[Intel]: https://www.trendmicro.com/en_us/research/16/i/pokemon-themed-umbreon-linux-rootkit-hits-x86-arm-systems.html #397
Labels
missing:tag:T1003.008
missing:tag:T1005
missing:tag:T1006
missing:tag:T1021.002
missing:tag:T1037
missing:tag:T1040
missing:tag:T1046
missing:tag:T1048
missing:tag:T1055.008
missing:tag:T1057
missing:tag:T1070.003
missing:tag:T1070.004
missing:tag:T1070.006
missing:tag:T1071.001
missing:tag:T1078.003
missing:tag:T1083
missing:tag:T1222
missing:tag:T1491
missing:tag:T1518
missing:tag:T1546.004
missing:tag:T1548.001
missing:tag:T1552.003
missing:tag:T1556.003
missing:tag:T1561
missing:tag:T1567
missing:tag:T1573
missing:tag:T1574.006
missing:tag:T1622
Area
Malware reports
Parent threat
Persistence, Privilege Escalation, Defense Evasion, Command and Control
Finding
https://www.trendmicro.com/en_us/research/16/i/pokemon-themed-umbreon-linux-rootkit-hits-x86-arm-systems.html
Industry reference
attack:T1574.006:Dynamic Linker Hijacking
attack:T1205.002:Socket Filtering
Malware reference
Umbreon
Actor reference
No response
Component
No response
Scenario
No response
The text was updated successfully, but these errors were encountered: