Common Information
Type Value
Value
Malware - T1587.001
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may develop malware and malware components that can be used during targeting. Building malicious software can include the development of payloads, droppers, post-compromise tools, backdoors (including backdoored images), packers, C2 protocols, and the creation of infected removable media. Adversaries may develop malware to support their operations, creating a means for maintaining control of remote machines, evading defenses, and executing post-compromise behaviors.(Citation: Mandiant APT1)(Citation: Kaspersky Sofacy)(Citation: ActiveMalwareEnergy)(Citation: FBI Flash FIN7 USB) As with legitimate development efforts, different skill sets may be required for developing malware. The skills needed may be located in-house, or may need to be contracted out. Use of a contractor may be considered an extension of that adversary's malware development capabilities, provided the adversary plays a role in shaping requirements and maintains a degree of exclusivity to the malware. Some aspects of malware development, such as C2 protocol development, may require adversaries to obtain additional infrastructure. For example, malware developed that will communicate with Twitter for C2, may require use of [Web Services](https://attack.mitre.org/techniques/T1583/006).(Citation: FireEye APT29)
Details Published Attributes CTI Title
Details Website 2024-11-15 0 Understanding Social Engineering Cyberattacks: A Growing Threat
Details Website 2024-11-15 0 HPE security advisory (AV24-660)
Details Website 2024-11-15 1 Malicious QR codes sent in the mail deliver malware
Details Website 2024-11-15 0 Microsoft Edge security advisory (AV24-659)
Details Website 2024-11-15 7 Enhancing Wazuh Efficiency with AI: Meet the New AI Analyst in SOCFortress CoPilot
Details Website 2024-11-15 1 Malicious QR codes sent in the mail deliver malware | Malwarebytes
Details Website 2024-11-15 0 Announcing Akinsuru Pamela
Details Website 2024-11-15 2 WhatsApp wedding invitations are scamming people, hacking phones. Here's how to stay safe | #cybercrime | #infosec | National Cyber Security Consulting
Details Website 2024-11-15 0 New Glove Stealer Malware Bypasses Google Chrome's App-Bound to Steal Data
Details Website 2024-11-15 0 Windows Fundamentals
Details Website 2024-11-15 87 Babble Babble Babble Babble Babble Babble BabbleLoader
Details Website 2024-11-15 87 Babble Babble Babble Babble Babble Babble BabbleLoader
Details Website 2024-11-15 2 Critical TP-Link DHCP Vulnerability Let Attackers Execute Remote Code
Details Website 2024-11-15 0 How Hackers Turn Your Information into a Weapon
Details Website 2024-11-15 0 Unwanted Opera GX - Is it Malware? Easy Removal Guide –
Details Website 2024-11-15 0 Expert warns construction industry on costly ransomware attacks | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-11-15 0 🚨 Known Brands, Government Domains, and More Hijacked via Sitting Ducks Attacks! 🚨
Details Website 2024-11-15 0 🚨New Glove Infostealer Malware Bypasses Chrome’s Cookie Encryption: A Growing Threat 🚨
Details Website 2024-11-15 2 🚨 Critical Plugin Flaw Exposed 4 Million WordPress Websites to Takeover 🚨
Details Website 2024-11-15 7 Shapeshifters: The Nature of Leaked Data
Details Website 2024-11-15 1 Buy Secure VPN Now
Details Website 2024-11-15 1 How Human Rights Can Create Vulnerability: Lessons from Cybersecurity and the Media’s Role
Details Website 2024-11-15 4 New Remcos RAT Activity Detection: Phishing Campaign Spreading a Novel Fileless Malware Variant - SOC Prime
Details Website 2024-11-15 1 Chinese SilkSpecter Hackers Attacking Black Friday Shoppers
Details Website 2024-11-15 2 The True Cost of Ignoring Cybersecurity: Why Small Businesses Are Prime Targets