Adversaries may upload, install, or otherwise set up capabilities that can be used during targeting. To support their operations, an adversary may need to take capabilities they developed (Develop Capabilities) or obtained (Obtain Capabilities) and stage them on infrastructure under their control. These capabilities may be staged on infrastructure that was previously purchased/rented by the adversary (Acquire Infrastructure) or was otherwise compromised by them (Compromise Infrastructure). Capabilities may also be staged on web services, such as GitHub or Pastebin, or on Platform-as-a-Service (PaaS) offerings that enable users to easily provision applications.[1][2][3][4][5]
攻撃者は、攻撃に使用する武器をアップロード、インストール、またはその他の方法でセットアップすることができます。攻撃者の作戦をサポートするために、攻撃者は、開発した能力 (Develop Capabilities) または入手した武器(Obtain Capabilities) を、彼らの管理下にあるインフラストラクチャに設定する必要があります。これらの武器は、攻撃者が以前に購入/レンタルした(Acquire Infrastructure)、またはその他の方法で攻撃者が侵害した(Compromise Infrastructure)インフラストラクチャ上に配置される場合があります。また、GitHub や Pastebin などのウェブサービスや、ユーザーが簡単にアプリケーションをプロビジョニングできる Platform-as-a-Service (PaaS) サービス上に構築されることもあります。
Staging of capabilities can aid the adversary in a number of initial access and post-compromise behaviors, including (but not limited to):
武器の配置は、最初のアクセスや侵害後の行動において、攻撃者の手助けとなります。
ID | Name | Description |
---|---|---|
G0129 | Mustang Panda |
Mustang Panda has used servers under their control to validate tracking pixels sent to phishing victims.[12] |
ID | Mitigation | Description |
---|---|---|
M1056 | Pre-compromise |
This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. |
ID | Data Source | Data Component | Detects |
---|---|---|---|
DS0035 | Internet Scan | Response Content |
If infrastructure or patterns in malware, tooling, certificates, or malicious web content have been previously identified, internet scanning may uncover when an adversary has
staged their capabilities.Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection
efforts may be focused on related stages of the adversary lifecycle, such as initial access and post-compromise behaviors. |