Common Information
Type Value
Value
Trap - T1154
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description The <code>trap</code> command allows programs and shells to specify commands that will be executed upon receiving interrupt signals. A common situation is a script allowing for graceful termination and handling of common keyboard interrupts like <code>ctrl+c</code> and <code>ctrl+d</code>. Adversaries can use this to register code to be executed when the shell encounters specific interrupts either to gain execution or as a persistence mechanism. Trap commands are of the following format <code>trap 'command list' signals</code> where "command list" will be executed when "signals" are received. Detection: Trap commands must be registered for the shell or programs, so they appear in files. Monitoring files for suspicious or overly broad trap commands can narrow down suspicious behavior during an investigation. Monitor for suspicious processes executed through trap interrupts. Platforms: Linux, macOS Data Sources: File monitoring, Process Monitoring, Process command-line parameters Permissions Required: User, Administrator Remote Support: No
Details Published Attributes CTI Title
Details Website 2028-01-01 3 A Tour of the Worm
Details Website 2024-12-13 17 Rhysida Ransomware analysis - A painful sting to Insomniac Games — ShadowStackRE
Details Website 2024-11-17 0 Clicked on a Suspicious Link? Here’s What You Must Do Immediately!
Details Website 2024-11-17 0 AI Model Robustness: A New Frontier in Cybersecurity
Details Website 2024-11-17 0 Thousands of suspicious SIM cards active abroad to be blocked  | #cybercrime | #infosec | National Cyber Security Consulting
Details Website 2024-11-17 0 Don’t Hold Down The Ctrl Key Warning As New 2SP Cyber Attacks Emerge | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-11-17 1 Affordable VPN Low Prices
Details Website 2024-11-15 0 The Risks of AI Hearsay: Can Algorithms Be Truly Objective?
Details Website 2024-11-15 0 Strengthening Cyber Defenses with Deception Technology: Top Tools and Techniques
Details Website 2024-11-14 3 FakeBat Loader is Back With New Tactics and Payload –
Details Website 2024-11-14 1 Why I Created ScamSniper: One Too Many Scam Emails Later…
Details Website 2024-11-14 0 The Wild World of Cybersecurity in 2024: What You Need to Know
Details Website 2024-11-14 0 The Dark Side of Google Searches: How Simple keywords can Lead to Cyber Threats - Cybersecurity Insiders
Details Website 2024-11-13 0 Avoid the URL Phishing Trap: Why Your Business Needs Secure Links
Details Website 2024-11-13 0 How Global Cybercrime Rings Are Scamming Millions Daily — And What You Can Do To Protect Yourself | #cybercrime | #infosec | National Cyber Security Consulting
Details Website 2024-11-12 1115 US-CERT Vulnerability Summary for the Week of November 4, 2024 - RedPacket Security
Details Website 2024-11-12 0 When Your Safety Habits Become Security Risks
Details Website 2024-11-12 17 2024-11-04 CRON#TRAP (Emulated Linux Environments) Samples
Details Website 2024-11-12 1 Best Price On Local VPN
Details Website 2024-11-11 7 Don’t Fall for these Scams, Top Tips, Tricks & Insights to Keep You Safe & Secure in Web3 — Crypto…
Details Website 2024-11-11 11 EDR: Don’t mess with my config
Details Website 2024-11-11 0 Are You Googling This? You Could Be Walking Into a Cyber Trap
Details Website 2024-11-11 0 Catfish killer used my photo as bait for others – victim | #childpredator | #onlinepredator | #sextrafficing | National Cyber Security Consulting
Details Website 2024-11-11 5 A Trap for the Unwary: Honeypot Deployment on Kali Linux
Details Website 2024-11-11 0 These Six Words Could Make You a Hacker’s Target, SOPHOS Warns | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting