EXPLORE
← Back to Explore
T1588

Obtain Capabilities

Adversaries may buy and/or steal capabilities that can be used during targeting. Rather than developing their own capabilities in-house, adversaries may purchase, freely download, or steal them. Activities may include the acquisition of malware, software (including licenses), exploits, certificates, and information relating to vulnerabilities. Adversaries may obtain capabilities to support their operations throughout numerous phases of the adversary lifecycle. In addition to downloading free ma...

PRE
3
Detections
2
Sources
0
Threat Actors

BY SOURCE

2sigma1elastic

PROCEDURES (2)

General Monitoring2 detections

Auto-extracted: 2 detections for general monitoring

Script Execution Monitoring1 detections

Auto-extracted: 1 detections for script execution monitoring

DETECTIONS (3)