Boot or Logon Initialization Scripts (T1037)
Jeremy Pickett Jeremy Pickett

Boot or Logon Initialization Scripts (T1037)

The MITRE ATT&CK technique Boot or Logon Initialization Scripts (T1037) involves adversaries leveraging scripts that are executed during the system boot or user logon processes to establish persistence. These scripts can be configured on Windows through mechanisms such as Group Policy Objects, logon scripts, or in Unix-like systems via shell scripts located in directories like `/etc/init.d/`. Technical infosec engineers may find it noteworthy that detection strategies often include monitoring changes to these script locations and corresponding configurations, as well as correlating execution events to identify suspicious behavior indicative of malicious activity.

Read More
Unsecured Credentials (T1552.001)
Jeremy Pickett Jeremy Pickett

Unsecured Credentials (T1552.001)

MITRE ATT&CK technique T1552, Unsecured Credentials, involves the acquisition of credentials from platforms where they are inadequately protected, such as in plaintext storage, embedded within source code, or improperly configured credential management systems. Adversaries leverage this technique to extract authentication details, allowing unauthorized access and privilege escalation within targeted systems. Infosec engineers should particularly scrutinize credentials in local files and environment variables, ensure robust encryption practices, and regularly audit source code repositories for inadvertent exposure of sensitive information.

Read More
Boot or Logon Autostart Execution (T1547)
Jeremy Pickett Jeremy Pickett

Boot or Logon Autostart Execution (T1547)

The MITRE ATT&CK technique "Boot or Logon Autostart Execution" (T1547) refers to methods adversaries use to execute malicious code automatically during the system boot or logon process. This technique exploits various mechanisms, such as modifying the Windows Registry, creating scheduled tasks, or appending malicious scripts to system startup folders, to achieve persistence. For technical infosec engineers, an understanding of how adversaries utilize these autostart extensibility points (ASEPs) is crucial for detecting and mitigating unauthorized access and ensuring robust endpoint security.

Read More
Usage-Triggered Execution (T1546.015)
MITRE, ATT&CK Jeremy Pickett MITRE, ATT&CK Jeremy Pickett

Usage-Triggered Execution (T1546.015)

MITRE ATT&CK's Usage-Triggered Execution (T1546.004) refers to adversaries leveraging software that executes code in response to user activity, allowing the persistent execution of malicious payloads triggered by specific conditions or user actions such as mouse clicks or keyboard presses. This technique exploits legitimate features of the operating system or installed software, which can include the use of hooks or monitoring capabilities provided by tools like the Windows Task Scheduler or autostart extensibility points. Technical engineers need to be aware of indicators such as irregular use of these mechanisms, unexplained system hooks, or unexpected registry modifications to detect and mitigate such stealthy persistence strategies.

Read More
—User Account Control (T1548.002)
Jeremy Pickett Jeremy Pickett

—User Account Control (T1548.002)

User Account Control (UAC) is a security feature in Windows operating systems aimed at preventing unauthorized changes by prompting for elevated privileges. Adversaries can exploit UAC to execute code with higher privileges without triggering a prompt, by abusing built-in Windows tools such as `eventvwr.exe` or creating malicious DLLs that undermine the integrity of UAC checks. Techniques to bypass UAC can be critical for gaining persistence and escalated privileges on compromised systems, often leveraging registry modifications or hijacking Auto-elevate executables.

Read More
AUTOMATED COLLECTION (T1119)
Jeremy Pickett Jeremy Pickett

AUTOMATED COLLECTION (T1119)

The MITRE ATT&CK technique "Automated Collection" (ID: T1119) pertains to adversaries employing automated mechanisms to gather data from remote systems, often using scripts or specialized tools to expedite exfiltration. This technique leverages scheduled tasks, services, or malware capabilities to systematically seek and collect targeted information such as files, system information, or credentials, which can then be transferred to command and control servers without manual intervention. Of particular interest to infosec engineers are the detection strategies, including monitoring unusual script executions, anomalous file access patterns, and unexpected network traffic indicative of data staging or transmission.

Read More
User Execution (T1204)
MITRE, ATT&CK Jeremy Pickett MITRE, ATT&CK Jeremy Pickett

User Execution (T1204)

The MITRE ATT&CK technique "User Execution" (ID: T1204) involves adversaries relying on a user's action to execute malicious payloads, often through tactics such as spear-phishing emails, malicious links, or drive-by downloads. This technique capitalizes on social engineering methods to prompt users to open files, run software, or click on deceptive links that subsequently lead to the execution of the attacker's code. Detection measures for infosec engineers include monitoring for unusual file execution patterns, scrutinizing email attachments and URLs for malicious indicators, and implementing robust user training programs to mitigate susceptibility to such exploits.

Read More
Audio Capture (T1123)
Jeremy Pickett Jeremy Pickett

Audio Capture (T1123)

The MITRE ATT&CK technique "Audio Capture" (T1123) involves adversaries using malware or malicious tools to surreptitiously record audio through the microphones of compromised systems. By leveraging API calls or system functions on Windows (e.g., winmm.dll) or macOS/Linux platforms, attackers capture sensitive conversations or ambient sounds, potentially leading to the extraction of confidential information or environmental context. Detection strategies include monitoring for unusual microphone activity, usage of recording software, and unexpected changes in audio hardware configurations.

Read More
Video Capture (T1125)
MITRE, ATT&CK Jeremy Pickett MITRE, ATT&CK Jeremy Pickett

Video Capture (T1125)

The MITRE ATT&CK technique T1125, known as Video Capture, involves adversaries using software or scripts to capture video recordings from compromised systems, typically via the webcam. This technique can be employed to gather sensitive information, monitor victim activities, or coerce individuals, leveraging publicly available tools like VLC or platform-specific APIs for Windows and macOS to activate and record from the webcam. Defenders can detect such activities through abnormal video device usage patterns, unexpected process invocations, and monitoring for access to multimedia APIs.

Read More
Boot or Logon Initialization Scripts (T1037)
Jeremy Pickett Jeremy Pickett

Boot or Logon Initialization Scripts (T1037)

The MITRE ATT&CK framework is a comprehensive knowledge base of adversary tactics and techniques based on real-world observations. The "Boot or Logon Initialization Scripts" technique falls under Persistence, involving scripts that run during system boot or user logon to maintain access upon reboots or logins.

Read More
Browser Extensions (T1176) v2
Jeremy Pickett Jeremy Pickett

Browser Extensions (T1176) v2

The MITRE ATT&CK technique "Browser Extensions" (Technique ID: T1176) refers to the misuse of browser extensions to maintain persistence, execute malicious code, or exfiltrate data. This technique leverages high-level permissions within the user's browsing environment.

Read More
Unauthorized User Scan (T1012) v2
Jeremy Pickett Jeremy Pickett

Unauthorized User Scan (T1012) v2

Unauthorized User Scan involves unauthorized users conducting scans to gather information or identify vulnerabilities in a target system or network

Read More
Browser Session Hijacking (T1185) v2
Jeremy Pickett Jeremy Pickett

Browser Session Hijacking (T1185) v2

Browser Session Hijacking, also known as "Session Hijacking" is a type of cyber attack where an attacker takes over a user’s session without consent.

Read More
BITS JOBS (T1197) v2
Jeremy Pickett Jeremy Pickett

BITS JOBS (T1197) v2

BITS (Background Intelligent Transfer Service) Jobs is an abused Windows feature enabling asynchronous, prioritized, and throttled transfers between machines via HTTP or SMB. It's leveraged by adversaries for malicious activities including persistence and execution.

Read More
Two-Factor Fake Attempts (T1621) v2
Jeremy Pickett Jeremy Pickett

Two-Factor Fake Attempts (T1621) v2

The MITRE ATT&CK technique "Two-Factor Authentication Request Generation" (T1621) involves adversaries generating fake two-factor authentication (2FA) requests to coerce or trick users into disclosing their temporary authentication codes. This technique typically exploits social engineering or the lack of user familiarity with legitimate 2FA processes, leading to unauthorized access even in systems protected by multi-factor authentication. Technical infosec engineers may find interest in mitigating this threat through user education, enhancement of 2FA response mechanisms (e.g., requiring additional context or verification steps), and employing adaptive authentication techniques that consider behavioral anomalies.

Read More
Brute Force (T1110) v2
Jeremy Pickett Jeremy Pickett

Brute Force (T1110) v2

The MITRE ATT&CK technique Brute Force (T1110) involves an adversary systematically attempting multiple passwords or passphrases against a user account to gain unauthorized access. This technique can exploit both online interfaces and offline password hashes, leveraging automated tools to execute widespread authentication attempts efficiently. Notable characteristics relevant to infosec engineers include detection challenges related to distinguishing normal traffic from attack attempts, as well as the critical need to implement account lockout policies, rate limiting, and multi-factor authentication to mitigate these attacks.

Read More