About 4,790 results
Open links in new tab
  1. Dynamic Resolution: Domain Generation Algorithms, Sub …

    DGAs can take the form of apparently random or "gibberish" strings (ex: istgmxdejdnxuyla.ru) when they construct domain names by generating each letter. Alternatively, some DGAs …

  2. MITRE ATT&CK®

    MITRE ATT&CK ® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for …

  3. Data Obfuscation: Junk Data, Sub-technique T1001.001 - MITRE …

    Mar 15, 2020 · By adding random or meaningless data to the protocols used for command and control, adversaries can prevent trivial methods for decoding, deciphering, or otherwise …

  4. Disk Wipe: Disk Content Wipe, Sub-technique T1561.001 - MITRE …

    To wipe disk content, adversaries may acquire direct access to the hard drive in order to overwrite arbitrarily sized portions of disk with random data. [2] Adversaries have also been observed …

  5. Dynamic Resolution, Technique T1568 - Enterprise | MITRE …

    Adversaries may dynamically establish connections to command and control infrastructure to evade common detections and remediations. This may be achieved by using malware that …

  6. KillDisk, Software S0607 | MITRE ATT&CK®

    KillDisk is a disk-wiping tool designed to overwrite files with random data to render the OS unbootable. It was first observed as a component of BlackEnergy malware during cyber …

  7. Lockscreen Bypass, Technique T1461 - Mobile | MITRE ATT&CK®

    Both iOS and Android partly mitigate this attack by requiring the device’s passcode rather than biometrics to unlock the device after every device restart, and after a set or random amount of …

  8. Password Policies, Mitigation M1027 - MITRE ATT&CK®

    Jun 6, 2019 · Microsoft Local Administrator Password Solution (LAPS): Enforce random, unique admin passwords. Linux/macOS: PAM Modules (pam_pwquality, pam_tally2, pam_faillock): …

  9. Virtualization/Sandbox Evasion, Technique T1497 - MITRE …

    Adversaries may employ various means to detect and avoid virtualization and analysis environments. This may include changing behaviors based on the results of checks for the …

  10. Compromise Infrastructure: Domains, Sub-technique T1584.001 ...

    Adversaries may hijack domains and/or subdomains that can be used during targeting. Domain registration hijacking is the act of changing the registration of a domain name without the …