WARPWIRE is a Javascript credential stealer that targets plaintext passwords and usernames for exfiltration that was used during Cutting Edge to target Ivanti Connect Secure VPNs.[1][2]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1554 | 主机软件二进制文件妥协 |
WARPWIRE can embed itself into a legitimate file on compromised Ivanti Connect Secure VPNs.[1] |
|
| Enterprise | T1059 | .007 | 命令与脚本解释器: JavaScript |
WARPWIRE is a credential harvester written in JavaScript.[1] |
| Enterprise | T1132 | .001 | 数据编码: Standard Encoding |
WARPWIRE can Base64 encode captured credentials with |
| Enterprise | T1048 | .003 | 替代协议渗出: Exfiltration Over Unencrypted Non-C2 Protocol |
WARPWIRE can send captured credentials to C2 via HTTP |
| Enterprise | T1056 | .003 | 输入捕获: Web Portal Capture |
WARPWIRE can capture credentials submitted during the web logon process in order to access layer seven applications such as RDP.[1] |
| ID | Name | Description |
|---|---|---|
| C0029 | Cutting Edge |