Common Information
Type | Value |
---|---|
Value |
Malware - T1587.001 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may develop malware and malware components that can be used during targeting. Building malicious software can include the development of payloads, droppers, post-compromise tools, backdoors (including backdoored images), packers, C2 protocols, and the creation of infected removable media. Adversaries may develop malware to support their operations, creating a means for maintaining control of remote machines, evading defenses, and executing post-compromise behaviors.(Citation: Mandiant APT1)(Citation: Kaspersky Sofacy)(Citation: ActiveMalwareEnergy)(Citation: FBI Flash FIN7 USB) As with legitimate development efforts, different skill sets may be required for developing malware. The skills needed may be located in-house, or may need to be contracted out. Use of a contractor may be considered an extension of that adversary's malware development capabilities, provided the adversary plays a role in shaping requirements and maintains a degree of exclusivity to the malware. Some aspects of malware development, such as C2 protocol development, may require adversaries to obtain additional infrastructure. For example, malware developed that will communicate with Twitter for C2, may require use of [Web Services](https://attack.mitre.org/techniques/T1583/006).(Citation: FireEye APT29) |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-17 | 0 | Cybersecurity Myths Busted: What You Need to Know to Stay Safe | ||
Details | Website | 2024-11-17 | 0 | AI’s Game-Changing Impact on Mobile Security | ||
Details | Website | 2024-11-17 | 2 | Malware Analysis - Writing x64dbg unpacking scripts | ||
Details | Website | 2024-11-17 | 0 | SQL Injection vs. Cross-Site Scripting (XSS): Know the Difference! | ||
Details | Website | 2024-11-17 | 0 | Which Foreign Country is Cheapest to Travel? Top Budget Destinations! | ||
Details | Website | 2024-11-17 | 0 | Do Flight Prices Ever Go Down Day Of? Uncover Secrets! | ||
Details | Website | 2024-11-17 | 0 | How Far in Advance Should I Book a Flight to Europe?: Smart Timing Tips | ||
Details | Website | 2024-11-17 | 0 | What is the Cheapest Day to Book International Flights?: Insider Tips! | ||
Details | Website | 2024-11-17 | 0 | What Country Has the Lowest Prices? Uncover Global Bargains! | ||
Details | Website | 2024-11-17 | 0 | Which Country is Best for VPN? Top Picks Unveiled! | ||
Details | Website | 2024-11-17 | 0 | Where is the Cheapest International Place to Fly To?: Uncover Savings! | ||
Details | Website | 2024-11-17 | 0 | Which Country VPN is Cheapest for Flights? Uncover Savings! | ||
Details | Website | 2024-11-17 | 0 | Is Surfshark Legal to Use? Unveil the Truth Today! | ||
Details | Website | 2024-11-17 | 0 | Does Surfshark Track You? Unveiling the Truth! | ||
Details | Website | 2024-11-17 | 0 | Black Friday and Cyber Monday: A Hotspot for Cyber Crime | #cybercrime | #infosec | National Cyber Security Consulting | ||
Details | Website | 2024-11-17 | 2 | 2024 Cloud Security Report -Checkpoint - Cybersecurity Insiders | ||
Details | Website | 2024-11-17 | 0 | 🚨 Vietnamese Hackers Unleash PXA Stealer: Targeting Sensitive Data Across Europe and Asia 🌍🔓 | ||
Details | Website | 2024-11-17 | 1 | 🚨 DEEPDATA Malware Exploits Fortinet Flaw to Steal VPN Credentials 🔒 | ||
Details | Website | 2024-11-17 | 3 | 🚨 Botnet Exploits GeoVision Zero-Day to Install Mirai Malware 🚨 | ||
Details | Website | 2024-11-17 | 3 | Top 10 Daily Cybercrime Brief by FCRF [17.11.2024]: Click here to Know More | #cybercrime | #infosec | National Cyber Security Consulting | ||
Details | Website | 2024-11-17 | 1 | NordVPN’s Black Friday deal review | ||
Details | Website | 2024-11-17 | 1 | Best Price On Top-rated VPN | ||
Details | Website | 2024-11-17 | 1 | Online Sale For Business VPN | ||
Details | Website | 2024-11-17 | 0 | ChatGPT Security Risks for Business: The Essential Checklist for Protection | ||
Details | Website | 2024-11-17 | 3 | LetsDefend SOC Walkthrough | SOC145 — Ransomware Detected |