
Dynamic Resolution: Domain Generation Algorithms, Sub …
DGAs can take the form of apparently random or "gibberish" strings (ex: istgmxdejdnxuyla.ru) when they construct domain names by generating each letter. Alternatively, some DGAs …
MITRE ATT&CK®
MITRE ATT&CK ® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for …
Data Obfuscation: Junk Data, Sub-technique T1001.001 - MITRE …
Mar 15, 2020 · By adding random or meaningless data to the protocols used for command and control, adversaries can prevent trivial methods for decoding, deciphering, or otherwise …
Disk Wipe: Disk Content Wipe, Sub-technique T1561.001 - MITRE …
To wipe disk content, adversaries may acquire direct access to the hard drive in order to overwrite arbitrarily sized portions of disk with random data. [2] Adversaries have also been observed …
Dynamic Resolution, Technique T1568 - Enterprise | MITRE …
Adversaries may dynamically establish connections to command and control infrastructure to evade common detections and remediations. This may be achieved by using malware that …
KillDisk, Software S0607 | MITRE ATT&CK®
KillDisk is a disk-wiping tool designed to overwrite files with random data to render the OS unbootable. It was first observed as a component of BlackEnergy malware during cyber …
Lockscreen Bypass, Technique T1461 - Mobile | MITRE ATT&CK®
Both iOS and Android partly mitigate this attack by requiring the device’s passcode rather than biometrics to unlock the device after every device restart, and after a set or random amount of …
Password Policies, Mitigation M1027 - MITRE ATT&CK®
Jun 6, 2019 · Microsoft Local Administrator Password Solution (LAPS): Enforce random, unique admin passwords. Linux/macOS: PAM Modules (pam_pwquality, pam_tally2, pam_faillock): …
Virtualization/Sandbox Evasion, Technique T1497 - MITRE …
Adversaries may employ various means to detect and avoid virtualization and analysis environments. This may include changing behaviors based on the results of checks for the …
Compromise Infrastructure: Domains, Sub-technique T1584.001 ...
Adversaries may hijack domains and/or subdomains that can be used during targeting. Domain registration hijacking is the act of changing the registration of a domain name without the …