prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Exfiltration Over Web Service:Exfiltration to Cloud Storage | Empire can use Dropbox for data exfiltration. |
Exfiltration Over Web Service:Exfiltration to Cloud Storage | It has exfiltrated stolen data to the MEGA file sharing site. |
Exfiltration Over Web Service:Exfiltration to Cloud Storage | It has exfiltrated data to file sharing sites, including MEGA. |
Exfiltration Over Web Service:Exfiltration to Cloud Storage | HAMMERTOSS exfiltrates data by uploading it to accounts created by the actors on Web cloud storage providers for the adversaries to retrieve later. |
Exfiltration Over Web Service:Exfiltration to Cloud Storage | It has used cloud services, including OneDrive, for data exfiltration. |
Exfiltration Over Web Service:Exfiltration to Cloud Storage | It has exfiltrated stolen files and data to actor-controlled Blogspot accounts. |
Exfiltration Over Web Service:Exfiltration to Cloud Storage | It has used an uploader known as LUNCHMONEY that can exfiltrate files to Dropbox. |
Exfiltration Over Web Service:Exfiltration to Cloud Storage | It has exfiltrated data to Google Drive. |
Exfiltration Over Web Service:Exfiltration to Cloud Storage | Octopus has exfiltrated data to file sharing sites. |
Exfiltration Over Web Service:Exfiltration to Cloud Storage | During Operation Dream Job, It used a custom build of open-source command-line dbxcli to exfiltrate stolen data to Dropbox. |
Exfiltration Over Web Service:Exfiltration to Cloud Storage | It has exfiltrated stolen data to It-owned OneDrive and Dropbox accounts. |
Exfiltration Over Web Service:Exfiltration to Cloud Storage | RainyDay can use a file exfiltration tool to upload specific files to Dropbox. |
Exfiltration Over Web Service:Exfiltration to Cloud Storage | Rclone can exfiltrate data to cloud storage services such as Dropbox, Google Drive, Amazon S3, and MEGA. |
Exfiltration Over Web Service:Exfiltration to Cloud Storage | ROKRAT can send collected data to cloud storage services such as PCloud. |
Exfiltration Over Web Service:Exfiltration to Cloud Storage | It has exfiltrated stolen data to Dropbox. |
Exfiltration Over Web Service:Exfiltration to Cloud Storage | It has used WebDAV to upload stolen USB files to a cloud drive. It has also exfiltrated stolen files to OneDrive and 4shared. |
Exfiltration Over Web Service:Exfiltration to Cloud Storage | It has exfiltrated stolen victim data to various cloud storage providers. |
Exfiltration Over Web Service:Exfiltration to Cloud Storage | ItM has exfiltrated stolen data to Dropbox. |
Scheduled Transfer | ADVSTORESHELL collects, compresses, encrypts, and exfiltrates data to the C2 server every 10 minutes. |
Scheduled Transfer | Chrommme can set itself to sleep before requesting a new command from C2. |
Scheduled Transfer | Cobalt Strike can set its Beacon payload to reach out to the C2 server on an arbitrary and random interval. |
Scheduled Transfer | ComRAT has been programmed to sleep outside local business hours (9 to 5, Monday to Friday). |
Scheduled Transfer | Dipsind can be configured to only run during normal working hours, which would make its communications harder to distinguish from normal traffic. |
Scheduled Transfer | Flagpro has the ability to wait for a specified time interval between communicating with and executing commands from C2. |
Scheduled Transfer | It sent the victim computer identifier in a User-Agent string back to the C2 server every 10 minutes. |
Scheduled Transfer | jRAT can be configured to reconnect at certain intervals. |
Scheduled Transfer | Kazuar can sleep for a specific time and be set to communicate at specific intervals. |
Scheduled Transfer | LightNeuron can be configured to exfiltrate data during nighttime or working hours. |
Scheduled Transfer | Linfo creates a backdoor through which remote attackers can change the frequency at which compromised hosts contact remote C2 infrastructure. |
Scheduled Transfer | It sends stolen data to the C2 server every 10 minutes. |
Scheduled Transfer | POWERSTATS can sleep for a given number of seconds. |
Scheduled Transfer | ShadowPad has sent data back to C2 every 8 hours. |
Scheduled Transfer | Shark can pause C2 communications for a specified time. |
Scheduled Transfer | ShimRat can sleep when instructed to do so by the C2. |
Scheduled Transfer | TinyIt contacts its C2 based on a scheduled timing set in its configuration. |
Account Access Removal | It has removed a targeted organization's global admin accounts to lock the organization out of all access. |
Account Access Removal | LockerGoga has been observed changing account passwords and logging off current users. |
Account Access Removal | MegaCortex has changed user account passwords and logged users off the system. |
Account Access Removal | Meteor has the ability to change the password of local users on compromised hosts and can log off users. |
Data Destruction | It has used a custom secure delete function to make deleted files unrecoverable. |
Data Destruction | BlackEnergy 2 contains a "Destroy" plug-in that destroys data stored on victim hard drives by overwriting file contents. |
Data Destruction | CaddyWiper can work alphabetically through drives on a compromised system to take ownership of and overwrite all files. |
Data Destruction | Diavol can delete specified files from a targeted system. |
Data Destruction | It has used tools to delete files and folders from victims' desktops and profiles. |
Data Destruction | HermeticWiper can recursively wipe folders and files in Windows, Program Files, Program Files(x86), PerfLogs, Boot, System, Volume Information, and AppData folders using FSCTL_MOVE_FILE. HermeticWiper can also overwrite symbolic links and big files in My Documents and on the Desktop with random bytes. |
Data Destruction | Industroyer’s data wiper module clears registry keys and overwrites both ICS configuration and Windows files. |
Data Destruction | Kazuar can overwrite files with random data before deleting them. |
Data Destruction | KillDisk deletes system files to make the OS unbootable. KillDisk also targets and deletes files with 35 different file extensions. |
Data Destruction | It has deleted the target's systems and resources both on-premises and in the cloud. |
Data Destruction | It has used a custom secure delete function to overwrite file contents with data from heap memory. |
Data Destruction | Meteor can fill a victim's files and directories with zero-bytes in replacement of real content before deleting them. |
Data Destruction | Olympic Destroyer overwrites files locally and on remote shares. |
Data Destruction | PowerDuke has a command to write random data across a file and delete it. |
Data Destruction | Proxysvc can overwrite files indicated by the attacker before deleting them. |
Data Destruction | RawDisk was used in Shamoon to write to protected system locations such as the MBR and disk partitions in an effort to destroy data. |
Data Destruction | REvil has the capability to destroy files and folders. |
Data Destruction | It has used the BlackEnergy KillDisk component to overwrite files on Windows-based Human-Machine Interfaces. |
Data Destruction | SDelete deletes data in a way that makes it unrecoverable. |
Data Destruction | Shamoon attempts to overwrite operating system files and disk structures with image files. In a later variant, randomly generated data was used for data overwrites. |
Data Destruction | StoneDrill has a disk wiper module that targets files other than those in the Windows directory. |
Data Destruction | WhisperGate can corrupt files by overwriting the first 1 MB with 0xcc and appending random extensions. |
Data Destruction | Xbash has destroyed Linux-based databases as part of its ransomware capabilities. |
Data Encrypted for Impact | It has used Hermes ransomware to encrypt files with AES256. |
Data Encrypted for Impact | It used a ransomware called Encryptor RaaS to encrypt files on the targeted systems and provide a ransom note to the user. |
Data Encrypted for Impact | Avaddon encrypts the victim system using a combination of AES256 and RSA encryption schemes. |
Data Encrypted for Impact | AvosLocker has encrypted files and network resources using AES-256 and added an .avos, .avos2, or .AvosLinux extension to filenames. |
Data Encrypted for Impact | Babuk can use ChaCha8 and ECDH to encrypt data. |
Data Encrypted for Impact | Bad Rabbit has encrypted files and disks using AES-128-CBC and RSA-2048. |
Data Encrypted for Impact | BitPaymer can import a hard-coded RSA 1024-bit public key, generate a 128-bit RC4 key for each file, and encrypt the file in place, appending .locked to the filename. |
Data Encrypted for Impact | Black Basta can encrypt files with the ChaCha20 cypher and using a multithreaded process to increase speed. |
Data Encrypted for Impact | BlackCat has the ability to encrypt Windows devices, Linux devices, and VMWare instances. |
Data Encrypted for Impact | During C0015, the threat actors used Conti ransomware to encrypt a compromised network. |
Data Encrypted for Impact | During C0018, the threat actors used AvosLocker ransomware to encrypt files on the compromised network. |
Data Encrypted for Impact | Clop can encrypt files using AES, RSA, and RC4 and will add the ".clop" extension to encrypted files. |
Data Encrypted for Impact | Conti can use CreateIoCompletionPort(), PostQueuedCompletionStatus(), and GetQueuedCompletionPort() to rapidly encrypt files, excluding those with the extensions of .exe, .dll, and .lnk. It has used a different AES-256 encryption key per file with a bundled RAS-4096 public encryption key that is unique for each victim. Conti can use "Windows Restart Manager" to ensure files are unlocked and open for encryption. |
Data Encrypted for Impact | Cuba has the ability to encrypt system data and add the ".cuba" extension to encrypted files. |
Data Encrypted for Impact | DCSrv has encrypted drives using the core encryption mechanism from DiskCryptor. |
Data Encrypted for Impact | DEATHRANSOM can use public and private key pair encryption to encrypt files for ransom payment. |
Data Encrypted for Impact | Diavol has encrypted files using an RSA key though the CryptEncrypt API and has appended filenames with ".lock64". |
Data Encrypted for Impact | Egregor can encrypt all non-system files using a hybrid AES-RSA algorithm prior to displaying a ransom note. |
Data Encrypted for Impact | EKANS uses standard encryption library functions to encrypt files. |
Data Encrypted for Impact | It has encrypted virtual disk volumes on ESXi servers using a version of Darkside ransomware. |
Data Encrypted for Impact | It has deployed ransomware such as Ragnar Locker, White Rabbit, and attempted to execute Noberus on compromised networks. |
Data Encrypted for Impact | FIVEHANDS can use an embedded NTRU public key to encrypt data for ransom. |
Data Encrypted for Impact | HELLOKITTY can use an embedded RSA-2048 public key to encrypt victim data for ransom. |
Data Encrypted for Impact | It has encrypted domain-controlled systems using BitPaymer. |
Data Encrypted for Impact | JCry has encrypted files and demanded Bitcoin to decrypt those files. |
Data Encrypted for Impact | KillDisk has a ransomware component that encrypts files with an AES key that is also RSA-1028 encrypted. |
Data Encrypted for Impact | LockerGoga has encrypted files, including core Windows OS files, using RSA-OAEP MGF1 and then demanded Bitcoin be paid for the decryption key. |
Data Encrypted for Impact | It has used BitLocker and DiskCryptor to encrypt targeted workstations. |
Data Encrypted for Impact | Maze has disrupted systems by encrypting files on targeted machines, claiming to decrypt files if a ransom payment is made. Maze has used the ChaCha algorithm, based on Salsa20, and an RSA algorithm to encrypt files. |
Data Encrypted for Impact | MegaCortex has used the open-source library, Mbed Crypto, and generated AES keys to carry out the file encryption process. |
Data Encrypted for Impact | Netwalker can encrypt files on infected machines to extort victims. |
Data Encrypted for Impact | NotPetya encrypts user files and disk structures like the MBR with 2048-bit RSA. |
Data Encrypted for Impact | Pay2Key can encrypt data on victim's machines using RSA and AES algorithms in order to extort a ransom payment for decryption. |
Data Encrypted for Impact | Prestige has leveraged the CryptoPP C++ library to encrypt files on target systems using AES and appended filenames with .enc. |
Data Encrypted for Impact | ProLock can encrypt files on a compromised host with RC6, and encrypts the key with RSA-1024. |
Data Encrypted for Impact | Pysa has used RSA and AES-CBC encryption algorithm to encrypt a list of targeted file extensions. |
Data Encrypted for Impact | Ragnar Locker encrypts files on the local machine and mapped drives prior to displaying a note demanding a ransom. |
Data Encrypted for Impact | REvil can encrypt files on victim systems and demands a ransom to decrypt the files. |