Common Information
Type | Value |
---|---|
Value |
Trap - T1154 |
Category | Attack-Pattern |
Type | Mitre-Enterprise-Attack-Attack-Pattern |
Misp Type | Cluster |
Description | The <code>trap</code> command allows programs and shells to specify commands that will be executed upon receiving interrupt signals. A common situation is a script allowing for graceful termination and handling of common keyboard interrupts like <code>ctrl+c</code> and <code>ctrl+d</code>. Adversaries can use this to register code to be executed when the shell encounters specific interrupts either to gain execution or as a persistence mechanism. Trap commands are of the following format <code>trap 'command list' signals</code> where "command list" will be executed when "signals" are received. Detection: Trap commands must be registered for the shell or programs, so they appear in files. Monitoring files for suspicious or overly broad trap commands can narrow down suspicious behavior during an investigation. Monitor for suspicious processes executed through trap interrupts. Platforms: Linux, macOS Data Sources: File monitoring, Process Monitoring, Process command-line parameters Permissions Required: User, Administrator Remote Support: No |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2028-01-01 | 3 | A Tour of the Worm | ||
Details | Website | 2024-12-13 | 17 | Rhysida Ransomware analysis - A painful sting to Insomniac Games — ShadowStackRE | ||
Details | Website | 2024-11-17 | 0 | Clicked on a Suspicious Link? Here’s What You Must Do Immediately! | ||
Details | Website | 2024-11-17 | 0 | AI Model Robustness: A New Frontier in Cybersecurity | ||
Details | Website | 2024-11-17 | 0 | Thousands of suspicious SIM cards active abroad to be blocked | #cybercrime | #infosec | National Cyber Security Consulting | ||
Details | Website | 2024-11-17 | 0 | Don’t Hold Down The Ctrl Key Warning As New 2SP Cyber Attacks Emerge | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting | ||
Details | Website | 2024-11-17 | 1 | Affordable VPN Low Prices | ||
Details | Website | 2024-11-15 | 0 | The Risks of AI Hearsay: Can Algorithms Be Truly Objective? | ||
Details | Website | 2024-11-15 | 0 | Strengthening Cyber Defenses with Deception Technology: Top Tools and Techniques | ||
Details | Website | 2024-11-14 | 3 | FakeBat Loader is Back With New Tactics and Payload – | ||
Details | Website | 2024-11-14 | 1 | Why I Created ScamSniper: One Too Many Scam Emails Later… | ||
Details | Website | 2024-11-14 | 0 | The Wild World of Cybersecurity in 2024: What You Need to Know | ||
Details | Website | 2024-11-14 | 0 | The Dark Side of Google Searches: How Simple keywords can Lead to Cyber Threats - Cybersecurity Insiders | ||
Details | Website | 2024-11-13 | 0 | Avoid the URL Phishing Trap: Why Your Business Needs Secure Links | ||
Details | Website | 2024-11-13 | 0 | How Global Cybercrime Rings Are Scamming Millions Daily — And What You Can Do To Protect Yourself | #cybercrime | #infosec | National Cyber Security Consulting | ||
Details | Website | 2024-11-12 | 1115 | US-CERT Vulnerability Summary for the Week of November 4, 2024 - RedPacket Security | ||
Details | Website | 2024-11-12 | 0 | When Your Safety Habits Become Security Risks | ||
Details | Website | 2024-11-12 | 17 | 2024-11-04 CRON#TRAP (Emulated Linux Environments) Samples | ||
Details | Website | 2024-11-12 | 1 | Best Price On Local VPN | ||
Details | Website | 2024-11-11 | 7 | Don’t Fall for these Scams, Top Tips, Tricks & Insights to Keep You Safe & Secure in Web3 — Crypto… | ||
Details | Website | 2024-11-11 | 11 | EDR: Don’t mess with my config | ||
Details | Website | 2024-11-11 | 0 | Are You Googling This? You Could Be Walking Into a Cyber Trap | ||
Details | Website | 2024-11-11 | 0 | Catfish killer used my photo as bait for others – victim | #childpredator | #onlinepredator | #sextrafficing | National Cyber Security Consulting | ||
Details | Website | 2024-11-11 | 5 | A Trap for the Unwary: Honeypot Deployment on Kali Linux | ||
Details | Website | 2024-11-11 | 0 | These Six Words Could Make You a Hacker’s Target, SOPHOS Warns | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting |