Common Information
Type | Value |
---|---|
Value |
Malware - T1587.001 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may develop malware and malware components that can be used during targeting. Building malicious software can include the development of payloads, droppers, post-compromise tools, backdoors (including backdoored images), packers, C2 protocols, and the creation of infected removable media. Adversaries may develop malware to support their operations, creating a means for maintaining control of remote machines, evading defenses, and executing post-compromise behaviors.(Citation: Mandiant APT1)(Citation: Kaspersky Sofacy)(Citation: ActiveMalwareEnergy)(Citation: FBI Flash FIN7 USB) As with legitimate development efforts, different skill sets may be required for developing malware. The skills needed may be located in-house, or may need to be contracted out. Use of a contractor may be considered an extension of that adversary's malware development capabilities, provided the adversary plays a role in shaping requirements and maintains a degree of exclusivity to the malware. Some aspects of malware development, such as C2 protocol development, may require adversaries to obtain additional infrastructure. For example, malware developed that will communicate with Twitter for C2, may require use of [Web Services](https://attack.mitre.org/techniques/T1583/006).(Citation: FireEye APT29) |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-15 | 1 | Cybercriminals Exploit SEO Tricks to Lure Shoppers to Fake Online Stores | ||
Details | Website | 2024-11-15 | 1 | This 'wedding invitation' takes over your phone, steals data and money | #cybercrime | #infosec | National Cyber Security Consulting | ||
Details | Website | 2024-11-15 | 38 | Dark Web Profile: Cadet Blizzard | ||
Details | Website | 2024-11-15 | 2 | Essential Cyber Intel Brief: 11/15/2024 | ||
Details | Website | 2024-11-15 | 4 | Black Basta Ransomware Leveraging Social Engineering For Malware Deployment | ||
Details | Website | 2024-11-15 | 0 | AI in Cybersecurity: Balancing Innovation and the Rise of AI-Driven Threats | ||
Details | Website | 2024-11-15 | 0 | AI in Business Innovation vs AI in Evolving Cybersecurity | ||
Details | Website | 2024-11-15 | 20 | Hive0145 ataca a España, Alemania y Ucrania | ||
Details | Website | 2024-11-15 | 0 | The Future of Cybersecurity: A Focus on Zero Trust Architecture | ||
Details | Website | 2024-11-15 | 2 | Critical Laravel Vulnerability CVE-2024-52301 Allows Unauthorized Access | ||
Details | Website | 2024-11-15 | 0 | ViperSoftX: Tracking And Countering a Persistent Threat | ||
Details | Website | 2024-11-15 | 2 | ViperSoftX: Tracking And Countering a Persistent Threat - CUJO AI | ||
Details | Website | 2024-11-15 | 0 | Excerpts From an Email to My Dean | ||
Details | Website | 2024-11-15 | 1 | Threat Intelligence Snapshot: Week 46, 2024 | ||
Details | Website | 2024-11-15 | 12 | Fortifying Your Applications: An Exhaustive Guide to Defending Against Remote Code Execution (RCE)… | ||
Details | Website | 2024-11-15 | 4 | 4M+ WordPress Websites to Attacks, Following Plugin Vulnerability | ||
Details | Website | 2024-11-15 | 0 | Safeguarding Healthcare Organizations from IoMT Risks | ||
Details | Website | 2024-11-15 | 3 | CISA Warns of Actors Exploiting Two Palo Alto Networks Vulnerabilities | ||
Details | Website | 2024-11-15 | 8 | Sharing is Caring: BestieLoader Malware Analysis | ||
Details | Website | 2024-11-15 | 0 | BSI’s 2024 Cybersecurity Report: How Germany Is Battling Ransomware, APTs, and Election Security Challenges | ||
Details | Website | 2024-11-15 | 0 | Why IT Security Solutions in India Are Vital for Small and Medium Businesses | ||
Details | Website | 2024-11-15 | 0 | Locking Down Endpoints: The Key to Stopping Cyber Attacks | ||
Details | Website | 2024-11-15 | 7 | Today’s Top Cyber Intelligence Highlights — Nov 15, 2024 | ||
Details | Website | 2024-11-15 | 33 | DONOT's Attack On Maritime & Defense Manufacturing | ||
Details | Website | 2024-11-15 | 1 | Top 5 Malware Network Traffic Analysis Tools 2024. |