Common Information
Type | Value |
---|---|
Value |
Security Software Discovery - T1418.001 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may attempt to get a listing of security applications and configurations that are installed on a device. This may include things such as mobile security products. Adversaries may use the information from [Security Software Discovery](https://attack.mitre.org/techniques/T1418/001) during automated discovery to shape follow-on behaviors, including whether or not to fully infect the target and/or attempt specific actions. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2020-06-16 | 61 | Cobalt: tactics and tools update | ||
Details | Website | 2020-06-09 | 39 | RagnarLocker Ransomware Threatens to Release Confidential Information | McAfee Blog | ||
Details | Website | 2020-05-21 | 108 | No “Game over” for the Winnti Group | WeLiveSecurity | ||
Details | Website | 2020-05-09 | 29 | Lazarus group leverages Covid themed HWP Document | ||
Details | Website | 2020-05-01 | 53 | Tales From the Trenches; a Lockbit Ransomware Story | McAfee Blog | ||
Details | Website | 2020-04-29 | 83 | Compromised WordPress Sites Distribute Adwind RAT | blog | ||
Details | Website | 2020-04-23 | 85 | Following ESET’s discovery, a Monero mining botnet is disrupted | WeLiveSecurity | ||
Details | Website | 2020-03-05 | 125 | Guildma: The Devil drives electric | WeLiveSecurity | ||
Details | Website | 2019-10-01 | 82 | Head Fake: Tackling Disruptive Ransomware Attacks | Mandiant | ||
Details | Website | 2019-09-09 | 39 | ESET discovered an undocumented backdoor used by the infamous Stealth Falcon group | WeLiveSecurity | ||
Details | Website | 2019-07-08 | 188 | Malicious campaign targets South Korean users with backdoor‑laced torrents | WeLiveSecurity |