TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Huntress

Navigate SocGholish with Huntress | Huntress

2024-03-01 · Read original ↗

ATT&CK techniques detected

6 predictions
T1176.001Browser Extensions
54%
“navigate socgholish with huntress | huntress in an era where cyber threats like socgholish are becoming increasingly sophisticated, understanding and combating these attacks is crucial for digital safety. this post delves into leveraging huntress for effectively handling socgholi…”
T1204.002Malicious File
49%
“navigate socgholish with huntress | huntress in an era where cyber threats like socgholish are becoming increasingly sophisticated, understanding and combating these attacks is crucial for digital safety. this post delves into leveraging huntress for effectively handling socgholi…”
T1594Search Victim-Owned Websites
44%
“wordpress site of someone ' s personal blog that had been hacked to redirect users without their knowledge to the site that hosts the malicious javascript. assay [. ] porchlightcommunity [. ] org / 03j7jahamos3wsg / 5udxr6arn6 / pt8m / to download the malicious socgholish file. t…”
T1217Browser Information Discovery
37%
“navigate socgholish with huntress | huntress in an era where cyber threats like socgholish are becoming increasingly sophisticated, understanding and combating these attacks is crucial for digital safety. this post delves into leveraging huntress for effectively handling socgholi…”
T1070Indicator Removal
35%
“from kahu security. this tool, alongside running the suspicious update. js file, can unveil the domains the file communicates with, offering a quick win in our investigative process.”
T1189Drive-by Compromise
34%
“wordpress site of someone ' s personal blog that had been hacked to redirect users without their knowledge to the site that hosts the malicious javascript. assay [. ] porchlightcommunity [. ] org / 03j7jahamos3wsg / 5udxr6arn6 / pt8m / to download the malicious socgholish file. t…”

Summary

In an era where cyber threats like SocGholish are becoming increasingly sophisticated, understanding and combating these attacks is crucial for digital safety. This post delves into leveraging Huntress for effectively handling SocGholish threats, outlining a step-by-step approach for IT professionals.