← Back to Explore
T1588
Obtain Capabilities
Adversaries may buy and/or steal capabilities that can be used during targeting. Rather than developing their own capabilities in-house, adversaries may purchase, freely download, or steal them. Activities may include the acquisition of malware, software (including licenses), exploits, certificates, and information relating to vulnerabilities. Adversaries may obtain capabilities to support their operations throughout numerous phases of the adversary lifecycle. In addition to downloading free ma...
PRE
3
Detections
2
Sources
0
Threat Actors
BY SOURCE
2sigma1elastic
PROCEDURES (2)
General Monitoring2 detections
Auto-extracted: 2 detections for general monitoring
Script Execution Monitoring1 detections
Auto-extracted: 1 detections for script execution monitoring