Common Information
Type Value
Value
Web Protocols - T1071.001
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may communicate using application layer protocols associated with web traffic to avoid detection/network filtering by blending in with existing traffic. Commands to the remote system, and often the results of those commands, will be embedded within the protocol traffic between the client and server. Protocols such as HTTP/S(Citation: CrowdStrike Putter Panda) and WebSocket(Citation: Brazking-Websockets) that carry web traffic may be very common in environments. HTTP/S packets have many fields and headers in which data can be concealed. An adversary may abuse these protocols to communicate with systems under their control within a victim network while also mimicking normal, expected traffic.
Details Published Attributes CTI Title
Details Website 2023-10-26 34 Higaisa APT Resurfaces via Phishing Website targeting Chinese Users
Details Website 2023-10-25 27 The Duck is Hiring in Italy: DUCKTAIL Spread via Compromised LinkedIn Profiles
Details Website 2023-10-25 94 A pirated program downloaded from a torrent site infected hundreds of thousands of users
Details Website 2023-10-24 95 Атаки на индустриальный и государственный секторы РФ
Details Website 2023-10-23 273 Red Team Tools
Details Website 2023-10-23 30 New Enchant Android Malware Targeting Chinese Cryptocurrency Users
Details Website 2023-10-20 59 Akira Stealer : An Undetected Python Based Info-stealer - CYFIRMA
Details Website 2023-10-20 1 Criminal groups focus on Australia and US
Details Website 2023-10-20 2 Netskope Threat Labs report says highest percentage of cybercrime activity originates in Russia
Details Website 2023-10-19 30 Ransomware actor exploits unsupported ColdFusion servers—but comes away empty-handed
Details Website 2023-10-17 0 Enforce Data Security Compliance Everywhere with Forcepoint ONE
Details Website 2023-10-17 92 Anomali Cyber Watch: RomCom 4.0 Targeted Female Politicians, Israeli RedAlert App Impersonated, and More. – Anomali
Details Website 2023-10-16 106 ClearFake: a newcomer to the "fake updates" threats landscape
Details Website 2023-10-13 47 AgentTesla Spreads Through CHM and PDF Files in Recent Attacks
Details Website 2023-10-11 55 Genesis Market No Longer Feeds The Evil Cookie Monster
Details Website 2023-10-11 99 Qakbot evolves to OneNote Malware Distribution
Details Website 2023-10-10 31 Threat Actor deploys Mythic’s Athena Agent to target Russian Semiconductor Suppliers
Details Website 2023-10-06 77 Chinese State-Sponsored Cyber Espionage Activity Targeting Semiconductor Industry in East Asia
Details Website 2023-10-05 43 German Embassy Lure: Likely Part of Campaign Against NATO Aligned Ministries of Foreign Affairs
Details Website 2023-09-26 34 Analyzing Lu0Bot: A Node.js Malware with Vast Capabilities
Details Website 2023-09-25 206 From ScreenConnect to Hive Ransomware in 61 hours - The DFIR Report
Details Website 2023-09-24 49 Deadglyph: a new advanced backdoor from Stealth Falcon
Details Website 2023-09-22 56 Examining the Activities of the Turla APT Group
Details Website 2023-09-22 57 Examining the Activities of the Turla APT Group
Details Website 2023-09-20 26 Dark Web Profile: NoEscape Ransomware