source | MITRE |
title | Cobian RAT – A backdoored RAT |
MACOS Cocoa
Apple. (2015, September 16). Cocoa Application Layer. Retrieved June 25, 2020.
Internal MISP references
UUID 6ada4c6a-23dc-4469-a3a1-1d3b4935db97
which can be used as unique global reference for MACOS Cocoa
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-06-25T00:00:00Z |
date_published | 2015-09-16T00:00:00Z |
source | MITRE |
title | Cocoa Application Layer |
code.exe - LOLBAS Project
LOLBAS. (2023, February 1). code.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 4a93063b-f3a3-4726-870d-b8f744651363
which can be used as unique global reference for code.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2023-02-01T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | code.exe |
Dark Reading Code Spaces Cyber Attack
Brian Prince. (2014, June 20). Code Hosting Service Shuts Down After Cyber Attack. Retrieved March 21, 2023.
Internal MISP references
UUID e5a3028a-f4cc-537c-9ddd-769792ab33be
which can be used as unique global reference for Dark Reading Code Spaces Cyber Attack
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-21T00:00:00Z |
date_published | 2014-06-20T00:00:00Z |
source | MITRE |
title | Code Hosting Service Shuts Down After Cyber Attack |
Medium Ptrace JUL 2018
Jain, S. (2018, July 25). Code injection in running process using ptrace. Retrieved February 21, 2020.
Internal MISP references
UUID 6dbfe4b5-9430-431b-927e-e8e775874cd9
which can be used as unique global reference for Medium Ptrace JUL 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-02-21T00:00:00Z |
date_published | 2018-07-25T00:00:00Z |
source | MITRE |
title | Code injection in running process using ptrace |
Wikipedia Code Signing
Wikipedia. (2015, November 10). Code Signing. Retrieved March 31, 2016.
Internal MISP references
UUID 363e860d-e14c-4fcd-985f-f76353018908
which can be used as unique global reference for Wikipedia Code Signing
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-03-31T00:00:00Z |
date_published | 2015-11-10T00:00:00Z |
source | MITRE |
title | Code Signing |
SpectorOps Code Signing Dec 2017
Graeber, M. (2017, December 22). Code Signing Certificate Cloning Attacks and Defenses. Retrieved April 3, 2018.
Internal MISP references
UUID 3efc5ae9-c63a-4a07-bbbd-d7324acdbaf5
which can be used as unique global reference for SpectorOps Code Signing Dec 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-04-03T00:00:00Z |
date_published | 2017-12-22T00:00:00Z |
source | MITRE |
title | Code Signing Certificate Cloning Attacks and Defenses |
CoinLoader: A Sophisticated Malware Loader Campaign
Avira. (2019, November 28). CoinLoader: A Sophisticated Malware Loader Campaign. Retrieved June 5, 2023.
Internal MISP references
UUID 83469ab3-0199-5679-aa25-7b6885019552
which can be used as unique global reference for CoinLoader: A Sophisticated Malware Loader Campaign
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-06-05T00:00:00Z |
date_published | 2019-11-28T00:00:00Z |
source | MITRE |
title | CoinLoader: A Sophisticated Malware Loader Campaign |
NYT-Colonial
Nicole Perlroth. (2021, May 13). Colonial Pipeline paid 75 Bitcoin, or roughly $5 million, to hackers.. Retrieved August 18, 2023.
Internal MISP references
UUID 58900911-ab4b-5157-968c-67fa69cc122d
which can be used as unique global reference for NYT-Colonial
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-08-18T00:00:00Z |
date_published | 2021-05-13T00:00:00Z |
source | MITRE |
title | Colonial Pipeline paid 75 Bitcoin, or roughly $5 million, to hackers. |
Colorcpl.exe - LOLBAS Project
LOLBAS. (2023, June 26). Colorcpl.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 53ff662d-a0b3-41bd-ab9e-a9bb8bbdea25
which can be used as unique global reference for Colorcpl.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2023-06-26T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Colorcpl.exe |
mod_rewrite
Bluescreenofjeff.com. (2015, April 12). Combatting Incident Responders with Apache mod_rewrite. Retrieved February 13, 2024.
Internal MISP references
UUID 3568b09c-7368-5fc2-85b3-d16ee9b9c686
which can be used as unique global reference for mod_rewrite
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-02-13T00:00:00Z |
date_published | 2015-04-12T00:00:00Z |
source | MITRE |
title | Combatting Incident Responders with Apache mod_rewrite |
sentinelone shlayer to zshlayer
Phil Stokes. (2020, September 8). Coming Out of Your Shell: From Shlayer to ZShlayer. Retrieved September 13, 2021.
Internal MISP references
UUID 17277b12-af29-475a-bc9a-0731bbe0bae2
which can be used as unique global reference for sentinelone shlayer to zshlayer
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-13T00:00:00Z |
date_published | 2020-09-08T00:00:00Z |
source | MITRE |
title | Coming Out of Your Shell: From Shlayer to ZShlayer |
University of Birmingham C2
Gardiner, J., Cova, M., Nagaraja, S. (2014, February). Command & Control Understanding, Denying and Detecting. Retrieved April 20, 2016.
Internal MISP references
UUID 113ce14e-147f-4a86-8b83-7b49b43a4e88
which can be used as unique global reference for University of Birmingham C2
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-04-20T00:00:00Z |
date_published | 2014-02-01T00:00:00Z |
source | MITRE |
title | Command & Control Understanding, Denying and Detecting |
Microsoft Command-line Logging
Mathers, B. (2017, March 7). Command line process auditing. Retrieved April 21, 2017.
Internal MISP references
UUID 4a58170b-906c-4df4-ad1e-0e5bc15366fa
which can be used as unique global reference for Microsoft Command-line Logging
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-04-21T00:00:00Z |
date_published | 2017-03-07T00:00:00Z |
source | MITRE |
title | Command line process auditing |
Microsoft Netdom Trust Sept 2012
Microsoft. (2012, September 11). Command-Line Reference - Netdom Trust. Retrieved November 30, 2017.
Internal MISP references
UUID 380dc9fe-d490-4914-9595-05d765b27a85
which can be used as unique global reference for Microsoft Netdom Trust Sept 2012
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-11-30T00:00:00Z |
date_published | 2012-09-11T00:00:00Z |
source | MITRE |
title | Command-Line Reference - Netdom Trust |
Microsoft msxsl.exe
Microsoft. (n.d.). Command Line Transformation Utility (msxsl.exe). Retrieved July 3, 2018.
Internal MISP references
UUID a25d664c-d109-466f-9b6a-7e9ea8c57895
which can be used as unique global reference for Microsoft msxsl.exe
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-07-03T00:00:00Z |
source | MITRE |
title | Command Line Transformation Utility (msxsl.exe) |
Kettle CSV DDE Aug 2014
Kettle, J. (2014, August 29). Comma Separated Vulnerabilities. Retrieved November 22, 2017.
Internal MISP references
UUID 2badfb63-19a3-4829-bbb5-7c3dfab877d5
which can be used as unique global reference for Kettle CSV DDE Aug 2014
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-11-22T00:00:00Z |
date_published | 2014-08-29T00:00:00Z |
source | MITRE |
title | Comma Separated Vulnerabilities |
Microsoft CLR Integration 2017
Microsoft. (2017, June 19). Common Language Runtime Integration. Retrieved July 8, 2019.
Internal MISP references
UUID 83fc7522-5eb1-4710-8391-090389948686
which can be used as unique global reference for Microsoft CLR Integration 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-07-08T00:00:00Z |
date_published | 2017-06-19T00:00:00Z |
source | MITRE |
title | Common Language Runtime Integration |
Palo Alto Comnie
Grunzweig, J. (2018, January 31). Comnie Continues to Target Organizations in East Asia. Retrieved June 7, 2018.
Internal MISP references
UUID ff3cc105-2798-45de-8561-983bf57eb9d9
which can be used as unique global reference for Palo Alto Comnie
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-06-07T00:00:00Z |
date_published | 2018-01-31T00:00:00Z |
source | MITRE |
title | Comnie Continues to Target Organizations in East Asia |
GDATA COM Hijacking
G DATA. (2014, October). COM Object hijacking: the discreet way of persistence. Retrieved August 13, 2016.
Internal MISP references
UUID 98e88505-b916-430d-aef6-616ba7ddd88e
which can be used as unique global reference for GDATA COM Hijacking
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-08-13T00:00:00Z |
date_published | 2014-10-01T00:00:00Z |
source | MITRE |
title | COM Object hijacking: the discreet way of persistence |
AP-NotPetya
FRANK BAJAK AND RAPHAEL SATTER. (2017, June 30). Companies still hobbled from fearsome cyberattack. Retrieved August 18, 2023.
Internal MISP references
UUID 7f1af58a-33fd-538f-b092-789a8776780c
which can be used as unique global reference for AP-NotPetya
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-08-18T00:00:00Z |
date_published | 2017-06-30T00:00:00Z |
source | MITRE |
title | Companies still hobbled from fearsome cyberattack |
Microsoft COM
Microsoft. (n.d.). Component Object Model (COM). Retrieved November 22, 2017.
Internal MISP references
UUID edcd917d-ca5b-4e5c-b3be-118e828abe97
which can be used as unique global reference for Microsoft COM
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-11-22T00:00:00Z |
source | MITRE |
title | Component Object Model (COM) |
Unit 42 12 8 2022
Dror Alon. (2022, December 8). Compromised Cloud Compute Credentials Case Studies From the Wild. Retrieved April 17, 2024.
Internal MISP references
UUID e7a4a0cf-ffa2-48cc-9b21-a2333592c773
which can be used as unique global reference for Unit 42 12 8 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-04-17T00:00:00Z |
date_published | 2022-12-08T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Compromised Cloud Compute Credentials Case Studies From the Wild |
Palo Alto Unit 42 Compromised Cloud Compute Credentials 2022
Dror Alon. (2022, December 8). Compromised Cloud Compute Credentials: Case Studies From the Wild. Retrieved March 9, 2023.
Internal MISP references
UUID af755ba2-97c2-5152-ab00-2e24740f69f3
which can be used as unique global reference for Palo Alto Unit 42 Compromised Cloud Compute Credentials 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-09T00:00:00Z |
date_published | 2022-12-08T00:00:00Z |
source | MITRE |
title | Compromised Cloud Compute Credentials: Case Studies From the Wild |
US-CERT Alert TA15-314A Web Shells
US-CERT. (2015, November 13). Compromised Web Servers and Web Shells - Threat Awareness and Guidance. Retrieved June 8, 2016.
Internal MISP references
UUID 61ceb0c4-62f6-46cd-b42b-5736c869421f
which can be used as unique global reference for US-CERT Alert TA15-314A Web Shells
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-06-08T00:00:00Z |
date_published | 2015-11-13T00:00:00Z |
source | MITRE |
title | Compromised Web Servers and Web Shells - Threat Awareness and Guidance |
Comsvcs.dll - LOLBAS Project
LOLBAS. (2019, August 30). Comsvcs.dll. Retrieved December 4, 2023.
Internal MISP references
UUID 2eb2756d-5a49-4df3-9e2f-104c41c645cd
which can be used as unique global reference for Comsvcs.dll - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2019-08-30T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Comsvcs.dll |
Condi-Botnet-binaries
Joie Salvio and Roy Tay. (2023, June 20). Condi DDoS Botnet Spreads via TP-Link's CVE-2023-1389. Retrieved September 5, 2023.
Internal MISP references
UUID a92b0d6c-b3e8-56a4-b1b4-1d117e59db84
which can be used as unique global reference for Condi-Botnet-binaries
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-05T00:00:00Z |
date_published | 2023-06-20T00:00:00Z |
source | MITRE |
title | Condi DDoS Botnet Spreads via TP-Link's CVE-2023-1389 |
Okta Conditional Access Policies
Okta. (2023, November 30). Conditional Access Based on Device Security Posture. Retrieved January 2, 2024.
Internal MISP references
UUID c914578c-dcc2-539e-bb3d-50bf7a0e7101
which can be used as unique global reference for Okta Conditional Access Policies
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-01-02T00:00:00Z |
date_published | 2023-11-30T00:00:00Z |
source | MITRE |
title | Conditional Access Based on Device Security Posture |
Microsoft Common Conditional Access Policies
Microsoft. (2022, December 14). Conditional Access templates. Retrieved February 21, 2023.
Internal MISP references
UUID 9ed9870b-d09a-511d-96f9-4956f26d46bf
which can be used as unique global reference for Microsoft Common Conditional Access Policies
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-02-21T00:00:00Z |
date_published | 2022-12-14T00:00:00Z |
source | MITRE |
title | Conditional Access templates |
Microsoft Token Protection 2023
Microsoft. (2023, October 23). Conditional Access: Token protection (preview). Retrieved January 2, 2024.
Internal MISP references
UUID aa4629cf-f11f-5921-9f72-5a8d3f752603
which can be used as unique global reference for Microsoft Token Protection 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-01-02T00:00:00Z |
date_published | 2023-10-23T00:00:00Z |
source | MITRE |
title | Conditional Access: Token protection (preview) |
Trend Micro Conficker
Trend Micro. (2014, March 18). Conficker. Retrieved February 18, 2021.
Internal MISP references
UUID 62cf7f3a-9011-45eb-a7d9-91c76a2177e9
which can be used as unique global reference for Trend Micro Conficker
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-02-18T00:00:00Z |
date_published | 2014-03-18T00:00:00Z |
source | MITRE |
title | Conficker |
ConfigSecurityPolicy.exe - LOLBAS Project
LOLBAS. (2020, September 4). ConfigSecurityPolicy.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 30b8a5d8-596c-4ab3-b3db-b799cc8923e1
which can be used as unique global reference for ConfigSecurityPolicy.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2020-09-04T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | ConfigSecurityPolicy.exe |
Microsoft SAML Token Lifetimes
Microsoft. (2020, December 14). Configurable token lifetimes in Microsoft Identity Platform. Retrieved December 22, 2020.
Internal MISP references
UUID 8b810f7c-1f26-420b-9014-732f1469f145
which can be used as unique global reference for Microsoft SAML Token Lifetimes
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-12-22T00:00:00Z |
date_published | 2020-12-14T00:00:00Z |
source | MITRE |
title | Configurable token lifetimes in Microsoft Identity Platform |
Apple Developer Configuration Profile
Apple. (2019, May 3). Configuration Profile Reference. Retrieved September 23, 2021.
Internal MISP references
UUID 8453f06d-5007-4e53-a9a2-1c0edb99be3d
which can be used as unique global reference for Apple Developer Configuration Profile
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-23T00:00:00Z |
date_published | 2019-05-03T00:00:00Z |
source | MITRE |
title | Configuration Profile Reference |
MDMProfileConfigMacOS
Apple. (2019, May 3). Configuration Profile Reference, Developer. Retrieved April 15, 2022.
Internal MISP references
UUID a7078eee-5478-4a93-9a7e-8db1d020e1da
which can be used as unique global reference for MDMProfileConfigMacOS
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-04-15T00:00:00Z |
date_published | 2019-05-03T00:00:00Z |
source | MITRE |
title | Configuration Profile Reference, Developer |
Azure Storage Lifecycles
Microsoft Azure. (2024, July 3). Configure a lifecycle management policy. Retrieved September 25, 2024.
Internal MISP references
UUID 7ac4c481-7798-53b3-b7ad-bc09a40f99b7
which can be used as unique global reference for Azure Storage Lifecycles
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-25T00:00:00Z |
date_published | 2024-07-03T00:00:00Z |
source | MITRE |
title | Configure a lifecycle management policy |
Azure Just in Time Access 2023
Microsoft. (2023, August 29). Configure and approve just-in-time access for Azure Managed Applications. Retrieved September 21, 2023.
Internal MISP references
UUID ee35e13f-ca39-5faf-81ae-230d33329a28
which can be used as unique global reference for Azure Just in Time Access 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-21T00:00:00Z |
date_published | 2023-08-29T00:00:00Z |
source | MITRE |
title | Configure and approve just-in-time access for Azure Managed Applications |
capture_embedded_packet_on_software
Cisco. (2022, August 17). Configure and Capture Embedded Packet on Software. Retrieved July 13, 2022.
Internal MISP references
UUID 5d973180-a28a-5c8f-b13a-45d21331700f
which can be used as unique global reference for capture_embedded_packet_on_software
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-07-13T00:00:00Z |
date_published | 2022-08-17T00:00:00Z |
source | MITRE |
title | Configure and Capture Embedded Packet on Software |
Kubernetes Security Context
Kubernetes. (n.d.). Configure a Security Context for a Pod or Container. Retrieved March 8, 2023.
Internal MISP references
UUID bd91ec00-95bb-572f-9452-8040ec633e00
which can be used as unique global reference for Kubernetes Security Context
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-08T00:00:00Z |
source | MITRE |
title | Configure a Security Context for a Pod or Container |
Microsoft SharePoint Logging
Microsoft. (2017, July 19). Configure audit settings for a site collection. Retrieved April 4, 2018.
Internal MISP references
UUID 9a6a08c0-94f2-4dbc-a0b3-01d5234e7753
which can be used as unique global reference for Microsoft SharePoint Logging
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-04-04T00:00:00Z |
date_published | 2017-07-19T00:00:00Z |
source | MITRE |
title | Configure audit settings for a site collection |
TechNet RDP NLA
Microsoft. (n.d.). Configure Network Level Authentication for Remote Desktop Services Connections. Retrieved June 6, 2016.
Internal MISP references
UUID 39e28cae-a35a-4cf2-a281-c35f4ebd16ba
which can be used as unique global reference for TechNet RDP NLA
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-06-06T00:00:00Z |
source | MITRE |
title | Configure Network Level Authentication for Remote Desktop Services Connections |
Microsoft Security Alerts for Azure AD Roles
Microsoft. (2022, November 14). Configure security alerts for Azure AD roles in Privileged Identity Management. Retrieved February 21, 2023.
Internal MISP references
UUID 7bde8cd2-6c10-5342-9a4b-a45e84a861b6
which can be used as unique global reference for Microsoft Security Alerts for Azure AD Roles
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-02-21T00:00:00Z |
date_published | 2022-11-14T00:00:00Z |
source | MITRE |
title | Configure security alerts for Azure AD roles in Privileged Identity Management |
Kubernetes Service Accounts
Kubernetes. (2022, February 26). Configure Service Accounts for Pods. Retrieved April 1, 2022.
Internal MISP references
UUID a74ffa28-8a2e-4bfd-bc66-969b463bebd9
which can be used as unique global reference for Kubernetes Service Accounts
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-04-01T00:00:00Z |
date_published | 2022-02-26T00:00:00Z |
source | MITRE |
title | Configure Service Accounts for Pods |
Microsoft Learn ClickOnce Config
Microsoft. (2023, August 4). Configure the ClickOnce trust prompt behavior. Retrieved September 9, 2024.
Internal MISP references
UUID 3a75c7d6-b3f3-5f25-bbcb-e0a18982dfed
which can be used as unique global reference for Microsoft Learn ClickOnce Config
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-09T00:00:00Z |
date_published | 2023-08-04T00:00:00Z |
source | MITRE |
title | Configure the ClickOnce trust prompt behavior |
Windows RDP Sessions
Microsoft. (n.d.). Configure Timeout and Reconnection Settings for Remote Desktop Services Sessions. Retrieved December 11, 2017.
Internal MISP references
UUID ccd0d241-4ff7-4a15-b2b4-06945980c6bf
which can be used as unique global reference for Windows RDP Sessions
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-11T00:00:00Z |
source | MITRE |
title | Configure Timeout and Reconnection Settings for Remote Desktop Services Sessions |
Microsoft Configure LSA
Microsoft. (2013, July 31). Configuring Additional LSA Protection. Retrieved June 24, 2015.
Internal MISP references
UUID 4adfc72b-cd32-46a6-bdf4-a4c2c6cffa73
which can be used as unique global reference for Microsoft Configure LSA
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2015-06-24T00:00:00Z |
date_published | 2013-07-31T00:00:00Z |
source | MITRE |
title | Configuring Additional LSA Protection |
Microsoft LSA Protection Mar 2014
Microsoft. (2014, March 12). Configuring Additional LSA Protection. Retrieved November 27, 2017.
Internal MISP references
UUID da3f1d7d-188f-4500-9bc6-3299ba043b5c
which can be used as unique global reference for Microsoft LSA Protection Mar 2014
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-11-27T00:00:00Z |
date_published | 2014-03-12T00:00:00Z |
source | MITRE |
title | Configuring Additional LSA Protection |
Microsoft LSA
Microsoft. (2013, July 31). Configuring Additional LSA Protection. Retrieved February 13, 2015.
Internal MISP references
UUID 3ad49746-4e42-4663-a49e-ae64152b9463
which can be used as unique global reference for Microsoft LSA
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2015-02-13T00:00:00Z |
date_published | 2013-07-31T00:00:00Z |
source | MITRE |
title | Configuring Additional LSA Protection |
Configuring Data Access audit logs
Google. (n.d.). Configuring Data Access audit logs. Retrieved October 16, 2020.
Internal MISP references
UUID bd310606-f472-4eda-a696-50a3a25f07b3
which can be used as unique global reference for Configuring Data Access audit logs
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-16T00:00:00Z |
source | MITRE |
title | Configuring Data Access audit logs |
cisco dhcp snooping
Cisco. (n.d.). Configuring DHCP Snooping. Retrieved September 17, 2024.
Internal MISP references
UUID cc5eda1b-5e64-52e8-b98f-8df2f3e10475
which can be used as unique global reference for cisco dhcp snooping
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-17T00:00:00Z |
source | MITRE |
title | Configuring DHCP Snooping |
Microsoft SID Filtering Quarantining Jan 2009
Microsoft. (n.d.). Configuring SID Filter Quarantining on External Trusts. Retrieved November 30, 2017.
Internal MISP references
UUID 134169f1-7bd3-4d04-81a8-f01e1407a4b6
which can be used as unique global reference for Microsoft SID Filtering Quarantining Jan 2009
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-11-30T00:00:00Z |
source | MITRE |
title | Configuring SID Filter Quarantining on External Trusts |
TechRepublic Wireless GPO FEB 2009
Schauland, D. (2009, February 24). Configuring Wireless settings via Group Policy. Retrieved July 26, 2018.
Internal MISP references
UUID b62415f8-76bd-4585-ae81-a4d04ccfc703
which can be used as unique global reference for TechRepublic Wireless GPO FEB 2009
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-07-26T00:00:00Z |
date_published | 2009-02-24T00:00:00Z |
source | MITRE |
title | Configuring Wireless settings via Group Policy |
ZDNet Dtrack
Catalin Cimpanu. (2019, October 30). Confirmed: North Korean malware found on Indian nuclear plant's network. Retrieved January 20, 2021.
Internal MISP references
UUID 6e6e02da-b805-47d7-b410-343a1b5da042
which can be used as unique global reference for ZDNet Dtrack
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-01-20T00:00:00Z |
date_published | 2019-10-30T00:00:00Z |
source | MITRE |
title | Confirmed: North Korean malware found on Indian nuclear plant's network |
Uptycs Confucius APT Jan 2021
Uptycs Threat Research Team. (2021, January 12). Confucius APT deploys Warzone RAT. Retrieved December 17, 2021.
Internal MISP references
UUID d74f2c25-cd53-4587-b087-7ba0b8427dc4
which can be used as unique global reference for Uptycs Confucius APT Jan 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-12-17T00:00:00Z |
date_published | 2021-01-12T00:00:00Z |
source | MITRE |
title | Confucius APT deploys Warzone RAT |
TrendMicro Confucius APT Aug 2021
Lunghi, D. (2021, August 17). Confucius Uses Pegasus Spyware-related Lures to Target Pakistani Military. Retrieved December 26, 2021.
Internal MISP references
UUID 5c16aae9-d253-463b-8bbc-f14402ce77e4
which can be used as unique global reference for TrendMicro Confucius APT Aug 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-12-26T00:00:00Z |
date_published | 2021-08-17T00:00:00Z |
source | MITRE, Tidal Cyber |
title | Confucius Uses Pegasus Spyware-related Lures to Target Pakistani Military |
Conhost.exe - LOLBAS Project
LOLBAS. (2022, April 5). Conhost.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 5ed807c1-15d1-48aa-b497-8cd74fe5b299
which can be used as unique global reference for Conhost.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2022-04-05T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Conhost.exe |
EC2 Instance Connect
AWS. (2023, June 2). Connect using EC2 Instance Connect. Retrieved June 2, 2023.
Internal MISP references
UUID deefa5b7-5a28-524c-b500-bc5574aa9920
which can be used as unique global reference for EC2 Instance Connect
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-06-02T00:00:00Z |
date_published | 2023-06-02T00:00:00Z |
source | MITRE |
title | Connect using EC2 Instance Connect |
Sophos News 2 23 2024
Andrew Brandt. (2024, February 23). ConnectWise ScreenConnect attacks deliver malware. Retrieved February 23, 2024.
Internal MISP references
UUID 3d342acf-a451-4473-82ac-8afee61bc984
which can be used as unique global reference for Sophos News 2 23 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-02-23T00:00:00Z |
date_published | 2024-02-23T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | ConnectWise ScreenConnect attacks deliver malware |
Docker Docs Container
docker docs. (n.d.). Containers. Retrieved October 13, 2021.
Internal MISP references
UUID 3475b705-3ab8-401d-bee6-e187c43ad3c2
which can be used as unique global reference for Docker Docs Container
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-13T00:00:00Z |
source | MITRE |
title | Containers |
DigitalShadows CDN
Swisscom & Digital Shadows. (2017, September 6). Content Delivery Networks (CDNs) Can Leave You Exposed – How You Might Be Affected And What You Can Do About It. Retrieved October 20, 2020.
Internal MISP references
UUID 183a070f-6c8c-46e3-915b-6edc58bb5e91
which can be used as unique global reference for DigitalShadows CDN
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-20T00:00:00Z |
date_published | 2017-09-06T00:00:00Z |
source | MITRE |
title | Content Delivery Networks (CDNs) Can Leave You Exposed – How You Might Be Affected And What You Can Do About It |
Content trust in Azure Container Registry
Microsoft. (2019, September 5). Content trust in Azure Container Registry. Retrieved October 16, 2019.
Internal MISP references
UUID fcd211a1-ac81-4ebc-b395-c8fa2a4d614a
which can be used as unique global reference for Content trust in Azure Container Registry
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-10-16T00:00:00Z |
date_published | 2019-09-05T00:00:00Z |
source | MITRE |
title | Content trust in Azure Container Registry |
Content trust in Docker
Docker. (2019, October 10). Content trust in Docker. Retrieved October 16, 2019.
Internal MISP references
UUID 57691166-5a22-44a0-8724-6b3b19658c3b
which can be used as unique global reference for Content trust in Docker
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-10-16T00:00:00Z |
date_published | 2019-10-10T00:00:00Z |
source | MITRE |
title | Content trust in Docker |
Microsoft File Folder Exclusions
Microsoft. (2024, February 27). Contextual file and folder exclusions. Retrieved March 29, 2024.
Internal MISP references
UUID 7a511f0d-8feb-5370-87db-b33b96ea2367
which can be used as unique global reference for Microsoft File Folder Exclusions
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-29T00:00:00Z |
date_published | 2024-02-27T00:00:00Z |
source | MITRE |
title | Contextual file and folder exclusions |
Arctic Wolf Akira 2023
Steven Campbell, Akshay Suthar, & Connor Belfiorre. (2023, July 26). Conti and Akira: Chained Together. Retrieved February 20, 2024.
Internal MISP references
UUID aa34f2a1-a398-5dc4-b898-cdc02afeca5d
which can be used as unique global reference for Arctic Wolf Akira 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-02-20T00:00:00Z |
date_published | 2023-07-26T00:00:00Z |
source | MITRE |
title | Conti and Akira: Chained Together |
Arctic Wolf Conti Akira July 26 2023
Steven Campbell, Akshay Suthar, Connor Belfiore, Arctic Wolf Labs Team. (2023, July 26). Conti and Akira: Chained Together. Retrieved March 13, 2024.
Internal MISP references
UUID 72e1b75b-edf7-45b0-9c14-14776a146d0e
which can be used as unique global reference for Arctic Wolf Conti Akira July 26 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-13T00:00:00Z |
date_published | 2023-07-26T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Conti and Akira: Chained Together |
DFIR Conti Bazar Nov 2021
DFIR Report. (2021, November 29). CONTInuing the Bazar Ransomware Story. Retrieved September 29, 2022.
Internal MISP references
UUID a6f1a15d-448b-41d4-81f0-ee445cba83bd
which can be used as unique global reference for DFIR Conti Bazar Nov 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-09-29T00:00:00Z |
date_published | 2021-11-29T00:00:00Z |
source | MITRE |
title | CONTInuing the Bazar Ransomware Story |
Cybereason Conti Jan 2021
Rochberger, L. (2021, January 12). Cybereason vs. Conti Ransomware. Retrieved February 17, 2021.
Internal MISP references
UUID 3c0e82a2-41ab-4e63-ac10-bd691c786234
which can be used as unique global reference for Cybereason Conti Jan 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-02-17T00:00:00Z |
source | MITRE |
title | Conti Ransomware |
Cybleinc Conti January 2020
Cybleinc. (2021, January 21). Conti Ransomware Resurfaces, Targeting Government & Large Organizations. Retrieved April 13, 2021.
Internal MISP references
UUID 5ef0ad9d-f34d-4771-a595-7ee4994f6c91
which can be used as unique global reference for Cybleinc Conti January 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-04-13T00:00:00Z |
date_published | 2021-01-21T00:00:00Z |
source | MITRE |
title | Conti Ransomware Resurfaces, Targeting Government & Large Organizations |
Microsoft Developer Support Power Apps Conditional Access
Microsoft Developer Support. (2020, May 9). Control Access to Power Apps and Power Automate with Azure AD Conditional Access Policies. Retrieved July 1, 2024.
Internal MISP references
UUID d198608c-2676-5f44-bbc8-5455c2b36cdb
which can be used as unique global reference for Microsoft Developer Support Power Apps Conditional Access
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-07-01T00:00:00Z |
date_published | 2020-05-09T00:00:00Z |
source | MITRE |
title | Control Access to Power Apps and Power Automate with Azure AD Conditional Access Policies |
Control.exe - LOLBAS Project
LOLBAS. (2018, May 25). Control.exe. Retrieved December 4, 2023.
Internal MISP references
UUID d0c821b9-7d37-4158-89fa-0dabe6e06800
which can be used as unique global reference for Control.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2018-05-25T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Control.exe |
Wikipedia Control Flow Integrity
Wikipedia. (2018, January 11). Control-flow integrity. Retrieved March 12, 2018.
Internal MISP references
UUID a9b2f525-d812-4dea-b4a6-c0d057d5f071
which can be used as unique global reference for Wikipedia Control Flow Integrity
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-03-12T00:00:00Z |
date_published | 2018-01-11T00:00:00Z |
source | MITRE |
title | Control-flow integrity |
Kubernetes API Control Access
The Kubernetes Authors. (n.d.). Controlling Access to The Kubernetes API. Retrieved March 29, 2021.
Internal MISP references
UUID fd4577b6-0085-44c0-b4c3-4d66dcb39fe7
which can be used as unique global reference for Kubernetes API Control Access
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-03-29T00:00:00Z |
source | MITRE |
title | Controlling Access to The Kubernetes API |
TrendMicro CPL Malware Dec 2013
Bernardino, J. (2013, December 17). Control Panel Files Used As Malicious Attachments. Retrieved January 18, 2018.
Internal MISP references
UUID fd38f1fd-37e9-4173-b319-3f92c2743055
which can be used as unique global reference for TrendMicro CPL Malware Dec 2013
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-01-18T00:00:00Z |
date_published | 2013-12-17T00:00:00Z |
source | MITRE |
title | Control Panel Files Used As Malicious Attachments |
GitHub Conveigh
Robertson, K. (2016, August 28). Conveigh. Retrieved November 17, 2017.
Internal MISP references
UUID 4deb8c8e-2da1-4634-bf04-5ccf620a2143
which can be used as unique global reference for GitHub Conveigh
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-11-17T00:00:00Z |
date_published | 2016-08-28T00:00:00Z |
source | MITRE |
title | Conveigh |
MITRE Copernicus
Butterworth, J. (2013, July 30). Copernicus: Question Your Assumptions about BIOS Security. Retrieved December 11, 2015.
Internal MISP references
UUID 55d139fe-f5e5-4b5e-9123-8133b459ea72
which can be used as unique global reference for MITRE Copernicus
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2015-12-11T00:00:00Z |
date_published | 2013-07-30T00:00:00Z |
source | MITRE |
title | Copernicus: Question Your Assumptions about BIOS Security |
Secureworks COPPER FIELDSTONE Profile
Secureworks. (n.d.). COPPER FIELDSTONE. Retrieved October 6, 2021.
Internal MISP references
UUID d7f5f154-3638-47c1-8e1e-a30a6504a735
which can be used as unique global reference for Secureworks COPPER FIELDSTONE Profile
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-06T00:00:00Z |
source | MITRE |
title | COPPER FIELDSTONE |
TechNet Copy
Microsoft. (n.d.). Copy. Retrieved April 26, 2016.
Internal MISP references
UUID 4e0d4b94-6b4c-4104-86e6-499b6aa7ba78
which can be used as unique global reference for TechNet Copy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-04-26T00:00:00Z |
source | MITRE |
title | Copy |
copy_cmd_cisco
Cisco. (2022, August 16). copy - Cisco IOS Configuration Fundamentals Command Reference . Retrieved July 13, 2022.
Internal MISP references
UUID 88138372-550f-5da5-be5e-b5ba0fe32f64
which can be used as unique global reference for copy_cmd_cisco
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-07-13T00:00:00Z |
date_published | 2022-08-16T00:00:00Z |
source | MITRE |
title | copy - Cisco IOS Configuration Fundamentals Command Reference |
CopyKittens Nov 2015
Minerva Labs LTD and ClearSky Cyber Security. (2015, November 23). CopyKittens Attack Group. Retrieved September 11, 2017.
Internal MISP references
UUID 04e3ce40-5487-4931-98db-f55da83f412e
which can be used as unique global reference for CopyKittens Nov 2015
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-09-11T00:00:00Z |
date_published | 2015-11-23T00:00:00Z |
source | MITRE |
title | CopyKittens Attack Group |
coregen.exe - LOLBAS Project
LOLBAS. (2020, October 9). coregen.exe. Retrieved December 4, 2023.
Internal MISP references
UUID f24d4cf5-9ca9-46bd-bd43-86b37e2a638a
which can be used as unique global reference for coregen.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2020-10-09T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | coregen.exe |
Apple Core Services
Apple. (n.d.). Core Services. Retrieved June 25, 2020.
Internal MISP references
UUID 0ef05e47-1305-4715-a677-67f1b55b24a3
which can be used as unique global reference for Apple Core Services
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-06-25T00:00:00Z |
source | MITRE |
title | Core Services |
Microsoft IoT Compromises August 05 2019
MSRC Team. (2019, August 5). Corporate IoT - a path to intrusion. Retrieved August 24, 2023.
Internal MISP references
UUID 037ace78-e997-40f3-a891-916bc596a9c0
which can be used as unique global reference for Microsoft IoT Compromises August 05 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-08-24T00:00:00Z |
date_published | 2019-08-05T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Corporate IoT - a path to intrusion |
Microsoft STRONTIUM Aug 2019
MSRC Team. (2019, August 5). Corporate IoT – a path to intrusion. Retrieved August 16, 2019.
Internal MISP references
UUID 7efd3c8d-5e69-4b6f-8edb-9186abdf0e1a
which can be used as unique global reference for Microsoft STRONTIUM Aug 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-08-16T00:00:00Z |
date_published | 2019-08-05T00:00:00Z |
source | MITRE |
title | Corporate IoT – a path to intrusion |
Palo Alto ARP
Palo Alto Networks. (2021, November 24). Cortex XDR Analytics Alert Reference: Uncommon ARP cache listing via arp.exe. Retrieved December 7, 2021.
Internal MISP references
UUID 96ce4324-57d2-422b-8403-f5d4f3ce410c
which can be used as unique global reference for Palo Alto ARP
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-12-07T00:00:00Z |
date_published | 2021-11-24T00:00:00Z |
source | MITRE |
title | Cortex XDR Analytics Alert Reference: Uncommon ARP cache listing via arp.exe |
WeLiveSecurity CosmicBeetle September 10 2024
Jakub Souček. (2024, September 10). CosmicBeetle steps up: Probation period at RansomHub. Retrieved September 13, 2024.
Internal MISP references
UUID 8debba29-4d6d-41d2-8772-f97c7d49056b
which can be used as unique global reference for WeLiveSecurity CosmicBeetle September 10 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-13T00:00:00Z |
date_published | 2024-09-10T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | CosmicBeetle steps up: Probation period at RansomHub |
F-Secure Cosmicduke
F-Secure Labs. (2014, July). COSMICDUKE Cosmu with a twist of MiniDuke. Retrieved July 3, 2014.
Internal MISP references
UUID d0d5ecbe-1051-4ceb-b558-b8b451178358
which can be used as unique global reference for F-Secure Cosmicduke
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2014-07-03T00:00:00Z |
date_published | 2014-07-01T00:00:00Z |
source | MITRE |
title | COSMICDUKE Cosmu with a twist of MiniDuke |
Costin Raiu IAmTheKing October 2020
Costin Raiu. (2020, October 2). Costin Raiu Twitter IAmTheKing SlothfulMedia. Retrieved September 12, 2024.
Internal MISP references
UUID 2be88843-ed3a-460e-87c1-85aa50e827c8
which can be used as unique global reference for Costin Raiu IAmTheKing October 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-12T00:00:00Z |
date_published | 2020-10-02T00:00:00Z |
source | MITRE |
title | Costin Raiu Twitter IAmTheKing SlothfulMedia |
Google Iran Threats October 2021
Bash, A. (2021, October 14). Countering threats from Iran. Retrieved January 4, 2023.
Internal MISP references
UUID 6d568141-eb54-5001-b880-ae8ac1156746
which can be used as unique global reference for Google Iran Threats October 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-01-04T00:00:00Z |
date_published | 2021-10-14T00:00:00Z |
source | MITRE |
title | Countering threats from Iran |
Github Covenant
cobbr. (2021, April 21). Covenant. Retrieved September 4, 2024.
Internal MISP references
UUID b717c3ae-8ae0-53c9-90ba-a34cf7694f3c
which can be used as unique global reference for Github Covenant
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-04T00:00:00Z |
date_published | 2021-04-21T00:00:00Z |
source | MITRE |
title | Covenant |
Cisco DNSMessenger March 2017
Brumaghin, E. and Grady, C.. (2017, March 2). Covert Channels and Poor Decisions: The Tale of DNSMessenger. Retrieved March 8, 2017.
Internal MISP references
UUID 49f22ba2-5aca-4204-858e-c2499a7050ae
which can be used as unique global reference for Cisco DNSMessenger March 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-03-08T00:00:00Z |
date_published | 2017-03-02T00:00:00Z |
source | MITRE |
title | Covert Channels and Poor Decisions: The Tale of DNSMessenger |
Juniper IcedID June 2020
Kimayong, P. (2020, June 18). COVID-19 and FMLA Campaigns used to install new IcedID banking malware. Retrieved July 14, 2020.
Internal MISP references
UUID 426886d0-cdf2-4af7-a0e4-366c1b0a1942
which can be used as unique global reference for Juniper IcedID June 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-07-14T00:00:00Z |
date_published | 2020-06-18T00:00:00Z |
source | MITRE |
title | COVID-19 and FMLA Campaigns used to install new IcedID banking malware |
PTSecurity Higaisa 2020
PT ESC Threat Intelligence. (2020, June 4). COVID-19 and New Year greetings: an investigation into the tools and methods used by the Higaisa group. Retrieved March 2, 2021.
Internal MISP references
UUID cf8f3d9c-0d21-4587-a707-46848a15bd46
which can be used as unique global reference for PTSecurity Higaisa 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-03-02T00:00:00Z |
date_published | 2020-06-04T00:00:00Z |
source | MITRE, Tidal Cyber |
title | COVID-19 and New Year greetings: an investigation into the tools and methods used by the Higaisa group |
F-Secure CozyDuke
F-Secure Labs. (2015, April 22). CozyDuke: Malware Analysis. Retrieved December 10, 2015.
Internal MISP references
UUID 08e1d233-0580-484e-b737-af091e2aa9ea
which can be used as unique global reference for F-Secure CozyDuke
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2015-12-10T00:00:00Z |
date_published | 2015-04-22T00:00:00Z |
source | MITRE |
title | CozyDuke: Malware Analysis |
TrendMicro CPL Malware Jan 2014
Mercês, F. (2014, January 27). CPL Malware - Malicious Control Panel Items. Retrieved January 18, 2018.
Internal MISP references
UUID 9549f9b6-b771-4500-bd82-426c7abdfd8f
which can be used as unique global reference for TrendMicro CPL Malware Jan 2014
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-01-18T00:00:00Z |
date_published | 2014-01-27T00:00:00Z |
source | MITRE |
title | CPL Malware - Malicious Control Panel Items |
Trend Micro CPL
Merces, F. (2014). CPL Malware Malicious Control Panel Items. Retrieved November 1, 2017.
Internal MISP references
UUID d90a33aa-8f20-49cb-aa27-771249cb65eb
which can be used as unique global reference for Trend Micro CPL
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-11-01T00:00:00Z |
date_published | 2014-01-01T00:00:00Z |
source | MITRE |
title | CPL Malware Malicious Control Panel Items |
SANS Brute Ratel October 2022
Thomas, W. (2022, October 5). Cracked Brute Ratel C4 framework proliferates across the cybercriminal underground. Retrieved February 6, 2023.
Internal MISP references
UUID 9544e762-6f72-59e7-8384-5bbef13bfe96
which can be used as unique global reference for SANS Brute Ratel October 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-02-06T00:00:00Z |
date_published | 2022-10-05T00:00:00Z |
source | MITRE |
title | Cracked Brute Ratel C4 framework proliferates across the cybercriminal underground |
Stealthbits Cracking AS-REP Roasting Jun 2019
Jeff Warren. (2019, June 27). Cracking Active Directory Passwords with AS-REP Roasting. Retrieved August 24, 2020.
Internal MISP references
UUID 3af06034-8384-4de8-9356-e9aaa35b95a2
which can be used as unique global reference for Stealthbits Cracking AS-REP Roasting Jun 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-08-24T00:00:00Z |
date_published | 2019-06-27T00:00:00Z |
source | MITRE |
title | Cracking Active Directory Passwords with AS-REP Roasting |
AdSecurity Cracking Kerberos Dec 2015
Metcalf, S. (2015, December 31). Cracking Kerberos TGS Tickets Using Kerberoast – Exploiting Kerberos to Compromise the Active Directory Domain. Retrieved March 22, 2018.
Internal MISP references
UUID 1b018fc3-515a-4ec4-978f-6d5649ceb0c5
which can be used as unique global reference for AdSecurity Cracking Kerberos Dec 2015
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-03-22T00:00:00Z |
date_published | 2015-12-31T00:00:00Z |
source | MITRE |
title | Cracking Kerberos TGS Tickets Using Kerberoast – Exploiting Kerberos to Compromise the Active Directory Domain |
Dragos Crashoverride 2017
Dragos Inc.. (2017, June 13). CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Retrieved December 18, 2020.
Internal MISP references
UUID c8f624e3-2ba2-4564-bd1c-f06b9a6a8bce
which can be used as unique global reference for Dragos Crashoverride 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-12-18T00:00:00Z |
date_published | 2017-06-13T00:00:00Z |
source | MITRE |
title | CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations |
Unit 42 ATOM Crawling Taurus
Unit 42. (n.d.). Crawling Taurus. Retrieved September 14, 2023.
Internal MISP references
UUID 75098b2c-4928-4e3f-9bcc-b4f6b8de96f8
which can be used as unique global reference for Unit 42 ATOM Crawling Taurus
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-14T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Crawling Taurus |
Microsoft Image
Microsoft. (2021, August 23). Create a managed image of a generalized VM in Azure. Retrieved October 13, 2021.
Internal MISP references
UUID 5317c625-d0be-45eb-9321-0cc9aa295cc9
which can be used as unique global reference for Microsoft Image
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-13T00:00:00Z |
date_published | 2021-08-23T00:00:00Z |
source | MITRE |
title | Create a managed image of a generalized VM in Azure |
Microsoft Snapshot
Microsoft. (2021, September 16). Create a snapshot of a virtual hard disk. Retrieved October 13, 2021.
Internal MISP references
UUID 693549da-d9b9-4b67-a1bb-c8ea4a099842
which can be used as unique global reference for Microsoft Snapshot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-13T00:00:00Z |
date_published | 2021-09-16T00:00:00Z |
source | MITRE |
title | Create a snapshot of a virtual hard disk |
Microsoft Create Token
Brower, N., Lich, B. (2017, April 19). Create a token object. Retrieved December 19, 2017.
Internal MISP references
UUID d36d4f06-007e-4ff0-8660-4c65721d0b92
which can be used as unique global reference for Microsoft Create Token
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-19T00:00:00Z |
date_published | 2017-04-19T00:00:00Z |
source | MITRE |
title | Create a token object |
GCP Create Cloud Identity Users
Google. (n.d.). Create Cloud Identity user accounts. Retrieved January 29, 2020.
Internal MISP references
UUID e91748b2-1432-4203-a1fe-100aa70458d2
which can be used as unique global reference for GCP Create Cloud Identity Users
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-01-29T00:00:00Z |
source | MITRE |
title | Create Cloud Identity user accounts |
Createdump.exe - LOLBAS Project
LOLBAS. (2022, January 20). Createdump.exe. Retrieved December 4, 2023.
Internal MISP references
UUID f3ccacc1-3b42-4042-9a5c-f5b483a5e801
which can be used as unique global reference for Createdump.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2022-01-20T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Createdump.exe |
Google Cloud Kubernetes IAM
Google Cloud. (n.d.). Create IAM policies. Retrieved July 14, 2023.
Internal MISP references
UUID e8ee3ac6-ae7c-5fd3-a339-b579a419dd96
which can be used as unique global reference for Google Cloud Kubernetes IAM
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-07-14T00:00:00Z |
source | MITRE |
title | Create IAM policies |
Microsoft CreateMutexA
Microsoft. (2023, February 8). CreateMutexA function (synchapi.h). Retrieved September 19, 2024.
Internal MISP references
UUID 20939374-30c1-515a-b672-28a030bf0c64
which can be used as unique global reference for Microsoft CreateMutexA
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-19T00:00:00Z |
date_published | 2023-02-08T00:00:00Z |
source | MITRE |
title | CreateMutexA function (synchapi.h) |
Microsoft CreateProcess
Microsoft. (n.d.). CreateProcess function. Retrieved September 12, 2024.
Internal MISP references
UUID aa336e3a-464d-48ce-bebb-760b73764610
which can be used as unique global reference for Microsoft CreateProcess
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-12T00:00:00Z |
source | MITRE |
title | CreateProcess function |
Microsoft CLI Create Subscription
Microsoft . (n.d.). Create subscription. Retrieved August 4, 2023.
Internal MISP references
UUID 1331b524-7d6f-59d9-a2bd-78ff7b3e371f
which can be used as unique global reference for Microsoft CLI Create Subscription
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-08-04T00:00:00Z |
source | MITRE |
title | Create subscription |
create_sym_links
Microsoft. (2021, October 28). Create symbolic links. Retrieved April 27, 2022.
Internal MISP references
UUID 06bfdf8f-8671-47f7-9d0c-baf234c7ae96
which can be used as unique global reference for create_sym_links
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-04-27T00:00:00Z |
date_published | 2021-10-28T00:00:00Z |
source | MITRE |
title | Create symbolic links |
GCP - Creating and Starting a VM
Google. (2020, April 23). Creating and Starting a VM instance. Retrieved May 1, 2020.
Internal MISP references
UUID c1b87a56-115a-46d7-9117-80442091ac3c
which can be used as unique global reference for GCP - Creating and Starting a VM
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-05-01T00:00:00Z |
date_published | 2020-04-23T00:00:00Z |
source | MITRE |
title | Creating and Starting a VM instance |
AWS Create IAM User
AWS. (n.d.). Creating an IAM User in Your AWS Account. Retrieved January 29, 2020.
Internal MISP references
UUID bb474e88-b7bb-4b92-837c-95fe7bdd03f7
which can be used as unique global reference for AWS Create IAM User
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-01-29T00:00:00Z |
source | MITRE |
title | Creating an IAM User in Your AWS Account |
GNU Fork
Free Software Foundation, Inc.. (2020, June 18). Creating a Process. Retrieved June 25, 2020.
Internal MISP references
UUID c46331cb-328a-46e3-89c4-e43fa345d6e8
which can be used as unique global reference for GNU Fork
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-06-25T00:00:00Z |
date_published | 2020-06-18T00:00:00Z |
source | MITRE |
title | Creating a Process |
AppleDocs Launch Agent Daemons
Apple. (n.d.). Creating Launch Daemons and Agents. Retrieved July 10, 2017.
Internal MISP references
UUID 310d18f8-6f9a-48b7-af12-6b921209d1ab
which can be used as unique global reference for AppleDocs Launch Agent Daemons
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-07-10T00:00:00Z |
source | MITRE |
title | Creating Launch Daemons and Agents |
TechNet Logon Scripts
Microsoft. (2005, January 21). Creating logon scripts. Retrieved April 27, 2016.
Internal MISP references
UUID 896cf5dd-3fe7-44ab-bbaf-d8b2b9980dca
which can be used as unique global reference for TechNet Logon Scripts
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-04-27T00:00:00Z |
date_published | 2005-01-21T00:00:00Z |
source | MITRE |
title | Creating logon scripts |
Google Cloud Service Account Credentials
Google Cloud. (2022, March 31). Creating short-lived service account credentials. Retrieved April 1, 2022.
Internal MISP references
UUID c4befa09-3c7f-49f3-bfcc-4fcbb7bace22
which can be used as unique global reference for Google Cloud Service Account Credentials
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-04-01T00:00:00Z |
date_published | 2022-03-31T00:00:00Z |
source | MITRE |
title | Creating short-lived service account credentials |
creatingXPCservices
Apple. (2016, September 9). Creating XPC Services. Retrieved April 19, 2022.
Internal MISP references
UUID 029acdee-95d6-47a7-86de-0f6b925cef9c
which can be used as unique global reference for creatingXPCservices
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-04-19T00:00:00Z |
date_published | 2016-09-09T00:00:00Z |
source | MITRE |
title | Creating XPC Services |
GitHub Creddump7
Flathers, R. (2018, February 19). creddump7. Retrieved April 11, 2018.
Internal MISP references
UUID 276975da-7b5f-49aa-975e-4ac9bc527cf2
which can be used as unique global reference for GitHub Creddump7
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-04-11T00:00:00Z |
date_published | 2018-02-19T00:00:00Z |
source | MITRE |
title | creddump7 |
Microsoft Midnight Blizzard Replay Attack
Microsoft Threat Intelligence. (2023, June 21). Credential Attacks. Retrieved September 12, 2024.
Internal MISP references
UUID 5af0008b-0ced-5d1d-bbc9-6c9d60835071
which can be used as unique global reference for Microsoft Midnight Blizzard Replay Attack
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-12T00:00:00Z |
date_published | 2023-06-21T00:00:00Z |
source | MITRE |
title | Credential Attacks |
Anomali Template Injection MAR 2018
Intel_Acquisition_Team. (2018, March 1). Credential Harvesting and Malicious File Delivery using Microsoft Office Template Injection. Retrieved July 20, 2018.
Internal MISP references
UUID 3cdeb2a2-9582-4725-a132-6503dbe04e1d
which can be used as unique global reference for Anomali Template Injection MAR 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-07-20T00:00:00Z |
date_published | 2018-03-01T00:00:00Z |
source | MITRE |
title | Credential Harvesting and Malicious File Delivery using Microsoft Office Template Injection |
Microsoft Credential Locker
Microsoft. (2013, October 23). Credential Locker Overview. Retrieved November 24, 2020.
Internal MISP references
UUID 77505354-bb08-464c-9176-d0015a62c7c9
which can be used as unique global reference for Microsoft Credential Locker
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-11-24T00:00:00Z |
date_published | 2013-10-23T00:00:00Z |
source | MITRE |
title | Credential Locker Overview |
Microsoft CredEnumerate
Microsoft. (2018, December 5). CredEnumarateA function (wincred.h). Retrieved November 24, 2020.
Internal MISP references
UUID ec3e7b3f-99dd-4f2f-885b-09d66b01fe3e
which can be used as unique global reference for Microsoft CredEnumerate
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-11-24T00:00:00Z |
date_published | 2018-12-05T00:00:00Z |
source | MITRE |
title | CredEnumarateA function (wincred.h) |
SentinelLabs Intermittent Encryption September 08 2022
Aleksandar Milenkoski, Jim Walter. (2022, September 8). Crimeware Trends | Ransomware Developers Turn to Intermittent Encryption to Evade Detection. Retrieved August 10, 2023.
Internal MISP references
UUID 09cae6de-e026-43a5-a8bc-7ff8e8205232
which can be used as unique global reference for SentinelLabs Intermittent Encryption September 08 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-08-10T00:00:00Z |
date_published | 2022-09-08T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Crimeware Trends |
TrendmicroHideoutsLease
Max Goncharov. (2015, July 15). Criminal Hideouts for Lease: Bulletproof Hosting Services. Retrieved March 6, 2017.
Internal MISP references
UUID 527de869-3c76-447c-98c4-c37a2acf75e2
which can be used as unique global reference for TrendmicroHideoutsLease
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-03-06T00:00:00Z |
date_published | 2015-07-15T00:00:00Z |
source | MITRE |
title | Criminal Hideouts for Lease: Bulletproof Hosting Services |
doppelpaymer_crowdstrike
Hurley, S. (2021, December 7). Critical Hit: How DoppelPaymer Hunts and Kills Windows Processes. Retrieved January 26, 2022.
Internal MISP references
UUID 54b5d8af-21f0-4d1c-ada8-b87db85dd742
which can be used as unique global reference for doppelpaymer_crowdstrike
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-01-26T00:00:00Z |
date_published | 2021-12-07T00:00:00Z |
source | MITRE |
title | Critical Hit: How DoppelPaymer Hunts and Kills Windows Processes |
CISA AA24-038A PRC Critical Infrastructure February 2024
CISA et al.. (2024, February 7). PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure. Retrieved May 15, 2024.
Internal MISP references
UUID bfa16dc6-f075-5bd3-9d9d-255df8789298
which can be used as unique global reference for CISA AA24-038A PRC Critical Infrastructure February 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-05-15T00:00:00Z |
source | MITRE |
title | Critical Infrastructure |
Critical Vulnerabilities in PaperCut Print Management Software
Team Huntress. (2023, April 21). Critical Vulnerabilities in PaperCut Print Management Software. Retrieved May 8, 2023.
Internal MISP references
UUID 874f40f9-146d-4a52-93fd-9b2e7981b6da
which can be used as unique global reference for Critical Vulnerabilities in PaperCut Print Management Software
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-08T00:00:00Z |
date_published | 2023-04-21T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Critical Vulnerabilities in PaperCut Print Management Software |
Security Affairs SILENTTRINITY July 2019
Paganini, P. (2019, July 7). Croatia government agencies targeted with news SilentTrinity malware. Retrieved March 23, 2022.
Internal MISP references
UUID b4945fc0-b89b-445c-abfb-14959deba3d0
which can be used as unique global reference for Security Affairs SILENTTRINITY July 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-03-23T00:00:00Z |
date_published | 2019-07-07T00:00:00Z |
source | MITRE |
title | Croatia government agencies targeted with news SilentTrinity malware |
Die.net Linux crontab Man Page
Paul Vixie. (n.d.). crontab(5) - Linux man page. Retrieved December 19, 2017.
Internal MISP references
UUID 0339c2ab-7a08-4976-90eb-1637c23c5644
which can be used as unique global reference for Die.net Linux crontab Man Page
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-19T00:00:00Z |
source | MITRE |
title | crontab(5) - Linux man page |
Symantec Frutas Feb 2013
Bingham, J. (2013, February 11). Cross-Platform Frutas RAT Builder and Back Door. Retrieved April 23, 2019.
Internal MISP references
UUID 8d9f88be-9ddf-485b-9333-7e41704ec64f
which can be used as unique global reference for Symantec Frutas Feb 2013
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-04-23T00:00:00Z |
date_published | 2013-02-11T00:00:00Z |
source | MITRE |
title | Cross-Platform Frutas RAT Builder and Back Door |
Bishop Fox Sliver Framework August 2019
Kervella, R. (2019, August 4). Cross-platform General Purpose Implant Framework Written in Golang. Retrieved July 30, 2021.
Internal MISP references
UUID 51e67e37-2d61-4228-999b-bec6f80cf106
which can be used as unique global reference for Bishop Fox Sliver Framework August 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-07-30T00:00:00Z |
date_published | 2019-08-04T00:00:00Z |
source | MITRE |
title | Cross-platform General Purpose Implant Framework Written in Golang |
Okta Cross-Tenant Impersonation 2023
Okta Defensive Cyber Operations. (2023, August 31). Cross-Tenant Impersonation: Prevention and Detection. Retrieved February 15, 2024.
Internal MISP references
UUID d54188b5-86eb-52a0-8384-823c45431762
which can be used as unique global reference for Okta Cross-Tenant Impersonation 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-02-15T00:00:00Z |
date_published | 2023-08-31T00:00:00Z |
source | MITRE |
title | Cross-Tenant Impersonation: Prevention and Detection |
Okta Cross-Tenant Impersonation
Okta Defensive Cyber Operations. (2023, August 31). Cross-Tenant Impersonation: Prevention and Detection. Retrieved March 4, 2024.
Internal MISP references
UUID 77dbd22f-ce57-50f7-9c6b-8dc874a4d80d
which can be used as unique global reference for Okta Cross-Tenant Impersonation
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-04T00:00:00Z |
date_published | 2023-08-31T00:00:00Z |
source | MITRE |
title | Cross-Tenant Impersonation: Prevention and Detection |
Crowdstrike CrowdCast Oct 2013
Crowdstrike. (2013, October 16). CrowdCasts Monthly: You Have an Adversary Problem. Retrieved March 1, 2017.
Internal MISP references
UUID 2062a229-58b3-4610-99cb-8907e7fbb350
which can be used as unique global reference for Crowdstrike CrowdCast Oct 2013
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-03-01T00:00:00Z |
date_published | 2013-10-16T00:00:00Z |
source | MITRE |
title | CrowdCasts Monthly: You Have an Adversary Problem |
Crowdstrike Global Threat Report Feb 2018
CrowdStrike. (2018, February 26). CrowdStrike 2018 Global Threat Report. Retrieved October 10, 2018.
Internal MISP references
UUID 6c1ace5b-66b2-4c56-9301-822aad2c3c16
which can be used as unique global reference for Crowdstrike Global Threat Report Feb 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-10-10T00:00:00Z |
date_published | 2018-02-26T00:00:00Z |
source | MITRE |
title | CrowdStrike 2018 Global Threat Report |
CrowdStrike GTR 2021 June 2021
CrowdStrike. (2021, June 7). CrowdStrike 2021 Global Threat Report. Retrieved September 29, 2021.
Internal MISP references
UUID ec58e524-6de5-4cbb-a5d3-984b9b652f26
which can be used as unique global reference for CrowdStrike GTR 2021 June 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-29T00:00:00Z |
date_published | 2021-06-07T00:00:00Z |
source | MITRE |
title | CrowdStrike 2021 Global Threat Report |
CrowdStrike Adversary Carbon Spider
CrowdStrike. (2022, June 01). CrowdStrike Adversary Carbon Spider. Retrieved June 01, 2022.
Internal MISP references
UUID 9e28d375-c4a7-405f-9fff-7374c19f3af7
which can be used as unique global reference for CrowdStrike Adversary Carbon Spider
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-06-01T00:00:00Z |
source | Tidal Cyber |
title | CrowdStrike Adversary Carbon Spider |
CrowdStrike Adversary Cozy Bear
CrowdStrike. (2022, May 4). CrowdStrike Adversary Cozy Bear. Retrieved May 4, 2022.
Internal MISP references
UUID 0998ad7a-b4aa-44af-a665-dc58a3a6f800
which can be used as unique global reference for CrowdStrike Adversary Cozy Bear
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-05-04T00:00:00Z |
source | Tidal Cyber |
title | CrowdStrike Adversary Cozy Bear |
CrowdStrike Labyrinth Chollima Feb 2022
CrowdStrike. (2022, February 1). CrowdStrike Adversary Labyrinth Chollima. Retrieved February 1, 2022.
Internal MISP references
UUID ffe31bbf-a40d-4285-96a0-53c54298a680
which can be used as unique global reference for CrowdStrike Labyrinth Chollima Feb 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-02-01T00:00:00Z |
date_published | 2022-02-01T00:00:00Z |
source | MITRE |
title | CrowdStrike Adversary Labyrinth Chollima |
CrowdStrike Adversary Ocean Buffalo
CrowdStrike. (2022, June 25). CrowdStrike Adversary Ocean Bufallo. Retrieved June 25, 2022.
Internal MISP references
UUID 466795cb-0269-4d0c-a48c-d71e9dfd9a3c
which can be used as unique global reference for CrowdStrike Adversary Ocean Buffalo
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-06-25T00:00:00Z |
source | Tidal Cyber |
title | CrowdStrike Adversary Ocean Buffalo |
CrowdStrike Adversary Venomous Bear
CrowdStrike. (2022, May 4). CrowdStrike Adversary Venomous Bear. Retrieved May 4, 2022.
Internal MISP references
UUID 8c04f2b8-74ba-44a5-9580-96eabdbbcda9
which can be used as unique global reference for CrowdStrike Adversary Venomous Bear
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-05-04T00:00:00Z |
source | Tidal Cyber |
title | CrowdStrike Adversary Venomous Bear |
CrowdStrike Adversary Wizard Spider
CrowdStrike. (2022, June 23). CrowdStrike Adversary Wizard Spider. Retrieved June 23, 2022.
Internal MISP references
UUID 05f382c4-5163-49e0-a8a0-cf3a5992ef18
which can be used as unique global reference for CrowdStrike Adversary Wizard Spider
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-06-23T00:00:00Z |
source | Tidal Cyber |
title | CrowdStrike Adversary Wizard Spider |
Crowdstrike DriveSlayer February 2022
Thomas, W. et al. (2022, February 25). CrowdStrike Falcon Protects from New Wiper Malware Used in Ukraine Cyberattacks. Retrieved March 25, 2022.
Internal MISP references
UUID 4f01e901-58f8-4fdb-ac8c-ef4b6bfd068e
which can be used as unique global reference for Crowdstrike DriveSlayer February 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-03-25T00:00:00Z |
date_published | 2022-02-25T00:00:00Z |
source | MITRE |
title | CrowdStrike Falcon Protects from New Wiper Malware Used in Ukraine Cyberattacks |
CrowdStrike Putter Panda
Crowdstrike Global Intelligence Team. (2014, June 9). CrowdStrike Intelligence Report: Putter Panda. Retrieved January 22, 2016.
Internal MISP references
UUID 413962d0-bd66-4000-a077-38c2677995d1
which can be used as unique global reference for CrowdStrike Putter Panda
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-01-22T00:00:00Z |
date_published | 2014-06-09T00:00:00Z |
source | MITRE, Tidal Cyber |
title | CrowdStrike Intelligence Report: Putter Panda |
Softpedia MinerC
Cimpanu, C.. (2016, September 9). Cryptocurrency Mining Malware Discovered Targeting Seagate NAS Hard Drives. Retrieved September 12, 2024.
Internal MISP references
UUID 087b9bf1-bd9e-4cd6-a386-d9d2c812c927
which can be used as unique global reference for Softpedia MinerC
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-12T00:00:00Z |
date_published | 2016-09-09T00:00:00Z |
source | MITRE |
title | Cryptocurrency Mining Malware Discovered Targeting Seagate NAS Hard Drives |
Microsoft Cryptojacking 2023
Microsoft Threat Intelligence. (2023, July 25). Cryptojacking: Understanding and defending against cloud compute resource abuse. Retrieved September 5, 2023.
Internal MISP references
UUID e2dbc963-b913-5a44-bb61-88a3f0d8d8a3
which can be used as unique global reference for Microsoft Cryptojacking 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-05T00:00:00Z |
date_published | 2023-07-25T00:00:00Z |
source | MITRE |
title | Cryptojacking: Understanding and defending against cloud compute resource abuse |
Microsoft CryptUnprotectData April 2018
Microsoft. (2018, April 12). CryptUnprotectData function. Retrieved June 18, 2019.
Internal MISP references
UUID 258088ae-96c2-4520-8eb5-1a7e540a9a24
which can be used as unique global reference for Microsoft CryptUnprotectData April 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-06-18T00:00:00Z |
date_published | 2018-04-12T00:00:00Z |
source | MITRE |
title | CryptUnprotectData function |
Csc.exe - LOLBAS Project
LOLBAS. (2018, May 25). Csc.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 276c9e55-4673-426d-8f49-06edee2e3b30
which can be used as unique global reference for Csc.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2018-05-25T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Csc.exe |
Cscript.exe - LOLBAS Project
LOLBAS. (2018, May 25). Cscript.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 428b6223-63b7-497f-b13a-e472b4583a9f
which can be used as unique global reference for Cscript.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2018-05-25T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Cscript.exe |
csi.exe - LOLBAS Project
LOLBAS. (2018, May 25). csi.exe. Retrieved December 4, 2023.
Internal MISP references
UUID b810ee91-de4e-4c7b-8fa8-24dca95133e5
which can be used as unique global reference for csi.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2018-05-25T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | csi.exe |
OWASP CSV Injection
Albinowax Timo Goosen. (n.d.). CSV Injection. Retrieved February 7, 2022.
Internal MISP references
UUID 0cdde66c-a7ae-48a2-8ade-067643de304d
which can be used as unique global reference for OWASP CSV Injection
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-02-07T00:00:00Z |
source | MITRE |
title | CSV Injection |
Elastic CUBA Ransomware 2022
Daniel Stepanic, Derek Ditch, Seth Goodwin, Salim Bitam, Andrew Pease. (2022, September 7). CUBA Ransomware Campaign Analysis. Retrieved August 5, 2024.
Internal MISP references
UUID 79299d27-dbbf-56d0-87fd-15e3f9167cf8
which can be used as unique global reference for Elastic CUBA Ransomware 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-08-05T00:00:00Z |
date_published | 2022-09-07T00:00:00Z |
source | MITRE |
title | CUBA Ransomware Campaign Analysis |
Microsoft Subkey
Microsoft. (n.d.). CurrentControlSet\Services Subkey Entries. Retrieved November 30, 2014.
Internal MISP references
UUID be233077-7bb4-48be-aecf-03258931527d
which can be used as unique global reference for Microsoft Subkey
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2014-11-30T00:00:00Z |
source | MITRE |
title | CurrentControlSet\Services Subkey Entries |
Microsoft - Customer Guidance on Recent Nation-State Cyber Attacks
MSRC. (2020, December 13). Customer Guidance on Recent Nation-State Cyber Attacks. Retrieved December 30, 2020.
Internal MISP references
UUID 47031992-841f-4ef4-87c6-bb4c077fb8dc
which can be used as unique global reference for Microsoft - Customer Guidance on Recent Nation-State Cyber Attacks
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-12-30T00:00:00Z |
date_published | 2020-12-13T00:00:00Z |
source | MITRE |
title | Customer Guidance on Recent Nation-State Cyber Attacks |
Microsoft SolarWinds Customer Guidance
MSRC. (2020, December 13). Customer Guidance on Recent Nation-State Cyber Attacks. Retrieved December 17, 2020.
Internal MISP references
UUID b486ae40-a854-4998-bf1b-aaf6ea2047ed
which can be used as unique global reference for Microsoft SolarWinds Customer Guidance
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-12-17T00:00:00Z |
date_published | 2020-12-13T00:00:00Z |
source | MITRE |
title | Customer Guidance on Recent Nation-State Cyber Attacks |
Bleeping Computer Bank Hack 2020
Ionut Ilascu. (2020, January 16). Customer-Owned Bank Informs 100k of Breach Exposing Account Balance, PII. Retrieved July 1, 2024.
Internal MISP references
UUID 027b281d-79d5-50aa-9ff3-d6f4e647d477
which can be used as unique global reference for Bleeping Computer Bank Hack 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-07-01T00:00:00Z |
date_published | 2020-01-16T00:00:00Z |
source | MITRE |
title | Customer-Owned Bank Informs 100k of Breach Exposing Account Balance, PII |
Login Scripts Apple Dev
Apple. (2016, September 13). Customizing Login and Logout. Retrieved April 1, 2022.
Internal MISP references
UUID 9c0094b6-a8e3-4f4d-8d2e-33b408d44a06
which can be used as unique global reference for Login Scripts Apple Dev
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-04-01T00:00:00Z |
date_published | 2016-09-13T00:00:00Z |
source | MITRE |
title | Customizing Login and Logout |
TechNet Screensaver GP
Microsoft. (n.d.). Customizing the Desktop. Retrieved December 5, 2017.
Internal MISP references
UUID 7cf8056e-6d3b-4930-9d2c-160d7d9636ac
which can be used as unique global reference for TechNet Screensaver GP
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-05T00:00:00Z |
source | MITRE |
title | Customizing the Desktop |
CustomShellHost.exe - LOLBAS Project
LOLBAS. (2021, November 14). CustomShellHost.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 96324ab1-7eb8-42dc-b19a-fa1d9f85e239
which can be used as unique global reference for CustomShellHost.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2021-11-14T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | CustomShellHost.exe |
Mandiant Cutting Edge Part 2 January 2024
Lin, M. et al. (2024, January 31). Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation. Retrieved February 27, 2024.
Internal MISP references
UUID 5209d259-4293-58c0-bbdc-f30ff77d57f7
which can be used as unique global reference for Mandiant Cutting Edge Part 2 January 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-02-27T00:00:00Z |
date_published | 2024-01-31T00:00:00Z |
source | MITRE |
title | Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation |
Mandiant Cutting Edge Part 3 February 2024
Lin, M. et al. (2024, February 27). Cutting Edge, Part 3: Investigating Ivanti Connect Secure VPN Exploitation and Persistence Attempts. Retrieved March 1, 2024.
Internal MISP references
UUID 49e5b125-5503-5cb0-9a56-a93f82b55753
which can be used as unique global reference for Mandiant Cutting Edge Part 3 February 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-01T00:00:00Z |
date_published | 2024-02-27T00:00:00Z |
source | MITRE |
title | Cutting Edge, Part 3: Investigating Ivanti Connect Secure VPN Exploitation and Persistence Attempts |
Mandiant Cutting Edge January 2024
McLellan, T. et al. (2024, January 12). Cutting Edge: Suspected APT Targets Ivanti Connect Secure VPN in New Zero-Day Exploitation. Retrieved February 27, 2024.
Internal MISP references
UUID 9d9ec923-89c1-5155-ae6e-98d4776d4250
which can be used as unique global reference for Mandiant Cutting Edge January 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-02-27T00:00:00Z |
date_published | 2024-01-12T00:00:00Z |
source | MITRE |
title | Cutting Edge: Suspected APT Targets Ivanti Connect Secure VPN in New Zero-Day Exploitation |
Symantec Naid in the Wild June 2012
Symantec Security Response. (2012, June 18). CVE-2012-1875 Exploited in the Wild - Part 1 (Trojan.Naid). Retrieved February 22, 2018.
Internal MISP references
UUID e1531171-709c-4043-9e3a-af9e37f3ac57
which can be used as unique global reference for Symantec Naid in the Wild June 2012
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-02-22T00:00:00Z |
date_published | 2012-06-18T00:00:00Z |
source | MITRE |
title | CVE-2012-1875 Exploited in the Wild - Part 1 (Trojan.Naid) |
NVD CVE-2014-7169
National Vulnerability Database. (2017, September 24). CVE-2014-7169 Detail. Retrieved April 3, 2018.
Internal MISP references
UUID c3aab918-51c6-4773-8677-a89b27a00eb1
which can be used as unique global reference for NVD CVE-2014-7169
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-04-03T00:00:00Z |
date_published | 2017-09-24T00:00:00Z |
source | MITRE |
title | CVE-2014-7169 Detail |
NVD CVE-2016-6662
National Vulnerability Database. (2017, February 2). CVE-2016-6662 Detail. Retrieved April 3, 2018.
Internal MISP references
UUID 1813c26d-da68-4a82-a959-27351dd5e51b
which can be used as unique global reference for NVD CVE-2016-6662
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-04-03T00:00:00Z |
date_published | 2017-02-02T00:00:00Z |
source | MITRE |
title | CVE-2016-6662 Detail |
NVD CVE-2017-0176
National Vulnerability Database. (2017, June 22). CVE-2017-0176 Detail. Retrieved April 3, 2018.
Internal MISP references
UUID 82602351-0ab0-48d7-90dd-f4536b4d009b
which can be used as unique global reference for NVD CVE-2017-0176
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-04-03T00:00:00Z |
date_published | 2017-06-22T00:00:00Z |
source | MITRE |
title | CVE-2017-0176 Detail |
FireEye Attacks Leveraging HTA
Berry, A., Galang, L., Jiang, G., Leathery, J., Mohandas, R. (2017, April 11). CVE-2017-0199: In the Wild Attacks Leveraging HTA Handler. Retrieved October 27, 2017.
Internal MISP references
UUID 1876a476-b2ff-4605-a78b-89443d21b063
which can be used as unique global reference for FireEye Attacks Leveraging HTA
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-10-27T00:00:00Z |
date_published | 2017-04-11T00:00:00Z |
source | MITRE |
title | CVE-2017-0199: In the Wild Attacks Leveraging HTA Handler |
Microsoft CVE-2017-8625 Aug 2017
Microsoft. (2017, August 8). CVE-2017-8625 - Internet Explorer Security Feature Bypass Vulnerability. Retrieved October 3, 2018.
Internal MISP references
UUID 402cb526-ef57-4d27-b96b-f98008abe716
which can be used as unique global reference for Microsoft CVE-2017-8625 Aug 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-10-03T00:00:00Z |
date_published | 2017-08-08T00:00:00Z |
source | MITRE |
title | CVE-2017-8625 - Internet Explorer Security Feature Bypass Vulnerability |
NVD CVE-2019-3610
National Vulnerability Database. (2019, October 9). CVE-2019-3610 Detail. Retrieved April 14, 2021.
Internal MISP references
UUID 889b742e-7572-4aad-8944-7f071483b613
which can be used as unique global reference for NVD CVE-2019-3610
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-04-14T00:00:00Z |
date_published | 2019-10-09T00:00:00Z |
source | MITRE |
title | CVE-2019-3610 Detail |
CVMServer Vuln
Mickey Jin. (2021, June 3). CVE-2021-30724: CVMServer Vulnerability in macOS and iOS. Retrieved October 12, 2021.
Internal MISP references
UUID 6f83da0c-d2ce-4923-ba32-c6886eb22587
which can be used as unique global reference for CVMServer Vuln
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-12T00:00:00Z |
date_published | 2021-06-03T00:00:00Z |
source | MITRE |
title | CVE-2021-30724: CVMServer Vulnerability in macOS and iOS |
Crowdstrike Kubernetes Container Escape
Manoj Ahuje. (2022, January 31). CVE-2022-0185: Kubernetes Container Escape Using Linux Kernel Exploit. Retrieved July 6, 2022.
Internal MISP references
UUID 84d5f015-9014-417c-b2a9-f650fe19d448
which can be used as unique global reference for Crowdstrike Kubernetes Container Escape
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-07-06T00:00:00Z |
date_published | 2022-01-31T00:00:00Z |
source | MITRE |
title | CVE-2022-0185: Kubernetes Container Escape Using Linux Kernel Exploit |
Trend Micro March 13 2024
Peter Girnus; Aliakbar Zahravi; Simon Zuckerbraun Read time. (2024, March 13). CVE-2024-21412 DarkGate Operators Exploit Microsoft Windows SmartScreen Bypass in Zero-Day Campaign. Retrieved March 14, 2024.
Internal MISP references
UUID 0574a0a7-694b-4858-b053-8f7911c8ce54
which can be used as unique global reference for Trend Micro March 13 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-14T00:00:00Z |
date_published | 2024-03-13T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | CVE-2024-21412 DarkGate Operators Exploit Microsoft Windows SmartScreen Bypass in Zero-Day Campaign |
CyberArk Labs Safe Mode 2016
Naim, D.. (2016, September 15). CyberArk Labs: From Safe Mode to Domain Compromise. Retrieved June 23, 2021.
Internal MISP references
UUID bd9c14dd-0e2a-447b-a245-f548734d2400
which can be used as unique global reference for CyberArk Labs Safe Mode 2016
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-06-23T00:00:00Z |
date_published | 2016-09-15T00:00:00Z |
source | MITRE |
title | CyberArk Labs: From Safe Mode to Domain Compromise |
PJ Cyber Army of Russia 2023
PJ04857920. (2023, November 30). Cyber Army of Russia — DDoS Tool. Retrieved April 30, 2024.
Internal MISP references
UUID 3e42ff96-fc7e-418e-8d8b-076a1a47981e
which can be used as unique global reference for PJ Cyber Army of Russia 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-04-30T00:00:00Z |
date_published | 2023-11-30T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Cyber Army of Russia — DDoS Tool |
Cyware Ngrok May 2019
Cyware. (2019, May 29). Cyber attackers leverage tunneling service to drop Lokibot onto victims’ systems. Retrieved September 15, 2020.
Internal MISP references
UUID 583a01b6-cb4e-41e7-aade-ac2fd19bda4e
which can be used as unique global reference for Cyware Ngrok May 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-09-15T00:00:00Z |
date_published | 2019-05-29T00:00:00Z |
source | MITRE |
title | Cyber attackers leverage tunneling service to drop Lokibot onto victims’ systems |
The Record RansomHub June 3 2024
Jonathan Greig. (2024, June 3). Cyberattack on telecom giant Frontier claimed by RansomHub. Retrieved June 7, 2024.
Internal MISP references
UUID 1e474240-bd12-4472-8e69-1631b0e4c102
which can be used as unique global reference for The Record RansomHub June 3 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-06-07T00:00:00Z |
date_published | 2024-06-03T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Cyberattack on telecom giant Frontier claimed by RansomHub |
Microsoft Phosphorus Oct 2020
Burt, T. (2020, October 28). Cyberattacks target international conference attendees. Retrieved March 8, 2021.
Internal MISP references
UUID 8986c21c-16a0-4a53-8e37-9935bbbfaa4b
which can be used as unique global reference for Microsoft Phosphorus Oct 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-03-08T00:00:00Z |
date_published | 2020-10-28T00:00:00Z |
source | MITRE |
title | Cyberattacks target international conference attendees |
Check Point Mid-Year Report 2022
Check Point Software. (2022, August 3). Cyber Attack Trends: Check Point's 2022 Mid-Year Report. Retrieved May 18, 2022.
Internal MISP references
UUID e929cd86-9903-481c-a841-ba387831cb77
which can be used as unique global reference for Check Point Mid-Year Report 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-05-18T00:00:00Z |
date_published | 2022-08-03T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Cyber Attack Trends: Check Point's 2022 Mid-Year Report |
Talos Seduploader Oct 2017
Mercer, W., et al. (2017, October 22). "Cyber Conflict" Decoy Document Used in Real Cyber Conflict. Retrieved November 2, 2018.
Internal MISP references
UUID 2db77619-72df-461f-84bf-2d1c3499a5c0
which can be used as unique global reference for Talos Seduploader Oct 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-11-02T00:00:00Z |
date_published | 2017-10-22T00:00:00Z |
source | MITRE |
title | "Cyber Conflict" Decoy Document Used in Real Cyber Conflict |
FBI-search
FBI. (2022, December 21). Cyber Criminals Impersonating Brands Using Search Engine Advertisement Services to Defraud Users. Retrieved February 21, 2023.
Internal MISP references
UUID deea5b42-bfab-50af-8d85-cc04fd317a82
which can be used as unique global reference for FBI-search
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-02-21T00:00:00Z |
date_published | 2022-12-21T00:00:00Z |
source | MITRE |
title | Cyber Criminals Impersonating Brands Using Search Engine Advertisement Services to Defraud Users |
Resecurity GXC Team January 3 2024
Resecurity. (2024, January 3). Cybercriminals Implemented Artificial Intelligence (AI) for Invoice Fraud. Retrieved September 9, 2024.
Internal MISP references
UUID 6d55aa2c-3f52-4bff-8003-f78b386a4952
which can be used as unique global reference for Resecurity GXC Team January 3 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-09T00:00:00Z |
date_published | 2024-01-03T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Cybercriminals Implemented Artificial Intelligence (AI) for Invoice Fraud |
Secureworks GOLD KINGSWOOD September 2018
CTU. (2018, September 27). Cybercriminals Increasingly Trying to Ensnare the Big Financial Fish. Retrieved September 20, 2021.
Internal MISP references
UUID cda529b2-e152-4ff0-a6b3-d0305b09fef9
which can be used as unique global reference for Secureworks GOLD KINGSWOOD September 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-20T00:00:00Z |
date_published | 2018-09-27T00:00:00Z |
source | MITRE |
title | Cybercriminals Increasingly Trying to Ensnare the Big Financial Fish |
Cybereason OSX Pirrit
Amit Serper. (2016). Cybereason Lab Analysis OSX.Pirrit. Retrieved December 10, 2021.
Internal MISP references
UUID ebdf09ed-6eec-450f-aaea-067504ec25ca
which can be used as unique global reference for Cybereason OSX Pirrit
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-12-10T00:00:00Z |
date_published | 2016-01-01T00:00:00Z |
source | MITRE |
title | Cybereason Lab Analysis OSX.Pirrit |
Cybereason Quantum Ransomware May 9 2022
Cybereason Nocturnus. (2022, May 9). Cybereason vs. Quantum Locker Ransomware. Retrieved June 28, 2024.
Internal MISP references
UUID 19027620-216a-4921-8d78-f56377778a12
which can be used as unique global reference for Cybereason Quantum Ransomware May 9 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-06-28T00:00:00Z |
date_published | 2022-05-09T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Cybereason vs. Quantum Locker Ransomware |
Zdnet Kimsuky Dec 2018
Cimpanu, C.. (2018, December 5). Cyber-espionage group uses Chrome extension to infect victims. Retrieved August 26, 2019.
Internal MISP references
UUID b17acdc3-0163-4c98-b5fb-a457a7e6b58d
which can be used as unique global reference for Zdnet Kimsuky Dec 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-08-26T00:00:00Z |
date_published | 2018-12-05T00:00:00Z |
source | MITRE |
title | Cyber-espionage group uses Chrome extension to infect victims |
FireEye APT32 May 2017
Carr, N.. (2017, May 14). Cyber Espionage is Alive and Well: APT32 and the Threat to Global Corporations. Retrieved June 18, 2017.
Internal MISP references
UUID b72d017b-a70f-4003-b3d9-90d79aca812d
which can be used as unique global reference for FireEye APT32 May 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-06-18T00:00:00Z |
date_published | 2017-05-14T00:00:00Z |
source | MITRE, Tidal Cyber |
title | Cyber Espionage is Alive and Well: APT32 and the Threat to Global Corporations |
Shadowserver Strategic Web Compromise
Adair, S., Moran, N. (2012, May 15). Cyber Espionage & Strategic Web Compromises – Trusted Websites Serving Dangerous Results. Retrieved March 13, 2018.
Internal MISP references
UUID cf531866-ac3c-4078-b847-5b4af7eb161f
which can be used as unique global reference for Shadowserver Strategic Web Compromise
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-03-13T00:00:00Z |
date_published | 2012-05-15T00:00:00Z |
source | MITRE |
title | Cyber Espionage & Strategic Web Compromises – Trusted Websites Serving Dangerous Results |
CyberKnow Tweet July 7 2022
Cyberknow20. (2022, July 7). CyberKnow Tweet July 7 2022. Retrieved October 10, 2023.
Internal MISP references
UUID a37564a4-ff83-4ce0-818e-80750172f302
which can be used as unique global reference for CyberKnow Tweet July 7 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-10-10T00:00:00Z |
date_published | 2022-07-07T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | CyberKnow Tweet July 7 2022 |
Cyber Safety Review Board: Lapsus
CISA. (2023, August). Cyber Safety Review Board: Lapsus. Retrieved January 5, 2024.
Internal MISP references
UUID 4b713738-d767-5243-b9af-4d7ac7b0b349
which can be used as unique global reference for Cyber Safety Review Board: Lapsus
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-01-05T00:00:00Z |
date_published | 2023-08-01T00:00:00Z |
source | MITRE |
title | Cyber Safety Review Board: Lapsus |
CISA Scattered Spider Advisory November 2023
CISA. (2023, November 16). Cybersecurity Advisory: Scattered Spider (AA23-320A). Retrieved March 18, 2024.
Internal MISP references
UUID deae8b2c-39dd-5252-b846-88e1cab099c2
which can be used as unique global reference for CISA Scattered Spider Advisory November 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-18T00:00:00Z |
date_published | 2023-11-16T00:00:00Z |
source | MITRE |
title | Cybersecurity Advisory: Scattered Spider (AA23-320A) |
NSA NCSC Turla OilRig
NSA/NCSC. (2019, October 21). Cybersecurity Advisory: Turla Group Exploits Iranian APT To Expand Coverage Of Victims. Retrieved October 16, 2020.
Internal MISP references
UUID 3e86a807-5188-4278-9a58-babd23b86410
which can be used as unique global reference for NSA NCSC Turla OilRig
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-16T00:00:00Z |
date_published | 2019-10-21T00:00:00Z |
source | MITRE |
title | Cybersecurity Advisory: Turla Group Exploits Iranian APT To Expand Coverage Of Victims |
OPM Leak
Cybersecurity Resource Center. (n.d.). CYBERSECURITY INCIDENTS. Retrieved September 16, 2024.
Internal MISP references
UUID b67ed4e9-ed44-460a-bd59-c978bdfda32f
which can be used as unique global reference for OPM Leak
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-16T00:00:00Z |
source | MITRE |
title | CYBERSECURITY INCIDENTS |
ExpressVPN PATH env Windows 2021
ExpressVPN Security Team. (2021, November 16). Cybersecurity lessons: A PATH vulnerability in Windows. Retrieved September 28, 2023.
Internal MISP references
UUID 26096485-1dd6-512a-a2a1-27dbbfb6fde0
which can be used as unique global reference for ExpressVPN PATH env Windows 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-28T00:00:00Z |
date_published | 2021-11-16T00:00:00Z |
source | MITRE |
title | Cybersecurity lessons: A PATH vulnerability in Windows |
SCILabs Malteiro 2021
SCILabs. (2021, December 23). Cyber Threat Profile Malteiro. Retrieved March 13, 2024.
Internal MISP references
UUID c6948dfc-b133-556b-a8ac-b3a4dba09c0e
which can be used as unique global reference for SCILabs Malteiro 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-13T00:00:00Z |
date_published | 2021-12-23T00:00:00Z |
source | MITRE |
title | Cyber Threat Profile Malteiro |
Cyber Threat Profile MALTEIRO – Sciblog
blog.scilabs.mx. (2021, December 23). Cyber Threat Profile MALTEIRO – Sciblog. Retrieved May 17, 2023.
Internal MISP references
UUID 1f46872c-6255-4ce0-a6c3-2bfa9e767765
which can be used as unique global reference for Cyber Threat Profile MALTEIRO – Sciblog
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-17T00:00:00Z |
date_published | 2021-12-23T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Cyber Threat Profile MALTEIRO – Sciblog |
DoublePulsar Cyber Toufan
Kevin Beaumont. (2023, December 28). Cyber Toufan goes Oprah mode with free Linux system wipes of over 100 organisations. Retrieved August 8, 2024.
Internal MISP references
UUID 2fc1f6de-e01c-4225-bd29-8d547bf91e9e
which can be used as unique global reference for DoublePulsar Cyber Toufan
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-08-08T00:00:00Z |
date_published | 2023-12-28T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Cyber Toufan goes Oprah mode with free Linux system wipes of over 100 organisations |
NCSC Cyclops Blink February 2022
NCSC. (2022, February 23). Cyclops Blink Malware Analysis Report. Retrieved March 3, 2022.
Internal MISP references
UUID 91ed6adf-f066-49e4-8ec7-1989bc6615a6
which can be used as unique global reference for NCSC Cyclops Blink February 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-03-03T00:00:00Z |
date_published | 2022-02-23T00:00:00Z |
source | MITRE |
title | Cyclops Blink Malware Analysis Report |
Trend Micro Cyclops Blink March 2022
Haquebord, F. et al. (2022, March 17). Cyclops Blink Sets Sights on Asus Routers. Retrieved March 17, 2022.
Internal MISP references
UUID 64e9a24f-f386-4774-9874-063e0ebfb8e1
which can be used as unique global reference for Trend Micro Cyclops Blink March 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-03-17T00:00:00Z |
date_published | 2022-03-17T00:00:00Z |
source | MITRE |
title | Cyclops Blink Sets Sights on Asus Routers |
Cynet Ragnar Apr 2020
Gold, B. (2020, April 27). Cynet Detection Report: Ragnar Locker Ransomware. Retrieved June 29, 2020.
Internal MISP references
UUID aeb637ea-0b83-42a0-8f68-9fdc59aa462a
which can be used as unique global reference for Cynet Ragnar Apr 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-06-29T00:00:00Z |
date_published | 2020-04-27T00:00:00Z |
source | MITRE |
title | Cynet Detection Report: Ragnar Locker Ransomware |
Microsoft DACL May 2018
Microsoft. (2018, May 30). DACLs and ACEs. Retrieved August 19, 2018.
Internal MISP references
UUID 32a250ca-a7eb-4d7f-af38-f3e6a09540e2
which can be used as unique global reference for Microsoft DACL May 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-08-19T00:00:00Z |
date_published | 2018-05-30T00:00:00Z |
source | MITRE |
title | DACLs and ACEs |
Apple Developer Doco Archive Launchd
Apple. (2016, September 13). Daemons and Services Programming Guide - Creating Launch Daemons and Agents. Retrieved February 24, 2021.
Internal MISP references
UUID 41311827-3d81-422a-9b07-ee8ddc2fc7f1
which can be used as unique global reference for Apple Developer Doco Archive Launchd
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-02-24T00:00:00Z |
date_published | 2016-09-13T00:00:00Z |
source | MITRE |
title | Daemons and Services Programming Guide - Creating Launch Daemons and Agents |
Kubernetes DaemonSet
Kubernetes. (n.d.). DaemonSet. Retrieved February 15, 2024.
Internal MISP references
UUID 4e4668bd-9bef-597e-ad41-8afe1974b7f6
which can be used as unique global reference for Kubernetes DaemonSet
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-02-15T00:00:00Z |
source | MITRE |
title | DaemonSet |
Symantec Daggerfly 2023
Threat Hunter Team. (2023, April 20). Daggerfly: APT Actor Targets Telecoms Company in Africa. Retrieved July 25, 2024.
Internal MISP references
UUID cb0a51f5-fe5b-5dd0-8f55-4e7536cb61a4
which can be used as unique global reference for Symantec Daggerfly 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-07-25T00:00:00Z |
date_published | 2023-04-20T00:00:00Z |
source | MITRE |
title | Daggerfly: APT Actor Targets Telecoms Company in Africa |
Symantec Daggerfly 2024
Threat Hunter Team. (2024, July 23). Daggerfly: Espionage Group Makes Major Update to Toolset. Retrieved July 25, 2024.
Internal MISP references
UUID 1dadd09e-e7b0-50a1-ba3d-413780dbeb80
which can be used as unique global reference for Symantec Daggerfly 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-07-25T00:00:00Z |
date_published | 2024-07-23T00:00:00Z |
source | MITRE |
title | Daggerfly: Espionage Group Makes Major Update to Toolset |
Picus Daixin Team October 24 2022
Huseyin Can Yuceel. (2022, October 24). Daixin Team Targets Healthcare Organizations with Ransomware Attacks. Retrieved December 1, 2023.
Internal MISP references
UUID eba3b1b9-d0a0-4c03-8c14-21f7bbcc8a02
which can be used as unique global reference for Picus Daixin Team October 24 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-01T00:00:00Z |
date_published | 2022-10-24T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Daixin Team Targets Healthcare Organizations with Ransomware Attacks |
Medium Eli Salem GuLoader April 2021
Salem, E. (2021, April 19). Dancing With Shellcodes: Cracking the latest version of Guloader. Retrieved July 7, 2021.
Internal MISP references
UUID 87c5e84a-b96d-489d-aa10-db95b78c5a93
which can be used as unique global reference for Medium Eli Salem GuLoader April 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-07-07T00:00:00Z |
date_published | 2021-04-19T00:00:00Z |
source | MITRE |
title | Dancing With Shellcodes: Cracking the latest version of Guloader |
Lookout Dark Caracal Jan 2018
Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018.
Internal MISP references
UUID c558f5db-a426-4041-b883-995ec56e7155
which can be used as unique global reference for Lookout Dark Caracal Jan 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-04-11T00:00:00Z |
date_published | 2018-01-18T00:00:00Z |
source | MITRE, Tidal Cyber |
title | Dark Caracal: Cyber-espionage at a Global Scale |
Dark Clouds_Usenix_Mulazzani_08_2011
Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, and Edgar Weippl. (2011, August). Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space. Retrieved July 14, 2022.
Internal MISP references
UUID ee5d2c9c-c704-4f35-baeb-055a35dd04b5
which can be used as unique global reference for Dark Clouds_Usenix_Mulazzani_08_2011
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-07-14T00:00:00Z |
date_published | 2011-08-01T00:00:00Z |
source | MITRE |
title | Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space |
TrendMicro DarkComet Sept 2014
TrendMicro. (2014, September 03). DARKCOMET. Retrieved November 6, 2018.
Internal MISP references
UUID fb365600-4961-43ed-8292-1c07cbc530ef
which can be used as unique global reference for TrendMicro DarkComet Sept 2014
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-11-06T00:00:00Z |
date_published | 2014-09-03T00:00:00Z |
source | MITRE |
title | DARKCOMET |
DarkGate Loader delivered via Teams - Truesec
Jakob Nordenlund. (2023, September 6). DarkGate Loader delivered via Teams - Truesec. Retrieved October 20, 2023.
Internal MISP references
UUID 4222a06f-9528-4076-8037-a27012c2930c
which can be used as unique global reference for DarkGate Loader delivered via Teams - Truesec
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-10-20T00:00:00Z |
date_published | 2023-09-06T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | DarkGate Loader delivered via Teams - Truesec |
Bleeping Computer DarkGate October 14 2023
Sergiu Gatlan. (2023, October 14). DarkGate malware spreads through compromised Skype accounts. Retrieved October 20, 2023.
Internal MISP references
UUID 313e5558-d8f9-4457-9004-810d9fa5340c
which can be used as unique global reference for Bleeping Computer DarkGate October 14 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-10-20T00:00:00Z |
date_published | 2023-10-14T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | DarkGate malware spreads through compromised Skype accounts |
Trend Micro DarkGate October 12 2023
Trent Bessell, Ryan Maglaque, Aira Marcelo, Jack Walsh, David Walsh. (2023, October 12). DarkGate Opens Organizations for Attack via Skype, Teams. Retrieved October 20, 2023.
Internal MISP references
UUID 81650f5b-628b-4e76-80d6-2c15cf70d37a
which can be used as unique global reference for Trend Micro DarkGate October 12 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-10-20T00:00:00Z |
date_published | 2023-10-12T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | DarkGate Opens Organizations for Attack via Skype, Teams |
DarkGate - Threat Breakdown Journey
0xToxin. (n.d.). DarkGate - Threat Breakdown Journey. Retrieved October 20, 2023.
Internal MISP references
UUID 8a1ac4b8-05f6-4be9-a866-e3026bc92c7f
which can be used as unique global reference for DarkGate - Threat Breakdown Journey
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-10-20T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | DarkGate - Threat Breakdown Journey |
Kaspersky Tomiris Sep 2021
Kwiatkoswki, I. and Delcher, P. (2021, September 29). DarkHalo After SolarWinds: the Tomiris connection. Retrieved December 27, 2021.
Internal MISP references
UUID a881a7e4-a1df-4ad2-b67f-ef03caddb721
which can be used as unique global reference for Kaspersky Tomiris Sep 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-12-27T00:00:00Z |
date_published | 2021-09-29T00:00:00Z |
source | MITRE |
title | DarkHalo After SolarWinds: the Tomiris connection |
Volexity SolarWinds
Cash, D. et al. (2020, December 14). Dark Halo Leverages SolarWinds Compromise to Breach Organizations. Retrieved December 29, 2020.
Internal MISP references
UUID 355cecf8-ef3e-4a6e-a652-3bf26fe46d88
which can be used as unique global reference for Volexity SolarWinds
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-12-29T00:00:00Z |
date_published | 2020-12-14T00:00:00Z |
source | MITRE |
title | Dark Halo Leverages SolarWinds Compromise to Breach Organizations |
Securelist Darkhotel Aug 2015
Kaspersky Lab's Global Research & Analysis Team. (2015, August 10). Darkhotel's attacks in 2015. Retrieved November 2, 2018.
Internal MISP references
UUID 5a45be49-f5f1-4d5b-b7da-0a2f38194ec1
which can be used as unique global reference for Securelist Darkhotel Aug 2015
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-11-02T00:00:00Z |
date_published | 2015-08-10T00:00:00Z |
source | MITRE, Tidal Cyber |
title | Darkhotel's attacks in 2015 |
Unit42 DarkHydrus Jan 2019
Lee, B., Falcone, R. (2019, January 18). DarkHydrus delivers new Trojan that can use Google Drive for C2 communications. Retrieved April 17, 2019.
Internal MISP references
UUID eb235504-d142-4c6d-9ffd-3c0b0dd23e80
which can be used as unique global reference for Unit42 DarkHydrus Jan 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-04-17T00:00:00Z |
date_published | 2019-01-18T00:00:00Z |
source | MITRE |
title | DarkHydrus delivers new Trojan that can use Google Drive for C2 communications |
Unit 42 Phishery Aug 2018
Falcone, R. (2018, August 07). DarkHydrus Uses Phishery to Harvest Credentials in the Middle East. Retrieved August 10, 2018.
Internal MISP references
UUID ab9d59c1-8ea5-4f9c-b733-b16223ffe84a
which can be used as unique global reference for Unit 42 Phishery Aug 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-08-10T00:00:00Z |
date_published | 2018-08-07T00:00:00Z |
source | MITRE |
title | DarkHydrus Uses Phishery to Harvest Credentials in the Middle East |
Darkside Ransomware Cybereason
Cybereason Nocturnus. (2021, April 1). Cybereason vs. Darkside Ransomware. Retrieved August 18, 2021.
Internal MISP references
UUID eded380e-33e9-4fdc-8e1f-b51d650b9731
which can be used as unique global reference for Darkside Ransomware Cybereason
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-08-18T00:00:00Z |
source | MITRE |
title | Darkside Ransomware |
DarkSide Ransomware Gang
Ramarcus Baylor. (2021, May 12). DarkSide Ransomware Gang: An Overview. Retrieved August 30, 2022.
Internal MISP references
UUID 5f8d49e8-22da-425f-b63b-a799b97ec2b5
which can be used as unique global reference for DarkSide Ransomware Gang
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-08-30T00:00:00Z |
date_published | 2021-05-12T00:00:00Z |
source | MITRE |
title | DarkSide Ransomware Gang: An Overview |
Secureworks DarkTortilla Aug 2022
Secureworks Counter Threat Unit Research Team. (2022, August 17). DarkTortilla Malware Analysis. Retrieved November 3, 2022.
Internal MISP references
UUID 4b48cc22-55ac-5b61-b183-9008f7db37fd
which can be used as unique global reference for Secureworks DarkTortilla Aug 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-11-03T00:00:00Z |
date_published | 2022-08-17T00:00:00Z |
source | MITRE |
title | DarkTortilla Malware Analysis |
Securelist DarkVishnya Dec 2018
Golovanov, S. (2018, December 6). DarkVishnya: Banks attacked through direct connection to local network. Retrieved May 15, 2020.
Internal MISP references
UUID da9ac5a7-c644-45fa-ab96-30ac6bfc9f81
which can be used as unique global reference for Securelist DarkVishnya Dec 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-05-15T00:00:00Z |
date_published | 2018-12-06T00:00:00Z |
source | MITRE, Tidal Cyber |
title | DarkVishnya: Banks attacked through direct connection to local network |
Prevailion DarkWatchman 2021
Smith, S., Stafford, M. (2021, December 14). DarkWatchman: A new evolution in fileless techniques. Retrieved January 10, 2022.
Internal MISP references
UUID 449e7b5c-7c62-4a63-a676-80026a597fc9
which can be used as unique global reference for Prevailion DarkWatchman 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-01-10T00:00:00Z |
date_published | 2021-12-14T00:00:00Z |
source | MITRE |
title | DarkWatchman: A new evolution in fileless techniques |
SOCRadar APT42 December 12 2022
SOCRadar Research. (2022, December 12). Dark Web Profile: APT42 – Iranian Cyber Espionage Group. Retrieved August 30, 2024.
Internal MISP references
UUID 6077faed-b162-4850-969a-2abedc842198
which can be used as unique global reference for SOCRadar APT42 December 12 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-08-30T00:00:00Z |
date_published | 2022-12-12T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Dark Web Profile: APT42 – Iranian Cyber Espionage Group |
SOCRadar Cyber Toufan Profile
SOCRadar. (2023, December 20). Dark Web Profile: Cyber Toufan Al-aqsa. Retrieved August 8, 2024.
Internal MISP references
UUID a9aa6361-8c4d-4456-bb3f-c64ca5260695
which can be used as unique global reference for SOCRadar Cyber Toufan Profile
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-08-08T00:00:00Z |
date_published | 2023-12-20T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Dark Web Profile: Cyber Toufan Al-aqsa |
SOCRadar INC Ransom January 2024
SOCRadar. (2024, January 24). Dark Web Profile: INC Ransom. Retrieved June 5, 2024.
Internal MISP references
UUID 6c78b422-7d46-58a4-a403-421db0531147
which can be used as unique global reference for SOCRadar INC Ransom January 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-06-05T00:00:00Z |
date_published | 2024-01-24T00:00:00Z |
source | MITRE |
title | Dark Web Profile: INC Ransom |
Moran 2014
Moran, N., Oppenheim, M., Engle, S., & Wartell, R.. (2014, September 3). Darwin’s Favorite APT Group [Blog]. Retrieved November 12, 2014.
Internal MISP references
UUID 15ef155b-7628-4b18-bc53-1d30be4eac5d
which can be used as unique global reference for Moran 2014
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2014-11-12T00:00:00Z |
date_published | 2014-09-03T00:00:00Z |
source | MITRE, Tidal Cyber |
title | Darwin’s Favorite APT Group [Blog] |
AWS Data Perimeters
AWS. (n.d.). Data perimeters on AWS. Retrieved October 16, 2024.
Internal MISP references
UUID de628ad0-9608-5af0-8c93-21a1d5cd4998
which can be used as unique global reference for AWS Data Perimeters
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-10-16T00:00:00Z |
source | MITRE |
title | Data perimeters on AWS |
DataSvcUtil.exe - LOLBAS Project
LOLBAS. (2020, December 1). DataSvcUtil.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 0c373780-3202-4036-8c83-f3d468155b35
which can be used as unique global reference for DataSvcUtil.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2020-12-01T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | DataSvcUtil.exe |
Operation Emmental
botconf eu. (2014, December 31). David Sancho - Finding Holes in Banking 2FA: Operation Emmental. Retrieved January 4, 2024.
Internal MISP references
UUID 36443369-4fa9-4802-8b21-68cc382b949f
which can be used as unique global reference for Operation Emmental
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-01-04T00:00:00Z |
date_published | 2014-12-31T00:00:00Z |
source | MITRE |
title | David Sancho - Finding Holes in Banking 2FA: Operation Emmental |
Hijacking VNC
Z3RO. (2019, March 10). Day 70: Hijacking VNC (Enum, Brute, Access and Crack). Retrieved September 20, 2021.
Internal MISP references
UUID 7a58938f-058b-4c84-aa95-9c37dcdda1fb
which can be used as unique global reference for Hijacking VNC
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-20T00:00:00Z |
date_published | 2019-03-10T00:00:00Z |
source | MITRE |
title | Day 70: Hijacking VNC (Enum, Brute, Access and Crack) |
DBatLoader Actively Distributing Malwares Targeting European Businesses
Zscaler. (2023, March 27). DBatLoader Actively Distributing Malwares Targeting European Businesses. Retrieved May 7, 2023.
Internal MISP references
UUID 42ee2e91-4dac-41ce-b2ec-fde21c258a28
which can be used as unique global reference for DBatLoader Actively Distributing Malwares Targeting European Businesses
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-07T00:00:00Z |
date_published | 2023-03-27T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | DBatLoader Actively Distributing Malwares Targeting European Businesses |
Microsoft COM ACL
Microsoft. (n.d.). DCOM Security Enhancements in Windows XP Service Pack 2 and Windows Server 2003 Service Pack 1. Retrieved November 22, 2017.
Internal MISP references
UUID 88769217-57f1-46d4-977c-2cb2969db437
which can be used as unique global reference for Microsoft COM ACL
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-11-22T00:00:00Z |
source | MITRE |
title | DCOM Security Enhancements in Windows XP Service Pack 2 and Windows Server 2003 Service Pack 1 |
DCShadow Blog
Delpy, B. & LE TOUX, V. (n.d.). DCShadow. Retrieved March 20, 2018.
Internal MISP references
UUID 37514816-b8b3-499f-842b-2d8cce9e140b
which can be used as unique global reference for DCShadow Blog
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-03-20T00:00:00Z |
source | MITRE |
title | DCShadow |
GitHub DCSYNCMonitor
Spencer S. (2018, February 22). DCSYNCMonitor. Retrieved March 30, 2018.
Internal MISP references
UUID be03c794-d9f3-4678-8198-257abf6dcdbd
which can be used as unique global reference for GitHub DCSYNCMonitor
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-03-30T00:00:00Z |
date_published | 2018-02-22T00:00:00Z |
source | MITRE |
title | DCSYNCMonitor |
DD Man
Kerrisk, M. (2020, February 2). DD(1) User Commands. Retrieved February 21, 2020.
Internal MISP references
UUID f64bee0d-e37d-45d5-9968-58e622e89bfe
which can be used as unique global reference for DD Man
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-02-21T00:00:00Z |
date_published | 2020-02-02T00:00:00Z |
source | MITRE |
title | DD(1) User Commands |
Arbor SSLDoS April 2012
ASERT Team, Netscout Arbor. (2012, April 24). DDoS Attacks on SSL: Something Old, Something New. Retrieved April 22, 2019.
Internal MISP references
UUID b5de4376-0deb-45de-83a0-09df98480464
which can be used as unique global reference for Arbor SSLDoS April 2012
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-04-22T00:00:00Z |
date_published | 2012-04-24T00:00:00Z |
source | MITRE |
title | DDoS Attacks on SSL: Something Old, Something New |
CERT-EU DDoS March 2017
Meintanis, S., Revuelto, V., Socha, K.. (2017, March 10). DDoS Overview and Response Guide. Retrieved April 24, 2019.
Internal MISP references
UUID 64341348-f448-4e56-bf78-442b92e6d435
which can be used as unique global reference for CERT-EU DDoS March 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-04-24T00:00:00Z |
date_published | 2017-03-10T00:00:00Z |
source | MITRE |
title | DDoS Overview and Response Guide |
Unit42 Sofacy Dec 2018
Lee, B., Falcone, R. (2018, December 12). Dear Joohn: The Sofacy Group’s Global Campaign. Retrieved April 19, 2019.
Internal MISP references
UUID 540c4c33-d4c2-4324-94cd-f57646666e32
which can be used as unique global reference for Unit42 Sofacy Dec 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-04-19T00:00:00Z |
date_published | 2018-12-12T00:00:00Z |
source | MITRE |
title | Dear Joohn: The Sofacy Group’s Global Campaign |
Death by 1000 installers; it's all broken!
Patrick Wardle. (2017). Death by 1000 installers; it's all broken!. Retrieved August 8, 2019.
Internal MISP references
UUID 2ae99e9b-cd00-4e60-ba9e-bcc50e709e88
which can be used as unique global reference for Death by 1000 installers; it's all broken!
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-08-08T00:00:00Z |
date_published | 2017-01-01T00:00:00Z |
source | MITRE |
title | Death by 1000 installers; it's all broken! |
SpecterOps Lateral Movement from Azure to On-Prem AD 2020
Andy Robbins. (2020, August 17). Death from Above: Lateral Movement from Azure to On-Prem AD. Retrieved March 13, 2023.
Internal MISP references
UUID eb97d3d6-21cb-5f27-9a78-1e8576acecdc
which can be used as unique global reference for SpecterOps Lateral Movement from Azure to On-Prem AD 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-13T00:00:00Z |
date_published | 2020-08-17T00:00:00Z |
source | MITRE |
title | Death from Above: Lateral Movement from Azure to On-Prem AD |
Microsoft PowerShell SilentlyContinue
Microsoft. (2023, March 2). $DebugPreference. Retrieved August 30, 2023.
Internal MISP references
UUID ece52a64-1c8d-547d-aedc-ff43d7418cd2
which can be used as unique global reference for Microsoft PowerShell SilentlyContinue
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-08-30T00:00:00Z |
date_published | 2023-03-02T00:00:00Z |
source | MITRE |
title | $DebugPreference |
virtualization.info 2006
virtualization.info. (Interviewer) & Liguori, A. (Interviewee). (2006, August 11). Debunking Blue Pill myth [Interview transcript]. Retrieved November 13, 2014.
Internal MISP references
UUID 8ff8fb53-e468-4df7-b7e3-b344be1507ae
which can be used as unique global reference for virtualization.info 2006
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2014-11-13T00:00:00Z |
date_published | 2006-08-11T00:00:00Z |
source | MITRE |
title | Debunking Blue Pill myth [Interview transcript] |
TrendMicro Confucius APT Feb 2018
Lunghi, D and Horejsi, J. (2018, February 13). Deciphering Confucius: A Look at the Group's Cyberespionage Operations. Retrieved December 26, 2021.
Internal MISP references
UUID d1d5a708-75cb-4d41-b2a3-d035a14ac956
which can be used as unique global reference for TrendMicro Confucius APT Feb 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-12-26T00:00:00Z |
date_published | 2018-02-13T00:00:00Z |
source | MITRE, Tidal Cyber |
title | Deciphering Confucius: A Look at the Group's Cyberespionage Operations |
Ciberseguridad Decoding malicious RTF files
Pedrero, R.. (2021, July). Decoding malicious RTF files. Retrieved November 16, 2021.
Internal MISP references
UUID 82d2451b-300f-4891-b1e7-ade53dff1126
which can be used as unique global reference for Ciberseguridad Decoding malicious RTF files
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-11-16T00:00:00Z |
date_published | 2021-07-01T00:00:00Z |
source | MITRE |
title | Decoding malicious RTF files |
Nccgroup Gh0st April 2018
Pantazopoulos, N. (2018, April 17). Decoding network data from a Gh0st RAT variant. Retrieved November 2, 2018.
Internal MISP references
UUID 4476aa0a-b1ef-4ac6-9e44-5721a0b3e92b
which can be used as unique global reference for Nccgroup Gh0st April 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-11-02T00:00:00Z |
date_published | 2018-04-17T00:00:00Z |
source | MITRE |
title | Decoding network data from a Gh0st RAT variant |
Morphisec September 3 2024
Michael Gorelik. (2024, September 3). Decoding the Puzzle Cicada3301 Ransomware Threat Analysis. Retrieved September 5, 2024.
Internal MISP references
UUID 90549699-8815-45e8-820c-4f5a7fc584b8
which can be used as unique global reference for Morphisec September 3 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-05T00:00:00Z |
date_published | 2024-09-03T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Decoding the Puzzle Cicada3301 Ransomware Threat Analysis |
MalwareBytes Template Injection OCT 2017
Segura, J. (2017, October 13). Decoy Microsoft Word document delivers malware through a RAT. Retrieved July 21, 2018.
Internal MISP references
UUID 7ef0ab1f-c7d6-46fe-b489-fab4db623e0a
which can be used as unique global reference for MalwareBytes Template Injection OCT 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-07-21T00:00:00Z |
date_published | 2017-10-13T00:00:00Z |
source | MITRE |
title | Decoy Microsoft Word document delivers malware through a RAT |
Crowdstrike PartyTicket March 2022
Crowdstrike. (2022, March 1). Decryptable PartyTicket Ransomware Reportedly Targeting Ukrainian Entities. Retrieved March 1, 2022.
Internal MISP references
UUID 8659fea7-7d65-4ee9-8ceb-cf41204b57e0
which can be used as unique global reference for Crowdstrike PartyTicket March 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-03-01T00:00:00Z |
date_published | 2022-03-01T00:00:00Z |
source | MITRE |
title | Decryptable PartyTicket Ransomware Reportedly Targeting Ukrainian Entities |
Fortinet Emotet May 2017
Xiaopeng Zhang. (2017, May 3). Deep Analysis of New Emotet Variant – Part 1. Retrieved April 1, 2019.
Internal MISP references
UUID 2b8b6ab4-906f-4732-94f8-eaac5ec0151d
which can be used as unique global reference for Fortinet Emotet May 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-04-01T00:00:00Z |
date_published | 2017-05-03T00:00:00Z |
source | MITRE |
title | Deep Analysis of New Emotet Variant – Part 1 |
Aqua TeamTNT August 2020
Kol, Roi. Morag, A. (2020, August 25). Deep Analysis of TeamTNT Techniques Using Container Images to Attack. Retrieved September 22, 2021.
Internal MISP references
UUID ca10ad0d-1a47-4006-8f76-c2246aee7752
which can be used as unique global reference for Aqua TeamTNT August 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-22T00:00:00Z |
date_published | 2020-08-25T00:00:00Z |
source | MITRE |
title | Deep Analysis of TeamTNT Techniques Using Container Images to Attack |
Bitdefender FIN8 July 2021
Martin Zugec. (2021, July 27). Deep Dive Into a FIN8 Attack - A Forensic Investigation. Retrieved September 1, 2021.
Internal MISP references
UUID aee3179e-1536-40ab-9965-1c10bdaa6dff
which can be used as unique global reference for Bitdefender FIN8 July 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-01T00:00:00Z |
date_published | 2021-07-27T00:00:00Z |
source | MITRE |
title | Deep Dive Into a FIN8 Attack - A Forensic Investigation |
Cyble Ragnar Locker January 20 2022
Cybleinc. (2022, January 20). Deep dive into Ragnar_locker Ransomware Gang. Retrieved September 29, 2023.
Internal MISP references
UUID 390b3063-8d7b-4dee-b5f7-bfd0804f2e30
which can be used as unique global reference for Cyble Ragnar Locker January 20 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-29T00:00:00Z |
date_published | 2022-01-20T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Deep dive into Ragnar_locker Ransomware Gang |
Sophos Pikabot June 12 2023
Karl Ackerman. (2023, June 12). Deep dive into the Pikabot cyber threat. Retrieved January 11, 2024.
Internal MISP references
UUID f10c37d8-2efe-4d9e-8987-8978beef7e9d
which can be used as unique global reference for Sophos Pikabot June 12 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-01-11T00:00:00Z |
date_published | 2023-06-12T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Deep dive into the Pikabot cyber threat |
Microsoft Deep Dive Solorigate January 2021
MSTIC, CDOC, 365 Defender Research Team. (2021, January 20). Deep dive into the Solorigate second-stage activation: From SUNBURST to TEARDROP and Raindrop . Retrieved January 22, 2021.
Internal MISP references
UUID ddd70eef-ab94-45a9-af43-c396c9e3fbc6
which can be used as unique global reference for Microsoft Deep Dive Solorigate January 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-01-22T00:00:00Z |
date_published | 2021-01-20T00:00:00Z |
source | MITRE |
title | Deep dive into the Solorigate second-stage activation: From SUNBURST to TEARDROP and Raindrop |
AADInternals - Device Registration
Dr. Nestori Syynimaa. (2021, March 3). Deep-dive to Azure AD device join. Retrieved March 9, 2022.
Internal MISP references
UUID 978b408d-f9e9-422c-b2d7-741f6cc298d4
which can be used as unique global reference for AADInternals - Device Registration
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-03-09T00:00:00Z |
date_published | 2021-03-03T00:00:00Z |
source | MITRE |
title | Deep-dive to Azure AD device join |
Alperovitch 2014
Alperovitch, D. (2014, July 7). Deep in Thought: Chinese Targeting of National Security Think Tanks. Retrieved November 12, 2014.
Internal MISP references
UUID 72e19be9-35dd-4199-bc07-bd9d0c664df6
which can be used as unique global reference for Alperovitch 2014
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2014-11-12T00:00:00Z |
date_published | 2014-07-07T00:00:00Z |
source | MITRE, Tidal Cyber |
title | Deep in Thought: Chinese Targeting of National Security Think Tanks |
DefaultPack.EXE - LOLBAS Project
LOLBAS. (2020, October 1). DefaultPack.EXE. Retrieved December 4, 2023.
Internal MISP references
UUID 106efc3e-5816-44ae-a384-5e026e68ab89
which can be used as unique global reference for DefaultPack.EXE - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2020-10-01T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | DefaultPack.EXE |
Lastline DarkHotel Just In Time Decryption Nov 2015
Arunpreet Singh, Clemens Kolbitsch. (2015, November 5). Defeating Darkhotel Just-In-Time Decryption. Retrieved April 15, 2021.
Internal MISP references
UUID e43341ae-178f-43ba-9d66-f4d0380d2c59
which can be used as unique global reference for Lastline DarkHotel Just In Time Decryption Nov 2015
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-04-15T00:00:00Z |
date_published | 2015-11-05T00:00:00Z |
source | MITRE |
title | Defeating Darkhotel Just-In-Time Decryption |
piazza launch agent mitigation
Antonio Piazza (4n7m4n). (2021, November 23). Defeating Malicious Launch Persistence. Retrieved April 19, 2022.
Internal MISP references
UUID 8a3591f2-34b0-4914-bb42-d4621966faed
which can be used as unique global reference for piazza launch agent mitigation
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-04-19T00:00:00Z |
date_published | 2021-11-23T00:00:00Z |
source | MITRE |
title | Defeating Malicious Launch Persistence |
Inversecos Timestomping 2022
Lina Lau. (2022, April 28). Defence Evasion Technique: Timestomping Detection – NTFS Forensics. Retrieved September 30, 2024.
Internal MISP references
UUID 48bc7943-0384-5b6e-a0c5-854b6a08203f
which can be used as unique global reference for Inversecos Timestomping 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-30T00:00:00Z |
date_published | 2022-04-28T00:00:00Z |
source | MITRE |
title | Defence Evasion Technique: Timestomping Detection – NTFS Forensics |
VectorSec ForFiles Aug 2017
vector_sec. (2017, August 11). Defenders watching launches of cmd? What about forfiles?. Retrieved September 12, 2024.
Internal MISP references
UUID 8088d15d-9512-4d12-a99a-c76ad9dc3390
which can be used as unique global reference for VectorSec ForFiles Aug 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-12T00:00:00Z |
date_published | 2017-08-11T00:00:00Z |
source | MITRE |
title | Defenders watching launches of cmd? What about forfiles? |
Black Hat 2015 App Shim
Pierce, Sean. (2015, November). Defending Against Malicious Application Compatibility Shims. Retrieved June 22, 2017.
Internal MISP references
UUID 19e3cddb-b077-40cf-92e0-131b12efa4f7
which can be used as unique global reference for Black Hat 2015 App Shim
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-06-22T00:00:00Z |
date_published | 2015-11-01T00:00:00Z |
source | MITRE |
title | Defending Against Malicious Application Compatibility Shims |
TechNet O365 Outlook Rules
Koeller, B.. (2018, February 21). Defending Against Rules and Forms Injection. Retrieved November 5, 2019.
Internal MISP references
UUID c7f9bd2f-254a-4254-8a92-a3ab02455fcb
which can be used as unique global reference for TechNet O365 Outlook Rules
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-11-05T00:00:00Z |
date_published | 2018-02-21T00:00:00Z |
source | MITRE |
title | Defending Against Rules and Forms Injection |
Defending Against Scheduled Task Attacks in Windows Environments
Harshal Tupsamudre. (2022, June 20). Defending Against Scheduled Tasks. Retrieved July 5, 2022.
Internal MISP references
UUID 111d21df-5531-4927-a173-fac9cd7672b3
which can be used as unique global reference for Defending Against Scheduled Task Attacks in Windows Environments
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-07-05T00:00:00Z |
date_published | 2022-06-20T00:00:00Z |
source | MITRE |
title | Defending Against Scheduled Tasks |
Rapid7 HAFNIUM Mar 2021
Eoin Miller. (2021, March 23). Defending Against the Zero Day: Analyzing Attacker Behavior Post-Exploitation of Microsoft Exchange. Retrieved October 27, 2022.
Internal MISP references
UUID cf05d229-c2ba-54f2-a79d-4b7c9185c663
which can be used as unique global reference for Rapid7 HAFNIUM Mar 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-10-27T00:00:00Z |
date_published | 2021-03-23T00:00:00Z |
source | MITRE |
title | Defending Against the Zero Day: Analyzing Attacker Behavior Post-Exploitation of Microsoft Exchange |
Microsoft SQL Server
Microsoft Threat Intelligence. (2023, October 3). Defending new vectors: Threat actors attempt SQL Server to cloud lateral movement. Retrieved October 3, 2023.
Internal MISP references
UUID a904fde8-b8f9-5411-ab46-0dacf39cc81f
which can be used as unique global reference for Microsoft SQL Server
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-10-03T00:00:00Z |
date_published | 2023-10-03T00:00:00Z |
source | MITRE |
title | Defending new vectors: Threat actors attempt SQL Server to cloud lateral movement |
rundll32.exe defense evasion
Ariel silver. (2022, February 1). Defense Evasion Techniques. Retrieved April 8, 2022.
Internal MISP references
UUID 0f31f0ff-9ddb-4ea9-88d0-7b3b688764af
which can be used as unique global reference for rundll32.exe defense evasion
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-04-08T00:00:00Z |
date_published | 2022-02-01T00:00:00Z |
source | MITRE |
title | Defense Evasion Techniques |
def_ev_win_event_logging
Chandel, R. (2021, April 22). Defense Evasion: Windows Event Logging (T1562.002). Retrieved September 14, 2021.
Internal MISP references
UUID 166e3a8a-047a-4798-b6cb-5aa36903a764
which can be used as unique global reference for def_ev_win_event_logging
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-14T00:00:00Z |
date_published | 2021-04-22T00:00:00Z |
source | MITRE |
title | Defense Evasion: Windows Event Logging (T1562.002) |
Kaspersky DeftTorero October 3 2022
Global Research & Analysis Team. (2022, October 3). DeftTorero: tactics, techniques and procedures of intrusions revealed. Retrieved October 25, 2023.
Internal MISP references
UUID f6b43988-4d8b-455f-865e-3150e43d4f11
which can be used as unique global reference for Kaspersky DeftTorero October 3 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-10-25T00:00:00Z |
date_published | 2022-10-03T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | DeftTorero: tactics, techniques and procedures of intrusions revealed |
TechNet Del
Microsoft. (n.d.). Del. Retrieved April 22, 2016.
Internal MISP references
UUID 01fc44b9-0eb3-4fd2-b755-d611825374ae
which can be used as unique global reference for TechNet Del
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-04-22T00:00:00Z |
source | MITRE |
title | Del |
Hunters Domain Wide Delegation Google Workspace 2023
Yonatan Khanashvilli. (2023, November 28). DeleFriend: Severe design flaw in Domain Wide Delegation could leave Google Workspace vulnerable for takeover. Retrieved January 16, 2024.
Internal MISP references
UUID 290cebe1-a2fd-5ccd-8ef6-afa9d4c3c9df
which can be used as unique global reference for Hunters Domain Wide Delegation Google Workspace 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-01-16T00:00:00Z |
date_published | 2023-11-28T00:00:00Z |
source | MITRE |
title | DeleFriend: Severe design flaw in Domain Wide Delegation could leave Google Workspace vulnerable for takeover |
Azure Shared Access Signature
Delegate access with a shared access signature. (2019, December 18). Delegate access with a shared access signature. Retrieved March 2, 2022.
Internal MISP references
UUID f6ffe1ef-13f3-4225-b714-cfb89aaaf3fa
which can be used as unique global reference for Azure Shared Access Signature
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-03-02T00:00:00Z |
date_published | 2019-12-18T00:00:00Z |
source | MITRE |
title | Delegate access with a shared access signature |
Register Deloitte
Thomson, I. (2017, September 26). Deloitte is a sitting duck: Key systems with RDP open, VPN and proxy 'login details leaked'. Retrieved October 19, 2020.
Internal MISP references
UUID e6b10687-8666-4c9c-ac77-1988378e096d
which can be used as unique global reference for Register Deloitte
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-19T00:00:00Z |
date_published | 2017-09-26T00:00:00Z |
source | MITRE |
title | Deloitte is a sitting duck: Key systems with RDP open, VPN and proxy 'login details leaked' |
Talos Micropsia June 2017
Rascagneres, P., Mercer, W. (2017, June 19). Delphi Used To Score Against Palestine. Retrieved November 13, 2018.
Internal MISP references
UUID c727152c-079a-4ff9-a0e5-face919cf59b
which can be used as unique global reference for Talos Micropsia June 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-11-13T00:00:00Z |
date_published | 2017-06-19T00:00:00Z |
source | MITRE |
title | Delphi Used To Score Against Palestine |
TrendMicro EarthLusca 2022
Chen, J., et al. (2022). Delving Deep: An Analysis of Earth Lusca’s Operations. Retrieved July 1, 2022.
Internal MISP references
UUID f6e1bffd-e35b-4eae-b9bf-c16a82bf7004
which can be used as unique global reference for TrendMicro EarthLusca 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-07-01T00:00:00Z |
date_published | 2022-01-01T00:00:00Z |
source | MITRE |
title | Delving Deep: An Analysis of Earth Lusca’s Operations |
Demiguise Guardrail Router Logo
Warren, R. (2017, August 2). Demiguise: virginkey.js. Retrieved January 17, 2019.
Internal MISP references
UUID 2e55d33a-fe75-4397-b6f0-a28d397b4c24
which can be used as unique global reference for Demiguise Guardrail Router Logo
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-01-17T00:00:00Z |
date_published | 2017-08-02T00:00:00Z |
source | MITRE |
title | Demiguise: virginkey.js |
FireEye Hacking Team
FireEye Threat Intelligence. (2015, July 13). Demonstrating Hustle, Chinese APT Groups Quickly Use Zero-Day Vulnerability (CVE-2015-5119) Following Hacking Team Leak. Retrieved January 25, 2016.
Internal MISP references
UUID c1e798b8-6771-4ba7-af25-69c640321e40
which can be used as unique global reference for FireEye Hacking Team
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-01-25T00:00:00Z |
date_published | 2015-07-13T00:00:00Z |
source | MITRE |
title | Demonstrating Hustle, Chinese APT Groups Quickly Use Zero-Day Vulnerability (CVE-2015-5119) Following Hacking Team Leak |
Demystifying Azure AD Service Principals
Bellavance, Ned. (2019, July 16). Demystifying Azure AD Service Principals. Retrieved January 19, 2020.
Internal MISP references
UUID 3e285884-2191-4773-9243-74100ce177c8
which can be used as unique global reference for Demystifying Azure AD Service Principals
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-01-19T00:00:00Z |
date_published | 2019-07-16T00:00:00Z |
source | MITRE |
title | Demystifying Azure AD Service Principals |
demystifying_ryuk
Tran, T. (2020, November 24). Demystifying Ransomware Attacks Against Microsoft Defender Solution. Retrieved January 26, 2022.
Internal MISP references
UUID 3dc684c7-14de-4dc0-9f11-79160c4f5038
which can be used as unique global reference for demystifying_ryuk
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-01-26T00:00:00Z |
date_published | 2020-11-24T00:00:00Z |
source | MITRE |
title | Demystifying Ransomware Attacks Against Microsoft Defender Solution |
DOJ Iran Indictments September 2020
DOJ. (2020, September 17). Department of Justice and Partner Departments and Agencies Conduct Coordinated Actions to Disrupt and Deter Iranian Malicious Cyber Activities Targeting the United States and the Broader International Community. Retrieved December 10, 2020.
Internal MISP references
UUID f30a77dd-d1d0-41b8-b82a-461dd6cd126f
which can be used as unique global reference for DOJ Iran Indictments September 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-12-10T00:00:00Z |
date_published | 2020-09-17T00:00:00Z |
source | MITRE |
title | Department of Justice and Partner Departments and Agencies Conduct Coordinated Actions to Disrupt and Deter Iranian Malicious Cyber Activities Targeting the United States and the Broader International Community |
Microsoft GitHub Device Guard CI Policies
Microsoft. (2017, June 16). Deploy code integrity policies: steps. Retrieved June 28, 2017.
Internal MISP references
UUID 9646af1a-19fe-44c9-96ca-3c8ec097c3db
which can be used as unique global reference for Microsoft GitHub Device Guard CI Policies
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-06-28T00:00:00Z |
date_published | 2017-06-16T00:00:00Z |
source | MITRE |
title | Deploy code integrity policies: steps |
Microsoft Deploying AD Federation
Microsoft. (n.d.). Deploying Active Directory Federation Services in Azure. Retrieved March 13, 2020.
Internal MISP references
UUID beeb460e-4dba-42fb-8109-0861cd0df562
which can be used as unique global reference for Microsoft Deploying AD Federation
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-03-13T00:00:00Z |
source | MITRE |
title | Deploying Active Directory Federation Services in Azure |
Apple Kernel Extension Deprecation
Apple. (n.d.). Deprecated Kernel Extensions and System Extension Alternatives. Retrieved November 4, 2020.
Internal MISP references
UUID 86053c5a-f2dd-4eb3-9dc2-6a6a4e1c2ae5
which can be used as unique global reference for Apple Kernel Extension Deprecation
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-11-04T00:00:00Z |
source | MITRE |
title | Deprecated Kernel Extensions and System Extension Alternatives |
Black Lotus Raptor Train September 18 2024
Black Lotus Labs. (2024, September 18). Derailing the Raptor Train. Retrieved September 19, 2024.
Internal MISP references
UUID 21e26577-887b-4b8c-a3f8-4ab8868bed69
which can be used as unique global reference for Black Lotus Raptor Train September 18 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-19T00:00:00Z |
date_published | 2024-09-18T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Derailing the Raptor Train |
Amazon Describe Instance
Amazon. (n.d.). describe-instance-information. Retrieved March 3, 2020.
Internal MISP references
UUID c0b6a8a4-0d94-414d-b5ab-cf5485240dee
which can be used as unique global reference for Amazon Describe Instance
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-03-03T00:00:00Z |
source | MITRE |
title | describe-instance-information |
Amazon Describe Instances API
Amazon. (n.d.). DescribeInstances. Retrieved May 26, 2020.
Internal MISP references
UUID 95629746-43d2-4f41-87da-4bd44a43ef4a
which can be used as unique global reference for Amazon Describe Instances API
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-05-26T00:00:00Z |
source | MITRE |
title | DescribeInstances |
DescribeSecurityGroups - Amazon Elastic Compute Cloud
Amazon Web Services, Inc. . (2022). DescribeSecurityGroups. Retrieved January 28, 2022.
Internal MISP references
UUID aa953df5-40b5-42d2-9e33-a227a093497f
which can be used as unique global reference for DescribeSecurityGroups - Amazon Elastic Compute Cloud
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-01-28T00:00:00Z |
date_published | 2022-01-01T00:00:00Z |
source | MITRE |
title | DescribeSecurityGroups |
Microsoft RunOnceEx APR 2018
Microsoft. (2018, August 20). Description of the RunOnceEx Registry Key. Retrieved June 29, 2018.
Internal MISP references
UUID f80bb86f-ce75-4778-bdee-777cf37a6de7
which can be used as unique global reference for Microsoft RunOnceEx APR 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-06-29T00:00:00Z |
date_published | 2018-08-20T00:00:00Z |
source | MITRE |
title | Description of the RunOnceEx Registry Key |
Designing Daemons Apple Dev
Apple. (n.d.). Retrieved October 12, 2021.
Internal MISP references
UUID 4baac228-1f6a-4c65-ae98-5a542600dfc6
which can be used as unique global reference for Designing Daemons Apple Dev
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-12T00:00:00Z |
source | MITRE |
title | Designing Daemons Apple Dev |
Desk.cpl - LOLBAS Project
LOLBAS. (2022, April 21). Desk.cpl. Retrieved December 4, 2023.
Internal MISP references
UUID 487a54d9-9f90-478e-b305-bd041af55e12
which can be used as unique global reference for Desk.cpl - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2022-04-21T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Desk.cpl |
Free Desktop Application Autostart Feb 2006
Free Desktop. (2006, February 13). Desktop Application Autostart Specification. Retrieved September 12, 2019.
Internal MISP references
UUID 0885434e-3908-4425-9597-ce6abe531ca5
which can be used as unique global reference for Free Desktop Application Autostart Feb 2006
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-09-12T00:00:00Z |
date_published | 2006-02-13T00:00:00Z |
source | MITRE |
title | Desktop Application Autostart Specification |
Desktopimgdownldr.exe - LOLBAS Project
LOLBAS. (2020, June 28). Desktopimgdownldr.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 1df3aacf-76c4-472a-92c8-2a85ae9e2860
which can be used as unique global reference for Desktopimgdownldr.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2020-06-28T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Desktopimgdownldr.exe |
CISA AA22-057A Destructive Malware February 2022
CISA. (2022, February 26). Destructive Malware Targeting Organizations in Ukraine. Retrieved March 25, 2022.
Internal MISP references
UUID 18684085-c156-4610-8b1f-cc9646f2c06e
which can be used as unique global reference for CISA AA22-057A Destructive Malware February 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-03-25T00:00:00Z |
date_published | 2022-02-26T00:00:00Z |
source | MITRE |
title | Destructive Malware Targeting Organizations in Ukraine |
Microsoft WhisperGate January 2022
MSTIC. (2022, January 15). Destructive malware targeting Ukrainian organizations. Retrieved March 10, 2022.
Internal MISP references
UUID e0c1fcd3-b7a8-42af-8984-873a6f969975
which can be used as unique global reference for Microsoft WhisperGate January 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-03-10T00:00:00Z |
date_published | 2022-01-15T00:00:00Z |
source | MITRE |
title | Destructive malware targeting Ukrainian organizations |
S2W DarkGate January 16 2024
S2W. (2024, January 16). Detailed Analysis of DarkGate. Retrieved July 12, 2024.
Internal MISP references
UUID 62d6a280-06df-4b96-85c8-13174e496256
which can be used as unique global reference for S2W DarkGate January 16 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-07-12T00:00:00Z |
date_published | 2024-01-16T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Detailed Analysis of DarkGate |
URI Unique
Australian Cyber Security Centre. National Security Agency. (2020, April 21). Detect and Prevent Web Shell Malware. Retrieved February 9, 2024.
Internal MISP references
UUID b91963c4-07ea-5e36-9cc8-8a2149ee7473
which can be used as unique global reference for URI Unique
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-02-09T00:00:00Z |
date_published | 2020-04-21T00:00:00Z |
source | MITRE |
title | Detect and Prevent Web Shell Malware |
NSA and ASD Detect and Prevent Web Shells 2020
NSA and ASD. (2020, April 3). Detect and Prevent Web Shell Malware. Retrieved July 23, 2021.
Internal MISP references
UUID e9a882a5-1a88-4fdf-9349-205f4fa167c9
which can be used as unique global reference for NSA and ASD Detect and Prevent Web Shells 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-07-23T00:00:00Z |
date_published | 2020-04-03T00:00:00Z |
source | MITRE |
title | Detect and Prevent Web Shell Malware |
Microsoft Detect Outlook Forms
Fox, C., Vangel, D. (2018, April 22). Detect and Remediate Outlook Rules and Custom Forms Injections Attacks in Office 365. Retrieved February 4, 2019.
Internal MISP references
UUID fd63775c-8482-477d-ab41-8c64ca17b602
which can be used as unique global reference for Microsoft Detect Outlook Forms
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-02-04T00:00:00Z |
date_published | 2018-04-22T00:00:00Z |
source | MITRE |
title | Detect and Remediate Outlook Rules and Custom Forms Injections Attacks in Office 365 |
ADDSecurity DCShadow Feb 2018
Lucand,G. (2018, February 18). Detect DCShadow, impossible?. Retrieved March 30, 2018.
Internal MISP references
UUID c1cd4767-b5a1-4821-8574-b5782a83920f
which can be used as unique global reference for ADDSecurity DCShadow Feb 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-03-30T00:00:00Z |
date_published | 2018-02-18T00:00:00Z |
source | MITRE |
title | Detect DCShadow, impossible? |
Lacework LLMJacking 2024
Lacework Labs. (2024, June 6). Detecting AI resource-hijacking with Composite Alerts. Retrieved September 25, 2024.
Internal MISP references
UUID 4742569e-80ed-5d70-948b-9457d9371ca8
which can be used as unique global reference for Lacework LLMJacking 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-25T00:00:00Z |
date_published | 2024-06-06T00:00:00Z |
source | MITRE |
title | Detecting AI resource-hijacking with Composite Alerts |
Pace University Detecting DGA May 2017
Chen, L., Wang, T.. (2017, May 5). Detecting Algorithmically Generated Domains Using Data Visualization and N-Grams Methods . Retrieved April 26, 2019.
Internal MISP references
UUID 7a4e7e05-986b-4549-a021-8c3c729bd3cc
which can be used as unique global reference for Pace University Detecting DGA May 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-04-26T00:00:00Z |
date_published | 2017-05-05T00:00:00Z |
source | MITRE |
title | Detecting Algorithmically Generated Domains Using Data Visualization and N-Grams Methods |
MDSec Detecting DOTNET
MDSec Research. (n.d.). Detecting and Advancing In-Memory .NET Tradecraft. Retrieved October 4, 2021.
Internal MISP references
UUID a7952f0e-6690-48de-ad93-9922d6d6989c
which can be used as unique global reference for MDSec Detecting DOTNET
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-04T00:00:00Z |
source | MITRE |
title | Detecting and Advancing In-Memory .NET Tradecraft |
Cisco DoSdetectNetflow
Cisco. (n.d.). Detecting and Analyzing Network Threats With NetFlow. Retrieved April 25, 2019.
Internal MISP references
UUID ce447063-ec9a-4729-aaec-64ec123077ce
which can be used as unique global reference for Cisco DoSdetectNetflow
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-04-25T00:00:00Z |
source | MITRE |
title | Detecting and Analyzing Network Threats With NetFlow |
RSA2017 Detect and Respond Adair
Adair, S. (2017, February 17). Detecting and Responding to Advanced Threats within Exchange Environments. Retrieved March 20, 2017.
Internal MISP references
UUID 005a276c-3369-4d29-bf0e-c7fa4e7d90bb
which can be used as unique global reference for RSA2017 Detect and Respond Adair
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-03-20T00:00:00Z |
date_published | 2017-02-17T00:00:00Z |
source | MITRE |
title | Detecting and Responding to Advanced Threats within Exchange Environments |
Nmap Firewalls NIDS
Nmap. (n.d.). Chapter 10. Detecting and Subverting Firewalls and Intrusion Detection Systems. Retrieved October 20, 2020.
Internal MISP references
UUID c696ac8c-2c7a-4708-a369-0832a493e0a6
which can be used as unique global reference for Nmap Firewalls NIDS
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-20T00:00:00Z |
source | MITRE |
title | Detecting and Subverting Firewalls and Intrusion Detection Systems |
Medium Detecting Attempts to Steal Passwords from Memory
French, D. (2018, October 2). Detecting Attempts to Steal Passwords from Memory. Retrieved October 11, 2019.
Internal MISP references
UUID 63955204-3cf9-4628-88d2-361de4dae94f
which can be used as unique global reference for Medium Detecting Attempts to Steal Passwords from Memory
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-10-11T00:00:00Z |
date_published | 2018-10-02T00:00:00Z |
source | MITRE |
title | Detecting Attempts to Steal Passwords from Memory |
Merces BPFDOOR 2023
Fernando Merces. (2023, July 13). Detecting BPFDoor Backdoor Variants Abusing BPF Filters. Retrieved September 23, 2024.
Internal MISP references
UUID bf4f5736-0506-5ecf-a73e-86ab18c2b71b
which can be used as unique global reference for Merces BPFDOOR 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-23T00:00:00Z |
date_published | 2023-07-13T00:00:00Z |
source | MITRE |
title | Detecting BPFDoor Backdoor Variants Abusing BPF Filters |
Endurant CMSTP July 2018
Seetharaman, N. (2018, July 7). Detecting CMSTP-Enabled Code Execution and UAC Bypass With Sysmon.. Retrieved August 6, 2018.
Internal MISP references
UUID d67901a4-8774-42d3-98de-c20158f88eb6
which can be used as unique global reference for Endurant CMSTP July 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-08-06T00:00:00Z |
date_published | 2018-07-07T00:00:00Z |
source | MITRE |
title | Detecting CMSTP-Enabled Code Execution and UAC Bypass With Sysmon. |
Red Canary COR_PROFILER May 2020
Brown, J. (2020, May 7). Detecting COR_PROFILER manipulation for persistence. Retrieved June 24, 2020.
Internal MISP references
UUID 3d8cb4d3-1cbe-416a-95b5-15003cbc2beb
which can be used as unique global reference for Red Canary COR_PROFILER May 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-06-24T00:00:00Z |
date_published | 2020-05-07T00:00:00Z |
source | MITRE |
title | Detecting COR_PROFILER manipulation for persistence |
NVisio Labs DDE Detection Oct 2017
NVISO Labs. (2017, October 11). Detecting DDE in MS Office documents. Retrieved November 21, 2017.
Internal MISP references
UUID 75ccde9a-2d51-4492-9a8a-02fce30f9167
which can be used as unique global reference for NVisio Labs DDE Detection Oct 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-11-21T00:00:00Z |
date_published | 2017-10-11T00:00:00Z |
source | MITRE |
title | Detecting DDE in MS Office documents |
Zhang 2013
Zhang, H., Papadopoulos, C., & Massey, D. (2013, April). Detecting encrypted botnet traffic. Retrieved August 19, 2015.
Internal MISP references
UUID 29edb7ad-3b3a-4fdb-9c4e-bb99fc2a1c67
which can be used as unique global reference for Zhang 2013
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2015-08-19T00:00:00Z |
date_published | 2013-04-01T00:00:00Z |
source | MITRE |
title | Detecting encrypted botnet traffic |
ADSecurity Detecting Forged Tickets
Metcalf, S. (2015, May 03). Detecting Forged Kerberos Ticket (Golden Ticket & Silver Ticket) Use in Active Directory. Retrieved December 23, 2015.
Internal MISP references
UUID 4c328a1a-6a83-4399-86c5-d6e1586da8a3
which can be used as unique global reference for ADSecurity Detecting Forged Tickets
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2015-12-23T00:00:00Z |
date_published | 2015-05-03T00:00:00Z |
source | MITRE |
title | Detecting Forged Kerberos Ticket (Golden Ticket & Silver Ticket) Use in Active Directory |
Microsoft Detecting Kerberoasting Feb 2018
Bani, M. (2018, February 23). Detecting Kerberoasting activity using Azure Security Center. Retrieved March 23, 2018.
Internal MISP references
UUID b36d82a8-82ca-4f22-85c0-ee82be3b6940
which can be used as unique global reference for Microsoft Detecting Kerberoasting Feb 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-03-23T00:00:00Z |
date_published | 2018-02-23T00:00:00Z |
source | MITRE |
title | Detecting Kerberoasting activity using Azure Security Center |
Medium Detecting Lateral Movement
French, D. (2018, September 30). Detecting Lateral Movement Using Sysmon and Splunk. Retrieved October 11, 2019.
Internal MISP references
UUID 91bea3c2-df54-424e-8667-035e6e15fe38
which can be used as unique global reference for Medium Detecting Lateral Movement
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-10-11T00:00:00Z |
date_published | 2018-09-30T00:00:00Z |
source | MITRE |
title | Detecting Lateral Movement Using Sysmon and Splunk |
macOS root VNC login without authentication
Nick Miles. (2017, November 30). Detecting macOS High Sierra root account without authentication. Retrieved September 20, 2021.
Internal MISP references
UUID 4dc6ea85-a41b-4218-a9ae-e1eea841f2f2
which can be used as unique global reference for macOS root VNC login without authentication
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-20T00:00:00Z |
date_published | 2017-11-30T00:00:00Z |
source | MITRE |
title | Detecting macOS High Sierra root account without authentication |
Sans Virtual Jan 2016
Keragala, D. (2016, January 16). Detecting Malware and Sandbox Evasion Techniques. Retrieved April 17, 2019.
Internal MISP references
UUID 5d3d567c-dc25-44c1-8d2a-71ae00b60dbe
which can be used as unique global reference for Sans Virtual Jan 2016
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-04-17T00:00:00Z |
date_published | 2016-01-16T00:00:00Z |
source | MITRE |
title | Detecting Malware and Sandbox Evasion Techniques |
Mandiant Azure AD Backdoors
Mike Burns. (2020, September 30). Detecting Microsoft 365 and Azure Active Directory Backdoors. Retrieved September 28, 2022.
Internal MISP references
UUID 7b4502ff-a45c-4ba7-b00e-ca9f6e9c2ac8
which can be used as unique global reference for Mandiant Azure AD Backdoors
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-09-28T00:00:00Z |
date_published | 2020-09-30T00:00:00Z |
source | MITRE |
title | Detecting Microsoft 365 and Azure Active Directory Backdoors |
CounterCept PPID Spoofing Dec 2018
Loh, I. (2018, December 21). Detecting Parent PID Spoofing. Retrieved June 3, 2019.
Internal MISP references
UUID a1fdb8db-4c5f-4fb9-a013-b232cd8471f8
which can be used as unique global reference for CounterCept PPID Spoofing Dec 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-06-03T00:00:00Z |
date_published | 2018-12-21T00:00:00Z |
source | MITRE |
title | Detecting Parent PID Spoofing |
CISA SolarWinds Cloud Detection
CISA. (2021, January 8). Detecting Post-Compromise Threat Activity in Microsoft Cloud Environments. Retrieved January 8, 2021.
Internal MISP references
UUID b8fd5fe3-dbfa-4f28-a9b5-39f1d7db9e62
which can be used as unique global reference for CISA SolarWinds Cloud Detection
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-01-08T00:00:00Z |
date_published | 2021-01-08T00:00:00Z |
source | MITRE |
title | Detecting Post-Compromise Threat Activity in Microsoft Cloud Environments |
Detecting Rclone
Aaron Greetham. (2021, May 27). Detecting Rclone – An Effective Tool for Exfiltration. Retrieved August 30, 2022.
Internal MISP references
UUID 2e44290c-32f5-4e7f-96de-9874df79fe89
which can be used as unique global reference for Detecting Rclone
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-08-30T00:00:00Z |
date_published | 2021-05-27T00:00:00Z |
source | MITRE |
title | Detecting Rclone – An Effective Tool for Exfiltration |
Medium Detecting WMI Persistence
French, D. (2018, October 9). Detecting & Removing an Attacker’s WMI Persistence. Retrieved October 11, 2019.
Internal MISP references
UUID 539e7cd0-d1e9-46ba-96fe-d8a1061c857e
which can be used as unique global reference for Medium Detecting WMI Persistence
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-10-11T00:00:00Z |
date_published | 2018-10-09T00:00:00Z |
source | MITRE |
title | Detecting & Removing an Attacker’s WMI Persistence |
Okta Scatter Swine 2022
Okta. (2022, August 25). Detecting Scatter Swine: Insights into a Relentless Phishing Campaign. Retrieved February 24, 2023.
Internal MISP references
UUID 66d1b6e2-c069-5832-b549-fc5f0edeed40
which can be used as unique global reference for Okta Scatter Swine 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-02-24T00:00:00Z |
date_published | 2022-08-25T00:00:00Z |
source | MITRE |
title | Detecting Scatter Swine: Insights into a Relentless Phishing Campaign |
Splunk Supernova Jan 2021
Stoner, J. (2021, January 21). Detecting Supernova Malware: SolarWinds Continued. Retrieved February 22, 2021.
Internal MISP references
UUID 7e43bda5-0978-46aa-b3b3-66ffb62b9fdb
which can be used as unique global reference for Splunk Supernova Jan 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-02-22T00:00:00Z |
date_published | 2021-01-21T00:00:00Z |
source | MITRE |
title | Detecting Supernova Malware: SolarWinds Continued |
Microsoft Winnti Jan 2017
Cap, P., et al. (2017, January 25). Detecting threat actors in recent German industrial attacks with Windows Defender ATP. Retrieved February 8, 2017.
Internal MISP references
UUID 6b63fac9-4bde-4fc8-a016-e77c8485fab7
which can be used as unique global reference for Microsoft Winnti Jan 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-02-08T00:00:00Z |
date_published | 2017-01-25T00:00:00Z |
source | MITRE |
title | Detecting threat actors in recent German industrial attacks with Windows Defender ATP |
Chokepoint preload rootkits
stderr. (2014, February 14). Detecting Userland Preload Rootkits. Retrieved December 20, 2017.
Internal MISP references
UUID 16c00830-eade-40e2-9ee6-6e1af4b58e5d
which can be used as unique global reference for Chokepoint preload rootkits
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-20T00:00:00Z |
date_published | 2014-02-14T00:00:00Z |
source | MITRE |
title | Detecting Userland Preload Rootkits |
Sygnia Golden SAML
Sygnia. (2020, December). Detection and Hunting of Golden SAML Attack. Retrieved January 6, 2021.
Internal MISP references
UUID 1a6673b0-2a30-481e-a2a4-9e17e2676c5d
which can be used as unique global reference for Sygnia Golden SAML
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-01-06T00:00:00Z |
date_published | 2020-12-01T00:00:00Z |
source | MITRE |
title | Detection and Hunting of Golden SAML Attack |
FireEye Exchange Zero Days March 2021
Bromiley, M. et al. (2021, March 4). Detection and Response to Exploitation of Microsoft Exchange Zero-Day Vulnerabilities. Retrieved March 9, 2021.
Internal MISP references
UUID 5e5452a4-c3f5-4802-bcb4-198612cc8282
which can be used as unique global reference for FireEye Exchange Zero Days March 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-03-09T00:00:00Z |
date_published | 2021-03-04T00:00:00Z |
source | MITRE |
title | Detection and Response to Exploitation of Microsoft Exchange Zero-Day Vulnerabilities |
Microsoft DEV-0139 December 6 2022
Microsoft Threat Intelligence. (2022, December 6). DEV-0139 launches targeted attacks against the cryptocurrency industry. Retrieved September 30, 2024.
Internal MISP references
UUID f9c070f1-aa83-45a3-bffb-c90f4caf5926
which can be used as unique global reference for Microsoft DEV-0139 December 6 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-30T00:00:00Z |
date_published | 2022-12-06T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | DEV-0139 launches targeted attacks against the cryptocurrency industry |
Microsoft DEV-0537
Microsoft. (2022, March 22). DEV-0537 criminal actor targeting organizations for data exfiltration and destruction. Retrieved March 23, 2022.
Internal MISP references
UUID 2f7a59f3-620d-4e2e-8595-af96cd4e16c3
which can be used as unique global reference for Microsoft DEV-0537
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-03-23T00:00:00Z |
date_published | 2022-03-22T00:00:00Z |
source | MITRE |
title | DEV-0537 criminal actor targeting organizations for data exfiltration and destruction |
MSTIC DEV-0537 Mar 2022
MSTIC, DART, M365 Defender. (2022, March 24). DEV-0537 Criminal Actor Targeting Organizations for Data Exfiltration and Destruction. Retrieved May 17, 2022.
Internal MISP references
UUID a9ce7e34-6e7d-4681-9869-8e8f2b5b0390
which can be used as unique global reference for MSTIC DEV-0537 Mar 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-05-17T00:00:00Z |
date_published | 2022-03-24T00:00:00Z |
source | MITRE |
title | DEV-0537 Criminal Actor Targeting Organizations for Data Exfiltration and Destruction |
Microsoft Royal ransomware November 2022
MSTIC. (2022, November 17). DEV-0569 finds new ways to deliver Royal ransomware, various payloads. Retrieved March 30, 2023.
Internal MISP references
UUID 91efc6bf-e15c-514a-96c1-e838268d222f
which can be used as unique global reference for Microsoft Royal ransomware November 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-30T00:00:00Z |
date_published | 2022-11-17T00:00:00Z |
source | MITRE |
title | DEV-0569 finds new ways to deliver Royal ransomware, various payloads |
MSTIC DEV-0832 October 25 2022
Microsoft Threat Intelligence. (2022, October 25). DEV-0832 (Vice Society) opportunistic ransomware campaigns impacting US education sector. Retrieved September 19, 2024.
Internal MISP references
UUID 5b667611-649d-44d5-86e0-a79527608b3c
which can be used as unique global reference for MSTIC DEV-0832 October 25 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-19T00:00:00Z |
date_published | 2022-10-25T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | DEV-0832 (Vice Society) opportunistic ransomware campaigns impacting US education sector |
Cisco IOS Forensics Developments
Felix 'FX' Lindner. (2008, February). Developments in Cisco IOS Forensics. Retrieved October 21, 2020.
Internal MISP references
UUID 95fdf251-f40d-4f7a-bb12-8762e9c961b9
which can be used as unique global reference for Cisco IOS Forensics Developments
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-21T00:00:00Z |
date_published | 2008-02-01T00:00:00Z |
source | MITRE |
title | Developments in Cisco IOS Forensics |
DeviceCredentialDeployment.exe - LOLBAS Project
LOLBAS. (2021, August 16). DeviceCredentialDeployment.exe. Retrieved December 4, 2023.
Internal MISP references
UUID fef281e8-8138-4420-b11b-66d1e6a19805
which can be used as unique global reference for DeviceCredentialDeployment.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2021-08-16T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | DeviceCredentialDeployment.exe |
GitHub mattifestation DeviceGuardBypass
Graeber, M. (2016, November 13). DeviceGuardBypassMitigationRules. Retrieved November 30, 2016.
Internal MISP references
UUID 4ecd64b4-8014-447a-91d2-a431f4adbfcd
which can be used as unique global reference for GitHub mattifestation DeviceGuardBypass
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-11-30T00:00:00Z |
date_published | 2016-11-13T00:00:00Z |
source | MITRE |
title | DeviceGuardBypassMitigationRules |
Devinit.exe - LOLBAS Project
LOLBAS. (2022, January 20). Devinit.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 27343583-c17d-4c11-a7e3-14d725756556
which can be used as unique global reference for Devinit.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2022-01-20T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Devinit.exe |
Devtoolslauncher.exe - LOLBAS Project
LOLBAS. (2019, October 4). Devtoolslauncher.exe. Retrieved December 4, 2023.
Internal MISP references
UUID cb263978-019c-40c6-b6de-61db0e7a8941
which can be used as unique global reference for Devtoolslauncher.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2019-10-04T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Devtoolslauncher.exe |
devtunnel.exe - LOLBAS Project
LOLBAS. (2023, September 16). devtunnel.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 657c8b4c-1eee-4997-8461-c7592eaed9e8
which can be used as unique global reference for devtunnel.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2023-09-16T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | devtunnel.exe |
Dfshim.dll - LOLBAS Project
LOLBAS. (2018, May 25). Dfshim.dll. Retrieved December 4, 2023.
Internal MISP references
UUID 30503e42-6047-46a9-8189-e6caa5f4deb0
which can be used as unique global reference for Dfshim.dll - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2018-05-25T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Dfshim.dll |
LOLBAS /Dfsvc.exe
LOLBAS. (n.d.). /Dfsvc.exe. Retrieved September 9, 2024.
Internal MISP references
UUID caef4593-a7ac-57f7-9e06-b6ace2c9623d
which can be used as unique global reference for LOLBAS /Dfsvc.exe
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-09T00:00:00Z |
source | MITRE |
title | /Dfsvc.exe |
Dfsvc.exe - LOLBAS Project
LOLBAS. (2018, May 25). Dfsvc.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 7f3a78c0-68b2-4a9d-ae6a-6e63e8ddac3f
which can be used as unique global reference for Dfsvc.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2018-05-25T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Dfsvc.exe |
dhcp_serv_op_events
Microsoft. (2006, August 31). DHCP Server Operational Events. Retrieved March 7, 2022.
Internal MISP references
UUID e2b1e810-2a78-4553-8927-38ed5fba0f38
which can be used as unique global reference for dhcp_serv_op_events
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-03-07T00:00:00Z |
date_published | 2006-08-31T00:00:00Z |
source | MITRE |
title | DHCP Server Operational Events |
GitHub Diamorphine
Mello, V. (2018, March 8). Diamorphine - LMK rootkit for Linux Kernels 2.6.x/3.x/4.x (x86 and x86_64). Retrieved April 9, 2018.
Internal MISP references
UUID 92993055-d2e6-46b2-92a3-ad70b62e4cc0
which can be used as unique global reference for GitHub Diamorphine
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-04-09T00:00:00Z |
date_published | 2018-03-08T00:00:00Z |
source | MITRE |
title | Diamorphine - LMK rootkit for Linux Kernels 2.6.x/3.x/4.x (x86 and x86_64) |
diantz.exe_lolbas
Living Off The Land Binaries, Scripts and Libraries (LOLBAS). (n.d.). Diantz.exe. Retrieved October 25, 2021.
Internal MISP references
UUID 66652db8-5594-414f-8a6b-83d708a0c1fa
which can be used as unique global reference for diantz.exe_lolbas
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-25T00:00:00Z |
source | MITRE |
title | Diantz.exe |
Fortinet Diavol July 2021
Neeamni, D., Rubinfeld, A.. (2021, July 1). Diavol - A New Ransomware Used By Wizard Spider?. Retrieved November 12, 2021.
Internal MISP references
UUID 28c650f2-8ce8-4c78-ab4a-cae56c1548ed
which can be used as unique global reference for Fortinet Diavol July 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-11-12T00:00:00Z |
date_published | 2021-07-01T00:00:00Z |
source | MITRE |
title | Diavol - A New Ransomware Used By Wizard Spider? |
DFIR Diavol Ransomware December 2021
DFIR Report. (2021, December 13). Diavol Ransomware. Retrieved March 9, 2022.
Internal MISP references
UUID eb89f18d-684c-4220-b2a8-967f1f8f9162
which can be used as unique global reference for DFIR Diavol Ransomware December 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-03-09T00:00:00Z |
date_published | 2021-12-13T00:00:00Z |
source | MITRE |
title | Diavol Ransomware |
Überwachung APT28 Forfiles June 2015
Guarnieri, C. (2015, June 19). Digital Attack on German Parliament: Investigative Report on the Hack of the Left Party Infrastructure in Bundestag. Retrieved January 22, 2018.
Internal MISP references
UUID 3b85fff0-88d8-4df6-af0b-66e57492732e
which can be used as unique global reference for Überwachung APT28 Forfiles June 2015
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-01-22T00:00:00Z |
date_published | 2015-06-19T00:00:00Z |
source | MITRE |
title | Digital Attack on German Parliament: Investigative Report on the Hack of the Left Party Infrastructure in Bundestag |
Microsoft DSE June 2017
Microsoft. (2017, June 1). Digital Signatures for Kernel Modules on Windows. Retrieved April 22, 2021.
Internal MISP references
UUID 451bdfe3-0b30-425c-97a0-44727b70c1da
which can be used as unique global reference for Microsoft DSE June 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-04-22T00:00:00Z |
date_published | 2017-06-01T00:00:00Z |
source | MITRE |
title | Digital Signatures for Kernel Modules on Windows |
Microsoft East Asia Threats September 2023
Microsoft Threat Intelligence. (2023, September). Digital threats from East Asia increase in breadth and effectiveness. Retrieved February 5, 2024.
Internal MISP references
UUID 31f2c61e-cefe-5df7-9c2b-780bf03c88ec
which can be used as unique global reference for Microsoft East Asia Threats September 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-02-05T00:00:00Z |
date_published | 2023-09-01T00:00:00Z |
source | MITRE |
title | Digital threats from East Asia increase in breadth and effectiveness |
ESET Turla Mosquito Jan 2018
ESET, et al. (2018, January). Diplomats in Eastern Europe bitten by a Turla mosquito. Retrieved July 3, 2018.
Internal MISP references
UUID cd177c2e-ef22-47be-9926-61e25fd5f33b
which can be used as unique global reference for ESET Turla Mosquito Jan 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-07-03T00:00:00Z |
date_published | 2018-01-01T00:00:00Z |
source | MITRE |
title | Diplomats in Eastern Europe bitten by a Turla mosquito |
TechNet Dir
Microsoft. (n.d.). Dir. Retrieved April 18, 2016.
Internal MISP references
UUID f1eb8631-6bea-4688-a5ff-a388b1fdceb0
which can be used as unique global reference for TechNet Dir
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-04-18T00:00:00Z |
source | MITRE |
title | Dir |
Frisk DMA August 2016
Ulf Frisk. (2016, August 5). Direct Memory Attack the Kernel. Retrieved March 30, 2018.
Internal MISP references
UUID c504485b-2daa-4159-96da-481a0b97a979
which can be used as unique global reference for Frisk DMA August 2016
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-03-30T00:00:00Z |
date_published | 2016-08-05T00:00:00Z |
source | MITRE |
title | Direct Memory Attack the Kernel |
Redops Syscalls
Feichter, D. (2023, June 30). Direct Syscalls vs Indirect Syscalls. Retrieved September 27, 2023.
Internal MISP references
UUID dd8c2edd-b5ba-5a41-b65d-c3a2951d07b8
which can be used as unique global reference for Redops Syscalls
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-27T00:00:00Z |
date_published | 2023-06-30T00:00:00Z |
source | MITRE |
title | Direct Syscalls vs Indirect Syscalls |
GitHub Disable DDEAUTO Oct 2017
Dormann, W. (2017, October 20). Disable DDEAUTO for Outlook, Word, OneNote, and Excel versions 2010, 2013, 2016. Retrieved February 3, 2018.
Internal MISP references
UUID eea0dd34-4efa-4093-bd11-a59d1601868f
which can be used as unique global reference for GitHub Disable DDEAUTO Oct 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-02-03T00:00:00Z |
date_published | 2017-10-20T00:00:00Z |
source | MITRE |
title | Disable DDEAUTO for Outlook, Word, OneNote, and Excel versions 2010, 2013, 2016 |
Disable automount for ISO
wordmann. (2022, February 8). Disable Disc Imgage. Retrieved February 8, 2022.
Internal MISP references
UUID 2155591e-eacf-4575-b7a6-f031675ef1b3
which can be used as unique global reference for Disable automount for ISO
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-02-08T00:00:00Z |
date_published | 2022-02-08T00:00:00Z |
source | MITRE |
title | Disable Disc Imgage |
Disable_Win_Event_Logging
dmcxblue. (n.d.). Disable Windows Event Logging. Retrieved September 10, 2021.
Internal MISP references
UUID 0fa5e507-33dc-40ea-b960-bcd9aa024ab1
which can be used as unique global reference for Disable_Win_Event_Logging
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-10T00:00:00Z |
source | MITRE |
title | Disable Windows Event Logging |
GitHub MOTW
wdormann. (2019, August 29). Disable Windows Explorer file associations for Disc Image Mount. Retrieved April 16, 2022.
Internal MISP references
UUID 044aa74a-9320-496a-9d15-37d8b934c244
which can be used as unique global reference for GitHub MOTW
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-04-16T00:00:00Z |
date_published | 2019-08-29T00:00:00Z |
source | MITRE |
title | Disable Windows Explorer file associations for Disc Image Mount |
Apple Disable SIP
Apple. (n.d.). Disabling and Enabling System Integrity Protection. Retrieved April 22, 2021.
Internal MISP references
UUID d7545e0c-f0b7-4be4-800b-06a02240385e
which can be used as unique global reference for Apple Disable SIP
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-04-22T00:00:00Z |
source | MITRE |
title | Disabling and Enabling System Integrity Protection |
Microsoft GPO Bluetooth FEB 2009
Microsoft. (2009, February 9). Disabling Bluetooth and Infrared Beaming. Retrieved July 26, 2018.
Internal MISP references
UUID 27573597-5269-4894-87fb-24afcdb8f30a
which can be used as unique global reference for Microsoft GPO Bluetooth FEB 2009
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-07-26T00:00:00Z |
date_published | 2009-02-09T00:00:00Z |
source | MITRE |
title | Disabling Bluetooth and Infrared Beaming |
ITSyndicate Disabling PHP functions
Kondratiev, A. (n.d.). Disabling dangerous PHP functions. Retrieved July 26, 2021.
Internal MISP references
UUID 6e91f485-5777-4a06-94a3-cdc4718a8e39
which can be used as unique global reference for ITSyndicate Disabling PHP functions
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-07-26T00:00:00Z |
source | MITRE |
title | Disabling dangerous PHP functions |
disable_notif_synology_ransom
TheDFIRReport. (2022, March 1). Disabling notifications on Synology servers before ransom. Retrieved September 12, 2024.
Internal MISP references
UUID d53e8f89-df78-565b-a316-cf2644c5ed36
which can be used as unique global reference for disable_notif_synology_ransom
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-12T00:00:00Z |
date_published | 2022-03-01T00:00:00Z |
source | MITRE |
title | Disabling notifications on Synology servers before ransom |
Krebs Discord Bookmarks 2023
Brian Krebs. (2023, May 30). Discord Admins Hacked by Malicious Bookmarks. Retrieved January 2, 2024.
Internal MISP references
UUID 1d0a21f4-9a8e-5514-894a-3d55263ff973
which can be used as unique global reference for Krebs Discord Bookmarks 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-01-02T00:00:00Z |
date_published | 2023-05-30T00:00:00Z |
source | MITRE |
title | Discord Admins Hacked by Malicious Bookmarks |
Diskshadow
Microsoft Windows Server. (2023, February 3). Diskshadow. Retrieved November 21, 2023.
Internal MISP references
UUID 9e8b57a5-7e31-5add-ac3e-8b9c0f7f27aa
which can be used as unique global reference for Diskshadow
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-11-21T00:00:00Z |
date_published | 2023-02-03T00:00:00Z |
source | MITRE |
title | Diskshadow |
Diskshadow.exe - LOLBAS Project
LOLBAS. (2018, May 25). Diskshadow.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 27a3f0b4-e699-4319-8b52-8eae4581faa2
which can be used as unique global reference for Diskshadow.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2018-05-25T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Diskshadow.exe |
OpenAI-CTI
OpenAI. (2024, February 14). Disrupting malicious uses of AI by state-affiliated threat actors. Retrieved September 12, 2024.
Internal MISP references
UUID d8f576cb-0afc-54a7-a449-570c4311ef7a
which can be used as unique global reference for OpenAI-CTI
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-12T00:00:00Z |
date_published | 2024-02-14T00:00:00Z |
source | MITRE |
title | Disrupting malicious uses of AI by state-affiliated threat actors |
Microsoft Star Blizzard August 2022
Microsoft Threat Intelligence. (2022, August 15). Disrupting SEABORGIUM’s ongoing phishing operations. Retrieved June 13, 2024.
Internal MISP references
UUID d5fc25ad-2337-55f5-9eac-050178a533d6
which can be used as unique global reference for Microsoft Star Blizzard August 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-06-13T00:00:00Z |
date_published | 2022-08-15T00:00:00Z |
source | MITRE |
title | Disrupting SEABORGIUM’s ongoing phishing operations |
Bitdefender FunnyDream Campaign November 2020
Vrabie, V. (2020, November). Dissecting a Chinese APT Targeting South Eastern Asian Government Institutions. Retrieved September 19, 2022.
Internal MISP references
UUID b62a9f2c-02ca-4dfa-95fc-5dc6ad9568de
which can be used as unique global reference for Bitdefender FunnyDream Campaign November 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-09-19T00:00:00Z |
date_published | 2020-11-01T00:00:00Z |
source | MITRE |
title | Dissecting a Chinese APT Targeting South Eastern Asian Government Institutions |
FireEye NETWIRE March 2019
Maniath, S. and Kadam P. (2019, March 19). Dissecting a NETWIRE Phishing Campaign's Usage of Process Hollowing. Retrieved January 7, 2021.
Internal MISP references
UUID 404d4f7e-62de-4483-9320-a90fb255e783
which can be used as unique global reference for FireEye NETWIRE March 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-01-07T00:00:00Z |
date_published | 2019-03-19T00:00:00Z |
source | MITRE |
title | Dissecting a NETWIRE Phishing Campaign's Usage of Process Hollowing |
Cybereason Dissecting DGAs
Sternfeld, U. (2016). Dissecting Domain Generation Algorithms: Eight Real World DGA Variants. Retrieved February 18, 2019.
Internal MISP references
UUID 9888cdb6-fe85-49b4-937c-75005ac9660d
which can be used as unique global reference for Cybereason Dissecting DGAs
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-02-18T00:00:00Z |
date_published | 2016-01-01T00:00:00Z |
source | MITRE |
title | Dissecting Domain Generation Algorithms: Eight Real World DGA Variants |
FireEye POSHSPY April 2017
Dunwoody, M.. (2017, April 3). Dissecting One of APT29’s Fileless WMI and PowerShell Backdoors (POSHSPY). Retrieved April 5, 2017.
Internal MISP references
UUID b1271e05-80d7-4761-a13f-b6f0db7d7e5a
which can be used as unique global reference for FireEye POSHSPY April 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-04-05T00:00:00Z |
date_published | 2017-04-03T00:00:00Z |
source | MITRE |
title | Dissecting One of APT29’s Fileless WMI and PowerShell Backdoors (POSHSPY) |
Bleeping Computer Stealer Logs 2023
Flare. (2023, June 6). Dissecting the Dark Web Supply Chain: Stealer Logs in Context. Retrieved October 10, 2024.
Internal MISP references
UUID 3bcbc294-91f1-56af-9eb9-9ce556c09602
which can be used as unique global reference for Bleeping Computer Stealer Logs 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-10-10T00:00:00Z |
date_published | 2023-06-06T00:00:00Z |
source | MITRE |
title | Dissecting the Dark Web Supply Chain: Stealer Logs in Context |
Microsoft DTC
Microsoft. (2011, January 12). Distributed Transaction Coordinator. Retrieved February 25, 2016.
Internal MISP references
UUID d2a1aab3-a4c9-4583-9cf8-170eeb77d828
which can be used as unique global reference for Microsoft DTC
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-02-25T00:00:00Z |
date_published | 2011-01-12T00:00:00Z |
source | MITRE |
title | Distributed Transaction Coordinator |
Mandiant UNC4841 August 29 2023
Austin Larsen, John Palmisano, John Wolfram, Mathew Potaczek, Michael Raggi. (2023, August 29). Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation. Retrieved October 24, 2024.
Internal MISP references
UUID f990745d-06c1-4b0a-8394-66c7a3cf0818
which can be used as unique global reference for Mandiant UNC4841 August 29 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-10-24T00:00:00Z |
date_published | 2023-08-29T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation |
Mandiant Search Order
Mandiant. (2010, August 31). DLL Search Order Hijacking Revisited. Retrieved December 5, 2014.
Internal MISP references
UUID 2f602a6c-0305-457c-b329-a17b55d8e094
which can be used as unique global reference for Mandiant Search Order
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2014-12-05T00:00:00Z |
date_published | 2010-08-31T00:00:00Z |
source | MITRE |
title | DLL Search Order Hijacking Revisited |
FireEye DLL Search Order Hijacking
Nick Harbour. (2010, September 1). DLL Search Order Hijacking Revisited. Retrieved March 13, 2020.
Internal MISP references
UUID 0ba2675d-4d7f-406a-81fa-b87e62d7a539
which can be used as unique global reference for FireEye DLL Search Order Hijacking
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-03-13T00:00:00Z |
date_published | 2010-09-01T00:00:00Z |
source | MITRE |
title | DLL Search Order Hijacking Revisited |
Stewart 2014
Stewart, A. (2014). DLL SIDE-LOADING: A Thorn in the Side of the Anti-Virus Industry. Retrieved November 12, 2014.
Internal MISP references
UUID 813905b5-7aa5-4bab-b2ac-eaafdea55805
which can be used as unique global reference for Stewart 2014
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2014-11-12T00:00:00Z |
date_published | 2014-01-01T00:00:00Z |
source | MITRE |
title | DLL SIDE-LOADING: A Thorn in the Side of the Anti-Virus Industry |
Dnscmd.exe - LOLBAS Project
LOLBAS. (2018, May 25). Dnscmd.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 3571ca9d-3388-4e74-8b30-dd92ef2b5f10
which can be used as unique global reference for Dnscmd.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2018-05-25T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Dnscmd.exe |
Dnscmd Microsoft
Microsoft. (2023, February 3). Dnscmd Microsoft. Retrieved July 11, 2023.
Internal MISP references
UUID 24b1cb7b-357f-470f-9715-fa0ec3958cbb
which can be used as unique global reference for Dnscmd Microsoft
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-07-11T00:00:00Z |
date_published | 2023-02-03T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Dnscmd Microsoft |
DNS Dumpster
Hacker Target. (n.d.). DNS Dumpster. Retrieved October 20, 2020.
Internal MISP references
UUID 0bbe1e50-28af-4265-a493-4bb4fd693bad
which can be used as unique global reference for DNS Dumpster
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-20T00:00:00Z |
source | MITRE |
title | DNS Dumpster |
Talos DNSpionage Nov 2018
Mercer, W., Rascagneres, P. (2018, November 27). DNSpionage Campaign Targets Middle East. Retrieved October 9, 2020.
Internal MISP references
UUID d597ad7d-f808-4289-b42a-79807248c2d6
which can be used as unique global reference for Talos DNSpionage Nov 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-09T00:00:00Z |
date_published | 2018-11-27T00:00:00Z |
source | MITRE |
title | DNSpionage Campaign Targets Middle East |
DNS-msft
Microsoft. (2022). DNS Policies Overview. Retrieved June 6, 2024.
Internal MISP references
UUID bb420420-d03c-53b9-8bd9-e4357df8930a
which can be used as unique global reference for DNS-msft
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-06-06T00:00:00Z |
date_published | 2022-01-01T00:00:00Z |
source | MITRE |
title | DNS Policies Overview |
Unit42 DNS Mar 2019
Hinchliffe, A. (2019, March 15). DNS Tunneling: how DNS can be (ab)used by malicious actors. Retrieved October 3, 2020.
Internal MISP references
UUID e41fde80-5ced-4f66-9852-392d1ef79520
which can be used as unique global reference for Unit42 DNS Mar 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-03T00:00:00Z |
date_published | 2019-03-15T00:00:00Z |
source | MITRE |
title | DNS Tunneling: how DNS can be (ab)used by malicious actors |
DNS-CISA
CISA. (2016, September 29). DNS Zone Transfer AXFR Requests May Leak Domain Information. Retrieved June 5, 2024.
Internal MISP references
UUID bc24500a-500c-5e08-90ec-6fbb39b0b74c
which can be used as unique global reference for DNS-CISA
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-06-05T00:00:00Z |
date_published | 2016-09-29T00:00:00Z |
source | MITRE |
title | DNS Zone Transfer AXFR Requests May Leak Domain Information |
dnx.exe - LOLBAS Project
LOLBAS. (2018, May 25). dnx.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 50652a27-c47b-41d4-a2eb-2ebf74e5bd09
which can be used as unique global reference for dnx.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2018-05-25T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | dnx.exe |
GTFOBins Docker
GTFOBins. (n.d.). docker. Retrieved February 15, 2024.
Internal MISP references
UUID c4fa5825-85f9-5ab1-a59d-a86b20ef0570
which can be used as unique global reference for GTFOBins Docker
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-02-15T00:00:00Z |
source | MITRE |
title | docker |
Docker Daemon CLI
Docker. (n.d.). DockerD CLI. Retrieved March 29, 2021.
Internal MISP references
UUID ea86eae4-6ad4-4d79-9dd3-dd965a7feb5c
which can be used as unique global reference for Docker Daemon CLI
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-03-29T00:00:00Z |
source | MITRE |
title | DockerD CLI |
Docker API
Docker. (n.d.). Docker Engine API v1.41 Reference. Retrieved March 31, 2021.
Internal MISP references
UUID b8ec1e37-7286-40e8-9577-ff9c54801086
which can be used as unique global reference for Docker API
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-03-31T00:00:00Z |
source | MITRE |
title | Docker Engine API v1.41 Reference |
Docker Build Image
Docker. ( null). Docker Engine API v1.41 Reference - Build an Image. Retrieved March 30, 2021.
Internal MISP references
UUID ee708b64-57f3-4b47-af05-1e26b698c21f
which can be used as unique global reference for Docker Build Image
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-03-30T00:00:00Z |
source | MITRE |
title | Docker Engine API v1.41 Reference - Build an Image |
Docker Containers API
Docker. (n.d.). Docker Engine API v1.41 Reference - Container. Retrieved March 29, 2021.
Internal MISP references
UUID 2351cb32-23d6-4557-9c52-e6e228402bab
which can be used as unique global reference for Docker Containers API
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-03-29T00:00:00Z |
source | MITRE |
title | Docker Engine API v1.41 Reference - Container |
Docker Exec
Docker. (n.d.). Docker Exec. Retrieved March 29, 2021.
Internal MISP references
UUID 5f1ace27-6584-4585-98de-52cb71d419c1
which can be used as unique global reference for Docker Exec
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-03-29T00:00:00Z |
source | MITRE |
title | Docker Exec |
Docker Images
Docker. (n.d.). Docker Images. Retrieved April 6, 2021.
Internal MISP references
UUID 9b4d1e80-61e9-4557-a562-5eda66d0bbf7
which can be used as unique global reference for Docker Images
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-04-06T00:00:00Z |
source | MITRE |
title | Docker Images |
Docker Overview
Docker. (n.d.). Docker Overview. Retrieved March 30, 2021.
Internal MISP references
UUID 52954bb1-16b0-4717-a72c-8a6dec97610b
which can be used as unique global reference for Docker Overview
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-03-30T00:00:00Z |
source | MITRE |
title | Docker Overview |
Docker Entrypoint
Docker. (n.d.). Docker run reference. Retrieved March 29, 2021.
Internal MISP references
UUID c80ad3fd-d7fc-4a7a-8565-da3feaa4a915
which can be used as unique global reference for Docker Entrypoint
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-03-29T00:00:00Z |
source | MITRE |
title | Docker run reference |
TechNet Server Operator Scheduled Task
Microsoft. (2012, November 15). Domain controller: Allow server operators to schedule tasks. Retrieved December 18, 2017.
Internal MISP references
UUID a9497afa-42c8-499e-a6b6-4231b1c22f6e
which can be used as unique global reference for TechNet Server Operator Scheduled Task
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-18T00:00:00Z |
date_published | 2012-11-15T00:00:00Z |
source | MITRE |
title | Domain controller: Allow server operators to schedule tasks |
Cisco Umbrella DGA
Scarfo, A. (2016, October 10). Domain Generation Algorithms – Why so effective?. Retrieved February 18, 2019.
Internal MISP references
UUID 5dbe2bcb-40b9-4ff8-a37a-0893a7a6cb58
which can be used as unique global reference for Cisco Umbrella DGA
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-02-18T00:00:00Z |
date_published | 2016-10-10T00:00:00Z |
source | MITRE |
title | Domain Generation Algorithms – Why so effective? |
Microsoft GetAllTrustRelationships
Microsoft. (n.d.). Domain.GetAllTrustRelationships Method. Retrieved February 14, 2019.
Internal MISP references
UUID 571086ce-42d3-4416-9521-315f694647a6
which can be used as unique global reference for Microsoft GetAllTrustRelationships
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-02-14T00:00:00Z |
source | MITRE |
title | Domain.GetAllTrustRelationships Method |
ICANNDomainNameHijacking
ICANN Security and Stability Advisory Committee. (2005, July 12). Domain Name Hijacking: Incidents, Threats, Risks and Remediation. Retrieved March 6, 2017.
Internal MISP references
UUID 96c5ec6c-d53d-49c3-bca1-0b6abe0080e6
which can be used as unique global reference for ICANNDomainNameHijacking
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-03-06T00:00:00Z |
date_published | 2005-07-12T00:00:00Z |
source | MITRE |
title | Domain Name Hijacking: Incidents, Threats, Risks and Remediation |
Palo Alto Unit 42 Domain Shadowing 2022
Janos Szurdi, Rebekah Houser and Daiping Liu. (2022, September 21). Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime. Retrieved March 7, 2023.
Internal MISP references
UUID ec460017-fd25-5975-b697-c8c11fee960d
which can be used as unique global reference for Palo Alto Unit 42 Domain Shadowing 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-07T00:00:00Z |
date_published | 2022-09-21T00:00:00Z |
source | MITRE |
title | Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime |
ASERT Donot March 2018
Schwarz, D., Sopko J. (2018, March 08). Donot Team Leverages New Modular Malware Framework in South Asia. Retrieved June 11, 2018.
Internal MISP references
UUID a1b987cc-7789-411c-9673-3cf6357b207c
which can be used as unique global reference for ASERT Donot March 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-06-11T00:00:00Z |
date_published | 2018-03-08T00:00:00Z |
source | MITRE |
title | Donot Team Leverages New Modular Malware Framework in South Asia |
mandiant-masking
Simonian, Nick. (2023, May 22). Don't @ Me: URL Obfuscation Through Schema Abuse. Retrieved January 17, 2024.
Internal MISP references
UUID d5ed4c98-6d37-5000-bba0-9aada295a50c
which can be used as unique global reference for mandiant-masking
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-01-17T00:00:00Z |
date_published | 2023-05-22T00:00:00Z |
source | MITRE |
title | Don't @ Me: URL Obfuscation Through Schema Abuse |
Mandiant URL Obfuscation 2023
Nick Simonian. (2023, May 22). Don't @ Me: URL Obfuscation Through Schema Abuse. Retrieved August 4, 2023.
Internal MISP references
UUID b63f5934-2ace-5326-89be-7a850469a563
which can be used as unique global reference for Mandiant URL Obfuscation 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-08-04T00:00:00Z |
date_published | 2023-05-22T00:00:00Z |
source | MITRE |
title | Don't @ Me: URL Obfuscation Through Schema Abuse |
Schema-abuse
Nick Simonian. (2023, May 22). Don't @ Me: URL Obfuscation Through Schema Abuse. Retrieved February 13, 2024.
Internal MISP references
UUID 75b860d9-a48d-57de-ba1e-b0db970abb1b
which can be used as unique global reference for Schema-abuse
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-02-13T00:00:00Z |
date_published | 2023-05-22T00:00:00Z |
source | MITRE |
title | Don't @ Me: URL Obfuscation Through Schema Abuse |
Donut Github
TheWover. (2019, May 9). donut. Retrieved March 25, 2022.
Internal MISP references
UUID 5f28c41f-6903-4779-93d4-3de99e031b70
which can be used as unique global reference for Donut Github
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-03-25T00:00:00Z |
date_published | 2019-05-09T00:00:00Z |
source | MITRE |
title | donut |
Introducing Donut
The Wover. (2019, May 9). Donut - Injecting .NET Assemblies as Shellcode. Retrieved October 4, 2021.
Internal MISP references
UUID 8fd099c6-e002-44d0-8b7f-65f290a42c07
which can be used as unique global reference for Introducing Donut
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-04T00:00:00Z |
date_published | 2019-05-09T00:00:00Z |
source | MITRE |
title | Donut - Injecting .NET Assemblies as Shellcode |
Dotnet.exe - LOLBAS Project
LOLBAS. (2019, November 12). Dotnet.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 8abe21ad-88d1-4a5c-b79e-8216b4b06862
which can be used as unique global reference for Dotnet.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2019-11-12T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Dotnet.exe |
cyberproof-double-bounce
Itkin, Liora. (2022, September 1). Double-bounced attacks with email spoofing . Retrieved February 24, 2023.
Internal MISP references
UUID 4406d688-c392-5244-b438-6995f38dfc61
which can be used as unique global reference for cyberproof-double-bounce
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-02-24T00:00:00Z |
date_published | 2022-09-01T00:00:00Z |
source | MITRE |
title | Double-bounced attacks with email spoofing |
FireEye APT41 Aug 2019
Fraser, N., et al. (2019, August 7). Double DragonAPT41, a dual espionage and cyber crime operation APT41. Retrieved September 23, 2019.
Internal MISP references
UUID 20f8e252-0a95-4ebd-857c-d05b0cde0904
which can be used as unique global reference for FireEye APT41 Aug 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-09-23T00:00:00Z |
date_published | 2019-08-07T00:00:00Z |
source | MITRE, Tidal Cyber |
title | Double DragonAPT41, a dual espionage and cyber crime operation APT41 |
FireEye APT41 2019
FireEye. (2019). Double DragonAPT41, a dual espionage andcyber crime operationAPT41. Retrieved September 23, 2019.
Internal MISP references
UUID daa31f35-15a6-413b-9319-80d6921d1598
which can be used as unique global reference for FireEye APT41 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-09-23T00:00:00Z |
date_published | 2019-01-01T00:00:00Z |
source | MITRE |
title | Double DragonAPT41, a dual espionage andcyber crime operationAPT41 |
Malwarebytes IssacWiper CaddyWiper March 2022
Threat Intelligence Team. (2022, March 18). Double header: IsaacWiper and CaddyWiper . Retrieved April 11, 2022.
Internal MISP references
UUID 931aed95-a629-4f94-8762-aad580f5d3e2
which can be used as unique global reference for Malwarebytes IssacWiper CaddyWiper March 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-04-11T00:00:00Z |
date_published | 2022-03-18T00:00:00Z |
source | MITRE |
title | Double header: IsaacWiper and CaddyWiper |
Crowdstrike-leaks
Crowdstrike. (2020, September 24). Double Trouble: Ransomware with Data Leak Extortion, Part 1. Retrieved December 6, 2023.
Internal MISP references
UUID a91c3252-94b8-52a8-bb0d-cadac6afa161
which can be used as unique global reference for Crowdstrike-leaks
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-06T00:00:00Z |
date_published | 2020-09-24T00:00:00Z |
source | MITRE |
title | Double Trouble: Ransomware with Data Leak Extortion, Part 1 |
tlseminar_downgrade_att
Team Cinnamon. (2017, February 3). Downgrade Attacks. Retrieved December 9, 2021.
Internal MISP references
UUID 8b5d46bf-fb4e-4ecd-b8a9-9c084c1864a3
which can be used as unique global reference for tlseminar_downgrade_att
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-12-09T00:00:00Z |
date_published | 2017-02-03T00:00:00Z |
source | MITRE |
title | Downgrade Attacks |
LogRhythm Do You Trust Oct 2014
Foss, G. (2014, October 3). Do You Trust Your Computer?. Retrieved December 17, 2018.
Internal MISP references
UUID 88a84f9a-e077-4fdd-9936-30fc7b290476
which can be used as unique global reference for LogRhythm Do You Trust Oct 2014
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-12-17T00:00:00Z |
date_published | 2014-10-03T00:00:00Z |
source | MITRE |
title | Do You Trust Your Computer? |
VNC Vulnerabilities
Sergiu Gatlan. (2019, November 22). Dozens of VNC Vulnerabilities Found in Linux, Windows Solutions. Retrieved September 20, 2021.
Internal MISP references
UUID 3ec5440a-cb3b-4aa9-8e0e-0f92525ef51c
which can be used as unique global reference for VNC Vulnerabilities
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-20T00:00:00Z |
date_published | 2019-11-22T00:00:00Z |
source | MITRE |
title | Dozens of VNC Vulnerabilities Found in Linux, Windows Solutions |
Accenture Dragonfish Jan 2018
Accenture Security. (2018, January 27). DRAGONFISH DELIVERS NEW FORM OF ELISE MALWARE TARGETING ASEAN DEFENCE MINISTERS’ MEETING AND ASSOCIATES. Retrieved November 14, 2018.
Internal MISP references
UUID f692c6fa-7b3a-4d1d-9002-b1a59f7116f4
which can be used as unique global reference for Accenture Dragonfish Jan 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-11-14T00:00:00Z |
date_published | 2018-01-27T00:00:00Z |
source | MITRE |
title | DRAGONFISH DELIVERS NEW FORM OF ELISE MALWARE TARGETING ASEAN DEFENCE MINISTERS’ MEETING AND ASSOCIATES |
Symantec Dragonfly
Symantec Security Response. (2014, June 30). Dragonfly: Cyberespionage Attacks Against Energy Suppliers. Retrieved April 8, 2016.
Internal MISP references
UUID 9514c5cd-2ed6-4dbf-aa9e-1c425e969226
which can be used as unique global reference for Symantec Dragonfly
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-04-08T00:00:00Z |
date_published | 2014-06-30T00:00:00Z |
source | MITRE, Tidal Cyber |
title | Dragonfly: Cyberespionage Attacks Against Energy Suppliers |
Symantec Dragonfly 2.0 October 2017
Symantec. (2017, October 7). Dragonfly: Western energy sector targeted by sophisticated attack group. Retrieved April 19, 2022.
Internal MISP references
UUID a0439d4a-a3ea-4be5-9a01-f223ca259681
which can be used as unique global reference for Symantec Dragonfly 2.0 October 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-04-19T00:00:00Z |
date_published | 2017-10-07T00:00:00Z |
source | MITRE |
title | Dragonfly: Western energy sector targeted by sophisticated attack group |
Symantec Dragonfly Sept 2017
Symantec Security Response. (2014, July 7). Dragonfly: Western energy sector targeted by sophisticated attack group. Retrieved September 9, 2017.
Internal MISP references
UUID 11bbeafc-ed5d-4d2b-9795-a0a9544fb64e
which can be used as unique global reference for Symantec Dragonfly Sept 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-09-09T00:00:00Z |
date_published | 2014-07-07T00:00:00Z |
source | MITRE |
title | Dragonfly: Western energy sector targeted by sophisticated attack group |
Kaspersky Dridex May 2017
Slepogin, N. (2017, May 25). Dridex: A History of Evolution. Retrieved May 31, 2019.
Internal MISP references
UUID 52c48bc3-2b53-4214-85c3-7e5dd036c969
which can be used as unique global reference for Kaspersky Dridex May 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-05-31T00:00:00Z |
date_published | 2017-05-25T00:00:00Z |
source | MITRE |
title | Dridex: A History of Evolution |
Dell Dridex Oct 2015
Dell SecureWorks Counter Threat Unit Threat Intelligence. (2015, October 13). Dridex (Bugat v5) Botnet Takeover Operation. Retrieved May 31, 2019.
Internal MISP references
UUID f81ce947-d875-4631-9709-b54c8b5d25bc
which can be used as unique global reference for Dell Dridex Oct 2015
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-05-31T00:00:00Z |
date_published | 2015-10-13T00:00:00Z |
source | MITRE |
title | Dridex (Bugat v5) Botnet Takeover Operation |
Red Canary Dridex Threat Report 2021
Red Canary. (2021, February 9). Dridex - Red Canary Threat Detection Report. Retrieved August 3, 2023.
Internal MISP references
UUID 3be25132-6655-5fa9-92cb-772d02f49d2b
which can be used as unique global reference for Red Canary Dridex Threat Report 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-08-03T00:00:00Z |
date_published | 2021-02-09T00:00:00Z |
source | MITRE |
title | Dridex - Red Canary Threat Detection Report |
volexity_0day_sophos_FW
Adair, S., Lancaster, T., Volexity Threat Research. (2022, June 15). DriftingCloud: Zero-Day Sophos Firewall Exploitation and an Insidious Breach. Retrieved July 1, 2022.
Internal MISP references
UUID 85bee18e-216d-4ea6-b34e-b071e3f63382
which can be used as unique global reference for volexity_0day_sophos_FW
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-07-01T00:00:00Z |
date_published | 2022-06-15T00:00:00Z |
source | MITRE |
title | DriftingCloud: Zero-Day Sophos Firewall Exploitation and an Insidious Breach |
Google Drive Log Events
Google. (n.d.). Drive log events. Retrieved March 4, 2024.
Internal MISP references
UUID f546898e-3639-58f4-85a2-6268dfaab207
which can be used as unique global reference for Google Drive Log Events
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-04T00:00:00Z |
source | MITRE |
title | Drive log events |
Microsoft Driverquery
Microsoft. (n.d.). driverquery. Retrieved March 28, 2023.
Internal MISP references
UUID 7302dc00-a75a-5787-a04c-88ef4922ac09
which can be used as unique global reference for Microsoft Driverquery
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-28T00:00:00Z |
source | MITRE |
title | driverquery |
Dropbox Malware Sync
David Talbot. (2013, August 21). Dropbox and Similar Services Can Sync Malware. Retrieved May 31, 2023.
Internal MISP references
UUID 06ca63fa-8c6c-501c-96d3-5e7e45ca1e04
which can be used as unique global reference for Dropbox Malware Sync
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-31T00:00:00Z |
date_published | 2013-08-21T00:00:00Z |
source | MITRE |
title | Dropbox and Similar Services Can Sync Malware |
Cyberreason Anchor December 2019
Dahan, A. et al. (2019, December 11). DROPPING ANCHOR: FROM A TRICKBOT INFECTION TO THE DISCOVERY OF THE ANCHOR MALWARE. Retrieved September 10, 2020.
Internal MISP references
UUID a8dc5598-9963-4a1d-a473-bee8d2c72c57
which can be used as unique global reference for Cyberreason Anchor December 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-09-10T00:00:00Z |
date_published | 2019-12-11T00:00:00Z |
source | MITRE |
title | DROPPING ANCHOR: FROM A TRICKBOT INFECTION TO THE DISCOVERY OF THE ANCHOR MALWARE |
Samba DRSUAPI
SambaWiki. (n.d.). DRSUAPI. Retrieved December 4, 2017.
Internal MISP references
UUID 79e8f598-9962-4124-b884-eb10f86885af
which can be used as unique global reference for Samba DRSUAPI
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-04T00:00:00Z |
source | MITRE |
title | DRSUAPI |
dsdbutil.exe - LOLBAS Project
LOLBAS. (2023, May 31). dsdbutil.exe. Retrieved December 4, 2023.
Internal MISP references
UUID fc982faf-a37d-4d0b-949c-f7a27adc3030
which can be used as unique global reference for dsdbutil.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2023-05-31T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | dsdbutil.exe |
TechNet Dsquery
Microsoft. (n.d.). Dsquery. Retrieved April 18, 2016.
Internal MISP references
UUID bbbb4a45-2963-4f04-901a-fb2752800e12
which can be used as unique global reference for TechNet Dsquery
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-04-18T00:00:00Z |
source | MITRE |
title | Dsquery |
CyberBit Dtrack
Hod Gavriel. (2019, November 21). Dtrack: In-depth analysis of APT on a nuclear power plant. Retrieved January 20, 2021.
Internal MISP references
UUID 1ac944f4-868c-4312-8b5d-1580fd6542a0
which can be used as unique global reference for CyberBit Dtrack
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-01-20T00:00:00Z |
date_published | 2019-11-21T00:00:00Z |
source | MITRE |
title | Dtrack: In-depth analysis of APT on a nuclear power plant |
Kaspersky Dtrack
Kaspersky Global Research and Analysis Team. (2019, September 23). DTrack: previously unknown spy-tool by Lazarus hits financial institutions and research centers. Retrieved January 20, 2021.
Internal MISP references
UUID 0122ee35-938d-493f-a3bb-bc75fc808f62
which can be used as unique global reference for Kaspersky Dtrack
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-01-20T00:00:00Z |
date_published | 2019-09-23T00:00:00Z |
source | MITRE |
title | DTrack: previously unknown spy-tool by Lazarus hits financial institutions and research centers |
Crowdstrike Qakbot October 2020
CS. (2020, October 7). Duck Hunting with Falcon Complete: A Fowl Banking Trojan Evolves, Part 2. Retrieved September 27, 2021.
Internal MISP references
UUID 636a9b94-8260-45cc-bd74-a764cd8f50b0
which can be used as unique global reference for Crowdstrike Qakbot October 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-27T00:00:00Z |
date_published | 2020-10-07T00:00:00Z |
source | MITRE |
title | Duck Hunting with Falcon Complete: A Fowl Banking Trojan Evolves, Part 2 |
Dump64.exe - LOLBAS Project
LOLBAS. (2021, November 16). Dump64.exe. Retrieved December 4, 2023.
Internal MISP references
UUID b0186447-a6d5-40d7-a11d-ab2e9fb93087
which can be used as unique global reference for Dump64.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2021-11-16T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Dump64.exe |
dump_pwd_dcsync
Metcalf, S. (2015, November 22). Dump Clear-Text Passwords for All Admins in the Domain Using Mimikatz DCSync. Retrieved November 15, 2021.
Internal MISP references
UUID bd1d7e75-feee-47fd-abfb-7e3dfc648a72
which can be used as unique global reference for dump_pwd_dcsync
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-11-15T00:00:00Z |
date_published | 2015-11-22T00:00:00Z |
source | MITRE |
title | Dump Clear-Text Passwords for All Admins in the Domain Using Mimikatz DCSync |
ired mscache
Mantvydas Baranauskas. (2019, November 16). Dumping and Cracking mscash - Cached Domain Credentials. Retrieved February 21, 2020.
Internal MISP references
UUID 5b643e7d-1ace-4517-88c2-96115cac1209
which can be used as unique global reference for ired mscache
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-02-21T00:00:00Z |
date_published | 2019-11-16T00:00:00Z |
source | MITRE |
title | Dumping and Cracking mscash - Cached Domain Credentials |
ired Dumping LSA Secrets
Mantvydas Baranauskas. (2019, November 16). Dumping LSA Secrets. Retrieved February 21, 2020.
Internal MISP references
UUID cf883397-11e9-4f94-977a-bbe46e3107f5
which can be used as unique global reference for ired Dumping LSA Secrets
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-02-21T00:00:00Z |
date_published | 2019-11-16T00:00:00Z |
source | MITRE |
title | Dumping LSA Secrets |
DumpMinitool.exe - LOLBAS Project
LOLBAS. (2022, January 20). DumpMinitool.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 4634e025-c005-46fe-b97c-5d7dda455ba0
which can be used as unique global reference for DumpMinitool.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2022-01-20T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | DumpMinitool.exe |
DuplicateToken function
Microsoft. (2021, October 12). DuplicateToken function (securitybaseapi.h). Retrieved January 8, 2024.
Internal MISP references
UUID fbf31bc2-7883-56fa-975f-d083288464dc
which can be used as unique global reference for DuplicateToken function
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-01-08T00:00:00Z |
date_published | 2021-10-12T00:00:00Z |
source | MITRE |
title | DuplicateToken function (securitybaseapi.h) |
Wikipedia Duqu
Wikipedia. (2017, December 29). Duqu. Retrieved April 10, 2018.
Internal MISP references
UUID 5cf0101e-c036-4c1c-b322-48f04e2aef0b
which can be used as unique global reference for Wikipedia Duqu
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-04-10T00:00:00Z |
date_published | 2017-12-29T00:00:00Z |
source | MITRE |
title | Duqu |
Dxcap.exe - LOLBAS Project
LOLBAS. (2018, May 25). Dxcap.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 7611eb7a-46b7-4c76-9728-67c1fbf20e17
which can be used as unique global reference for Dxcap.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2018-05-25T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Dxcap.exe |
TheEvilBit DYLD_INSERT_LIBRARIES
Fitzl, C. (2019, July 9). DYLD_INSERT_LIBRARIES DYLIB injection in macOS / OSX. Retrieved March 26, 2020.
Internal MISP references
UUID bd27026c-81eb-480e-b092-f861472ac775
which can be used as unique global reference for TheEvilBit DYLD_INSERT_LIBRARIES
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-03-26T00:00:00Z |
date_published | 2019-07-09T00:00:00Z |
source | MITRE |
title | DYLD_INSERT_LIBRARIES DYLIB injection in macOS / OSX |
Wardle Dylib Hijacking OSX 2015
Patrick Wardle. (2015, March 1). Dylib Hijacking on OS X. Retrieved March 29, 2021.
Internal MISP references
UUID c78d8c94-4fe3-4aa9-b879-f0b0e9d2714b
which can be used as unique global reference for Wardle Dylib Hijacking OSX 2015
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-03-29T00:00:00Z |
date_published | 2015-03-01T00:00:00Z |
source | MITRE |
title | Dylib Hijacking on OS X |
Dragos DYMALLOY
Dragos. (n.d.). DYMALLOY. Retrieved August 20, 2020.
Internal MISP references
UUID d2785c6e-e0d1-4e90-a2d5-2c302176d5d3
which can be used as unique global reference for Dragos DYMALLOY
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-08-20T00:00:00Z |
source | MITRE |
title | DYMALLOY |
MWRInfoSecurity Dynamic Hooking 2015
Hillman, M. (2015, August 8). Dynamic Hooking Techniques: User Mode. Retrieved December 20, 2017.
Internal MISP references
UUID 3cb6d0b1-4d6b-4f2d-bd7d-e4b2dcde081d
which can be used as unique global reference for MWRInfoSecurity Dynamic Hooking 2015
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-20T00:00:00Z |
date_published | 2015-08-08T00:00:00Z |
source | MITRE |
title | Dynamic Hooking Techniques: User Mode |
rfc2131
Droms, R. (1997, March). Dynamic Host Configuration Protocol. Retrieved March 9, 2022.
Internal MISP references
UUID b16bd2d5-162b-44cb-a812-7becd6684021
which can be used as unique global reference for rfc2131
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-03-09T00:00:00Z |
date_published | 1997-03-01T00:00:00Z |
source | MITRE |
title | Dynamic Host Configuration Protocol |
rfc3315
J. Bound, et al. (2003, July). Dynamic Host Configuration Protocol for IPv6 (DHCPv6). Retrieved June 27, 2022.
Internal MISP references
UUID 9349f864-79e9-4481-ad77-44099621795a
which can be used as unique global reference for rfc3315
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-06-27T00:00:00Z |
date_published | 2003-07-01T00:00:00Z |
source | MITRE |
title | Dynamic Host Configuration Protocol for IPv6 (DHCPv6) |
Microsoft DLL Redirection
Microsoft. (n.d.). Dynamic-Link Library Redirection. Retrieved December 5, 2014.
Internal MISP references
UUID ac60bb28-cb14-4ff9-bc05-df48273a28a9
which can be used as unique global reference for Microsoft DLL Redirection
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2014-12-05T00:00:00Z |
source | MITRE |
title | Dynamic-Link Library Redirection |
Microsoft Dynamic-Link Library Redirection
Microsoft. (2018, May 31). Dynamic-Link Library Redirection. Retrieved March 13, 2020.
Internal MISP references
UUID 72458590-ee1b-4447-adb8-ca4f486d1db5
which can be used as unique global reference for Microsoft Dynamic-Link Library Redirection
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-03-13T00:00:00Z |
date_published | 2018-05-31T00:00:00Z |
source | MITRE |
title | Dynamic-Link Library Redirection |
Microsoft DLL Search
Microsoft. (n.d.). Dynamic-Link Library Search Order. Retrieved November 30, 2014.
Internal MISP references
UUID c157444d-bf2b-4806-b069-519122b7a459
which can be used as unique global reference for Microsoft DLL Search
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2014-11-30T00:00:00Z |
source | MITRE |
title | Dynamic-Link Library Search Order |
Microsoft Dynamic Link Library Search Order
Microsoft. (2018, May 31). Dynamic-Link Library Search Order. Retrieved November 30, 2014.
Internal MISP references
UUID 7b1f945b-2547-4bc6-98bf-30248bdf3587
which can be used as unique global reference for Microsoft Dynamic Link Library Search Order
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2014-11-30T00:00:00Z |
date_published | 2018-05-31T00:00:00Z |
source | MITRE |
title | Dynamic-Link Library Search Order |
MSDN DLL Security
Microsoft. (n.d.). Dynamic-Link Library Security. Retrieved July 25, 2016.
Internal MISP references
UUID 5d1d1916-cef4-49d1-b8e2-a6d18fb297f6
which can be used as unique global reference for MSDN DLL Security
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-07-25T00:00:00Z |
source | MITRE |
title | Dynamic-Link Library Security |
Microsoft DLL Security
Microsoft. (n.d.). Dynamic-Link Library Security. Retrieved November 27, 2017.
Internal MISP references
UUID 584490c7-b155-4f62-b68d-a5a2a1799e60
which can be used as unique global reference for Microsoft DLL Security
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-11-27T00:00:00Z |
source | MITRE |
title | Dynamic-Link Library Security |
Microsoft Dynamic-Link Library Security
Microsoft. (n.d.). Dynamic-Link Library Security. Retrieved July 25, 2016.
Internal MISP references
UUID e087442a-0a53-4cc8-9fd6-772cbd0295d5
which can be used as unique global reference for Microsoft Dynamic-Link Library Security
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-07-25T00:00:00Z |
source | MITRE |
title | Dynamic-Link Library Security |
Symantec Dyre June 2015
Symantec Security Response. (2015, June 23). Dyre: Emerging threat on financial fraud landscape. Retrieved August 23, 2018.
Internal MISP references
UUID a9780bb0-302f-44c2-8252-b53d94da24e6
which can be used as unique global reference for Symantec Dyre June 2015
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-08-23T00:00:00Z |
date_published | 2015-06-23T00:00:00Z |
source | MITRE |
title | Dyre: Emerging threat on financial fraud landscape |
EA Hacked via Slack - June 2021
Anthony Spadafora. (2021, June 11). EA hack reportedly used stolen cookies and Slack to target gaming giant. Retrieved May 31, 2022.
Internal MISP references
UUID 3362e1df-cfb9-4281-a0a1-9a3710d76945
which can be used as unique global reference for EA Hacked via Slack - June 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-05-31T00:00:00Z |
date_published | 2021-06-11T00:00:00Z |
source | MITRE |
title | EA hack reportedly used stolen cookies and Slack to target gaming giant |
CrowdStrike StellarParticle January 2022
CrowdStrike. (2022, January 27). Early Bird Catches the Wormhole: Observations from the StellarParticle Campaign. Retrieved February 7, 2022.
Internal MISP references
UUID 149c1446-d6a1-4a63-9420-def9272d6cb9
which can be used as unique global reference for CrowdStrike StellarParticle January 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-02-07T00:00:00Z |
date_published | 2022-01-27T00:00:00Z |
source | MITRE |
title | Early Bird Catches the Wormhole: Observations from the StellarParticle Campaign |
Trend Micro September 9 2024
Lenart Bermejo; Sunny Lu; Ted Lee Read time. (2024, September 9). Earth Preta Evolves its Attacks with New Malware and Strategies. Retrieved September 10, 2024.
Internal MISP references
UUID 0fdc9ee2-5be2-43e0-afb9-c9a94fde3867
which can be used as unique global reference for Trend Micro September 9 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-10T00:00:00Z |
date_published | 2024-09-09T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Earth Preta Evolves its Attacks with New Malware and Strategies |
Trend Micro Muddy Water March 2021
Peretz, A. and Theck, E. (2021, March 5). Earth Vetala – MuddyWater Continues to Target Organizations in the Middle East. Retrieved March 18, 2021.
Internal MISP references
UUID 16b4b834-2f44-4bac-b810-f92080c41f09
which can be used as unique global reference for Trend Micro Muddy Water March 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-03-18T00:00:00Z |
date_published | 2021-03-05T00:00:00Z |
source | MITRE |
title | Earth Vetala – MuddyWater Continues to Target Organizations in the Middle East |
Earthworm English Project Page
rootkiter. (2019, March 9). Earthworm. Retrieved July 7, 2023.
Internal MISP references
UUID 88170ef5-03ac-42f2-9b03-2ce204b5d45c
which can be used as unique global reference for Earthworm English Project Page
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-07-07T00:00:00Z |
date_published | 2019-03-09T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Earthworm |
ESET Ebury May 2024
Marc-Etienne M.Léveillé. (2024, May 1). Ebury is alive but unseen. Retrieved May 21, 2024.
Internal MISP references
UUID 7df9b7ed-ecac-5432-9fc2-8961fc315415
which can be used as unique global reference for ESET Ebury May 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-05-21T00:00:00Z |
date_published | 2024-05-01T00:00:00Z |
source | MITRE |
title | Ebury is alive but unseen |
SEC EDGAR Search
U.S. SEC. (n.d.). EDGAR - Search and Access. Retrieved August 27, 2021.
Internal MISP references
UUID 97958143-80c5-41f6-9fa6-4748e90e9f12
which can be used as unique global reference for SEC EDGAR Search
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-08-27T00:00:00Z |
source | MITRE |
title | EDGAR - Search and Access |
Intrinsec Egregor Nov 2020
Bichet, J. (2020, November 12). Egregor – Prolock: Fraternal Twins ?. Retrieved January 6, 2021.
Internal MISP references
UUID e55604da-b419-411a-85cf-073f2d78e0c1
which can be used as unique global reference for Intrinsec Egregor Nov 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-01-06T00:00:00Z |
date_published | 2020-11-12T00:00:00Z |
source | MITRE |
title | Egregor – Prolock: Fraternal Twins ? |
Cybereason Egregor Nov 2020
Rochberger, L. (2020, November 26). Cybereason vs. Egregor Ransomware. Retrieved December 30, 2020.
Internal MISP references
UUID c36b38d4-cfa2-4f1e-a410-6d629a24be62
which can be used as unique global reference for Cybereason Egregor Nov 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-12-30T00:00:00Z |
source | MITRE |
title | Egregor Ransomware |
Cyble Egregor Oct 2020
Cybleinc. (2020, October 31). Egregor Ransomware – A Deep Dive Into Its Activities and Techniques. Retrieved December 29, 2020.
Internal MISP references
UUID 545a131d-88fc-4b34-923c-0b759b45fc7f
which can be used as unique global reference for Cyble Egregor Oct 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-12-29T00:00:00Z |
date_published | 2020-10-31T00:00:00Z |
source | MITRE |
title | Egregor Ransomware – A Deep Dive Into Its Activities and Techniques |
NHS Digital Egregor Nov 2020
NHS Digital. (2020, November 26). Egregor Ransomware The RaaS successor to Maze. Retrieved December 29, 2020.
Internal MISP references
UUID 92f74037-2a20-4667-820d-2ccc0e4dbd3d
which can be used as unique global reference for NHS Digital Egregor Nov 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-12-29T00:00:00Z |
date_published | 2020-11-26T00:00:00Z |
source | MITRE |
title | Egregor Ransomware The RaaS successor to Maze |
Security Boulevard Egregor Oct 2020
Meskauskas, T.. (2020, October 29). Egregor: Sekhmet’s Cousin. Retrieved January 6, 2021.
Internal MISP references
UUID cd37a000-9e15-45a3-a7c9-bb508c10e55d
which can be used as unique global reference for Security Boulevard Egregor Oct 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-01-06T00:00:00Z |
date_published | 2020-10-29T00:00:00Z |
source | MITRE |
title | Egregor: Sekhmet’s Cousin |
U.S. CISA Trends June 30 2020
Cybersecurity and Infrastructure Security Agency. (2020, June 30). EINSTEIN Data Trends – 30-day Lookback. Retrieved October 25, 2023.
Internal MISP references
UUID b97e9a02-4cc5-4845-8058-0be4c566cd7c
which can be used as unique global reference for U.S. CISA Trends June 30 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-10-25T00:00:00Z |
date_published | 2020-06-30T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | EINSTEIN Data Trends – 30-day Lookback |
Dragos EKANS
Dragos. (2020, February 3). EKANS Ransomware and ICS Operations. Retrieved February 9, 2021.
Internal MISP references
UUID c8a018c5-caa3-4af1-b210-b65bbf94c8b2
which can be used as unique global reference for Dragos EKANS
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-02-09T00:00:00Z |
date_published | 2020-02-03T00:00:00Z |
source | MITRE |
title | EKANS Ransomware and ICS Operations |
Dark Reading July 9 2024
Nathan Eddy; Contributing Writer. (2024, July 9). Eldorado Ransomware Cruises Onto the Scene to Target VMware ESXi. Retrieved July 15, 2024.
Internal MISP references
UUID cec05996-84a1-4c07-86eb-d72f8c6d9362
which can be used as unique global reference for Dark Reading July 9 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-07-15T00:00:00Z |
date_published | 2024-07-09T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Eldorado Ransomware Cruises Onto the Scene to Target VMware ESXi |
Group-IB July 3 2024
Nikolay Kichatov Cyber Intelligence Analyst; Group-IB. (2024, July 3). Eldorado Ransomware The New Golden Empire of Cybercrime . Retrieved July 15, 2024.
Internal MISP references
UUID 50148a85-314c-4b29-bdfc-913ab647dadf
which can be used as unique global reference for Group-IB July 3 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-07-15T00:00:00Z |
date_published | 2024-07-03T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Eldorado Ransomware The New Golden Empire of Cybercrime |
EldoS RawDisk ITpro
Edwards, M. (2007, March 14). EldoS Provides Raw Disk Access for Vista and XP. Retrieved March 26, 2019.
Internal MISP references
UUID a6cf3d1d-2310-42bb-9324-495b4e94d329
which can be used as unique global reference for EldoS RawDisk ITpro
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-03-26T00:00:00Z |
date_published | 2007-03-14T00:00:00Z |
source | MITRE |
title | EldoS Provides Raw Disk Access for Vista and XP |
Microsoft Targeting Elections September 2020
Burt, T. (2020, September 10). New cyberattacks targeting U.S. elections. Retrieved March 24, 2021.
Internal MISP references
UUID 1d7070fd-01be-4776-bb21-13368a6173b1
which can be used as unique global reference for Microsoft Targeting Elections September 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-03-24T00:00:00Z |
source | MITRE, Tidal Cyber |
title | elections |
Secureworks IRON RITUAL USAID Phish May 2021
Secureworks CTU. (2021, May 28). USAID-Themed Phishing Campaign Leverages U.S. Elections Lure. Retrieved February 24, 2022.
Internal MISP references
UUID 0d42c329-5847-4970-9580-2318a566df4e
which can be used as unique global reference for Secureworks IRON RITUAL USAID Phish May 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-02-24T00:00:00Z |
source | MITRE |
title | Elections Lure |
Electron Security
ElectronJS.org. (n.d.). Retrieved March 7, 2024.
Internal MISP references
UUID e44c8abf-77c1-5e19-93e6-99397d7eaa41
which can be used as unique global reference for Electron Security
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-07T00:00:00Z |
source | MITRE |
title | Electron Security |
Dragos-Sandworm-Ukraine-2022
Dragos, Inc.. (2023, December 11). ELECTRUM Targeted Ukrainian Electric Entity Using Custom Tools and CaddyWiper Malware, October 2022. Retrieved March 28, 2024.
Internal MISP references
UUID a17aa1b1-cda4-5aeb-b401-f4fd47d29f93
which can be used as unique global reference for Dragos-Sandworm-Ukraine-2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-28T00:00:00Z |
date_published | 2023-12-11T00:00:00Z |
source | MITRE |
title | ELECTRUM Targeted Ukrainian Electric Entity Using Custom Tools and CaddyWiper Malware, October 2022 |
Dragos ELECTRUM
Dragos. (2017, January 1). ELECTRUM Threat Profile. Retrieved June 10, 2020.
Internal MISP references
UUID 494f7056-7a39-4fa0-958d-fb1172d01852
which can be used as unique global reference for Dragos ELECTRUM
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-06-10T00:00:00Z |
date_published | 2017-01-01T00:00:00Z |
source | MITRE |
title | ELECTRUM Threat Profile |
Symantec Elfin Mar 2019
Security Response attack Investigation Team. (2019, March 27). Elfin: Relentless Espionage Group Targets Multiple Organizations in Saudi Arabia and U.S.. Retrieved April 10, 2019.
Internal MISP references
UUID 55671ede-f309-4924-a1b4-3d597517b27e
which can be used as unique global reference for Symantec Elfin Mar 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-04-10T00:00:00Z |
date_published | 2019-03-27T00:00:00Z |
source | MITRE |
title | Elfin: Relentless Espionage Group Targets Multiple Organizations in Saudi Arabia and U.S. |
Backtrace VDSO
backtrace. (2016, April 22). ELF SHARED LIBRARY INJECTION FORENSICS. Retrieved June 15, 2020.
Internal MISP references
UUID 1c8fa804-6579-4e68-a0b3-d16e0bee5654
which can be used as unique global reference for Backtrace VDSO
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-06-15T00:00:00Z |
date_published | 2016-04-22T00:00:00Z |
source | MITRE |
title | ELF SHARED LIBRARY INJECTION FORENSICS |
Securelist Machete Aug 2014
Kaspersky Global Research and Analysis Team. (2014, August 20). El Machete. Retrieved September 13, 2019.
Internal MISP references
UUID fc7be240-bd15-4ec4-bc01-f8891d7210d9
which can be used as unique global reference for Securelist Machete Aug 2014
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-09-13T00:00:00Z |
date_published | 2014-08-20T00:00:00Z |
source | MITRE, Tidal Cyber |
title | El Machete |
Cylance Machete Mar 2017
The Cylance Threat Research Team. (2017, March 22). El Machete's Malware Attacks Cut Through LATAM. Retrieved September 13, 2019.
Internal MISP references
UUID 92a9a311-1e0b-4819-9856-2dfc8dbfc08d
which can be used as unique global reference for Cylance Machete Mar 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-09-13T00:00:00Z |
date_published | 2017-03-22T00:00:00Z |
source | MITRE, Tidal Cyber |
title | El Machete's Malware Attacks Cut Through LATAM |
Sophos News September 24 2020
Sophos News. (2020, September 24). Email-delivered MoDi RAT attack pastes PowerShell commands. Retrieved May 7, 2023.
Internal MISP references
UUID 8cfa3dc4-a6b4-4204-b1e5-5b325955936d
which can be used as unique global reference for Sophos News September 24 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-07T00:00:00Z |
date_published | 2020-09-24T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Email-delivered MoDi RAT attack pastes PowerShell commands |
Power Automate Email Exfiltration Controls
Microsoft. (2022, February 15). Email exfiltration controls for connectors. Retrieved May 27, 2022.
Internal MISP references
UUID 79eeaadf-5c1e-4608-84a5-6c903966a7f3
which can be used as unique global reference for Power Automate Email Exfiltration Controls
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-05-27T00:00:00Z |
date_published | 2022-02-15T00:00:00Z |
source | MITRE |
title | Email exfiltration controls for connectors |
HackersArise Email
Hackers Arise. (n.d.). Email Scraping and Maltego. Retrieved October 20, 2020.
Internal MISP references
UUID b6aefd99-fd97-4ca0-b717-f9dc147c9413
which can be used as unique global reference for HackersArise Email
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-20T00:00:00Z |
source | MITRE |
title | Email Scraping and Maltego |
Elastic - Koadiac Detection with EQL
Stepanic, D.. (2020, January 13). Embracing offensive tooling: Building detections against Koadic using EQL. Retrieved November 30, 2020.
Internal MISP references
UUID 689b71f4-f8e5-455f-91c2-c599c8650f11
which can be used as unique global reference for Elastic - Koadiac Detection with EQL
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-11-30T00:00:00Z |
date_published | 2020-01-13T00:00:00Z |
source | MITRE |
title | Embracing offensive tooling: Building detections against Koadic using EQL |
Nccgroup Emissary Panda May 2018
Pantazopoulos, N., Henry T. (2018, May 18). Emissary Panda – A potential new malicious tool. Retrieved June 25, 2018.
Internal MISP references
UUID e279c308-fabc-47d3-bdeb-296266c80988
which can be used as unique global reference for Nccgroup Emissary Panda May 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-06-25T00:00:00Z |
date_published | 2018-05-18T00:00:00Z |
source | MITRE |
title | Emissary Panda – A potential new malicious tool |
Unit42 Emissary Panda May 2019
Falcone, R. and Lancaster, T. (2019, May 28). Emissary Panda Attacks Middle East Government Sharepoint Servers. Retrieved July 9, 2019.
Internal MISP references
UUID 3a3ec86c-88da-40ab-8e5f-a7d5102c026b
which can be used as unique global reference for Unit42 Emissary Panda May 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-07-09T00:00:00Z |
date_published | 2019-05-28T00:00:00Z |
source | MITRE |
title | Emissary Panda Attacks Middle East Government Sharepoint Servers |
Emissary Trojan Feb 2016
Falcone, R. and Miller-Osborn, J. (2016, February 3). Emissary Trojan Changelog: Did Operation Lotus Blossom Cause It to Evolve?. Retrieved February 15, 2016.
Internal MISP references
UUID 580ce22f-b76b-4a92-9fab-26ce8f449ab6
which can be used as unique global reference for Emissary Trojan Feb 2016
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-02-15T00:00:00Z |
date_published | 2016-02-03T00:00:00Z |
source | MITRE |
title | Emissary Trojan Changelog: Did Operation Lotus Blossom Cause It to Evolve? |
orangecyberdefense.com August 14 2024
orangecyberdefense.com. (2024, August 14). Emmenhtal a little-known loader distributing commodity infostealers worldwide. Retrieved August 25, 2024.
Internal MISP references
UUID 138a6cd4-36f9-41fd-a724-2b600dc6bf85
which can be used as unique global reference for orangecyberdefense.com August 14 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-08-25T00:00:00Z |
date_published | 2024-08-14T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Emmenhtal a little-known loader distributing commodity infostealers worldwide |
Sophos Emotet Apr 2019
Brandt, A.. (2019, May 5). Emotet 101, stage 4: command and control. Retrieved April 16, 2019.
Internal MISP references
UUID 0bd01e6c-6fb5-4bae-9fe9-395de061c1da
which can be used as unique global reference for Sophos Emotet Apr 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-04-16T00:00:00Z |
date_published | 2019-05-05T00:00:00Z |
source | MITRE |
title | Emotet 101, stage 4: command and control |
Deep Instinct March 10 2023
Deep Instinct. (2023, March 10). Emotet Again! The First Malspam Wave of 2023 | Deep Instinct. Retrieved May 7, 2023.
Internal MISP references
UUID 8016eca2-f702-4081-83ba-06262c29e6c2
which can be used as unique global reference for Deep Instinct March 10 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-07T00:00:00Z |
date_published | 2023-03-10T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Emotet Again! The First Malspam Wave of 2023 |
CIS Emotet Apr 2017
CIS. (2017, April 28). Emotet Changes TTPs and Arrives in United States. Retrieved January 17, 2019.
Internal MISP references
UUID 8dc7653f-84ef-4f0a-91f6-9b10ff50b756
which can be used as unique global reference for CIS Emotet Apr 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-01-17T00:00:00Z |
date_published | 2017-04-28T00:00:00Z |
source | MITRE |
title | Emotet Changes TTPs and Arrives in United States |
Binary Defense Emotes Wi-Fi Spreader
Binary Defense. (n.d.). Emotet Evolves With new Wi-Fi Spreader. Retrieved September 8, 2023.
Internal MISP references
UUID 05e624ee-c53d-5cd1-8fd2-6b2d38344bfd
which can be used as unique global reference for Binary Defense Emotes Wi-Fi Spreader
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-08T00:00:00Z |
source | MITRE |
title | Emotet Evolves With new Wi-Fi Spreader |
ESET Emotet Nov 2018
ESET . (2018, November 9). Emotet launches major new spam campaign. Retrieved March 25, 2019.
Internal MISP references
UUID e954c9aa-4995-452c-927e-11d0a6e2f442
which can be used as unique global reference for ESET Emotet Nov 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-03-25T00:00:00Z |
date_published | 2018-11-09T00:00:00Z |
source | MITRE |
title | Emotet launches major new spam campaign |
emotet_hc3_nov2023
Office of Information Security, Health Sector Cybersecurity Coordination Center. (2023, November 16). Emotet Malware: The Enduring and Persistent Threat to the Health Sector. Retrieved June 19, 2024.
Internal MISP references
UUID 36b41ab3-2a3d-5f5f-86ad-bc4cf810b4ba
which can be used as unique global reference for emotet_hc3_nov2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-06-19T00:00:00Z |
date_published | 2023-11-16T00:00:00Z |
source | MITRE |
title | Emotet Malware: The Enduring and Persistent Threat to the Health Sector |
Trend Micro Emotet 2020
Cybercrime & Digital Threat Team. (2020, February 13). Emotet Now Spreads via Wi-Fi. Retrieved February 16, 2022.
Internal MISP references
UUID 150327e6-db4b-4588-8cf2-ee131569150b
which can be used as unique global reference for Trend Micro Emotet 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-02-16T00:00:00Z |
date_published | 2020-02-13T00:00:00Z |
source | MITRE |
title | Emotet Now Spreads via Wi-Fi |
Talos Emotet Jan 2019
Brumaghin, E.. (2019, January 15). Emotet re-emerges after the holidays. Retrieved March 25, 2019.
Internal MISP references
UUID 83180391-89b6-4431-87f4-2703b47cb81b
which can be used as unique global reference for Talos Emotet Jan 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-03-25T00:00:00Z |
date_published | 2019-01-15T00:00:00Z |
source | MITRE |
title | Emotet re-emerges after the holidays |
Cybersécurité - INTRINSEC January 09 2023
Equipe cti. (2023, January 9). Emotet returns and deploys loaders. Retrieved May 7, 2023.
Internal MISP references
UUID 6d39aba3-ae77-4a95-8242-7dacae8c89d8
which can be used as unique global reference for Cybersécurité - INTRINSEC January 09 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-07T00:00:00Z |
date_published | 2023-01-09T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Emotet returns and deploys loaders |
emotet_trendmicro_mar2023
Kenefick, I. (2023, March 13). Emotet Returns, Now Adopts Binary Padding for Evasion. Retrieved June 19, 2024.
Internal MISP references
UUID 6f9050d9-e960-50dd-86a9-aee5fd100d9c
which can be used as unique global reference for emotet_trendmicro_mar2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-06-19T00:00:00Z |
date_published | 2023-03-13T00:00:00Z |
source | MITRE |
title | Emotet Returns, Now Adopts Binary Padding for Evasion |
Emotet shutdown
The DFIR Report. (2022, November 8). Emotet Strikes Again – LNK File Leads to Domain Wide Ransomware. Retrieved March 6, 2023.
Internal MISP references
UUID 02e6c7bf-f81c-53a3-b771-fd77d4cdb5a0
which can be used as unique global reference for Emotet shutdown
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-06T00:00:00Z |
date_published | 2022-11-08T00:00:00Z |
source | MITRE |
title | Emotet Strikes Again – LNK File Leads to Domain Wide Ransomware |
Carbon Black Emotet Apr 2019
Lee, S.. (2019, April 24). Emotet Using WMI to Launch PowerShell Encoded Code. Retrieved May 24, 2019.
Internal MISP references
UUID db8fe753-d674-4668-9ee5-c1269085a7a1
which can be used as unique global reference for Carbon Black Emotet Apr 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-05-24T00:00:00Z |
date_published | 2019-04-24T00:00:00Z |
source | MITRE |
title | Emotet Using WMI to Launch PowerShell Encoded Code |
DanielManea Emotet May 2017
Manea, D.. (2019, May 25). Emotet v4 Analysis. Retrieved April 16, 2019.
Internal MISP references
UUID 578e44f2-9ff5-4bed-8dee-a992711df8ce
which can be used as unique global reference for DanielManea Emotet May 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-04-16T00:00:00Z |
date_published | 2019-05-25T00:00:00Z |
source | MITRE |
title | Emotet v4 Analysis |
Empire Keychain Decrypt
Empire. (2018, March 8). Empire keychaindump_decrypt Module. Retrieved April 14, 2022.
Internal MISP references
UUID 41075230-73a2-4195-b716-379f9e5ae93b
which can be used as unique global reference for Empire Keychain Decrypt
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-04-14T00:00:00Z |
date_published | 2018-03-08T00:00:00Z |
source | MITRE |
title | Empire keychaindump_decrypt Module |
Github EmpireProject CreateHijacker Dylib
Wardle, P., Ross, C. (2018, April 8). EmpireProject Create Dylib Hijacker. Retrieved April 1, 2021.
Internal MISP references
UUID 2908418d-54cf-4245-92c6-63f616b04e91
which can be used as unique global reference for Github EmpireProject CreateHijacker Dylib
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-04-01T00:00:00Z |
date_published | 2018-04-08T00:00:00Z |
source | MITRE |
title | EmpireProject Create Dylib Hijacker |
Github EmpireProject HijackScanner
Wardle, P., Ross, C. (2017, September 21). Empire Project Dylib Hijack Vulnerability Scanner. Retrieved April 1, 2021.
Internal MISP references
UUID c83e8833-9648-4178-b5be-6fa0af8f737f
which can be used as unique global reference for Github EmpireProject HijackScanner
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-04-01T00:00:00Z |
date_published | 2017-09-21T00:00:00Z |
source | MITRE |
title | Empire Project Dylib Hijack Vulnerability Scanner |
Microsoft ASR Nov 2017
Brower, N. & D'Souza-Wiltshire, I. (2017, November 9). Enable Attack surface reduction. Retrieved February 3, 2018.
Internal MISP references
UUID 1cb445f6-a366-4ae6-a698-53da6c61b4c9
which can be used as unique global reference for Microsoft ASR Nov 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-02-03T00:00:00Z |
date_published | 2017-11-09T00:00:00Z |
source | MITRE |
title | Enable Attack surface reduction |
Microsoft TESTSIGNING Feb 2021
Microsoft. (2021, February 15). Enable Loading of Test Signed Drivers. Retrieved April 22, 2021.
Internal MISP references
UUID c04153f9-d4c7-4349-9bef-3f883eec0028
which can be used as unique global reference for Microsoft TESTSIGNING Feb 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-04-22T00:00:00Z |
date_published | 2021-02-15T00:00:00Z |
source | MITRE |
title | Enable Loading of Test Signed Drivers |
Microsoft Disable DCOM
Microsoft. (n.d.). Enable or Disable DCOM. Retrieved November 22, 2017.
Internal MISP references
UUID 1aeac4da-f5fd-4fa3-9cc0-b1a50427c121
which can be used as unique global reference for Microsoft Disable DCOM
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-11-22T00:00:00Z |
source | MITRE |
title | Enable or Disable DCOM |
Microsoft Disable Macros
Microsoft. (n.d.). Enable or disable macros in Office files. Retrieved September 13, 2018.
Internal MISP references
UUID cfe592a1-c06d-4555-a30f-c5d533dfd73e
which can be used as unique global reference for Microsoft Disable Macros
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-09-13T00:00:00Z |
source | MITRE |
title | Enable or disable macros in Office files |
Microsoft Remote
Microsoft. (n.d.). Enable the Remote Registry Service. Retrieved May 1, 2015.
Internal MISP references
UUID 331d59e3-ce7f-483c-b77d-001c8a9ae1df
which can be used as unique global reference for Microsoft Remote
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2015-05-01T00:00:00Z |
source | MITRE |
title | Enable the Remote Registry Service |
PCMag DoubleExtension
PCMag. (n.d.). Encyclopedia: double extension. Retrieved August 4, 2021.
Internal MISP references
UUID a729519d-8c9f-477c-b992-434076a9d294
which can be used as unique global reference for PCMag DoubleExtension
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-08-04T00:00:00Z |
source | MITRE |
title | Encyclopedia: double extension |
Microsoft Entra ID App Passwords
Microsoft. (2023, October 23). Enforce Microsoft Entra multifactor authentication with legacy applications using app passwords. Retrieved May 28, 2024.
Internal MISP references
UUID 7787289d-f636-5a26-b182-cd1015879007
which can be used as unique global reference for Microsoft Entra ID App Passwords
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-05-28T00:00:00Z |
date_published | 2023-10-23T00:00:00Z |
source | MITRE |
title | Enforce Microsoft Entra multifactor authentication with legacy applications using app passwords |
FireEye Periscope March 2018
FireEye. (2018, March 16). Suspected Chinese Cyber Espionage Group (TEMP.Periscope) Targeting U.S. Engineering and Maritime Industries. Retrieved April 11, 2018.
Internal MISP references
UUID 8edb5d2b-b5c4-4d9d-8049-43dd6ca9ab7f
which can be used as unique global reference for FireEye Periscope March 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-04-11T00:00:00Z |
source | MITRE |
title | Engineering and Maritime Industries |
NCCIC AR-17-20045 February 2017
NCCIC. (2017, February 10). Enhanced Analysis of GRIZZLY STEPPE Activity. Retrieved April 12, 2021.
Internal MISP references
UUID b930e838-649b-42ab-86dc-0443667276de
which can be used as unique global reference for NCCIC AR-17-20045 February 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-04-12T00:00:00Z |
date_published | 2017-02-10T00:00:00Z |
source | MITRE |
title | Enhanced Analysis of GRIZZLY STEPPE Activity |
ESET Sednit Part 1
ESET. (2016, October). En Route with Sednit - Part 1: Approaching the Target. Retrieved November 8, 2016.
Internal MISP references
UUID a2016103-ead7-46b3-bae5-aa97c45a12b7
which can be used as unique global reference for ESET Sednit Part 1
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-11-08T00:00:00Z |
date_published | 2016-10-01T00:00:00Z |
source | MITRE |
title | En Route with Sednit - Part 1: Approaching the Target |
ESET Sednit Part 2
ESET. (2016, October). En Route with Sednit - Part 2: Observing the Comings and Goings. Retrieved November 21, 2016.
Internal MISP references
UUID aefb9eda-df5a-437f-af2a-ec1b6c04628b
which can be used as unique global reference for ESET Sednit Part 2
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-11-21T00:00:00Z |
date_published | 2016-10-01T00:00:00Z |
source | MITRE |
title | En Route with Sednit - Part 2: Observing the Comings and Goings |
ESET Sednit Part 3
ESET. (2016, October). En Route with Sednit - Part 3: A Mysterious Downloader. Retrieved November 21, 2016.
Internal MISP references
UUID 7c2be444-a947-49bc-b5f6-8f6bec870c6a
which can be used as unique global reference for ESET Sednit Part 3
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-11-21T00:00:00Z |
date_published | 2016-10-01T00:00:00Z |
source | MITRE |
title | En Route with Sednit - Part 3: A Mysterious Downloader |
Google Ensuring Your Information is Safe
Google. (2011, June 1). Ensuring your information is safe online. Retrieved April 1, 2022.
Internal MISP references
UUID ad3eda19-08eb-4d59-a2c9-3b5ed8302205
which can be used as unique global reference for Google Ensuring Your Information is Safe
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-04-01T00:00:00Z |
date_published | 2011-06-01T00:00:00Z |
source | MITRE |
title | Ensuring your information is safe online |
Fortinet Blog November 13 2018
Fortinet Blog. (2018, November 13). Enter The DarkGate - New Cryptocurrency Mining and Ransomware Campaign. Retrieved October 20, 2023.
Internal MISP references
UUID 1b9b5c48-d504-4c73-aedc-37e935c47f17
which can be used as unique global reference for Fortinet Blog November 13 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-10-20T00:00:00Z |
date_published | 2018-11-13T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Enter The DarkGate - New Cryptocurrency Mining and Ransomware Campaign |
Ensilo Darkgate 2018
Adi Zeligson & Rotem Kerner. (2018, November 13). Enter The DarkGate - New Cryptocurrency Mining and Ransomware Campaign. Retrieved February 9, 2024.
Internal MISP references
UUID 31796564-4154-54c0-958a-7d6802dfefad
which can be used as unique global reference for Ensilo Darkgate 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-02-09T00:00:00Z |
date_published | 2018-11-13T00:00:00Z |
source | MITRE |
title | Enter The DarkGate - New Cryptocurrency Mining and Ransomware Campaign |
Splunk DarkGate
Splunk Threat Research Team. (2024, January 17). Enter The Gates: An Analysis of the DarkGate AutoIt Loader. Retrieved March 29, 2024.
Internal MISP references
UUID adc6384c-e0d7-547f-a1e3-2c57ff0525ae
which can be used as unique global reference for Splunk DarkGate
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-29T00:00:00Z |
date_published | 2024-01-17T00:00:00Z |
source | MITRE |
title | Enter The Gates: An Analysis of the DarkGate AutoIt Loader |
Splunk DarkGate January 17 2024
Splunk Threat Research Team. (2024, January 17). Enter The Gates: An Analysis of the DarkGate AutoIt Loader. Retrieved January 24, 2024.
Internal MISP references
UUID a45a920c-3bda-4442-8650-4ad78f950283
which can be used as unique global reference for Splunk DarkGate January 17 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-01-24T00:00:00Z |
date_published | 2024-01-17T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Enter The Gates: An Analysis of the DarkGate AutoIt Loader |
Microsoft EnumDeviceDrivers
Microsoft. (2021, October 12). EnumDeviceDrivers function (psapi.h). Retrieved March 28, 2023.
Internal MISP references
UUID 647ffc70-8eab-5f2f-abf4-9bbf42554043
which can be used as unique global reference for Microsoft EnumDeviceDrivers
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-28T00:00:00Z |
date_published | 2021-10-12T00:00:00Z |
source | MITRE |
title | EnumDeviceDrivers function (psapi.h) |
EK Clueless Agents
Riordan, J., Schneier, B. (1998, June 18). Environmental Key Generation towards Clueless Agents. Retrieved January 18, 2019.
Internal MISP references
UUID ef7409d2-af39-4ad8-8469-76f0165687bd
which can be used as unique global reference for EK Clueless Agents
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-01-18T00:00:00Z |
date_published | 1998-06-18T00:00:00Z |
source | MITRE |
title | Environmental Key Generation towards Clueless Agents |
Deloitte Environment Awareness
Torello, A. & Guibernau, F. (n.d.). Environment Awareness. Retrieved September 13, 2024.
Internal MISP references
UUID af842a1f-8f39-4b4f-b4d2-0bbb810e6c31
which can be used as unique global reference for Deloitte Environment Awareness
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-13T00:00:00Z |
source | MITRE |
title | Environment Awareness |
Microsoft Environment Property
Microsoft. (2011, October 24). Environment Property. Retrieved July 27, 2016.
Internal MISP references
UUID 64598969-864d-4bc7-805e-c289cccb7bc6
which can be used as unique global reference for Microsoft Environment Property
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-07-27T00:00:00Z |
date_published | 2011-10-24T00:00:00Z |
source | MITRE |
title | Environment Property |
MSDN Environment Property
Microsoft. (n.d.). Environment Property. Retrieved July 27, 2016.
Internal MISP references
UUID 79ea888c-2dd7-40cb-9149-e2469a35ea3a
which can be used as unique global reference for MSDN Environment Property
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-07-27T00:00:00Z |
source | MITRE |
title | Environment Property |
Kaspersky Equation QA
Kaspersky Lab's Global Research and Analysis Team. (2015, February). Equation Group: Questions and Answers. Retrieved December 21, 2015.
Internal MISP references
UUID 34674802-fbd9-4cdb-8611-c58665c430e5
which can be used as unique global reference for Kaspersky Equation QA
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2015-12-21T00:00:00Z |
date_published | 2015-02-01T00:00:00Z |
source | MITRE, Tidal Cyber |
title | Equation Group: Questions and Answers |
erase_cmd_cisco
Cisco. (2022, August 16). erase - Cisco IOS Configuration Fundamentals Command Reference . Retrieved July 13, 2022.
Internal MISP references
UUID 4c90eba9-118e-5d50-ad58-27bcb0e1e228
which can be used as unique global reference for erase_cmd_cisco
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-07-13T00:00:00Z |
date_published | 2022-08-16T00:00:00Z |
source | MITRE |
title | erase - Cisco IOS Configuration Fundamentals Command Reference |
Container Escape
0xn3va. (n.d.). Escaping. Retrieved May 27, 2022.
Internal MISP references
UUID 8248917a-9afd-4ec6-a086-1a97a68deff1
which can be used as unique global reference for Container Escape
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-05-27T00:00:00Z |
source | MITRE |
title | Escaping |
Microsoft Esentutl
Microsoft. (2016, August 30). Esentutl. Retrieved September 3, 2019.
Internal MISP references
UUID 08fb9e84-495f-4710-bd1e-417eb8191a10
which can be used as unique global reference for Microsoft Esentutl
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-09-03T00:00:00Z |
date_published | 2016-08-30T00:00:00Z |
source | MITRE |
title | Esentutl |
LOLBAS Esentutl
LOLBAS. (n.d.). Esentutl.exe. Retrieved September 3, 2019.
Internal MISP references
UUID 691b4907-3544-4ad0-989c-b5c845e0330f
which can be used as unique global reference for LOLBAS Esentutl
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-09-03T00:00:00Z |
source | MITRE |
title | Esentutl.exe |
ESET APT Activity Report Q4 2023-Q1 2024
ESET Research. (2024, May 14). ESET APT Activity Report Q4 2023-Q1 2024. Retrieved September 1, 2024.
Internal MISP references
UUID 896cc899-b667-4f9d-ba90-8650fb978535
which can be used as unique global reference for ESET APT Activity Report Q4 2023-Q1 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-01T00:00:00Z |
date_published | 2024-05-14T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | ESET APT Activity Report Q4 2023-Q1 2024 |
ESET Twitter Ida Pro Nov 2021
Cherepanov, Anton. (2019, November 10). ESETresearch discovered a trojanized IDA Pro installer. Retrieved September 12, 2024.
Internal MISP references
UUID 6d079207-a7c0-4023-b504-1010dd538221
which can be used as unique global reference for ESET Twitter Ida Pro Nov 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-12T00:00:00Z |
date_published | 2019-11-10T00:00:00Z |
source | MITRE |
title | ESETresearch discovered a trojanized IDA Pro installer |
ESET PowerPool Code October 2020
ESET Research. (2020, October 1). ESET Research Tweet Linking Slothfulmedia and PowerPool. Retrieved September 12, 2024.
Internal MISP references
UUID d583b409-35bd-45ea-8f2a-c0d566a6865b
which can be used as unique global reference for ESET PowerPool Code October 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-12T00:00:00Z |
date_published | 2020-10-01T00:00:00Z |
source | MITRE |
title | ESET Research Tweet Linking Slothfulmedia and PowerPool |
ESET FinFisher Jan 2018
Kafka, F. (2018, January). ESET's Guide to Deobfuscating and Devirtualizing FinFisher. Retrieved August 12, 2019.
Internal MISP references
UUID be169308-19e8-4ee9-8ff6-e08eb9291ef8
which can be used as unique global reference for ESET FinFisher Jan 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-08-12T00:00:00Z |
date_published | 2018-01-01T00:00:00Z |
source | MITRE |
title | ESET's Guide to Deobfuscating and Devirtualizing FinFisher |
ESET Trickbot Oct 2020
Boutin, J. (2020, October 12). ESET takes part in global operation to disrupt Trickbot. Retrieved March 15, 2021.
Internal MISP references
UUID c3320c11-4631-4e02-8025-5c1e5b54e521
which can be used as unique global reference for ESET Trickbot Oct 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-03-15T00:00:00Z |
date_published | 2020-10-12T00:00:00Z |
source | MITRE |
title | ESET takes part in global operation to disrupt Trickbot |
WeLiveSecurity April 19 2022
Jean-Ian Boutin, Tomáš Procházka. (2022, April 19). ESET takes part in global operation to disrupt Zloader botnets | WeLiveSecurity. Retrieved May 10, 2023.
Internal MISP references
UUID f86845b9-03c4-446b-845f-b31b79b247ee
which can be used as unique global reference for WeLiveSecurity April 19 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-10T00:00:00Z |
date_published | 2022-04-19T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | ESET takes part in global operation to disrupt Zloader botnets |
Riskiq Remcos Jan 2018
Klijnsma, Y. (2018, January 23). Espionage Campaign Leverages Spear Phishing, RATs Against Turkish Defense Contractors. Retrieved November 6, 2018.
Internal MISP references
UUID a641a41c-dcd8-47e5-9b29-109dd2eb7f1e
which can be used as unique global reference for Riskiq Remcos Jan 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-11-06T00:00:00Z |
date_published | 2018-01-23T00:00:00Z |
source | MITRE |
title | Espionage Campaign Leverages Spear Phishing, RATs Against Turkish Defense Contractors |
EventLog_Core_Technologies
Core Technologies. (2021, May 24). Essential Windows Services: EventLog / Windows Event Log. Retrieved September 14, 2021.
Internal MISP references
UUID 2a1f452f-57b6-4764-b474-befa7787642d
which can be used as unique global reference for EventLog_Core_Technologies
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-14T00:00:00Z |
date_published | 2021-05-24T00:00:00Z |
source | MITRE |
title | Essential Windows Services: EventLog / Windows Event Log |
ISACA Malware Tricks
Kolbitsch, C. (2017, November 1). Evasive Malware Tricks: How Malware Evades Detection by Sandboxes. Retrieved March 30, 2021.
Internal MISP references
UUID a071bf02-066b-46e6-a554-f43d0c170807
which can be used as unique global reference for ISACA Malware Tricks
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-03-30T00:00:00Z |
date_published | 2017-11-01T00:00:00Z |
source | MITRE |
title | Evasive Malware Tricks: How Malware Evades Detection by Sandboxes |
ThreatStream Evasion Analysis
Shelmire, A.. (2015, July 6). Evasive Maneuvers. Retrieved January 22, 2016.
Internal MISP references
UUID de6bc044-6275-4cab-80a1-feefebd3c1f0
which can be used as unique global reference for ThreatStream Evasion Analysis
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-01-22T00:00:00Z |
date_published | 2015-07-06T00:00:00Z |
source | MITRE |
title | Evasive Maneuvers |
Anomali Evasive Maneuvers July 2015
Shelmire, A. (2015, July 06). Evasive Maneuvers by the Wekby group with custom ROP-packing and DNS covert channels. Retrieved November 15, 2018.
Internal MISP references
UUID 471ae30c-2753-468e-8e4d-6e7a3be599c9
which can be used as unique global reference for Anomali Evasive Maneuvers July 2015
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-11-15T00:00:00Z |
date_published | 2015-07-06T00:00:00Z |
source | MITRE |
title | Evasive Maneuvers by the Wekby group with custom ROP-packing and DNS covert channels |
ESET EvasivePanda 2023
Facundo Muñoz. (2023, April 26). Evasive Panda APT group delivers malware via updates for popular Chinese software. Retrieved July 25, 2024.
Internal MISP references
UUID 08026c7e-cc35-5d51-9536-a02febd1a891
which can be used as unique global reference for ESET EvasivePanda 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-07-25T00:00:00Z |
date_published | 2023-04-26T00:00:00Z |
source | MITRE |
title | Evasive Panda APT group delivers malware via updates for popular Chinese software |
ESET EvasivePanda 2024
Ahn Ho, Facundo Muñoz, & Marc-Etienne M.Léveillé. (2024, March 7). Evasive Panda leverages Monlam Festival to target Tibetans. Retrieved July 25, 2024.
Internal MISP references
UUID 07e6b866-7119-50ad-8a6e-80c4e0d594bf
which can be used as unique global reference for ESET EvasivePanda 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-07-25T00:00:00Z |
date_published | 2024-03-07T00:00:00Z |
source | MITRE |
title | Evasive Panda leverages Monlam Festival to target Tibetans |
Unit42 OilRig Playbook 2023
Unit42. (2016, May 1). Evasive Serpens Unit 42 Playbook Viewer. Retrieved February 6, 2023.
Internal MISP references
UUID e38902bb-9bab-5beb-817b-668a67a76541
which can be used as unique global reference for Unit42 OilRig Playbook 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-02-06T00:00:00Z |
date_published | 2016-05-01T00:00:00Z |
source | MITRE |
title | Evasive Serpens Unit 42 Playbook Viewer |
Microsoft EventLog.Clear
Microsoft. (n.d.). EventLog.Clear Method (). Retrieved July 2, 2018.
Internal MISP references
UUID b2711ad3-981c-4c77-bb64-643b547bfda6
which can be used as unique global reference for Microsoft EventLog.Clear
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-07-02T00:00:00Z |
source | MITRE |
title | EventLog.Clear Method () |
evt_log_tampering
svch0st. (2020, September 30). Event Log Tampering Part 1: Disrupting the EventLog Service. Retrieved September 14, 2021.
Internal MISP references
UUID 7757bbc6-8058-4584-a5aa-14b647d932a6
which can be used as unique global reference for evt_log_tampering
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-14T00:00:00Z |
date_published | 2020-09-30T00:00:00Z |
source | MITRE |
title | Event Log Tampering Part 1: Disrupting the EventLog Service |
Microsoft ETW May 2018
Microsoft. (2018, May 30). Event Tracing. Retrieved September 6, 2018.
Internal MISP references
UUID 876f8690-1874-41c0-bd38-d3bd41c96acc
which can be used as unique global reference for Microsoft ETW May 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-09-06T00:00:00Z |
date_published | 2018-05-30T00:00:00Z |
source | MITRE |
title | Event Tracing |
Eventvwr.exe - LOLBAS Project
LOLBAS. (2018, November 1). Eventvwr.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 0c09812a-a936-4282-b574-35a00f631857
which can be used as unique global reference for Eventvwr.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2018-11-01T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Eventvwr.exe |
Secure Ideas SMB Relay
Kuehn, E. (2018, April 11). Ever Run a Relay? Why SMB Relays Should Be On Your Mind. Retrieved February 7, 2019.
Internal MISP references
UUID ac4b2e91-f338-44c3-8950-435102136991
which can be used as unique global reference for Secure Ideas SMB Relay
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-02-07T00:00:00Z |
date_published | 2018-04-11T00:00:00Z |
source | MITRE |
title | Ever Run a Relay? Why SMB Relays Should Be On Your Mind |
CSV Excel Macro Injection
Ishaq Mohammed . (2021, January 10). Everything about CSV Injection and CSV Excel Macro Injection. Retrieved February 7, 2022.
Internal MISP references
UUID 22c871ff-2701-4809-9f5b-fb29da7481e8
which can be used as unique global reference for CSV Excel Macro Injection
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-02-07T00:00:00Z |
date_published | 2021-01-10T00:00:00Z |
source | MITRE |
title | Everything about CSV Injection and CSV Excel Macro Injection |
Avertium callback phishing
Avertium. (n.d.). EVERYTHING YOU NEED TO KNOW ABOUT CALLBACK PHISHING. Retrieved February 2, 2023.
Internal MISP references
UUID abeb1146-e5e5-5ecc-9b70-b348fba097f6
which can be used as unique global reference for Avertium callback phishing
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-02-02T00:00:00Z |
source | MITRE |
title | EVERYTHING YOU NEED TO KNOW ABOUT CALLBACK PHISHING |
Outpost24 April 5 2023
Alberto MarÃn. (2023, April 5). Everything you need to know about the LummaC2 stealer Leveraging IDA Python and Unicorn to deobfuscate Windows API hashing. Retrieved October 10, 2024.
Internal MISP references
UUID 60bd2e39-744c-44e7-b417-0ef0a768f7b6
which can be used as unique global reference for Outpost24 April 5 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-10-10T00:00:00Z |
date_published | 2023-04-05T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Everything you need to know about the LummaC2 stealer Leveraging IDA Python and Unicorn to deobfuscate Windows API hashing |
Intezer Aurora Sept 2017
Rosenberg, J. (2017, September 20). Evidence Aurora Operation Still Active: Supply Chain Attack Through CCleaner. Retrieved February 13, 2018.
Internal MISP references
UUID b2999bd7-50d5-4d49-8893-8c0903d49104
which can be used as unique global reference for Intezer Aurora Sept 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-02-13T00:00:00Z |
date_published | 2017-09-20T00:00:00Z |
source | MITRE |
title | Evidence Aurora Operation Still Active: Supply Chain Attack Through CCleaner |
Cyphort EvilBunny Dec 2014
Marschalek, M.. (2014, December 16). EvilBunny: Malware Instrumented By Lua. Retrieved June 28, 2019.
Internal MISP references
UUID a0218d0f-3378-4508-9d3c-a7cd3e00a156
which can be used as unique global reference for Cyphort EvilBunny Dec 2014
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-06-28T00:00:00Z |
date_published | 2014-12-16T00:00:00Z |
source | MITRE |
title | EvilBunny: Malware Instrumented By Lua |
Cyphort EvilBunny
Marschalek, Marion. (2014, December 16). EvilBunny: Malware Instrumented By Lua. Retrieved August 5, 2024.
Internal MISP references
UUID 21536444-7287-55f7-8e11-c97dcb85398d
which can be used as unique global reference for Cyphort EvilBunny
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-08-05T00:00:00Z |
date_published | 2014-12-16T00:00:00Z |
source | MITRE |
title | EvilBunny: Malware Instrumented By Lua |
Evil Clippy May 2019
Hegt, S. (2019, May 5). Evil Clippy: MS Office maldoc assistant. Retrieved September 17, 2020.
Internal MISP references
UUID aafa27e8-5df7-4fc6-9fe5-9a438f2b507a
which can be used as unique global reference for Evil Clippy May 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-09-17T00:00:00Z |
date_published | 2019-05-05T00:00:00Z |
source | MITRE |
title | Evil Clippy: MS Office maldoc assistant |
Cyble August 19 2022
Cybleinc. (2022, August 19). EvilCoder Project Selling Multiple Dangerous Tools Online. Retrieved May 10, 2023.
Internal MISP references
UUID 7b5617f8-5d0d-4185-97c7-82acf023f3c3
which can be used as unique global reference for Cyble August 19 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-10T00:00:00Z |
date_published | 2022-08-19T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | EvilCoder Project Selling Multiple Dangerous Tools Online |
Evilginx 2 July 2018
Gretzky, K.. (2018, July 26). Evilginx 2 - Next Generation of Phishing 2FA Tokens. Retrieved October 14, 2019.
Internal MISP references
UUID 9099b5aa-25eb-4cb7-9e3a-da4c3244f15a
which can be used as unique global reference for Evilginx 2 July 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-10-14T00:00:00Z |
date_published | 2018-07-26T00:00:00Z |
source | MITRE |
title | Evilginx 2 - Next Generation of Phishing 2FA Tokens |
Evilginx Sources & Methods December 2023
Matthew Conway. (2023, December 14). Evilginx Phishing Proxy. Retrieved January 3, 2023.
Internal MISP references
UUID 13bdabb2-5956-492a-baf9-b0c3a0629806
which can be used as unique global reference for Evilginx Sources & Methods December 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-01-03T00:00:00Z |
date_published | 2023-12-14T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Evilginx Phishing Proxy |
SentinelOne EvilQuest Ransomware Spyware 2020
Phil Stokes. (2020, July 8). “EvilQuest” Rolls Ransomware, Spyware & Data Theft Into One. Retrieved April 1, 2021.
Internal MISP references
UUID 4dc26c77-d0ce-4836-a4cc-0490b6d7f115
which can be used as unique global reference for SentinelOne EvilQuest Ransomware Spyware 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-04-01T00:00:00Z |
date_published | 2020-07-08T00:00:00Z |
source | MITRE |
title | “EvilQuest” Rolls Ransomware, Spyware & Data Theft Into One |
Kaspersky evil twin
AO Kaspersky Lab. (n.d.). Evil twin attacks and how to prevent them. Retrieved September 17, 2024.
Internal MISP references
UUID 230f15c3-79dd-5272-88b5-e9d5de9556f1
which can be used as unique global reference for Kaspersky evil twin
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-17T00:00:00Z |
source | MITRE |
title | Evil twin attacks and how to prevent them |
Cisco Synful Knock Evolution
Graham Holmes. (2015, October 8). Evolution of attacks on Cisco IOS devices. Retrieved October 19, 2020.
Internal MISP references
UUID 29301297-8343-4f75-8096-7fe229812f75
which can be used as unique global reference for Cisco Synful Knock Evolution
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-19T00:00:00Z |
date_published | 2015-10-08T00:00:00Z |
source | MITRE |
title | Evolution of attacks on Cisco IOS devices |
SCILabs URSA/Mispadu Evolution 2023
SCILabs. (2023, May 23). Evolution of banking trojan URSA/Mispadu. Retrieved March 13, 2024.
Internal MISP references
UUID a7a0db8d-bc1c-5e89-8c42-a3a6cc2cf28d
which can be used as unique global reference for SCILabs URSA/Mispadu Evolution 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-13T00:00:00Z |
date_published | 2023-05-23T00:00:00Z |
source | MITRE |
title | Evolution of banking trojan URSA/Mispadu |
Securelist JSWorm
Fedor Sinitsyn. (2021, May 25). Evolution of JSWorm Ransomware. Retrieved August 18, 2021.
Internal MISP references
UUID c29ca9f2-1e48-4913-b10b-15e558868ed8
which can be used as unique global reference for Securelist JSWorm
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-08-18T00:00:00Z |
date_published | 2021-05-25T00:00:00Z |
source | MITRE |
title | Evolution of JSWorm Ransomware |
S2 Grupo TrickBot June 2017
Salinas, M., Holguin, J. (2017, June). Evolution of Trickbot. Retrieved July 31, 2018.
Internal MISP references
UUID 28faff77-3e68-4f5c-974d-dc7c9d06ce5e
which can be used as unique global reference for S2 Grupo TrickBot June 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-07-31T00:00:00Z |
date_published | 2017-06-01T00:00:00Z |
source | MITRE |
title | Evolution of Trickbot |
Unit 42 Valak July 2020
Duncan, B. (2020, July 24). Evolution of Valak, from Its Beginnings to Mass Distribution. Retrieved August 31, 2020.
Internal MISP references
UUID 9a96da13-5795-49bc-ab82-dfd4f964d9d0
which can be used as unique global reference for Unit 42 Valak July 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-08-31T00:00:00Z |
date_published | 2020-07-24T00:00:00Z |
source | MITRE |
title | Evolution of Valak, from Its Beginnings to Mass Distribution |
Microsoft - Device Registration
Microsoft 365 Defender Threat Intelligence Team. (2022, January 26). Evolved phishing: Device registration trick adds to phishers’ toolbox for victims without MFA. Retrieved March 4, 2022.
Internal MISP references
UUID 3f42fc18-2adc-46ef-ae0a-c2d530518435
which can be used as unique global reference for Microsoft - Device Registration
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-03-04T00:00:00Z |
date_published | 2022-01-26T00:00:00Z |
source | MITRE |
title | Evolved phishing: Device registration trick adds to phishers’ toolbox for victims without MFA |
Amnesty OAuth Phishing Attacks, August 2019
Amnesty International. (2019, August 16). Evolving Phishing Attacks Targeting Journalists and Human Rights Defenders from the Middle-East and North Africa. Retrieved October 8, 2019.
Internal MISP references
UUID 0b0f9cf6-f0af-4f86-9699-a63ff36c49e2
which can be used as unique global reference for Amnesty OAuth Phishing Attacks, August 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-10-08T00:00:00Z |
date_published | 2019-08-16T00:00:00Z |
source | MITRE |
title | Evolving Phishing Attacks Targeting Journalists and Human Rights Defenders from the Middle-East and North Africa |
RSAC 2015 Abu Dhabi Stefano Maccaglia
Maccaglia, S. (2015, November 4). Evolving Threats: dissection of a CyberEspionage attack. Retrieved April 4, 2018.
Internal MISP references
UUID a6cb597e-e25b-4f49-bbb0-d270b1ac53f2
which can be used as unique global reference for RSAC 2015 Abu Dhabi Stefano Maccaglia
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-04-04T00:00:00Z |
date_published | 2015-11-04T00:00:00Z |
source | MITRE |
title | Evolving Threats: dissection of a CyberEspionage attack |
Microsoft Iranian Threat Actor Trends November 2021
MSTIC. (2021, November 16). Evolving trends in Iranian threat actor activity – MSTIC presentation at CyberWarCon 2021. Retrieved January 12, 2023.
Internal MISP references
UUID 78d39ee7-1cd5-5cb8-844a-1c3649e367a1
which can be used as unique global reference for Microsoft Iranian Threat Actor Trends November 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-01-12T00:00:00Z |
date_published | 2021-11-16T00:00:00Z |
source | MITRE |
title | Evolving trends in Iranian threat actor activity – MSTIC presentation at CyberWarCon 2021 |
Palo Alto Unit 42 VBA Infostealer 2014
Vicky Ray and Rob Downs. (2014, October 29). Examining a VBA-Initiated Infostealer Campaign. Retrieved March 13, 2023.
Internal MISP references
UUID c3eccab6-b12b-513a-9a04-396f7b3dcf63
which can be used as unique global reference for Palo Alto Unit 42 VBA Infostealer 2014
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-13T00:00:00Z |
date_published | 2014-10-29T00:00:00Z |
source | MITRE |
title | Examining a VBA-Initiated Infostealer Campaign |
Trend Micro Black Basta May 2022
Gonzalez, I., Chavez I., et al. (2022, May 9). Examining the Black Basta Ransomware’s Infection Routine. Retrieved March 7, 2023.
Internal MISP references
UUID b0351b0a-112f-543f-8909-f4b4a9f23e2e
which can be used as unique global reference for Trend Micro Black Basta May 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-07T00:00:00Z |
date_published | 2022-05-09T00:00:00Z |
source | MITRE |
title | Examining the Black Basta Ransomware’s Infection Routine |
Mandiant Glyer APT 2010
Glyer, C. (2010). Examples of Recent APT Persistence Mechanism. Retrieved December 18, 2020.
Internal MISP references
UUID bb336a6f-d76e-4535-ba81-0c7932ae91e3
which can be used as unique global reference for Mandiant Glyer APT 2010
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-12-18T00:00:00Z |
date_published | 2010-01-01T00:00:00Z |
source | MITRE |
title | Examples of Recent APT Persistence Mechanism |
Excel.exe - LOLBAS Project
LOLBAS. (2019, July 19). Excel.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 9a2458f7-63ca-4eca-8c61-b6098ec0798f
which can be used as unique global reference for Excel.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2019-07-19T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Excel.exe |
Microsoft Tim McMichael Exchange Mail Forwarding 2
McMichael, T.. (2015, June 8). Exchange and Office 365 Mail Forwarding. Retrieved October 8, 2019.
Internal MISP references
UUID b5bf8e12-0133-46ea-85e3-b48c9901b518
which can be used as unique global reference for Microsoft Tim McMichael Exchange Mail Forwarding 2
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-10-08T00:00:00Z |
date_published | 2015-06-08T00:00:00Z |
source | MITRE |
title | Exchange and Office 365 Mail Forwarding |
DFIR Phosphorus November 2021
DFIR Report. (2021, November 15). Exchange Exploit Leads to Domain Wide Ransomware. Retrieved January 5, 2023.
Internal MISP references
UUID 0156d408-a36d-5876-96fd-f0b0cf296ea2
which can be used as unique global reference for DFIR Phosphorus November 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-01-05T00:00:00Z |
date_published | 2021-11-15T00:00:00Z |
source | MITRE |
title | Exchange Exploit Leads to Domain Wide Ransomware |
Mandiant UNC2596 Cuba Ransomware February 2022
Tyler McLellan, Joshua Shilko, Shambavi Sadayappan. (2022, February 23). (Ex)Change of Pace: UNC2596 Observed Leveraging Vulnerabilities to Deploy Cuba Ransomware. Retrieved May 19, 2023.
Internal MISP references
UUID c03c0f35-3b86-4733-8a2c-71524f0e3d17
which can be used as unique global reference for Mandiant UNC2596 Cuba Ransomware February 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-19T00:00:00Z |
date_published | 2022-02-23T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | (Ex)Change of Pace: UNC2596 Observed Leveraging Vulnerabilities to Deploy Cuba Ransomware |
ExchangePowerShell Module
Microsoft. (2017, September 25). ExchangePowerShell. Retrieved June 10, 2022.
Internal MISP references
UUID 8af67c2a-15e2-48c9-9ec2-b62ffca0f677
which can be used as unique global reference for ExchangePowerShell Module
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-06-10T00:00:00Z |
date_published | 2017-09-25T00:00:00Z |
source | MITRE |
title | ExchangePowerShell |
ESET Exchange Mar 2021
Faou, M., Tartare, M., Dupuy, T. (2021, March 10). Exchange servers under siege from at least 10 APT groups. Retrieved May 21, 2021.
Internal MISP references
UUID c83f1810-22bb-4def-ab2f-3f3d67703f47
which can be used as unique global reference for ESET Exchange Mar 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-05-21T00:00:00Z |
date_published | 2021-03-10T00:00:00Z |
source | MITRE, Tidal Cyber |
title | Exchange servers under siege from at least 10 APT groups |
Executable Installers are Vulnerable
Stefan Kanthak. (2015, December 8). Executable installers are vulnerable^WEVIL (case 7): 7z*.exe allows remote code execution with escalation of privilege. Retrieved December 4, 2014.
Internal MISP references
UUID 5c2791d4-556d-426a-b305-44e23b50f013
which can be used as unique global reference for Executable Installers are Vulnerable
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2014-12-04T00:00:00Z |
date_published | 2015-12-08T00:00:00Z |
source | MITRE |
title | Executable installers are vulnerable^WEVIL (case 7): 7z*.exe allows remote code execution with escalation of privilege |
Seclists Kanthak 7zip Installer
Kanthak, S. (2015, December 8). Executable installers are vulnerable^WEVIL (case 7): 7z*.exe allows remote code execution with escalation of privilege. Retrieved March 10, 2017.
Internal MISP references
UUID f2ebfc35-1bd9-4bc5-8a54-e2dea4e1caf5
which can be used as unique global reference for Seclists Kanthak 7zip Installer
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-03-10T00:00:00Z |
date_published | 2015-12-08T00:00:00Z |
source | MITRE |
title | Executable installers are vulnerable^WEVIL (case 7): 7z*.exe allows remote code execution with escalation of privilege |
Redxorblue Remote Template Injection
Hawkins, J. (2018, July 18). Executing Macros From a DOCX With Remote Template Injection. Retrieved October 12, 2018.
Internal MISP references
UUID bce1cd78-b55e-40cf-8a90-64240db867ac
which can be used as unique global reference for Redxorblue Remote Template Injection
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-10-12T00:00:00Z |
date_published | 2018-07-18T00:00:00Z |
source | MITRE |
title | Executing Macros From a DOCX With Remote Template Injection |
Microsoft PSfromCsharp APR 2014
Babinec, K. (2014, April 28). Executing PowerShell scripts from C#. Retrieved April 22, 2019.
Internal MISP references
UUID 83e346d5-1894-4c46-98eb-88a61ce7f003
which can be used as unique global reference for Microsoft PSfromCsharp APR 2014
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-04-22T00:00:00Z |
date_published | 2014-04-28T00:00:00Z |
source | MITRE |
title | Executing PowerShell scripts from C# |
PAM Creds
Fernández, J. M. (2018, June 27). Exfiltrating credentials via PAM backdoors & DNS requests. Retrieved June 26, 2020.
Internal MISP references
UUID aa9d5bdd-2102-4322-8736-56db8e083fc0
which can be used as unique global reference for PAM Creds
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-06-26T00:00:00Z |
date_published | 2018-06-27T00:00:00Z |
source | MITRE |
title | Exfiltrating credentials via PAM backdoors & DNS requests |
Microsoft Expand Utility
Microsoft. (2017, October 15). Expand. Retrieved February 19, 2019.
Internal MISP references
UUID bf73a375-87b7-4603-8734-9f3d8d11967e
which can be used as unique global reference for Microsoft Expand Utility
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-02-19T00:00:00Z |
date_published | 2017-10-15T00:00:00Z |
source | MITRE |
title | Expand |
LOLBAS Expand
LOLBAS. (n.d.). Expand.exe. Retrieved February 19, 2019.
Internal MISP references
UUID 689b058e-a4ec-45bf-b0f8-8885eb8d8b63
which can be used as unique global reference for LOLBAS Expand
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-02-19T00:00:00Z |
source | MITRE |
title | Expand.exe |
polymorphic-medium
Shellseekercyber. (2024, January 7). Explainer: Packed Malware. Retrieved September 27, 2024.
Internal MISP references
UUID f7ffa0ee-80d4-5ed8-a432-23a33cbf2752
which can be used as unique global reference for polymorphic-medium
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-27T00:00:00Z |
date_published | 2024-01-07T00:00:00Z |
source | MITRE |
title | Explainer: Packed Malware |
Proofpoint WinterVivern 2023
Michael Raggi & The Proofpoint Threat Research Team. (2023, March 30). Exploitation is a Dish Best Served Cold: Winter Vivern Uses Known Zimbra Vulnerability to Target Webmail Portals of NATO-Aligned Governments in Europe. Retrieved July 29, 2024.
Internal MISP references
UUID 45f638af-ad10-566e-9e4d-49385a79022f
which can be used as unique global reference for Proofpoint WinterVivern 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-07-29T00:00:00Z |
date_published | 2023-03-30T00:00:00Z |
source | MITRE |
title | Exploitation is a Dish Best Served Cold: Winter Vivern Uses Known Zimbra Vulnerability to Target Webmail Portals of NATO-Aligned Governments in Europe |
Mandiant CVE-2023-3519 Exploitation
James Nugent, Foti Castelan, Doug Bienstock, Justin Moore, Josh Murchie. (2023, July 21). Exploitation of Citrix Zero-Day by Possible Espionage Actors (CVE-2023-3519). Retrieved July 24, 2023.
Internal MISP references
UUID 4404ed65-3020-453d-8c51-2885018ba03b
which can be used as unique global reference for Mandiant CVE-2023-3519 Exploitation
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-07-24T00:00:00Z |
date_published | 2023-07-21T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Exploitation of Citrix Zero-Day by Possible Espionage Actors (CVE-2023-3519) |
Exploit Database
Offensive Security. (n.d.). Exploit Database. Retrieved October 15, 2020.
Internal MISP references
UUID 38f7b3ea-9959-4dfb-8216-a745d071e7e2
which can be used as unique global reference for Exploit Database
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-15T00:00:00Z |
source | MITRE |
title | Exploit Database |
Rhino Labs Cloud Image Backdoor Technique Sept 2019
Rhino Labs. (2019, August). Exploiting AWS ECR and ECS with the Cloud Container Attack Tool (CCAT). Retrieved September 12, 2019.
Internal MISP references
UUID 8fb46ed8-0c21-4b57-b2a6-89cb28f0abaf
which can be used as unique global reference for Rhino Labs Cloud Image Backdoor Technique Sept 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-09-12T00:00:00Z |
date_published | 2019-08-01T00:00:00Z |
source | MITRE |
title | Exploiting AWS ECR and ECS with the Cloud Container Attack Tool (CCAT) |
Azure AD PTA Vulnerabilities
Dr. Nestori Syynimaa. (2022, September 20). Exploiting Azure AD PTA vulnerabilities: Creating backdoor and harvesting credentials. Retrieved September 28, 2022.
Internal MISP references
UUID a0ddb60b-5445-46b3-94c5-b47e76de553d
which can be used as unique global reference for Azure AD PTA Vulnerabilities
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-09-28T00:00:00Z |
date_published | 2022-09-20T00:00:00Z |
source | MITRE |
title | Exploiting Azure AD PTA vulnerabilities: Creating backdoor and harvesting credentials |
Exploiting Smartphone USB
Zhaohui Wang & Angelos Stavrou. (n.d.). Exploiting Smart-Phone USB Connectivity For Fun And Profit. Retrieved May 25, 2022.
Internal MISP references
UUID 573796bd-4553-4ae1-884a-9af71b5de873
which can be used as unique global reference for Exploiting Smartphone USB
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-05-25T00:00:00Z |
source | MITRE |
title | Exploiting Smart-Phone USB Connectivity For Fun And Profit |
versprite xpc vpn
VerSprite. (2018, January 24). Exploiting VyprVPN for MacOS. Retrieved April 20, 2022.
Internal MISP references
UUID 5e65d8cc-142b-4724-8a07-8e21558e0f64
which can be used as unique global reference for versprite xpc vpn
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-04-20T00:00:00Z |
date_published | 2018-01-24T00:00:00Z |
source | MITRE |
title | Exploiting VyprVPN for MacOS |
Explorer.exe - LOLBAS Project
LOLBAS. (2020, June 24). Explorer.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 9ba3d54c-02d1-45bd-bfe8-939e84d9d44b
which can be used as unique global reference for Explorer.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2020-06-24T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Explorer.exe |
Palo Alto Unit 42 Google Workspace Domain Wide Delegation 2023
Zohar Zigdon. (2023, November 30). Exploring a Critical Risk in Google Workspace's Domain-Wide Delegation Feature. Retrieved January 16, 2024.
Internal MISP references
UUID cd76910f-1c15-50fb-a942-f19b6cc1ca69
which can be used as unique global reference for Palo Alto Unit 42 Google Workspace Domain Wide Delegation 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-01-16T00:00:00Z |
date_published | 2023-11-30T00:00:00Z |
source | MITRE |
title | Exploring a Critical Risk in Google Workspace's Domain-Wide Delegation Feature |
Trend Micro Emotet Jan 2019
Trend Micro. (2019, January 16). Exploring Emotet's Activities . Retrieved March 25, 2019.
Internal MISP references
UUID a81f1dad-5841-4142-80c1-483b240fd67d
which can be used as unique global reference for Trend Micro Emotet Jan 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-03-25T00:00:00Z |
date_published | 2019-01-16T00:00:00Z |
source | MITRE |
title | Exploring Emotet's Activities |
SecurityTrails Google Hacking
Borges, E. (2019, March 5). Exploring Google Hacking Techniques. Retrieved September 12, 2024.
Internal MISP references
UUID 3e7fdeaf-24a7-4cb5-8ed3-6057c9035303
which can be used as unique global reference for SecurityTrails Google Hacking
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-12T00:00:00Z |
date_published | 2019-03-05T00:00:00Z |
source | MITRE |
title | Exploring Google Hacking Techniques |
Medium SSL Cert
Jain, M. (2019, September 16). Export & Download — SSL Certificate from Server (Site URL). Retrieved October 20, 2020.
Internal MISP references
UUID 6502425f-3435-4162-8c96-9e10a789d362
which can be used as unique global reference for Medium SSL Cert
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-20T00:00:00Z |
date_published | 2019-09-16T00:00:00Z |
source | MITRE |
title | Export & Download — SSL Certificate from Server (Site URL) |
TrendMicro Exposed Redis 2020
David Fiser and Jaromir Horejsi. (2020, April 21). Exposed Redis Instances Abused for Remote Code Execution, Cryptocurrency Mining. Retrieved September 25, 2024.
Internal MISP references
UUID 58e61406-a8ca-52a8-be48-ef6066619a8a
which can be used as unique global reference for TrendMicro Exposed Redis 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-25T00:00:00Z |
date_published | 2020-04-21T00:00:00Z |
source | MITRE |
title | Exposed Redis Instances Abused for Remote Code Execution, Cryptocurrency Mining |
Magnet Forensics
Magnet Forensics. (2020, August 24). Expose Evidence of Timestomping with the NTFS Timestamp Mismatch Artifact. Retrieved June 20, 2024.
Internal MISP references
UUID 3971c8ac-4fdd-5e19-ac8a-b8d7abbaebe3
which can be used as unique global reference for Magnet Forensics
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-06-20T00:00:00Z |
date_published | 2020-08-24T00:00:00Z |
source | MITRE |
title | Expose Evidence of Timestomping with the NTFS Timestamp Mismatch Artifact |
Google EXOTIC LILY March 2022
Stolyarov, V. (2022, March 17). Exposing initial access broker with ties to Conti. Retrieved August 18, 2022.
Internal MISP references
UUID 19d2cb48-bdb2-41fe-ba24-0769d7bd4d94
which can be used as unique global reference for Google EXOTIC LILY March 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-08-18T00:00:00Z |
date_published | 2022-03-17T00:00:00Z |
source | MITRE |
title | Exposing initial access broker with ties to Conti |
Microsoft POLONIUM June 2022
Microsoft. (2022, June 2). Exposing POLONIUM activity and infrastructure targeting Israeli organizations. Retrieved July 1, 2022.
Internal MISP references
UUID 689ff1ab-9fed-4aa2-8e5e-78dac31e6fbd
which can be used as unique global reference for Microsoft POLONIUM June 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-07-01T00:00:00Z |
date_published | 2022-06-02T00:00:00Z |
source | MITRE |
title | Exposing POLONIUM activity and infrastructure targeting Israeli organizations |
External to DA, the OS X Way
Alex Rymdeko-Harvey, Steve Borosh. (2016, May 14). External to DA, the OS X Way. Retrieved September 12, 2024.
Internal MISP references
UUID b714e6a9-5c12-4a3b-89f9-d379c0284f06
which can be used as unique global reference for External to DA, the OS X Way
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-12T00:00:00Z |
date_published | 2016-05-14T00:00:00Z |
source | MITRE |
title | External to DA, the OS X Way |
Extexport.exe - LOLBAS Project
LOLBAS. (2018, May 25). Extexport.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 2aa09a10-a492-4753-bbd8-aacd31e4fee3
which can be used as unique global reference for Extexport.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2018-05-25T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Extexport.exe |
Extrac32.exe - LOLBAS Project
LOLBAS. (2018, May 25). Extrac32.exe. Retrieved December 4, 2023.
Internal MISP references
UUID ae632afc-336c-488e-81f6-91ffe1829595
which can be used as unique global reference for Extrac32.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2018-05-25T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Extrac32.exe |
Journey into IR ZeroAccess NTFS EA
Harrell, C. (2012, December 11). Extracting ZeroAccess from NTFS Extended Attributes. Retrieved June 3, 2016.
Internal MISP references
UUID e9dff187-fe7d-469d-81cb-30ad520dbd3d
which can be used as unique global reference for Journey into IR ZeroAccess NTFS EA
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-06-03T00:00:00Z |
date_published | 2012-12-11T00:00:00Z |
source | MITRE |
title | Extracting ZeroAccess from NTFS Extended Attributes |
Bizeul 2014
Bizeul, D., Fontarensky, I., Mouchoux, R., Perigaud, F., Pernet, C. (2014, July 11). Eye of the Tiger. Retrieved September 29, 2015.
Internal MISP references
UUID a4617ef4-e6d2-47e7-8f81-68e7380279bf
which can be used as unique global reference for Bizeul 2014
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2015-09-29T00:00:00Z |
date_published | 2014-07-11T00:00:00Z |
source | MITRE, Tidal Cyber |
title | Eye of the Tiger |
Facad1ng
Spyboy. (2023). Facad1ng. Retrieved February 13, 2024.
Internal MISP references
UUID bd80f3d7-e653-5f8f-ba8a-00b8780ae935
which can be used as unique global reference for Facad1ng
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-02-13T00:00:00Z |
date_published | 2023-01-01T00:00:00Z |
source | MITRE |
title | Facad1ng |
ThreatPost Social Media Phishing
O'Donnell, L. (2020, October 20). Facebook: A Top Launching Pad For Phishing Attacks. Retrieved October 20, 2020.
Internal MISP references
UUID 186c1213-d0c5-4eb6-aa0f-0fd61b07a1f7
which can be used as unique global reference for ThreatPost Social Media Phishing
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-20T00:00:00Z |
date_published | 2020-10-20T00:00:00Z |
source | MITRE |
title | Facebook: A Top Launching Pad For Phishing Attacks |
SentinelLabs reversing run-only applescripts 2021
Phil Stokes. (2021, January 11). FADE DEAD | Adventures in Reversing Malicious Run-Only AppleScripts. Retrieved September 29, 2022.
Internal MISP references
UUID 34dc9010-e800-420c-ace4-4f426c915d2f
which can be used as unique global reference for SentinelLabs reversing run-only applescripts 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-09-29T00:00:00Z |
date_published | 2021-01-11T00:00:00Z |
source | MITRE |
title | FADE DEAD |
Sentinel Labs
Phil Stokes. (2021, January 11). FADE DEAD | Adventures in Reversing Malicious Run-Only AppleScripts. Retrieved September 30, 2022.
Internal MISP references
UUID 785f7692-2be8-4f5d-921e-51efdfe0c0b9
which can be used as unique global reference for Sentinel Labs
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-09-30T00:00:00Z |
date_published | 2021-01-11T00:00:00Z |
source | MITRE |
title | FADE DEAD |
BleepingComputer Fake Chrome Errors June 17 2024
Bill Toulas. (2024, June 17). Fake Google Chrome errors trick you into running malicious PowerShell scripts. Retrieved June 20, 2024.
Internal MISP references
UUID 6efa70e3-d8eb-4260-b0ab-62335681e6fd
which can be used as unique global reference for BleepingComputer Fake Chrome Errors June 17 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-06-20T00:00:00Z |
date_published | 2024-06-17T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Fake Google Chrome errors trick you into running malicious PowerShell scripts |
ESET OceanLotus Mar 2019
Dumont, R. (2019, March 20). Fake or Fake: Keeping up with OceanLotus decoys. Retrieved April 1, 2019.
Internal MISP references
UUID b2745f5c-a181-48e1-b1cf-37a1ffe1fdf0
which can be used as unique global reference for ESET OceanLotus Mar 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-04-01T00:00:00Z |
date_published | 2019-03-20T00:00:00Z |
source | MITRE |
title | Fake or Fake: Keeping up with OceanLotus decoys |
ZScaler BitB 2020
ZScaler. (2020, February 11). Fake Sites Stealing Steam Credentials. Retrieved March 8, 2023.
Internal MISP references
UUID c2f01a3b-a164-59b7-be5d-5eec4eb69ee5
which can be used as unique global reference for ZScaler BitB 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-08T00:00:00Z |
date_published | 2020-02-11T00:00:00Z |
source | MITRE |
title | Fake Sites Stealing Steam Credentials |
FalconFeedsio Tweet October 9 2023
FalconFeedsio. (2023, October 9). FalconFeedsio Tweet October 9 2023. Retrieved October 10, 2023.
Internal MISP references
UUID e9810a28-f060-468b-b4ea-ffed9403ae8b
which can be used as unique global reference for FalconFeedsio Tweet October 9 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-10-10T00:00:00Z |
date_published | 2023-10-09T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | FalconFeedsio Tweet October 9 2023 |
FalconFeedsio Tweet September 28 2023
FalconFeedsio. (2023, September 28). FalconFeedsio Tweet September 28 2023. Retrieved October 10, 2023.
Internal MISP references
UUID 78128031-bcbb-42c2-8bed-4613a10a02ca
which can be used as unique global reference for FalconFeedsio Tweet September 28 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-10-10T00:00:00Z |
date_published | 2023-09-28T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | FalconFeedsio Tweet September 28 2023 |
falconoverwatch_blackcat_attack
Falcon OverWatch Team. (2022, March 23). Falcon OverWatch Threat Hunting Contributes to Seamless Protection Against Novel BlackCat Attack. Retrieved May 5, 2022.
Internal MISP references
UUID 9d0ff77c-09e9-4d58-86f4-e2398f298ca9
which can be used as unique global reference for falconoverwatch_blackcat_attack
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-05-05T00:00:00Z |
date_published | 2022-03-23T00:00:00Z |
source | MITRE |
title | Falcon OverWatch Threat Hunting Contributes to Seamless Protection Against Novel BlackCat Attack |
CitizenLab Tropic Trooper Aug 2018
Alexander, G., et al. (2018, August 8). Familiar Feeling: A Malware Campaign Targeting the Tibetan Diaspora Resurfaces. Retrieved June 17, 2019.
Internal MISP references
UUID 5c662775-9703-4d01-844b-40a0e5c24fb9
which can be used as unique global reference for CitizenLab Tropic Trooper Aug 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-06-17T00:00:00Z |
date_published | 2018-08-08T00:00:00Z |
source | MITRE |
title | Familiar Feeling: A Malware Campaign Targeting the Tibetan Diaspora Resurfaces |
ESET FamousSparrow September 23 2021
Tahseen Bin Taj, Matthieu Faou. (2021, September 23). FamousSparrow: A suspicious hotel guest. Retrieved October 24, 2024.
Internal MISP references
UUID f91d6d8e-22a4-4851-9444-7a066e6b7aa5
which can be used as unique global reference for ESET FamousSparrow September 23 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-10-24T00:00:00Z |
date_published | 2021-09-23T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | FamousSparrow: A suspicious hotel guest |
CISA AA20-239A BeagleBoyz August 2020
DHS/CISA. (2020, August 26). FASTCash 2.0: North Korea's BeagleBoyz Robbing Banks. Retrieved September 29, 2021.
Internal MISP references
UUID a8a2e3f2-3967-4e82-a36a-2436c654fb3f
which can be used as unique global reference for CISA AA20-239A BeagleBoyz August 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-29T00:00:00Z |
date_published | 2020-08-26T00:00:00Z |
source | MITRE, Tidal Cyber |
title | FASTCash 2.0: North Korea's BeagleBoyz Robbing Banks |
Fast Flux - Welivesecurity
Albors, Josep. (2017, January 12). Fast Flux networks: What are they and how do they work?. Retrieved March 11, 2020.
Internal MISP references
UUID e232d739-663e-4878-b13b-9248cd81e657
which can be used as unique global reference for Fast Flux - Welivesecurity
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-03-11T00:00:00Z |
date_published | 2017-01-12T00:00:00Z |
source | MITRE |
title | Fast Flux networks: What are they and how do they work? |
MehtaFastFluxPt1
Mehta, L. (2014, December 17). Fast Flux Networks Working and Detection, Part 1. Retrieved March 6, 2017.
Internal MISP references
UUID 5f169cae-6b59-4879-9a8f-93fdcea5cc58
which can be used as unique global reference for MehtaFastFluxPt1
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-03-06T00:00:00Z |
date_published | 2014-12-17T00:00:00Z |
source | MITRE |
title | Fast Flux Networks Working and Detection, Part 1 |
MehtaFastFluxPt2
Mehta, L. (2014, December 23). Fast Flux Networks Working and Detection, Part 2. Retrieved March 6, 2017.
Internal MISP references
UUID f8a98e55-c91e-4b5e-b6f3-0065ef07375d
which can be used as unique global reference for MehtaFastFluxPt2
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-03-06T00:00:00Z |
date_published | 2014-12-23T00:00:00Z |
source | MITRE |
title | Fast Flux Networks Working and Detection, Part 2 |
FBI-BEC
FBI. (2022). FBI 2022 Congressional Report on BEC and Real Estate Wire Fraud. Retrieved August 18, 2023.
Internal MISP references
UUID 3388bfec-7822-56dc-a384-95aa79f42fe8
which can be used as unique global reference for FBI-BEC
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-08-18T00:00:00Z |
date_published | 2022-01-01T00:00:00Z |
source | MITRE |
title | FBI 2022 Congressional Report on BEC and Real Estate Wire Fraud |
FBI Flash FIN7 USB
The Record. (2022, January 7). FBI: FIN7 hackers target US companies with BadUSB devices to install ransomware. Retrieved January 14, 2022.
Internal MISP references
UUID 42dc957c-007b-4f90-88c6-1afd6d1032e8
which can be used as unique global reference for FBI Flash FIN7 USB
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-01-14T00:00:00Z |
date_published | 2022-01-07T00:00:00Z |
source | MITRE |
title | FBI: FIN7 hackers target US companies with BadUSB devices to install ransomware |
FBI Lazarus Stake.com Theft Attribution September 2023
FBI National Press Office. (2023, September 6). FBI Identifies Lazarus Group Cyber Actors as Responsible for Theft of $41 Million from Stake.com. Retrieved September 13, 2023.
Internal MISP references
UUID d753c01c-c0f6-4382-ae79-5605a28c94d5
which can be used as unique global reference for FBI Lazarus Stake.com Theft Attribution September 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-13T00:00:00Z |
date_published | 2023-09-06T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | FBI Identifies Lazarus Group Cyber Actors as Responsible for Theft of $41 Million from Stake.com |
VPNFilter Router
Tung, Liam. (2018, May 29). FBI to all router users: Reboot now to neuter Russia's VPNFilter malware. Retrieved March 7, 2024.
Internal MISP references
UUID 191bc704-3314-56c5-8f2d-dbbbb8afea2f
which can be used as unique global reference for VPNFilter Router
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-07T00:00:00Z |
date_published | 2018-05-29T00:00:00Z |
source | MITRE |
title | FBI to all router users: Reboot now to neuter Russia's VPNFilter malware |
Hakobyan 2009
Hakobyan, A. (2009, January 8). FDump - Dumping File Sectors Directly from Disk using Logical Offsets. Retrieved November 12, 2014.
Internal MISP references
UUID d92f6dc0-e902-4a4a-9083-8d1667a7003e
which can be used as unique global reference for Hakobyan 2009
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2014-11-12T00:00:00Z |
date_published | 2009-01-08T00:00:00Z |
source | MITRE |
title | FDump - Dumping File Sectors Directly from Disk using Logical Offsets |
Google Federating GC
Google. (n.d.). Federating Google Cloud with Active Directory. Retrieved March 13, 2020.
Internal MISP references
UUID 4e17ca9b-5c98-409b-9496-7c37fe9ee837
which can be used as unique global reference for Google Federating GC
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-03-13T00:00:00Z |
source | MITRE |
title | Federating Google Cloud with Active Directory |
Kaspersky Ferocious Kitten Jun 2021
GReAT. (2021, June 16). Ferocious Kitten: 6 Years of Covert Surveillance in Iran. Retrieved September 22, 2021.
Internal MISP references
UUID b8f8020d-3f5c-4b5e-8761-6ecdd63fcd50
which can be used as unique global reference for Kaspersky Ferocious Kitten Jun 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-22T00:00:00Z |
date_published | 2021-06-16T00:00:00Z |
source | MITRE, Tidal Cyber |
title | Ferocious Kitten: 6 Years of Covert Surveillance in Iran |
Fidelis njRAT June 2013
Fidelis Cybersecurity. (2013, June 28). Fidelis Threat Advisory #1009: "njRAT" Uncovered. Retrieved June 4, 2019.
Internal MISP references
UUID 6c985470-a923-48fd-82c9-9128b6d59bcb
which can be used as unique global reference for Fidelis njRAT June 2013
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-06-04T00:00:00Z |
date_published | 2013-06-28T00:00:00Z |
source | MITRE |
title | Fidelis Threat Advisory #1009: "njRAT" Uncovered |
Fidelis INOCNATION
Fidelis Cybersecurity. (2015, December 16). Fidelis Threat Advisory #1020: Dissecting the Malware Involved in the INOCNATION Campaign. Retrieved March 24, 2016.
Internal MISP references
UUID 9d9c0c71-d5a2-41e4-aa90-d1046e0742c7
which can be used as unique global reference for Fidelis INOCNATION
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-03-24T00:00:00Z |
date_published | 2015-12-16T00:00:00Z |
source | MITRE |
title | Fidelis Threat Advisory #1020: Dissecting the Malware Involved in the INOCNATION Campaign |
Securelist fileless attacks Feb 2017
Kaspersky Lab's Global Research and Analysis Team. (2017, February 8). Fileless attacks against enterprise networks. Retrieved February 8, 2017.
Internal MISP references
UUID b58d9c32-89c5-449a-88e7-1c7dd3f8380e
which can be used as unique global reference for Securelist fileless attacks Feb 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-02-08T00:00:00Z |
date_published | 2017-02-08T00:00:00Z |
source | MITRE |
title | Fileless attacks against enterprise networks |
Airbus Security Kovter Analysis
Dove, A. (2016, March 23). Fileless Malware – A Behavioural Analysis Of Kovter Persistence. Retrieved December 5, 2017.
Internal MISP references
UUID a8420828-9e00-45a1-90d7-a37f898204f9
which can be used as unique global reference for Airbus Security Kovter Analysis
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-05T00:00:00Z |
date_published | 2016-03-23T00:00:00Z |
source | MITRE |
title | Fileless Malware – A Behavioural Analysis Of Kovter Persistence |
Sysdig Fileless Malware 23022
Nicholas Lang. (2022, May 3). Fileless malware mitigation. Retrieved September 24, 2024.
Internal MISP references
UUID d728b343-3256-55ff-9491-f66b98c16226
which can be used as unique global reference for Sysdig Fileless Malware 23022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-24T00:00:00Z |
date_published | 2022-05-03T00:00:00Z |
source | MITRE |
title | Fileless malware mitigation |
Microsoft Fileless
Microsoft. (2023, February 6). Fileless threats. Retrieved March 23, 2023.
Internal MISP references
UUID 263fc1ab-f928-583f-986d-1e1bae9b3c85
which can be used as unique global reference for Microsoft Fileless
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-23T00:00:00Z |
date_published | 2023-02-06T00:00:00Z |
source | MITRE |
title | Fileless threats |
enigma0x3 Fileless UAC Bypass
Nelson, M. (2016, August 15). "Fileless" UAC Bypass using eventvwr.exe and Registry Hijacking. Retrieved December 27, 2016.
Internal MISP references
UUID 74b16ca4-9494-4f10-97c5-103a8521818f
which can be used as unique global reference for enigma0x3 Fileless UAC Bypass
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-12-27T00:00:00Z |
date_published | 2016-08-15T00:00:00Z |
source | MITRE |
title | "Fileless" UAC Bypass using eventvwr.exe and Registry Hijacking |
enigma0x3 sdclt bypass
Nelson, M. (2017, March 17). "Fileless" UAC Bypass Using sdclt.exe. Retrieved May 25, 2017.
Internal MISP references
UUID 5e5597e2-ea05-41e0-8752-ca95a89a5aa3
which can be used as unique global reference for enigma0x3 sdclt bypass
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-05-25T00:00:00Z |
date_published | 2017-03-17T00:00:00Z |
source | MITRE |
title | "Fileless" UAC Bypass Using sdclt.exe |
Microsoft File Mgmt
Microsoft. (2018, May 31). File Management (Local File Systems). Retrieved September 28, 2021.
Internal MISP references
UUID e6d84416-5808-4e7d-891b-ba67dada8726
which can be used as unique global reference for Microsoft File Mgmt
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-28T00:00:00Z |
date_published | 2018-05-31T00:00:00Z |
source | MITRE |
title | File Management (Local File Systems) |
Microsoft File Streams
Microsoft. (n.d.). File Streams. Retrieved September 12, 2024.
Internal MISP references
UUID ef3f58da-e735-4b1d-914c-fafabb7439bf
which can be used as unique global reference for Microsoft File Streams
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-12T00:00:00Z |
source | MITRE |
title | File Streams |
file_upload_attacks_pt2
YesWeRHackers. (2021, June 16). File Upload Attacks (Part 2). Retrieved August 23, 2022.
Internal MISP references
UUID 4f7c7d6c-ad56-594f-bcb8-79523f436f2c
which can be used as unique global reference for file_upload_attacks_pt2
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-08-23T00:00:00Z |
date_published | 2021-06-16T00:00:00Z |
source | MITRE |
title | File Upload Attacks (Part 2) |
Microsoft GPO Security Filtering
Microsoft. (2018, May 30). Filtering the Scope of a GPO. Retrieved March 13, 2019.
Internal MISP references
UUID 327caed7-a53f-4245-8774-a9f170932012
which can be used as unique global reference for Microsoft GPO Security Filtering
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-03-13T00:00:00Z |
date_published | 2018-05-30T00:00:00Z |
source | MITRE |
title | Filtering the Scope of a GPO |
FireEye FIN10 June 2017
FireEye iSIGHT Intelligence. (2017, June 16). FIN10: Anatomy of a Cyber Extortion Operation. Retrieved June 25, 2017.
Internal MISP references
UUID 9d5c3956-7169-48d5-b4d0-f7a56a742adf
which can be used as unique global reference for FireEye FIN10 June 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-06-25T00:00:00Z |
date_published | 2017-06-16T00:00:00Z |
source | MITRE, Tidal Cyber |
title | FIN10: Anatomy of a Cyber Extortion Operation |
Mandiant FIN12 Group Profile October 07 2021
Joshua Shilko, Zach Riddle, Jennifer Brooks, Genevieve Stark, Adam Brunner, Kimberly Goody, Jeremy Kennelly. (2021, October 7). FIN12 Group Profile. Retrieved September 22, 2023.
Internal MISP references
UUID 7af84b3d-bbd6-449f-b29b-2f14591c9f05
which can be used as unique global reference for Mandiant FIN12 Group Profile October 07 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-22T00:00:00Z |
date_published | 2021-10-07T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | FIN12 Group Profile |
Mandiant FIN12 Oct 2021
Shilko, J., et al. (2021, October 7). FIN12: The Prolific Ransomware Intrusion Threat Actor That Has Aggressively Pursued Healthcare Targets. Retrieved June 15, 2023.
Internal MISP references
UUID 4514d7cc-b999-5711-a398-d90e5d3570f2
which can be used as unique global reference for Mandiant FIN12 Oct 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-06-15T00:00:00Z |
date_published | 2021-10-07T00:00:00Z |
source | MITRE |
title | FIN12: The Prolific Ransomware Intrusion Threat Actor That Has Aggressively Pursued Healthcare Targets |
CERTFR-2023-CTI-007
CERT-FR. (2023, September 18). FIN12: Un Groupe Cybercriminel aux Multiples Rançongiciel. Retrieved September 21, 2023.
Internal MISP references
UUID 0f4a03c5-79b3-418e-a77d-305d5a32caca
which can be used as unique global reference for CERTFR-2023-CTI-007
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-21T00:00:00Z |
date_published | 2023-09-18T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | FIN12: Un Groupe Cybercriminel aux Multiples Rançongiciel |
Mandiant FIN13 Aug 2022
Ta, V., et al. (2022, August 8). FIN13: A Cybercriminal Threat Actor Focused on Mexico. Retrieved February 9, 2023.
Internal MISP references
UUID ebd9d479-1954-5a4a-b7f0-d5372489733c
which can be used as unique global reference for Mandiant FIN13 Aug 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-02-09T00:00:00Z |
date_published | 2022-08-08T00:00:00Z |
source | MITRE |
title | FIN13: A Cybercriminal Threat Actor Focused on Mexico |
FireEye FIN4 Stealing Insider NOV 2014
Dennesen, K. et al.. (2014, November 30). FIN4: Stealing Insider Information for an Advantage in Stock Trading?. Retrieved December 17, 2018.
Internal MISP references
UUID b27f1040-46e5-411a-b238-0b40f6160680
which can be used as unique global reference for FireEye FIN4 Stealing Insider NOV 2014
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-12-17T00:00:00Z |
date_published | 2014-11-30T00:00:00Z |
source | MITRE |
title | FIN4: Stealing Insider Information for an Advantage in Stock Trading? |
Visa FIN6 Feb 2019
Visa Public. (2019, February). FIN6 Cybercrime Group Expands Threat to eCommerce Merchants. Retrieved September 16, 2019.
Internal MISP references
UUID 9e9e8811-1d8e-4400-8688-e634f859c4e0
which can be used as unique global reference for Visa FIN6 Feb 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-09-16T00:00:00Z |
date_published | 2019-02-01T00:00:00Z |
source | MITRE |
title | FIN6 Cybercrime Group Expands Threat to eCommerce Merchants |
SentinelOne FrameworkPOS September 2019
Kremez, V. (2019, September 19). FIN6 “FrameworkPOS”: Point-of-Sale Malware Analysis & Internals. Retrieved September 8, 2020.
Internal MISP references
UUID 054d7827-3d0c-40a7-b2a0-1428ad7729ea
which can be used as unique global reference for SentinelOne FrameworkPOS September 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-09-08T00:00:00Z |
date_published | 2019-09-19T00:00:00Z |
source | MITRE |
title | FIN6 “FrameworkPOS”: Point-of-Sale Malware Analysis & Internals |
SecureList Griffon May 2019
Namestnikov, Y. and Aime, F. (2019, May 8). FIN7.5: the infamous cybercrime rig “FIN7” continues its activities. Retrieved October 11, 2019.
Internal MISP references
UUID 42e196e4-42a7-427d-a69b-d78fa6375f8c
which can be used as unique global reference for SecureList Griffon May 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-10-11T00:00:00Z |
date_published | 2019-05-08T00:00:00Z |
source | MITRE |
title | FIN7.5: the infamous cybercrime rig “FIN7” continues its activities |
Threatpost Lizar May 2021
Seals, T. (2021, May 14). FIN7 Backdoor Masquerades as Ethical Hacking Tool. Retrieved February 2, 2022.
Internal MISP references
UUID 1b89f62f-586d-4dee-b6dd-e5a5cd090a0e
which can be used as unique global reference for Threatpost Lizar May 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-02-02T00:00:00Z |
date_published | 2021-05-14T00:00:00Z |
source | MITRE |
title | FIN7 Backdoor Masquerades as Ethical Hacking Tool |
FireEye FIN7 April 2017
Carr, N., et al. (2017, April 24). FIN7 Evolution and the Phishing LNK. Retrieved April 24, 2017.
Internal MISP references
UUID 6ee27fdb-1753-4fdf-af72-3295b072ff10
which can be used as unique global reference for FireEye FIN7 April 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-04-24T00:00:00Z |
date_published | 2017-04-24T00:00:00Z |
source | MITRE |
title | FIN7 Evolution and the Phishing LNK |
Mandiant FIN7 Apr 2022
Abdo, B., et al. (2022, April 4). FIN7 Power Hour: Adversary Archaeology and the Evolution of FIN7. Retrieved April 5, 2022.
Internal MISP references
UUID be9919c0-ca52-593b-aea0-c5e9a262b570
which can be used as unique global reference for Mandiant FIN7 Apr 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-04-05T00:00:00Z |
date_published | 2022-04-04T00:00:00Z |
source | MITRE |
title | FIN7 Power Hour: Adversary Archaeology and the Evolution of FIN7 |
Mandiant FIN7 April 4 2022
Bryce Abdo, Zander Work, Ioana Teaca, Brendan McKeague. (2022, April 4). FIN7 Power Hour: Adversary Archaeology and the Evolution of FIN7. Retrieved May 25, 2023.
Internal MISP references
UUID fbc3ea90-d3d4-440e-964d-6cd2e991df0c
which can be used as unique global reference for Mandiant FIN7 April 4 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-25T00:00:00Z |
date_published | 2022-04-04T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | FIN7 Power Hour: Adversary Archaeology and the Evolution of FIN7 |
Gemini FIN7 Oct 2021
Gemini Advisory. (2021, October 21). FIN7 Recruits Talent For Push Into Ransomware. Retrieved February 2, 2022.
Internal MISP references
UUID bbaef178-8577-4398-8e28-604faf0950b4
which can be used as unique global reference for Gemini FIN7 Oct 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-02-02T00:00:00Z |
date_published | 2021-10-21T00:00:00Z |
source | MITRE |
title | FIN7 Recruits Talent For Push Into Ransomware |
Flashpoint FIN 7 March 2019
Platt, J. and Reeves, J.. (2019, March). FIN7 Revisited: Inside Astra Panel and SQLRat Malware. Retrieved June 18, 2019.
Internal MISP references
UUID b09453a3-c0df-4e96-b399-e7b34e068e9d
which can be used as unique global reference for Flashpoint FIN 7 March 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-06-18T00:00:00Z |
date_published | 2019-03-01T00:00:00Z |
source | MITRE |
title | FIN7 Revisited: Inside Astra Panel and SQLRat Malware |
FireEye FIN7 March 2017
Miller, S., et al. (2017, March 7). FIN7 Spear Phishing Campaign Targets Personnel Involved in SEC Filings. Retrieved March 8, 2017.
Internal MISP references
UUID 7987bb91-ec41-42f8-bd2d-dabc26509a08
which can be used as unique global reference for FireEye FIN7 March 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-03-08T00:00:00Z |
date_published | 2017-03-07T00:00:00Z |
source | MITRE, Tidal Cyber |
title | FIN7 Spear Phishing Campaign Targets Personnel Involved in SEC Filings |
Morphisec FIN7 June 2017
Gorelik, M.. (2017, June 9). FIN7 Takes Another Bite at the Restaurant Industry. Retrieved July 13, 2017.
Internal MISP references
UUID 3831173c-7c67-4f16-b652-ad992a7ce411
which can be used as unique global reference for Morphisec FIN7 June 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-07-13T00:00:00Z |
date_published | 2017-06-09T00:00:00Z |
source | MITRE |
title | FIN7 Takes Another Bite at the Restaurant Industry |
Esentire 5 8 2024
Esentire Threat Response Unit. (2024, May 8). FIN7 Uses Trusted Brands and Sponsored Google Ads to Distribute MSIX…. Retrieved May 14, 2024.
Internal MISP references
UUID 67c3a7ed-e2e2-4566-aca7-61e766f177bf
which can be used as unique global reference for Esentire 5 8 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-05-14T00:00:00Z |
date_published | 2024-05-08T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | FIN7 Uses Trusted Brands and Sponsored Google Ads to Distribute MSIX… |
CyberScoop FIN7 Oct 2017
Waterman, S. (2017, October 16). Fin7 weaponization of DDE is just their latest slick move, say researchers. Retrieved November 21, 2017.
Internal MISP references
UUID e38adff1-7f53-4b0c-9d58-a4640b09b10d
which can be used as unique global reference for CyberScoop FIN7 Oct 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-11-21T00:00:00Z |
date_published | 2017-10-16T00:00:00Z |
source | MITRE |
title | Fin7 weaponization of DDE is just their latest slick move, say researchers |
Bitdefender FIN8 BADHATCH Report
Bitdefender. (2021, March 10). FIN8 Returns with Improved BADHATCH Toolkit. Retrieved October 30, 2023.
Internal MISP references
UUID 501b6391-e09e-47dc-9cfc-c8ed4c034aca
which can be used as unique global reference for Bitdefender FIN8 BADHATCH Report
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-10-30T00:00:00Z |
date_published | 2021-03-10T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | FIN8 Returns with Improved BADHATCH Toolkit |
BitDefender BADHATCH Mar 2021
Vrabie, V., et al. (2021, March 10). FIN8 Returns with Improved BADHATCH Toolkit. Retrieved September 8, 2021.
Internal MISP references
UUID 958cfc9a-901c-549d-96c2-956272b240e3
which can be used as unique global reference for BitDefender BADHATCH Mar 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-08T00:00:00Z |
date_published | 2021-03-10T00:00:00Z |
source | MITRE |
title | FIN8 Returns with Improved BADHATCH Toolkit |
Bitdefender Sardonic Aug 2021
Budaca, E., et al. (2021, August 25). FIN8 Threat Actor Goes Agile with New Sardonic Backdoor. Retrieved August 9, 2023.
Internal MISP references
UUID 8e9d05c9-6783-5738-ac85-a444810a8074
which can be used as unique global reference for Bitdefender Sardonic Aug 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-08-09T00:00:00Z |
date_published | 2021-08-25T00:00:00Z |
source | MITRE |
title | FIN8 Threat Actor Goes Agile with New Sardonic Backdoor |
Symantec FIN8 Jul 2023
Symantec Threat Hunter Team. (2023, July 18). FIN8 Uses Revamped Sardonic Backdoor to Deliver Noberus Ransomware. Retrieved August 9, 2023.
Internal MISP references
UUID 9b08b7f0-1a33-5d76-817f-448fac0d165a
which can be used as unique global reference for Symantec FIN8 Jul 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-08-09T00:00:00Z |
date_published | 2023-07-18T00:00:00Z |
source | MITRE |
title | FIN8 Uses Revamped Sardonic Backdoor to Deliver Noberus Ransomware |
DiginotarCompromise
Fisher, D. (2012, October 31). Final Report on DigiNotar Hack Shows Total Compromise of CA Servers. Retrieved March 6, 2017.
Internal MISP references
UUID 3c9b7b9a-d30a-4865-a96c-6e68d9e20452
which can be used as unique global reference for DiginotarCompromise
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-03-06T00:00:00Z |
date_published | 2012-10-31T00:00:00Z |
source | MITRE |
title | Final Report on DigiNotar Hack Shows Total Compromise of CA Servers |
FireEye Financial Actors Moving into OT
Brubaker, N. Zafra, D. K. Lunden, K. Proska, K. Hildebrandt, C.. (2020, July 15). Financially Motivated Actors Are Expanding Access Into OT: Analysis of Kill Lists That Include OT Processes Used With Seven Malware Families. Retrieved February 15, 2021.
Internal MISP references
UUID 4bd514b8-1f79-4946-b001-110ce5cf29a9
which can be used as unique global reference for FireEye Financial Actors Moving into OT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-02-15T00:00:00Z |
date_published | 2020-07-15T00:00:00Z |
source | MITRE |
title | Financially Motivated Actors Are Expanding Access Into OT: Analysis of Kill Lists That Include OT Processes Used With Seven Malware Families |
MITRECND FindAPIHash
Jason (jxb5151). (2021, January 28). findapihash.py. Retrieved August 22, 2022.
Internal MISP references
UUID 2260f0a1-2a6c-4373-9e3a-624fd89446e3
which can be used as unique global reference for MITRECND FindAPIHash
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-08-22T00:00:00Z |
date_published | 2021-01-28T00:00:00Z |
source | MITRE |
title | findapihash.py |
Expel IO Evil in AWS
A. Randazzo, B. Manahan and S. Lipton. (2020, April 28). Finding Evil in AWS. Retrieved June 25, 2020.
Internal MISP references
UUID 4c2424d6-670b-4db0-a752-868b4c954e29
which can be used as unique global reference for Expel IO Evil in AWS
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-06-25T00:00:00Z |
date_published | 2020-04-28T00:00:00Z |
source | MITRE |
title | Finding Evil in AWS |
Evil WMI
Chad Tilbury. (2023, May 22). Finding Evil WMI Event Consumers with Disk Forensics. Retrieved February 9, 2024.
Internal MISP references
UUID ee46fd07-3df3-50f6-b922-263f031ee23f
which can be used as unique global reference for Evil WMI
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-02-09T00:00:00Z |
date_published | 2023-05-22T00:00:00Z |
source | MITRE |
title | Finding Evil WMI Event Consumers with Disk Forensics |
SANS Decrypting SSL
Butler, M. (2013, November). Finding Hidden Threats by Decrypting SSL. Retrieved April 5, 2016.
Internal MISP references
UUID d251a79b-8516-41a7-b394-47a761d0ab3b
which can be used as unique global reference for SANS Decrypting SSL
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-04-05T00:00:00Z |
date_published | 2013-11-01T00:00:00Z |
source | MITRE |
title | Finding Hidden Threats by Decrypting SSL |
ADSecurity Finding Passwords in SYSVOL
Sean Metcalf. (2015, December 28). Finding Passwords in SYSVOL & Exploiting Group Policy Preferences. Retrieved February 17, 2020.
Internal MISP references
UUID 538def90-5de4-4b8c-b535-0e2570ba1841
which can be used as unique global reference for ADSecurity Finding Passwords in SYSVOL
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-02-17T00:00:00Z |
date_published | 2015-12-28T00:00:00Z |
source | MITRE |
title | Finding Passwords in SYSVOL & Exploiting Group Policy Preferences |
Findstr.exe - LOLBAS Project
LOLBAS. (2018, May 25). Findstr.exe. Retrieved December 4, 2023.
Internal MISP references
UUID fc4b7b28-ac74-4a8f-a39d-ce55df5fca08
which can be used as unique global reference for Findstr.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2018-05-25T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Findstr.exe |
FinFisher Citation
FinFisher. (n.d.). Retrieved September 12, 2024.
Internal MISP references
UUID 6ef0b8d8-ba98-49ce-807d-5a85d111b027
which can be used as unique global reference for FinFisher Citation
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-12T00:00:00Z |
source | MITRE |
title | FinFisher Citation |
FinFisher exposed
Microsoft Defender Security Research Team. (2018, March 1). FinFisher exposed: A researcher’s tale of defeating traps, tricks, and complex virtual machines. Retrieved January 27, 2022.
Internal MISP references
UUID b2f4541e-f981-4b25-abf4-1bec92b16faa
which can be used as unique global reference for FinFisher exposed
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-01-27T00:00:00Z |
date_published | 2018-03-01T00:00:00Z |
source | MITRE |
title | FinFisher exposed: A researcher’s tale of defeating traps, tricks, and complex virtual machines |
Microsoft FinFisher March 2018
Allievi, A.,Flori, E. (2018, March 01). FinFisher exposed: A researcher’s tale of defeating traps, tricks, and complex virtual machines. Retrieved July 9, 2018.
Internal MISP references
UUID 88c97a9a-ef14-4695-bde0-9de2b5f5343b
which can be used as unique global reference for Microsoft FinFisher March 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-07-09T00:00:00Z |
date_published | 2018-03-01T00:00:00Z |
source | MITRE |
title | FinFisher exposed: A researcher’s tale of defeating traps, tricks, and complex virtual machines |
Finger.exe - LOLBAS Project
LOLBAS. (2021, August 30). Finger.exe. Retrieved December 4, 2023.
Internal MISP references
UUID e32d01eb-d904-43dc-a7e2-bdcf42f3ebb2
which can be used as unique global reference for Finger.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2021-08-30T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Finger.exe |
FireEye Cyber Threats to Media Industries
FireEye. (n.d.). Retrieved April 19, 2019.
Internal MISP references
UUID 7b9bd753-01b7-4923-9964-19c59123ace2
which can be used as unique global reference for FireEye Cyber Threats to Media Industries
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-04-19T00:00:00Z |
source | MITRE |
title | FireEye Cyber Threats to Media Industries |
FireEye DLL Side-Loading
Amanda Steward. (2014). FireEye DLL Side-Loading: A Thorn in the Side of the Anti-Virus Industry. Retrieved March 13, 2020.
Internal MISP references
UUID 9d58bcbb-5b96-4e12-8ff2-e0b084c3eb8c
which can be used as unique global reference for FireEye DLL Side-Loading
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-03-13T00:00:00Z |
date_published | 2014-01-01T00:00:00Z |
source | MITRE |
title | FireEye DLL Side-Loading: A Thorn in the Side of the Anti-Virus Industry |
FireEye Shamoon Nov 2016
FireEye. (2016, November 30). FireEye Responds to Wave of Destructive Cyber Attacks in Gulf Region. Retrieved January 11, 2017.
Internal MISP references
UUID 44b2eb6b-4902-4ca0-80e5-7333d620e075
which can be used as unique global reference for FireEye Shamoon Nov 2016
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-01-11T00:00:00Z |
date_published | 2016-11-30T00:00:00Z |
source | MITRE |
title | FireEye Responds to Wave of Destructive Cyber Attacks in Gulf Region |
FireEye Ryuk and Trickbot January 2019
Goody, K., et al (2019, January 11). A Nasty Trick: From Credential Theft Malware to Business Disruption. Retrieved May 12, 2020.
Internal MISP references
UUID b29dc755-f1f0-4206-9ecf-29257a1909ee
which can be used as unique global reference for FireEye Ryuk and Trickbot January 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-05-12T00:00:00Z |
source | MITRE |
title | FireEye Ryuk and Trickbot January 2019 |
DarkReading FireEye SolarWinds
Kelly Jackson Higgins. (2021, January 7). FireEye's Mandia: 'Severity-Zero Alert' Led to Discovery of SolarWinds Attack. Retrieved April 18, 2022.
Internal MISP references
UUID a662c764-8954-493f-88e5-e022e093a785
which can be used as unique global reference for DarkReading FireEye SolarWinds
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-04-18T00:00:00Z |
date_published | 2021-01-07T00:00:00Z |
source | MITRE |
title | FireEye's Mandia: 'Severity-Zero Alert' Led to Discovery of SolarWinds Attack |
FireEye FinSpy Sept 2017
Jiang, G., et al. (2017, September 12). FireEye Uncovers CVE-2017-8759: Zero-Day Used in the Wild to Distribute FINSPY. Retrieved February 15, 2018.
Internal MISP references
UUID 142cf7a3-2ca2-4cf3-b95a-9f4b3bc1cdce
which can be used as unique global reference for FireEye FinSpy Sept 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-02-15T00:00:00Z |
date_published | 2017-09-12T00:00:00Z |
source | MITRE |
title | FireEye Uncovers CVE-2017-8759: Zero-Day Used in the Wild to Distribute FINSPY |
RiskIQ Cobalt Jan 2018
Klijnsma, Y.. (2018, January 16). First Activities of Cobalt Group in 2018: Spear Phishing Russian Banks. Retrieved October 10, 2018.
Internal MISP references
UUID 7d48b679-d44d-466e-b12b-16f0f9858d15
which can be used as unique global reference for RiskIQ Cobalt Jan 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-10-10T00:00:00Z |
date_published | 2018-01-16T00:00:00Z |
source | MITRE |
title | First Activities of Cobalt Group in 2018: Spear Phishing Russian Banks |
Chrome Extension Crypto Miner
Brinkmann, M. (2017, September 19). First Chrome extension with JavaScript Crypto Miner detected. Retrieved November 16, 2017.
Internal MISP references
UUID ae28f530-40da-451e-89b8-b472340c3e0a
which can be used as unique global reference for Chrome Extension Crypto Miner
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-11-16T00:00:00Z |
date_published | 2017-09-19T00:00:00Z |
source | MITRE |
title | First Chrome extension with JavaScript Crypto Miner detected |
Aquasec Kubernetes Attack 2023
Michael Katchinskiy, Assaf Morag. (2023, April 21). First-Ever Attack Leveraging Kubernetes RBAC to Backdoor Clusters. Retrieved July 14, 2023.
Internal MISP references
UUID 6d6e2fc8-9806-5480-bfaa-a43a962a4980
which can be used as unique global reference for Aquasec Kubernetes Attack 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-07-14T00:00:00Z |
date_published | 2023-04-21T00:00:00Z |
source | MITRE |
title | First-Ever Attack Leveraging Kubernetes RBAC to Backdoor Clusters |
ESET-Twitoor
ESET. (2016, August 24). First Twitter-controlled Android botnet discovered. Retrieved December 22, 2016.
Internal MISP references
UUID 845896a6-b21d-489d-b75c-1e35b3ec78e0
which can be used as unique global reference for ESET-Twitoor
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-12-22T00:00:00Z |
date_published | 2016-08-24T00:00:00Z |
source | MITRE |
title | First Twitter-controlled Android botnet discovered |
Microsoft Azure AD Admin Consent
Baldwin, M., Flores, J., Kess, B.. (2018, June 17). Five steps to securing your identity infrastructure. Retrieved October 4, 2019.
Internal MISP references
UUID 3a0c4458-c8ec-44f9-95cc-0eb136a927cb
which can be used as unique global reference for Microsoft Azure AD Admin Consent
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-10-04T00:00:00Z |
date_published | 2018-06-17T00:00:00Z |
source | MITRE |
title | Five steps to securing your identity infrastructure |
NTT Security Flagpro new December 2021
Hada, H. (2021, December 28). Flagpro The new malware used by BlackTech. Retrieved March 25, 2022.
Internal MISP references
UUID c0f523fa-7f3b-4c85-b48f-19ae770e9f3b
which can be used as unique global reference for NTT Security Flagpro new December 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-03-25T00:00:00Z |
date_published | 2021-12-28T00:00:00Z |
source | MITRE |
title | Flagpro The new malware used by BlackTech |
Kaspersky Flame Functionality
Gostev, A. (2012, May 30). Flame: Bunny, Frog, Munch and BeetleJuice…. Retrieved March 1, 2017.
Internal MISP references
UUID c7d030ad-0ecf-458f-85d4-93778d759dc1
which can be used as unique global reference for Kaspersky Flame Functionality
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-03-01T00:00:00Z |
date_published | 2012-05-30T00:00:00Z |
source | MITRE |
title | Flame: Bunny, Frog, Munch and BeetleJuice… |
Crysys Skywiper
sKyWIper Analysis Team. (2012, May 31). sKyWIper (a.k.a. Flame a.k.a. Flamer): A complex malware for targeted attacks. Retrieved September 6, 2018.
Internal MISP references
UUID ea35f530-b0fd-4e27-a7a9-6ba41566154c
which can be used as unique global reference for Crysys Skywiper
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-09-06T00:00:00Z |
source | MITRE |
title | Flamer): A complex malware for targeted attacks |
Symantec Beetlejuice
Symantec Security Response. (2012, May 31). Flamer: A Recipe for Bluetoothache. Retrieved February 25, 2017.
Internal MISP references
UUID 691ada65-fe64-4917-b379-1db2573eea32
which can be used as unique global reference for Symantec Beetlejuice
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-02-25T00:00:00Z |
date_published | 2012-05-31T00:00:00Z |
source | MITRE |
title | Flamer: A Recipe for Bluetoothache |
Microsoft Flax Typhoon August 24 2023
Microsoft Threat Intelligence. (2023, August 24). Flax Typhoon using legitimate software to quietly access Taiwanese organizations. Retrieved August 28, 2023.
Internal MISP references
UUID ec962b72-7b7f-4f7e-b6d6-7c5380b07201
which can be used as unique global reference for Microsoft Flax Typhoon August 24 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-08-28T00:00:00Z |
date_published | 2023-08-24T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Flax Typhoon using legitimate software to quietly access Taiwanese organizations |
fltMC.exe - LOLBAS Project
LOLBAS. (2021, September 18). fltMC.exe. Retrieved December 4, 2023.
Internal MISP references
UUID cf9b4bd3-92f0-405b-85e7-95e65d548b79
which can be used as unique global reference for fltMC.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2021-09-18T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | fltMC.exe |
IranThreats Kittens Dec 2017
Iran Threats . (2017, December 5). Flying Kitten to Rocket Kitten, A Case of Ambiguity and Shared Code. Retrieved May 28, 2020.
Internal MISP references
UUID 8338ad75-89f2-47d8-b85b-7cbf331bd7cd
which can be used as unique global reference for IranThreats Kittens Dec 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-05-28T00:00:00Z |
date_published | 2017-12-05T00:00:00Z |
source | MITRE |
title | Flying Kitten to Rocket Kitten, A Case of Ambiguity and Shared Code |
MSTIC FoggyWeb September 2021
Ramin Nafisi. (2021, September 27). FoggyWeb: Targeted NOBELIUM malware leads to persistent backdoor. Retrieved October 4, 2021.
Internal MISP references
UUID 1ef61100-c5e7-4725-8456-e508c5f6d68a
which can be used as unique global reference for MSTIC FoggyWeb September 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-04T00:00:00Z |
date_published | 2021-09-27T00:00:00Z |
source | MITRE |
title | FoggyWeb: Targeted NOBELIUM malware leads to persistent backdoor |
Following the CloudTrail: Generating strong AWS security signals with Sumo Logic
Dan Whalen. (2019, September 10). Following the CloudTrail: Generating strong AWS security signals with Sumo Logic. Retrieved October 16, 2020.
Internal MISP references
UUID 96560211-59b3-4eae-b8a3-2f988f6fdca3
which can be used as unique global reference for Following the CloudTrail: Generating strong AWS security signals with Sumo Logic
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-16T00:00:00Z |
date_published | 2019-09-10T00:00:00Z |
source | MITRE |
title | Following the CloudTrail: Generating strong AWS security signals with Sumo Logic |
Group IB RTM August 2019
Skulkin, O. (2019, August 5). Following the RTM Forensic examination of a computer infected with a banking trojan. Retrieved May 11, 2020.
Internal MISP references
UUID 739da2f2-2aea-4f65-bc4d-ec6723f90520
which can be used as unique global reference for Group IB RTM August 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-05-11T00:00:00Z |
date_published | 2019-08-05T00:00:00Z |
source | MITRE |
title | Following the RTM Forensic examination of a computer infected with a banking trojan |
TrendMicro BlackTech June 2017
Bermejo, L., et al. (2017, June 22). Following the Trail of BlackTech’s Cyber Espionage Campaigns. Retrieved May 5, 2020.
Internal MISP references
UUID abb9cb19-d30e-4048-b106-eb29a6dad7fc
which can be used as unique global reference for TrendMicro BlackTech June 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-05-05T00:00:00Z |
date_published | 2017-06-22T00:00:00Z |
source | MITRE, Tidal Cyber |
title | Following the Trail of BlackTech’s Cyber Espionage Campaigns |
FireEye FIN6 April 2016
FireEye Threat Intelligence. (2016, April). Follow the Money: Dissecting the Operations of the Cyber Crime Group FIN6. Retrieved June 1, 2016.
Internal MISP references
UUID 8c0997e1-b285-42dd-9492-75065eac8f8b
which can be used as unique global reference for FireEye FIN6 April 2016
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-06-01T00:00:00Z |
date_published | 2016-04-01T00:00:00Z |
source | MITRE, Tidal Cyber |
title | Follow the Money: Dissecting the Operations of the Cyber Crime Group FIN6 |
ESET FontOnLake Analysis 2021
Vladislav Hrčka. (2021, January 1). FontOnLake. Retrieved September 27, 2023.
Internal MISP references
UUID dbcced87-91ee-514f-98c8-29a85d967384
which can be used as unique global reference for ESET FontOnLake Analysis 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-27T00:00:00Z |
date_published | 2021-01-01T00:00:00Z |
source | MITRE |
title | FontOnLake |
amnesty_nso_pegasus
Amnesty International Security Lab. (2021, July 18). Forensic Methodology Report: How to catch NSO Group’s Pegasus. Retrieved February 22, 2022.
Internal MISP references
UUID 9e40d93a-fe91-504a-a6f2-e6546067ba53
which can be used as unique global reference for amnesty_nso_pegasus
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-02-22T00:00:00Z |
date_published | 2021-07-18T00:00:00Z |
source | MITRE |
title | Forensic Methodology Report: How to catch NSO Group’s Pegasus |
Microsoft Forfiles Aug 2016
Microsoft. (2016, August 31). Forfiles. Retrieved January 22, 2018.
Internal MISP references
UUID fd7eaa47-3512-4dbd-b881-bc679d06cd1b
which can be used as unique global reference for Microsoft Forfiles Aug 2016
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-01-22T00:00:00Z |
date_published | 2016-08-31T00:00:00Z |
source | MITRE |
title | Forfiles |
Forfiles.exe - LOLBAS Project
LOLBAS. (2018, May 25). Forfiles.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 9e2c3833-b667-431c-a9e5-1b412583cc5a
which can be used as unique global reference for Forfiles.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2018-05-25T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Forfiles.exe |
Mandiant Log4Shell March 28 2022
Geoff Ackerman, Tufail Ahmed, James Maclachlan, Dallin Warne, John Wolfram, Brandon Wilbur. (2022, March 28). Forged in Fire: A Survey of MobileIron Log4Shell Exploitation. Retrieved November 1, 2023.
Internal MISP references
UUID 62d4d685-09c4-47b6-865c-4a6096e551cd
which can be used as unique global reference for Mandiant Log4Shell March 28 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-11-01T00:00:00Z |
date_published | 2022-03-28T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Forged in Fire: A Survey of MobileIron Log4Shell Exploitation |
Proofpoint March 24 2023
Proofpoint. (2023, March 24). Fork in the Ice: The New Era of IcedID | Proofpoint US. Retrieved May 10, 2023.
Internal MISP references
UUID 71d5e4ce-3785-48f9-9566-fe5151ad6dc2
which can be used as unique global reference for Proofpoint March 24 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-10T00:00:00Z |
date_published | 2023-03-24T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Fork in the Ice: The New Era of IcedID |
Symantec Seaduke 2015
Symantec Security Response. (2015, July 13). “Forkmeiamfamous”: Seaduke, latest weapon in the Duke armory. Retrieved July 22, 2015.
Internal MISP references
UUID 5ec05c01-8767-44c1-9855-e1b0e5ee0002
which can be used as unique global reference for Symantec Seaduke 2015
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2015-07-22T00:00:00Z |
date_published | 2015-07-13T00:00:00Z |
source | MITRE |
title | “Forkmeiamfamous”: Seaduke, latest weapon in the Duke armory |
Register Uber
McCarthy, K. (2015, February 28). FORK ME! Uber hauls GitHub into court to find who hacked database of 50,000 drivers. Retrieved October 19, 2020.
Internal MISP references
UUID 89b85928-a962-4230-875c-63742b3c9d37
which can be used as unique global reference for Register Uber
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-19T00:00:00Z |
date_published | 2015-02-28T00:00:00Z |
source | MITRE |
title | FORK ME! Uber hauls GitHub into court to find who hacked database of 50,000 drivers |
format_cmd_cisco
Cisco. (2022, August 16). format - Cisco IOS Configuration Fundamentals Command Reference. Retrieved July 13, 2022.
Internal MISP references
UUID 9442e08d-0858-5aa5-b642-a6b1e46018bc
which can be used as unique global reference for format_cmd_cisco
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-07-13T00:00:00Z |
date_published | 2022-08-16T00:00:00Z |
source | MITRE |
title | format - Cisco IOS Configuration Fundamentals Command Reference |
Quick Heal Blog February 17 2023
Quick Heal Blog. (2023, February 17). FormBook Malware Returns: New Variant Uses Steganography and In-Memory Loading of multiple stages to steal data. Retrieved May 7, 2023.
Internal MISP references
UUID 02233ce3-abb2-4aed-95b8-56b65c68a665
which can be used as unique global reference for Quick Heal Blog February 17 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-07T00:00:00Z |
date_published | 2023-02-17T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | FormBook Malware Returns: New Variant Uses Steganography and In-Memory Loading of multiple stages to steal data |
Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation
ALEXANDER MARVI, BRAD SLAYBAUGH, DAN EBREO, TUFAIL AHMED, MUHAMMAD UMAIR, TINA JOHNSON. (2023, March 16). Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation. Retrieved May 15, 2023.
Internal MISP references
UUID a43dd8ce-23d6-5768-8522-6973dc45e1ac
which can be used as unique global reference for Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-15T00:00:00Z |
date_published | 2023-03-16T00:00:00Z |
source | MITRE |
title | Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation |
Mandiant Fortinet Zero Day
Marvi, A. et al.. (2023, March 16). Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation. Retrieved March 22, 2023.
Internal MISP references
UUID 7bdc5bbb-ebbd-5eb8-bd10-9087c883aea7
which can be used as unique global reference for Mandiant Fortinet Zero Day
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-22T00:00:00Z |
date_published | 2023-03-16T00:00:00Z |
source | MITRE |
title | Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation |
macOS Foundation
Apple. (n.d.). Foundation. Retrieved July 1, 2020.
Internal MISP references
UUID ea194268-0a8f-4494-be09-ef5f679f68fe
which can be used as unique global reference for macOS Foundation
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-07-01T00:00:00Z |
source | MITRE |
title | Foundation |
SentinelOne Lazarus macOS July 2020
Stokes, P. (2020, July 27). Four Distinct Families of Lazarus Malware Target Apple’s macOS Platform. Retrieved August 7, 2020.
Internal MISP references
UUID 489c52a2-34cc-47ff-b42b-9d48f83b9e90
which can be used as unique global reference for SentinelOne Lazarus macOS July 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-08-07T00:00:00Z |
date_published | 2020-07-27T00:00:00Z |
source | MITRE |
title | Four Distinct Families of Lazarus Malware Target Apple’s macOS Platform |
DOJ Russia Targeting Critical Infrastructure March 2022
Department of Justice. (2022, March 24). Four Russian Government Employees Charged in Two Historical Hacking Campaigns Targeting Critical Infrastructure Worldwide. Retrieved April 5, 2022.
Internal MISP references
UUID 768a0ec6-b767-4044-acad-82834508640f
which can be used as unique global reference for DOJ Russia Targeting Critical Infrastructure March 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-04-05T00:00:00Z |
date_published | 2022-03-24T00:00:00Z |
source | MITRE |
title | Four Russian Government Employees Charged in Two Historical Hacking Campaigns Targeting Critical Infrastructure Worldwide |
ClearkSky Fox Kitten February 2020
ClearSky. (2020, February 16). Fox Kitten – Widespread Iranian Espionage-Offensive Campaign. Retrieved December 21, 2020.
Internal MISP references
UUID a5ad6321-897a-4adc-9cdd-034a2538e3d6
which can be used as unique global reference for ClearkSky Fox Kitten February 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-12-21T00:00:00Z |
date_published | 2020-02-16T00:00:00Z |
source | MITRE, Tidal Cyber |
title | Fox Kitten – Widespread Iranian Espionage-Offensive Campaign |
FSISAC FraudNetDoS September 2012
FS-ISAC. (2012, September 17). Fraud Alert – Cyber Criminals Targeting Financial Institution Employee Credentials to Conduct Wire Transfer Fraud. Retrieved September 23, 2024.
Internal MISP references
UUID 9c8772eb-6d1d-4742-a2db-a5e1006effaa
which can be used as unique global reference for FSISAC FraudNetDoS September 2012
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-23T00:00:00Z |
date_published | 2012-09-17T00:00:00Z |
source | MITRE |
title | Fraud Alert – Cyber Criminals Targeting Financial Institution Employee Credentials to Conduct Wire Transfer Fraud |
MalwareBytes Ngrok February 2020
Segura, J. (2020, February 26). Fraudsters cloak credit card skimmer with fake content delivery network, ngrok server. Retrieved September 15, 2020.
Internal MISP references
UUID 531206c7-11ec-46bf-a35c-0464244a58c9
which can be used as unique global reference for MalwareBytes Ngrok February 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-09-15T00:00:00Z |
date_published | 2020-02-26T00:00:00Z |
source | MITRE |
title | Fraudsters cloak credit card skimmer with fake content delivery network, ngrok server |
Akami Frog4Shell 2024
Ori David. (2024, February 1). Frog4Shell — FritzFrog Botnet Adds One-Days to Its Arsenal. Retrieved September 24, 2024.
Internal MISP references
UUID c67a2ccb-7abf-5409-a216-503e661a6b1c
which can be used as unique global reference for Akami Frog4Shell 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-24T00:00:00Z |
date_published | 2024-02-01T00:00:00Z |
source | MITRE |
title | Frog4Shell — FritzFrog Botnet Adds One-Days to Its Arsenal |
ESET ComRAT May 2020
Faou, M. (2020, May). From Agent.btz to ComRAT v4: A ten-year journey. Retrieved June 15, 2020.
Internal MISP references
UUID cd9043b8-4d14-449b-a6b2-2e9b99103bb0
which can be used as unique global reference for ESET ComRAT May 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-06-15T00:00:00Z |
date_published | 2020-05-01T00:00:00Z |
source | MITRE |
title | From Agent.btz to ComRAT v4: A ten-year journey |
Azure AD to AD
Sean Metcalf. (2020, May 27). From Azure AD to Active Directory (via Azure) – An Unanticipated Attack Path. Retrieved September 28, 2022.
Internal MISP references
UUID 087d07a9-0d33-4253-b7c1-d55be13c0467
which can be used as unique global reference for Azure AD to AD
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-09-28T00:00:00Z |
date_published | 2020-05-27T00:00:00Z |
source | MITRE |
title | From Azure AD to Active Directory (via Azure) – An Unanticipated Attack Path |
blackmatter_blackcat
Pereira, T. Huey, C. (2022, March 17). From BlackMatter to BlackCat: Analyzing two attacks from one affiliate. Retrieved May 5, 2022.
Internal MISP references
UUID 605b58ea-9544-49b8-b3c8-0a97b2b155dc
which can be used as unique global reference for blackmatter_blackcat
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-05-05T00:00:00Z |
date_published | 2022-03-17T00:00:00Z |
source | MITRE |
title | From BlackMatter to BlackCat: Analyzing two attacks from one affiliate |
Proofpoint June 17 2024
Tommy Madjar, Dusty Miller, Selena Larson, The Proofpoint Threat Research Team. (2024, June 17). From Clipboard to Compromise A PowerShell Self-Pwn . Retrieved June 20, 2024.
Internal MISP references
UUID a65d7492-04a4-46d4-85ed-134786c6828b
which can be used as unique global reference for Proofpoint June 17 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-06-20T00:00:00Z |
date_published | 2024-06-17T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | From Clipboard to Compromise A PowerShell Self-Pwn |
proofpoint-selfpwn
Tommy Madjar, Dusty Miller, Selena Larson. (2024, June 17). From Clipboard to Compromise: A PowerShell Self-Pwn. Retrieved August 2, 2024.
Internal MISP references
UUID 8f00ffc0-7094-5fd9-8ed4-9c129fd93c05
which can be used as unique global reference for proofpoint-selfpwn
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-08-02T00:00:00Z |
date_published | 2024-06-17T00:00:00Z |
source | MITRE |
title | From Clipboard to Compromise: A PowerShell Self-Pwn |
Unit42 Malware Roundup December 29 2023
Samantha Stallings, Brad Duncan. (2023, December 29). From DarkGate to AsyncRAT: Malware Detected and Shared As Unit 42 Timely Threat Intelligence. Retrieved January 11, 2024.
Internal MISP references
UUID a18e19b5-9046-4c2c-bd94-2cd5061064bf
which can be used as unique global reference for Unit42 Malware Roundup December 29 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-01-11T00:00:00Z |
date_published | 2023-12-29T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | From DarkGate to AsyncRAT: Malware Detected and Shared As Unit 42 Timely Threat Intelligence |
Reaqta Mavinject
Reaqta. (2017, December 16). From False Positive to True Positive: the story of Mavinject.exe, the Microsoft Injector. Retrieved September 22, 2021.
Internal MISP references
UUID 5c0e0c84-2992-4098-8913-66a20ca61bf4
which can be used as unique global reference for Reaqta Mavinject
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-22T00:00:00Z |
date_published | 2017-12-16T00:00:00Z |
source | MITRE |
title | From False Positive to True Positive: the story of Mavinject.exe, the Microsoft Injector |
IBM MegaCortex
Del Fierro, C. Kessem, L.. (2020, January 8). From Mega to Giga: Cross-Version Comparison of Top MegaCortex Modifications. Retrieved February 15, 2021.
Internal MISP references
UUID 3d70d9b7-88e4-411e-a59a-bc862da965a7
which can be used as unique global reference for IBM MegaCortex
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-02-15T00:00:00Z |
date_published | 2020-01-08T00:00:00Z |
source | MITRE |
title | From Mega to Giga: Cross-Version Comparison of Top MegaCortex Modifications |
BiZone Lizar May 2021
BI.ZONE Cyber Threats Research Team. (2021, May 13). From pentest to APT attack: cybercriminal group FIN7 disguises its malware as an ethical hacker’s toolkit. Retrieved February 2, 2022.
Internal MISP references
UUID 315f47e1-69e5-4dcb-94b2-59583e91dd26
which can be used as unique global reference for BiZone Lizar May 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-02-02T00:00:00Z |
date_published | 2021-05-13T00:00:00Z |
source | MITRE |
title | From pentest to APT attack: cybercriminal group FIN7 disguises its malware as an ethical hacker’s toolkit |
Kaspersky StoneDrill 2017
Kaspersky Lab. (2017, March 7). From Shamoon to StoneDrill: Wipers attacking Saudi organizations and beyond. Retrieved March 14, 2019.
Internal MISP references
UUID e2637cb3-c449-4609-af7b-ac78a900cc8b
which can be used as unique global reference for Kaspersky StoneDrill 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-03-14T00:00:00Z |
date_published | 2017-03-07T00:00:00Z |
source | MITRE |
title | From Shamoon to StoneDrill: Wipers attacking Saudi organizations and beyond |
Proofpoint TA427 April 2024
Lesnewich, G. et al. (2024, April 16). From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering. Retrieved May 3, 2024.
Internal MISP references
UUID 620f5ff7-26c0-55c4-9b1b-c56ad2e1316b
which can be used as unique global reference for Proofpoint TA427 April 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-05-03T00:00:00Z |
date_published | 2024-04-16T00:00:00Z |
source | MITRE |
title | From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering |
SentinelOne Agrius 2021
Amitai Ben & Shushan Ehrlich. (2021, May). From Wiper to Ransomware: The Evolution of Agrius. Retrieved May 21, 2024.
Internal MISP references
UUID b5b433a1-5d12-5644-894b-c42d995c9ba5
which can be used as unique global reference for SentinelOne Agrius 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-05-21T00:00:00Z |
date_published | 2021-05-01T00:00:00Z |
source | MITRE |
title | From Wiper to Ransomware: The Evolution of Agrius |
FsiAnyCpu.exe - LOLBAS Project
LOLBAS. (2021, September 26). FsiAnyCpu.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 87031d31-b6d7-4860-b11b-5a0dc8774d92
which can be used as unique global reference for FsiAnyCpu.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2021-09-26T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | FsiAnyCpu.exe |
Fsi.exe - LOLBAS Project
LOLBAS. (2021, September 26). Fsi.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 4e14e87f-2ad9-4959-8cb2-8585b67931c0
which can be used as unique global reference for Fsi.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2021-09-26T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Fsi.exe |
fsutil_behavior
Microsoft. (2021, September 27). fsutil behavior. Retrieved January 14, 2022.
Internal MISP references
UUID 07712696-b1fd-4704-b157-9e420840fb2c
which can be used as unique global reference for fsutil_behavior
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-01-14T00:00:00Z |
date_published | 2021-09-27T00:00:00Z |
source | MITRE |
title | fsutil behavior |
Fsutil.exe - LOLBAS Project
LOLBAS. (2021, August 16). Fsutil.exe. Retrieved December 4, 2023.
Internal MISP references
UUID e2305dac-4245-4fac-8813-69cb210e9cd3
which can be used as unique global reference for Fsutil.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2021-08-16T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Fsutil.exe |
Microsoft FTP
Microsoft. (2021, July 21). ftp. Retrieved February 25, 2022.
Internal MISP references
UUID 970f8d16-f5b7-44e2-b81f-738b931c60d9
which can be used as unique global reference for Microsoft FTP
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-02-25T00:00:00Z |
date_published | 2021-07-21T00:00:00Z |
source | MITRE |
title | ftp |
Linux FTP
N/A. (n.d.). ftp(1) - Linux man page. Retrieved February 25, 2022.
Internal MISP references
UUID 021ea6bc-abff-48de-a6bb-315dbbfa6147
which can be used as unique global reference for Linux FTP
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-02-25T00:00:00Z |
source | MITRE |
title | ftp(1) - Linux man page |
Ftp.exe - LOLBAS Project
LOLBAS. (2018, December 10). Ftp.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 3b51993d-6062-4138-bfc6-a2c0fc5d039a
which can be used as unique global reference for Ftp.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2018-12-10T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Ftp.exe |
Microsoft WMI Filters
Microsoft. (2008, September 11). Fun with WMI Filters in Group Policy. Retrieved March 13, 2019.
Internal MISP references
UUID 2894c3bf-6f8d-4338-8206-4dc873e3bb8d
which can be used as unique global reference for Microsoft WMI Filters
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-03-13T00:00:00Z |
date_published | 2008-09-11T00:00:00Z |
source | MITRE |
title | Fun with WMI Filters in Group Policy |
Cybersecurity Advisory SVR TTP May 2021
NCSC, CISA, FBI, NSA. (2021, May 7). Further TTPs associated with SVR cyber actors. Retrieved July 29, 2021.
Internal MISP references
UUID e18c1b56-f29d-4ea9-a425-a6af8ac6a347
which can be used as unique global reference for Cybersecurity Advisory SVR TTP May 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-07-29T00:00:00Z |
date_published | 2021-05-07T00:00:00Z |
source | MITRE |
title | Further TTPs associated with SVR cyber actors |
RiskIQ Cobalt Nov 2017
Klijnsma, Y.. (2017, November 28). Gaffe Reveals Full List of Targets in Spear Phishing Attack Using Cobalt Strike Against Financial Institutions. Retrieved October 10, 2018.
Internal MISP references
UUID ebf961c5-bd68-42f3-8fd3-000946c7ae9c
which can be used as unique global reference for RiskIQ Cobalt Nov 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-10-10T00:00:00Z |
date_published | 2017-11-28T00:00:00Z |
source | MITRE |
title | Gaffe Reveals Full List of Targets in Spear Phishing Attack Using Cobalt Strike Against Financial Institutions |
Unit 42 PingPull Jun 2022
Unit 42. (2022, June 13). GALLIUM Expands Targeting Across Telecommunications, Government and Finance Sectors With New PingPull Tool. Retrieved August 7, 2022.
Internal MISP references
UUID ac6491ab-6ef1-4091-8a15-50e2cbafe157
which can be used as unique global reference for Unit 42 PingPull Jun 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-08-07T00:00:00Z |
date_published | 2022-06-13T00:00:00Z |
source | MITRE |
title | GALLIUM Expands Targeting Across Telecommunications, Government and Finance Sectors With New PingPull Tool |
Microsoft GALLIUM December 2019
MSTIC. (2019, December 12). GALLIUM: Targeting global telecom. Retrieved January 13, 2021.
Internal MISP references
UUID 5bc76b47-ff68-4031-a347-f2dc0daba203
which can be used as unique global reference for Microsoft GALLIUM December 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-01-13T00:00:00Z |
date_published | 2019-12-12T00:00:00Z |
source | MITRE, Tidal Cyber |
title | GALLIUM: Targeting global telecom |
Symantec Gallmaker Oct 2018
Symantec Security Response. (2018, October 10). Gallmaker: New Attack Group Eschews Malware to Live off the Land. Retrieved November 27, 2018.
Internal MISP references
UUID f47b3e2b-acdd-4487-88b9-de5cbe45cf33
which can be used as unique global reference for Symantec Gallmaker Oct 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-11-27T00:00:00Z |
date_published | 2018-10-10T00:00:00Z |
source | MITRE, Tidal Cyber |
title | Gallmaker: New Attack Group Eschews Malware to Live off the Land |
TrendMicro Gamaredon April 2020
Kakara, H., Maruyama, E. (2020, April 17). Gamaredon APT Group Use Covid-19 Lure in Campaigns. Retrieved May 19, 2020.
Internal MISP references
UUID 3800cfc2-0260-4b36-b629-7a336b9f9f10
which can be used as unique global reference for TrendMicro Gamaredon April 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-05-19T00:00:00Z |
date_published | 2020-04-17T00:00:00Z |
source | MITRE |
title | Gamaredon APT Group Use Covid-19 Lure in Campaigns |
ESET Gamaredon June 2020
Boutin, J. (2020, June 11). Gamaredon group grows its game. Retrieved June 16, 2020.
Internal MISP references
UUID 6532664d-2311-4b38-8960-f43762471729
which can be used as unique global reference for ESET Gamaredon June 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-06-16T00:00:00Z |
date_published | 2020-06-11T00:00:00Z |
source | MITRE |
title | Gamaredon group grows its game |
CERT-EE Gamaredon January 2021
CERT-EE. (2021, January 27). Gamaredon Infection: From Dropper to Entry. Retrieved February 17, 2022.
Internal MISP references
UUID fec320ed-29c1-40db-ad2e-701fda428922
which can be used as unique global reference for CERT-EE Gamaredon January 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-02-17T00:00:00Z |
date_published | 2021-01-27T00:00:00Z |
source | MITRE |
title | Gamaredon Infection: From Dropper to Entry |
Kaspersky Winnti June 2015
Tarakanov, D. (2015, June 22). Games are over: Winnti is now targeting pharmaceutical companies. Retrieved January 14, 2016.
Internal MISP references
UUID 86504950-0f4f-42bc-b003-24f60ae97c99
which can be used as unique global reference for Kaspersky Winnti June 2015
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-01-14T00:00:00Z |
date_published | 2015-06-22T00:00:00Z |
source | MITRE |
title | Games are over: Winnti is now targeting pharmaceutical companies |
WeLiveSecurity Gapz and Redyms Mar 2013
Matrosov, A. (2013, March 19). Gapz and Redyms droppers based on Power Loader code. Retrieved December 16, 2017.
Internal MISP references
UUID b8d328b7-2eb3-4851-8d44-2e1bad7710c2
which can be used as unique global reference for WeLiveSecurity Gapz and Redyms Mar 2013
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-16T00:00:00Z |
date_published | 2013-03-19T00:00:00Z |
source | MITRE |
title | Gapz and Redyms droppers based on Power Loader code |
theevilbit gatekeeper bypass 2021
Csaba Fitzl. (2021, June 29). GateKeeper - Not a Bypass (Again). Retrieved September 22, 2021.
Internal MISP references
UUID d00f373d-2133-47c3-9b0a-104ecc9a6869
which can be used as unique global reference for theevilbit gatekeeper bypass 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-22T00:00:00Z |
date_published | 2021-06-29T00:00:00Z |
source | MITRE |
title | GateKeeper - Not a Bypass (Again) |
Kaspersky Gauss Whitepaper
Kaspersky Lab. (2012, August). Gauss: Abnormal Distribution. Retrieved January 17, 2019.
Internal MISP references
UUID 4bf39390-f3ca-4132-841e-b35abefe7dee
which can be used as unique global reference for Kaspersky Gauss Whitepaper
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-01-17T00:00:00Z |
date_published | 2012-08-01T00:00:00Z |
source | MITRE |
title | Gauss: Abnormal Distribution |
Kaspersky MoleRATs April 2019
GReAT. (2019, April 10). Gaza Cybergang Group1, operation SneakyPastes. Retrieved May 13, 2020.
Internal MISP references
UUID 38216a34-5ffd-4e79-80b1-7270743b728e
which can be used as unique global reference for Kaspersky MoleRATs April 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-05-13T00:00:00Z |
date_published | 2019-04-10T00:00:00Z |
source | MITRE |
title | Gaza Cybergang Group1, operation SneakyPastes |
ESET Gazer Aug 2017
ESET. (2017, August). Gazing at Gazer: Turla’s new second stage backdoor. Retrieved September 14, 2017.
Internal MISP references
UUID 9d1c40af-d4bc-4d4a-b667-a17378942685
which can be used as unique global reference for ESET Gazer Aug 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-09-14T00:00:00Z |
date_published | 2017-08-01T00:00:00Z |
source | MITRE |
title | Gazing at Gazer: Turla’s new second stage backdoor |
file_sig_table
Kessler, G. (2022, December 9). GCK'S FILE SIGNATURES TABLE. Retrieved August 23, 2022.
Internal MISP references
UUID 4bc3a8af-d0c1-514d-9edd-dcebb3344db8
which can be used as unique global reference for file_sig_table
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-08-23T00:00:00Z |
date_published | 2022-12-09T00:00:00Z |
source | MITRE |
title | GCK'S FILE SIGNATURES TABLE |
Google Cloud Add Metadata
Google Cloud. (2022, March 31). gcloud compute instances add-metadata. Retrieved April 1, 2022.
Internal MISP references
UUID eba4b850-8784-4da2-b87d-54b5bd0f58d6
which can be used as unique global reference for Google Cloud Add Metadata
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-04-01T00:00:00Z |
date_published | 2022-03-31T00:00:00Z |
source | MITRE |
title | gcloud compute instances add-metadata |
Google Compute Instances
Google. (n.d.). gcloud compute instances list. Retrieved May 26, 2020.
Internal MISP references
UUID ae09e791-a00c-487b-b0e5-7768df0679a3
which can be used as unique global reference for Google Compute Instances
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-05-26T00:00:00Z |
source | MITRE |
title | gcloud compute instances list |
GCP SSH Key Add
Google. (n.d.). gcloud compute os-login ssh-keys add. Retrieved October 1, 2020.
Internal MISP references
UUID 372b6cfd-abdc-41b7-be78-4b1dc0426044
which can be used as unique global reference for GCP SSH Key Add
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-01T00:00:00Z |
source | MITRE |
title | gcloud compute os-login ssh-keys add |
Google Cloud - IAM Servie Accounts List API
Google. (2020, June 23). gcloud iam service-accounts list. Retrieved August 4, 2020.
Internal MISP references
UUID 3ffad706-1dac-41dd-b197-06f22fec3b30
which can be used as unique global reference for Google Cloud - IAM Servie Accounts List API
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-08-04T00:00:00Z |
date_published | 2020-06-23T00:00:00Z |
source | MITRE |
title | gcloud iam service-accounts list |
ESET Gelsemium June 2021
Dupuy, T. and Faou, M. (2021, June). Gelsemium. Retrieved November 30, 2021.
Internal MISP references
UUID ea28cf8c-8c92-48cb-b499-ffb7ff0e3cf5
which can be used as unique global reference for ESET Gelsemium June 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-11-30T00:00:00Z |
date_published | 2021-06-01T00:00:00Z |
source | MITRE |
title | Gelsemium |
TechNet Scheduled Task Events
Microsoft. (n.d.). General Task Registration. Retrieved December 12, 2017.
Internal MISP references
UUID 344703ac-f67c-465b-8c56-c9617675a00b
which can be used as unique global reference for TechNet Scheduled Task Events
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-12T00:00:00Z |
source | MITRE |
title | General Task Registration |
Ebowla: Genetic Malware
Morrow, T., Pitts, J. (2016, October 28). Genetic Malware: Designing Payloads for Specific Targets. Retrieved January 18, 2019.
Internal MISP references
UUID 8c65dbc1-33ad-470c-b172-7497c6fd2480
which can be used as unique global reference for Ebowla: Genetic Malware
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-01-18T00:00:00Z |
date_published | 2016-10-28T00:00:00Z |
source | MITRE |
title | Genetic Malware: Designing Payloads for Specific Targets |
Proofpoint NETWIRE December 2020
Proofpoint. (2020, December 2). Geofenced NetWire Campaigns. Retrieved January 7, 2021.
Internal MISP references
UUID 5a974fc5-31bb-44b5-9834-ef98175402ec
which can be used as unique global reference for Proofpoint NETWIRE December 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-01-07T00:00:00Z |
date_published | 2020-12-02T00:00:00Z |
source | MITRE |
title | Geofenced NetWire Campaigns |
Hartrell cd00r 2002
Hartrell, Greg. (2002, August). Get a handle on cd00r: The invisible backdoor. Retrieved October 13, 2018.
Internal MISP references
UUID 739e6517-10f5-484d-8000-8818d63e7341
which can be used as unique global reference for Hartrell cd00r 2002
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-10-13T00:00:00Z |
date_published | 2002-08-01T00:00:00Z |
source | MITRE |
title | Get a handle on cd00r: The invisible backdoor |
Kubectl Exec Get Shell
The Kubernetes Authors. (n.d.). Get a Shell to a Running Container. Retrieved March 29, 2021.
Internal MISP references
UUID ffb9c0ca-533f-4911-8c0c-a2653410a76d
which can be used as unique global reference for Kubectl Exec Get Shell
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-03-29T00:00:00Z |
source | MITRE |
title | Get a Shell to a Running Container |
Microsoft getglobaladdresslist
Microsoft. (n.d.). Get-GlobalAddressList. Retrieved October 6, 2019.
Internal MISP references
UUID a4948a80-d11c-44ed-ae63-e3f5660463f9
which can be used as unique global reference for Microsoft getglobaladdresslist
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-10-06T00:00:00Z |
source | MITRE |
title | Get-GlobalAddressList |
Jay GetHooks Sept 2011
Satiro, J. (2011, September 14). GetHooks. Retrieved December 12, 2017.
Internal MISP references
UUID 228ac239-3a97-446f-8e1c-d5c0f580710c
which can be used as unique global reference for Jay GetHooks Sept 2011
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-12T00:00:00Z |
date_published | 2011-09-14T00:00:00Z |
source | MITRE |
title | GetHooks |
Microsoft Get-InboxRule
Microsoft. (n.d.). Get-InboxRule. Retrieved June 10, 2021.
Internal MISP references
UUID c6a1b00c-22d4-407a-a515-fbce5c197606
which can be used as unique global reference for Microsoft Get-InboxRule
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-06-10T00:00:00Z |
source | MITRE |
title | Get-InboxRule |
Microsoft Msolrole
Microsoft. (n.d.). Get-MsolRole. Retrieved October 6, 2019.
Internal MISP references
UUID e36f4e3a-61c9-4fdc-98de-d51a2b3b4865
which can be used as unique global reference for Microsoft Msolrole
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-10-06T00:00:00Z |
source | MITRE |
title | Get-MsolRole |
Microsoft msolrolemember
Microsoft. (n.d.). Get-MsolRoleMember. Retrieved October 6, 2019.
Internal MISP references
UUID ca28494c-d834-4afc-9237-ab78dcfc427b
which can be used as unique global reference for Microsoft msolrolemember
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-10-06T00:00:00Z |
source | MITRE |
title | Get-MsolRoleMember |
JumpCloud Conditional Access Policies
JumpCloud. (n.d.). Get Started: Conditional Access Policies. Retrieved January 2, 2024.
Internal MISP references
UUID 585b4ed7-1f1b-5e7f-bf2b-3732e07309af
which can be used as unique global reference for JumpCloud Conditional Access Policies
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-01-02T00:00:00Z |
source | MITRE |
title | Get Started: Conditional Access Policies |
rowland linux at 2019
Craig Rowland. (2019, July 25). Getting an Attacker IP Address from a Malicious Linux At Job. Retrieved October 15, 2021.
Internal MISP references
UUID 85056eba-c587-4619-b5e4-dff9680be7b3
which can be used as unique global reference for rowland linux at 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-15T00:00:00Z |
date_published | 2019-07-25T00:00:00Z |
source | MITRE |
title | Getting an Attacker IP Address from a Malicious Linux At Job |
Elastic GuLoader December 5 2023
Daniel Stepanic. (2023, December 5). Getting gooey with GULOADER: deobfuscating the downloader. Retrieved February 27, 2024.
Internal MISP references
UUID 291fb8ac-a3d6-48a0-9c78-09e358634012
which can be used as unique global reference for Elastic GuLoader December 5 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-02-27T00:00:00Z |
date_published | 2023-12-05T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Getting gooey with GULOADER: deobfuscating the downloader |
BlackHatRobinSage
Ryan, T. (2010). “Getting In Bed with Robin Sage.”. Retrieved March 6, 2017.
Internal MISP references
UUID 82068e93-a3f8-4d05-9358-6fe76a0055bb
which can be used as unique global reference for BlackHatRobinSage
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-03-06T00:00:00Z |
date_published | 2010-01-01T00:00:00Z |
source | MITRE |
title | “Getting In Bed with Robin Sage.” |
AADInternals Root Access to Azure VMs
Dr. Nestori Syynimaa. (2020, June 4). Getting root access to Azure VMs as a Azure AD Global Administrator. Retrieved March 13, 2023.
Internal MISP references
UUID 7080ae79-bec4-5886-9a43-6039d0cfd32f
which can be used as unique global reference for AADInternals Root Access to Azure VMs
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-13T00:00:00Z |
date_published | 2020-06-04T00:00:00Z |
source | MITRE |
title | Getting root access to Azure VMs as a Azure AD Global Administrator |
Wardle Dylib Hijack Vulnerable Apps
Patrick Wardle. (2019, July 2). Getting Root with Benign AppStore Apps. Retrieved March 31, 2021.
Internal MISP references
UUID 128b4e3f-bb58-45e0-b8d9-bff9fc3ec3df
which can be used as unique global reference for Wardle Dylib Hijack Vulnerable Apps
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-03-31T00:00:00Z |
date_published | 2019-07-02T00:00:00Z |
source | MITRE |
title | Getting Root with Benign AppStore Apps |
Lua main page
Lua. (2024, June 25). Getting started. Retrieved August 5, 2024.
Internal MISP references
UUID 6d9298d3-ad9f-5b19-949c-84bef49f5f6c
which can be used as unique global reference for Lua main page
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-08-05T00:00:00Z |
date_published | 2024-06-25T00:00:00Z |
source | MITRE |
title | Getting started |
2 - appv
Microsoft. (2022, November 3). Getting started with App-V for Windows client. Retrieved February 6, 2024.
Internal MISP references
UUID 8305a718-e79f-5bf7-8af3-b117cf106c81
which can be used as unique global reference for 2 - appv
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-02-06T00:00:00Z |
date_published | 2022-11-03T00:00:00Z |
source | MITRE |
title | Getting started with App-V for Windows client |
MSDN VBA in Office
Austin, J. (2017, June 6). Getting Started with VBA in Office. Retrieved July 3, 2017.
Internal MISP references
UUID 9c44416d-1f3d-4d99-b497-4615ed6f5546
which can be used as unique global reference for MSDN VBA in Office
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-07-03T00:00:00Z |
date_published | 2017-06-06T00:00:00Z |
source | MITRE |
title | Getting Started with VBA in Office |
Windows Getting Started Drivers
Viviano, A. (2021, August 17). Getting started with Windows drivers: User mode and kernel mode. Retrieved September 24, 2021.
Internal MISP references
UUID 1b93e7ba-6afa-45ff-a9e2-3586cdae822c
which can be used as unique global reference for Windows Getting Started Drivers
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-24T00:00:00Z |
date_published | 2021-08-17T00:00:00Z |
source | MITRE |
title | Getting started with Windows drivers: User mode and kernel mode |
Bloxham
Bloxham, B. (n.d.). Getting Windows to Play with Itself [PowerPoint slides]. Retrieved November 12, 2014.
Internal MISP references
UUID b212d16f-5347-49ab-8339-432b4fd1ef50
which can be used as unique global reference for Bloxham
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2014-11-12T00:00:00Z |
source | MITRE |
title | Getting Windows to Play with Itself [PowerPoint slides] |
Microsoft GetWindowLong function
Microsoft. (n.d.). GetWindowLong function. Retrieved December 16, 2017.
Internal MISP references
UUID 4366217a-2325-4056-ab68-f5f4d2a0703c
which can be used as unique global reference for Microsoft GetWindowLong function
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-16T00:00:00Z |
source | MITRE |
title | GetWindowLong function |
Microsoft GFlags Mar 2017
Microsoft. (2017, May 23). GFlags Overview. Retrieved December 18, 2017.
Internal MISP references
UUID 9c11c382-b420-4cf9-9db2-eaa7b60aee2d
which can be used as unique global reference for Microsoft GFlags Mar 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-18T00:00:00Z |
date_published | 2017-05-23T00:00:00Z |
source | MITRE |
title | GFlags Overview |
GfxDownloadWrapper.exe - LOLBAS Project
LOLBAS. (2019, December 27). GfxDownloadWrapper.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 5d97b7d7-428e-4408-a4d3-00f52cf4bf15
which can be used as unique global reference for GfxDownloadWrapper.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2019-12-27T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | GfxDownloadWrapper.exe |
Kaspersky September 30 2021
Mark Lechtik. (2021, September 30). GhostEmperor From ProxyLogon to kernel mode. Retrieved October 24, 2024.
Internal MISP references
UUID 8851f554-05c6-4fb0-807e-2ef0bc28e131
which can be used as unique global reference for Kaspersky September 30 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-10-24T00:00:00Z |
date_published | 2021-09-30T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | GhostEmperor From ProxyLogon to kernel mode |
GhostToken GCP flaw
Sergiu Gatlan. (2023, April 21). GhostToken GCP flaw let attackers backdoor Google accounts. Retrieved September 18, 2023.
Internal MISP references
UUID 3f87bd65-4194-5be6-93a1-acde6eaef547
which can be used as unique global reference for GhostToken GCP flaw
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-18T00:00:00Z |
date_published | 2023-04-21T00:00:00Z |
source | MITRE |
title | GhostToken GCP flaw let attackers backdoor Google accounts |
GitHub ADRecon
adrecon. (n.d.). GitHub ADRecon. Retrieved March 5, 2024.
Internal MISP references
UUID 8ef4bcee-673d-4bab-8e18-947f45c6fc77
which can be used as unique global reference for GitHub ADRecon
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-05T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | GitHub ADRecon |
GitHub BeichenDream BadPotato
BeichenDream. (n.d.). GitHub BeichenDream BadPotato. Retrieved August 28, 2023.
Internal MISP references
UUID e7f1d932-4bcd-4a78-b975-f4ebbce8c05e
which can be used as unique global reference for GitHub BeichenDream BadPotato
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-08-28T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | GitHub BeichenDream BadPotato |
GitHub Chisel
jpillora. (n.d.). GitHub Chisel. Retrieved October 20, 2023.
Internal MISP references
UUID 4a60fb46-06b7-44ea-a9f6-8d6fa81e9363
which can be used as unique global reference for GitHub Chisel
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-10-20T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | GitHub Chisel |
GitHub cybershujin Threat-Actors-use-of-Artifical-Intelligence
cybershujin. (n.d.). GitHub cybershujin Threat-Actors-use-of-Artifical-Intelligence. Retrieved September 9, 2024.
Internal MISP references
UUID b595af7e-ff84-49fa-8e07-cd2abe9e1d65
which can be used as unique global reference for GitHub cybershujin Threat-Actors-use-of-Artifical-Intelligence
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-09T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | GitHub cybershujin Threat-Actors-use-of-Artifical-Intelligence |
Github evilginx2
Gretzky, Kuba. (2019, April 10). Retrieved October 8, 2019.
Internal MISP references
UUID 322e5d90-5095-47ea-b0e2-e7e5fb45fcca
which can be used as unique global reference for Github evilginx2
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-10-08T00:00:00Z |
source | MITRE |
title | Github evilginx2 |
GitHub evilginx2 - Duplicate
kgretzky. (n.d.). GitHub evilginx2. Retrieved December 14, 2023.
Internal MISP references
UUID eea178f4-80bd-49d1-84b1-f80671e9a3e4
which can be used as unique global reference for GitHub evilginx2 - Duplicate
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-14T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | GitHub evilginx2 |
GitHub Flangvik SharpExfiltrate
Flangvik. (n.d.). GitHub Flangvik SharpExfiltrate. Retrieved June 18, 2024.
Internal MISP references
UUID 7f0c0c86-c042-4a69-982a-c8c70ec1199c
which can be used as unique global reference for GitHub Flangvik SharpExfiltrate
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-06-18T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | GitHub Flangvik SharpExfiltrate |
GitHub Malleable C2
Mudge, R. (2014, July 14). Github Malleable-C2-Profiles safebrowsing.profile. Retrieved June 18, 2017.
Internal MISP references
UUID 0a609b90-dbaf-47bc-a642-1d180ca56498
which can be used as unique global reference for GitHub Malleable C2
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-06-18T00:00:00Z |
date_published | 2014-07-14T00:00:00Z |
source | MITRE |
title | Github Malleable-C2-Profiles safebrowsing.profile |
GitHub masscan
robertdavidgraham. (n.d.). GitHub masscan. Retrieved March 13, 2024.
Internal MISP references
UUID 7ae0b5c6-c9e5-4922-9e98-6483c81a8b42
which can be used as unique global reference for GitHub masscan
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-13T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | GitHub masscan |
GitHub meganz MEGAcmd
meganz. (n.d.). GitHub meganz MEGAcmd. Retrieved June 18, 2024.
Internal MISP references
UUID 6e4d67f5-cca1-4298-b21c-d7511aa264ae
which can be used as unique global reference for GitHub meganz MEGAcmd
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-06-18T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | GitHub meganz MEGAcmd |
GitHub meganz MEGAsync
GitHub. (n.d.). GitHub - meganz/MEGAsync: Easy automated syncing between your computers and your MEGA Cloud Drive. Retrieved June 22, 2023.
Internal MISP references
UUID 6e59c47d-597c-4687-942f-9f1cf1db75d5
which can be used as unique global reference for GitHub meganz MEGAsync
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-06-22T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | GitHub - meganz/MEGAsync: Easy automated syncing between your computers and your MEGA Cloud Drive |
GitHub - NYAN-x-CAT/AsyncRAT-C-Sharp: Open-Source Remote Administration Tool For Windows C
GitHub. (n.d.). GitHub - NYAN-x-CAT/AsyncRAT-C-Sharp: Open-Source Remote Administration Tool For Windows C#. Retrieved May 7, 2023.
Internal MISP references
UUID 6747f2cf-61bd-4d26-9bc1-10ce7a8e3e39
which can be used as unique global reference for GitHub - NYAN-x-CAT/AsyncRAT-C-Sharp: Open-Source Remote Administration Tool For Windows C#
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-07T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | GitHub - NYAN-x-CAT/AsyncRAT-C-Sharp: Open-Source Remote Administration Tool For Windows C# |
GitHub ohpe Juicy Potato
ohpe. (n.d.). GitHub ohpe Juicy Potato. Retrieved August 28, 2023.
Internal MISP references
UUID 16d0dd05-763a-4503-aa88-c8867d8f202d
which can be used as unique global reference for GitHub ohpe Juicy Potato
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-08-28T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | GitHub ohpe Juicy Potato |
GitHub outflanknl Dumpert
outflanknl. (n.d.). GitHub outflanknl Dumpert. Retrieved September 5, 2024.
Internal MISP references
UUID ab375812-def9-4491-a69f-62755fb26910
which can be used as unique global reference for GitHub outflanknl Dumpert
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-05T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | GitHub outflanknl Dumpert |
code_persistence_zsh
Leo Pitt. (2020, November 11). Github - PersistentJXA/BashProfilePersist.js. Retrieved January 11, 2021.
Internal MISP references
UUID b76d3ed0-e484-4ed1-aa6b-892a6f34e478
which can be used as unique global reference for code_persistence_zsh
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-01-11T00:00:00Z |
date_published | 2020-11-11T00:00:00Z |
source | MITRE |
title | Github - PersistentJXA/BashProfilePersist.js |
Github PowerShell Empire
Schroeder, W., Warner, J., Nelson, M. (n.d.). Github PowerShellEmpire. Retrieved April 28, 2016.
Internal MISP references
UUID 017ec673-454c-492a-a65b-10d3a20dfdab
which can be used as unique global reference for Github PowerShell Empire
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-04-28T00:00:00Z |
source | MITRE |
title | Github PowerShellEmpire |
GitHub Pupy
Nicolas Verdier. (n.d.). Retrieved January 29, 2018.
Internal MISP references
UUID 69d5cb59-6545-4405-8ca6-733db99d3ee9
which can be used as unique global reference for GitHub Pupy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-01-29T00:00:00Z |
source | MITRE |
title | GitHub Pupy |
GitHub purple-team-attack-automation - Available Modules
praetorian-inc. (n.d.). GitHub purple-team-attack-automation - Available Modules. Retrieved September 8, 2023.
Internal MISP references
UUID 9bca14cc-1302-49b3-b905-cdf48dedc32b
which can be used as unique global reference for GitHub purple-team-attack-automation - Available Modules
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-08T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | GitHub purple-team-attack-automation - Available Modules |
GitHub random_c2_profile
threatexpress. (n.d.). GitHub random_c2_profile. Retrieved September 21, 2023.
Internal MISP references
UUID dcb30328-6aa4-461b-8333-451d6af4b384
which can be used as unique global reference for GitHub random_c2_profile
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-21T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | GitHub random_c2_profile |
GitHub ransomware_map
cert-orangecyberdefense. (n.d.). GitHub ransomware_map. Retrieved March 13, 2024.
Internal MISP references
UUID d995f4b2-3262-4c37-855a-61aef7d7b8a8
which can be used as unique global reference for GitHub ransomware_map
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-13T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | GitHub ransomware_map |
GitHub rsockstun
llkat. (n.d.). GitHub rsockstun. Retrieved December 14, 2023.
Internal MISP references
UUID 1644457f-75d6-4064-a11b-9217249fa5e6
which can be used as unique global reference for GitHub rsockstun
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-14T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | GitHub rsockstun |
GitHub secretsdump
fortra. (n.d.). GitHub secretsdump. Retrieved November 16, 2023.
Internal MISP references
UUID c29a90a7-016f-49b7-a970-334290964f19
which can be used as unique global reference for GitHub secretsdump
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-11-16T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | GitHub secretsdump |
GitHub securesocketfunneling ssf
securesocketfunneling. (n.d.). GitHub securesocketfunneling ssf. Retrieved July 10, 2024.
Internal MISP references
UUID 077ab224-9406-4be7-8467-2a6da8dc786d
which can be used as unique global reference for GitHub securesocketfunneling ssf
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-07-10T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | GitHub securesocketfunneling ssf |
GitHub SharpChromium
djhohnstein. (n.d.). GitHub SharpChromium. Retrieved December 14, 2023.
Internal MISP references
UUID ca1956a5-72f2-43ad-a17f-a52ca97bd84e
which can be used as unique global reference for GitHub SharpChromium
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-14T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | GitHub SharpChromium |
GitHub SharpHound
BloodHoundAD. (n.d.). GitHub SharpHound. Retrieved March 7, 2024.
Internal MISP references
UUID e1c405b4-b591-4469-848c-7a7dd69151c0
which can be used as unique global reference for GitHub SharpHound
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-07T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | GitHub SharpHound |
GitHub SharpRoast
GhostPack. (n.d.). GitHub SharpRoast. Retrieved September 22, 2023.
Internal MISP references
UUID 43a2e05d-4662-4a5c-9c99-3165f0d71169
which can be used as unique global reference for GitHub SharpRoast
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-22T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | GitHub SharpRoast |
GitHub SILENTTRINITY March 2022
Salvati, M (2019, August 6). SILENTTRINITY. Retrieved March 23, 2022.
Internal MISP references
UUID cff66280-c592-4e3c-a56c-32a9620cf95c
which can be used as unique global reference for GitHub SILENTTRINITY March 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-03-23T00:00:00Z |
source | MITRE |
title | GitHub SILENTTRINITY March 2022 |
GitHub SoftEtherVPN SoftEtherVPN_Stable
SoftEtherVPN. (n.d.). GitHub SoftEtherVPN SoftEtherVPN_Stable. Retrieved August 28, 2023.
Internal MISP references
UUID f9d28db2-499f-407c-94d2-652b9ed5f928
which can be used as unique global reference for GitHub SoftEtherVPN SoftEtherVPN_Stable
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-08-28T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | GitHub SoftEtherVPN SoftEtherVPN_Stable |
GitHub Terminator
ZeroMemoryEx. (n.d.). GitHub Terminator. Retrieved March 13, 2024.
Internal MISP references
UUID c2556bcf-9cc9-4f46-8a0f-8f8d801dfdbf
which can be used as unique global reference for GitHub Terminator
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-13T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | GitHub Terminator |
GitHub wavestone-cdt EDRSandBlast
wavestone-cdt. (n.d.). GitHub wavestone-cdt EDRSandBlast. Retrieved September 5, 2024.
Internal MISP references
UUID 228dd3e1-1952-447c-a500-31663a2efe45
which can be used as unique global reference for GitHub wavestone-cdt EDRSandBlast
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-05T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | GitHub wavestone-cdt EDRSandBlast |
GitHub xmrig-proxy
xmrig. (n.d.). GitHub xmrig-proxy. Retrieved October 25, 2023.
Internal MISP references
UUID bd2a5de0-f55f-4eeb-a11f-8ec1e9f2ae2b
which can be used as unique global reference for GitHub xmrig-proxy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-10-25T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | GitHub xmrig-proxy |
GitHub Gitrob
Michael Henriksen. (2018, June 9). Gitrob: Putting the Open Source in OSINT. Retrieved October 19, 2020.
Internal MISP references
UUID 1dee0842-15cc-4835-b8a8-938e0c94807b
which can be used as unique global reference for GitHub Gitrob
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-19T00:00:00Z |
date_published | 2018-06-09T00:00:00Z |
source | MITRE |
title | Gitrob: Putting the Open Source in OSINT |
FireEye DNS Hijack 2019
Hirani, M., Jones, S., Read, B. (2019, January 10). Global DNS Hijacking Campaign: DNS Record Manipulation at Scale. Retrieved October 9, 2020.
Internal MISP references
UUID 2c696e90-11eb-4196-9946-b5c4c11ccddc
which can be used as unique global reference for FireEye DNS Hijack 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-09T00:00:00Z |
date_published | 2019-01-10T00:00:00Z |
source | MITRE |
title | Global DNS Hijacking Campaign: DNS Record Manipulation at Scale |
McAfee Night Dragon
McAfee® Foundstone® Professional Services and McAfee Labs™. (2011, February 10). Global Energy Cyberattacks: “Night Dragon”. Retrieved February 19, 2018.
Internal MISP references
UUID 242d2933-ca2b-4511-803a-454727a3acc5
which can be used as unique global reference for McAfee Night Dragon
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-02-19T00:00:00Z |
date_published | 2011-02-10T00:00:00Z |
source | MITRE |
title | Global Energy Cyberattacks: “Night Dragon” |
GMER Rootkits
GMER. (n.d.). GMER. Retrieved December 12, 2017.
Internal MISP references
UUID f43e9881-4919-4ccc-b2ed-929d7838b2b4
which can be used as unique global reference for GMER Rootkits
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-12T00:00:00Z |
source | MITRE |
title | GMER |
Gnome Remote Desktop grd-settings
Pascal Nowack. (n.d.). Retrieved September 21, 2021.
Internal MISP references
UUID 8f494ff3-b02b-470b-a57d-d2275989f541
which can be used as unique global reference for Gnome Remote Desktop grd-settings
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-21T00:00:00Z |
source | MITRE |
title | Gnome Remote Desktop grd-settings |
Gnome Remote Desktop gschema
Pascal Nowack. (n.d.). Retrieved September 21, 2021.
Internal MISP references
UUID c7c749d5-b1b0-4a0f-8d14-eef47cfa1279
which can be used as unique global reference for Gnome Remote Desktop gschema
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-21T00:00:00Z |
source | MITRE |
title | Gnome Remote Desktop gschema |
MITRE Trustworthy Firmware Measurement
Upham, K. (2014, March). Going Deep into the BIOS with MITRE Firmware Security Research. Retrieved January 5, 2016.
Internal MISP references
UUID 25f52172-293e-4b23-9239-201a0ddbcdf1
which can be used as unique global reference for MITRE Trustworthy Firmware Measurement
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-01-05T00:00:00Z |
date_published | 2014-03-01T00:00:00Z |
source | MITRE |
title | Going Deep into the BIOS with MITRE Firmware Security Research |
Secureworks Gold Blackburn Mar 2022
Secureworks Counter Threat Unit. (2022, March 1). Gold Blackburn Threat Profile. Retrieved June 15, 2023.
Internal MISP references
UUID b6b27fa9-488c-5b6d-8e12-fe8371846cd3
which can be used as unique global reference for Secureworks Gold Blackburn Mar 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-06-15T00:00:00Z |
date_published | 2022-03-01T00:00:00Z |
source | MITRE |
title | Gold Blackburn Threat Profile |
Secureworks GOLD CABIN
Secureworks. (n.d.). GOLD CABIN Threat Profile. Retrieved March 17, 2021.
Internal MISP references
UUID 778babec-e7d3-4341-9e33-aab361f2b98a
which can be used as unique global reference for Secureworks GOLD CABIN
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-03-17T00:00:00Z |
source | MITRE, Tidal Cyber |
title | GOLD CABIN Threat Profile |
McAfee Gold Dragon
Sherstobitoff, R., Saavedra-Morales, J. (2018, February 02). Gold Dragon Widens Olympics Malware Attacks, Gains Permanent Presence on Victims’ Systems. Retrieved June 6, 2018.
Internal MISP references
UUID 4bdfa92b-cbbd-43e6-aa3e-422561ff8d7a
which can be used as unique global reference for McAfee Gold Dragon
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-06-06T00:00:00Z |
date_published | 2018-02-02T00:00:00Z |
source | MITRE |
title | Gold Dragon Widens Olympics Malware Attacks, Gains Permanent Presence on Victims’ Systems |
Cyberark Golden SAML
Reiner, S. (2017, November 21). Golden SAML: Newly Discovered Attack Technique Forges Authentication to Cloud Apps. Retrieved December 17, 2020.
Internal MISP references
UUID 58083370-8126-47d3-827c-1910ed3f4b2a
which can be used as unique global reference for Cyberark Golden SAML
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-12-17T00:00:00Z |
date_published | 2017-11-21T00:00:00Z |
source | MITRE |
title | Golden SAML: Newly Discovered Attack Technique Forges Authentication to Cloud Apps |
Trustwave GoldenSpy2 June 2020
Trustwave SpiderLabs. (2020, June 26). GoldenSpy: Chapter Two – The Uninstaller. Retrieved July 23, 2020.
Internal MISP references
UUID 5031e82e-66e8-4ae0-be47-53daa87ddf94
which can be used as unique global reference for Trustwave GoldenSpy2 June 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-07-23T00:00:00Z |
date_published | 2020-06-26T00:00:00Z |
source | MITRE |
title | GoldenSpy: Chapter Two – The Uninstaller |
Secureworks GOLD IONIC April 2024
Counter Threat Unit Research Team. (2024, April 15). GOLD IONIC DEPLOYS INC RANSOMWARE. Retrieved June 5, 2024.
Internal MISP references
UUID e723e7b3-496f-5ab4-abaf-83859e7e912d
which can be used as unique global reference for Secureworks GOLD IONIC April 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-06-05T00:00:00Z |
date_published | 2024-04-15T00:00:00Z |
source | MITRE |
title | GOLD IONIC DEPLOYS INC RANSOMWARE |
Secureworks GOLD KINGSWOOD Threat Profile
Secureworks. (n.d.). GOLD KINGSWOOD. Retrieved October 18, 2021.
Internal MISP references
UUID 36035bbb-1609-4461-be27-ef4a920b814c
which can be used as unique global reference for Secureworks GOLD KINGSWOOD Threat Profile
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-18T00:00:00Z |
source | MITRE |
title | GOLD KINGSWOOD |
MSTIC NOBELIUM Mar 2021
Nafisi, R., Lelli, A. (2021, March 4). GoldMax, GoldFinder, and Sibot: Analyzing NOBELIUM’s layered persistence. Retrieved March 8, 2021.
Internal MISP references
UUID 8688a0a9-d644-4b96-81bb-031f1f898652
which can be used as unique global reference for MSTIC NOBELIUM Mar 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-03-08T00:00:00Z |
date_published | 2021-03-04T00:00:00Z |
source | MITRE |
title | GoldMax, GoldFinder, and Sibot: Analyzing NOBELIUM’s layered persistence |
Secureworks GOLD NIAGARA Threat Profile
CTU. (n.d.). GOLD NIAGARA. Retrieved September 21, 2021.
Internal MISP references
UUID b11276cb-f6dd-4e91-90cd-9c287fb3e6b1
which can be used as unique global reference for Secureworks GOLD NIAGARA Threat Profile
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-21T00:00:00Z |
source | MITRE |
title | GOLD NIAGARA |
Secureworks Gold Prelude Profile
Secureworks. (n.d.). GOLD PRELUDE . Retrieved March 22, 2024.
Internal MISP references
UUID b16ae37d-5244-5c1e-92a9-e494b5a9ef49
which can be used as unique global reference for Secureworks Gold Prelude Profile
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-22T00:00:00Z |
source | MITRE |
title | GOLD PRELUDE |
Secureworks GOLD SAHARA
Secureworks. (n.d.). GOLD SAHARA. Retrieved February 20, 2024.
Internal MISP references
UUID 3abb7995-4a62-56a6-9492-942965edf0a0
which can be used as unique global reference for Secureworks GOLD SAHARA
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-02-20T00:00:00Z |
source | MITRE |
title | GOLD SAHARA |
Secureworks GOLD SOUTHFIELD
Secureworks. (n.d.). GOLD SOUTHFIELD. Retrieved October 6, 2020.
Internal MISP references
UUID 01d1ffaa-16b3-41c4-bb5a-afe2b41f1142
which can be used as unique global reference for Secureworks GOLD SOUTHFIELD
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-06T00:00:00Z |
source | MITRE |
title | GOLD SOUTHFIELD |
Google Chrome Remote Desktop
Google. (n.d.). Retrieved March 14, 2024.
Internal MISP references
UUID 70c87a07-38eb-53d2-8b63-013eb3ce62c8
which can be used as unique global reference for Google Chrome Remote Desktop
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-14T00:00:00Z |
source | MITRE |
title | Google Chrome Remote Desktop |
Google Cloud Identity API Documentation
Google. (n.d.). Retrieved March 16, 2021.
Internal MISP references
UUID 67f2719e-74fd-4bc1-9eeb-07d3095a5191
which can be used as unique global reference for Google Cloud Identity API Documentation
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-03-16T00:00:00Z |
source | MITRE |
title | Google Cloud Identity API Documentation |
GCPBucketBrute
Spencer Gietzen. (2019, February 26). Google Cloud Platform (GCP) Bucket Enumeration and Privilege Escalation. Retrieved March 4, 2022.
Internal MISP references
UUID d956e1f6-37ca-4352-b275-84c174888b88
which can be used as unique global reference for GCPBucketBrute
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-03-04T00:00:00Z |
date_published | 2019-02-26T00:00:00Z |
source | MITRE |
title | Google Cloud Platform (GCP) Bucket Enumeration and Privilege Escalation |
ExploitDB GoogleHacking
Offensive Security. (n.d.). Google Hacking Database. Retrieved October 23, 2020.
Internal MISP references
UUID 29714b88-a1ff-4684-a3b0-35c3a2c78947
which can be used as unique global reference for ExploitDB GoogleHacking
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-23T00:00:00Z |
source | MITRE |
title | Google Hacking Database |
Freejacked
Clark, Michael. (2023, August 14). Google’s Vertex AI Platform Gets Freejacked. Retrieved February 28, 2024.
Internal MISP references
UUID c7007fa4-bc07-59aa-820e-ffeea1486ed6
which can be used as unique global reference for Freejacked
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-02-28T00:00:00Z |
date_published | 2023-08-14T00:00:00Z |
source | MITRE |
title | Google’s Vertex AI Platform Gets Freejacked |
Google Workspace Global Access List
Google. (n.d.). Retrieved March 16, 2021.
Internal MISP references
UUID 5104f0ea-1fb6-4260-a9b6-95922b3a8e5b
which can be used as unique global reference for Google Workspace Global Access List
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-03-16T00:00:00Z |
source | MITRE |
title | Google Workspace Global Access List |
OWN-CERT Google App Script 2024
L'Hutereau Arnaud. (n.d.). Google Workspace Malicious App Script analysis. Retrieved October 2, 2024.
Internal MISP references
UUID 1f837b2d-6b45-57ed-8d34-a78ce88cb998
which can be used as unique global reference for OWN-CERT Google App Script 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-10-02T00:00:00Z |
source | MITRE |
title | Google Workspace Malicious App Script analysis |
Trend Micro January 09 2023
Trend Micro. (2023, January 9). Gootkit Loader Actively Targets Australian Healthcare Industry. Retrieved May 7, 2023.
Internal MISP references
UUID 903861d2-cd45-4bda-bc70-2a44c6d49aa6
which can be used as unique global reference for Trend Micro January 09 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-07T00:00:00Z |
date_published | 2023-01-09T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Gootkit Loader Actively Targets Australian Healthcare Industry |
Sophos Gootloader
Szappanos, G. & Brandt, A. (2021, March 1). “Gootloader” expands its payload delivery options. Retrieved September 30, 2022.
Internal MISP references
UUID 63357292-0f08-4405-a45a-34b606ab7110
which can be used as unique global reference for Sophos Gootloader
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-09-30T00:00:00Z |
date_published | 2021-03-01T00:00:00Z |
source | MITRE |
title | “Gootloader” expands its payload delivery options |
SentinelOne Gootloader June 2021
Pirozzi, A. (2021, June 16). Gootloader: ‘Initial Access as a Service’ Platform Expands Its Search for High Value Targets. Retrieved May 28, 2024.
Internal MISP references
UUID 8512c5fd-2ddc-5de4-bb7d-8012402efbb5
which can be used as unique global reference for SentinelOne Gootloader June 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-05-28T00:00:00Z |
date_published | 2021-06-16T00:00:00Z |
source | MITRE |
title | Gootloader: ‘Initial Access as a Service’ Platform Expands Its Search for High Value Targets |
SentinelLabs Gootloader June 2021
Antonio Pirozzi. (2021, June 16). Gootloader: ‘Initial Access as a Service’ Platform Expands Its Search for High Value Targets. Retrieved May 7, 2023.
Internal MISP references
UUID 1ab5b9c2-4e91-420f-9a27-661588d0bd71
which can be used as unique global reference for SentinelLabs Gootloader June 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-07T00:00:00Z |
date_published | 2021-06-16T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Gootloader: ‘Initial Access as a Service’ Platform Expands Its Search for High Value Targets |
Cybereason Gootloader February 2023
Loïc Castel, Jakes Jansen, Nitin Grover. (2023, February 14). GootLoader - SEO Poisoning and Large Payloads Leading to Compromise. Retrieved May 18, 2023.
Internal MISP references
UUID 098bf58f-3868-4892-bb4d-c78ce8817a02
which can be used as unique global reference for Cybereason Gootloader February 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-18T00:00:00Z |
date_published | 2023-02-14T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | GootLoader - SEO Poisoning and Large Payloads Leading to Compromise |
GoTo Resolve
GoTo. (n.d.). GoTo Resolve. Retrieved October 11, 2024.
Internal MISP references
UUID f1a13cad-b77e-4c38-925c-038a4fcec8d3
which can be used as unique global reference for GoTo Resolve
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-10-11T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | GoTo Resolve |
SentinelOne 1 16 2023
Jim Walter. (2023, January 16). Gotta Catch 'Em All . Retrieved January 1, 2024.
Internal MISP references
UUID 1482155f-e70d-434c-ade0-23543a4124fe
which can be used as unique global reference for SentinelOne 1 16 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-01-01T00:00:00Z |
date_published | 2023-01-16T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Gotta Catch 'Em All |
Unit 42 CARROTBAT January 2020
McCabe, A. (2020, January 23). The Fractured Statue Campaign: U.S. Government Agency Targeted in Spear-Phishing Attacks. Retrieved June 2, 2020.
Internal MISP references
UUID b65442ca-18ca-42e0-8be0-7c2b66c26d02
which can be used as unique global reference for Unit 42 CARROTBAT January 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-06-02T00:00:00Z |
source | MITRE |
title | Government Agency Targeted in Spear-Phishing Attacks |
Secureworks BRONZE SILHOUETTE May 2023
Counter Threat Unit Research Team. (2023, May 24). Chinese Cyberespionage Group BRONZE SILHOUETTE Targets U.S. Government and Defense Organizations. Retrieved July 27, 2023.
Internal MISP references
UUID 77624549-e170-5894-9219-a15b4aa31726
which can be used as unique global reference for Secureworks BRONZE SILHOUETTE May 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-07-27T00:00:00Z |
source | MITRE |
title | Government and Defense Organizations |
Google_WinRAR_vuln_2023
Morgan, K. (2023, October 18). Government-backed actors exploiting WinRAR vulnerability. Retrieved July 19, 2024.
Internal MISP references
UUID 009ac8a4-7e2b-543e-82aa-ce3cc9f0c35e
which can be used as unique global reference for Google_WinRAR_vuln_2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-07-19T00:00:00Z |
date_published | 2023-10-18T00:00:00Z |
source | MITRE |
title | Government-backed actors exploiting WinRAR vulnerability |
Google TAG CVE-2023-38831 October 18 2023
Kate Morgan. (2023, October 18). Government-backed actors exploiting WinRAR vulnerability. Retrieved July 10, 2024.
Internal MISP references
UUID 6e8fb629-4bb8-4557-9d42-385060be598f
which can be used as unique global reference for Google TAG CVE-2023-38831 October 18 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-07-10T00:00:00Z |
date_published | 2023-10-18T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Government-backed actors exploiting WinRAR vulnerability |
DOJ KVBotnet 2024
US Department of Justice. (2024, January 31). U.S. Government Disrupts Botnet People’s Republic of China Used to Conceal Hacking of Critical Infrastructure. Retrieved June 10, 2024.
Internal MISP references
UUID 55cf0ced-0de3-5af8-b3e6-3c33bb445593
which can be used as unique global reference for DOJ KVBotnet 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-06-10T00:00:00Z |
source | MITRE |
title | Government Disrupts Botnet People’s Republic of China Used to Conceal Hacking of Critical Infrastructure |
FireEye HAWKBALL Jun 2019
Patil, S. and Williams, M.. (2019, June 5). Government Sector in Central Asia Targeted With New HAWKBALL Backdoor Delivered via Microsoft Office Vulnerabilities. Retrieved June 20, 2019.
Internal MISP references
UUID c88150b1-8c0a-4fc5-b5b7-11e242af1c43
which can be used as unique global reference for FireEye HAWKBALL Jun 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-06-20T00:00:00Z |
date_published | 2019-06-05T00:00:00Z |
source | MITRE |
title | Government Sector in Central Asia Targeted With New HAWKBALL Backdoor Delivered via Microsoft Office Vulnerabilities |
CISA AA20-296A Berserk Bear December 2020
CISA. (2020, December 1). Russian State-Sponsored Advanced Persistent Threat Actor Compromises U.S. Government Targets. Retrieved December 9, 2021.
Internal MISP references
UUID c7bc4b25-2043-4f43-8320-590f82d0e09a
which can be used as unique global reference for CISA AA20-296A Berserk Bear December 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-12-09T00:00:00Z |
source | MITRE, Tidal Cyber |
title | Government Targets |
Obscuresecurity Get-GPPPassword
Campbell, C. (2012, May 24). GPP Password Retrieval with PowerShell. Retrieved April 11, 2018.
Internal MISP references
UUID 54351cf9-8d2a-47fb-92d5-fe64b628ab06
which can be used as unique global reference for Obscuresecurity Get-GPPPassword
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-04-11T00:00:00Z |
date_published | 2012-05-24T00:00:00Z |
source | MITRE |
title | GPP Password Retrieval with PowerShell |
Microsoft gpresult
Microsoft. (2017, October 16). gpresult. Retrieved August 6, 2021.
Internal MISP references
UUID 88af38e8-e437-4153-80af-a1be8c6a8629
which can be used as unique global reference for Microsoft gpresult
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-08-06T00:00:00Z |
date_published | 2017-10-16T00:00:00Z |
source | MITRE |
title | gpresult |
Gpscript.exe - LOLBAS Project
LOLBAS. (2018, May 25). Gpscript.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 619f57d9-d93b-4e9b-aae0-6ce89d91deb6
which can be used as unique global reference for Gpscript.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2018-05-25T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Gpscript.exe |
ESET Grandoreiro April 2020
ESET. (2020, April 28). Grandoreiro: How engorged can an EXE get?. Retrieved November 13, 2020.
Internal MISP references
UUID d6270492-986b-4fb6-bdbc-2e364947847c
which can be used as unique global reference for ESET Grandoreiro April 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-11-13T00:00:00Z |
date_published | 2020-04-28T00:00:00Z |
source | MITRE |
title | Grandoreiro: How engorged can an EXE get? |
IBM Grandoreiro April 2020
Abramov, D. (2020, April 13). Grandoreiro Malware Now Targeting Banks in Spain. Retrieved November 12, 2020.
Internal MISP references
UUID a2d4bca5-d57d-4a77-95c6-409f90115e2f
which can be used as unique global reference for IBM Grandoreiro April 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-11-12T00:00:00Z |
date_published | 2020-04-13T00:00:00Z |
source | MITRE |
title | Grandoreiro Malware Now Targeting Banks in Spain |
Guardian Grand Theft Auto Leak 2022
Keza MacDonald, Keith Stuart and Alex Hern. (2022, September 19). Grand Theft Auto 6 leak: who hacked Rockstar and what was stolen?. Retrieved August 30, 2024.
Internal MISP references
UUID ec648a9b-025a-52a0-a98a-7ba04388d52e
which can be used as unique global reference for Guardian Grand Theft Auto Leak 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-08-30T00:00:00Z |
date_published | 2022-09-19T00:00:00Z |
source | MITRE |
title | Grand Theft Auto 6 leak: who hacked Rockstar and what was stolen? |
AWS PassRole
AWS. (n.d.). Granting a user permissions to pass a role to an AWS service. Retrieved July 10, 2023.
Internal MISP references
UUID 01e0c198-dd59-5dd1-b632-73cb316eafe0
which can be used as unique global reference for AWS PassRole
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-07-10T00:00:00Z |
source | MITRE |
title | Granting a user permissions to pass a role to an AWS service |
Microsoft Azure Storage Shared Access Signature
Microsoft. (2023, June 7). Grant limited access to Azure Storage resources using shared access signatures (SAS). Retrieved March 4, 2024.
Internal MISP references
UUID 9031357f-04ac-5c07-a59d-97b9e32edf79
which can be used as unique global reference for Microsoft Azure Storage Shared Access Signature
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-04T00:00:00Z |
date_published | 2023-06-07T00:00:00Z |
source | MITRE |
title | Grant limited access to Azure Storage resources using shared access signatures (SAS) |
CopyFromScreen .NET
Microsoft. (n.d.). Graphics.CopyFromScreen Method. Retrieved March 24, 2020.
Internal MISP references
UUID b9733af4-ffb4-416e-884e-d51649aecbce
which can be used as unique global reference for CopyFromScreen .NET
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-03-24T00:00:00Z |
source | MITRE |
title | Graphics.CopyFromScreen Method |
Talos GravityRAT
Mercer, W., Rascagneres, P. (2018, April 26). GravityRAT - The Two-Year Evolution Of An APT Targeting India. Retrieved May 16, 2018.
Internal MISP references
UUID 2d7a1d72-cc9a-4b0b-a89a-e24ca836879b
which can be used as unique global reference for Talos GravityRAT
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-05-16T00:00:00Z |
date_published | 2018-04-26T00:00:00Z |
source | MITRE |
title | GravityRAT - The Two-Year Evolution Of An APT Targeting India |
FireEye PowerShell Logging
Dunwoody, M. (2016, February 11). Greater Visibility Through PowerShell Logging. Retrieved September 28, 2021.
Internal MISP references
UUID 02ee8297-60e8-42bf-8791-2461ebc29207
which can be used as unique global reference for FireEye PowerShell Logging
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-28T00:00:00Z |
date_published | 2016-02-11T00:00:00Z |
source | MITRE |
title | Greater Visibility Through PowerShell Logging |
FireEye PowerShell Logging 2016
Dunwoody, M. (2016, February 11). GREATER VISIBILITY THROUGH POWERSHELL LOGGING. Retrieved February 16, 2016.
Internal MISP references
UUID eb1e9dc7-b935-42ae-bbde-d2fdda5953db
which can be used as unique global reference for FireEye PowerShell Logging 2016
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-02-16T00:00:00Z |
date_published | 2016-02-11T00:00:00Z |
source | MITRE |
title | GREATER VISIBILITY THROUGH POWERSHELL LOGGING |
Glitch-Cat Green Lambert ATTCK Oct 2021
Sandvik, Runa. (2021, October 18). Green Lambert and ATT&CK. Retrieved March 21, 2022.
Internal MISP references
UUID f22d033c-4474-4bd7-b194-c7a4d9819a2b
which can be used as unique global reference for Glitch-Cat Green Lambert ATTCK Oct 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-03-21T00:00:00Z |
date_published | 2021-10-18T00:00:00Z |
source | MITRE |
title | Green Lambert and ATT&CK |
GreenMwizi - Kenyan scamming campaign using Twitter bots
blog.bushidotoken.net. (n.d.). GreenMwizi - Kenyan scamming campaign using Twitter bots. Retrieved May 7, 2023.
Internal MISP references
UUID 3b09696a-1345-4283-a59b-e9a13124ef59
which can be used as unique global reference for GreenMwizi - Kenyan scamming campaign using Twitter bots
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-07T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | GreenMwizi - Kenyan scamming campaign using Twitter bots |
ESET GreyEnergy Oct 2018
Cherepanov, A. (2018, October). GREYENERGY A successor to BlackEnergy. Retrieved November 15, 2018.
Internal MISP references
UUID f3e70f41-6c22-465c-b872-a7ec5e6a3e67
which can be used as unique global reference for ESET GreyEnergy Oct 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-11-15T00:00:00Z |
date_published | 2018-10-01T00:00:00Z |
source | MITRE |
title | GREYENERGY A successor to BlackEnergy |
GRIZZLY STEPPE JAR
Department of Homeland Security and Federal Bureau of Investigation. (2016, December 29). GRIZZLY STEPPE – Russian Malicious Cyber Activity. Retrieved January 11, 2017.
Internal MISP references
UUID 4b26d274-497f-49bc-a2a5-b93856a49893
which can be used as unique global reference for GRIZZLY STEPPE JAR
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-01-11T00:00:00Z |
date_published | 2016-12-29T00:00:00Z |
source | MITRE |
title | GRIZZLY STEPPE – Russian Malicious Cyber Activity |
Citizen Lab Group5
Scott-Railton, J., et al. (2016, August 2). Group5: Syria and the Iranian Connection. Retrieved September 26, 2016.
Internal MISP references
UUID ffbec5e8-947a-4363-b7e1-812dfd79935a
which can be used as unique global reference for Citizen Lab Group5
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-09-26T00:00:00Z |
date_published | 2016-08-02T00:00:00Z |
source | MITRE, Tidal Cyber |
title | Group5: Syria and the Iranian Connection |
Group-IB Threat Intelligence Tweet October 9 2023
GroupIB_TI. (2023, October 9). Group-IB Threat Intelligence Tweet October 9 2023. Retrieved October 10, 2023.
Internal MISP references
UUID 2df546ed-6577-44b2-9b26-0a17c3622df7
which can be used as unique global reference for Group-IB Threat Intelligence Tweet October 9 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-10-10T00:00:00Z |
date_published | 2023-10-09T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Group-IB Threat Intelligence Tweet October 9 2023 |
TechNet Group Policy Basics
srachui. (2012, February 13). Group Policy Basics – Part 1: Understanding the Structure of a Group Policy Object. Retrieved March 5, 2019.
Internal MISP references
UUID 9b9c8c6c-c272-424e-a594-a34b7bf62477
which can be used as unique global reference for TechNet Group Policy Basics
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-03-05T00:00:00Z |
date_published | 2012-02-13T00:00:00Z |
source | MITRE |
title | Group Policy Basics – Part 1: Understanding the Structure of a Group Policy Object |
Microsoft GPP 2016
Microsoft. (2016, August 31). Group Policy Preferences. Retrieved March 9, 2020.
Internal MISP references
UUID fa3beaf1-81e7-411b-849a-24cffaf7c552
which can be used as unique global reference for Microsoft GPP 2016
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-03-09T00:00:00Z |
date_published | 2016-08-31T00:00:00Z |
source | MITRE |
title | Group Policy Preferences |
groups man page
MacKenzie, D. and Youngman, J. (n.d.). groups(1) - Linux man page. Retrieved January 11, 2024.
Internal MISP references
UUID 3d3c9756-4700-5db3-b8bc-8d2958df6a42
which can be used as unique global reference for groups man page
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-01-11T00:00:00Z |
source | MITRE |
title | groups(1) - Linux man page |
Venafi SSH Key Abuse
Blachman, Y. (2020, April 22). Growing Abuse of SSH Keys: Commodity Malware Campaigns Now Equipped with SSH Capabilities. Retrieved June 24, 2020.
Internal MISP references
UUID cba14230-13bc-47ad-8f3f-d798217657bd
which can be used as unique global reference for Venafi SSH Key Abuse
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-06-24T00:00:00Z |
date_published | 2020-04-22T00:00:00Z |
source | MITRE |
title | Growing Abuse of SSH Keys: Commodity Malware Campaigns Now Equipped with SSH Capabilities |
Wikibooks Grsecurity
Wikibooks. (2018, August 19). Grsecurity/The RBAC System. Retrieved June 4, 2020.
Internal MISP references
UUID 8a7abfa0-97e8-4cac-9d76-c886e9666a16
which can be used as unique global reference for Wikibooks Grsecurity
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-06-04T00:00:00Z |
date_published | 2018-08-19T00:00:00Z |
source | MITRE |
title | Grsecurity/The RBAC System |
TrueSec Gsecdump
TrueSec. (n.d.). gsecdump v2.0b5. Retrieved September 29, 2015.
Internal MISP references
UUID ba1d07ed-2e18-4f5f-9d44-082530946f14
which can be used as unique global reference for TrueSec Gsecdump
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2015-09-29T00:00:00Z |
source | MITRE |
title | gsecdump v2.0b5 |
GTFOBins Suid
Emilio Pinna, Andrea Cardaci. (n.d.). GTFOBins. Retrieved January 28, 2022.
Internal MISP references
UUID 0b7d8e81-da8e-4f6a-a1b7-4ed81e441b4d
which can be used as unique global reference for GTFOBins Suid
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-01-28T00:00:00Z |
source | MITRE |
title | GTFOBins |
GTFObins at
Emilio Pinna, Andrea Cardaci. (n.d.). gtfobins at. Retrieved September 28, 2021.
Internal MISP references
UUID 3fad6618-5a85-4f7a-be2b-0600269d7768
which can be used as unique global reference for GTFObins at
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-28T00:00:00Z |
source | MITRE |
title | gtfobins at |
AWS GuardDuty EC2 finding types
AWS. (n.d.). GuardDuty EC2 finding types. Retrieved September 25, 2024.
Internal MISP references
UUID 249f1a90-d6ed-503c-998c-a9d1650509d2
which can be used as unique global reference for AWS GuardDuty EC2 finding types
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-25T00:00:00Z |
source | MITRE |
title | GuardDuty EC2 finding types |
AWS GuardDuty IAM finding types
AWS. (n.d.). GuardDuty IAM finding types. Retrieved September 24, 2024.
Internal MISP references
UUID 215a79b4-c25b-5b09-912a-6b68914bb1ba
which can be used as unique global reference for AWS GuardDuty IAM finding types
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-24T00:00:00Z |
source | MITRE |
title | GuardDuty IAM finding types |
AWS GuardDuty RDS Protection
AWS. (n.d.). GuardDuty RDS Protection. Retrieved September 24, 2024.
Internal MISP references
UUID 4c6101f0-25d9-5ed1-98a2-a0c468e3ff1a
which can be used as unique global reference for AWS GuardDuty RDS Protection
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-24T00:00:00Z |
source | MITRE |
title | GuardDuty RDS Protection |
Fortinet Moses Staff February 15 2022
Rotem Sde-Or. (2022, February 15). Guard Your Drive from DriveGuard: Moses Staff Campaigns Against Israeli Organizations Span Several Months. Retrieved October 23, 2023.
Internal MISP references
UUID 4a435edb-18ae-4c31-beff-2b8f2e6cad34
which can be used as unique global reference for Fortinet Moses Staff February 15 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-10-23T00:00:00Z |
date_published | 2022-02-15T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Guard Your Drive from DriveGuard: Moses Staff Campaigns Against Israeli Organizations Span Several Months |
Microsoft Log4j Vulnerability Exploitation December 2021
Microsoft Threat Intelligence. (2021, December 11). Guidance for preventing, detecting, and hunting for exploitation of the Log4j 2 vulnerability. Retrieved December 7, 2023.
Internal MISP references
UUID 456ed22f-0de1-5ee4-bb8a-29e3baedc7b1
which can be used as unique global reference for Microsoft Log4j Vulnerability Exploitation December 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-07T00:00:00Z |
date_published | 2021-12-11T00:00:00Z |
source | MITRE |
title | Guidance for preventing, detecting, and hunting for exploitation of the Log4j 2 vulnerability |
Unit 42 NETWIRE April 2020
Duncan, B. (2020, April 3). GuLoader: Malspam Campaign Installing NetWire RAT. Retrieved January 7, 2021.
Internal MISP references
UUID b42f119d-144a-470a-b9fe-ccbf80a78fbb
which can be used as unique global reference for Unit 42 NETWIRE April 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-01-07T00:00:00Z |
date_published | 2020-04-03T00:00:00Z |
source | MITRE |
title | GuLoader: Malspam Campaign Installing NetWire RAT |
Cloud Hack Tricks GWS Apps Script
HackTricks Cloud. (n.d.). GWS - App Scripts. Retrieved July 1, 2024.
Internal MISP references
UUID 32569f13-e383-576c-813c-52490450464d
which can be used as unique global reference for Cloud Hack Tricks GWS Apps Script
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-07-01T00:00:00Z |
source | MITRE |
title | GWS - App Scripts |
H0lyGh0st - North Korean Threat Group Strikes Back With New Ransomware
www.picussecurity.com. (n.d.). H0lyGh0st - North Korean Threat Group Strikes Back With New Ransomware. Retrieved May 19, 2023.
Internal MISP references
UUID 3f66ef62-ac0d-4ece-9a4b-917ae70f1617
which can be used as unique global reference for H0lyGh0st - North Korean Threat Group Strikes Back With New Ransomware
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-19T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | H0lyGh0st - North Korean Threat Group Strikes Back With New Ransomware |
Cisco H1N1 Part 1
Reynolds, J.. (2016, September 13). H1N1: Technical analysis reveals new capabilities. Retrieved September 26, 2016.
Internal MISP references
UUID 03a2faca-1a47-4f68-9f26-3fa98145f2ab
which can be used as unique global reference for Cisco H1N1 Part 1
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-09-26T00:00:00Z |
date_published | 2016-09-13T00:00:00Z |
source | MITRE |
title | H1N1: Technical analysis reveals new capabilities |
Cisco H1N1 Part 2
Reynolds, J.. (2016, September 14). H1N1: Technical analysis reveals new capabilities – part 2. Retrieved September 26, 2016.
Internal MISP references
UUID b53e55dc-078d-4535-a99f-c979ad8ca6e6
which can be used as unique global reference for Cisco H1N1 Part 2
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-09-26T00:00:00Z |
date_published | 2016-09-14T00:00:00Z |
source | MITRE |
title | H1N1: Technical analysis reveals new capabilities – part 2 |
Wired Magecart S3 Buckets, 2019
Barrett, B.. (2019, July 11). Hack Brief: A Card-Skimming Hacker Group Hit 17K Domains—and Counting. Retrieved October 4, 2019.
Internal MISP references
UUID 47fb06ed-b4ce-454c-9bbe-21b28309f351
which can be used as unique global reference for Wired Magecart S3 Buckets, 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-10-04T00:00:00Z |
date_published | 2019-07-11T00:00:00Z |
source | MITRE |
title | Hack Brief: A Card-Skimming Hacker Group Hit 17K Domains—and Counting |
Wired Uber Breach
Andy Greenberg. (2017, January 21). Hack Brief: Uber Paid Off Hackers to Hide a 57-Million User Data Breach. Retrieved May 14, 2021.
Internal MISP references
UUID 3bdf88b3-8f41-4945-9292-e299bab4f98e
which can be used as unique global reference for Wired Uber Breach
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-05-14T00:00:00Z |
date_published | 2017-01-21T00:00:00Z |
source | MITRE |
title | Hack Brief: Uber Paid Off Hackers to Hide a 57-Million User Data Breach |
Trendmicro NPM Compromise
Trendmicro. (2018, November 29). Hacker Infects Node.js Package to Steal from Bitcoin Wallets. Retrieved April 10, 2019.
Internal MISP references
UUID 69eac1b0-1c50-4534-99e0-2d0fd738ab8f
which can be used as unique global reference for Trendmicro NPM Compromise
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-04-10T00:00:00Z |
date_published | 2018-11-29T00:00:00Z |
source | MITRE |
title | Hacker Infects Node.js Package to Steal from Bitcoin Wallets |
Data Destruction - Threat Post
Mimoso, M.. (2014, June 18). Hacker Puts Hosting Service Code Spaces Out of Business. Retrieved December 15, 2020.
Internal MISP references
UUID 97d16d3a-98a0-4a7d-9f74-8877c8088ddf
which can be used as unique global reference for Data Destruction - Threat Post
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-12-15T00:00:00Z |
date_published | 2014-06-18T00:00:00Z |
source | MITRE |
title | Hacker Puts Hosting Service Code Spaces Out of Business |
GWS Apps Script Abuse 2021
Sergiu Gatlan. (2021, February 18). Hackers abuse Google Apps Script to steal credit cards, bypass CSP. Retrieved July 1, 2024.
Internal MISP references
UUID 590687ce-0d66-584d-a6bf-8e7288f00d1e
which can be used as unique global reference for GWS Apps Script Abuse 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-07-01T00:00:00Z |
date_published | 2021-02-18T00:00:00Z |
source | MITRE |
title | Hackers abuse Google Apps Script to steal credit cards, bypass CSP |
Bleeping Computer - Scriptrunner.exe
Bill Toulas. (2023, January 4). Hackers abuse Windows error reporting tool to deploy malware. Retrieved July 8, 2024.
Internal MISP references
UUID f7ab464d-255b-5d92-a878-c16c905c057b
which can be used as unique global reference for Bleeping Computer - Scriptrunner.exe
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-07-08T00:00:00Z |
date_published | 2023-01-04T00:00:00Z |
source | MITRE |
title | Hackers abuse Windows error reporting tool to deploy malware |
Bloomberg Scattered Spider May 8 2024
Katrina Manson. (2024, May 8). Hackers Behind MGM Attack Targeting Financial Sector in New Campaign. Retrieved May 22, 2024.
Internal MISP references
UUID 2bf7e84a-805d-48aa-b911-8cd8a9dbf1cf
which can be used as unique global reference for Bloomberg Scattered Spider May 8 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-05-22T00:00:00Z |
date_published | 2024-05-08T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Hackers Behind MGM Attack Targeting Financial Sector in New Campaign |
Salesforce zero-day in facebook phishing attack
Bill Toulas. (2023, August 2). Hackers exploited Salesforce zero-day in Facebook phishing attack. Retrieved September 18, 2023.
Internal MISP references
UUID cbd360bb-f4b6-5326-8861-b05f3a2a8737
which can be used as unique global reference for Salesforce zero-day in facebook phishing attack
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-18T00:00:00Z |
date_published | 2023-08-02T00:00:00Z |
source | MITRE |
title | Hackers exploited Salesforce zero-day in Facebook phishing attack |
Fortune Dragonfly 2.0 Sept 2017
Hackett, R. (2017, September 6). Hackers Have Penetrated Energy Grid, Symantec Warns. Retrieved June 6, 2018.
Internal MISP references
UUID b56c5b41-b8e0-4fef-a6d8-183bb283dc7c
which can be used as unique global reference for Fortune Dragonfly 2.0 Sept 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-06-06T00:00:00Z |
date_published | 2017-09-06T00:00:00Z |
source | MITRE |
title | Hackers Have Penetrated Energy Grid, Symantec Warns |
Wired Cyber Army of Russia April 17 2024
Andy Greenberg. (2024, April 17). Hackers Linked to Russia’s Military Claim Credit for Sabotaging US Water Utilities. Retrieved April 30, 2024.
Internal MISP references
UUID 53583baf-4e09-4d19-9348-6110206b88be
which can be used as unique global reference for Wired Cyber Army of Russia April 17 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-04-30T00:00:00Z |
date_published | 2024-04-17T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Hackers Linked to Russia’s Military Claim Credit for Sabotaging US Water Utilities |
Huntress API Hash
Brennan, M. (2022, February 16). Hackers No Hashing: Randomizing API Hashes to Evade Cobalt Strike Shellcode Detection. Retrieved August 22, 2022.
Internal MISP references
UUID e9f91661-29e3-408e-bfdd-c7df22f3f400
which can be used as unique global reference for Huntress API Hash
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-08-22T00:00:00Z |
date_published | 2022-02-16T00:00:00Z |
source | MITRE |
title | Hackers No Hashing: Randomizing API Hashes to Evade Cobalt Strike Shellcode Detection |
BleepingComputer Agent Tesla steal wifi passwords
Sergiu Gatlan. (2020, April 16). Hackers steal WiFi passwords using upgraded Agent Tesla malware. Retrieved September 8, 2023.
Internal MISP references
UUID 93b5ecd2-35a3-5bd8-9d6e-87bace012546
which can be used as unique global reference for BleepingComputer Agent Tesla steal wifi passwords
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-08T00:00:00Z |
date_published | 2020-04-16T00:00:00Z |
source | MITRE |
title | Hackers steal WiFi passwords using upgraded Agent Tesla malware |
SWAT-hospital
Giles, Bruce. (2024, January 4). Hackers threaten to send SWAT teams to Fred Hutch patients' homes. Retrieved January 5, 2024.
Internal MISP references
UUID ce8bc906-875a-53bd-8b9c-b2191e369e4e
which can be used as unique global reference for SWAT-hospital
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-01-05T00:00:00Z |
date_published | 2024-01-04T00:00:00Z |
source | MITRE |
title | Hackers threaten to send SWAT teams to Fred Hutch patients' homes |
PCMag FakeLogin
Kan, M. (2019, October 24). Hackers Try to Phish United Nations Staffers With Fake Login Pages. Retrieved October 20, 2020.
Internal MISP references
UUID f652524c-7950-4a8a-9860-0e658a9581d8
which can be used as unique global reference for PCMag FakeLogin
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-20T00:00:00Z |
date_published | 2019-10-24T00:00:00Z |
source | MITRE |
title | Hackers Try to Phish United Nations Staffers With Fake Login Pages |
BleepingComputer Velvet Ant June 17 2024
Bill Toulas. (2024, June 17). Hackers use F5 BIG-IP malware to stealthily steal data for years. Retrieved June 20, 2024.
Internal MISP references
UUID 70235e47-f8bb-4d16-9933-9f4923f08f5d
which can be used as unique global reference for BleepingComputer Velvet Ant June 17 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-06-20T00:00:00Z |
date_published | 2024-06-17T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Hackers use F5 BIG-IP malware to stealthily steal data for years |
Krebs-Bazaar
Brian Krebs. (2016, October 31). Hackforums Shutters Booter Service Bazaar. Retrieved May 15, 2017.
Internal MISP references
UUID b46efda2-18e0-451e-b945-28421c2d5274
which can be used as unique global reference for Krebs-Bazaar
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-05-15T00:00:00Z |
date_published | 2016-10-31T00:00:00Z |
source | MITRE |
title | Hackforums Shutters Booter Service Bazaar |
BleepingComputer Molerats Dec 2020
Ilascu, I. (2020, December 14). Hacking group’s new malware abuses Google and Facebook services. Retrieved December 28, 2020.
Internal MISP references
UUID 307108c8-9c72-4f31-925b-0b9bd4b31e7b
which can be used as unique global reference for BleepingComputer Molerats Dec 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-12-28T00:00:00Z |
date_published | 2020-12-14T00:00:00Z |
source | MITRE |
title | Hacking group’s new malware abuses Google and Facebook services |
Microsoft Hacking Team Breach
Microsoft Secure Team. (2016, June 1). Hacking Team Breach: A Cyber Jurassic Park. Retrieved March 5, 2019.
Internal MISP references
UUID 8daac742-6467-40db-9fe5-87efd2a96f09
which can be used as unique global reference for Microsoft Hacking Team Breach
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-03-05T00:00:00Z |
date_published | 2016-06-01T00:00:00Z |
source | MITRE |
title | Hacking Team Breach: A Cyber Jurassic Park |
Intel HackingTeam UEFI Rootkit
Intel Security. (2005, July 16). HackingTeam's UEFI Rootkit Details. Retrieved March 20, 2017.
Internal MISP references
UUID 1c476cb2-8ce0-4559-8037-646d0ea09398
which can be used as unique global reference for Intel HackingTeam UEFI Rootkit
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-03-20T00:00:00Z |
date_published | 2005-07-16T00:00:00Z |
source | MITRE |
title | HackingTeam's UEFI Rootkit Details |
TrendMicro Hacking Team UEFI
Lin, P. (2015, July 13). Hacking Team Uses UEFI BIOS Rootkit to Keep RCS 9 Agent in Target Systems. Retrieved December 11, 2015.
Internal MISP references
UUID 24796535-d516-45e9-bcc7-8f03a3f3cd73
which can be used as unique global reference for TrendMicro Hacking Team UEFI
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2015-12-11T00:00:00Z |
date_published | 2015-07-13T00:00:00Z |
source | MITRE |
title | Hacking Team Uses UEFI BIOS Rootkit to Keep RCS 9 Agent in Target Systems |
TempertonDarkHotel
Temperton, J. (2015, August 10). Hacking Team zero-day used in new Darkhotel attacks. Retrieved March 9, 2017.
Internal MISP references
UUID 4de7960b-bd62-452b-9e64-b52a0d580858
which can be used as unique global reference for TempertonDarkHotel
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-03-09T00:00:00Z |
date_published | 2015-08-10T00:00:00Z |
source | MITRE |
title | Hacking Team zero-day used in new Darkhotel attacks |
FireEye Hacking FIN4 Video Dec 2014
Vengerik, B. & Dennesen, K.. (2014, December 5). Hacking the Street? FIN4 Likely Playing the Market. Retrieved January 15, 2019.
Internal MISP references
UUID 6dcfe3fb-c310-49cf-a657-f2cec65c5499
which can be used as unique global reference for FireEye Hacking FIN4 Video Dec 2014
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-01-15T00:00:00Z |
date_published | 2014-12-05T00:00:00Z |
source | MITRE |
title | Hacking the Street? FIN4 Likely Playing the Market |
FireEye Hacking FIN4 Dec 2014
Vengerik, B. et al.. (2014, December 5). Hacking the Street? FIN4 Likely Playing the Market. Retrieved December 17, 2018.
Internal MISP references
UUID c3ac1c2a-21cc-42a9-a214-88f302371766
which can be used as unique global reference for FireEye Hacking FIN4 Dec 2014
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-12-17T00:00:00Z |
date_published | 2014-12-05T00:00:00Z |
source | MITRE |
title | Hacking the Street? FIN4 Likely Playing the Market |
Malwarebytes OSINT Leaky Buckets - Hioureas
Vasilios Hioureas. (2019, September 13). Hacking with AWS: incorporating leaky buckets into your OSINT workflow. Retrieved February 14, 2022.
Internal MISP references
UUID 67ebcf71-828e-4202-b842-f071140883f8
which can be used as unique global reference for Malwarebytes OSINT Leaky Buckets - Hioureas
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-02-14T00:00:00Z |
date_published | 2019-09-13T00:00:00Z |
source | MITRE |
title | Hacking with AWS: incorporating leaky buckets into your OSINT workflow |
Microsoft Gsecdump
Vincent Tiu. (2017, September 15). HackTool:Win32/Gsecdump. Retrieved January 10, 2024.
Internal MISP references
UUID e9c12a7f-ce8a-5f20-8283-509e16532d9b
which can be used as unique global reference for Microsoft Gsecdump
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-01-10T00:00:00Z |
date_published | 2017-09-15T00:00:00Z |
source | MITRE |
title | HackTool:Win32/Gsecdump |
Microsoft HAFNIUM March 2020
MSTIC. (2021, March 2). HAFNIUM targeting Exchange Servers with 0-day exploits. Retrieved March 3, 2021.
Internal MISP references
UUID 6a986c46-79a3-49c6-94d2-d9b1f5db08f3
which can be used as unique global reference for Microsoft HAFNIUM March 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-03-03T00:00:00Z |
date_published | 2021-03-02T00:00:00Z |
source | MITRE, Tidal Cyber |
title | HAFNIUM targeting Exchange Servers with 0-day exploits |
haking9 libpcap network sniffing
Luis Martin Garcia. (2008, February 1). Hakin9 Issue 2/2008 Vol 3 No.2 VoIP Abuse: Storming SIP Security. Retrieved October 18, 2022.
Internal MISP references
UUID 2803d0b8-78ee-4b19-aad3-daf84cd292b5
which can be used as unique global reference for haking9 libpcap network sniffing
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-10-18T00:00:00Z |
date_published | 2008-02-01T00:00:00Z |
source | MITRE |
title | Hakin9 Issue 2/2008 Vol 3 No.2 VoIP Abuse: Storming SIP Security |
FireEye APT29
FireEye Labs. (2015, July). HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group. Retrieved September 17, 2015.
Internal MISP references
UUID 78ead31e-7450-46e8-89cf-461ae1981994
which can be used as unique global reference for FireEye APT29
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2015-09-17T00:00:00Z |
date_published | 2015-07-01T00:00:00Z |
source | MITRE |
title | HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group |
FireEye Hancitor
Anubhav, A., Jallepalli, D. (2016, September 23). Hancitor (AKA Chanitor) observed using multiple attack approaches. Retrieved August 13, 2020.
Internal MISP references
UUID 65a07c8c-5b29-445f-8f01-6e577df4ea62
which can be used as unique global reference for FireEye Hancitor
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-08-13T00:00:00Z |
date_published | 2016-09-23T00:00:00Z |
source | MITRE |
title | Hancitor (AKA Chanitor) observed using multiple attack approaches |
NCC Group Fivehands June 2021
Matthews, M. and Backhouse, W. (2021, June 15). Handy guide to a new Fivehands ransomware variant. Retrieved June 24, 2021.
Internal MISP references
UUID 33955c35-e8cd-4486-b1ab-6f992319c81c
which can be used as unique global reference for NCC Group Fivehands June 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-06-24T00:00:00Z |
date_published | 2021-06-15T00:00:00Z |
source | MITRE |
title | Handy guide to a new Fivehands ransomware variant |
Apple Developer Doco Hardened Runtime
Apple Inc.. (2021, January 1). Hardened Runtime: Manage security protections and resource access for your macOS apps.. Retrieved March 24, 2021.
Internal MISP references
UUID b41de1e5-63ab-4556-a61f-3baca1873283
which can be used as unique global reference for Apple Developer Doco Hardened Runtime
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-03-24T00:00:00Z |
date_published | 2021-01-01T00:00:00Z |
source | MITRE |
title | Hardened Runtime: Manage security protections and resource access for your macOS apps. |
FireEye APT34 July 2019
Bromiley, M., et al.. (2019, July 18). Hard Pass: Declining APT34’s Invite to Join Their Professional Network. Retrieved August 26, 2019.
Internal MISP references
UUID 09a00ded-1afc-4555-894e-a151162796eb
which can be used as unique global reference for FireEye APT34 July 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-08-26T00:00:00Z |
date_published | 2019-07-18T00:00:00Z |
source | MITRE |
title | Hard Pass: Declining APT34’s Invite to Join Their Professional Network |
GitHub Hashjacking
Dunning, J. (2016, August 1). Hashjacking. Retrieved December 21, 2017.
Internal MISP references
UUID d31f6612-c552-45e1-bf6b-889fe619ab5f
which can be used as unique global reference for GitHub Hashjacking
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-21T00:00:00Z |
date_published | 2016-08-01T00:00:00Z |
source | MITRE |
title | Hashjacking |
FireEye HawkEye Malware July 2017
Swapnil Patil, Yogesh Londhe. (2017, July 25). HawkEye Credential Theft Malware Distributed in Recent Phishing Campaign. Retrieved June 18, 2019.
Internal MISP references
UUID 7ad228a8-5450-45ec-86fc-ea038f7c6ef7
which can be used as unique global reference for FireEye HawkEye Malware July 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-06-18T00:00:00Z |
date_published | 2017-07-25T00:00:00Z |
source | MITRE |
title | HawkEye Credential Theft Malware Distributed in Recent Phishing Campaign |
Specter Ops - Cloud Credential Storage
Maddalena, C.. (2018, September 12). Head in the Clouds. Retrieved October 4, 2019.
Internal MISP references
UUID 95d6d1ce-ceba-48ee-88c4-0fb30058bd80
which can be used as unique global reference for Specter Ops - Cloud Credential Storage
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-10-04T00:00:00Z |
date_published | 2018-09-12T00:00:00Z |
source | MITRE |
title | Head in the Clouds |
Securelist Dtrack
Konstantin Zykov. (2019, September 23). Hello! My name is Dtrack. Retrieved January 20, 2021.
Internal MISP references
UUID 49bd8841-a4b5-4ced-adfa-0ad0c8625ccd
which can be used as unique global reference for Securelist Dtrack
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-01-20T00:00:00Z |
date_published | 2019-09-23T00:00:00Z |
source | MITRE |
title | Hello! My name is Dtrack |
Securelist Dtrack2
KONSTANTIN ZYKOV. (2019, September 23). Hello! My name is Dtrack. Retrieved September 30, 2022.
Internal MISP references
UUID a011b68a-30e0-4204-9bf3-fa73f2a238b4
which can be used as unique global reference for Securelist Dtrack2
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-09-30T00:00:00Z |
date_published | 2019-09-23T00:00:00Z |
source | MITRE |
title | Hello! My name is Dtrack |
Baggett 2012
Baggett, M. (2012, November 8). Help eliminate unquoted path vulnerabilities. Retrieved December 4, 2014.
Internal MISP references
UUID 9b234329-5e05-4035-af38-dd8ab20fd68e
which can be used as unique global reference for Baggett 2012
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2014-12-04T00:00:00Z |
date_published | 2012-11-08T00:00:00Z |
source | MITRE |
title | Help eliminate unquoted path vulnerabilities |
Help eliminate unquoted path
Mark Baggett. (2012, November 8). Help eliminate unquoted path vulnerabilities. Retrieved November 8, 2012.
Internal MISP references
UUID 23ad5a8c-cbe1-4f40-8757-f1784a4003a1
which can be used as unique global reference for Help eliminate unquoted path
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2012-11-08T00:00:00Z |
date_published | 2012-11-08T00:00:00Z |
source | MITRE |
title | Help eliminate unquoted path vulnerabilities |
Default VBS macros Blocking
Kellie Eickmeyer. (2022, February 7). Helping users stay safe: Blocking internet macros by default in Office. Retrieved February 7, 2022.
Internal MISP references
UUID d86883dd-3766-4971-91c7-b205ed13cc37
which can be used as unique global reference for Default VBS macros Blocking
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-02-07T00:00:00Z |
date_published | 2022-02-07T00:00:00Z |
source | MITRE |
title | Helping users stay safe: Blocking internet macros by default in Office |
Twitter CMSTP Usage Jan 2018
Carr, N. (2018, January 31). Here is some early bad cmstp.exe... Retrieved September 12, 2024.
Internal MISP references
UUID 836621f3-83e1-4c55-8e3b-740fc9ba1e46
which can be used as unique global reference for Twitter CMSTP Usage Jan 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-12T00:00:00Z |
date_published | 2018-01-31T00:00:00Z |
source | MITRE |
title | Here is some early bad cmstp.exe.. |
ESET Hermetic Wiper February 2022
ESET. (2022, February 24). HermeticWiper: New data wiping malware hits Ukraine. Retrieved March 25, 2022.
Internal MISP references
UUID 07ef66e8-195b-4afe-a518-ce9e77220038
which can be used as unique global reference for ESET Hermetic Wiper February 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-03-25T00:00:00Z |
date_published | 2022-02-24T00:00:00Z |
source | MITRE |
title | HermeticWiper: New data wiping malware hits Ukraine |
SentinelOne Hermetic Wiper February 2022
Guerrero-Saade, J. (2022, February 23). HermeticWiper | New Destructive Malware Used In Cyber Attacks on Ukraine. Retrieved March 25, 2022.
Internal MISP references
UUID 96825555-1936-4ee3-bb25-423dc16a9116
which can be used as unique global reference for SentinelOne Hermetic Wiper February 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-03-25T00:00:00Z |
date_published | 2022-02-23T00:00:00Z |
source | MITRE |
title | HermeticWiper |
Dragos Hexane
Dragos. (n.d.). Hexane. Retrieved October 27, 2019.
Internal MISP references
UUID 11838e67-5032-4352-ad1f-81ba0398a14f
which can be used as unique global reference for Dragos Hexane
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-10-27T00:00:00Z |
source | MITRE |
title | Hexane |
Sourceforge Heyoka 2022
Sourceforge. (n.d.). Heyoka POC Exfiltration Tool. Retrieved October 11, 2022.
Internal MISP references
UUID f6677391-cb7a-4abc-abb7-3a8cd47fbc90
which can be used as unique global reference for Sourceforge Heyoka 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-10-11T00:00:00Z |
source | MITRE |
title | Heyoka POC Exfiltration Tool |
Hh.exe - LOLBAS Project
LOLBAS. (2018, May 25). Hh.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 4e09bfcf-f5be-46c5-9ebf-8742ac8d1edc
which can be used as unique global reference for Hh.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2018-05-25T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Hh.exe |
CrowdStrike BloodHound April 2018
Red Team Labs. (2018, April 24). Hidden Administrative Accounts: BloodHound to the Rescue. Retrieved October 28, 2020.
Internal MISP references
UUID fa99f290-e42c-4311-9f6d-c519c9ab89fe
which can be used as unique global reference for CrowdStrike BloodHound April 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-28T00:00:00Z |
date_published | 2018-04-24T00:00:00Z |
source | MITRE |
title | Hidden Administrative Accounts: BloodHound to the Rescue |
McAfee Bankshot
Sherstobitoff, R. (2018, March 08). Hidden Cobra Targets Turkish Financial Sector With New Bankshot Implant. Retrieved May 18, 2018.
Internal MISP references
UUID c748dc6c-8c19-4a5c-840f-3d47955a6c78
which can be used as unique global reference for McAfee Bankshot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-05-18T00:00:00Z |
date_published | 2018-03-08T00:00:00Z |
source | MITRE |
title | Hidden Cobra Targets Turkish Financial Sector With New Bankshot Implant |
Pfammatter - Hidden Inbox Rules
Damian Pfammatter. (2018, September 17). Hidden Inbox Rules in Microsoft Exchange. Retrieved October 12, 2021.
Internal MISP references
UUID 8a00b664-5a75-4365-9069-a32e0ed20a80
which can be used as unique global reference for Pfammatter - Hidden Inbox Rules
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-12T00:00:00Z |
date_published | 2018-09-17T00:00:00Z |
source | MITRE |
title | Hidden Inbox Rules in Microsoft Exchange |
Hidden VNC
Hutchins, Marcus. (2015, September 13). Hidden VNC for Beginners. Retrieved November 28, 2023.
Internal MISP references
UUID 1d50ce73-ad6a-5286-8ef9-0b2bfed321dc
which can be used as unique global reference for Hidden VNC
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-11-28T00:00:00Z |
date_published | 2015-09-13T00:00:00Z |
source | MITRE |
title | Hidden VNC for Beginners |
Intezer HiddenWasp Map 2019
Sanmillan, I. (2019, May 29). HiddenWasp Malware Stings Targeted Linux Systems. Retrieved June 24, 2019.
Internal MISP references
UUID dfef8451-031b-42a6-8b78-d25950cc9d23
which can be used as unique global reference for Intezer HiddenWasp Map 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-06-24T00:00:00Z |
date_published | 2019-05-29T00:00:00Z |
source | MITRE |
title | HiddenWasp Malware Stings Targeted Linux Systems |
Apple Support Hide a User Account
Apple. (2020, November 30). Hide a user account in macOS. Retrieved December 10, 2021.
Internal MISP references
UUID e901df3b-76a6-41a5-9083-b28065e75aa2
which can be used as unique global reference for Apple Support Hide a User Account
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-12-10T00:00:00Z |
date_published | 2020-11-30T00:00:00Z |
source | MITRE |
title | Hide a user account in macOS |
Malwarebytes Wow6432Node 2016
Arntz, P. (2016, March 30). Hiding in Plain Sight. Retrieved August 3, 2020.
Internal MISP references
UUID d4eba34c-d76b-45b4-bcaf-0f13459daaad
which can be used as unique global reference for Malwarebytes Wow6432Node 2016
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-08-03T00:00:00Z |
date_published | 2016-03-30T00:00:00Z |
source | MITRE |
title | Hiding in Plain Sight |
FireEye APT17
FireEye Labs/FireEye Threat Intelligence. (2015, May 14). Hiding in Plain Sight: FireEye and Microsoft Expose Obfuscation Tactic. Retrieved January 22, 2016.
Internal MISP references
UUID a303f97a-72dd-4833-bac7-a421addc3242
which can be used as unique global reference for FireEye APT17
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-01-22T00:00:00Z |
date_published | 2015-05-14T00:00:00Z |
source | MITRE, Tidal Cyber |
title | Hiding in Plain Sight: FireEye and Microsoft Expose Obfuscation Tactic |
ATTACK IQ
Federico Quattrin, Nick Desler, Tin Tam, & Matthew Rutkoske. (2023, March 16). Hiding in Plain Sight: Monitoring and Testing for Living-Off-the-Land Binaries. Retrieved July 15, 2024.
Internal MISP references
UUID 38ed8950-413b-56b5-98c3-ae6420850dc4
which can be used as unique global reference for ATTACK IQ
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-07-15T00:00:00Z |
date_published | 2023-03-16T00:00:00Z |
source | MITRE |
title | Hiding in Plain Sight: Monitoring and Testing for Living-Off-the-Land Binaries |
Crowdstrike Hiding in Plain Sight 2018
Crowdstrike. (2018, July 18). Hiding in Plain Sight: Using the Office 365 Activities API to Investigate Business Email Compromises. Retrieved January 19, 2020.
Internal MISP references
UUID 8612fb31-5806-47ca-ba43-265a590b61fb
which can be used as unique global reference for Crowdstrike Hiding in Plain Sight 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-01-19T00:00:00Z |
date_published | 2018-07-18T00:00:00Z |
source | MITRE |
title | Hiding in Plain Sight: Using the Office 365 Activities API to Investigate Business Email Compromises |
Hiding Malicious Code with Module Stomping
Aliz Hammond. (2019, August 15). Hiding Malicious Code with "Module Stomping": Part 1. Retrieved July 14, 2022.
Internal MISP references
UUID 88983d22-980d-4442-858a-3b70ec485b94
which can be used as unique global reference for Hiding Malicious Code with Module Stomping
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-07-14T00:00:00Z |
date_published | 2019-08-15T00:00:00Z |
source | MITRE |
title | Hiding Malicious Code with "Module Stomping": Part 1 |
SpectorOps Hiding Reg Jul 2017
Reitz, B. (2017, July 14). Hiding Registry keys with PSReflect. Retrieved August 9, 2018.
Internal MISP references
UUID 877a5ae4-ec5f-4f53-b69d-ba74ff9e1619
which can be used as unique global reference for SpectorOps Hiding Reg Jul 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-08-09T00:00:00Z |
date_published | 2017-07-14T00:00:00Z |
source | MITRE |
title | Hiding Registry keys with PSReflect |
FireEye SUNBURST Backdoor December 2020
FireEye. (2020, December 13). Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor. Retrieved January 4, 2021.
Internal MISP references
UUID d006ed03-a8af-4887-9356-3481d81d43e4
which can be used as unique global reference for FireEye SUNBURST Backdoor December 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-01-04T00:00:00Z |
date_published | 2020-12-13T00:00:00Z |
source | MITRE, Tidal Cyber |
title | Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor |
Redirectors_Domain_Fronting
Mudge, R. (2017, February 6). High-reputation Redirectors and Domain Fronting. Retrieved July 11, 2022.
Internal MISP references
UUID 42c81d97-b6ee-458e-bff3-e8c4de882cd6
which can be used as unique global reference for Redirectors_Domain_Fronting
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-07-11T00:00:00Z |
date_published | 2017-02-06T00:00:00Z |
source | MITRE |
title | High-reputation Redirectors and Domain Fronting |
Synack Secure Kernel Extension Broken
Wardle, P. (2017, September 8). High Sierra’s ‘Secure Kernel Extension Loading’ is Broken. Retrieved April 6, 2018.
Internal MISP references
UUID 647f6be8-fe95-4045-8778-f7d7ff00c96c
which can be used as unique global reference for Synack Secure Kernel Extension Broken
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-04-06T00:00:00Z |
date_published | 2017-09-08T00:00:00Z |
source | MITRE |
title | High Sierra’s ‘Secure Kernel Extension Loading’ is Broken |
modePUSH Azure Storage Explorer September 14 2024
Britton Manahan. (2024, September 14). Highway Blobbery: Data Theft using Azure Storage Explorer. Retrieved September 19, 2024.
Internal MISP references
UUID a4c50b03-f0d7-4d29-a9de-e550be61390c
which can be used as unique global reference for modePUSH Azure Storage Explorer September 14 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-19T00:00:00Z |
date_published | 2024-09-14T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Highway Blobbery: Data Theft using Azure Storage Explorer |
Unit 42 Hildegard Malware
Chen, J. et al. (2021, February 3). Hildegard: New TeamTNT Cryptojacking Malware Targeting Kubernetes. Retrieved April 5, 2021.
Internal MISP references
UUID 0941cf0e-75d8-4c96-bc42-c99d809e75f9
which can be used as unique global reference for Unit 42 Hildegard Malware
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-04-05T00:00:00Z |
date_published | 2021-02-03T00:00:00Z |
source | MITRE |
title | Hildegard: New TeamTNT Cryptojacking Malware Targeting Kubernetes |
Drakonia HInvoke
drakonia. (2022, August 10). HInvoke and avoiding PInvoke. Retrieved August 22, 2022.
Internal MISP references
UUID 11d936fd-aba0-4eed-8007-aca71c340c59
which can be used as unique global reference for Drakonia HInvoke
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-08-22T00:00:00Z |
date_published | 2022-08-10T00:00:00Z |
source | MITRE |
title | HInvoke and avoiding PInvoke |
Hive Ransomware Analysis | Kroll
Stephen Green, Elio Biasiotto. (2023, February 2). Hive Ransomware Analysis | Kroll. Retrieved May 7, 2023.
Internal MISP references
UUID f5e43446-04ea-4dcd-be3a-22f8b10b8aa1
which can be used as unique global reference for Hive Ransomware Analysis | Kroll
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-07T00:00:00Z |
date_published | 2023-02-02T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Hive Ransomware Analysis |
Bitdefender Hunters International November 9 2023
Martin Zugec. (2023, November 9). Hive Ransomware's Offspring: Hunters International Takes the Stage. Retrieved October 4, 2024.
Internal MISP references
UUID ae0a88d6-bd46-4b22-bfb1-25003bfe83d7
which can be used as unique global reference for Bitdefender Hunters International November 9 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-10-04T00:00:00Z |
date_published | 2023-11-09T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Hive Ransomware's Offspring: Hunters International Takes the Stage |
microsoft_services_registry_tree
Microsoft. (2021, August 5). HKLM\SYSTEM\CurrentControlSet\Services Registry Tree. Retrieved August 25, 2021.
Internal MISP references
UUID 171cfdf1-d91c-4df3-831e-89b6237e3c8b
which can be used as unique global reference for microsoft_services_registry_tree
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-08-25T00:00:00Z |
date_published | 2021-08-05T00:00:00Z |
source | MITRE |
title | HKLM\SYSTEM\CurrentControlSet\Services Registry Tree |
Microsoft CurrentControlSet Services
Microsoft. (2017, April 20). HKLM\SYSTEM\CurrentControlSet\Services Registry Tree. Retrieved March 16, 2020.
Internal MISP references
UUID cb9b5391-773f-4b56-8c41-d4f548c7b835
which can be used as unique global reference for Microsoft CurrentControlSet Services
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-03-16T00:00:00Z |
date_published | 2017-04-20T00:00:00Z |
source | MITRE |
title | HKLM\SYSTEM\CurrentControlSet\Services Registry Tree |
Accenture Hogfish April 2018
Accenture Security. (2018, April 23). Hogfish Redleaves Campaign. Retrieved July 2, 2018.
Internal MISP references
UUID c8e9fee1-9981-499f-a62f-ffe59f4bb1e7
which can be used as unique global reference for Accenture Hogfish April 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-07-02T00:00:00Z |
date_published | 2018-04-23T00:00:00Z |
source | MITRE |
title | Hogfish Redleaves Campaign |
Proofpoint Router Malvertising
Kafeine. (2016, December 13). Home Routers Under Attack via Malvertising on Windows, Android Devices. Retrieved January 16, 2019.
Internal MISP references
UUID b964139f-7c02-451d-8d22-a87975e60aa2
which can be used as unique global reference for Proofpoint Router Malvertising
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-01-16T00:00:00Z |
date_published | 2016-12-13T00:00:00Z |
source | MITRE |
title | Home Routers Under Attack via Malvertising on Windows, Android Devices |
Trustwave Honeypot SkidMap 2023
Radoslaw Zdonczyk. (2023, July 30). Honeypot Recon: New Variant of SkidMap Targeting Redis. Retrieved September 29, 2023.
Internal MISP references
UUID 300505ae-bb7a-503d-84c5-9ff021eb6f3a
which can be used as unique global reference for Trustwave Honeypot SkidMap 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-29T00:00:00Z |
date_published | 2023-07-30T00:00:00Z |
source | MITRE |
title | Honeypot Recon: New Variant of SkidMap Targeting Redis |
Microsoft Hook Overview
Microsoft. (n.d.). Hooks Overview. Retrieved December 12, 2017.
Internal MISP references
UUID 54997a52-f78b-4af4-8916-787bcb215ce1
which can be used as unique global reference for Microsoft Hook Overview
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-12T00:00:00Z |
source | MITRE |
title | Hooks Overview |
SpectorOps Host-Based Jul 2017
Atkinson, J. (2017, July 18). Host-based Threat Modeling & Indicator Design. Retrieved March 21, 2018.
Internal MISP references
UUID 5fbf3a1d-eac2-44b8-a0a9-70feca168647
which can be used as unique global reference for SpectorOps Host-Based Jul 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-03-21T00:00:00Z |
date_published | 2017-07-18T00:00:00Z |
source | MITRE |
title | Host-based Threat Modeling & Indicator Design |
Crowdstrike AWS User Federation Persistence
Vaishnav Murthy and Joel Eng. (2023, January 30). How Adversaries Can Persist with AWS User Federation. Retrieved March 10, 2023.
Internal MISP references
UUID 8c4f806c-b6f2-5bde-8525-05da6692e59c
which can be used as unique global reference for Crowdstrike AWS User Federation Persistence
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-10T00:00:00Z |
date_published | 2023-01-30T00:00:00Z |
source | MITRE |
title | How Adversaries Can Persist with AWS User Federation |
Andy Greenberg June 2017
Andy Greenberg. (2017, June 28). How an Entire Nation Became Russia's Test Lab for Cyberwar. Retrieved September 27, 2023.
Internal MISP references
UUID 6a013c48-3b58-5b87-9af5-0b7d01f27c48
which can be used as unique global reference for Andy Greenberg June 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-27T00:00:00Z |
date_published | 2017-06-28T00:00:00Z |
source | MITRE |
title | How an Entire Nation Became Russia's Test Lab for Cyberwar |
Perez Sitemap XML 2023
Adi Perez. (2023, February 22). How Attackers Can Misuse Sitemaps to Enumerate Users and Discover Sensitive Information. Retrieved July 18, 2024.
Internal MISP references
UUID b52dcca4-19cb-5b95-9c5e-8b5c81fd986f
which can be used as unique global reference for Perez Sitemap XML 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-07-18T00:00:00Z |
date_published | 2023-02-22T00:00:00Z |
source | MITRE |
title | How Attackers Can Misuse Sitemaps to Enumerate Users and Discover Sensitive Information |
Symantec Digital Certificates
Shinotsuka, H. (2013, February 22). How Attackers Steal Private Keys from Digital Certificates. Retrieved March 31, 2016.
Internal MISP references
UUID 4b4f0171-827d-45c3-8c89-66ea801e77e8
which can be used as unique global reference for Symantec Digital Certificates
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-03-31T00:00:00Z |
date_published | 2013-02-22T00:00:00Z |
source | MITRE |
title | How Attackers Steal Private Keys from Digital Certificates |
ADSecurity Silver Tickets
Sean Metcalf. (2015, November 17). How Attackers Use Kerberos Silver Tickets to Exploit Systems. Retrieved February 27, 2020.
Internal MISP references
UUID 5185560e-b8f0-4c40-8c90-cb12348a0f7f
which can be used as unique global reference for ADSecurity Silver Tickets
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-02-27T00:00:00Z |
date_published | 2015-11-17T00:00:00Z |
source | MITRE |
title | How Attackers Use Kerberos Silver Tickets to Exploit Systems |
Amazon S3 Security, 2019
Amazon. (2019, May 17). How can I secure the files in my Amazon S3 bucket?. Retrieved October 4, 2019.
Internal MISP references
UUID 4c434ca5-2544-45e0-82d9-71343d8aa960
which can be used as unique global reference for Amazon S3 Security, 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-10-04T00:00:00Z |
date_published | 2019-05-17T00:00:00Z |
source | MITRE |
title | How can I secure the files in my Amazon S3 bucket? |
Microsoft Connection Manager Oct 2009
Microsoft. (2009, October 8). How Connection Manager Works. Retrieved April 11, 2018.
Internal MISP references
UUID 0b0880a8-82cc-4e23-afd9-95d099c753a4
which can be used as unique global reference for Microsoft Connection Manager Oct 2009
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-04-11T00:00:00Z |
date_published | 2009-10-08T00:00:00Z |
source | MITRE |
title | How Connection Manager Works |
Kaspersky-masking
Dedenok, Roman. (2023, December 12). How cybercriminals disguise URLs. Retrieved January 17, 2024.
Internal MISP references
UUID 811eb587-effd-50ad-abb4-83221cc5d567
which can be used as unique global reference for Kaspersky-masking
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-01-17T00:00:00Z |
date_published | 2023-12-12T00:00:00Z |
source | MITRE |
title | How cybercriminals disguise URLs |
dns_changer_trojans
Abendan, O. (2012, June 14). How DNS Changer Trojans Direct Users to Threats. Retrieved October 28, 2021.
Internal MISP references
UUID 082a0fde-d9f9-45f2-915d-f14c77b62254
which can be used as unique global reference for dns_changer_trojans
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-28T00:00:00Z |
date_published | 2012-06-14T00:00:00Z |
source | MITRE |
title | How DNS Changer Trojans Direct Users to Threats |
Entrust Enable CAPI2 Aug 2017
Entrust Datacard. (2017, August 16). How do I enable CAPI 2.0 logging in Windows Vista, Windows 7 and Windows 2008 Server?. Retrieved January 31, 2018.
Internal MISP references
UUID ad6dfcab-792a-4b4d-8ada-aa418e2ea1aa
which can be used as unique global reference for Entrust Enable CAPI2 Aug 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-01-31T00:00:00Z |
date_published | 2017-08-16T00:00:00Z |
source | MITRE |
title | How do I enable CAPI 2.0 logging in Windows Vista, Windows 7 and Windows 2008 Server? |
Apple Culprit Access
rjben. (2012, May 30). How do you find the culprit when unauthorized access to a computer is a problem?. Retrieved August 3, 2022.
Internal MISP references
UUID 9254d3f5-7fc1-4710-b885-b0ddb3a3dca9
which can be used as unique global reference for Apple Culprit Access
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-08-03T00:00:00Z |
date_published | 2012-05-30T00:00:00Z |
source | MITRE |
title | How do you find the culprit when unauthorized access to a computer is a problem? |
SFX - Encrypted/Encoded File
Jai Minton. (2023, March 31). How Falcon OverWatch Investigates Malicious Self-Extracting Archives, Decoy Files and Their Hidden Payloads. Retrieved March 29, 2024.
Internal MISP references
UUID 55171e0e-6b6d-568c-941a-85adcafceb43
which can be used as unique global reference for SFX - Encrypted/Encoded File
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-29T00:00:00Z |
date_published | 2023-03-31T00:00:00Z |
source | MITRE |
title | How Falcon OverWatch Investigates Malicious Self-Extracting Archives, Decoy Files and Their Hidden Payloads |
DOJ FIN7 Aug 2018
Department of Justice. (2018, August 01). HOW FIN7 ATTACKED AND STOLE DATA. Retrieved August 24, 2018.
Internal MISP references
UUID 6a588eff-2b79-41c3-9834-613a628a0355
which can be used as unique global reference for DOJ FIN7 Aug 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-08-24T00:00:00Z |
date_published | 2018-08-01T00:00:00Z |
source | MITRE |
title | HOW FIN7 ATTACKED AND STOLE DATA |
Charles McLellan March 2016
Charles McLellan. (2016, March 4). How hackers attacked Ukraine's power grid: Implications for Industrial IoT security. Retrieved September 27, 2023.
Internal MISP references
UUID a9156c24-42ad-5f15-a18e-2382f84d702e
which can be used as unique global reference for Charles McLellan March 2016
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-27T00:00:00Z |
date_published | 2016-03-04T00:00:00Z |
source | MITRE |
title | How hackers attacked Ukraine's power grid: Implications for Industrial IoT security |
Cyware Social Media
Cyware Hacker News. (2019, October 2). How Hackers Exploit Social Media To Break Into Your Company. Retrieved October 20, 2020.
Internal MISP references
UUID e6136a63-81fe-4363-8d98-f7d1e85a0f2b
which can be used as unique global reference for Cyware Social Media
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-20T00:00:00Z |
date_published | 2019-10-02T00:00:00Z |
source | MITRE |
title | How Hackers Exploit Social Media To Break Into Your Company |
SpyCloud Stealers Chrome Bypass October 2 2024
James. (2024, October 2). How Infostealers Are Bypassing New Chrome Security Feature to Steal User Session Cookies. Retrieved October 13, 2024.
Internal MISP references
UUID 9e680ab4-5d8d-46a1-a1e8-2ca2914bb93f
which can be used as unique global reference for SpyCloud Stealers Chrome Bypass October 2 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-10-13T00:00:00Z |
date_published | 2024-10-02T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | How Infostealers Are Bypassing New Chrome Security Feature to Steal User Session Cookies |
ICS Mutexes 2015
Lenny Zeltser. (2015, March 9). How Malware Generates Mutex Names to Evade Detection. Retrieved September 19, 2024.
Internal MISP references
UUID 31352deb-6c9d-5f1d-be73-60ccd0ccae93
which can be used as unique global reference for ICS Mutexes 2015
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-19T00:00:00Z |
date_published | 2015-03-09T00:00:00Z |
source | MITRE |
title | How Malware Generates Mutex Names to Evade Detection |
malware_hides_service
Lawrence Abrams. (2004, September 10). How Malware hides and is installed as a Service. Retrieved August 30, 2021.
Internal MISP references
UUID c5982f65-1782-452a-9667-a8732d31e89a
which can be used as unique global reference for malware_hides_service
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-08-30T00:00:00Z |
date_published | 2004-09-10T00:00:00Z |
source | MITRE |
title | How Malware hides and is installed as a Service |
S1 macOs Persistence
Stokes, P. (2019, July 17). How Malware Persists on macOS. Retrieved March 27, 2020.
Internal MISP references
UUID ce952a0d-9c0d-4a51-9564-7cc5d9e43e2c
which can be used as unique global reference for S1 macOs Persistence
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-03-27T00:00:00Z |
date_published | 2019-07-17T00:00:00Z |
source | MITRE |
title | How Malware Persists on macOS |
sentinelone macos persist Jun 2019
Stokes, Phil. (2019, June 17). HOW MALWARE PERSISTS ON MACOS. Retrieved September 10, 2019.
Internal MISP references
UUID 81a49043-cac5-40e0-a626-fd242d21c56d
which can be used as unique global reference for sentinelone macos persist Jun 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-09-10T00:00:00Z |
date_published | 2019-06-17T00:00:00Z |
source | MITRE |
title | HOW MALWARE PERSISTS ON MACOS |
Kaspersky Autofill
Golubev, S. (n.d.). How malware steals autofill data from browsers. Retrieved March 28, 2023.
Internal MISP references
UUID 561ff84d-17ce-511c-af0c-059310f3c129
which can be used as unique global reference for Kaspersky Autofill
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-28T00:00:00Z |
source | MITRE |
title | How malware steals autofill data from browsers |
Microsoft Threat Actor Naming
diannegali, schmurky, Dansimp, chrisda, Stacyrch140. (2023, April 20). How Microsoft names threat actors. Retrieved June 22, 2023.
Internal MISP references
UUID de9cda86-0b23-4bc8-b524-e74fecf99448
which can be used as unique global reference for Microsoft Threat Actor Naming
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-06-22T00:00:00Z |
date_published | 2023-04-20T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | How Microsoft names threat actors |
Microsoft Threat Actor Naming July 2023
Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.
Internal MISP references
UUID 78a8137d-694e-533d-aed3-6bd48fc0cd4a
which can be used as unique global reference for Microsoft Threat Actor Naming July 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-11-17T00:00:00Z |
date_published | 2023-07-12T00:00:00Z |
source | MITRE |
title | How Microsoft names threat actors |
TheEclecticLightCompany apple notarization
How Notarization Works. (2020, August 28). How notarization works. Retrieved September 13, 2021.
Internal MISP references
UUID 80c840ab-782a-4f15-bc7b-2d2ab4e51702
which can be used as unique global reference for TheEclecticLightCompany apple notarization
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-13T00:00:00Z |
date_published | 2020-08-28T00:00:00Z |
source | MITRE |
title | How notarization works |
SentinelOne AppleScript
Phil Stokes. (2020, March 16). How Offensive Actors Use AppleScript For Attacking macOS. Retrieved July 17, 2020.
Internal MISP references
UUID bb6aafcb-ed30-404a-a9d9-b90503a0ec7c
which can be used as unique global reference for SentinelOne AppleScript
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-07-17T00:00:00Z |
date_published | 2020-03-16T00:00:00Z |
source | MITRE |
title | How Offensive Actors Use AppleScript For Attacking macOS |
SecureWorld - How Secure Is Your Slack Channel - Dec 2021
Drew Todd. (2021, December 28). How Secure Is Your Slack Channel?. Retrieved May 31, 2022.
Internal MISP references
UUID 78199414-7b5e-45d8-8bda-d6f5a7c3988b
which can be used as unique global reference for SecureWorld - How Secure Is Your Slack Channel - Dec 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-05-31T00:00:00Z |
date_published | 2021-12-28T00:00:00Z |
source | MITRE |
title | How Secure Is Your Slack Channel? |
Windows OS Hub RDP
Windows OS Hub. (2021, November 10). How to Allow Multiple RDP Sessions in Windows 10 and 11?. Retrieved March 28, 2022.
Internal MISP references
UUID 335480f8-8f40-4da7-b083-6a4b158496c1
which can be used as unique global reference for Windows OS Hub RDP
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-03-28T00:00:00Z |
date_published | 2021-11-10T00:00:00Z |
source | MITRE |
title | How to Allow Multiple RDP Sessions in Windows 10 and 11? |
Xpn Argue Like Cobalt 2019
Chester, A. (2019, January 28). How to Argue like Cobalt Strike. Retrieved November 19, 2021.
Internal MISP references
UUID 724464f6-1a86-46e3-9a81-192b136c73ba
which can be used as unique global reference for Xpn Argue Like Cobalt 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-11-19T00:00:00Z |
date_published | 2019-01-28T00:00:00Z |
source | MITRE |
title | How to Argue like Cobalt Strike |
Seqrite DoubleExtension
Seqrite. (n.d.). How to avoid dual attack and vulnerable files with double extension?. Retrieved July 27, 2021.
Internal MISP references
UUID 77af0be9-174a-4330-8122-d0bd0c754973
which can be used as unique global reference for Seqrite DoubleExtension
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-07-27T00:00:00Z |
source | MITRE |
title | How to avoid dual attack and vulnerable files with double extension? |
BOA Telephone Scams
Bank of America. (n.d.). How to avoid telephone scams. Retrieved September 8, 2023.
Internal MISP references
UUID ee1abe19-f38b-5127-8377-f13f57f2abcb
which can be used as unique global reference for BOA Telephone Scams
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-08T00:00:00Z |
source | MITRE |
title | How to avoid telephone scams |
Okta Block Anonymizing Services
Moussa Diallo and Brett Winterford. (2024, April 26). How to Block Anonymizing Services using Okta. Retrieved May 28, 2024.
Internal MISP references
UUID 5790f25c-d1a5-5fb9-b213-0d84a6570c4c
which can be used as unique global reference for Okta Block Anonymizing Services
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-05-28T00:00:00Z |
date_published | 2024-04-26T00:00:00Z |
source | MITRE |
title | How to Block Anonymizing Services using Okta |
bypass_webproxy_filtering
Fehrman, B. (2017, April 13). How to Bypass Web-Proxy Filtering. Retrieved September 20, 2019.
Internal MISP references
UUID fab84597-99a0-4560-8c8c-11fd8c01d5fa
which can be used as unique global reference for bypass_webproxy_filtering
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-09-20T00:00:00Z |
date_published | 2017-04-13T00:00:00Z |
source | MITRE |
title | How to Bypass Web-Proxy Filtering |
Systemd Remote Control
Aaron Kili. (2018, January 16). How to Control Systemd Services on Remote Linux Server. Retrieved July 26, 2021.
Internal MISP references
UUID 0461b58e-400e-4e3e-b7c4-eed7a9b0fdd6
which can be used as unique global reference for Systemd Remote Control
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-07-26T00:00:00Z |
date_published | 2018-01-16T00:00:00Z |
source | MITRE |
title | How to Control Systemd Services on Remote Linux Server |
Microsoft Admin Shares
Microsoft. (n.d.). How to create and delete hidden or administrative shares on client computers. Retrieved November 20, 2014.
Internal MISP references
UUID 68d23cb0-b812-4d77-a3aa-34e24a923a50
which can be used as unique global reference for Microsoft Admin Shares
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2014-11-20T00:00:00Z |
source | MITRE |
title | How to create and delete hidden or administrative shares on client computers |
Delpy Mimikatz Crendential Manager
Delpy, B. (2017, December 12). howto ~ credential manager saved credentials. Retrieved November 23, 2020.
Internal MISP references
UUID 24c6027b-e0d2-4c0c-83af-4536a631ea85
which can be used as unique global reference for Delpy Mimikatz Crendential Manager
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-11-23T00:00:00Z |
date_published | 2017-12-12T00:00:00Z |
source | MITRE |
title | howto ~ credential manager saved credentials |
Stealthbits Overpass-the-Hash
Warren, J. (2019, February 26). How to Detect Overpass-the-Hash Attacks. Retrieved February 4, 2021.
Internal MISP references
UUID e0bf051c-21ab-4454-a6b0-31ae29b6e162
which can be used as unique global reference for Stealthbits Overpass-the-Hash
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-02-04T00:00:00Z |
date_published | 2019-02-26T00:00:00Z |
source | MITRE |
title | How to Detect Overpass-the-Hash Attacks |
Stealthbits Detect PtT 2019
Jeff Warren. (2019, February 19). How to Detect Pass-the-Ticket Attacks. Retrieved February 27, 2020.
Internal MISP references
UUID 5bdb759e-949d-4470-a4e4-925b6579da54
which can be used as unique global reference for Stealthbits Detect PtT 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-02-27T00:00:00Z |
date_published | 2019-02-19T00:00:00Z |
source | MITRE |
title | How to Detect Pass-the-Ticket Attacks |
WindowsIR Anti-Forensic Techniques
Carvey, H. (2013, July 23). HowTo: Determine/Detect the use of Anti-Forensics Techniques. Retrieved June 3, 2016.
Internal MISP references
UUID 646211a7-77be-4e5a-bd02-eeb70d67113d
which can be used as unique global reference for WindowsIR Anti-Forensic Techniques
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-06-03T00:00:00Z |
date_published | 2013-07-23T00:00:00Z |
source | MITRE |
title | HowTo: Determine/Detect the use of Anti-Forensics Techniques |
Microsoft Disable Autorun
Microsoft. (n.d.). How to disable the Autorun functionality in Windows. Retrieved April 20, 2016.
Internal MISP references
UUID 64bcc943-29be-4dd8-92c8-8a5dd94cbda4
which can be used as unique global reference for Microsoft Disable Autorun
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-04-20T00:00:00Z |
source | MITRE |
title | How to disable the Autorun functionality in Windows |
Superuser Linux Password Policies
Matutiae, M. (2014, August 6). How to display password policy information for a user (Ubuntu)?. Retrieved April 5, 2018.
Internal MISP references
UUID c0bbc881-594a-408c-86a2-211ce6279231
which can be used as unique global reference for Superuser Linux Password Policies
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-04-05T00:00:00Z |
date_published | 2014-08-06T00:00:00Z |
source | MITRE |
title | How to display password policy information for a user (Ubuntu)? |
Confluence Linux Command Line
Confluence Support. (2021, September 8). How to enable command line audit logging in linux. Retrieved September 23, 2021.
Internal MISP references
UUID 9ac72e5a-0b00-4936-9a78-bf2694d956c9
which can be used as unique global reference for Confluence Linux Command Line
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-09-23T00:00:00Z |
date_published | 2021-09-08T00:00:00Z |
source | MITRE |
title | How to enable command line audit logging in linux |
Atlassian Confluence Logging
Atlassian. (2018, January 9). How to Enable User Access Logging. Retrieved April 4, 2018.
Internal MISP references
UUID cd3ca4ce-c512-4612-94cc-3cf4d4dbba56
which can be used as unique global reference for Atlassian Confluence Logging
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-04-04T00:00:00Z |
date_published | 2018-01-09T00:00:00Z |
source | MITRE |
title | How to Enable User Access Logging |
Remote Shell Execution in Python
Abdou Rockikz. (2020, July). How to Execute Shell Commands in a Remote Machine in Python. Retrieved July 26, 2021.
Internal MISP references
UUID 4ea54256-42f9-4b35-8f9e-e595ab9be9ce
which can be used as unique global reference for Remote Shell Execution in Python
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-07-26T00:00:00Z |
date_published | 2020-07-01T00:00:00Z |
source | MITRE |
title | How to Execute Shell Commands in a Remote Machine in Python |
Find Wi-Fi Password on Mac
Ruslana Lishchuk. (2021, March 26). How to Find a Saved Wi-Fi Password on a Mac. Retrieved September 8, 2023.
Internal MISP references
UUID 695f3d20-7a46-5a4a-aef0-0a05a5e35304
which can be used as unique global reference for Find Wi-Fi Password on Mac
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-08T00:00:00Z |
date_published | 2021-03-26T00:00:00Z |
source | MITRE |
title | How to Find a Saved Wi-Fi Password on a Mac |
Stack Overflow
Stack Overflow. (n.d.). How to find the location of the Scheduled Tasks folder. Retrieved June 19, 2024.
Internal MISP references
UUID cf995fb6-33ac-51ea-a9ce-c18d9cfd56f1
which can be used as unique global reference for Stack Overflow
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-06-19T00:00:00Z |
source | MITRE |
title | How to find the location of the Scheduled Tasks folder |
Microsoft Web Root OCT 2016
Microsoft. (2016, October 20). How to: Find the Web Application Root. Retrieved July 27, 2018.
Internal MISP references
UUID bce1230a-5303-4e58-97c9-3e65ecd714d3
which can be used as unique global reference for Microsoft Web Root OCT 2016
in MISP communities and other software using the MISP galaxy
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-07-27T00:00:00Z |
date_published | 2016-10-20T00:00:00Z |
source | MITRE |
title | How to: Find the Web Application Root |
Microsoft Replication ACL
Microsoft. (n.d.). How to grant the "Replicating Directory Changes" permission for the Microsoft Metadirectory Services ADMA service account. Retrieved December 4, 2017.
Internal MISP references
UUID 1b17e5ec-6f09-4668-949a-59be2d1f1b65
which can be used as unique global reference for Microsoft Replication ACL
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-04T00:00:00Z |
source | MITRE |
title | How to grant the "Replicating Directory Changes" permission for the Microsoft Metadirectory Services ADMA service account |
Hide GDM User Accounts
Ji Mingkui. (2021, June 17). How to Hide All The User Accounts in Ubuntu 20.04, 21.04 Login Screen. Retrieved March 15, 2022.
Internal MISP references
UUID 88c3c460-3792-4881-ae7d-031c8901610d
which can be used as unique global reference for Hide GDM User Accounts
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-03-15T00:00:00Z |
date_published | 2021-06-17T00:00:00Z |
source | MITRE |
title | How to Hide All The User Accounts in Ubuntu 20.04, 21.04 Login Screen |
Elastic COM Hijacking
Ewing, P. Strom, B. (2016, September 15). How to Hunt: Detecting Persistence & Evasion with the COM. Retrieved September 15, 2016.
Internal MISP references
UUID bb325d97-5f69-4645-82d8-fdd6badecd9d
which can be used as unique global reference for Elastic COM Hijacking
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-09-15T00:00:00Z |
date_published | 2016-09-15T00:00:00Z |
source | MITRE |
title | How to Hunt: Detecting Persistence & Evasion with the COM |
Elastic Masquerade Ball
Ewing, P. (2016, October 31). How to Hunt: The Masquerade Ball. Retrieved October 31, 2016.
Internal MISP references
UUID 29c17b60-f947-4482-afa6-c80ca5819d10
which can be used as unique global reference for Elastic Masquerade Ball
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-10-31T00:00:00Z |
date_published | 2016-10-31T00:00:00Z |
source | MITRE |
title | How to Hunt: The Masquerade Ball |
Linux Loadable Kernel Module Insert and Remove LKMs
Henderson, B. (2006, September 24). How To Insert And Remove LKMs. Retrieved April 9, 2018.
Internal MISP references
UUID 044d0df8-61e4-4a29-8a24-0bd1227d4317
which can be used as unique global reference for Linux Loadable Kernel Module Insert and Remove LKMs
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-04-09T00:00:00Z |
date_published | 2006-09-24T00:00:00Z |
source | MITRE |
title | How To Insert And Remove LKMs |
DigiCert Install SSL Cert
DigiCert. (n.d.). How to Install an SSL Certificate. Retrieved April 19, 2021.
Internal MISP references
UUID a1d7d368-6092-4421-99de-44e458deee21
which can be used as unique global reference for DigiCert Install SSL Cert
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-04-19T00:00:00Z |
source | MITRE |
title | How to Install an SSL Certificate |
HowToGeek ShowExtension
Chris Hoffman. (2017, March 8). How to Make Windows Show File Extensions. Retrieved August 4, 2021.
Internal MISP references
UUID 51584201-40a4-4e39-ad23-14453e1eea46
which can be used as unique global reference for HowToGeek ShowExtension
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-08-04T00:00:00Z |
date_published | 2017-03-08T00:00:00Z |
source | MITRE |
title | How to Make Windows Show File Extensions |
AWS Monitor API Calls to EC2 Security Groups
Jeff Levine. (2017, January 3). How to Monitor AWS Account Configuration Changes and API Calls to Amazon EC2 Security Groups. Retrieved September 24, 2024.
Internal MISP references
UUID c61d45fa-d6ec-5c8f-83ca-474ac43376f6
which can be used as unique global reference for AWS Monitor API Calls to EC2 Security Groups
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-24T00:00:00Z |
date_published | 2017-01-03T00:00:00Z |
source | MITRE |
title | How to Monitor AWS Account Configuration Changes and API Calls to Amazon EC2 Security Groups |
Microsoft RDP Removal
Microsoft. (2021, September 24). How to remove entries from the Remote Desktop Connection Computer box. Retrieved June 15, 2022.
Internal MISP references
UUID 367d3f80-9b13-44fa-938a-744a95518571
which can be used as unique global reference for Microsoft RDP Removal
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-06-15T00:00:00Z |
date_published | 2021-09-24T00:00:00Z |
source | MITRE |
title | How to remove entries from the Remote Desktop Connection Computer box |
Startup Items Eclectic
hoakley. (2021, September 16). How to run an app or tool at startup. Retrieved October 5, 2021.
Internal MISP references
UUID 397be6f9-a109-4185-85f7-8d994fb31eaa
which can be used as unique global reference for Startup Items Eclectic
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-05T00:00:00Z |
date_published | 2021-09-16T00:00:00Z |
source | MITRE |
title | How to run an app or tool at startup |
Podman Systemd
Valentin Rothberg. (2022, March 16). How to run pods as systemd services with Podman. Retrieved February 15, 2024.
Internal MISP references
UUID 1657c650-7739-5ba3-8c95-b35cb74ee79f
which can be used as unique global reference for Podman Systemd
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-02-15T00:00:00Z |
date_published | 2022-03-16T00:00:00Z |
source | MITRE |
title | How to run pods as systemd services with Podman |
CrowdStrike Endpoint Security Testing Oct 2021
Radu Vlad, Liviu Arsene. (2021, October 15). How to Test Endpoint Security Efficacy and What to Expect. Retrieved March 7, 2024.
Internal MISP references
UUID 4cecfe1f-c1d2-4a71-ac17-0effd5f045df
which can be used as unique global reference for CrowdStrike Endpoint Security Testing Oct 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-07T00:00:00Z |
date_published | 2021-10-15T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | How to Test Endpoint Security Efficacy and What to Expect |
Microsoft Disable VBA Jan 2020
Microsoft. (2020, January 23). How to turn off Visual Basic for Applications when you deploy Office. Retrieved September 17, 2020.
Internal MISP references
UUID 104db93c-c5cd-431c-ac79-d76cb1694d7c
which can be used as unique global reference for Microsoft Disable VBA Jan 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-09-17T00:00:00Z |
date_published | 2020-01-23T00:00:00Z |
source | MITRE |
title | How to turn off Visual Basic for Applications when you deploy Office |
Microsoft Regsvr32
Microsoft. (2015, August 14). How to use the Regsvr32 tool and troubleshoot Regsvr32 error messages. Retrieved June 22, 2016.
Internal MISP references
UUID 723ec577-5ea8-4ced-b6c3-b7aaabe1d7e8
which can be used as unique global reference for Microsoft Regsvr32
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-06-22T00:00:00Z |
date_published | 2015-08-14T00:00:00Z |
source | MITRE |
title | How to use the Regsvr32 tool and troubleshoot Regsvr32 error messages |
Microsoft SAM
Microsoft. (2006, October 30). How to use the SysKey utility to secure the Windows Security Accounts Manager database. Retrieved August 3, 2016.
Internal MISP references
UUID bde9acb0-c1c3-44e1-b3b1-cfc0898baead
which can be used as unique global reference for Microsoft SAM
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-08-03T00:00:00Z |
date_published | 2006-10-30T00:00:00Z |
source | MITRE |
title | How to use the SysKey utility to secure the Windows Security Accounts Manager database |
AWS Traffic Mirroring
Amazon Web Services. (n.d.). How Traffic Mirroring works. Retrieved March 17, 2022.
Internal MISP references
UUID 6b77a2f3-39b8-4574-8dee-cde7ba9debff
which can be used as unique global reference for AWS Traffic Mirroring
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-03-17T00:00:00Z |
source | MITRE |
title | How Traffic Mirroring works |
Symantec Hydraq Persistence Jan 2010
Fitzgerald, P. (2010, January 26). How Trojan.Hydraq Stays On Your Computer. Retrieved February 22, 2018.
Internal MISP references
UUID b3ef4b78-2ed6-4cf4-afcc-4e4cb09d806a
which can be used as unique global reference for Symantec Hydraq Persistence Jan 2010
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-02-22T00:00:00Z |
date_published | 2010-01-26T00:00:00Z |
source | MITRE |
title | How Trojan.Hydraq Stays On Your Computer |
Microsoft UAC Nov 2018
Montemayor, D. et al.. (2018, November 15). How User Account Control works. Retrieved June 3, 2019.
Internal MISP references
UUID abda4184-18f9-4799-9c1f-3ba484473e35
which can be used as unique global reference for Microsoft UAC Nov 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-06-03T00:00:00Z |
date_published | 2018-11-15T00:00:00Z |
source | MITRE |
title | How User Account Control works |
TechNet How UAC Works
Lich, B. (2016, May 31). How User Account Control Works. Retrieved June 3, 2016.
Internal MISP references
UUID bbf8d1a3-115e-4bc8-be43-47ce3b295d45
which can be used as unique global reference for TechNet How UAC Works
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-06-03T00:00:00Z |
date_published | 2016-05-31T00:00:00Z |
source | MITRE |
title | How User Account Control Works |
PWC WellMess July 2020
PWC. (2020, July 16). How WellMess malware has been used to target COVID-19 vaccines. Retrieved September 24, 2020.
Internal MISP references
UUID 22794e37-3c55-444a-b659-e5a1a6bc2da0
which can be used as unique global reference for PWC WellMess July 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-09-24T00:00:00Z |
date_published | 2020-07-16T00:00:00Z |
source | MITRE |
title | How WellMess malware has been used to target COVID-19 vaccines |
Google Election Threats October 2020
Huntley, S. (2020, October 16). How We're Tackling Evolving Online Threats. Retrieved March 24, 2021.
Internal MISP references
UUID 8538a963-3e67-47fe-9afd-216b93a2be00
which can be used as unique global reference for Google Election Threats October 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-03-24T00:00:00Z |
date_published | 2020-10-16T00:00:00Z |
source | MITRE |
title | How We're Tackling Evolving Online Threats |
Microsoft Credential Guard April 2017
Lich, B., Tobin, J. (2017, April 5). How Windows Defender Credential Guard works. Retrieved November 27, 2017.
Internal MISP references
UUID aa52db88-5d03-42ae-b371-6210d7079a84
which can be used as unique global reference for Microsoft Credential Guard April 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-11-27T00:00:00Z |
date_published | 2017-04-05T00:00:00Z |
source | MITRE |
title | How Windows Defender Credential Guard works |
NPPSPY Video
Grzegorz Tworek. (2021, December 14). How winlogon.exe shares the cleartext password with custom DLLs. Retrieved March 30, 2023.
Internal MISP references
UUID 6533d5df-7388-5c59-8c63-0923de34b61d
which can be used as unique global reference for NPPSPY Video
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-30T00:00:00Z |
date_published | 2021-12-14T00:00:00Z |
source | MITRE |
title | How winlogon.exe shares the cleartext password with custom DLLs |
BleepingComputer HPE January 24 2024
Lawrence Abrams. (2024, January 24). HPE: Russian hackers breached its security team’s email accounts. Retrieved February 5, 2024.
Internal MISP references
UUID fc77948f-332a-4e59-8c93-f430cbbbf68f
which can be used as unique global reference for BleepingComputer HPE January 24 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-02-05T00:00:00Z |
date_published | 2024-01-24T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | HPE: Russian hackers breached its security team’s email accounts |
Cylance Sodinokibi July 2019
Cylance. (2019, July 3). hreat Spotlight: Sodinokibi Ransomware. Retrieved August 4, 2020.
Internal MISP references
UUID 3ad8def7-3a8a-49bb-8f47-dea2e570c99e
which can be used as unique global reference for Cylance Sodinokibi July 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-08-04T00:00:00Z |
date_published | 2019-07-03T00:00:00Z |
source | MITRE |
title | hreat Spotlight: Sodinokibi Ransomware |
Wikipedia HTML Application
Wikipedia. (2017, October 14). HTML Application. Retrieved October 27, 2017.
Internal MISP references
UUID f1f76055-91f8-4977-9392-bed347e4f181
which can be used as unique global reference for Wikipedia HTML Application
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-10-27T00:00:00Z |
date_published | 2017-10-14T00:00:00Z |
source | MITRE |
title | HTML Application |
MSDN HTML Applications
Microsoft. (n.d.). HTML Applications. Retrieved October 27, 2017.
Internal MISP references
UUID 2de103a8-8d72-40f9-b366-b908364dd090
which can be used as unique global reference for MSDN HTML Applications
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-10-27T00:00:00Z |
source | MITRE |
title | HTML Applications |
Microsoft HTML Help ActiveX
Microsoft. (n.d.). HTML Help ActiveX Control Overview. Retrieved October 3, 2018.
Internal MISP references
UUID ae5728bd-571a-451f-9ba3-3198067135b4
which can be used as unique global reference for Microsoft HTML Help ActiveX
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-10-03T00:00:00Z |
source | MITRE |
title | HTML Help ActiveX Control Overview |
Outlflank HTML Smuggling 2018
Hegt, S. (2018, August 14). HTML smuggling explained. Retrieved May 20, 2021.
Internal MISP references
UUID 9a99f431-4d15-47f8-a31b-4f98671cd95d
which can be used as unique global reference for Outlflank HTML Smuggling 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-05-20T00:00:00Z |
date_published | 2018-08-14T00:00:00Z |
source | MITRE |
title | HTML smuggling explained |
CrowdStrike Linux Rootkit
Kurtz, G. (2012, November 19). HTTP iframe Injecting Linux Rootkit. Retrieved December 21, 2017.
Internal MISP references
UUID eb3590bf-ff12-4ccd-bf9d-cf8eacd82135
which can be used as unique global reference for CrowdStrike Linux Rootkit
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-21T00:00:00Z |
date_published | 2012-11-19T00:00:00Z |
source | MITRE |
title | HTTP iframe Injecting Linux Rootkit |
Wikipedia HPKP
Wikipedia. (2017, February 28). HTTP Public Key Pinning. Retrieved March 31, 2017.
Internal MISP references
UUID 2da110e7-d3a8-433f-87c3-eb744adf811b
which can be used as unique global reference for Wikipedia HPKP
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-03-31T00:00:00Z |
date_published | 2017-02-28T00:00:00Z |
source | MITRE |
title | HTTP Public Key Pinning |
Cobalt Strike Arguments 2019
Mudge, R. (2019, January 2). https://blog.cobaltstrike.com/2019/01/02/cobalt-strike-3-13-why-do-we-argue/. Retrieved November 19, 2021.
Internal MISP references
UUID e845f741-eabe-469b-97c1-f51a2aeb18b0
which can be used as unique global reference for Cobalt Strike Arguments 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-11-19T00:00:00Z |
date_published | 2019-01-02T00:00:00Z |
source | MITRE |
title | https://blog.cobaltstrike.com/2019/01/02/cobalt-strike-3-13-why-do-we-argue/ |
Talos Discord Webhook Abuse
Nick Biasini, Edmund Brumaghin, Chris Neal, and Paul Eubanks. (2021, April 7). https://blog.talosintelligence.com/collab-app-abuse/. Retrieved July 20, 2023.
Internal MISP references
UUID affa93d8-5c8b-557d-80b4-1366df13d77a
which can be used as unique global reference for Talos Discord Webhook Abuse
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-07-20T00:00:00Z |
date_published | 2021-04-07T00:00:00Z |
source | MITRE |
title | https://blog.talosintelligence.com/collab-app-abuse/ |
Red Canary Emotet Feb 2019
Donohue, B.. (2019, February 13). https://redcanary.com/blog/stopping-emotet-before-it-moves-laterally/. Retrieved March 25, 2019.
Internal MISP references
UUID 132915dc-d906-4c23-b1e3-885af817b840
which can be used as unique global reference for Red Canary Emotet Feb 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-03-25T00:00:00Z |
date_published | 2019-02-13T00:00:00Z |
source | MITRE |
title | https://redcanary.com/blog/stopping-emotet-before-it-moves-laterally/ |
TechNet Removable Media Control
Microsoft. (2007, August 31). https://technet.microsoft.com/en-us/library/cc771759(v=ws.10).aspx. Retrieved April 20, 2016.
Internal MISP references
UUID db86cd0a-1188-4079-afed-1f986166a2e7
which can be used as unique global reference for TechNet Removable Media Control
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-04-20T00:00:00Z |
date_published | 2007-08-31T00:00:00Z |
source | MITRE |
title | https://technet.microsoft.com/en-us/library/cc771759(v=ws.10).aspx |
Chromium HSTS
Chromium. (n.d.). HTTP Strict Transport Security. Retrieved May 24, 2023.
Internal MISP references
UUID 1ad03be3-d863-5a55-a371-42b6d3b7ed31
which can be used as unique global reference for Chromium HSTS
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-24T00:00:00Z |
source | MITRE |
title | HTTP Strict Transport Security |
CISA AA20-301A Kimsuky
CISA, FBI, CNMF. (2020, October 27). https://us-cert.cisa.gov/ncas/alerts/aa20-301a. Retrieved November 4, 2020.
Internal MISP references
UUID 685aa213-7902-46fb-b90a-64be5c851f73
which can be used as unique global reference for CISA AA20-301A Kimsuky
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-11-04T00:00:00Z |
date_published | 2020-10-27T00:00:00Z |
source | MITRE |
title | https://us-cert.cisa.gov/ncas/alerts/aa20-301a |
FireEye Targeted Attacks Middle East Banks
Singh, S., Yin, H. (2016, May 22). https://www.fireeye.com/blog/threat-research/2016/05/targeted_attacksaga.html. Retrieved April 5, 2018.
Internal MISP references
UUID fedb3a9d-4f9e-495c-ac92-d5457688608d
which can be used as unique global reference for FireEye Targeted Attacks Middle East Banks
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-04-05T00:00:00Z |
date_published | 2016-05-22T00:00:00Z |
source | MITRE |
title | https://www.fireeye.com/blog/threat-research/2016/05/targeted_attacksaga.html |
Forbes Dyre May 2017
Brewster, T. (2017, May 4). https://www.forbes.com/sites/thomasbrewster/2017/05/04/dyre-hackers-stealing-millions-from-american-coporates/#601c77842a0a. Retrieved June 15, 2020.
Internal MISP references
UUID 8fb3ef2f-3652-4563-8921-2c601d1b9bc9
which can be used as unique global reference for Forbes Dyre May 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-06-15T00:00:00Z |
date_published | 2017-05-04T00:00:00Z |
source | MITRE |
title | https://www.forbes.com/sites/thomasbrewster/2017/05/04/dyre-hackers-stealing-millions-from-american-coporates/#601c77842a0a |
Microsoft Subscription Hijacking 2022
Dor Edry. (2022, August 24). Hunt for compromised Azure subscriptions using Microsoft Defender for Cloud Apps. Retrieved September 5, 2023.
Internal MISP references
UUID e5944e4c-76c6-55d1-97ec-8367b7f98c28
which can be used as unique global reference for Microsoft Subscription Hijacking 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-05T00:00:00Z |
date_published | 2022-08-24T00:00:00Z |
source | MITRE |
title | Hunt for compromised Azure subscriptions using Microsoft Defender for Cloud Apps |
Harries JustForFun 2022
Jamie Harries. (2022, May 25). Hunting a Global Telecommunications Threat: DecisiveArchitect and Its Custom Implant JustForFun. Retrieved September 23, 2024.
Internal MISP references
UUID e7b7aee0-486e-5936-9b01-446dce22f917
which can be used as unique global reference for Harries JustForFun 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-09-23T00:00:00Z |
date_published | 2022-05-25T00:00:00Z |
source | MITRE |
title | Hunting a Global Telecommunications Threat: DecisiveArchitect and Its Custom Implant JustForFun |
crowdstrike bpf socket filters
Jamie Harries. (2022, May 25). Hunting a Global Telecommunications Threat: DecisiveArchitect and Its Custom Implant JustForFun. Retrieved October 18, 2022.
Internal MISP references
UUID f68a59a1-cb07-4f58-b755-25c91938b611
which can be used as unique global reference for crowdstrike bpf socket filters
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-10-18T00:00:00Z |
date_published | 2022-05-25T00:00:00Z |
source | MITRE |
title | Hunting a Global Telecommunications Threat: DecisiveArchitect and Its Custom Implant JustForFun |
Koczwara Beacon Hunting Sep 2021
Koczwara, M. (2021, September 7). Hunting Cobalt Strike C2 with Shodan. Retrieved October 12, 2021.
Internal MISP references
UUID e3984769-f6d7-43dd-8179-7df9d441512e
which can be used as unique global reference for Koczwara Beacon Hunting Sep 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-12T00:00:00Z |
date_published | 2021-09-07T00:00:00Z |
source | MITRE |
title | Hunting Cobalt Strike C2 with Shodan |
Fireeye Hunting COM June 2019
Hamilton, C. (2019, June 4). Hunting COM Objects. Retrieved June 10, 2019.
Internal MISP references
UUID 84311e46-cea1-486a-a737-c4a4946ab837
which can be used as unique global reference for Fireeye Hunting COM June 2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-06-10T00:00:00Z |
date_published | 2019-06-04T00:00:00Z |
source | MITRE |
title | Hunting COM Objects |
Berba hunting linux systemd
Pepe Berba. (2022, January 30). Hunting for Persistence in Linux (Part 3): Systemd, Timers, and Cron. Retrieved March 20, 2023.
Internal MISP references
UUID 7dfd6a67-3935-506a-8661-1caa7eb508e2
which can be used as unique global reference for Berba hunting linux systemd
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-20T00:00:00Z |
date_published | 2022-01-30T00:00:00Z |
source | MITRE |
title | Hunting for Persistence in Linux (Part 3): Systemd, Timers, and Cron |
Elastic HuntingNMemory June 2017
Desimone, J. (2017, June 13). Hunting in Memory. Retrieved December 7, 2017.
Internal MISP references
UUID 8cd58716-4ff1-4ba2-b980-32c52cf7dee8
which can be used as unique global reference for Elastic HuntingNMemory June 2017
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-07T00:00:00Z |
date_published | 2017-06-13T00:00:00Z |
source | MITRE |
title | Hunting in Memory |
LogPoint Hunting LockBit
LogPoint. (n.d.). Hunting LockBit Variations using Logpoint. Retrieved May 19, 2023.
Internal MISP references
UUID 22aa7792-6296-4f16-826f-d0f1c55ddb2a
which can be used as unique global reference for LogPoint Hunting LockBit
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-05-19T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Hunting LockBit Variations using Logpoint |
Joint Cybersecurity Advisory AA23-129A Snake Malware May 2023
FBI et al. (2023, May 9). Hunting Russian Intelligence “Snake” Malware. Retrieved June 8, 2023.
Internal MISP references
UUID 1931b80a-effb-59ec-acae-c0f17efb8cad
which can be used as unique global reference for Joint Cybersecurity Advisory AA23-129A Snake Malware May 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-06-08T00:00:00Z |
date_published | 2023-05-09T00:00:00Z |
source | MITRE |
title | Hunting Russian Intelligence “Snake” Malware |
Falcon Sandbox smp: 28553b3a9d
Hybrid Analysis. (2018, July 11). HybridAnalsysis of sample 28553b3a9d2ad4361d33d29ac4bf771d008e0073cec01b5561c6348a608f8dd7. Retrieved September 8, 2023.
Internal MISP references
UUID f27ab4cb-1666-501a-aa96-537d2b2d1f08
which can be used as unique global reference for Falcon Sandbox smp: 28553b3a9d
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-09-08T00:00:00Z |
date_published | 2018-07-11T00:00:00Z |
source | MITRE |
title | HybridAnalsysis of sample 28553b3a9d2ad4361d33d29ac4bf771d008e0073cec01b5561c6348a608f8dd7 |
Wikipedia Hypervisor
Wikipedia. (2016, May 23). Hypervisor. Retrieved June 11, 2016.
Internal MISP references
UUID 1a6ae877-ef30-4d40-abd0-fde308f1a1f0
which can be used as unique global reference for Wikipedia Hypervisor
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-06-11T00:00:00Z |
date_published | 2016-05-23T00:00:00Z |
source | MITRE |
title | Hypervisor |
FireEye ADFS
Bierstock, D., Baker, A. (2019, March 21). I am AD FS and So Can You. Retrieved December 17, 2020.
Internal MISP references
UUID 6891eaf4-6857-4106-860c-1708d2a3bd33
which can be used as unique global reference for FireEye ADFS
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-12-17T00:00:00Z |
date_published | 2019-03-21T00:00:00Z |
source | MITRE |
title | I am AD FS and So Can You |
AWS IAM Conditions
AWS. (n.d.). IAM JSON policy elements: Condition. Retrieved January 2, 2024.
Internal MISP references
UUID 0fabd95b-a8cc-5a03-9a48-ffac8e5c5e28
which can be used as unique global reference for AWS IAM Conditions
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-01-02T00:00:00Z |
source | MITRE |
title | IAM JSON policy elements: Condition |
AWS EKS IAM Roles for Service Accounts
Amazon Web Services. (n.d.). IAM roles for service accounts. Retrieved July 14, 2023.
Internal MISP references
UUID b2452f0e-93b0-55b7-add8-8338d171f0bf
which can be used as unique global reference for AWS EKS IAM Roles for Service Accounts
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-07-14T00:00:00Z |
source | MITRE |
title | IAM roles for service accounts |
Kaspersky IAmTheKing October 2020
Ivan Kwiatkowski, Pierre Delcher, Felix Aime. (2020, October 15). IAmTheKing and the SlothfulMedia malware family. Retrieved October 15, 2020.
Internal MISP references
UUID fe4050f3-1a73-4e98-9bf1-e8fb73a23b7a
which can be used as unique global reference for Kaspersky IAmTheKing October 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-15T00:00:00Z |
date_published | 2020-10-15T00:00:00Z |
source | MITRE |
title | IAmTheKing and the SlothfulMedia malware family |
Amazon IAM Groups
Amazon. (n.d.). IAM user groups. Retrieved October 13, 2021.
Internal MISP references
UUID 16f6b02a-912b-42c6-8d32-4e4f11fa70ec
which can be used as unique global reference for Amazon IAM Groups
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-13T00:00:00Z |
source | MITRE |
title | IAM user groups |
IAPP
IAPP. (n.d.). Retrieved March 5, 2024.
Internal MISP references
UUID a7dac249-f34a-557c-94ea-b16723f7a4f7
which can be used as unique global reference for IAPP
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-05T00:00:00Z |
source | MITRE |
title | IAPP |
CrowdStrike IceApple May 2022
CrowdStrike. (2022, May). ICEAPPLE: A NOVEL INTERNET INFORMATION SERVICES (IIS) POST-EXPLOITATION FRAMEWORK. Retrieved June 27, 2022.
Internal MISP references
UUID 325988b8-1c7d-4296-83d6-bfcbe533b75e
which can be used as unique global reference for CrowdStrike IceApple May 2022
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-06-27T00:00:00Z |
date_published | 2022-05-01T00:00:00Z |
source | MITRE |
title | ICEAPPLE: A NOVEL INTERNET INFORMATION SERVICES (IIS) POST-EXPLOITATION FRAMEWORK |
Trendmicro_IcedID
Kenefick , I. (2022, December 23). IcedID Botnet Distributors Abuse Google PPC to Distribute Malware. Retrieved July 24, 2024.
Internal MISP references
UUID d7584086-0a3c-5047-af06-760a295442eb
which can be used as unique global reference for Trendmicro_IcedID
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-07-24T00:00:00Z |
date_published | 2022-12-23T00:00:00Z |
source | MITRE |
title | IcedID Botnet Distributors Abuse Google PPC to Distribute Malware |
ICIT China's Espionage Jul 2016
Scott, J. and Spaniel, D. (2016, July 28). ICIT Brief - China’s Espionage Dynasty: Economic Death by a Thousand Cuts. Retrieved June 7, 2018.
Internal MISP references
UUID 1a824860-6978-454d-963a-a56414a4312b
which can be used as unique global reference for ICIT China's Espionage Jul 2016
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-06-07T00:00:00Z |
date_published | 2016-07-28T00:00:00Z |
source | MITRE |
title | ICIT Brief - China’s Espionage Dynasty: Economic Death by a Thousand Cuts |
CISA ICS Advisory ICSA-10-272-01
CISA. (2010, September 10). ICS Advisory (ICSA-10-272-01). Retrieved December 7, 2020.
Internal MISP references
UUID 25b3c18c-e017-4773-91dd-b489220d4fcb
which can be used as unique global reference for CISA ICS Advisory ICSA-10-272-01
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-12-07T00:00:00Z |
date_published | 2010-09-10T00:00:00Z |
source | MITRE |
title | ICS Advisory (ICSA-10-272-01) |
US-CERT Ukraine Feb 2016
US-CERT. (2016, February 25). ICS Alert (IR-ALERT-H-16-056-01) Cyber-Attack Against Ukrainian Critical Infrastructure. Retrieved June 10, 2020.
Internal MISP references
UUID 403ea040-8c08-423f-99cb-d7e7852c16e4
which can be used as unique global reference for US-CERT Ukraine Feb 2016
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-06-10T00:00:00Z |
date_published | 2016-02-25T00:00:00Z |
source | MITRE |
title | ICS Alert (IR-ALERT-H-16-056-01) Cyber-Attack Against Ukrainian Critical Infrastructure |
Dragos Threat Report 2020
Dragos. (n.d.). ICS Cybersecurity Year in Review 2020. Retrieved February 25, 2021.
Internal MISP references
UUID 8bb3147c-3178-4449-9978-f1248b1bcb0a
which can be used as unique global reference for Dragos Threat Report 2020
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-02-25T00:00:00Z |
source | MITRE |
title | ICS Cybersecurity Year in Review 2020 |
id man page
MacKenzie, D. and Robbins, A. (n.d.). id(1) - Linux man page. Retrieved January 11, 2024.
Internal MISP references
UUID 158f088c-4d51-567d-bc58-be0b9a087c9a
which can be used as unique global reference for id man page
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-01-11T00:00:00Z |
source | MITRE |
title | id(1) - Linux man page |
Cisco Advisory SNMP v3 Authentication Vulnerabilities
Cisco. (2008, June 10). Identifying and Mitigating Exploitation of the SNMP Version 3 Authentication Vulnerabilities. Retrieved October 19, 2020.
Internal MISP references
UUID ed7897e5-21f0-49fa-9b26-c397eaebc88a
which can be used as unique global reference for Cisco Advisory SNMP v3 Authentication Vulnerabilities
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-10-19T00:00:00Z |
date_published | 2008-06-10T00:00:00Z |
source | MITRE |
title | Identifying and Mitigating Exploitation of the SNMP Version 3 Authentication Vulnerabilities |
Resource and Data Forks
Flylib. (n.d.). Identifying Resource and Data Forks. Retrieved October 12, 2021.
Internal MISP references
UUID b8eaf053-40e0-414e-a89e-409dbf218554
which can be used as unique global reference for Resource and Data Forks
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-10-12T00:00:00Z |
source | MITRE |
title | Identifying Resource and Data Forks |
AWS Identity Federation
Amazon. (n.d.). Identity Federation in AWS. Retrieved March 13, 2020.
Internal MISP references
UUID b55ac071-483b-4802-895f-ea4eaac1de92
which can be used as unique global reference for AWS Identity Federation
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-03-13T00:00:00Z |
source | MITRE |
title | Identity Federation in AWS |
Microsoft GetNCCChanges
Microsoft. (n.d.). IDL_DRSGetNCChanges (Opnum 3). Retrieved December 4, 2017.
Internal MISP references
UUID 410570e4-b578-4838-a25d-f03d92fcf3cb
which can be used as unique global reference for Microsoft GetNCCChanges
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-04T00:00:00Z |
source | MITRE |
title | IDL_DRSGetNCChanges (Opnum 3) |
Ie4uinit.exe - LOLBAS Project
LOLBAS. (2018, May 25). Ie4uinit.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 01f9a368-5933-47a1-85a9-e5883a5ca266
which can be used as unique global reference for Ie4uinit.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2018-05-25T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Ie4uinit.exe |
Ieadvpack.dll - LOLBAS Project
LOLBAS. (2018, May 25). Ieadvpack.dll. Retrieved December 4, 2023.
Internal MISP references
UUID 79943a49-23d6-499b-a022-7c2f8bd68aee
which can be used as unique global reference for Ieadvpack.dll - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2018-05-25T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Ieadvpack.dll |
iediagcmd.exe - LOLBAS Project
LOLBAS. (2022, March 29). iediagcmd.exe. Retrieved December 4, 2023.
Internal MISP references
UUID de238a18-2275-497e-adcf-453a016a24c4
which can be used as unique global reference for iediagcmd.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2022-03-29T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | iediagcmd.exe |
Wikipedia 802.1x
Wikipedia. (2018, March 30). IEEE 802.1X. Retrieved April 11, 2018.
Internal MISP references
UUID 5d382527-ffbd-486e-adbe-d60508567281
which can be used as unique global reference for Wikipedia 802.1x
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-04-11T00:00:00Z |
date_published | 2018-03-30T00:00:00Z |
source | MITRE |
title | IEEE 802.1X |
Ieexec.exe - LOLBAS Project
LOLBAS. (2018, May 25). Ieexec.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 91f31525-585d-4b71-83d7-9b7c2feacd34
which can be used as unique global reference for Ieexec.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2018-05-25T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Ieexec.exe |
Ieframe.dll - LOLBAS Project
LOLBAS. (2018, May 25). Ieframe.dll. Retrieved December 4, 2023.
Internal MISP references
UUID aab9c80d-1f1e-47ba-954d-65e7400054df
which can be used as unique global reference for Ieframe.dll - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2018-05-25T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Ieframe.dll |
Wikipedia Ifconfig
Wikipedia. (2016, January 26). ifconfig. Retrieved April 17, 2016.
Internal MISP references
UUID 7bb238d4-4571-4cd0-aab2-76797570724a
which can be used as unique global reference for Wikipedia Ifconfig
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-04-17T00:00:00Z |
date_published | 2016-01-26T00:00:00Z |
source | MITRE |
title | ifconfig |
EFF Manul Aug 2016
Galperin, E., Et al.. (2016, August). I Got a Letter From the Government the Other Day.... Retrieved April 25, 2018.
Internal MISP references
UUID 311a3863-3897-4ddf-a251-d0467a56675f
which can be used as unique global reference for EFF Manul Aug 2016
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-04-25T00:00:00Z |
date_published | 2016-08-01T00:00:00Z |
source | MITRE |
title | I Got a Letter From the Government the Other Day... |
IIS Backdoor 2011
Julien. (2011, February 2). IIS Backdoor. Retrieved June 3, 2021.
Internal MISP references
UUID fd450382-cca0-40c4-8144-cc90a3b0011b
which can be used as unique global reference for IIS Backdoor 2011
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-06-03T00:00:00Z |
date_published | 2011-02-02T00:00:00Z |
source | MITRE |
title | IIS Backdoor |
Microsoft IIS Modules Overview 2007
Microsoft. (2007, November 24). IIS Modules Overview. Retrieved June 17, 2021.
Internal MISP references
UUID c8db6bfd-3a08-43b3-b33b-91a32e9bd694
which can be used as unique global reference for Microsoft IIS Modules Overview 2007
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-06-17T00:00:00Z |
date_published | 2007-11-24T00:00:00Z |
source | MITRE |
title | IIS Modules Overview |
Proofpoint TA456 Defense Contractor July 2021
Miller, J. et. al. (2021, July 28). I Knew You Were Trouble: TA456 Targets Defense Contractor with Alluring Social Media Persona. Retrieved March 11, 2024.
Internal MISP references
UUID 0cc015d9-96d0-534e-a34a-221267250f90
which can be used as unique global reference for Proofpoint TA456 Defense Contractor July 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-03-11T00:00:00Z |
date_published | 2021-07-28T00:00:00Z |
source | MITRE |
title | I Knew You Were Trouble: TA456 Targets Defense Contractor with Alluring Social Media Persona |
Ilasm.exe - LOLBAS Project
LOLBAS. (2020, March 17). Ilasm.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 347a1f01-02ce-488e-9100-862971c1833f
which can be used as unique global reference for Ilasm.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2020-03-17T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Ilasm.exe |
anomali-rocke-tactics
Anomali Threat Research. (2019, October 15). Illicit Cryptomining Threat Actor Rocke Changes Tactics, Now More Difficult to Detect. Retrieved December 17, 2020.
Internal MISP references
UUID 2308c5ca-04a4-43c5-b92b-ffa6a60ae3a9
which can be used as unique global reference for anomali-rocke-tactics
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-12-17T00:00:00Z |
date_published | 2019-10-15T00:00:00Z |
source | MITRE |
title | Illicit Cryptomining Threat Actor Rocke Changes Tactics, Now More Difficult to Detect |
Microsoft Dev Blog IFEO Mar 2010
Shanbhag, M. (2010, March 24). Image File Execution Options (IFEO). Retrieved December 18, 2017.
Internal MISP references
UUID 4c62c2cb-bee2-4fc0-aa81-65d66e71a5c2
which can be used as unique global reference for Microsoft Dev Blog IFEO Mar 2010
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-18T00:00:00Z |
date_published | 2010-03-24T00:00:00Z |
source | MITRE |
title | Image File Execution Options (IFEO) |
IMEWDBLD.exe - LOLBAS Project
LOLBAS. (2020, March 5). IMEWDBLD.exe. Retrieved December 4, 2023.
Internal MISP references
UUID 9d1d6bc1-61cf-4465-b3cb-b6af36769027
which can be used as unique global reference for IMEWDBLD.exe - LOLBAS Project
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-12-04T00:00:00Z |
date_published | 2020-03-05T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | IMEWDBLD.exe |
Imminent Unit42 Dec2019
Unit 42. (2019, December 2). Imminent Monitor – a RAT Down Under. Retrieved May 5, 2020.
Internal MISP references
UUID 28f858c6-4c00-4c0c-bb27-9e000ba22690
which can be used as unique global reference for Imminent Unit42 Dec2019
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-05-05T00:00:00Z |
date_published | 2019-12-02T00:00:00Z |
source | MITRE |
title | Imminent Monitor – a RAT Down Under |
Core Security Impacket
Core Security. (n.d.). Impacket. Retrieved November 2, 2017.
Internal MISP references
UUID 9b88d7d6-5cf3-40d5-b624-ddf01508cb95
which can be used as unique global reference for Core Security Impacket
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-11-02T00:00:00Z |
source | MITRE |
title | Impacket |
Impacket Tools
SecureAuth. (n.d.). Retrieved January 15, 2019.
Internal MISP references
UUID cdaf72ce-e8f7-42ae-b815-14a7fd47e292
which can be used as unique global reference for Impacket Tools
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-01-15T00:00:00Z |
source | MITRE |
title | Impacket Tools |
EK Impeding Malware Analysis
Song, C., et al. (2012, August 7). Impeding Automated Malware Analysis with Environment-sensitive Malware. Retrieved January 18, 2019.
Internal MISP references
UUID c3e6c8da-1399-419c-96f5-7dade6fccd29
which can be used as unique global reference for EK Impeding Malware Analysis
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2019-01-18T00:00:00Z |
date_published | 2012-08-07T00:00:00Z |
source | MITRE |
title | Impeding Automated Malware Analysis with Environment-sensitive Malware |
Microsoft Impersonation and EWS in Exchange
Microsoft. (2022, September 13). Impersonation and EWS in Exchange. Retrieved July 10, 2023.
Internal MISP references
UUID d7755dbd-0b38-5776-b63a-d792a4d027a4
which can be used as unique global reference for Microsoft Impersonation and EWS in Exchange
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-07-10T00:00:00Z |
date_published | 2022-09-13T00:00:00Z |
source | MITRE |
title | Impersonation and EWS in Exchange |
Microsoft Implementing CPL
M. (n.d.). Implementing Control Panel Items. Retrieved January 18, 2018.
Internal MISP references
UUID 63c5c654-e885-4427-a644-068f4057f35f
which can be used as unique global reference for Microsoft Implementing CPL
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2018-01-18T00:00:00Z |
source | MITRE |
title | Implementing Control Panel Items |
TechNet Least Privilege
Microsoft. (2016, April 16). Implementing Least-Privilege Administrative Models. Retrieved June 3, 2016.
Internal MISP references
UUID 21e595be-d028-4013-b3d0-811c08581709
which can be used as unique global reference for TechNet Least Privilege
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2016-06-03T00:00:00Z |
date_published | 2016-04-16T00:00:00Z |
source | MITRE |
title | Implementing Least-Privilege Administrative Models |
Dragos IT ICS Ransomware
Slowik, J.. (2019, April 10). Implications of IT Ransomware for ICS Environments. Retrieved January 28, 2021.
Internal MISP references
UUID 60187301-8d70-4023-8e6d-59cbb1468f0d
which can be used as unique global reference for Dragos IT ICS Ransomware
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-01-28T00:00:00Z |
date_published | 2019-04-10T00:00:00Z |
source | MITRE |
title | Implications of IT Ransomware for ICS Environments |
Microsoft SolarWinds Steps
Lambert, J. (2020, December 13). Important steps for customers to protect themselves from recent nation-state cyberattacks. Retrieved December 17, 2020.
Internal MISP references
UUID 33e84eb1-4835-404b-8c1a-40695c04cdb4
which can be used as unique global reference for Microsoft SolarWinds Steps
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-12-17T00:00:00Z |
date_published | 2020-12-13T00:00:00Z |
source | MITRE |
title | Important steps for customers to protect themselves from recent nation-state cyberattacks |
White House Imposing Costs RU Gov April 2021
White House. (2021, April 15). Imposing Costs for Harmful Foreign Activities by the Russian Government. Retrieved April 16, 2021.
Internal MISP references
UUID c2bf9e2f-cd0a-411d-84bc-61454a369c6b
which can be used as unique global reference for White House Imposing Costs RU Gov April 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2021-04-16T00:00:00Z |
date_published | 2021-04-15T00:00:00Z |
source | MITRE |
title | Imposing Costs for Harmful Foreign Activities by the Russian Government |
Malicious Driver Reporting Center
Azure Edge and Platform Security Team & Microsoft 365 Defender Research Team. (2021, December 8). Improve kernel security with the new Microsoft Vulnerable and Malicious Driver Reporting Center. Retrieved April 6, 2022.
Internal MISP references
UUID fde77ea9-2b4d-40d7-99c5-433bfdbcb994
which can be used as unique global reference for Malicious Driver Reporting Center
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-04-06T00:00:00Z |
date_published | 2021-12-08T00:00:00Z |
source | MITRE |
title | Improve kernel security with the new Microsoft Vulnerable and Malicious Driver Reporting Center |
Unit 42 Inception November 2018
Lancaster, T. (2018, November 5). Inception Attackers Target Europe with Year-old Office Vulnerability. Retrieved May 8, 2020.
Internal MISP references
UUID 5cb98fce-f386-4878-b69c-5c6440ad689c
which can be used as unique global reference for Unit 42 Inception November 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-05-08T00:00:00Z |
date_published | 2018-11-05T00:00:00Z |
source | MITRE, Tidal Cyber |
title | Inception Attackers Target Europe with Year-old Office Vulnerability |
Symantec Inception Framework March 2018
Symantec. (2018, March 14). Inception Framework: Alive and Well, and Hiding Behind Proxies. Retrieved May 8, 2020.
Internal MISP references
UUID 166f5c44-7d8c-45d5-8d9f-3b8bd21a2af3
which can be used as unique global reference for Symantec Inception Framework March 2018
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-05-08T00:00:00Z |
date_published | 2018-03-14T00:00:00Z |
source | MITRE, Tidal Cyber |
title | Inception Framework: Alive and Well, and Hiding Behind Proxies |
Expel AWS Attacker
Brian Bahtiarian, David Blanton, Britton Manahan and Kyle Pellett. (2022, April 5). Incident report: From CLI to console, chasing an attacker in AWS. Retrieved April 7, 2022.
Internal MISP references
UUID 089f6f4e-370c-49cb-a35c-c80be0fd39de
which can be used as unique global reference for Expel AWS Attacker
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2022-04-07T00:00:00Z |
date_published | 2022-04-05T00:00:00Z |
source | MITRE |
title | Incident report: From CLI to console, chasing an attacker in AWS |
Dark Reading Microsoft 365 Attacks 2021
Kelly Sheridan. (2021, August 5). Incident Responders Explore Microsoft 365 Attacks in the Wild. Retrieved March 17, 2023.
Internal MISP references
UUID f26d3aa4-6966-53c4-b9d1-848420377eae
which can be used as unique global reference for Dark Reading Microsoft 365 Attacks 2021
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-03-17T00:00:00Z |
date_published | 2021-08-05T00:00:00Z |
source | MITRE |
title | Incident Responders Explore Microsoft 365 Attacks in the Wild |
Cisco Talos Q2 Trends July 26 2023
Nicole Hoffman. (2023, July 26). Incident Response trends Q2 2023: Data theft extortion rises, while healthcare is still most-targeted vertical. Retrieved August 4, 2023.
Internal MISP references
UUID f5367abc-e776-41a0-b8e5-6dc60079c081
which can be used as unique global reference for Cisco Talos Q2 Trends July 26 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-08-04T00:00:00Z |
date_published | 2023-07-26T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Incident Response trends Q2 2023: Data theft extortion rises, while healthcare is still most-targeted vertical |
SentinelOne September 21 2023
SentinelOne. (2023, September 21). Inc. Ransom. Retrieved January 1, 2024.
Internal MISP references
UUID 7e793738-c132-47bf-90aa-1f0659564d16
which can be used as unique global reference for SentinelOne September 21 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-01-01T00:00:00Z |
date_published | 2023-09-21T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Inc. Ransom |
Bleeping Computer INC Ransomware March 2024
Toulas, B. (2024, March 27). INC Ransom threatens to leak 3TB of NHS Scotland stolen data. Retrieved June 5, 2024.
Internal MISP references
UUID fbfd6be8-acc7-5ed4-b2b7-9248c2c27682
which can be used as unique global reference for Bleeping Computer INC Ransomware March 2024
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2024-06-05T00:00:00Z |
date_published | 2024-03-27T00:00:00Z |
source | MITRE |
title | INC Ransom threatens to leak 3TB of NHS Scotland stolen data |
U.S. CISA Increased Truebot Activity July 6 2023
Cybersecurity and Infrastructure Security Agency. (2023, July 6). Increased Truebot Activity Infects U.S. and Canada Based Networks. Retrieved July 6, 2023.
Internal MISP references
UUID 6f9b8f72-c55f-4268-903e-1f8a82efa5bb
which can be used as unique global reference for U.S. CISA Increased Truebot Activity July 6 2023
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2023-07-06T00:00:00Z |
date_published | 2023-07-06T00:00:00Z |
owner | TidalCyberIan |
source | Tidal Cyber |
title | Increased Truebot Activity Infects U.S. and Canada Based Networks |
Increasing Linux kernel integrity
Boelen, M. (2015, October 7). Increase kernel integrity with disabled Linux kernel modules loading. Retrieved June 4, 2020.
Internal MISP references
UUID 23b12551-0bec-4f7d-8468-f372a8ba521b
which can be used as unique global reference for Increasing Linux kernel integrity
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2020-06-04T00:00:00Z |
date_published | 2015-10-07T00:00:00Z |
source | MITRE |
title | Increase kernel integrity with disabled Linux kernel modules loading |
TechNet Scheduling Priority
Microsoft. (2013, May 8). Increase scheduling priority. Retrieved December 18, 2017.
Internal MISP references
UUID b785ceda-fea9-4e96-87d8-38cfd1f8b5bd
which can be used as unique global reference for TechNet Scheduling Priority
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
date_accessed | 2017-12-18T00:00:00Z |
date_published | 2013-05-08T00:00:00Z |
source | MITRE |