Common Information
Type | Value |
---|---|
Value |
Tool - T1588.002 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may buy, steal, or download software tools that can be used during targeting. Tools can be open or closed source, free or commercial. A tool can be used for malicious purposes by an adversary, but (unlike malware) were not intended to be used for those purposes (ex: [PsExec](https://attack.mitre.org/software/S0029)). Tool acquisition can involve the procurement of commercial software licenses, including for red teaming tools such as [Cobalt Strike](https://attack.mitre.org/software/S0154). Commercial software may be obtained through purchase, stealing licenses (or licensed copies of the software), or cracking trial versions.(Citation: Recorded Future Beacon 2019) Adversaries may obtain tools to support their operations, including to support execution of post-compromise behaviors. In addition to freely downloading or purchasing software, adversaries may steal software and/or software licenses from third-party entities (including other adversaries). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2574-01-02 | 0 | Editors Picks, Apps We Recommend | TechSpot | ||
Details | Website | 2070-01-03 | 13 | 越狱 Llama-3.1-8B-Instruct | CTF导航 | ||
Details | Website | 2028-02-03 | 0 | Zemana Anti Malware: Best Premium & Free Malware Removal Software | ||
Details | Website | 2024-12-29 | 2 | Cobalt Strike DFIR: Listening to the Pipes — Blake's R&D | ||
Details | Website | 2024-12-06 | 8 | Qilin Ransomware malware analysis — ShadowStackRE | ||
Details | Website | 2024-12-03 | 120 | Malvertisment campaigns: Uncovering more IoCs from the recent Windows Defender fraud — Silent Push Threat Intelligence | ||
Details | Website | 2024-12-03 | 48 | Privacy tools (not) for you — Silent Push Threat Intelligence | ||
Details | Website | 2024-11-16 | 0 | Introduction to Dharma - Part 1 — Haboob | ||
Details | Website | 2024-11-14 | 0 | Is Private Browsing 100% Private? Uncover the Truth! | ||
Details | Website | 2024-11-14 | 0 | What is Safe Browsing Tools?: Enhance Your Online Security | ||
Details | Website | 2024-11-14 | 0 | How Do I Secure Browsing in Chrome?: Ultimate Guide | ||
Details | Website | 2024-11-14 | 7 | Preventing Vulnerabilities on SQL Injection (SQLi)in React.js: A Comprehensive Guide | ||
Details | Website | 2024-11-14 | 3 | Understanding HTTPS Downgrade Attacks: A Guide to Intercepting Data with BetterCAP | ||
Details | Website | 2024-11-14 | 6 | Unsupervised Machine Learning: The Frontier of Fraud Detection | ||
Details | Website | 2024-11-14 | 0 | What is a Website Waiting Room? | ||
Details | Website | 2024-11-14 | 0 | The Wild World of Cybersecurity in 2024: What You Need to Know | ||
Details | Website | 2024-11-14 | 0 | The Dark Side of Google Searches: How Simple keywords can Lead to Cyber Threats - Cybersecurity Insiders | ||
Details | Website | 2024-11-14 | 0 | AI for Advancing Cybersecurity | ||
Details | Website | 2024-11-14 | 0 | Unlocking Cyber Secrets: Configurations Every Hacker Should Know | ||
Details | Website | 2024-11-14 | 0 | Bitdefender released a decryptor for the ShrinkLocker ransomware | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-11-14 | 0 | ShrinkLocker ransomware decryptor now available • The Register | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-11-14 | 1 | Online Sale For High-speed VPN | ||
Details | Website | 2024-11-14 | 0 | Bitdefender released a decryptor for the ShrinkLocker ransomware | ||
Details | Website | 2024-11-14 | 12 | ETW Forensics - Why use Event Tracing for Windows over EventLog? - - JPCERT/CC Eyes | ||
Details | Website | 2024-11-13 | 0 | 🚨 New Tool to Recover BitLocker Passwords from ShrinkLocker Ransomware🚨 |