Common Information
Type | Value |
---|---|
Value |
Malware - T1587.001 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may develop malware and malware components that can be used during targeting. Building malicious software can include the development of payloads, droppers, post-compromise tools, backdoors (including backdoored images), packers, C2 protocols, and the creation of infected removable media. Adversaries may develop malware to support their operations, creating a means for maintaining control of remote machines, evading defenses, and executing post-compromise behaviors.(Citation: Mandiant APT1)(Citation: Kaspersky Sofacy)(Citation: ActiveMalwareEnergy)(Citation: FBI Flash FIN7 USB) As with legitimate development efforts, different skill sets may be required for developing malware. The skills needed may be located in-house, or may need to be contracted out. Use of a contractor may be considered an extension of that adversary's malware development capabilities, provided the adversary plays a role in shaping requirements and maintains a degree of exclusivity to the malware. Some aspects of malware development, such as C2 protocol development, may require adversaries to obtain additional infrastructure. For example, malware developed that will communicate with Twitter for C2, may require use of [Web Services](https://attack.mitre.org/techniques/T1583/006).(Citation: FireEye APT29) |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-17 | 3 | LetsDefend SOC Walkthrough | SOC145 — Ransomware Detected | ||
Details | Website | 2024-11-17 | 1 | Cheap Secure VPN Offers | ||
Details | Website | 2024-11-17 | 1 | Shop For Affordable VPN | ||
Details | Website | 2024-11-17 | 1 | Shop For Top-rated VPN | ||
Details | Website | 2024-11-17 | 1 | Unihost hardware firewall review | ||
Details | Website | 2024-11-17 | 2 | Phishing emails increasingly use SVG attachments to evade detection | ||
Details | Website | 2024-11-16 | 1 | A journey of .NET AOT reverse engineering | ||
Details | Website | 2024-11-16 | 22 | Hunter Lab Cyber Defenders | ||
Details | Website | 2024-11-16 | 12 | Instalação do MISP no Ubuntu 24.04 | ||
Details | Website | 2024-11-16 | 0 | The Rising Threat of Cybercrime: How to Protect Yourself in an Increasingly Digital World | ||
Details | Website | 2024-11-16 | 4 | 🔥 Cracking the Code: How to Install Acunetix v24.1 Cracked Version (Quick & Manual Methods!) 🔐 | ||
Details | Website | 2024-11-16 | 3 | What Does Google’s Cybersecurity Forecast for 2025 Reveal? | ||
Details | Website | 2024-11-16 | 90 | From Royal to BlackSuit: Understanding the Tactics and Impact of a Sophisticated Ransomware Strain | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-11-16 | 0 | The Mindset of a Penetration Tester | ||
Details | Website | 2024-11-16 | 14 | Building an Integrated Threat Intelligence Platform Using Python and Kibana | ||
Details | Website | 2024-11-16 | 0 | How Hackers Turn Your Information into a Weapon | ||
Details | Website | 2024-11-16 | 12 | Why Traditional Phishing Trainings fail and How Firewalls Fill the Gap | ||
Details | Website | 2024-11-16 | 0 | How to Implement CTI Strategies to Protect Your Small Business in 2025 | ||
Details | Website | 2024-11-16 | 1 | cybPython Packages and Libraries for Cybersecurity | ||
Details | Website | 2024-11-16 | 0 | What a second Trump term means for the future of ransomware | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-11-16 | 0 | Exploring the Essentials of Hacking, Virtual Machines, Linux, and Networking | ||
Details | Website | 2024-11-16 | 0 | GZR Observer Daily — Nov 16, 2024 | ||
Details | Website | 2024-11-16 | 0 | Cybersecurity — Get familiar with basic concepts….!!! | ||
Details | Website | 2024-11-16 | 1 | Top-rated VPN Low Prices | ||
Details | Website | 2024-11-16 | 0 | Here's What a Hacker Could Really Do With Access to Your Wi-Fi Router | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting |