Common Information
Type | Value |
---|---|
Value |
Create Account - T1136 |
Category | Attack-Pattern |
Type | Mitre-Enterprise-Attack-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries with a sufficient level of access may create a local system or domain account. Such accounts may be used for persistence that do not require persistent remote access tools to be deployed on the system. The <code>net user</code> commands can be used to create a local or domain account. Detection: Collect data on account creation within a network. Event ID 4720 is generated when a user account is created on a Windows system and domain controller. (Citation: Microsoft User Creation Event) Perform regular audits of domain and local system accounts to detect suspicious accounts that may have been created by an adversary. Platforms: Linux, macOS, Windows Data Sources: Process Monitoring, Process command-line parameters, Authentication logs, Windows event logs Permissions Required: Administrator |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-08-21 | 30 | Linux Detection Engineering - A primer on persistence mechanisms — Elastic Security Labs | ||
Details | Website | 2024-08-19 | 20 | PG_MEM: A Malware Hidden in the Postgres Processes | ||
Details | Website | 2024-08-12 | 27 | You Don't Know the HAFNIUM of it... | ||
Details | Website | 2024-07-02 | 5 | Pentesting results for 2023 | ||
Details | Website | 2024-06-19 | 115 | Akira - The old-new style crime | ||
Details | Website | 2024-06-13 | 9 | Introducing YetiHunter: An open-source tool to detect and hunt for suspicious activity in Snowflake | ||
Details | Website | 2024-06-04 | 56 | Lost in the Fog: A New Ransomware Threat - Arctic Wolf | ||
Details | Website | 2024-02-23 | 85 | SlashAndGrab: ScreenConnect Post-Exploitation in the Wild (CVE-2024-1709 & CVE-2024-1708) | Huntress | ||
Details | Website | 2024-01-19 | 17 | Tales from the cloud trenches: Amazon ECS is the new EC2 for crypto mining | Datadog Security Labs | ||
Details | Website | 2023-12-06 | 198 | Russia/Ukraine Update - December 2023 | ||
Details | Website | 2023-11-28 | 81 | Aki-RATs - Command and Control Party | ||
Details | Website | 2023-11-20 | 4 | How to use multiple instances of AWS IAM Identity Center | Amazon Web Services | ||
Details | Website | 2023-11-13 | 78 | Don’t throw a hissy fit; defend against Medusa | ||
Details | Website | 2023-10-31 | 72 | Unveiling the Dark Side: A Deep Dive into Active Ransomware Families | ||
Details | Website | 2023-10-23 | 273 | Red Team Tools | ||
Details | Website | 2023-09-15 | 110 | Securonix Threat Labs Security Advisory: Threat Actors Target MSSQL Servers in DB#JAMMER to Deliver FreeWorld Ransomware | ||
Details | Website | 2023-09-15 | 816 | UNC3944: SMS Phishing, SIM Swapping, and Ransomware Attacks | ||
Details | Website | 2023-09-04 | 41 | New Attack Vector In The Cloud: Attackers caught exploiting Object Storage Services | ||
Details | Website | 2023-08-25 | 195 | Russia/Ukraine Update - August 2023 | ||
Details | Website | 2023-08-10 | 0 | ASCWG 2023 Quals Reverse Engineering Challenges | ||
Details | Website | 2023-07-28 | 10 | Geographic Restrictions via Nginx & MaxmindDB — July 2023 | ||
Details | Website | 2023-07-27 | 117 | Healthcare Threat Landscape 2022-2023: Common TTPs Used by Top Ransomware Groups Targeting the Healthcare Sector | ||
Details | Website | 2023-07-25 | 6 | APT Profile: Kimsuky - SOCRadar® Cyber Intelligence Inc. | ||
Details | Website | 2023-07-25 | 7 | UNKNOWN | ||
Details | Website | 2023-07-21 | 4 | This Week in Cybersecurity: July 17th-21st |