Common Information
Type Value
Value
Trap - T1154
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description The <code>trap</code> command allows programs and shells to specify commands that will be executed upon receiving interrupt signals. A common situation is a script allowing for graceful termination and handling of common keyboard interrupts like <code>ctrl+c</code> and <code>ctrl+d</code>. Adversaries can use this to register code to be executed when the shell encounters specific interrupts either to gain execution or as a persistence mechanism. Trap commands are of the following format <code>trap 'command list' signals</code> where "command list" will be executed when "signals" are received. Detection: Trap commands must be registered for the shell or programs, so they appear in files. Monitoring files for suspicious or overly broad trap commands can narrow down suspicious behavior during an investigation. Monitor for suspicious processes executed through trap interrupts. Platforms: Linux, macOS Data Sources: File monitoring, Process Monitoring, Process command-line parameters Permissions Required: User, Administrator Remote Support: No
Details Published Attributes CTI Title
Details Website 2024-10-10 0 Unraveling an SBLC Scam: A Red Threat Cyber Security (RTCS) Case Study
Details Website 2024-10-10 0 Today’s Top Cyber Intelligence Highlights — Oct 10, 2024
Details Website 2024-10-10 0 Two never-before-seen tools, from same group, infect air-gapped devices | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
Details Website 2024-10-10 0 The Day a Hidden Danger Was Spotted: How One Engineer Saved the Internet from a Silent Attack
Details Website 2024-10-10 0
Details Website 2024-10-09 2 Alarm Management Enhancements
Details Website 2024-10-09 6 Cyber Briefing: 2024.10.09
Details Website 2024-10-09 0 How Much Money Have Indians Lost To Cybercrime? The Staggering Sum Will Blow Your Mind | #cybercrime | #infosec | National Cyber Security Consulting
Details Website 2024-10-09 0 Inside the Dark Web: How to Explore the Internet’s Hidden Underworld Without Getting Burned
Details Website 2024-10-09 1 CEO Scams: How to Identify, Avoid, and Protect Your Business
Details Website 2024-10-08 0 Weapons Are Passé, Criminals Use Fear, Greed To Rob You | #cybercrime | #infosec | National Cyber Security Consulting
Details Website 2024-10-08 0 Mukesh Ambani, Virat Kohli, and Ronaldo: How Scammers Use Deepfakes to Promote Fake Gaming Apps - CloudSEK News
Details Website 2024-10-07 2 A CISO Blueprint for an Effective Board Narrative
Details Website 2024-10-07 1 How this Indian cybersecurity company created a new AI tool to detect deepfakes – Firstpost | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-10-07 4 How Russian hackers used deepfake nude “generator” sites to spread malware – Firstpost | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
Details Website 2024-10-05 0 Hacking: The art of Exploitation
Details Website 2024-10-05 0 Shadows of Secrecy: Forging the FBI’s Cryptographic Shield in the Battle for Hidden Truths
Details Website 2024-10-05 0 These 'fake' trading apps on your iPhones, Android smartphones are helping hackers to steal your money | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
Details Website 2024-10-04 1 Aspiring Hitman Trapped by Parody Website | Job Search Turns Deadly
Details Website 2024-10-04 0 DoJ, Microsoft Seize 100 Russian Phishing Sites Targeting US | #cybercrime | #infosec | National Cyber Security Consulting
Details Website 2024-10-03 0 The Dark Side of Public Wi-Fi: How Much Information Are You Giving Away Without Knowing It?
Details Website 2024-10-03 1 Evaluating Mitigations & Vulnerabilities in Chrome
Details Website 2024-10-03 0 The Day After: From Chaos to Control
Details Website 2024-10-03 6 Everything About Security
Details Website 2024-10-03 38 perfctl: A Stealthy Malware Targeting Millions of Linux Servers