Common Information
Type | Value |
---|---|
Value |
Web Protocols - T1071.001 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may communicate using application layer protocols associated with web traffic to avoid detection/network filtering by blending in with existing traffic. Commands to the remote system, and often the results of those commands, will be embedded within the protocol traffic between the client and server. Protocols such as HTTP/S(Citation: CrowdStrike Putter Panda) and WebSocket(Citation: Brazking-Websockets) that carry web traffic may be very common in environments. HTTP/S packets have many fields and headers in which data can be concealed. An adversary may abuse these protocols to communicate with systems under their control within a victim network while also mimicking normal, expected traffic. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-04-01 | 124 | From OneNote to RansomNote: An Ice Cold Intrusion | ||
Details | Website | 2024-03-27 | 65 | European diplomats targeted by SPIKEDWINE with WINELOADER | ||
Details | Website | 2024-03-22 | 35 | Unveiling KamiKakaBot - Malware Analysis - Nextron Systems | ||
Details | Website | 2024-03-18 | 96 | Earth Krahang Exploits Intergovernmental Trust to Launch Cross-Government Attacks | ||
Details | Website | 2024-03-18 | 96 | Earth Krahang Exploits Intergovernmental Trust to Launch Cross-Government Attacks | ||
Details | Website | 2024-03-06 | 59 | Тень пентестера: эксперты F.A.C.C.T. исследовали неизвестные атаки вымогателей Shadow | ||
Details | Website | 2024-02-20 | 137 | Earth Preta Campaign Uses DOPLUGS to Target Asia | ||
Details | Website | 2024-02-01 | 47 | VajraSpy: A Patchwork of espionage apps | ||
Details | Website | 2024-01-24 | 16 | Mexican Banks and Cryptocurrency Platforms Targeted With AllaKore RAT | ||
Details | Website | 2024-01-05 | 34 | Turkish espionage campaigns in the Netherlands | ||
Details | Website | 2024-01-04 | 63 | ATT&CK을 이용해 스스로 평가하기(APT3, Second Scenario) | ||
Details | Website | 2023-12-06 | 198 | Russia/Ukraine Update - December 2023 | ||
Details | Website | 2023-12-04 | 74 | SQL Brute Force Leads to BlueSky Ransomware | ||
Details | Website | 2023-11-30 | 27 | AeroBlade on the Hunt Targeting the U.S. Aerospace Industry | ||
Details | Website | 2023-11-28 | 81 | Aki-RATs - Command and Control Party | ||
Details | Website | 2023-11-19 | 117 | LitterDrifter: a new USB worm used by the Gamaredon group | ||
Details | Website | 2023-11-17 | 29 | Threat Actor Targets 'Batman: Arkham City' Gamers using Meterpreter | ||
Details | Website | 2023-11-14 | 11 | The song remains the same: The 2023 Active Adversary Report for Security Practitioners | ||
Details | Website | 2023-11-14 | 44 | Everything You Need to Know About Silent Skimming | ||
Details | Website | 2023-11-09 | 7 | Memory scanning leaves attackers nowhere to hide | ||
Details | Website | 2023-11-06 | 203 | SideCopy’s Multi-platform Onslaught: Leveraging WinRAR Zero-Day and Linux Variant of Ares RAT - Blogs on Information Technology, Network & Cybersecurity | Seqrite | ||
Details | Website | 2023-11-03 | 106 | Exploitation of CVE-2023-46604 Leading to Ransomware | ||
Details | Website | 2023-11-02 | 0 | Conference brings Silicon Valley DevOps security to Europe | ||
Details | Website | 2023-11-01 | 44 | Elastic catches DPRK passing out KANDYKORN — Elastic Security Labs | ||
Details | Website | 2023-10-27 | 117 | A cascade of compromise: unveiling Lazarus' new campaign |