Common Information
Type Value
Value
Malware - T1587.001
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may develop malware and malware components that can be used during targeting. Building malicious software can include the development of payloads, droppers, post-compromise tools, backdoors (including backdoored images), packers, C2 protocols, and the creation of infected removable media. Adversaries may develop malware to support their operations, creating a means for maintaining control of remote machines, evading defenses, and executing post-compromise behaviors.(Citation: Mandiant APT1)(Citation: Kaspersky Sofacy)(Citation: ActiveMalwareEnergy)(Citation: FBI Flash FIN7 USB) As with legitimate development efforts, different skill sets may be required for developing malware. The skills needed may be located in-house, or may need to be contracted out. Use of a contractor may be considered an extension of that adversary's malware development capabilities, provided the adversary plays a role in shaping requirements and maintains a degree of exclusivity to the malware. Some aspects of malware development, such as C2 protocol development, may require adversaries to obtain additional infrastructure. For example, malware developed that will communicate with Twitter for C2, may require use of [Web Services](https://attack.mitre.org/techniques/T1583/006).(Citation: FireEye APT29)
Details Published Attributes CTI Title
Details Website 2024-11-15 1 Cybercriminals Exploit SEO Tricks to Lure Shoppers to Fake Online Stores
Details Website 2024-11-15 1 This 'wedding invitation' takes over your phone, steals data and money | #cybercrime | #infosec | National Cyber Security Consulting
Details Website 2024-11-15 38 Dark Web Profile: Cadet Blizzard
Details Website 2024-11-15 2 Essential Cyber Intel Brief: 11/15/2024
Details Website 2024-11-15 4 Black Basta Ransomware Leveraging Social Engineering For Malware Deployment
Details Website 2024-11-15 0 AI in Cybersecurity: Balancing Innovation and the Rise of AI-Driven Threats
Details Website 2024-11-15 0 AI in Business Innovation vs AI in Evolving Cybersecurity
Details Website 2024-11-15 20 Hive0145 ataca a España, Alemania y Ucrania
Details Website 2024-11-15 0 The Future of Cybersecurity: A Focus on Zero Trust Architecture
Details Website 2024-11-15 2 Critical Laravel Vulnerability CVE-2024-52301 Allows Unauthorized Access
Details Website 2024-11-15 0 ViperSoftX: Tracking And Countering a Persistent Threat
Details Website 2024-11-15 2 ViperSoftX: Tracking And Countering a Persistent Threat - CUJO AI
Details Website 2024-11-15 0 Excerpts From an Email to My Dean
Details Website 2024-11-15 1 Threat Intelligence Snapshot: Week 46, 2024
Details Website 2024-11-15 12 Fortifying Your Applications: An Exhaustive Guide to Defending Against Remote Code Execution (RCE)…
Details Website 2024-11-15 4 4M+ WordPress Websites to Attacks, Following Plugin Vulnerability
Details Website 2024-11-15 0 Safeguarding Healthcare Organizations from IoMT Risks
Details Website 2024-11-15 3 CISA Warns of Actors Exploiting Two Palo Alto Networks Vulnerabilities
Details Website 2024-11-15 8 Sharing is Caring: BestieLoader Malware Analysis
Details Website 2024-11-15 0 BSI’s 2024 Cybersecurity Report: How Germany Is Battling Ransomware, APTs, and Election Security Challenges
Details Website 2024-11-15 0 Why IT Security Solutions in India Are Vital for Small and Medium Businesses
Details Website 2024-11-15 0 Locking Down Endpoints: The Key to Stopping Cyber Attacks
Details Website 2024-11-15 7 Today’s Top Cyber Intelligence Highlights — Nov 15, 2024
Details Website 2024-11-15 33 DONOT's Attack On Maritime & Defense Manufacturing
Details Website 2024-11-15 1 Top 5 Malware Network Traffic Analysis Tools 2024.