Common Information
Type Value
Value
Malware - T1587.001
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may develop malware and malware components that can be used during targeting. Building malicious software can include the development of payloads, droppers, post-compromise tools, backdoors (including backdoored images), packers, C2 protocols, and the creation of infected removable media. Adversaries may develop malware to support their operations, creating a means for maintaining control of remote machines, evading defenses, and executing post-compromise behaviors.(Citation: Mandiant APT1)(Citation: Kaspersky Sofacy)(Citation: ActiveMalwareEnergy)(Citation: FBI Flash FIN7 USB) As with legitimate development efforts, different skill sets may be required for developing malware. The skills needed may be located in-house, or may need to be contracted out. Use of a contractor may be considered an extension of that adversary's malware development capabilities, provided the adversary plays a role in shaping requirements and maintains a degree of exclusivity to the malware. Some aspects of malware development, such as C2 protocol development, may require adversaries to obtain additional infrastructure. For example, malware developed that will communicate with Twitter for C2, may require use of [Web Services](https://attack.mitre.org/techniques/T1583/006).(Citation: FireEye APT29)
Details Published Attributes CTI Title
Details Website 2024-11-17 3 LetsDefend SOC Walkthrough | SOC145 — Ransomware Detected
Details Website 2024-11-17 1 Cheap Secure VPN Offers
Details Website 2024-11-17 1 Shop For Affordable VPN
Details Website 2024-11-17 1 Shop For Top-rated VPN
Details Website 2024-11-17 1 Unihost hardware firewall review
Details Website 2024-11-17 2 Phishing emails increasingly use SVG attachments to evade detection
Details Website 2024-11-16 1 A journey of .NET AOT reverse engineering
Details Website 2024-11-16 22 Hunter Lab Cyber Defenders
Details Website 2024-11-16 12 Instalação do MISP no Ubuntu 24.04
Details Website 2024-11-16 0 The Rising Threat of Cybercrime: How to Protect Yourself in an Increasingly Digital World
Details Website 2024-11-16 4 🔥 Cracking the Code: How to Install Acunetix v24.1 Cracked Version (Quick & Manual Methods!) 🔐
Details Website 2024-11-16 3 What Does Google’s Cybersecurity Forecast for 2025 Reveal?
Details Website 2024-11-16 90 From Royal to BlackSuit: Understanding the Tactics and Impact of a Sophisticated Ransomware Strain | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-16 0 The Mindset of a Penetration Tester
Details Website 2024-11-16 14 Building an Integrated Threat Intelligence Platform Using Python and Kibana
Details Website 2024-11-16 0 How Hackers Turn Your Information into a Weapon
Details Website 2024-11-16 12 Why Traditional Phishing Trainings fail and How Firewalls Fill the Gap
Details Website 2024-11-16 0 How to Implement CTI Strategies to Protect Your Small Business in 2025
Details Website 2024-11-16 1 cybPython Packages and Libraries for Cybersecurity
Details Website 2024-11-16 0 What a second Trump term means for the future of ransomware | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-16 0 Exploring the Essentials of Hacking, Virtual Machines, Linux, and Networking
Details Website 2024-11-16 0 GZR Observer Daily — Nov 16, 2024
Details Website 2024-11-16 0 Cybersecurity — Get familiar with basic concepts….!!!
Details Website 2024-11-16 1 Top-rated VPN Low Prices
Details Website 2024-11-16 0 Here's What a Hacker Could Really Do With Access to Your Wi-Fi Router | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting