Common Information
Type | Value |
---|---|
Value |
Hardware - T1592.001 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may gather information about the victim's host hardware that can be used during targeting. Information about hardware infrastructure may include a variety of details such as types and versions on specific hosts, as well as the presence of additional components that might be indicative of added defensive protections (ex: card/biometric readers, dedicated encryption hardware, etc.). Adversaries may gather this information in various ways, such as direct collection actions via [Active Scanning](https://attack.mitre.org/techniques/T1595) (ex: hostnames, server banners, user agent strings) or [Phishing for Information](https://attack.mitre.org/techniques/T1598). Adversaries may also compromise sites then include malicious content designed to collect host information from visitors.(Citation: ATT ScanBox) Information about the hardware infrastructure may also be exposed to adversaries via online or other accessible data sets (ex: job postings, network maps, assessment reports, resumes, or purchase invoices). Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)), establishing operational resources (ex: [Develop Capabilities](https://attack.mitre.org/techniques/T1587) or [Obtain Capabilities](https://attack.mitre.org/techniques/T1588)), and/or initial access (ex: [Compromise Hardware Supply Chain](https://attack.mitre.org/techniques/T1195/003) or [Hardware Additions](https://attack.mitre.org/techniques/T1200)). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2754-08-03 | 37 | Virus Bulletin :: VB2018 paper: Unpacking the packed unpacker: reversing an Android anti-analysis native library | ||
Details | Website | 2574-01-02 | 0 | Editors Picks, Apps We Recommend | TechSpot | ||
Details | Website | 2083-07-04 | 9 | SonicWall VPN Portal Critical Flaw (CVE-2020-5135) | ||
Details | Website | 2037-10-13 | 14 | Abusing IP camera's for red teaming: Obtaining the firmware | ||
Details | Website | 2031-03-19 | 15 | HPSBHF03564 rev 2 - Synaptics Touchpad Driver Potential, Local Loss of Confidentiality | HP® Customer Support | ||
Details | Website | 2028-04-25 | 21 | 每日安全动态推送(25/4/28) | CTF导航 | ||
Details | Website | 2025-11-07 | 1 | Vault7 - Home | ||
Details | Website | 2025-10-02 | 1 | Telefoncek.si | ||
Details | Website | 2025-07-19 | 81 | Microsoft Patch Tuesday: May 2025 - SANS Internet Storm Center | ||
Details | Website | 2025-07-05 | 11 | Example of | ||
Details | Website | 2025-05-24 | 8 | Crypto Drainers are Targeting Cryptocurrency Users | ||
Details | Website | 2025-05-23 | 1 | Cybersecurity Snapshot: AI Data Security Best Practices Released, While New Framework Seeks To Help IT Pros Gain Cyber Skills | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware - National Cyber Security Consulting | ||
Details | Website | 2025-05-23 | 12 | Crypto Drainers are Targeting Cryptocurrency Users | ||
Details | Website | 2025-05-23 | 49 | Katz Stealer Threat Analysis - Nextron Systems | ||
Details | Website | 2025-05-23 | 0 | Novel macOS malware campaign involves fraudulent Ledger apps | ||
Details | Website | 2025-05-23 | 0 | Cloudflare named in 2025 Gartner® Magic Quadrant™ for Security Service Edge | ||
Details | Website | 2025-05-23 | 0 | U.S. Authorities Seize DanaBot Malware Operation, Indict 16 | ||
Details | Website | 2025-05-23 | 27 | Chihuahua Stealer Malware Targets Browser and Wallet Data | ||
Details | Website | 2025-05-23 | 2 | ColorTokens OT-in-a-Box: From Concept to Completion | ||
Details | Website | 2025-05-23 | 2 | Tracking the Cost of Quantum Factoring | ||
Details | Website | 2025-05-23 | 4 | Critical NETGEAR Router Flaw Allows Full Admin Access by Attackers | ||
Details | Website | 2025-05-23 | 19 | ViciousTrap Hackers Breaches 5,500+ Edge Devices from 50+ Brands, Turns Them into Honeypots | ||
Details | Website | 2025-05-23 | 6 | Cybersecurity Snapshot: AI Data Security Best Practices Released, While New Framework Seeks To Help IT Pros Gain Cyber Skills | ||
Details | Website | 2025-05-23 | 0 | Level 4 automation will dramatically improve telco networks | ||
Details | Website | 2025-05-23 | 71 | Weekly Intelligence Report - 23 May 2025 | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware - National Cyber Security Consulting |