Xworm Enters Through the Door Follina Left Open
Security researchers have identified a new wave of attacks using XWorm malware that exploits the Follina vulnerability. XWorm is a government-sponsored remote access trojan (RAT), the Follina vulnerability is a critical vulnerability in Microsoft Windows systems that was first disclosed in 2022.
Domains | Source | Last Update |
---|---|---|
huhuwarcanoefestival.com | SOCRadar | 2023-05-31 |
assignments.one | SOCRadar | 2023-05-31 |
barricks.org | SOCRadar | 2023-05-31 |
template.one | SOCRadar | 2023-05-31 |
tpaerospace.one | SOCRadar | 2023-05-31 |
codezian.com | SOCRadar | 2023-05-31 |
ftp.mgcpakistan.com | SOCRadar | 2023-05-31 |
schedule.one | SOCRadar | 2023-05-31 |
purepowerinc.net | SOCRadar | 2023-05-31 |
templa.one | SOCRadar | 2023-05-31 |
myvigyan.com | SOCRadar | 2023-05-31 |
kbowlingslaw.com | SOCRadar | 2023-05-31 |
kanaskanas.com | SOCRadar | 2023-05-31 |
stnicholaschurch.ca | SOCRadar | 2023-05-31 |
zaminkaran.ir | SOCRadar | 2023-05-31 |
invoice.one | SOCRadar | 2023-05-31 |
depotejarat.ir | SOCRadar | 2023-05-31 |
list.one | SOCRadar | 2023-05-31 |
four-quadrant.one | SOCRadar | 2023-05-31 |
direct-trojan.com | SOCRadar | 2023-05-31 |
Hashes | Source | Last Update |
---|---|---|
de30f2ba2d8916db5ce398ed580714e2a8e75376f31dc346b0e3c898ee0ae4cf | SOCRadar | 2023-05-31 |
b79ff504eb6ec509b8b6b870dc2f0113825d859b | SOCRadar | 2023-05-31 |
8a60cadc9c823b64a80dd294c54e8c428f7ad12f846c245d3f3df1ba49cf3c62 | SOCRadar | 2023-05-31 |
63d46c697ee100fbe7388416033ea0509130e12f144decb1a913e3dc8b82f6ba | SOCRadar | 2023-05-31 |
e1d34ad42938a777d80f3ee4c206de14021f13ab79600168b85894fdb0867b3e | SOCRadar | 2023-05-31 |
d9a1c97646872be823bce7e37325f9869daa5593f3ced37024dc5188243639be | SOCRadar | 2023-05-31 |
9bf99fc32dc69f213812c3c747e8dd41fef63ad0fd0aec01a6b399aeb10a166a | SOCRadar | 2023-05-31 |
bdc52f8983b7f034e86d1628efab5faf974e8c33ea9c3bcab0fd09ca462f8322 | SOCRadar | 2023-05-31 |
40a1bbf6cc034748781b8980771a288f300e2f79dfff9e4ac70c261b3fe96e67 | SOCRadar | 2023-05-31 |
9cd785dbcceced90590f87734b8a3dbc066a26bd90d4e4db9a480889731b6d29 | SOCRadar | 2023-05-31 |
78542b48745136d9e77896ec77c7613c4386ad81 | SOCRadar | 2023-05-31 |
35369894fad416d9b89df08dad0c0c1848e2bba5 | SOCRadar | 2023-05-31 |
28d6b3140a1935cd939e8a07266c43c0482e1fea80c65b7a49cf54356dcb58bc | SOCRadar | 2023-05-31 |
328a12fdd6b485362befb392925282451d65aa23482584a49dd5b0e126218df7 | SOCRadar | 2023-05-31 |
73dc35d1fa8d1e3147a5fe6056e01f89847441ec46175ba60b24a56b7fbdf2f9 | SOCRadar | 2023-05-31 |
07251deafd605437a25d51428aade79255036d49 | SOCRadar | 2023-05-31 |
adb237144a52fc610984bd5ae8501271c5eef8ff49eff0a9d02adf4a5e36ad3b | SOCRadar | 2023-05-31 |
656a325adc19ae5c66741fcea36e01d1bc27e5a97b800778938af37f41f811fd | SOCRadar | 2023-05-31 |
4fc40af3b2e3f96e8013a7187e5cb4ce1a00a9528823f789cb8aca09c51143c6 | SOCRadar | 2023-05-31 |
11510279023a5399f5af0495d55eba28 | SOCRadar | 2023-05-31 |
8a8c3fc54739248f595ef1941a8a47936ff45fd102d7e8d23e9d4c358d5a0d24 | SOCRadar | 2023-05-31 |
ef106973aa35c6a1e39e05c6dde63e421794faba9109a2a9cb2f9cebd363e053 | SOCRadar | 2023-05-31 |
66109a8b85766255fa950425c7962781b61c934f6926ecdb9158d50ffb533147 | SOCRadar | 2023-05-31 |
59d72ff91e94a2c762285cce3bcb3e94e8d14608c2eeecacdcd6fe720c3ad5f2 | SOCRadar | 2023-05-31 |
b5661f5b3219090ba387814b7cf8d8095cfaaca9 | SOCRadar | 2023-05-31 |
6965d759dce865196f7e06ced845f0e387c4b9f63081b394c62a3c286356b411 | SOCRadar | 2023-05-31 |
7ddb331b1930f9cd3fd7e6de43119db0bbcb20bf6d23b1fbb60db12b0d983c2f | SOCRadar | 2023-05-31 |
1005feeff2ecfe6e53f53f63a2364de8418863d83e256322ca82e939dae95e45 | SOCRadar | 2023-05-31 |
16fe58bfaee64cce35f0f9470ccfd136ee9916f5befb7e599e21cff53d4506d5 | SOCRadar | 2023-05-31 |
4b9d11ad0a32fd2d76d4d8e9256f13df37b7628df9eb50b21dd11016d0a4ca22 | SOCRadar | 2023-05-31 |
ad13c0c0dfa76575218c52bd2a378ed363a0f0d5ce5b14626ee496ce52248e7a | SOCRadar | 2023-05-31 |
702631c91a8fe86b2e75f4a6b089d00b7762ff1b | SOCRadar | 2023-05-31 |
43f4eaefc6e71f8d30b2e3749475af51ce4d6740546706113cc4785b4410a14c | SOCRadar | 2023-05-31 |
814187405811f7d0e9593ae1ddf0a43ccbd9e8a37bee7688178487eeef3860c6 | SOCRadar | 2023-05-31 |
d4fdc73d563605cadf1ded9b644f21e8dae0f65870890357e5bc554bbc66bf74 | SOCRadar | 2023-05-31 |
8276104d8d47def986063b8fbafd82ad5f4cd23862ff9ede1231cefb35115a1b | SOCRadar | 2023-05-31 |
4f527d0d250607bcab4af2ba9783c2ce8e62fdc73fd52a33771d3b6df73c49e6 | SOCRadar | 2023-05-31 |
c8e326756cc1f95ff51ffe26471df16f4131fdbca2ed14f8c8d14e21010058b9 | SOCRadar | 2023-05-31 |
2ba7d799ee3ae3755fa3dc8921b3c57924fe90cb3df2b9bb02119a5eaa77399c | SOCRadar | 2023-05-31 |
df3f2f97383d4ae897b3197e8d07f474f651a053 | SOCRadar | 2023-05-31 |
15212428deeeabcd5b11a1b8383c654476a3ea1b19b804e4aca606fac285387f | SOCRadar | 2023-05-31 |
9c9f69ccc3d0063347ae372d82dc6082 | SOCRadar | 2023-05-31 |
f0942afa08c509f58b4b9f02cae4581ebf712f2f1763f1a2ffb8f9d964e335ae | SOCRadar | 2023-05-31 |
70352ca74fa8d31d6b1779b56c4fb16834d4e4c6 | SOCRadar | 2023-05-31 |
5ff75749c2d51435855afc23501105d259ed8213cd24085e1164f056ac2c2e05 | SOCRadar | 2023-05-31 |
54a55fcf5f574e9171aaf9af8aeb58c94d327dae48ed6a586393ed63aeb6841a | SOCRadar | 2023-05-31 |
97c6223e869e8bee159767d7b1f3562e747cf4b995800122edd1fc70df7a70b7 | SOCRadar | 2023-05-31 |
1b5ec95836cd52efa853ba3fa76d0849e4094b32048952a7ac0676d34f251776 | SOCRadar | 2023-05-31 |
ae5935f9e4bf6596d5b83a2d4325ab3f454867ebbad2c7f2d19694b676f23dd2 | SOCRadar | 2023-05-31 |
3c3e24c01a675b3b17bee9c8f560a33c3ecca8c44442fd5b3dd8c0f4429f279b | SOCRadar | 2023-05-31 |
43905bff6b7bdac9698c9109764e7ac3ffddddf59b9d278c648dfd8e6b1403ac | SOCRadar | 2023-05-31 |
6a1bac8fbb30f4b98da7f7ac190fb971bf91d15b41748bc63fd9cbddb96ef189 | SOCRadar | 2023-05-31 |
01407e324f0b8090467eded47a97acbdb3ef42d0f12820cd57b0bc5b87ffe510 | SOCRadar | 2023-05-31 |
1ae5589b6c358ff11a9555a7265ba5f0709be7a865e2cf51af04eb17b2a2ce18 | SOCRadar | 2023-05-31 |
a748f4e526c1a5fed7e57887ef951e451236ee3ad39cf6161d18e5c2230aca0b | SOCRadar | 2023-05-31 |
1791dd7a7c7d0688fac3626d57221ada157c57572cf9ed46ad4cab3d28dbaf91 | SOCRadar | 2023-05-31 |
3c45a698e45b8dbb1df206dec08c8792087619e54c0c9fc0f064bd9a47a84f16 | SOCRadar | 2023-05-31 |
b6b61511ea7a36015f8002922bc20ad1f42234ab | SOCRadar | 2023-05-31 |
75819879049e80de6376f146430e63a53fc4291d21f3db930ea872b82d07c77a | SOCRadar | 2023-05-31 |
cffb01d11245792b5498c051603a279b0ad1930d | SOCRadar | 2023-05-31 |
d92b31ddf25e30e7cc34239bf45c7ec913b713c4 | SOCRadar | 2023-05-31 |
bfebd31a5ae7bb79bcf7070d1d4b3496888446cff66301c4ff1f78f06d8aa601 | SOCRadar | 2023-05-31 |
e5a33b42b71f8ac1a5371888d11a0066b49a7f0c25fe74857fa07fb0c9bdff27 | SOCRadar | 2023-05-31 |
dfb8ba6c2ac264ac73f6d2c440d2c0744c043f1d8435bb798fef5380a649fc4e | SOCRadar | 2023-05-31 |
0afe54c016f4770ad2a8690ef9a06b1f53804215 | SOCRadar | 2023-05-31 |
41c68aecada65a15f4a8bea52cc25033a1b73ff7340cd3865d55c61ded566e81 | SOCRadar | 2023-05-31 |
222b1a425f75fc7998a0bbabd52277cd82bb5ec50b75f4fb67568b3b754f5406 | SOCRadar | 2023-05-31 |
6f3491d165ac055811596f2d64ad107247e19b333d79316c0ac96c93787c1e1a | SOCRadar | 2023-05-31 |
2bfae4b7bf4dd42b7f588699952b17260376da61c530d61eceb07783b8b93331 | SOCRadar | 2023-05-31 |
db1185f24c56cadec1c85a33b0efeb2d803ff00abf4c9df1e00d860683068415 | SOCRadar | 2023-05-31 |
a5ae1b866c5d8a7b3eb8427e686cf5d0264b809ed4491b47346542bf69caab65 | SOCRadar | 2023-05-31 |
9419d7a578338a714f976fb2b9eb320049422ec7059cedcc4a8baf144c4df41b | SOCRadar | 2023-05-31 |
b5da32a803b31d769d4d330e9c923d8c2dc5da1f | SOCRadar | 2023-05-31 |
0ff4aa2eb1cd681e3b77348af935bcfc56f4b7cae48bcd826000b7ff2b82b671 | SOCRadar | 2023-05-31 |
c9047fbd8b733a3f21fb28d261c9fa4eb089335a6457c6a47636cf51a86323f2 | SOCRadar | 2023-05-31 |
3acac1bb2a028372aad7f36510028823a36c5d63eeb3a72e0c5804adec204fce | SOCRadar | 2023-05-31 |
6ced4f98cd34cc2ea725273d566ea7b7 | SOCRadar | 2023-05-31 |
ae9821a3b0f44bf6be21aaa71274c9fef3b22b9e | SOCRadar | 2023-05-31 |
4de07012796040395015b6acfab5996cebb2099bfb362da9b303246580bc41b7 | SOCRadar | 2023-05-31 |
fbc916f065157cc5a13f22453c19f7dfecc3c228 | SOCRadar | 2023-05-31 |
efd195d8ef795e123bb1c1faee77459a781c003e | SOCRadar | 2023-05-31 |
90cb95264d0b555fe9a760de404196ac183a958c9cc1aad0689598e35fbb0c3b | SOCRadar | 2023-05-31 |
e6bb0019f6aa3583c42c8e197631af09f07bdc8739442893cc8086f298929e33 | SOCRadar | 2023-05-31 |
04ce543c01a4bace549f6be2d77eb62567c7b65edbbaebc0d00d760425dcd578 | SOCRadar | 2023-05-31 |
b4dd3e93356329c076c0d2cd5ac30a806daf46006bdb81199355952e9d949424 | SOCRadar | 2023-05-31 |
7a7e76553dafc2c1b6a0d804aa540ab7a80fd77b | SOCRadar | 2023-05-31 |
fc54858ae2e48c9dbe562f68107d1928 | SOCRadar | 2023-05-31 |
6e116713f7dbf7001384a4aa15ba193cf9f9f4e2e6685ead326317a78623a57e | SOCRadar | 2023-05-31 |
c443d754153180ebeee1106d5eecf1024e063413f3f92a29c6c95a08c6f2e633 | SOCRadar | 2023-05-31 |
35b9fd8856edd443a4e27727c54dd135e26220bd | SOCRadar | 2023-05-31 |
62156e5cb9fb9ede3150c39e17999d0242a8b1f9e704e09514734891beb0f78d | SOCRadar | 2023-05-31 |
ef5a7fc0c2a301b57f0723af97faea37374b91eb3b72d8ca6ffc09a095998bb2 | SOCRadar | 2023-05-31 |
c9c522936a3b964e6926bfb73adca91f0091094964ce7a768418a705ec871502 | SOCRadar | 2023-05-31 |
377fe4e55b6dde063c15c41389f3bb5aacf95443874bdcc0d02a44d6bd793780 | SOCRadar | 2023-05-31 |
e318c01fcd1f711fd063e845ca2431012086658f | SOCRadar | 2023-05-31 |
2725a14da90a6bcbfde174df8b0e95179b617aa14ec07a2d1fc71000310ad913 | SOCRadar | 2023-05-31 |
ed67cb8a6c44871ec6ffb6517d77b5e84f00b399 | SOCRadar | 2023-05-31 |
2db74e81e02dbb8b97a8d0ba9df53aaea21ce0fba15c1ecf84847489d9469141 | SOCRadar | 2023-05-31 |
2f5304b657b07839525d7d3ef50f192cde2bcab15b8fde2a6ff264f6412290df | SOCRadar | 2023-05-31 |
7ef65d74cf65128bb37a7b21729a1406 | SOCRadar | 2023-05-31 |
06e3abeed1bc98ed56d5587e9732c9d39ea41879c250dff68ce8815953fcf7ad | SOCRadar | 2023-05-31 |
207b87124f8abe2226251eb84f033e8642418fb1 | SOCRadar | 2023-05-31 |
6d86f36b2220e8d9580e6708856fa74f37f7aa35db1a708e17ecacf0de3d5d2e | SOCRadar | 2023-05-31 |
292b5a8c61eb79633590b6b13c0b41388ccad3535b55ed822b887d6d15d61be4 | SOCRadar | 2023-05-31 |
13bf9005b428f81a2f9b85fab4b52983ccf12c77582803bce9d6fcea635e78f3 | SOCRadar | 2023-05-31 |
0d17a7f60f7f5a6d5e00ed23635dd4998a5df307 | SOCRadar | 2023-05-31 |
4746941996305743c9d0bcb96ed4b2b930355cd8782098aa5600b42131314308 | SOCRadar | 2023-05-31 |
6005529195e6afac29d8c62091ee7990e92b7a80b391b03c34c8a8fbf019fce6 | SOCRadar | 2023-05-31 |
d909a2914e3706fcc141aa5d24afddd06595774d67a2900e256fbc65ff12c64f | SOCRadar | 2023-05-31 |
b3c3599ea42551a06aaefc917b72410833b52adb9f64f7cfe0bde4b17603bd43 | SOCRadar | 2023-05-31 |
30659ba72c4977c6017c45a45909442417c5bc07e7f3a2392b352d29494cb226 | SOCRadar | 2023-05-31 |
2283c3be89eb6cbf0e1579a6e398a5d1f81a50793fcca22fbc6cbdab53dc2d31 | SOCRadar | 2023-05-31 |
23b950b209cb16b084cad87c006dc7691c60dc40 | SOCRadar | 2023-05-31 |
15f8a879534143a4169c6ecd1d56132d1908443d | SOCRadar | 2023-05-31 |
9322af1c1772c02304576f64617aae1bf178297617f635d4d036ef1d317b1c7f | SOCRadar | 2023-05-31 |
3102e1238ac6ad9f97e4faaf2b24f6df4caedde9abcf7a5c04c309a38069494e | SOCRadar | 2023-05-31 |
4b9d2f4b80ef9578711c569524694905012a8080 | SOCRadar | 2023-05-31 |
8cb57a7e1e929c48716974edf55df2e9456d1443 | SOCRadar | 2023-05-31 |
0b0c70ee1612139cf7a83847cca805689aec9fbcc587a7ef8f26aa4fb9e71295 | SOCRadar | 2023-05-31 |
d0f0380f117ed5f00295d07a7f5d90a993e6f74f0f315c9ab74b146970b5061d | SOCRadar | 2023-05-31 |
ed7d361424df5f61f4f9e0a589a158cb750dec76f1d97b0e396a00c41f7ce167 | SOCRadar | 2023-05-31 |
1a517a25d55aae6af13d025b1d1edee7fb185b90155f30e195f58cbf4c6b36fe | SOCRadar | 2023-05-31 |
63adbabf3dfde36e745f4c42979260a2e946848c | SOCRadar | 2023-05-31 |
66c045eb61f2e589b1e27db284c9c518e5d0e87dcff25b096eede7047f7dd207 | SOCRadar | 2023-05-31 |
a447fee5372ccb5a4efc5daf48f497d921a7dc01d3d4f24dd3c4319da9f55ae4 | SOCRadar | 2023-05-31 |
9a7061a539333e9f833a589197a60258ebb820bba5f1f29d5b31453e8e392d0f | SOCRadar | 2023-05-31 |
55781d120a91b71da2c51ed3657a73e819493f38 | SOCRadar | 2023-05-31 |
c59f95d9c9ff830d33fb73c2a8b0ee8be6619b6823fc23210600b9fa88a8c9d4 | SOCRadar | 2023-05-31 |
e2b70c8552b38a6b8722d614254202c346190c6a187984a4450223eb536aaf4b | SOCRadar | 2023-05-31 |
f3e6621928875a322ee7230ccf186bdaa5609118c4a6d1c2f4026adfb8e88744 | SOCRadar | 2023-05-31 |
ec614c9bd5d20f97871c22b04c3e2abb95366aa5f6e5c6a4148d35ec7b8d0d62 | SOCRadar | 2023-05-31 |
ce4611b2d2e326ff7b37acdc10636f0dcd9439ba | SOCRadar | 2023-05-31 |
Ipv4s | Source | Last Update |
---|---|---|
212.193.30.230 | SOCRadar | 2023-05-31 |
5.42.199.235 | SOCRadar | 2023-05-31 |
95.216.102.32 | SOCRadar | 2023-05-31 |
154.12.234.207 | SOCRadar | 2023-05-31 |
109.107.179.248 | SOCRadar | 2023-05-31 |
193.149.185.229 | SOCRadar | 2023-05-31 |
198.23.172.90 | SOCRadar | 2023-05-31 |
165.22.48.183 | SOCRadar | 2023-05-31 |
209.126.2.34 | SOCRadar | 2023-05-31 |
172.245.45.213 | SOCRadar | 2023-05-31 |
212.87.204.83 | SOCRadar | 2023-05-31 |
45.133.174.122 | SOCRadar | 2023-05-31 |
179.43.187.241 | SOCRadar | 2023-05-31 |
209.126.83.213 | SOCRadar | 2023-05-31 |
154.12.250.38 | SOCRadar | 2023-05-31 |
Cves | Source | Last Update |
---|---|---|
CVE-2022-30190 | SOCRadar | 2023-05-31 |
Emails | Source | Last Update |
---|
Domains | Insert Date |
---|
Techniques: 9
ID | Name | Description | |
T1189 | Drive-by Compromise | Adversaries may gain access to a system through a user visiting a website over the normal course of browsing. With this technique, the user's web browser is typically targeted for exploitation, but adversaries may also use compromised websites for non-exploitation behavior such as acquiring Application Access Token. | |
T1190 | Exploit Public-Facing Application | Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network. The weakness in the system can be a software bug, a temporary glitch, or a misconfiguration. | |
T1133 | External Remote Services | Adversaries may leverage external-facing remote services to initially access and/or persist within a network. Remote services such as VPNs, Citrix, and other access mechanisms allow users to connect to internal enterprise network resources from external locations. There are often remote service gateways that manage connections and credential authentication for these services. Services such as Windows Remote Management and VNC can also be used externally. | |
T1200 | Hardware Additions | Adversaries may introduce computer accessories, networking hardware, or other computing devices into a system or network that can be used as a vector to gain access. Rather than just connecting and distributing payloads via removable storage (i.e. Replication Through Removable Media), more robust hardware additions can be used to introduce new functionalities and/or features into a system that can then be abused. | |
T1566 | Phishing | Adversaries may send phishing messages to gain access to victim systems. All forms of phishing are electronically delivered social engineering. Phishing can be targeted, known as spearphishing. In spearphishing, a specific individual, company, or industry will be targeted by the adversary. More generally, adversaries can conduct non-targeted phishing, such as in mass malware spam campaigns. | |
.001 | Spearphishing Attachment | Adversaries may send spearphishing emails with a malicious attachment in an attempt to gain access to victim systems. Spearphishing attachment is a specific variant of spearphishing. Spearphishing attachment is different from other forms of spearphishing in that it employs the use of malware attached to an email. All forms of spearphishing are electronically delivered social engineering targeted at a specific individual, company, or industry. In this scenario, adversaries attach a file to the spearphishing email and usually rely upon User Execution to gain execution. Spearphishing may also involve social engineering techniques, such as posing as a trusted source. | |
.002 | Spearphishing Link | Adversaries may send spearphishing emails with a malicious link in an attempt to gain access to victim systems. Spearphishing with a link is a specific variant of spearphishing. It is different from other forms of spearphishing in that it employs the use of links to download malware contained in email, instead of attaching malicious files to the email itself, to avoid defenses that may inspect email attachments. Spearphishing may also involve social engineering techniques, such as posing as a trusted source. | |
.003 | Spearphishing via Service | Adversaries may send spearphishing messages via third-party services in an attempt to gain access to victim systems. Spearphishing via service is a specific variant of spearphishing. It is different from other forms of spearphishing in that it employs the use of third party services rather than directly via enterprise email channels. | |
T1091 | Replication Through Removable Media | Adversaries may move onto systems, possibly those on disconnected or air-gapped networks, by copying malware to removable media and taking advantage of Autorun features when the media is inserted into a system and executes. In the case of Lateral Movement, this may occur through modification of executable files stored on removable media or by copying malware and renaming it to look like a legitimate file to trick users into executing it on a separate system. In the case of Initial Access, this may occur through manual manipulation of the media, modification of systems used to initially format the media, or modification to the media's firmware itself. | |
T1195 | Supply Chain Compromise | Adversaries may manipulate products or product delivery mechanisms prior to receipt by a final consumer for the purpose of data or system compromise. | |
.001 | Compromise Software Dependencies and Development Tools | Adversaries may manipulate software dependencies and development tools prior to receipt by a final consumer for the purpose of data or system compromise. Applications often depend on external software to function properly. Popular open source projects that are used as dependencies in many applications may be targeted as a means to add malicious code to users of the dependency. | |
.002 | Compromise Software Supply Chain | Adversaries may manipulate application software prior to receipt by a final consumer for the purpose of data or system compromise. Supply chain compromise of software can take place in a number of ways, including manipulation of the application source code, manipulation of the update/distribution mechanism for that software, or replacing compiled releases with a modified version. | |
.003 | Compromise Hardware Supply Chain | Adversaries may manipulate hardware components in products prior to receipt by a final consumer for the purpose of data or system compromise. By modifying hardware or firmware in the supply chain, adversaries can insert a backdoor into consumer networks that may be difficult to detect and give the adversary a high degree of control over the system. Hardware backdoors may be inserted into various devices, such as servers, workstations, network infrastructure, or peripherals. | |
T1199 | Trusted Relationship | Adversaries may breach or otherwise leverage organizations who have access to intended victims. Access through trusted third party relationship abuses an existing connection that may not be protected or receives less scrutiny than standard mechanisms of gaining access to a network. | |
T1078 | Valid Accounts | Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Compromised credentials may be used to bypass access controls placed on various resources on systems within the network and may even be used for persistent access to remote systems and externally available services, such as VPNs, Outlook Web Access, network devices, and remote desktop. Compromised credentials may also grant an adversary increased privilege to specific systems or access to restricted areas of the network. Adversaries may choose not to use malware or tools in conjunction with the legitimate access those credentials provide to make it harder to detect their presence. | |
.001 | Default Accounts | Adversaries may obtain and abuse credentials of a default account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Default accounts are those that are built-into an OS, such as the Guest or Administrator accounts on Windows systems. Default accounts also include default factory/provider set accounts on other types of systems, software, or devices, including the root user account in AWS and the default service account in Kubernetes. | |
.002 | Domain Accounts | Adversaries may obtain and abuse credentials of a domain account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Domain accounts are those managed by Active Directory Domain Services where access and permissions are configured across systems and services that are part of that domain. Domain accounts can cover users, administrators, and services. | |
.003 | Local Accounts | Adversaries may obtain and abuse credentials of a local account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Local accounts are those configured by an organization for use by users, remote support, services, or for administration on a single system or service. | |
.004 | Cloud Accounts | Adversaries may obtain and abuse credentials of a cloud account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Cloud accounts are those created and configured by an organization for use by users, remote support, services, or for administration of resources within a cloud service provider or SaaS application. In some cases, cloud accounts may be federated with traditional identity management systems, such as Windows Active Directory. |
Malicious links in emails, leading to unsecured websites
Links to compromised forms that request users to enter sensitive credentials
Emails of an urgent nature, albeit likely containing wording and grammatical errors
Flag phishing attempts – Once your employees have identified phishing attempts, they must flag the phishing emails by:
Forwarding emails to an internal cybersecurity team for further action
Moving emails directly to a spam folder for internal security review
Blocking sender email addresses used in previous phishing attempts
Submit phishing reports – You can also establish a security policy for employees to report phishing emails to relevant cybersecurity regulators, including:
The US Computer Emergency and Readiness Team (US-CERT), which partners with the Anti-Phishing Working Group (APWG)
Google’s Safe Browsing phishing reporting tool
Federal Trade Commission’s (FTC) fraud reporting tool
FBI’s internet crime reporting tool
Establishing a security policy for your employees to report phishing attacks is essential to the malware remediation process.
File Name | Description | Actions |
---|---|---|
12.ATIP_Analysis Report on Follina.CVE-2022-30190.Vulnerability_20220627.pdf | Follina Report |
APT Name | Aliases | Target Countries | Source Countries | Total IOCs |
---|