Common Information
Type Value
Value
Domains - T1583.001
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may acquire domains that can be used during targeting. Domain names are the human readable names used to represent one or more IP addresses. They can be purchased or, in some cases, acquired for free. Adversaries may use acquired domains for a variety of purposes, including for [Phishing](https://attack.mitre.org/techniques/T1566), [Drive-by Compromise](https://attack.mitre.org/techniques/T1189), and Command and Control.(Citation: CISA MSS Sep 2020) Adversaries may choose domains that are similar to legitimate domains, including through use of homoglyphs or use of a different top-level domain (TLD).(Citation: FireEye APT28)(Citation: PaypalScam) Typosquatting may be used to aid in delivery of payloads via [Drive-by Compromise](https://attack.mitre.org/techniques/T1189). Adversaries may also use internationalized domain names (IDNs) and different character sets (e.g. Cyrillic, Greek, etc.) to execute "IDN homograph attacks," creating visually similar lookalike domains used to deliver malware to victim machines.(Citation: CISA IDN ST05-016)(Citation: tt_httrack_fake_domains)(Citation: tt_obliqueRAT)(Citation: httrack_unhcr)(Citation: lazgroup_idn_phishing) Different URIs/URLs may also be dynamically generated to uniquely serve malicious content to victims (including one-time, single use domain names).(Citation: iOS URL Scheme)(Citation: URI)(Citation: URI Use)(Citation: URI Unique) Adversaries may also acquire and repurpose expired domains, which may be potentially already allowlisted/trusted by defenders based on an existing reputation/history.(Citation: Categorisation_not_boundary)(Citation: Domain_Steal_CC)(Citation: Redirectors_Domain_Fronting)(Citation: bypass_webproxy_filtering) Domain registrars each maintain a publicly viewable database that displays contact information for every registered domain. Private WHOIS services display alternative information, such as their own company data, rather than the owner of the domain. Adversaries may use such private WHOIS services to obscure information about who owns a purchased domain. Adversaries may further interrupt efforts to track their infrastructure by using varied registration information and purchasing domains with different domain registrars.(Citation: Mandiant APT1)
Details Published Attributes CTI Title
Details Website 2019-08-05 25 REvil / Sodinokibi: The Crown Prince of Ransomware
Details Website 2019-08-02 559 Threat Roundup for July 26 to Aug. 2
Details Website 2019-08-02 34 SystemBC is like Christmas in July for SOCKS5 Malware and Exploit Kits | Proofpoint US
Details Website 2019-08-01 29 LookBack Malware Targets the United States Utilities Sector with Phishing Attacks Impersonating Engineering Licensing Boards | Proofpoint US
Details Website 2019-08-01 105 Rocke'in the NetFlow
Details Website 2019-08-01 11 APT trends report Q2 2019
Details Website 2019-07-31 18 Cobalt Group Returns To Kazakhstan - Check Point Research
Details Website 2019-07-31 73 Malvertising: Online advertising's darker side
Details Website 2019-07-29 2 Cryptographic Attacks: A Guide for the Perplexed - Check Point Research
Details Website 2019-07-26 7 Examining the Link Between TLD Prices and Abuse | McAfee Blog
Details Website 2019-07-26 607 Threat Roundup for July 19 to July 26
Details Website 2019-07-24 47 Chinese APT “Operation LagTime IT” Targets Government Information Technology Agencies in Eastern Asia | Proofpoint US
Details Website 2019-07-24 110 Updated Karagany Malware Targets Energy Sector
Details Website 2019-07-23 0 SOCs vs. AFCs: What’s the Difference?
Details Website 2019-07-23 12 Multistage Attack Delivers BillGates/Setag Backdoor
Details Website 2019-07-19 557 Threat Roundup for July 12 to July 19
Details Website 2019-07-17 1 EvilGnome: A New Backdoor Implant Spies On Linux Desktop Users
Details Website 2019-07-17 17 EvilGnome: Rare Malware Spying on Desktop Users - Intezer
Details Website 2019-07-17 48 Server-side polymorphism & PowerShell backdoors
Details Website 2019-07-17 14 Remove the ExtenBro DNS Changing Trojan
Details Website 2019-07-15 30 Turla renews its arsenal with Topinambour
Details Website 2019-07-11 12 ‘Oto Gonderici’ Excel formula injections target Turkish victims
Details Website 2019-07-11 0 Magecart Hackers Infect 17,000 Sites Through Misconfigured Amazon S3 Buckets
Details Website 2019-07-11 0 Hack Brief: A Card-Skimming Hacker Group Hit 17K Domains—and Counting
Details Website 2019-07-11 6 Cortex 3.1.7 released: Powerful Observable Analysis Engine