How Malicious Actors Abuse Native Linux Tools in Their Attacks
Tags
Common Information
Type | Value |
---|---|
UUID | 025e3632-154b-4cbe-a938-19fb69a0eb4d |
Fingerprint | bc1519589937b781 |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | Sept. 8, 2022, midnight |
Added to db | Oct. 15, 2024, 4:08 p.m. |
Last updated | Nov. 17, 2024, 6:56 p.m. |
Headline | How Malicious Actors Abuse Native Linux Tools in Attacks |
Title | How Malicious Actors Abuse Native Linux Tools in Their Attacks |
Detected Hints/Tags/Attributes | 69/1/7 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 397 | cve-2021-44228 |
|
Details | IPv4 | 1441 | 127.0.0.1 |
|
Details | MITRE ATT&CK Techniques | 627 | T1027 |
|
Details | MITRE ATT&CK Techniques | 15 | T1003.008 |
|
Details | MITRE ATT&CK Techniques | 44 | T1053.003 |
|
Details | MITRE ATT&CK Techniques | 433 | T1057 |
|
Details | MITRE ATT&CK Techniques | 94 | T1564.001 |