Common Information
Type Value
Value
Python - T1059.006
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may abuse Python commands and scripts for execution. Python is a very popular scripting/programming language, with capabilities to perform many functions. Python can be executed interactively from the command-line (via the <code>python.exe</code> interpreter) or via scripts (.py) that can be written and distributed to different systems. Python code can also be compiled into binary executables.(Citation: Zscaler APT31 Covid-19 October 2020) Python comes with many built-in packages to interact with the underlying system, such as file operations and device I/O. Adversaries can use these libraries to download and execute commands or other scripts as well as perform various malicious behaviors.
Details Published Attributes CTI Title
Details Website 2754-08-03 37 Virus Bulletin :: VB2018 paper: Unpacking the packed unpacker: reversing an Android anti-analysis native library
Details Website 2070-01-03 13 越狱 Llama-3.1-8B-Instruct | CTF导航
Details Website 2044-04-01 13 Attackers Repurposing existing Python-based Malware for Distribution on NPM
Details Website 2037-10-13 14 Abusing IP camera's for red teaming: Obtaining the firmware
Details Website 2025-07-02 0 Security Operations Analyst (Level 3) | Red Piranha
Details Website 2025-05-10 9 Tool update: sigs.py - added check mode - SANS Internet Storm Center
Details Website 2025-04-05 15 Shellcode Encoded in UUIDs - SANS Internet Storm Center
Details Website 2025-04-05 22 Python Bot Delivered Through DLL Side-Loading - SANS Internet Storm Center
Details Website 2025-03-24 4 Dropserver 漏洞可致攻击者绕过身份验证并获得完全控制权-安全KER - 安全资讯平台
Details Website 2025-03-21 7 CVE Alert: CVE-2025-0508 - RedPacket Security
Details Website 2025-03-21 0 Attackers Leverage Weaponized CAPTCHAs to Execute PowerShell and Deploy Malware
Details Website 2025-03-21 3 Researchers Uncover FIN7's Stealthy Python-Based Anubis Backdoor
Details Website 2025-03-21 2 Prepping for post-quantum: a beginner’s guide to lattice cryptography
Details Website 2025-03-21 0 GitHub Supply Chain Attack Raises Awareness Across The Cybersecurity Community - Cybersecurity Insiders
Details Website 2025-03-21 1 Attackers Use Fake CAPTCHAs to Deploy Lumma Stealer RAT
Details Website 2025-03-21 9 Скрытные тактики новейшего бэкдора Anubis от FIN7 - SEC-1275-1
Details Website 2025-03-21 24 中科固源基于覆盖引导的 Fuzzing 神器登场,开源模糊测试迎来新技术迭代-安全KER - 安全资讯平台
Details Website 2025-03-21 17 When Python Is Poisoned | How Runtime Security Stops the tj-actions Attack
Details Website 2025-03-20 0 Dark Web Profile: FSociety (Flocker) Ransomware - SOCRadar® Cyber Intelligence Inc.
Details Website 2025-03-20 2 Dark Web Profile: FSociety (Flocker) Ransomware
Details Website 2025-03-20 3 CVE-2025-24071 Windows File Explorer Spoofing Vulnerability Uncovered, Patch Now
Details Website 2025-03-20 12 Unboxing Anubis: Exploring the Stealthy Tactics of FIN7's Latest Backdoor
Details Website 2025-03-20 0 AWS SNS 被利用引发数据泄露及网络钓鱼危机 - 嘶吼 RoarTalk – 网络安全行业综合服务平台,4hou.com
Details Website 2025-03-20 51 UAT-5918 targets critical infrastructure entities in Taiwan
Details Website 2025-03-20 1 Unboxing Anubis: Exploring the Stealthy Tactics of FIN7's Latest Backdoor