Common Information
Type Value
Value
Process Discovery - T1424
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may attempt to get information about running processes on a device. Information obtained could be used to gain an understanding of common software/applications running on devices within a network. Adversaries may use the information from [Process Discovery](https://attack.mitre.org/techniques/T1424) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions. Recent Android security enhancements have made it more difficult to obtain a list of running processes. On Android 7 and later, there is no way for an application to obtain the process list without abusing elevated privileges. This is due to the Android kernel utilizing the `hidepid` mount feature. Prior to Android 7, applications could utilize the `ps` command or examine the `/proc` directory on the device.(Citation: Android-SELinuxChanges) In iOS, applications have previously been able to use the `sysctl` command to obtain a list of running processes. This functionality has been removed in later iOS versions.
Details Published Attributes CTI Title
Details Website 2020-11-18 40 Reversing Ryuk
Details Website 2020-11-05 60 Attacks on industrial enterprises using RMS and TeamViewer: new data
Details Website 2020-11-04 33 QBot Trojan delivered via malspam campaign exploiting US election uncertainties | Malwarebytes Labs
Details Website 2020-10-24 31 Emotet Malware | CISA
Details Website 2020-10-22 24 An Inside Look at How Ryuk Evolved Its Encryption and Evasion Techniques - SentinelLabs
Details Website 2020-10-12 47 ESET takes part in global operation to disrupt Trickbot | WeLiveSecurity
Details Website 2020-09-29 198 Oil and Gas Industries in Middle East Targeted | blog
Details Website 2020-09-29 23 Cross Platform Modular Glupteba Malware Uses ManageX
Details Website 2020-09-02 63 KryptoCibule: The multitasking multicurrency cryptostealer | WeLiveSecurity
Details Website 2020-08-17 61 GoldenSpy Chapter 5 : Multiple GoldenSpy Uninstaller Variants Discovered
Details Website 2020-07-15 165 Financially Motivated Actors Are Expanding Access Into OT: Analysis of Kill Lists That Include OT Processes Used With Seven Malware Families | Mandiant
Details Website 2020-06-18 76 Digging up InvisiMole’s hidden arsenal | WeLiveSecurity
Details Website 2020-05-21 108 No “Game over” for the Winnti Group | WeLiveSecurity
Details Website 2020-05-13 66 Ramsay: A cyber‑espionage toolkit tailored for air‑gapped networks | WeLiveSecurity
Details Website 2020-05-09 29 Lazarus group leverages Covid themed HWP Document
Details Website 2020-05-01 53 Tales From the Trenches; a Lockbit Ransomware Story | McAfee Blog
Details Website 2020-04-29 83 Compromised WordPress Sites Distribute Adwind RAT | blog
Details Website 2020-04-23 85 Following ESET’s discovery, a Monero mining botnet is disrupted | WeLiveSecurity
Details Website 2020-04-02 189 Nemty Ransomware - Learning by Doing | McAfee Blog
Details Website 2020-02-27 79 “Higaisa(黑格莎)”组织近期攻击活动报告
Details Website 2019-12-23 37 I literally can't think of a fitting pun - mrdec ransomware
Details Website 2019-12-02 15 God save the queen [...] 'cause ransom is money - savethequeen encryptor
Details Website 2019-10-23 147 CyberThreatIntel/analysis.md at master · StrangerealIntel/CyberThreatIntel
Details Website 2019-10-17 37 Operation Ghost: The Dukes aren’t back – they never left | WeLiveSecurity
Details Website 2019-10-15 39 Illicit Cryptomining Threat Actor Rocke Changes Tactics, Now More Difficult to Detect