A vulnerability scan detects and classifies system weaknesses in computers, networks and communications equipment and predicts the effectiveness of countermeasures.

Malware/Threat actors

Name Type Years Source
GRIZZLY STEPPE threat actor 2015-2018 GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity

AR-17-20045_Enhanced_Analysis_of_GRIZZLY_STEPPE_Activity.pdf

XSLCmd malware 2009-2012 XSLCmd_OSX.pdf

Pitty Tiger threat actor 2011-2014 Pitty_Tiger_Final_Report.pdf

Rocket Kitten threat actor 2014-2015 rocket-kitten-report.pdf

Copy Kittens threat actor 2013-2017 Operation_Wilted_Tulip%20(1).pdf

CARBANAK threat actor 2017 paper_the-shadows-of-ghosts-carbanak-report.pdf

stamp.jsp?tp=&arnumber=7460498&tag=1

Volatile Cedar threat actor 2012-2014 volatile-cedar-technical-report.pdf

CARBANAK threat actor 2017 paper_the-shadows-of-ghosts-carbanak-report.pdf

stamp.jsp?tp=&arnumber=7460498&tag=1

Preventions

  • Putting a network intrusion prevention system(NIPS) inline. These devices will analyze network traffic for known malicious traffic and block when malicious activity is detected.

Detections

  • Enterprise level vulnerability scanners will include unique identifiers in the traffic to specify it’s a vulnerability scanner, unless specified not too. For example, Nessus will set the SSH client identifier to SSH-2.0-TenableRocks when scanning hosts with SSH or Nessus may include Nessus* in the user-agent header in HTTP.

Toolkit

<Toolkit instructions, if applicable>

Similar techniques

References