“##ated a legitimate equipment trading company and used procurement - related subject lines designed to resemble business correspondence. messages were short, often only two to three sentences, and included professional - looking signature blocks to appear legitimate. read more on…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566.002Spearphishing Link
75%
“phantom project bundles infostealer, crypter and rat for sale a. net - based infostealer sold as part of a commercial cybercrime toolkit that bundles a stealer, crypter and remote access tool ( rat ) under subscription tiers has been detailed further by cybersecurity researchers.…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1003OS Credential Dumping
75%
“, anti - analysis techniques and data exfiltration behavior. " phantom stealer is one example of a broader pattern, " the researchers explained, " credential theft scaling through commercial stealer - as - a - service operations, where the outcome is identity - driven compromise …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566.001Spearphishing Attachment
56%
“phantom project bundles infostealer, crypter and rat for sale a. net - based infostealer sold as part of a commercial cybercrime toolkit that bundles a stealer, crypter and remote access tool ( rat ) under subscription tiers has been detailed further by cybersecurity researchers.…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566.001Spearphishing Attachment
49%
“##ated a legitimate equipment trading company and used procurement - related subject lines designed to resemble business correspondence. messages were short, often only two to three sentences, and included professional - looking signature blocks to appear legitimate. read more on…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1589.001Credentials
40%
“, anti - analysis techniques and data exfiltration behavior. " phantom stealer is one example of a broader pattern, " the researchers explained, " credential theft scaling through commercial stealer - as - a - service operations, where the outcome is identity - driven compromise …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566Phishing
36%
“phantom project bundles infostealer, crypter and rat for sale a. net - based infostealer sold as part of a commercial cybercrime toolkit that bundles a stealer, crypter and remote access tool ( rat ) under subscription tiers has been detailed further by cybersecurity researchers.…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.