Skip to content

Latest commit

 

History

History
33 lines (27 loc) · 1.52 KB

exploit-software.md

File metadata and controls

33 lines (27 loc) · 1.52 KB
ID E1203
Objective(s) Execution, Impact
Related ATT&CK Technique Exploitation for Client Execution

Exploitation for Client Execution

Software is exploited - either because of a vulnerability or through its designed features - to gain access for malware. In general, exploitation may be done by a human attacker, but MBC focuses on software exploits implemented in code. Malware-specific details are below.

See related ATT&CK Technique: Exploitation for Client Execution.

Methods

Name ID Description
File Transfer Protocol (FTP) Servers E1203.m03 Malware leverages an FTP server.
Java-based Web Servers E1203.m02
Red Hat JBoss Enterprise Products E1203.m04
Remote Desktop Protocols (RDP) E1203.m01 RDP is used by malware.
Sysinternals E1203.m05 Sysinternals tools are used for additional command line functionality.
Windows Utilities E1203.m06 One or more Windows utilities are used.

Malware Examples

Name Date Description
SamSam 2015 Attackers associated with SamSam exploit vulnerabilities in remote desktop protocols (RDP), Java-based web servers, or file transfer protocol (FTP) servers. [1]

References

[1] https://blog.malwarebytes.com/cybercrime/2018/05/samsam-ransomware-need-know/