Common Information
Type | Value |
---|---|
Value |
Malware - T1587.001 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may develop malware and malware components that can be used during targeting. Building malicious software can include the development of payloads, droppers, post-compromise tools, backdoors (including backdoored images), packers, C2 protocols, and the creation of infected removable media. Adversaries may develop malware to support their operations, creating a means for maintaining control of remote machines, evading defenses, and executing post-compromise behaviors.(Citation: Mandiant APT1)(Citation: Kaspersky Sofacy)(Citation: ActiveMalwareEnergy)(Citation: FBI Flash FIN7 USB) As with legitimate development efforts, different skill sets may be required for developing malware. The skills needed may be located in-house, or may need to be contracted out. Use of a contractor may be considered an extension of that adversary's malware development capabilities, provided the adversary plays a role in shaping requirements and maintains a degree of exclusivity to the malware. Some aspects of malware development, such as C2 protocol development, may require adversaries to obtain additional infrastructure. For example, malware developed that will communicate with Twitter for C2, may require use of [Web Services](https://attack.mitre.org/techniques/T1583/006).(Citation: FireEye APT29) |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-16 | 0 | Cyber Security: Protecting the Digital World | ||
Details | Website | 2024-11-16 | 1 | High-speed VPN Low Prices | ||
Details | Website | 2024-11-16 | 1 | Affordable VPN Services For Sale | ||
Details | Website | 2024-11-16 | 1 | Streaming VPN Low Prices | ||
Details | Website | 2024-11-16 | 1 | Top-rated VPN Services For Sale | ||
Details | Website | 2024-11-16 | 27 | KQL KC7 — AzureCrest : Section 4 & 5 | ||
Details | Website | 2024-11-16 | 1 | Solid Security Pro Review | ||
Details | Website | 2024-11-16 | 1 | NSO Group used WhatsApp exploits even after Meta-owned company sued it - Security Affairs | ||
Details | Website | 2024-11-16 | 0 | Zero-Day Shenanigans: A Stark-Style Tech Tale | ||
Details | Website | 2024-11-16 | 54 | Silent Threat: How Red Team Tools EDRSilencer Can Disrupt Enterprises Endpoint Security Solutions | ||
Details | Website | 2024-11-16 | 0 | Certified Cyber Defender (CCD) Study Notes PDF | ||
Details | Website | 2024-11-16 | 0 | Cybersecurity: “Legitimate Background in Sri Lanka” | ||
Details | Website | 2024-11-16 | 0 | Best Practices for Maintaining Cybersecurity in a Home Office | ||
Details | Website | 2024-11-16 | 0 | Cybersecurity Snapshot: Five Eyes Rank 2023’s Most Frequently Exploited CVEs, While CSA Publishes Framework for AI System Audits | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting | ||
Details | Website | 2024-11-16 | 25 | BugBounty — Mastering the Basics (along with Resources)[Part-4] | ||
Details | Website | 2024-11-16 | 0 | Cybersecurity Tips for Digital Safety | ||
Details | Website | 2024-11-16 | 0 | What is the Safest And Cheapest VPN? Top Budget-Friendly Picks | ||
Details | Website | 2024-11-16 | 0 | How Internet Security Protects You from Cyber Threats | ||
Details | Website | 2024-11-16 | 0 | Which Day is Cheapest to Fly International? Uncover Savings! | ||
Details | Website | 2024-11-16 | 0 | Should I Get a VPN for Traveling?: Secure Journeys Await! | ||
Details | Website | 2024-11-16 | 0 | Explainable AI for Malware Hunting | ||
Details | Website | 2024-11-16 | 0 | Does VPN Work on United Flights? Unlock Connectivity! | ||
Details | Website | 2024-11-16 | 6 | Iranian Hackers Deploy WezRat Malware in Attacks Targeting Israeli Organizations - CyberSRC | ||
Details | Website | 2024-11-16 | 0 | Banking Industry Cyber Security Solutions | ||
Details | Website | 2024-11-16 | 1 | The Ultimate Cybersecurity Study Guide: Your Roadmap to Mastery |