Secure FTP Client

Secure FTP Client
(Type: -)

No description available yet.

[News Analysis] Trends:

Total Trend: 0

Trend Per Year


Trend Per Month



[News Analysis] News Mention Another Threat Name:



[TTP Analysis] Technique Performance:

reconnaissance
0/43
resource development
0/45
initial access
0/19
execution
0/36
persistence
0/113
privilege escalation
0/96
defense evasion
0/184
credential access
0/63
discovery
0/44
lateral movement
1/22
collection
0/37
command and control
1/39
exfiltration
1/18
impact
0/26


[TTP Analysis] Mitre Attack Matrix:

TA0043 TA0042 TA0001 TA0002 TA0003 TA0004 TA0005 TA0006 TA0007 TA0008 TA0009 TA0011 TA0010 TA0040
Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
T1570
Lateral Tool Transfer
T1105
Ingress Tool Transfer
T1048.003
Exfiltration Over Alternative Protocol : Exfiltration Over Unencrypted Non-c2 Protocol


[Infrastructure Analysis] Based on Related IOC:

IP:Port Timestamp
Domain Timestamp
URL Timestamp


[Target Analysis] Region/Sector:

No information


References:

Basic Information (Credit @etda.or.th)

Tool: Secure FTP Client

Names: Secure FTP Client

Description: No description available yet.

Category: Tools

Last-card-change: 2020-04-20

Source: https://apt.etda.or.th/cgi-bin/listtools.cgi

TTP Info (Credit @Mitre)

TA0043 TA0042 TA0001 TA0002 TA0003 TA0004 TA0005 TA0006 TA0007 TA0008 TA0009 TA0011 TA0010 TA0040
Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
T1570
LATERAL TOOL TRANSFER
ftp may be abused by adversaries to transfer tools or files between systems within a compromised environment.
T1105
INGRESS TOOL TRANSFER
ftp may be abused by adversaries to transfer tools or files from an external system into a compromised environment.
T1048.003
EXFILTRATION OVER ALTERNATIVE PROTOCOL : EXFILTRATION OVER UNENCRYPTED NON-C2 PROTOCOL
ftp may be used to exfiltrate data separate from the main command and control protocol.