Common Information
Type Value
Value
Ingress Tool Transfer - T1544
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may transfer tools or other files from an external system onto a compromised device to facilitate follow-on actions. Files may be copied from an external adversary-controlled system through the command and control channel or through alternate protocols with another tool such as FTP.
Details Published Attributes CTI Title
Details Website 2022-11-21 117 Aurora: a rising stealer flying under the radar
Details Website 2022-11-18 19 U.S. Federal Network Hacked – APT Hackers Compromised Domain Controller
Details Website 2022-11-16 32 Iranian Government-Sponsored APT Actors Compromise Federal Network, Deploy Crypto Miner, Credential Harvester | CISA
Details Website 2022-11-09 67 Emotet returns Targeting Users Worldwide
Details Website 2022-11-02 222 New Laplas Clipper Distributed via SmokeLoader
Details Website 2022-10-18 45 Anomali Cyber Watch: Ransom Cartel Uses DPAPI Dumping, Unknown China-Sponsored Group Targeted Telecommunications, Alchimist C2 Framework Targets Multiple Operating Systems, and More
Details Website 2022-10-14 52 Ransom Cartel Ransomware: A Possible Connection With REvil
Details Website 2022-10-14 55 Ransom Cartel Ransomware: A Possible Connection With REvil
Details Website 2022-10-14 39 Online File Converter Phishing Page Spreads RedLine Stealer
Details Website 2022-10-12 24 Anomali Cyber Watch: Emotet Added Two New Modules, LofyGang Distributed 200 Malicious Packages, Bumblebee Loader Expanded Its Reach, and More
Details Website 2022-10-07 36 CISA Alert AA22-277A - Impacket and CovalentStealer Used to Steal Sensitive Data
Details Website 2022-10-05 29 SafeBreach Coverage for US-CERT Alert (AA22-277A) – Use of Impacket and CovalentStealer to Steal Sensitive Data
Details Website 2022-10-04 34 Impacket and Exfiltration Tool Used to Steal Sensitive Information from Defense Industrial Base Organization | CISA
Details Website 2022-09-29 73 Malware Persistence Within ESXi Hypervisors | Malicious VIBs
Details Website 2022-09-27 21 Anomali Cyber Watch: Sandworm Uses HTML Smuggling and Commodity RATs, BlackCat Ransomware Adds New Features, Domain Shadowing Is Rarely Detected, and More
Details Website 2022-09-26 39 Return of Pseudo Ransomware
Details Website 2022-09-15 76 PrivateLoader: the loader of the prevalent ruzki PPI service
Details Website 2022-09-13 78 ProxyShell exploitation leads to BlackByte ransomware - Red Canary
Details Website 2022-09-12 19 What is Crypto Malware and How to Defend Against Cryptojacking? - SOC Prime
Details Website 2022-08-31 156 Ryuk Ransomware: History, Timeline, and Adversary Simulation - FourCore
Details Website 2022-08-30 34 Anomali Cyber Watch: First Real-Life Video-Spoofing Attack, MagicWeb Backdoors via Non-Standard Key Identifier, LockBit Ransomware Blames Victim for DDoSing Back, and More
Details Website 2022-08-18 181 APT41 World Tour 2021 on a tight schedule
Details Website 2022-08-17 100 UNC3890 | Suspected Iranian Threat Actor Targets Israel
Details Website 2022-08-17 100 Suspected Iranian Actor Targeting Israeli Shipping, Healthcare, Government and Energy Sectors | Mandiant
Details Website 2022-08-16 50 Anomali Cyber Watch: Ransomware Module Added to SOVA Android Trojan, Bitter APT Targets Mobile Phones with Dracarys, China-Sponsored TA428 Deploys Six Backdoors at Once, and More