Usage-Triggered Execution (T1546.015)
MITRE, ATT&CK Jeremy Pickett MITRE, ATT&CK Jeremy Pickett

Usage-Triggered Execution (T1546.015)

MITRE ATT&CK's Usage-Triggered Execution (T1546.004) refers to adversaries leveraging software that executes code in response to user activity, allowing the persistent execution of malicious payloads triggered by specific conditions or user actions such as mouse clicks or keyboard presses. This technique exploits legitimate features of the operating system or installed software, which can include the use of hooks or monitoring capabilities provided by tools like the Windows Task Scheduler or autostart extensibility points. Technical engineers need to be aware of indicators such as irregular use of these mechanisms, unexplained system hooks, or unexpected registry modifications to detect and mitigate such stealthy persistence strategies.

Read More
User Execution (T1204)
MITRE, ATT&CK Jeremy Pickett MITRE, ATT&CK Jeremy Pickett

User Execution (T1204)

The MITRE ATT&CK technique "User Execution" (ID: T1204) involves adversaries relying on a user's action to execute malicious payloads, often through tactics such as spear-phishing emails, malicious links, or drive-by downloads. This technique capitalizes on social engineering methods to prompt users to open files, run software, or click on deceptive links that subsequently lead to the execution of the attacker's code. Detection measures for infosec engineers include monitoring for unusual file execution patterns, scrutinizing email attachments and URLs for malicious indicators, and implementing robust user training programs to mitigate susceptibility to such exploits.

Read More
Video Capture (T1125)
MITRE, ATT&CK Jeremy Pickett MITRE, ATT&CK Jeremy Pickett

Video Capture (T1125)

The MITRE ATT&CK technique T1125, known as Video Capture, involves adversaries using software or scripts to capture video recordings from compromised systems, typically via the webcam. This technique can be employed to gather sensitive information, monitor victim activities, or coerce individuals, leveraging publicly available tools like VLC or platform-specific APIs for Windows and macOS to activate and record from the webcam. Defenders can detect such activities through abnormal video device usage patterns, unexpected process invocations, and monitoring for access to multimedia APIs.

Read More