Common Information
Type | Value |
---|---|
Value |
Malware - T1588.001 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may buy, steal, or download malware that can be used during targeting. Malicious software can include payloads, droppers, post-compromise tools, backdoors, packers, and C2 protocols. Adversaries may acquire malware to support their operations, obtaining a means for maintaining control of remote machines, evading defenses, and executing post-compromise behaviors. In addition to downloading free malware from the internet, adversaries may purchase these capabilities from third-party entities. Third-party entities can include technology companies that specialize in malware development, criminal marketplaces (including Malware-as-a-Service, or MaaS), or from individuals. In addition to purchasing malware, adversaries may steal and repurpose malware from third-party entities (including other adversaries). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2754-08-03 | 37 | Virus Bulletin :: VB2018 paper: Unpacking the packed unpacker: reversing an Android anti-analysis native library | ||
Details | Website | 2574-01-02 | 0 | Editors Picks, Apps We Recommend | TechSpot | ||
Details | Website | 2061-05-15 | 4 | Flash Notice: Critical Linux Kernel Vulnerability Can Lead to Remote Code Execution | ||
Details | Website | 2050-08-03 | 29 | Kiddoware Kids Place Parental Control Android App 3.8.49 XSS / CSRF / File Upload - CXSecurity.com | ||
Details | Website | 2044-04-01 | 13 | Attackers Repurposing existing Python-based Malware for Distribution on NPM | ||
Details | Website | 2035-08-05 | 23 | Inside Jahoo (Otlard.A ?) - A spam Botnet | ||
Details | Website | 2035-01-01 | 216 | UNKNOWN | ||
Details | Website | 2030-03-02 | 20 | APT QUARTERLY HIGHLIGHTS - Q3 : 2023 - CYFIRMA | ||
Details | Website | 2028-10-24 | 0 | MIT Technology Review Insights Survey on Zero Trust in Cybersecurity | ||
Details | Website | 2028-02-03 | 0 | Zemana Anti Malware: Best Premium & Free Malware Removal Software | ||
Details | Website | 2025-11-07 | 1 | Vault7 - Home | ||
Details | Website | 2025-09-05 | 0 | New LevelBlue Threat Trends Report gives critical insights… | ||
Details | Website | 2025-09-01 | 0 | How ThreatConnect and Polarity Empower Teams to Combat Phishing Threats | ThreatConnect | ||
Details | Website | 2025-07-02 | 13 | Inside a Malware Campaign: A Nigerian Hacker’s Perspective – CyberArmor | ||
Details | Website | 2025-04-05 | 15 | Shellcode Encoded in UUIDs - SANS Internet Storm Center | ||
Details | Website | 2025-04-05 | 22 | Python Bot Delivered Through DLL Side-Loading - SANS Internet Storm Center | ||
Details | Website | 2025-03-24 | 5 | FBI warnings are true—fake file converters do push malware - PRSOL:CC | ||
Details | Website | 2025-03-24 | 1 | Oracle Sale Claims Found on Hacker Forums, Crypto Wallet Service, and Empik Data Leak - SOCRadar® Cyber Intelligence Inc. | ||
Details | Website | 2025-03-24 | 3 | Oracle Sale Claims Found on Hacker Forums, Crypto Wallet Service, and Empik Data Leak | ||
Details | Website | 2025-03-24 | 2 | SvcStealer Malware Strikes, Harvesting Sensitive Data from Browsers and Applications | ||
Details | Website | 2025-03-24 | 0 | A week in security (March 17 – March 23) | ||
Details | Website | 2025-03-24 | 4 | HackTool:Win64/GameHack!rfn – Easy Malware Removal Guide | ||
Details | Website | 2025-03-24 | 0 | Weaver Ant, the Web Shell Whisperer: Tracking a Live China-nexus Operation | ||
Details | Website | 2025-03-24 | 0 | Sygnia Discovers New Active China-Nexus Threat Actor Weaver Ant | ||
Details | Website | 2025-03-24 | 0 | A week in security (March 17 - March 23) |