Common Information
Type | Value |
---|---|
Value |
Remote File Copy |
Category | Attack-Pattern |
Type | Mitre-Ics-Techniques |
Misp Type | Cluster |
Description | Adversaries may copy files from one system to another to stage adversary tools or other files over the course of an operation. Copying of files may also be performed laterally between internal victim systems to support Lateral Movement with remote Execution using inherent file sharing protocols such as file sharing over SMB to connected network shares. In control systems environments, malware may use SMB and other file sharing protocols to move laterally through industrial networks. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-15 | 33 | DONOT's Attack On Maritime & Defense Manufacturing | ||
Details | Website | 2024-09-19 | 35 | Earth Baxia Uses Spear-Phishing and GeoServer Exploit to Target APAC | ||
Details | Website | 2024-01-04 | 63 | ATT&CK을 이용해 스스로 평가하기(APT3, Second Scenario) | ||
Details | Website | 2023-10-17 | 92 | Anomali Cyber Watch: RomCom 4.0 Targeted Female Politicians, Israeli RedAlert App Impersonated, and More. – Anomali | ||
Details | Website | 2023-09-04 | 41 | New Attack Vector In The Cloud: Attackers caught exploiting Object Storage Services | ||
Details | Website | 2023-08-11 | 39 | Stealthy Malicious MSI Loader - Overlapping Technique and Infrastructure with BatLoader - CYFIRMA | ||
Details | Website | 2023-06-06 | 27 | Anomali Cyber Watch: LEMURLOOT on Exploited MOVEit Transfers, Zero-Click iOS Exploit Targeted Kaspersky, Qakbot Turns Bots into Proxies | ||
Details | Website | 2023-04-27 | 30 | What's New in Sysdig - March & April 2023 – Sysdig | ||
Details | Website | 2023-03-01 | 21 | Hunting for Lateral Movement using Event Query Language — Elastic Security Labs | ||
Details | Website | 2023-02-14 | 24 | 8220 Gang Continues to Evolve With Each New Campaign – Sysdig | ||
Details | Website | 2022-09-08 | 74 | Microsoft investigates Iranian attacks against the Albanian government - Microsoft Security Blog | ||
Details | Website | 2022-09-08 | 48 | Microsoft investigates Iranian attacks against the Albanian government | Microsoft Security Blog | ||
Details | Website | 2022-07-26 | 60 | Mandiant Red Team Emulates FIN11 Tactics To Control Operational Technology Servers | Mandiant | ||
Details | Website | 2022-06-07 | 5 | Behind the Creation of Detector #1236 - Red Canary | ||
Details | Website | 2022-06-02 | 48 | TAU Threat Analysis: Bundlore (macOS) mm-install-macos | ||
Details | Website | 2022-05-21 | 36 | Satan Ransomware Spawns New Methods to Spread | ||
Details | Website | 2022-03-15 | 28 | Decoding a DanaBot Downloader | ||
Details | Website | 2021-11-18 | 50 | Conti Ransomware | Qualys Security Blog | ||
Details | Website | 2021-09-24 | 32 | Examining the Cring Ransomware Techniques | ||
Details | Website | 2021-09-24 | 32 | Examining the Cring Ransomware Techniques | ||
Details | Website | 2021-08-11 | 302 | Massive New AdLoad Campaign Goes Entirely Undetected By Apple's XProtect - SentinelLabs | ||
Details | Website | 2021-06-29 | 45 | 7 victims spanning multiple industries | ||
Details | Website | 2021-06-15 | 86 | Ransomware Double Extortion and Beyond: REvil, Clop, and Conti - Security News | ||
Details | Website | 2021-06-01 | 52 | Backdoors, RATs, Loaders evasion techniques | ||
Details | Website | 2021-04-20 | 1 | Carbanak and FIN7 Attack Techniques |