Common Information
Type Value
Value
Connection Proxy - T1090
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description A connection proxy is used to direct network traffic between systems or act as an intermediary for network communications. Many tools exist that enable traffic redirection through proxies or port redirection, including HTRAN, ZXProxy, and ZXPortMap. (Citation: Trend Micro APT Attack Tools) The definition of a proxy can also be expanded out to encompass trust relationships between networks in peer-to-peer, mesh, or trusted connections between networks consisting of hosts or systems that regularly communicate with each other. The network may be within a single organization or across organizations with trust relationships. Adversaries could use these types of relationships to manage command and control communications, to reduce the number of simultaneous outbound network connections, to provide resiliency in the face of connection loss, or to ride over existing trusted communications paths between victims to avoid suspicion. Detection: Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. Network activities disassociated from user-driven actions from processes that normally require user direction are suspicious. Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server or between clients that should not or often do not communicate with one another). Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. Analyze packet contents to detect communications that do not follow the expected protocol behavior for the port that is being used. (Citation: University of Birmingham C2) Platforms: Linux, macOS, Windows Data Sources: Process use of network, Process monitoring, Netflow/Enclave netflow, Packet capture Requires Network: Yes Contributors: Walker Johnson
Details Published Attributes CTI Title
Details Website 2024-11-08 1 CVE Alert: CVE-2024-51504 - RedPacket Security
Details Website 2024-11-08 5 Cybersecurity News Review — Week 45
Details Website 2024-11-08 3 Malicious NPM Packages Target Roblox Users with Data-Stealing Malware
Details Website 2024-11-08 2 Stealthy Guardian Nmap Quest: Mastering Cybersecurity Reconnaissance
Details Website 2024-11-08 0 Try Hack Me THM: Secure Network Architecture
Details Website 2024-11-08 7 Cobalt Strike Beacon Detected - 54[.]251[.]109[.]230:80 - RedPacket Security
Details Website 2024-11-08 7 Cobalt Strike Beacon Detected - 1[.]94[.]254[.]25:8085 - RedPacket Security
Details Website 2024-11-08 9 Cobalt Strike Beacon Detected - 114[.]115[.]213[.]248:443 - RedPacket Security
Details Website 2024-11-08 3 Malicious NPM Packages Target Roblox Users with Data-Stealing Malware - RedPacket Security
Details Website 2024-11-08 7 Cobalt Strike Beacon Detected - 45[.]63[.]121[.]172:80 - RedPacket Security
Details Website 2024-11-08 71 Breaking Down Earth Estries Persistent TTPs in Prolonged Cyber Operations
Details Website 2024-11-07 1 Let's Look for Bad Stuff Using Censys' "Suspicious-Open-Directory" Label!
Details Website 2024-11-07 0 Zero-trust architecture with Microsoft
Details Website 2024-11-07 11 Analyzing Play and LockBit: The Top Ransomware Threats Facing Retailers
Details Website 2024-11-07 2 A look at the latest post-quantum signature standardization candidates
Details Website 2024-11-07 0 Best SOCKS5 Proxy for Carding: A Comprehensive Guide
Details Website 2024-11-07 7 Cobalt Strike Beacon Detected - 91[.]240[.]202[.]191:444 - RedPacket Security
Details Website 2024-11-07 6 Cobalt Strike Beacon Detected - 65[.]108[.]27[.]189:9089 - RedPacket Security
Details Website 2024-11-07 3 Cobalt Strike Beacon Detected - 45[.]144[.]136[.]86:81 - RedPacket Security
Details Website 2024-11-07 10 Cobalt Strike Beacon Detected - 34[.]232[.]187[.]165:443 - RedPacket Security
Details Website 2024-11-07 9 Cobalt Strike Beacon Detected - 119[.]3[.]218[.]60:8443 - RedPacket Security
Details Website 2024-11-07 0 Comprehensive Guide to Configuring SSL Decryption and Threat Prevention/Detection in Palo Alto…
Details Website 2024-11-07 3 Who is Tropic Trooper (APT23)?
Details Website 2024-11-07 14 Global Companies Are Unknowingly Paying North Koreans: Here’s How to Catch Them
Details Website 2024-11-07 0 Diving into OWASP ZAP