Common Information
Type Value
Value
Tool - T1588.002
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may buy, steal, or download software tools that can be used during targeting. Tools can be open or closed source, free or commercial. A tool can be used for malicious purposes by an adversary, but (unlike malware) were not intended to be used for those purposes (ex: [PsExec](https://attack.mitre.org/software/S0029)). Tool acquisition can involve the procurement of commercial software licenses, including for red teaming tools such as [Cobalt Strike](https://attack.mitre.org/software/S0154). Commercial software may be obtained through purchase, stealing licenses (or licensed copies of the software), or cracking trial versions.(Citation: Recorded Future Beacon 2019) Adversaries may obtain tools to support their operations, including to support execution of post-compromise behaviors. In addition to freely downloading or purchasing software, adversaries may steal software and/or software licenses from third-party entities (including other adversaries).
Details Published Attributes CTI Title
Details Website 2574-01-02 0 Editors Picks, Apps We Recommend | TechSpot
Details Website 2070-01-03 13 越狱 Llama-3.1-8B-Instruct | CTF导航
Details Website 2028-02-03 0 Zemana Anti Malware: Best Premium & Free Malware Removal Software
Details Website 2024-12-29 2 Cobalt Strike DFIR: Listening to the Pipes — Blake's R&D
Details Website 2024-12-06 8 Qilin Ransomware malware analysis — ShadowStackRE
Details Website 2024-12-03 120 Malvertisment campaigns: Uncovering more IoCs from the recent Windows Defender fraud — Silent Push Threat Intelligence
Details Website 2024-12-03 48 Privacy tools (not) for you — Silent Push Threat Intelligence
Details Website 2024-11-16 0 Introduction to Dharma - Part 1 — Haboob
Details Website 2024-11-14 0 Is Private Browsing 100% Private? Uncover the Truth!
Details Website 2024-11-14 0 What is Safe Browsing Tools?: Enhance Your Online Security
Details Website 2024-11-14 0 How Do I Secure Browsing in Chrome?: Ultimate Guide
Details Website 2024-11-14 7 Preventing Vulnerabilities on SQL Injection (SQLi)in React.js: A Comprehensive Guide
Details Website 2024-11-14 3 Understanding HTTPS Downgrade Attacks: A Guide to Intercepting Data with BetterCAP
Details Website 2024-11-14 6 Unsupervised Machine Learning: The Frontier of Fraud Detection
Details Website 2024-11-14 0 What is a Website Waiting Room?
Details Website 2024-11-14 0 The Wild World of Cybersecurity in 2024: What You Need to Know
Details Website 2024-11-14 0 The Dark Side of Google Searches: How Simple keywords can Lead to Cyber Threats - Cybersecurity Insiders
Details Website 2024-11-14 0 AI for Advancing Cybersecurity
Details Website 2024-11-14 0 Unlocking Cyber Secrets: Configurations Every Hacker Should Know
Details Website 2024-11-14 0 Bitdefender released a decryptor for the ShrinkLocker ransomware | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-14 0 ShrinkLocker ransomware decryptor now available • The Register | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-14 1 Online Sale For High-speed VPN
Details Website 2024-11-14 0 Bitdefender released a decryptor for the ShrinkLocker ransomware
Details Website 2024-11-14 12 ETW Forensics - Why use Event Tracing for Windows over EventLog? - - JPCERT/CC Eyes
Details Website 2024-11-13 0 🚨 New Tool to Recover BitLocker Passwords from ShrinkLocker Ransomware🚨