Common Information
Type Value
Value
Web Protocols - T1071.001
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may communicate using application layer protocols associated with web traffic to avoid detection/network filtering by blending in with existing traffic. Commands to the remote system, and often the results of those commands, will be embedded within the protocol traffic between the client and server. Protocols such as HTTP/S(Citation: CrowdStrike Putter Panda) and WebSocket(Citation: Brazking-Websockets) that carry web traffic may be very common in environments. HTTP/S packets have many fields and headers in which data can be concealed. An adversary may abuse these protocols to communicate with systems under their control within a victim network while also mimicking normal, expected traffic.
Details Published Attributes CTI Title
Details Website 2021-03-17 8 Ransomware Threat Assessments: A Companion to the 2021 Unit 42 Ransomware Threat Report
Details Website 2021-03-11 181 Whitelist Me, Maybe? “Netbounce” Threat Actor Tries A Bold Approach To Evade Detection | FortiGurad Labs
Details Website 2021-03-04 47 New SUNSHUTTLE Second-Stage Backdoor Uncovered Targeting U.S.-Based Entity; Possible Connection to UNC2452 | Mandiant
Details Website 2021-02-25 161 Lazarus targets defense industry with ThreatNeedle
Details Website 2021-02-25 190 So Unchill: Melting UNC2198 ICEDID to Ransomware Operations | Mandiant
Details Website 2021-02-04 25 Connecting the dots inside the Italian APT Landscape - Yoroi
Details Website 2021-02-03 34 MTR casebook: Uncovering a backdoor implant in a SolarWinds Orion server
Details Website 2021-01-28 58 North Korean Threat Group APT38 Threat Intel Advisory | Threat Intelligence | CloudSEK
Details Website 2021-01-25 18 Affiliates vs Hunters: Fighting the DarkSide - SOC Prime
Details Website 2021-01-19 37 FreakOut – Leveraging Newest Vulnerabilities for creating a Botnet - Check Point Research
Details Website 2021-01-14 663 Higaisa or Winnti? APT41 backdoors, old and new
Details Website 2021-01-12 216 Abusing cloud services to fly under the radar
Details Website 2021-01-12 215 Abusing cloud services to fly under the radar
Details Website 2020-12-23 112 Lazarus covets COVID-19-related intelligence
Details Website 2020-12-18 74 Analyzing Solorigate, the compromised DLL file that started a sophisticated cyberattack, and how Microsoft Defender helps protect customers - Microsoft Security Blog
Details Website 2020-12-17 91 Advanced Persistent Threat Compromise of Government Agencies, Critical Infrastructure, and Private Sector Organizations | CISA
Details Website 2020-12-16 43 UNC2452 Threat Actor Group Threat Intel Advisory | Threat Intelligence | CloudSEK
Details Website 2020-12-15 74 QakBot reducing its on disk artifacts - Hornetsecurity
Details Website 2020-12-13 49 SolarWinds Supply Chain Attack Uses SUNBURST Backdoor
Details Website 2020-12-03 9 CTI is Better Served with Context: Getting better value from IOCs
Details Website 2020-12-02 100 IcedID Stealer Man-in-the-browser Banking Trojan
Details Website 2020-11-16 98 Lazarus supply‑chain attack in South Korea | WeLiveSecurity
Details Website 2020-11-05 60 Attacks on industrial enterprises using RMS and TeamViewer: new data
Details Website 2020-11-04 35 malware-ioc/sparklinggoblin at master · eset/malware-ioc
Details Website 2020-10-24 31 Emotet Malware | CISA