Common Information
Type | Value |
---|---|
Value |
Process Discovery - T1424 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may attempt to get information about running processes on a device. Information obtained could be used to gain an understanding of common software/applications running on devices within a network. Adversaries may use the information from [Process Discovery](https://attack.mitre.org/techniques/T1424) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions. Recent Android security enhancements have made it more difficult to obtain a list of running processes. On Android 7 and later, there is no way for an application to obtain the process list without abusing elevated privileges. This is due to the Android kernel utilizing the `hidepid` mount feature. Prior to Android 7, applications could utilize the `ps` command or examine the `/proc` directory on the device.(Citation: Android-SELinuxChanges) In iOS, applications have previously been able to use the `sysctl` command to obtain a list of running processes. This functionality has been removed in later iOS versions. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2022-06-28 | 144 | Raccoon Stealer v2 - Part 1: The return of the dead | ||
Details | Website | 2022-06-10 | 76 | Threat Attribution — Chimera “Under the Radar” | ||
Details | Website | 2022-06-09 | 31 | LockBit 2.0: How This RaaS Operates and How to Protect Against It | ||
Details | Website | 2022-06-09 | 31 | Lyceum .NET DNS Backdoor | Zscaler | ||
Details | Website | 2022-06-02 | 99 | To HADES and Back: UNC2165 Shifts to LOCKBIT to Evade Sanctions | Mandiant | ||
Details | Website | 2022-06-02 | 63 | LockBit 3.0 Ransomware Unlocked | ||
Details | Website | 2022-05-27 | 50 | Emotet Analysis: New LNKs in the Infection Chain | Kroll | ||
Details | Website | 2022-05-17 | 679 | Space Pirates: analyzing the tools and connections of a new hacker group | ||
Details | Website | 2022-05-08 | 57 | Ursnif Malware Banks on News Events for Phishing Attacks | Qualys Security Blog | ||
Details | Website | 2022-05-04 | 26 | Operation CuckooBees: Deep-Dive into Stealthy Winnti Techniques | ||
Details | Website | 2022-05-02 | 39 | UNC3524: Eye Spy on Your Email | Mandiant | ||
Details | Website | 2022-05-02 | 39 | UNC3524: Eye Spy on Your Email | Mandiant | ||
Details | Website | 2022-04-28 | 128 | Tracking APT29 Phishing Campaigns | Atlassian Trello | ||
Details | Website | 2022-04-27 | 202 | A lookback under the TA410 umbrella: Its cyberespionage TTPs and activity | WeLiveSecurity | ||
Details | Website | 2022-04-06 | 54 | FFDroider Stealer Is Targeting Social Media Platform | Blog | ||
Details | Website | 2022-04-04 | 34 | Ransomware Spotlight: AvosLocker - Security News | ||
Details | Website | 2022-03-23 | 67 | Midas Ransomware : Tracing the Evolution of Thanos Ransomware Variants | ||
Details | Website | 2022-03-23 | 67 | A Study of Thanos Ransomware Variants | Zscaler Blog | ||
Details | Website | 2022-03-18 | 30 | Ransomware Spotlight: Hive - Security News | ||
Details | Website | 2022-03-16 | 92 | Avira Labs Research Reveals Hydra Banking Trojan 2.0 targeting a wider network of German and Austrian banks | ||
Details | Website | 2022-02-24 | 123 | Iranian Government-Sponsored Actors Conduct Cyber Operations Against Global Government and Commercial Networks | CISA | ||
Details | Website | 2022-02-23 | 314 | (Ex)Change of Pace: UNC2596 Observed Leveraging Vulnerabilities to Deploy Cuba Ransomware | Mandiant | ||
Details | Website | 2022-02-22 | 37 | Ransomware Spotlight: Clop - Security News | ||
Details | Website | 2022-02-08 | 26 | Ransomware Spotlight: LockBit - Security News | ||
Details | Website | 2022-01-27 | 22 | Threat Assessment: BlackCat Ransomware |