Common Information
Type Value
Value
Domains - T1583.001
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may acquire domains that can be used during targeting. Domain names are the human readable names used to represent one or more IP addresses. They can be purchased or, in some cases, acquired for free. Adversaries may use acquired domains for a variety of purposes, including for [Phishing](https://attack.mitre.org/techniques/T1566), [Drive-by Compromise](https://attack.mitre.org/techniques/T1189), and Command and Control.(Citation: CISA MSS Sep 2020) Adversaries may choose domains that are similar to legitimate domains, including through use of homoglyphs or use of a different top-level domain (TLD).(Citation: FireEye APT28)(Citation: PaypalScam) Typosquatting may be used to aid in delivery of payloads via [Drive-by Compromise](https://attack.mitre.org/techniques/T1189). Adversaries may also use internationalized domain names (IDNs) and different character sets (e.g. Cyrillic, Greek, etc.) to execute "IDN homograph attacks," creating visually similar lookalike domains used to deliver malware to victim machines.(Citation: CISA IDN ST05-016)(Citation: tt_httrack_fake_domains)(Citation: tt_obliqueRAT)(Citation: httrack_unhcr)(Citation: lazgroup_idn_phishing) Different URIs/URLs may also be dynamically generated to uniquely serve malicious content to victims (including one-time, single use domain names).(Citation: iOS URL Scheme)(Citation: URI)(Citation: URI Use)(Citation: URI Unique) Adversaries may also acquire and repurpose expired domains, which may be potentially already allowlisted/trusted by defenders based on an existing reputation/history.(Citation: Categorisation_not_boundary)(Citation: Domain_Steal_CC)(Citation: Redirectors_Domain_Fronting)(Citation: bypass_webproxy_filtering) Domain registrars each maintain a publicly viewable database that displays contact information for every registered domain. Private WHOIS services display alternative information, such as their own company data, rather than the owner of the domain. Adversaries may use such private WHOIS services to obscure information about who owns a purchased domain. Adversaries may further interrupt efforts to track their infrastructure by using varied registration information and purchasing domains with different domain registrars.(Citation: Mandiant APT1)
Details Published Attributes CTI Title
Details Website 2017-10-01 26 Resurgence of the Feodo banking Trojan on a government network | Darktrace Blog
Details Website 2017-09-29 19 Following the trail: what we know about the hacker behind the EtherDelta attack
Details Website 2017-09-29 33 Ramnit – in-depth analysis
Details Website 2017-09-29 0 Understanding Mobile Habits of Millennials with Better Data | NETSCOUT
Details Website 2017-09-28 48 Banking Trojan Attempts To Steal Brazillion$
Details Website 2017-09-28 152 Threat Actors Target Government of Belarus Using CMSTAR Trojan
Details Website 2017-09-27 0 How Secure is Your SD-WAN?
Details Website 2017-09-27 0 Being Certain about Estimative Uncertainty
Details Website 2017-09-26 9 RIG exploit kit returns, with modified pattern and free generated “freenom” domains
Details Website 2017-09-26 48 Striking Oil: A Closer Look at Adversary Infrastructure
Details Website 2017-09-26 0 Airline companies "landing" on fake pages
Details Website 2017-09-25 0 Meet Gatebot - a bot that allows us to sleep
Details Website 2017-09-24 2 Russian hackers exploited a Google flaw to hack journalists
Details Website 2017-09-22 17
Details Website 2017-09-21 12 Rig EK via Rulan drops an Infostealer
Details Website 2017-09-21 0 CLKSCREW: Exposing the perils of security-oblivious energy management | the morning paper
Details Website 2017-09-20 3 Certifications: Preparing for and passing CISSP! - Syspanda
Details Website 2017-09-20 21 CCleaner Command and Control Causes Concern
Details Website 2017-09-20 57 APT33 Targets Aerospace & Energy Sectors | Spear Phishing
Details Website 2017-09-20 4 The Formidable FormBook Form Grabber | NETSCOUT
Details Website 2017-09-19 2 First Chrome extension with JavaScript Crypto Miner detected - gHacks Tech News
Details Website 2017-09-19 19 "Wake" malware has been updated.
Details Website 2017-09-18 4 Equifax Breach Response Turns Dumpster Fire – Krebs on Security
Details Website 2017-09-18 21 CCleanup: A Vast Number of Machines at Risk
Details Website 2017-09-18 0 Prepare Now for General Data Protection Regulation or Be Ready to Pay Fines