Common Information
Type Value
Value
User Execution - T1204
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description An adversary may rely upon specific actions by a user in order to gain execution. This may be direct code execution, such as when a user opens a malicious executable delivered via Spearphishing Attachment with the icon and apparent extension of a document file. It also may lead to other execution techniques, such as when a user clicks on a link delivered via Spearphishing Link that leads to exploitation of a browser or application vulnerability via Exploitation for Client Execution. While User Execution frequently occurs shortly after Initial Access it may occur at other phases of an intrusion, such as when an adversary places a file in a shared directory or on a user's desktop hoping that a user will click on it. Detection: Monitor the execution of and command-line arguments for applications that may be used by an adversary to gain Initial Access that require user interaction. This includes compression applications, such as those for zip files, that can be used to Deobfuscate/Decode Files or Information in payloads. Anti-virus can potentially detect malicious documents and files that are downloaded and execuited on the user's computer. Endpoint sensing or network sensing can potentially detect malicious events once the file is opened (such as a Microsoft Word document or PDF reaching out to the internet or spawning Powershell.exe) for techniques such as Exploitation for Client Execution and Scripting. Platforms: Linux, Windows, macOS Data Sources: Anti-virus, Process command-line parameters, Process monitoring Permissions Required: User
Details Published Attributes CTI Title
Details Website 2023-07-20 59 Common TTPs of attacks against industrial organizations. Implants for remote access | Kaspersky ICS CERT
Details Website 2023-07-18 1031 US-CERT Vulnerability Summary for the Week of July 10, 2023 - RedPacket Security
Details Website 2023-07-17 1031 Vulnerability Summary for the Week of July 10, 2023 | CISA
Details Website 2023-07-13 25 Trojanized Application Preying on TeamViewer Users
Details Website 2023-07-12 13 Unraveling the Illusion of Trust: The Innovative Attack Methodology Leveraging the "search-ms" URI Protocol Handler
Details Website 2023-07-06 239 Increased Truebot Activity Infects U.S. and Canada Based Networks | CISA
Details Website 2023-07-06 69 ARCrypt Ransomware Evolves with Multiple TOR Communication Channels
Details Website 2023-07-05 15 Underground Team Ransomware Demands Nearly $3 Million
Details Website 2023-06-28 8 Akira Ransomware Extends Reach to Linux Platform
Details Website 2023-06-27 42 Behind the Scenes of a Phishing Attack: How DMARC Protects Against Phishing and Spoofing Threats
Details Website 2023-06-27 14 Unveiling Wagner Group's Cyber-Recruitment
Details Website 2023-06-23 100 Securonix Threat Labs Security Advisory: New MULTI#STORM Attack Campaign Involving Python-based Loader Masquerading as OneDrive Utilities Dropping Multiple RAT Payloads Using Security Analytics
Details Website 2023-06-22 809 US-CERT Vulnerability Summary for the Week of June 12, 2023 - RedPacket Security
Details Website 2023-06-22 30 Mallox Ransomware Implements New Infection Strategy
Details Website 2023-06-16 41 New Malware Campaign Targets LetsVPN Users
Details Website 2023-06-14 60 Shampoo: A New ChromeLoader Campaign | HP Wolf Security
Details Website 2023-06-13 56 Threat Trends: Snort IPS
Details Website 2023-06-13 46 Threat Actor Targets Russian Gaming Community With WannaCry-Imitator
Details Website 2023-06-09 207 Over 45 thousand Users Fell Victim to Malicious PyPI Packages
Details Website 2023-06-08 32 Unmasking the Darkrace Ransomware Gang
Details Website 2023-06-07 31 RomCom Resurfaces: Targeting Politicians in Ukraine and U.S.-Based Healthcare Providing Aid to Refugees from Ukraine
Details Website 2023-06-06 27 Anomali Cyber Watch: LEMURLOOT on Exploited MOVEit Transfers, Zero-Click iOS Exploit Targeted Kaspersky, Qakbot Turns Bots into Proxies
Details Website 2023-06-01 34 SharpPanda APT Campaign Expands its Arsenal Targeting G20 Nations
Details Website 2023-05-25 15 Obsidian ORB Ransomware Demands Gift Cards as Payment
Details Website 2023-05-25 43 Invicta Stealer Spreading Through Phony GoDaddy Refund Invoices