Common Information
Type | Value |
---|---|
Value |
T1077 |
Category | |
Type | Mitre Att&Ck Techniques |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2022-06-07 | 21 | Behind the Scenes of an Active Breach | Red Canary | ||
Details | Website | 2021-03-16 | 92 | 日本の製造業を狙うTickグループ - セキュリティ事業 - マクニカ | ||
Details | Website | 2020-12-03 | 37 | Persist, Brick, Profit -TrickBot Offers New “TrickBoot” UEFI-Focused Functionality | ||
Details | Website | 2020-09-28 | 12 | Detecting Lateral Movement Using Sysmon and Splunk | ||
Details | Website | 2020-09-23 | 26 | Your best defense against ransomware: Find the early warning signs - Help Net Security | ||
Details | 2020-08-04 | 67 | Operation Chimera - APT Operation Targets Semiconductor Vendors | |||
Details | Website | 2020-07-22 | 51 | Enter the Maze: Demystifying an Affiliate Involved in Maze (SNOW) - SentinelLabs | ||
Details | 2020-05-07 | 111 | Tropic Trooper’s Back: USBferry Attack Targets Air-gapped Environments | |||
Details | 2020-02-21 | 224 | 2019 Annual Security Roundup: The Sprawling Reach of Complex Threats | |||
Details | Website | 2020-02-20 | 6 | CSI: Evidence Indicators for Targeted Ransomware Attacks - Part II | McAfee Blog | ||
Details | 2019-12-05 | 259 | Operation ENDTRADE: TICK’s Multi-Stage Backdoors for Attacking Industries and Stealing Classified Data | |||
Details | 2019-11-29 | 259 | Operation ENDTRADE: TICK’s Multi-Stage Backdoors for Attacking Industries and Stealing Classified Data | |||
Details | Website | 2019-11-12 | 16 | Hunting for Attacker’s Tactics and Techniques With Prefetch Files | ||
Details | Website | 2019-10-17 | 37 | Operation Ghost: The Dukes aren’t back – they never left | WeLiveSecurity | ||
Details | 2019-10-09 | 231 | OPERATION GHOST | |||
Details | Website | 2019-04-02 | 65 | Triple Threat: Emotet Deploys TrickBot to Steal Data & Spread Ryuk | ||
Details | — | 74 | ProblemChild |