Common Information
Type Value
Value
User Execution
Category Attack-Pattern
Type Mitre-Ics-Techniques
Misp Type Cluster
Description Adversaries may rely on a targeted organizations’ user interaction for the execution of malicious code. User interaction may consist of installing applications, opening email attachments, or granting higher permissions to documents. Adversaries may embed malicious code or visual basic code into files such as Microsoft Word and Excel documents or software installers. Execution of this code requires that the user enable scripting or write access within the document. Embedded code may not always be noticeable to the user especially in cases of trojanized software
Details Published Attributes CTI Title
Details Website 2023-03-01 70 Multi-Year Spearphishing Campaign Targets the Maritime Industry Likely for Financial Gain 
Details Website 2023-02-28 44 CISA Red Team Shares Key Findings to Improve Monitoring and Hardening of Networks | CISA
Details Website 2023-02-28 0 Hackers Attack Employees from Six Law Firms with the GootLoader and…
Details Website 2023-02-28 16 Aligning Falco’s Cloudtrail Rules with MITRE ATT&CK – Sysdig
Details Website 2023-02-28 56 Anomali Cyber Watch: Newly-Discovered WinorDLL64 Backdoor Has Code Similarities with Lazarus GhostSecret, Atharvan Backdoor Can Be Restricted to Communicate on Certain Days
Details Website 2023-02-27 76 Lumma Stealer targets YouTubers via Spear-phishing Email
Details Website 2023-02-24 41 New WhiteSnake Stealer Offered for Sale Via MaaS Model
Details Website 2023-02-23 27 Mustang Panda APT Group Uses European Commission-Themed Lure to Deliver PlugX Malware
Details Website 2023-02-20 31 Decoding the Inner Workings of DarkCloud Stealer
Details Website 2023-02-17 4 ProxyShellMiner Detection: Novel Crypto-Mining Attacks Abusing CVE-2021-34473 and CVE-2021-34523 ProxyShell Vulnerabilities in Windows Exchange Servers  - SOC Prime
Details Website 2023-02-17 49 The Many Faces of Qakbot Malware: A Look at Its Diverse Distribution Methods
Details Website 2023-02-15 8 Uncovering The Dark Side of DarkBit Ransomware
Details Website 2023-02-08 21 Earth Zhulong Familiar Patterns Target Southeast Asian Firms
Details Website 2023-02-06 19 Massive Ransomware Attack Targets VMware ESXi Servers
Details Website 2023-02-02 37 New BATLoader Disseminates RATs and Stealers
Details Website 2023-02-01 23 Qakbot's Evolution Continues with New Strategies
Details Website 2023-02-01 37 Vector Stealer: A Gateway for RDP Hijacking
Details Website 2023-01-31 29 Anomali Cyber Watch: KilllSomeOne Folders Invisible in Windows, Everything APIs Abuse Speeds Up Ransomware,  APT38 Experiments with Delivery Vectors and Backdoors
Details Website 2023-01-26 14 Quarterly Report: Incident Response Trends in Q4 2022
Details Website 2023-01-26 33 Ransomware Spotlight: Magniber - Security News
Details Website 2023-01-25 45 Titan Stealer: The Growing Use of GoLang Among Threat Actors
Details Website 2023-01-25 41 The Rise of Amadey Bot: A Growing Concern for Internet Security
Details Website 2023-01-24 16 Anomali Cyber Watch: Roaming Mantis Changes DNS on Wi-Fi Routers, Hook Android Banking Trojan Has Device Take-Over Capabilities, Ke3chang Targeted Iran with Updated Turian Backdoor
Details Website 2023-01-23 63 Black Basta – Technical Analysis | Kroll
Details Website 2023-01-17 43 QakBot Malware Used Unpatched Vulnerability to Bypass Windows OS Security Feature