detection-hackathon-apt29 icon indicating copy to clipboard operation
detection-hackathon-apt29 copied to clipboard

Place for resources used during the Mordor Detection hackathon event featuring APT29 ATT&CK evals datasets

Results 49 detection-hackathon-apt29 issues
Sort by recently updated
recently updated
newest added

# Description The attacker enumerates the environment’s domain controller (T1018)

# Description The attacker uses the renewed access to generate a Kerberos Golden Ticket (T1097), using materials from the earlier breach, which is used to establish a remote PowerShell session...

The attacker then collects files (T1005), which are compressed (T1002) and encrypted (T1022), before being exfiltrated to an attacker-controlled WebDAV share (T1048).

# Description The payload in the Startup folder executes a follow-on payload using a stolen token (T1106, T1134).

# Description The attacker then elevates privileges via a user account control (UAC) bypass (T1122, T1088), which executes the newly added payload. A new C2 connection is established over port...

# Description The original victim is rebooted and the legitimate user logs in, emulating ordinary usage and a passage of time. This activity triggers the previously established persistence mechanisms, namely...

# Description Finally, the attacker deletes various files (T1107) associated with that access

# Description The attacker runs a PowerShell one-liner command (T1086) to search for filesystem for document and media files (T1083, T1119). Files of interested are collected (T1005) then encrypted (T1022)...

# Description The attacker uploads additional utilities to the secondary victim (T1105)