prompt
stringclasses
508 values
procedure
stringlengths
20
478
Active Scanning:Scanning IP Blocks
It has scanned specific lists of target IP addresses.
Active Scanning:Vulnerability Scanning
It has performed large-scale scans in an attempt to find vulnerable servers.
Active Scanning:Vulnerability Scanning
It has conducted widespread scanning of target environments to identify vulnerabilities for exploit.
Active Scanning:Vulnerability Scanning
It has used publicly accessible DNS logging services to identify servers vulnerable to Log4j (CVE 2021-44228).
Active Scanning:Vulnerability Scanning
It has scanned targeted systems for vulnerable Citrix and Microsoft Exchange services.
Active Scanning:Vulnerability Scanning
It has scanned for vulnerabilities in the public-facing servers of their targets.
Active Scanning:Vulnerability Scanning
It has conducted widespread scanning to identify public-facing systems vulnerable to CVE-2021-44228 in Log4j and ProxyShell vulnerabilities; CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065 in on-premises MS Exchange Servers; and CVE-2018-13379 in Fortinet FortiOS SSL VPNs.
Active Scanning:Vulnerability Scanning
It has scanned network infrastructure for vulnerabilities as part of its operational planning.
Active Scanning:Vulnerability Scanning
It has scanned for vulnerabilities in IoT devices and other related resources such as the Docker API.
Active Scanning:Vulnerability Scanning
It has performed vulnerability scans of the target server.
Active Scanning:Wordlist Scanning
It has used DirBuster and GoBuster to brute force web directories and DNS subdomains.
Gather Victim Host Information:Software
It has inserted a malicious script within compromised websites to collect potential victim information such as browser type, system language, Flash Player version, and other data.
Gather Victim Host Information:Software
It has captured the user-agent strings from visitors to their phishing sites.
Gather Victim Host Information:Software
It has researched software code to enable supply-chain operations, most notably for the 2017 NotPetya attack. It also collected a list of computers using specific software as part of its targeting efforts.
Gather Victim Host Information:Client Configurations
It has interacted with Office 365 tenants to gather details regarding target's environments.
Gather Victim Identity Information
It has conducted targeted surveillance against activists and bloggers.
Gather Victim Identity Information
It has researched employees to target for social engineering attacks.
Gather Victim Identity Information
It has identified specific potential victims at targeted organizations.
Gather Victim Identity Information
It has gathered detailed information of target employees to enhance their social engineering lures.
Gather Victim Identity Information
It has acquired mobile phone numbers of potential targets, possibly for mobile malware or additional phishing operations.
Gather Victim Identity Information
For Operation Dream Job, It conducted extensive reconnaissance research on potential targets.
Gather Victim Identity Information
During Operation Wocao, threat actors targeted people based on their organizational roles and privileges.
Gather Victim Identity Information:Credentials
It has harvested user's login credentials.
Gather Victim Identity Information:Credentials
During C0027, It sent phishing messages via SMS to steal credentials.
Gather Victim Identity Information:Credentials
It has collected credentials for the target organization from previous breaches for use in brute force attacks.
Gather Victim Identity Information:Credentials
It has gathered user identities and credentials to gain initial access to a victim's organization; the group has also called an organization's help desk to reset a target's credentials.
Gather Victim Identity Information:Credentials
It has collected compromised credentials to use for targeting efforts.
Gather Victim Identity Information:Credentials
It gathered credentials from two victims that they then attempted to validate across 75 different websites. It has also collected credentials from over 900 Fortinet VPN servers in the US, Europe, and Israel.
Gather Victim Identity Information:Credentials
For the SolarWinds Compromise, It conducted credential theft operations to obtain credentials to be used for access to victim environments.
Gather Victim Identity Information:Email Addresses
AADInternals can check for the existence of user email addresses using public Microsoft APIs.
Gather Victim Identity Information:Email Addresses
It has collected e-mail addresses for activists and bloggers in order to target them with spyware.
Gather Victim Identity Information:Email Addresses
It has gathered targeted individuals' e-mail addresses through open source research and website contact forms.
Gather Victim Identity Information:Email Addresses
It has collected e-mail addresses for users they intended to target.
Gather Victim Identity Information:Email Addresses
It has targeted executives, human resources staff, and IT personnel for spearphishing.
Gather Victim Identity Information:Email Addresses
It has collected valid email addresses that were subsequently used in spearphishing campaigns.
Gather Victim Identity Information:Email Addresses
It has gathered employee email addresses, including personal accounts, for social engineering and initial access efforts.
Gather Victim Identity Information:Email Addresses
It collected email addresses belonging to various departments of a targeted organization which were used in follow-on phishing campaigns.
Gather Victim Identity Information:Email Addresses
It has identified high-value email accounts in academia, journalism, NGO's, foreign policy, and national security for targeting.
Gather Victim Identity Information:Email Addresses
It has specifically targeted government agency employees with spearphishing e-mails.
Gather Victim Identity Information:Email Addresses
It has obtained valid emails addresses while conducting research against target organizations that were subsequently used in spearphishing campaigns.
Gather Victim Identity Information:Email Addresses
It has collected e-mail addresses from targeted organizations from open Internet searches.
Gather Victim Identity Information:Email Addresses
It has used spoofed company emails that were acquired from email clients on previously infected hosts to target other individuals.
Gather Victim Identity Information:Employee Names
It has collected victim employee name information.
Gather Victim Identity Information:Employee Names
It's research of potential victim organizations included the identification and collection of employee information.
Gather Victim Identity Information:Employee Names
It has collected lists of names for individuals from targeted organizations.
Gather Victim Network Information
It gathered the fully qualified domain names (FQDNs) for targeted Exchange servers in the victim's environment.
Gather Victim Network Information:Domain Properties
AADInternals can gather information about a tenant’s domains using public Microsoft APIs.
Gather Victim Network Information:Domain Properties
It conducted technical reconnaissance of the Parliament of Georgia's official internet domain prior to its 2019 attack.
Gather Victim Network Information:Network Topology
It has searched for infrastructure that can provide remote access to an environment for targeting efforts.
Gather Victim Network Information:IP Addresses
It has limited its watering hole attacks to specific IP address ranges.
Gather Victim Network Information:IP Addresses
It has obtained IP addresses for publicly-accessible Exchange servers.
Gather Victim Network Information:IP Addresses
It has captured the IP addresses of visitors to their phishing sites.
Gather Victim Org Information
It has collected victim organization information including but not limited to organization hierarchy, functions, press releases, and others.
Gather Victim Org Information
It has studied publicly available information about a targeted organization to tailor spearphishing efforts against specific departments and/or individuals.
Gather Victim Org Information
For Operation Dream Job, It gathered victim organization information to identify specific targets.
Gather Victim Org Information:Determine Physical Locations
It has collected location information from visitors to their phishing sites.
Gather Victim Org Information:Business Relationships
It has collected open source information to identify relationships between organizations for targeting purposes.
Gather Victim Org Information:Business Relationships
It has gathered detailed knowledge of an organization's supply chain relationships.
Gather Victim Org Information:Business Relationships
In preparation for its attack against the 2018 Winter Olympics, It conducted online research of partner organizations listed on an official PyeongChang Olympics partnership site.
Gather Victim Org Information:Identify Roles
It has identified executives, HR, and IT staff at victim organizations for further targeting.
Gather Victim Org Information:Identify Roles
It has gathered detailed knowledge of team structures within a target organization.
Gather Victim Org Information:Identify Roles
During Operation Dream Job, It targeted specific individuals within an organization with tailored job vacancy announcements.
Phishing for Information
It has used spearphishing to compromise credentials.
Phishing for Information
It has used a combination of credential phishing and social engineering to capture one-time-password (OTP) codes.
Phishing for Information
ItM targeted presidential campaign staffers with credential phishing e-mails.
Phishing for Information:Spearphishing Service
During C0027, It sent Telegram messages impersonating IT personnel to harvest credentials.
Phishing for Information:Spearphishing Attachment
It has used spearphishing with Microsoft Office attachments to enable harvesting of user credentials.
Phishing for Information:Spearphishing Attachment
It has crafted generic lures for spam campaigns to collect emails and credentials for targeting efforts.
Phishing for Information:Spearphishing Attachment
It has sent e-mails with malicious attachments that lead victims to credential harvesting websites.
Phishing for Information:Spearphishing Link
AADInternals can send phishing emails containing malicious links designed to collect users’ credentials.
Phishing for Information:Spearphishing Link
It has conducted credential phishing campaigns with embedded links to attacker-controlled domains.
Phishing for Information:Spearphishing Link
It has used malicious links to direct users to web pages designed to harvest credentials.
Phishing for Information:Spearphishing Link
It has used spearphishing with PDF attachments containing malicious links that redirected to credential harvesting websites.
Phishing for Information:Spearphishing Link
It has used links in e-mail to steal account information.
Phishing for Information:Spearphishing Link
It has used SMS and email messages with links designed to steal credentials or track victims.
Phishing for Information:Spearphishing Link
It has delivered web bugs to profile their intended targets.
Phishing for Information:Spearphishing Link
It has used embedded image tags (known as web bugs) with unique, per-recipient tracking links in their emails for the purpose of identifying which recipients opened messages.
Phishing for Information:Spearphishing Link
It has crafted spearphishing emails with hyperlinks designed to trick unwitting recipients into revealing their account credentials.
Phishing for Information:Spearphishing Link
It has sent e-mails with malicious links to credential harvesting websites.
Phishing for Information:Spearphishing Link
It has used links in e-mails to direct victims to credential harvesting websites designed to appear like the targeted organization's login page.
Phishing for Information:Spearphishing Link
SMOKEDHAM has been delivered via malicious links in phishing emails.
Phishing for Information:Spearphishing Link
ItM has used web beacons in e-mails to track hits to attacker-controlled URL's.
Active Scanning:Scanning IP Blocks
It has scanned specific lists of target IP addresses.
Active Scanning:Vulnerability Scanning
It has performed large-scale scans in an attempt to find vulnerable servers.
Active Scanning:Vulnerability Scanning
It has conducted widespread scanning of target environments to identify vulnerabilities for exploit.
Active Scanning:Vulnerability Scanning
It has used publicly accessible DNS logging services to identify servers vulnerable to Log4j (CVE 2021-44228).
Active Scanning:Vulnerability Scanning
It has scanned targeted systems for vulnerable Citrix and Microsoft Exchange services.
Active Scanning:Vulnerability Scanning
It has scanned for vulnerabilities in the public-facing servers of their targets.
Active Scanning:Vulnerability Scanning
It has conducted widespread scanning to identify public-facing systems vulnerable to CVE-2021-44228 in Log4j and ProxyShell vulnerabilities; CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065 in on-premises MS Exchange Servers; and CVE-2018-13379 in Fortinet FortiOS SSL VPNs.
Active Scanning:Vulnerability Scanning
It has scanned network infrastructure for vulnerabilities as part of its operational planning.
Active Scanning:Vulnerability Scanning
It has scanned for vulnerabilities in IoT devices and other related resources such as the Docker API.
Active Scanning:Vulnerability Scanning
It has performed vulnerability scans of the target server.
Active Scanning:Wordlist Scanning
It has used DirBuster and GoBuster to brute force web directories and DNS subdomains.
Gather Victim Host Information:Software
It has inserted a malicious script within compromised websites to collect potential victim information such as browser type, system language, Flash Player version, and other data.
Gather Victim Host Information:Software
It has captured the user-agent strings from visitors to their phishing sites.
Gather Victim Host Information:Software
It has researched software code to enable supply-chain operations, most notably for the 2017 NotPetya attack. It also collected a list of computers using specific software as part of its targeting efforts.
Gather Victim Host Information:Client Configurations
It has interacted with Office 365 tenants to gather details regarding target's environments.
Gather Victim Identity Information
It has conducted targeted surveillance against activists and bloggers.
Gather Victim Identity Information
It has researched employees to target for social engineering attacks.
Gather Victim Identity Information
It has identified specific potential victims at targeted organizations.
README.md exists but content is empty. Use the Edit dataset card button to edit it.
Downloads last month
36
Edit dataset card