PITSTOP is a backdoor that was deployed on compromised Ivanti Connect Secure VPNs during Cutting Edge to enable command execution and file read/write.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1573 | .002 | 加密通道: Asymmetric Cryptography | |
| Enterprise | T1140 | 反混淆/解码文件或信息 |
PITSTOP can deobfuscate base64 encoded and AES encrypted commands.[1] |
|
| Enterprise | T1059 | .004 | 命令与脚本解释器: Unix Shell |
PITSTOP has the ability to receive shell commands over a Unix domain socket.[1] |
| Enterprise | T1205 | .002 | 流量激活: Socket Filters |
PITSTOP can listen and evaluate incoming commands on the domain socket, created by PITHOOK malware, located at |
| Enterprise | T1559 | 进程间通信 |
PITSTOP can listen over the Unix domain socket located at |
|
| ID | Name | Description |
|---|---|---|
| C0029 | Cutting Edge |