Common Information
Type Value
Value
Process Discovery - T1424
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may attempt to get information about running processes on a device. Information obtained could be used to gain an understanding of common software/applications running on devices within a network. Adversaries may use the information from [Process Discovery](https://attack.mitre.org/techniques/T1424) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions. Recent Android security enhancements have made it more difficult to obtain a list of running processes. On Android 7 and later, there is no way for an application to obtain the process list without abusing elevated privileges. This is due to the Android kernel utilizing the `hidepid` mount feature. Prior to Android 7, applications could utilize the `ps` command or examine the `/proc` directory on the device.(Citation: Android-SELinuxChanges) In iOS, applications have previously been able to use the `sysctl` command to obtain a list of running processes. This functionality has been removed in later iOS versions.
Details Published Attributes CTI Title
Details Website 2019-10-01 82 Head Fake: Tackling Disruptive Ransomware Attacks | Mandiant
Details Website 2019-08-01 78 Clop Ransomware | McAfee Blog
Details Website 2019-05-29 56 A dive into Turla PowerShell usage | WeLiveSecurity
Details Website 2019-04-29 57 LockerGoga Ransomware Family Used in Targeted Attacks | McAfee Blog
Details Website 2019-04-22 48 CB TAU Threat Intelligence Notification: HopLight Campaign (Linked to North Korea) is Reusing Substantial Amount of Code
Details Website 2019-03-25 36 Let’s play with Qulab, an exotic malware developed in AutoIT
Details Website 2018-12-24 73 Let’s dig into Vidar – An Arkei Copycat/Forked Stealer (In-depth analysis)
Details Website 2018-12-21 118 The Christmas Card you never wanted - A new wave of Emotet is back to wreak havoc
Details Website 2018-12-18 63 Sofacy Creates New ‘Go’ Variant of Zebrocy Tool
Details Website 2018-12-12 18 ‘Operation Sharpshooter’ Targets Global Defense, Critical Infrastructure | McAfee Blog
Details Website 2018-10-10 15 Ransomware GandCrab Version 5 Partners With Crypter Service for Obfuscation | McAfee Blog
Details Website 2018-07-31 17 GandCrab Ransomware Puts the Pinch on Victims | McAfee Blog
Details Website 2018-04-25 30 Analyzing Operation GhostSecret: Attack Seeks to Steal Data Worldwide
Details Website 2018-03-08 25 Hidden Cobra Targets Turkish Financial Sector With New Bankshot Implant | McAfee Blog
Details Website 2018-03-02 70 McAfee Uncovers Operation Honeybee, a Malicious Document Campaign Targeting Humanitarian Aid Groups | McAfee Blog