Iberia is notifying customers of a significant data breach stemming from a compromised third-party supplier. A threat actor claims to possess 77GB of stolen airline data. This incident highlights the persistent risk of supply chain vulnerabilities where vendors become the weakest link in the security chain.
Business impact
The exposure of customer data triggers immediate GDPR notification obligations and potential fines. Reputational damage and loss of customer trust are significant, alongside the operational cost of incident response and identity protection services for affected individuals.
Recommended action
Security teams should review third-party vendor access privileges and ensure strict data handling agreements are in place. Iberia customers should be advised to change passwords and monitor for phishing attempts.
CISA has issued a warning regarding the active exploitation of a critical pre-authentication Remote Code Execution (RCE) vulnerability in Oracle Identity Manager. The flaw, tracked as CVE-2025-61757 with a CVSS score of 9.8, allows unauthenticated attackers to execute arbitrary code on affected systems. CISA has added this to its Known Exploited Vulnerabilities (KEV) catalog, mandating federal agencies to patch immediately.
Business impact
Oracle Identity Manager often holds the "keys to the kingdom," managing user access and privileges across an enterprise. Compromise here allows attackers to create privileged accounts, pivot laterally, and steal sensitive identity data, resulting in total domain compromise and severe SOX/FISMA compliance violations.
Recommended action
Prioritize patching Oracle Fusion Middleware/Identity Manager immediately. If patching is not possible within 24 hours, restrict network access to the Identity Manager interface to trusted internal IPs only and implement WAF rules to block suspicious requests.
SonicWall has disclosed a high-severity buffer overflow vulnerability (CVE-2025-40601) in the SSLVPN feature of SonicOS. This flaw affects Gen7 and Gen8 firewalls and allows remote attackers to crash the devices, causing a Denial of Service (DoS). While currently described as a crash vector, buffer overflows in security appliances often have RCE potential.
Business impact
A successful exploit can take offline the primary perimeter defense for an organization, disrupting remote workforce connectivity and potentially exposing the internal network to further attacks if the device fails open or is bypassed during the crash state.
Recommended action
Apply the latest SonicOS firmware update immediately. If immediate patching is not feasible, restrict SSLVPN access to trusted sources or disable the SSLVPN feature if not critically needed.
The International Association of Cryptologic Research (IACR) was forced to cancel its annual leadership election results after an official lost the decryption key required to unlock the verifiable voting system results. This ironic failure underscores that even the most secure cryptographic systems are vulnerable to human error and key management failures.
Business impact
While this specific incident affects a non-profit, it serves as a critical warning for organizations relying on encryption for data privacy (HIPAA/GDPR). Loss of keys equates to permanent data loss or inability to verify integrity, which can be catastrophic for business continuity.
Recommended action
Audit Key Management Systems (KMS). Ensure robust backup and recovery procedures for critical encryption keys are in place and tested, utilizing split-key protocols for high-value assets.
Researchers presenting at NDSS 2025 have introduced GAP-Diff, a method to protect JPEG-compressed images from diffusion-based facial customization. As AI-driven deepfakes and image manipulation become easier, protecting the integrity of digital media is becoming a security priority.
Business impact
For organizations relying on identity verification or media integrity, AI manipulation poses a fraud risk. Tools like GAP-Diff represent the next generation of defensive countermeasures.
Recommended action
Monitor developments in adversarial AI defense and consider implementing media provenance standards (like C2PA) alongside defensive watermarking where applicable.
The China-linked threat group APT24 has been observed using a new malware dubbed "BadAudio" in a long-running cyberespionage campaign. The group leverages supply chain attacks to deploy this downloader, which facilitates the retrieval of additional payloads for persistent access.
Business impact
Advanced Persistent Threats (APTs) targeting supply chains can remain undetected for years, leading to massive intellectual property theft and long-term surveillance of corporate communications.
Recommended action
Enhance endpoint detection for unsigned or suspicious audio drivers and review network logs for communication with known APT24 infrastructure.
Following a recent Cloudflare outage, organizations are re-evaluating their reliance on single-provider Content Delivery Networks (CDNs). The incident highlights the trade-off between simplicity and resilience, prompting discussions on multi-CDN architectures to ensure high availability for critical digital services.
International law enforcement agencies have executed a coordinated takedown of bulletproof hosting providers, including Media Land and Hypercore. These services provided infrastructure for ransomware gangs and cybercriminals to operate with impunity.
Business impact
This disruption may lead to a temporary decrease in commodity malware traffic but often results in threat actors migrating to compromised legitimate infrastructure. Expect a shift in attacker TTPs as they seek new hosting.
Recommended action
Update threat intelligence feeds to include indicators related to the displaced infrastructure and monitor for sudden shifts in attack sources.
Spotlight Rationale: With the active exploitation of **Oracle Identity Manager (CVE-2025-61757)** and **SonicWall SSLVPN (CVE-2025-40601)**, organizations need immediate mitigation capabilities that bridge the gap between vulnerability disclosure and patch deployment.
Trend Micro Vision One stands out for its robust Virtual Patching capabilities (via Intrusion Prevention System modules). For critical flaws like the Oracle RCE and SonicWall buffer overflow, Vision One can apply network-layer rules to block exploit traffic *before* it reaches the vulnerable application. This allows security teams to secure the perimeter immediately while testing and scheduling the official vendor patches, significantly reducing the window of exposure.
Actionable Platform Guidance: Enable the specific IPS rules for CVE-2025-61757 and CVE-2025-40601 within the Workload Security or Network Security modules.
ā ļø Disclaimer: Test all detection logic in non-production environments before deployment.
1. Vendor Platform Configuration - Trend Micro Vision One
# ACTIONABLE GUIDANCE: Enable Virtual Patching for Critical CVEs
# Status: SUCCESS (Confidence: 0.8)
1. Log in to the Trend Micro Vision One console.
2. Navigate to 'Endpoint Security' > 'Workload Security' (or Deep Security Manager).
3. Go to 'Policies' and select the policy applied to your Oracle/SonicWall-facing servers/gateways.
4. Select 'Intrusion Prevention' > 'General'.
5. Ensure Intrusion Prevention is set to 'On' and in 'Prevent' mode.
6. Search for the following CVEs in the rule search bar:
- CVE-2025-61757 (Oracle Identity Manager)
- CVE-2025-40601 (SonicWall SSLVPN)
7. Right-click the relevant rules and select 'Assign/Unassign' -> 'Assign'.
8. Save the policy.
# VERIFICATION STEPS:
1. Check the 'Events' tab under Intrusion Prevention to monitor for blocked exploit attempts.
2. Verify the policy status shows 'Managed' and 'Up-to-date' on target agents.
index=security sourcetype="web_proxy" OR sourcetype="iis" OR sourcetype="apache"
uri_path="*/iam/governance/selfservice/*" OR uri_path="*/xlWebApp/*"
method="POST"
| eval risk_score=case(
status==200 AND method=="POST", 80,
status==500, 40,
1==1, 0)
| where risk_score >= 40
| table _time, src_ip, dest_ip, uri_path, status, user_agent, risk_score
| sort -_time
4. PowerShell Script ā Check for SonicWall SSLVPN Port Exposure
$targets = @("192.168.1.1", "10.0.0.1") # Replace with your SonicWall Management/VPN IPs
$port = 4433 # Default SSLVPN port, adjust if custom
foreach ($target in $targets) {
Write-Host "Checking $target on port $port..."
try {
$tcp = New-Object System.Net.Sockets.TcpClient
$connect = $tcp.BeginConnect($target, $port, $null, $null)
$wait = $connect.AsyncWaitHandle.WaitOne(1000, $false)
if ($tcp.Connected) {
Write-Host "WARNING: Port $port is OPEN on $target. Verify firmware version immediately." -ForegroundColor Red
$tcp.Close()
} else {
Write-Host "Port $port is closed or filtered on $target." -ForegroundColor Green
}
} catch {
Write-Host "Connection failed to $target." -ForegroundColor Yellow
}
}
Cookie Notice
We use essential cookies to provide our cybersecurity newsletter service and analytics cookies to improve your experience. We respect your privacy and comply with GDPR requirements.
About STIX 2.1: Structured Threat Information eXpression (STIX) is the machine language of cybersecurity. This bundle contains validated threat objects, indicators, and relationships that can be directly imported into your SIEM, TIP, or security orchestration platform.
Usage: Download or copy the JSON below and import it directly into your threat intelligence platform, SIEM, or security orchestration tools for automated threat detection and response.
{
"type": "bundle",
"id": "bundle--22a05756-c081-4fa4-8176-8f27a34810a0",
"objects": [
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--94868c89-83c2-464b-929b-a1a8aa3c8487",
"created": "2022-10-01T00:00:00.000Z",
"definition_type": "tlp:2.0",
"name": "TLP:CLEAR",
"definition": {
"tlp": "clear"
}
},
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--16a0a1f5-6a96-4df7-976a-e9b55780758c",
"created": "2025-11-24T04:47:44.771Z",
"modified": "2025-11-24T04:47:44.771Z",
"name": "MikeGPT Intelligence Platform",
"description": "AI-powered threat intelligence collection and analysis platform providing automated cybersecurity intelligence feeds",
"identity_class": "organization",
"sectors": [
"technology",
"defense"
],
"contact_information": "Website: https://mikegptai.com | Email: intel@mikegptai.com",
"object_marking_refs": [
"marking-definition--94868c89-83c2-464b-929b-a1a8aa3c8487"
]
},
{
"type": "report",
"spec_version": "2.1",
"id": "report--93d8f089-dfe4-46c1-a37b-6f19fb763c38",
"created": "2025-11-24T04:47:44.771Z",
"modified": "2025-11-24T04:47:44.771Z",
"name": "Threat Intelligence Report - 2025-11-24",
"description": "Threat Intelligence Report - 2025-11-24\n\nThis report consolidates actionable cybersecurity intelligence from 46 sources, processed through automated threat analysis and relationship extraction.\n\nKEY FINDINGS:\n⢠SonicWall flags SSLVPN flaw allowing firewall crashes (Score: 100)\n⢠BadAudio malware: how APT24 scaled its cyberespionage through supply chain attacks (Score: 99.2)\n⢠Microsoft Ignite 2025 - Microsoft cares a lot about cybersecurity, not so much about cyber professio (Score: 93.9)\n⢠Open Source Firmware analyzer EMBA now with dependency track integration (Score: 93.2)\n⢠SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 72 (Score: 92.0)\n\nEXTRACTED ENTITIES:\n⢠13 Attack Pattern(s)\n⢠1 Malware(s)\n⢠1 Marking Definition(s)\n⢠2 Threat Actor(s)\n⢠1 Vulnerability(s)\n\nCONFIDENCE ASSESSMENT:\nVariable confidence scoring applied based on entity type and intelligence source reliability. Confidence ranges from 30-95% reflecting professional intelligence assessment practices.\n\nGENERATION METADATA:\n- Processing Time: Automated\n- Validation: Three-LLM consensus committee\n- Standards Compliance: STIX 2.1\n",
"published": "2025-11-24T04:47:44.771Z",
"object_refs": [
"identity--16a0a1f5-6a96-4df7-976a-e9b55780758c",
"identity--0186ae1b-86aa-44d7-b12e-8dd8db99009b",
"vulnerability--eef4f13e-fbf3-4cca-a8b8-d83a3a4349dd",
"identity--a32754ce-47e5-4775-be04-f6984bc030d4",
"identity--5ccdf7bc-6dc4-4348-ac05-2f7e1ccfb271",
"identity--e1caf464-ddb1-4c18-aa59-f7fddf317b78",
"identity--d1ae695c-0b7c-460c-82ca-aee412ad2be6",
"identity--489a8859-b504-4d5b-b691-0f5586819ace",
"identity--8a7ca088-fae7-4645-8f55-5f28dd9b1396",
"identity--ae4d5f46-29c5-40ae-842b-378abf057c12",
"identity--8802ab17-c52d-4bca-9705-2caf1a71c434",
"identity--c5ee4b6e-5085-4c3b-b1ec-8dcdf4b2b313",
"threat-actor--8587f106-7cb6-432d-a1d6-96b518ad99b2",
"malware--2ece065e-3aae-40cb-95de-0577e8e0d0ae",
"threat-actor--588771bd-5080-42e6-ab22-a96412031b96",
"attack-pattern--13fc9cbe-9444-4eba-872b-a44565ae3ab7",
"attack-pattern--280ebd89-59bc-4ae2-a9db-1c01a56e50dc",
"attack-pattern--e5974f70-5745-450a-908a-6483ad9c4678",
"attack-pattern--9f6c52f6-cc63-4397-b485-099a2ca6acf9",
"attack-pattern--7aa19707-a8bb-4175-a9ce-0dc6a85cf429",
"attack-pattern--f1669470-d352-4943-bd4a-70c7740b6d39",
"attack-pattern--d2a77ce3-d278-4f77-97f0-227b744a33d3",
"attack-pattern--a6ff86fe-f269-42e5-9428-ab17d04e30e2",
"attack-pattern--e8d516a9-a107-4c4b-806f-bc9c612eef18",
"attack-pattern--27b36b6d-ae90-4767-b07a-563ecef589ea",
"attack-pattern--ed3369e1-8515-458a-99e3-cb9283fb73d1",
"attack-pattern--e03eb8e0-183c-4351-82cb-2d9c193d1530",
"attack-pattern--6f441f0d-2af5-4ab6-853d-745c0cc303e9"
],
"labels": [
"threat-report",
"threat-intelligence"
],
"created_by_ref": "identity--16a0a1f5-6a96-4df7-976a-e9b55780758c",
"object_marking_refs": [
"marking-definition--94868c89-83c2-464b-929b-a1a8aa3c8487"
]
},
{
"spec_version": "2.1",
"created": "2025-11-24T04:47:43.853Z",
"modified": "2025-11-24T04:47:43.853Z",
"confidence": 95,
"type": "identity",
"id": "identity--0186ae1b-86aa-44d7-b12e-8dd8db99009b",
"name": "SonicWall",
"identity_class": "unknown",
"labels": [
"identity"
],
"description": "SonicWall is a cybersecurity company that provides network security solutions, including firewalls, intrusion prevention systems, and VPNs, to protect against cyber threats and data breaches.",
"object_marking_refs": [
"marking-definition--94868c89-83c2-464b-929b-a1a8aa3c8487"
]
},
{
"spec_version": "2.1",
"created": "2025-11-24T04:47:43.853Z",
"modified": "2025-11-24T04:47:43.853Z",
"confidence": 95,
"type": "vulnerability",
"id": "vulnerability--eef4f13e-fbf3-4cca-a8b8-d83a3a4349dd",
"name": "CVE-2025-40601",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-40601",
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40601"
},
{
"source_name": "nvd",
"external_id": "CVE-2025-40601",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-40601"
}
],
"description": "SonicWall warns of a high-severity buffer overflow flaw in SonicOS SSLVPN (CVE-2025-40601) that lets attackers crash Gen7 and Gen8 firewalls. A new high-severity SonicOS SSLVPN flaw, tracked as CVE-2025-40601 (CVSS score of 7.5), allows attackers to crash SonicWall Gen7 and Gen8 firewalls. SonicWall",
"object_marking_refs": [
"marking-definition--94868c89-83c2-464b-929b-a1a8aa3c8487"
],
"labels": [
"vulnerability"
]
},
{
"spec_version": "2.1",
"created": "2025-11-24T04:47:43.853Z",
"modified": "2025-11-24T04:47:43.853Z",
"confidence": 95,
"type": "identity",
"id": "identity--a32754ce-47e5-4775-be04-f6984bc030d4",
"name": "Microsoft Ignite",
"identity_class": "unknown",
"labels": [
"identity"
],
"description": "Microsoft Ignite is an annual conference for technology professionals to learn about Microsoft products, services, and solutions, and network with peers and industry experts.",
"object_marking_refs": [
"marking-definition--94868c89-83c2-464b-929b-a1a8aa3c8487"
]
},
{
"spec_version": "2.1",
"created": "2025-11-24T04:47:43.853Z",
"modified": "2025-11-24T04:47:43.853Z",
"confidence": 95,
"type": "identity",
"id": "identity--5ccdf7bc-6dc4-4348-ac05-2f7e1ccfb271",
"name": "Cloudflare",
"identity_class": "unknown",
"labels": [
"identity"
],
"description": "Cloudflare is a company that provides a suite of cybersecurity services, including content delivery networks, web application firewalls, and distributed denial-of-service (DDoS) protection, to help protect websites and applications from cyber threats.",
"object_marking_refs": [
"marking-definition--94868c89-83c2-464b-929b-a1a8aa3c8487"
]
},
{
"spec_version": "2.1",
"created": "2025-11-24T04:47:43.853Z",
"modified": "2025-11-24T04:47:43.853Z",
"confidence": 95,
"type": "identity",
"id": "identity--e1caf464-ddb1-4c18-aa59-f7fddf317b78",
"name": "Logitech",
"identity_class": "unknown",
"labels": [
"identity"
],
"description": "Logitech is a company that designs, manufactures, and markets personal computer peripherals and software.",
"object_marking_refs": [
"marking-definition--94868c89-83c2-464b-929b-a1a8aa3c8487"
]
},
{
"spec_version": "2.1",
"created": "2025-11-24T04:47:43.853Z",
"modified": "2025-11-24T04:47:43.853Z",
"confidence": 95,
"type": "identity",
"id": "identity--d1ae695c-0b7c-460c-82ca-aee412ad2be6",
"name": "Nanjing University of Science and Technology",
"identity_class": "organization",
"labels": [
"organization"
],
"description": "Nanjing University of Science and Technology is a public research university in Nanjing, Jiangsu, China. It is a key comprehensive university under the national '211 Project' and is ranked among the top universities in China.",
"object_marking_refs": [
"marking-definition--94868c89-83c2-464b-929b-a1a8aa3c8487"
]
},
{
"spec_version": "2.1",
"created": "2025-11-24T04:47:43.853Z",
"modified": "2025-11-24T04:47:43.853Z",
"confidence": 95,
"type": "identity",
"id": "identity--489a8859-b504-4d5b-b691-0f5586819ace",
"name": "Zhejiang University",
"identity_class": "organization",
"labels": [
"organization"
],
"description": "Zhejiang University is a public research university in Hangzhou, China, that has been involved in various cybersecurity research and development projects. The university has a strong focus on computer science and engineering, and its researchers have published numerous papers on topics such as network security, artificial intelligence, and cryptography.",
"object_marking_refs": [
"marking-definition--94868c89-83c2-464b-929b-a1a8aa3c8487"
]
},
{
"spec_version": "2.1",
"created": "2025-11-24T04:47:43.854Z",
"modified": "2025-11-24T04:47:43.854Z",
"confidence": 95,
"type": "identity",
"id": "identity--8a7ca088-fae7-4645-8f55-5f28dd9b1396",
"name": "Google",
"identity_class": "unknown",
"labels": [
"identity"
],
"description": "Google is a multinational technology company specializing in Internet-related services and products, including search engines, online advertising technologies, cloud computing, and software.",
"object_marking_refs": [
"marking-definition--94868c89-83c2-464b-929b-a1a8aa3c8487"
]
},
{
"spec_version": "2.1",
"created": "2025-11-24T04:47:43.854Z",
"modified": "2025-11-24T04:47:43.854Z",
"confidence": 95,
"type": "identity",
"id": "identity--ae4d5f46-29c5-40ae-842b-378abf057c12",
"name": "Microsoft",
"identity_class": "unknown",
"labels": [
"identity"
],
"description": "Microsoft is a multinational technology company that develops, manufactures, licenses, and supports a wide range of software products, services, and devices.",
"object_marking_refs": [
"marking-definition--94868c89-83c2-464b-929b-a1a8aa3c8487"
]
},
{
"spec_version": "2.1",
"created": "2025-11-24T04:47:43.854Z",
"modified": "2025-11-24T04:47:43.854Z",
"confidence": 95,
"type": "identity",
"id": "identity--8802ab17-c52d-4bca-9705-2caf1a71c434",
"name": "Hoxhunt",
"identity_class": "unknown",
"labels": [
"identity"
],
"description": "Hoxhunt is a phishing simulation and training platform that helps organizations educate employees on identifying and reporting suspicious emails to improve their cybersecurity awareness and resilience.",
"object_marking_refs": [
"marking-definition--94868c89-83c2-464b-929b-a1a8aa3c8487"
]
},
{
"spec_version": "2.1",
"created": "2025-11-24T04:47:43.854Z",
"modified": "2025-11-24T04:47:43.854Z",
"confidence": 95,
"type": "identity",
"id": "identity--c5ee4b6e-5085-4c3b-b1ec-8dcdf4b2b313",
"name": "Grafana",
"identity_class": "organization",
"labels": [
"organization"
],
"description": "Grafana is a software company that provides data visualization and monitoring tools, including Grafana Enterprise, which is a commercial version of their open-source platform. The company has released security updates to address a maximum severity security flaw that could allow privilege escalation or user impersonation under certain configurations.",
"object_marking_refs": [
"marking-definition--94868c89-83c2-464b-929b-a1a8aa3c8487"
]
},
{
"spec_version": "2.1",
"created": "2025-11-24T04:47:43.854Z",
"modified": "2025-11-24T04:47:43.854Z",
"confidence": 95,
"type": "threat-actor",
"id": "threat-actor--8587f106-7cb6-432d-a1d6-96b518ad99b2",
"name": "APT24",
"threat_actor_types": [
"hacker"
],
"labels": [
"threat-actor"
],
"description": "APT24 is a Chinese cyberespionage group known for its sophisticated attacks on various industries. They have been linked to several high-profile breaches and are believed to be sponsored by the Chinese government. APT24 is known for its use of advanced malware and social engineering tactics to gain access to sensitive information.",
"object_marking_refs": [
"marking-definition--94868c89-83c2-464b-929b-a1a8aa3c8487"
]
},
{
"spec_version": "2.1",
"created": "2025-11-24T04:47:43.854Z",
"modified": "2025-11-24T04:47:43.854Z",
"confidence": 95,
"type": "malware",
"id": "malware--2ece065e-3aae-40cb-95de-0577e8e0d0ae",
"name": "RONINGLOADER",
"is_family": true,
"malware_types": [
"dropper"
],
"labels": [
"malicious-activity"
],
"description": "RONINGLOADER is a malware loader associated with the DragonBreath threat actor group, used for delivering malicious payloads and exploiting vulnerabilities in software. It is specifically designed to evade detection and facilitate post-exploitation activities, making it a significant threat in the cybersecurity landscape.",
"object_marking_refs": [
"marking-definition--94868c89-83c2-464b-929b-a1a8aa3c8487"
]
},
{
"spec_version": "2.1",
"created": "2025-11-24T04:47:43.854Z",
"modified": "2025-11-24T04:47:43.854Z",
"confidence": 95,
"type": "threat-actor",
"id": "threat-actor--588771bd-5080-42e6-ab22-a96412031b96",
"name": "APT31",
"threat_actor_types": [
"hacker"
],
"labels": [
"threat-actor"
],
"description": "APT31, also known as Zirconium or APT34, is a China-linked advanced persistent threat (APT) group known for targeting various industries including IT, energy, and telecommunications. They have been active since at least 2012 and are believed to be state-sponsored.",
"object_marking_refs": [
"marking-definition--94868c89-83c2-464b-929b-a1a8aa3c8487"
]
},
{
"spec_version": "2.1",
"created": "2025-11-24T04:47:43.854Z",
"modified": "2025-11-24T04:47:43.854Z",
"confidence": 90,
"type": "attack-pattern",
"id": "attack-pattern--13fc9cbe-9444-4eba-872b-a44565ae3ab7",
"name": "Supply Chain Compromise",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "initial-access"
}
],
"x_mitre_id": "T1195",
"external_references": [
{
"source_name": "MITRE ATT&CK",
"url": "https://attack.mitre.org/techniques/T1195/",
"external_id": "T1195"
}
],
"object_marking_refs": [
"marking-definition--94868c89-83c2-464b-929b-a1a8aa3c8487"
],
"labels": [
"mitre-attack"
]
},
{
"spec_version": "2.1",
"created": "2025-11-24T04:47:44.770Z",
"modified": "2025-11-24T04:47:44.770Z",
"confidence": 90,
"type": "attack-pattern",
"id": "attack-pattern--280ebd89-59bc-4ae2-a9db-1c01a56e50dc",
"name": "Exploit Public-Facing Application",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "initial-access"
}
],
"x_mitre_id": "T1190",
"external_references": [
{
"source_name": "MITRE ATT&CK",
"url": "https://attack.mitre.org/techniques/T1190/",
"external_id": "T1190"
}
],
"object_marking_refs": [
"marking-definition--94868c89-83c2-464b-929b-a1a8aa3c8487"
],
"labels": [
"mitre-attack"
]
},
{
"spec_version": "2.1",
"created": "2025-11-24T04:47:44.770Z",
"modified": "2025-11-24T04:47:44.770Z",
"confidence": 90,
"type": "attack-pattern",
"id": "attack-pattern--e5974f70-5745-450a-908a-6483ad9c4678",
"name": "Exploitation for Client Execution",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "execution"
}
],
"x_mitre_id": "T1203",
"external_references": [
{
"source_name": "MITRE ATT&CK",
"url": "https://attack.mitre.org/techniques/T1203/",
"external_id": "T1203"
}
],
"object_marking_refs": [
"marking-definition--94868c89-83c2-464b-929b-a1a8aa3c8487"
],
"labels": [
"mitre-attack"
]
},
{
"spec_version": "2.1",
"created": "2025-11-24T04:47:44.770Z",
"modified": "2025-11-24T04:47:44.770Z",
"confidence": 72,
"type": "attack-pattern",
"id": "attack-pattern--9f6c52f6-cc63-4397-b485-099a2ca6acf9",
"name": "Compromise Hardware Supply Chain",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "initial-access"
}
],
"x_mitre_id": "T1195.003",
"external_references": [
{
"source_name": "MITRE ATT&CK",
"url": "https://attack.mitre.org/techniques/T1195/003/",
"external_id": "T1195.003"
}
],
"object_marking_refs": [
"marking-definition--94868c89-83c2-464b-929b-a1a8aa3c8487"
],
"labels": [
"mitre-attack"
]
},
{
"spec_version": "2.1",
"created": "2025-11-24T04:47:44.770Z",
"modified": "2025-11-24T04:47:44.770Z",
"confidence": 71,
"type": "attack-pattern",
"id": "attack-pattern--7aa19707-a8bb-4175-a9ce-0dc6a85cf429",
"name": "DNS",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "command-and-control"
}
],
"x_mitre_id": "T1071.004",
"external_references": [
{
"source_name": "MITRE ATT&CK",
"url": "https://attack.mitre.org/techniques/T1071/004/",
"external_id": "T1071.004"
}
],
"object_marking_refs": [
"marking-definition--94868c89-83c2-464b-929b-a1a8aa3c8487"
],
"labels": [
"mitre-attack"
]
},
{
"spec_version": "2.1",
"created": "2025-11-24T04:47:44.770Z",
"modified": "2025-11-24T04:47:44.770Z",
"confidence": 70,
"type": "attack-pattern",
"id": "attack-pattern--f1669470-d352-4943-bd4a-70c7740b6d39",
"name": "Compromise Software Supply Chain",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "initial-access"
}
],
"x_mitre_id": "T1195.002",
"external_references": [
{
"source_name": "MITRE ATT&CK",
"url": "https://attack.mitre.org/techniques/T1195/002/",
"external_id": "T1195.002"
}
],
"object_marking_refs": [
"marking-definition--94868c89-83c2-464b-929b-a1a8aa3c8487"
],
"labels": [
"mitre-attack"
]
},
{
"spec_version": "2.1",
"created": "2025-11-24T04:47:44.770Z",
"modified": "2025-11-24T04:47:44.770Z",
"confidence": 70,
"type": "attack-pattern",
"id": "attack-pattern--d2a77ce3-d278-4f77-97f0-227b744a33d3",
"name": "Archive via Utility",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "collection"
}
],
"x_mitre_id": "T1560.001",
"external_references": [
{
"source_name": "MITRE ATT&CK",
"url": "https://attack.mitre.org/techniques/T1560/001/",
"external_id": "T1560.001"
}
],
"object_marking_refs": [
"marking-definition--94868c89-83c2-464b-929b-a1a8aa3c8487"
],
"labels": [
"mitre-attack"
]
},
{
"spec_version": "2.1",
"created": "2025-11-24T04:47:44.770Z",
"modified": "2025-11-24T04:47:44.770Z",
"confidence": 70,
"type": "attack-pattern",
"id": "attack-pattern--a6ff86fe-f269-42e5-9428-ab17d04e30e2",
"name": "Screen Capture",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "collection"
}
],
"x_mitre_id": "T1113",
"external_references": [
{
"source_name": "MITRE ATT&CK",
"url": "https://attack.mitre.org/techniques/T1113/",
"external_id": "T1113"
}
],
"object_marking_refs": [
"marking-definition--94868c89-83c2-464b-929b-a1a8aa3c8487"
],
"labels": [
"mitre-attack"
]
},
{
"spec_version": "2.1",
"created": "2025-11-24T04:47:44.770Z",
"modified": "2025-11-24T04:47:44.770Z",
"confidence": 70,
"type": "attack-pattern",
"id": "attack-pattern--e8d516a9-a107-4c4b-806f-bc9c612eef18",
"name": "Adversary-in-the-Middle",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "credential-access"
},
{
"kill_chain_name": "mitre-attack",
"phase_name": "collection"
}
],
"x_mitre_id": "T1557",
"external_references": [
{
"source_name": "MITRE ATT&CK",
"url": "https://attack.mitre.org/techniques/T1557/",
"external_id": "T1557"
}
],
"object_marking_refs": [
"marking-definition--94868c89-83c2-464b-929b-a1a8aa3c8487"
],
"labels": [
"mitre-attack"
]
},
{
"spec_version": "2.1",
"created": "2025-11-24T04:47:44.770Z",
"modified": "2025-11-24T04:47:44.770Z",
"confidence": 70,
"type": "attack-pattern",
"id": "attack-pattern--27b36b6d-ae90-4767-b07a-563ecef589ea",
"name": "Scheduled Task",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "execution"
},
{
"kill_chain_name": "mitre-attack",
"phase_name": "persistence"
},
{
"kill_chain_name": "mitre-attack",
"phase_name": "privilege-escalation"
}
],
"x_mitre_id": "T1053.005",
"external_references": [
{
"source_name": "MITRE ATT&CK",
"url": "https://attack.mitre.org/techniques/T1053/005/",
"external_id": "T1053.005"
}
],
"object_marking_refs": [
"marking-definition--94868c89-83c2-464b-929b-a1a8aa3c8487"
],
"labels": [
"mitre-attack"
]
},
{
"spec_version": "2.1",
"created": "2025-11-24T04:47:44.770Z",
"modified": "2025-11-24T04:47:44.770Z",
"confidence": 70,
"type": "attack-pattern",
"id": "attack-pattern--ed3369e1-8515-458a-99e3-cb9283fb73d1",
"name": "Socket Filters",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "defense-evasion"
},
{
"kill_chain_name": "mitre-attack",
"phase_name": "persistence"
},
{
"kill_chain_name": "mitre-attack",
"phase_name": "command-and-control"
}
],
"x_mitre_id": "T1205.002",
"external_references": [
{
"source_name": "MITRE ATT&CK",
"url": "https://attack.mitre.org/techniques/T1205/002/",
"external_id": "T1205.002"
}
],
"object_marking_refs": [
"marking-definition--94868c89-83c2-464b-929b-a1a8aa3c8487"
],
"labels": [
"mitre-attack"
]
},
{
"spec_version": "2.1",
"created": "2025-11-24T04:47:44.770Z",
"modified": "2025-11-24T04:47:44.771Z",
"confidence": 70,
"type": "attack-pattern",
"id": "attack-pattern--e03eb8e0-183c-4351-82cb-2d9c193d1530",
"name": "Malicious Shell Modification",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "persistence"
}
],
"x_mitre_id": "T1156",
"external_references": [
{
"source_name": "MITRE ATT&CK",
"url": "https://attack.mitre.org/techniques/T1156/",
"external_id": "T1156"
}
],
"object_marking_refs": [
"marking-definition--94868c89-83c2-464b-929b-a1a8aa3c8487"
],
"labels": [
"mitre-attack"
]
},
{
"spec_version": "2.1",
"created": "2025-11-24T04:47:44.771Z",
"modified": "2025-11-24T04:47:44.771Z",
"confidence": 67,
"type": "attack-pattern",
"id": "attack-pattern--6f441f0d-2af5-4ab6-853d-745c0cc303e9",
"name": "DNS Server",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "resource-development"
}
],
"x_mitre_id": "T1583.002",
"external_references": [
{
"source_name": "MITRE ATT&CK",
"url": "https://attack.mitre.org/techniques/T1583/002/",
"external_id": "T1583.002"
}
],
"object_marking_refs": [
"marking-definition--94868c89-83c2-464b-929b-a1a8aa3c8487"
],
"labels": [
"mitre-attack"
]
}
]
}