Home >
Enterprise >
Participants >
Cybereason >
Remote Services (T1021)
|
|
Carbanak+FIN7 |
||||||
Step | ATT&CK Pattern |
|
||||
5.A.7
![]() |
|
|||||
5.B.1
![]() |
|
|||||
5.C.2
|
|
|||||
7.A.5
|
|
|||||
7.B.3
|
|
|||||
16.A.5
|
|
|||||
19.A.2
|
|
APT29 |
||||||||
Step | ATT&CK Pattern |
|
||||||
8.A.2
|
Tactic Lateral Movement (TA0008) Subtechnique Remote Services: Windows Remote Management (T1021.006) |
|
||||||
8.C.2
|
|
|||||||
16.C.1
|
Tactic Lateral Movement (TA0008) Subtechnique Remote Services: Windows Remote Management (T1021.006) |
|
||||||
20.B.2
|
Tactic Lateral Movement (TA0008) Subtechnique Remote Services: Windows Remote Management (T1021.006) |
|
APT3 |
||||||
Step | ATT&CK Pattern |
|
||||
6.C.1
|
|
|||||
10.B.1.2
|
|
|||||
16.A.1.2
|
|
|||||
16.B.1.2
|
|
|||||
16.D.1.1
|
|
|||||
20.A.1.2
|
|
Procedure
Empire: Brute force password spraying attempts targeted Windows admin shares on Morris (10.0.1.4) and Nimda (10.0.1.6)
Footnotes
- For most alerts in the user interface, the telemetry behind it is separately available in the capability. This is counted as a separate detection because the functionality was showed to MITRE throughout the evaluation, though a screenshot was not taken in this instance.


[2]


[3]


[4]


[5]


Procedure
Empire: Successful authentication targeted Windows admin share on Conficker (10.0.0.5)
Footnotes
- For most alerts in the user interface, the telemetry behind it is separately available in the capability. This is counted as a separate detection because the functionality was showed to MITRE throughout the evaluation, though a screenshot was not taken in this instance.


Procedure
Empire: Successful authentication targeted Windows admin shares on Conficker (10.0.0.5)
Footnotes
- For most alerts in the user interface, the telemetry behind it is separately available in the capability. This is counted as a separate detection because the functionality was showed to MITRE throughout the evaluation, though a screenshot was not taken in this instance.


[2]

