Common Information
Type | Value |
---|---|
Value |
Process Injection - T1631 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may inject code into processes in order to evade process-based defenses or even elevate privileges. Process injection is a method of executing arbitrary code in the address space of a separate live process. Running code in the context of another process may allow access to the process's memory, system/network resources, and possibly elevated privileges. Execution via process injection may also evade detection from security products since the execution is masked under a legitimate process. Both Android and iOS have no legitimate way to achieve process injection. The only way this is possible is by abusing existing root access or exploiting a vulnerability. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2025-03-20 | 13 | Fake CAPTCHA PDFs Spread Lumma Stealer via Webflow, GoDaddy, and Other Domains: A Deep Dive into the Campaign - CyberSRC | ||
Details | Website | 2025-03-20 | 8 | Leaking Passwords | ||
Details | Website | 2025-03-19 | 37 | Emulating the Sophisticated Chinese Adversary Salt Typhoon | ||
Details | Website | 2025-03-18 | 5 | Cobalt Strike 4.11 Released with Built-In Evasion Features for Red Teams | ||
Details | Website | 2025-03-18 | 75 | Operation AkaiRyū: MirrorFace invites Europe to Expo 2025 and revives ANEL backdoor | ||
Details | Website | 2025-03-17 | 35 | What Is The New Steganographic Campaign Distributing Multiple Malware | ||
Details | Website | 2025-03-17 | 31 | New Steganographic Campaign Distributing Multiple Malware Variants | ||
Details | Website | 2025-03-13 | 3 | Red Report 2025: Unmasking a 3X Spike in Credential Theft and Debunking the AI Hype | ||
Details | Website | 2025-03-12 | 48 | Ghost in the Router: China-Nexus Espionage Actor UNC3886 Targets Juniper Routers | ||
Details | Website | 2025-03-12 | 3 | Chinese Hackers Implant Backdoor Malware on Juniper Routers | ||
Details | Website | 2025-03-12 | 23 | Ghost in the Router: China-Nexus Espionage Actor UNC3886 Targets Juniper Routers | Google Cloud Blog | ||
Details | Website | 2025-03-11 | 1 | MITRE ATT&CK T1055.015 Process Injection: ListPlanting | ||
Details | Website | 2025-03-10 | 3 | Ragnar Loader Used by Multiple Ransomware Groups to Bypass Detection | ||
Details | Website | 2025-03-10 | 1 | MITRE ATT&CK T1055.014 Process Injection: VDSO Hijacking | ||
Details | Website | 2025-03-08 | 12 | Threat Campaign Alert: EByte Ransomware — A New Threat Utilizing ChaCha20 and ECIES Encryption… | ||
Details | Website | 2025-03-07 | 0 | The Ultimate 2025 Guide to Securing a Job in Red Teaming 👨💻. | ||
Details | Website | 2025-03-07 | 0 | Cybercriminals Impersonate DeepSeek to Spread Malware, Targeting Chinese Users | ||
Details | Website | 2025-03-07 | 11 | MITRE ATT&CK T1055.013 Process Injection: Process Doppelgänging | ||
Details | Website | 2025-03-06 | 12 | Ghostly Hollowing — probably the most bizarre Windows process injection technique I know | ||
Details | Website | 2025-03-06 | 4 | MITRE ATT&CK T1055.005 Process Injection: Thread Local Storage | ||
Details | Website | 2025-03-06 | 71 | Malvertising campaign leads to info stealers hosted on GitHub | Microsoft Security Blog | ||
Details | Website | 2025-03-05 | 3 | We’re losing — but it can’t get any worse, right? | ||
Details | Website | 2025-03-05 | 8 | Defend Your Enterprise Against the Infostealer Epidemic | ||
Details | Website | 2025-03-05 | 134 | Satori Threat Intelligence Disruption: BADBOX 2.0 Targets Consumer Devices with Multiple Fraud Schemes - HUMAN Security | ||
Details | Website | 2025-03-05 | 7 | MITRE ATT&CK T1055.003 Process Injection: Thread Execution Hijacking |